<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: RelunSec</title>
    <description>The latest articles on DEV Community by RelunSec (@relunsec).</description>
    <link>https://dev.to/relunsec</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3628785%2Fc6c46ccb-eb62-4efa-b1db-30765c1d3eae.png</url>
      <title>DEV Community: RelunSec</title>
      <link>https://dev.to/relunsec</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/relunsec"/>
    <language>en</language>
    <item>
      <title>Introducing dssrf: A Safe‑by‑Construction SSRF Defense Library for Node.js</title>
      <dc:creator>RelunSec</dc:creator>
      <pubDate>Fri, 12 Dec 2025 15:33:00 +0000</pubDate>
      <link>https://dev.to/relunsec/introducing-dssrf-a-safe-by-construction-ssrf-defense-library-for-nodejs-1ec8</link>
      <guid>https://dev.to/relunsec/introducing-dssrf-a-safe-by-construction-ssrf-defense-library-for-nodejs-1ec8</guid>
      <description>&lt;h1&gt;
  
  
  Introducing &lt;strong&gt;dssrf&lt;/strong&gt; - A Safe‑by‑Construction SSRF Defense Library for Node.js
&lt;/h1&gt;

&lt;p&gt;Server-Side Request Forgery (SSRF) is one of the most dangerous and misunderstood vulnerabilities in modern web applications.&lt;br&gt;&lt;br&gt;
Most Node.js SSRF "solutions" rely on &lt;strong&gt;regex&lt;/strong&gt;, &lt;strong&gt;blacklists&lt;/strong&gt;, or &lt;strong&gt;string checks&lt;/strong&gt; - and attackers bypass them easily.&lt;/p&gt;

&lt;p&gt;So I built &lt;strong&gt;dssrf&lt;/strong&gt;, a safe‑by‑construction SSRF defense library for Node.js that focuses on &lt;em&gt;eliminating entire bug classes&lt;/em&gt;, not patching individual payloads.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/HackingRepo/dssrf-js" rel="noopener noreferrer"&gt;https://github.com/HackingRepo/dssrf-js&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;strong&gt;npm:&lt;/strong&gt; &lt;a href="https://www.npmjs.com/package/dssrf" rel="noopener noreferrer"&gt;https://www.npmjs.com/package/dssrf&lt;/a&gt;&lt;/p&gt;


&lt;h1&gt;
  
  
  Why SSRF Is Harder Than Developers Think
&lt;/h1&gt;

&lt;p&gt;Most SSRF bypasses come from things developers don't expect:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;DNS rebinding
&lt;/li&gt;
&lt;li&gt;Redirect chains
&lt;/li&gt;
&lt;li&gt;IPv6 edge cases
&lt;/li&gt;
&lt;li&gt;Encoded IPs
&lt;/li&gt;
&lt;li&gt;Unicode tricks
&lt;/li&gt;
&lt;li&gt;URL normalization inconsistencies
&lt;/li&gt;
&lt;li&gt;Alternative IP formats
&lt;/li&gt;
&lt;li&gt;Cloud metadata endpoints
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A simple blacklist like:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;&lt;span class="k"&gt;if &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;url&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;includes&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="s2"&gt;localhost&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt; &lt;span class="nf"&gt;reject&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;…is not enough. Attackers can bypass it with:&lt;/p&gt;

&lt;p&gt;&lt;a href="http://127.1/" rel="noopener noreferrer"&gt;http://127.1/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://2130706433/" rel="noopener noreferrer"&gt;http://2130706433/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;http://[::ffff:127.0.0.1]/&lt;/p&gt;

&lt;p&gt;&lt;a href="http://google.com@127.0.0.1/" rel="noopener noreferrer"&gt;http://google.com@127.0.0.1/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://google.com%00@127.0.0.1/" rel="noopener noreferrer"&gt;http://google.com%00@127.0.0.1/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What dssrf Does Differently?&lt;/p&gt;

&lt;p&gt;Instead of blacklists, dssrf uses a multi‑step, safe‑by‑construction approach:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;URL normalization (RFC‑correct)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Unicode normalization&lt;/li&gt;
&lt;li&gt;Backslash to slash conversion&lt;/li&gt;
&lt;li&gt;Credential stripping&lt;/li&gt;
&lt;li&gt;Scheme validation&lt;/li&gt;
&lt;li&gt;Canonicalization&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;DNS resolution + IP classification&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Detects internal IPs&lt;/li&gt;
&lt;li&gt;Detects cloud metadata IPs&lt;/li&gt;
&lt;li&gt;Detects IPv6 local addresses&lt;/li&gt;
&lt;li&gt;Detects IPv4/IPv6 rebinding&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;Redirect chain validation&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Every redirect target is validated with the same rules.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;Protocol restrictions&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Only http and https are allowed.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;TypeScript types included&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Full .d.ts support for modern Node.js projects.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

</description>
      <category>javascript</category>
      <category>security</category>
      <category>opensource</category>
      <category>node</category>
    </item>
    <item>
      <title>New winaudit crate designed for Windows Security Assessment | Audit.</title>
      <dc:creator>RelunSec</dc:creator>
      <pubDate>Tue, 25 Nov 2025 13:12:43 +0000</pubDate>
      <link>https://dev.to/relunsec/new-winaudit-crate-designed-for-windows-security-assessment-audit-j4l</link>
      <guid>https://dev.to/relunsec/new-winaudit-crate-designed-for-windows-security-assessment-audit-j4l</guid>
      <description>&lt;p&gt;Hello everyone,&lt;/p&gt;

&lt;p&gt;I released now a new Rust crate named &lt;a href="https://crates.io/crates/winaudit" rel="noopener noreferrer"&gt;winaudit&lt;/a&gt; and documentation in &lt;a href="https://docs.rs/winaudit" rel="noopener noreferrer"&gt;Docs&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;winaudit offers Windows system and security audit checks that can be integrated directly into your Win32 or Rust applications.&lt;/p&gt;

&lt;h2&gt;
  
  
  It is designed for
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Windows developers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;System utility creators&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Security tools&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Desktop software needing env checks&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;IT / sysadmin automation&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Auditing and compliance tools&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What it exposes?
&lt;/h2&gt;

&lt;p&gt;winaudit exposes a collections of Windows system checks like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;OS informations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Windows Updates availability.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Antiviruses status.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Firewalls status.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;TPM And BitLocker detections.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;UAC (User Account Control) configurations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Secure Boot.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Network adapter checks (Requires "experimental" feature enabled in &lt;code&gt;Cargo.toml&lt;/code&gt;).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Hardware audits (CPU, RAM, disks, etc ...).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Everything uses proper Win32 APIs.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Example Usage For Check is Windows Updates is Available:
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight rust"&gt;&lt;code&gt;&lt;span class="k"&gt;use&lt;/span&gt; &lt;span class="nn"&gt;winaudit&lt;/span&gt;&lt;span class="p"&gt;::&lt;/span&gt;&lt;span class="n"&gt;is_update_available&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

&lt;span class="k"&gt;fn&lt;/span&gt; &lt;span class="nf"&gt;main&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="k"&gt;match&lt;/span&gt; &lt;span class="nf"&gt;is_update_available&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
        &lt;span class="nf"&gt;Ok&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="k"&gt;true&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="k"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="nd"&gt;println!&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"Windows Update: updates are available."&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt;
        &lt;span class="nf"&gt;Ok&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="k"&gt;false&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="k"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="nd"&gt;println!&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"Windows Update: system up to date."&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt;
        &lt;span class="nf"&gt;Err&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;e&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="k"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="nd"&gt;eprintln!&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"An Error Occured: {e}"&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt;
    &lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Highlights:
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;100% native Win32 APIs usage.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Meaningful error reporting (Using custom WinAuditError).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;No unsafe is required in the user code.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Strong Documententation (docs.rs now fully passing in &lt;code&gt;v1.0.3&lt;/code&gt;).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Lightweight (no bloatwares of dependencies).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Designed for long-term extensions.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Stability:
&lt;/h2&gt;

&lt;p&gt;A previous release &lt;code&gt;v1.0.2&lt;/code&gt; had docs issues, these problems are fully fixed in &lt;code&gt;v0.1.3&lt;/code&gt;.&lt;br&gt;
The crate builds cleanly with --all-features, examples work, and docs.rs passes.&lt;/p&gt;

&lt;h2&gt;
  
  
  Contributions
&lt;/h2&gt;

&lt;p&gt;Any contributions are very welcome to Me in &lt;a href="https://github.com/HackingRepo/winaudit-rs" rel="noopener noreferrer"&gt;Github&lt;/a&gt;, I appreciate it i want my crate to be used in Real Win32 Entreprise grade or Non-Entreprise Windows Desktop Apps.&lt;/p&gt;

</description>
      <category>security</category>
      <category>rust</category>
      <category>opensource</category>
      <category>news</category>
    </item>
  </channel>
</rss>
