1 |
rakinar2 |
577 |
/** |
2 |
|
|
* This file is part of SudoBot. |
3 |
|
|
* |
4 |
|
|
* Copyright (C) 2021-2023 OSN Developers. |
5 |
|
|
* |
6 |
|
|
* SudoBot is free software; you can redistribute it and/or modify it |
7 |
|
|
* under the terms of the GNU Affero General Public License as published by |
8 |
|
|
* the Free Software Foundation, either version 3 of the License, or |
9 |
|
|
* (at your option) any later version. |
10 |
|
|
* |
11 |
|
|
* SudoBot is distributed in the hope that it will be useful, but |
12 |
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of |
13 |
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
14 |
|
|
* GNU Affero General Public License for more details. |
15 |
|
|
* |
16 |
|
|
* You should have received a copy of the GNU Affero General Public License |
17 |
|
|
* along with SudoBot. If not, see <https://www.gnu.org/licenses/>. |
18 |
|
|
*/ |
19 |
|
|
|
20 |
|
|
// TODO: Add an allow/disallow mode to all roles |
21 |
|
|
|
22 |
|
|
import { |
23 |
|
|
Attachment, |
24 |
|
|
EmbedAssetData, |
25 |
|
|
Message, |
26 |
|
|
PermissionFlagsBits, |
27 |
|
|
Snowflake, |
28 |
|
|
TextChannel, |
29 |
|
|
escapeCodeBlock, |
30 |
|
|
escapeInlineCode, |
31 |
|
|
escapeMarkdown |
32 |
|
|
} from "discord.js"; |
33 |
|
|
import sharp from "sharp"; |
34 |
|
|
import Service from "../core/Service"; |
35 |
|
|
import { CreateLogEmbedOptions } from "../services/LoggerService"; |
36 |
|
|
import { HasEventListeners } from "../types/HasEventListeners"; |
37 |
|
|
import { MessageRuleType } from "../types/MessageRuleSchema"; |
38 |
|
|
import { log, logDebug, logError, logWarn } from "../utils/Logger"; |
39 |
|
|
import { escapeRegex, getEmoji, request } from "../utils/utils"; |
40 |
|
|
|
41 |
|
|
export const name = "messageRuleService"; |
42 |
|
|
|
43 |
|
|
type RuleHandlerMethod = Extract<keyof MessageRuleService, `rule${string}`>; |
44 |
|
|
|
45 |
|
|
type RuleInfo = |
46 |
|
|
| RuleHandlerMethod |
47 |
|
|
| { |
48 |
|
|
method: RuleHandlerMethod; |
49 |
|
|
autoHandleModes?: boolean; |
50 |
|
|
}; |
51 |
|
|
|
52 |
|
|
const handlers: Record<MessageRuleType["type"], RuleInfo> = { |
53 |
|
|
domain: { |
54 |
|
|
method: "ruleDomain", |
55 |
|
|
autoHandleModes: false |
56 |
|
|
}, |
57 |
|
|
blocked_file_extension: "ruleBlockedFileExtension", |
58 |
|
|
blocked_mime_type: "ruleBlockedMimeType", |
59 |
|
|
anti_invite: "ruleAntiInvite", |
60 |
|
|
regex_filter: "ruleRegexFilter", |
61 |
|
|
block_repeated_text: "ruleRepeatedText", |
62 |
|
|
block_mass_mention: "ruleBlockMassMention", |
63 |
|
|
regex_must_match: "ruleRegexMustMatch", |
64 |
|
|
image: "ruleImage", |
65 |
|
|
embed: "ruleEmbed", |
66 |
|
|
EXPERIMENTAL_url_crawl: "ruleURLCrawl", |
67 |
|
|
EXPERIMENTAL_nsfw_filter: "ruleNSFWFilter" |
68 |
|
|
}; |
69 |
|
|
|
70 |
|
|
type MessageRuleAction = MessageRuleType["actions"][number]; |
71 |
|
|
|
72 |
|
|
// TODO: Allow specific words/tokens even after having rules that disallow it |
73 |
|
|
// TODO: Introduce rule bypassers ^^ |
74 |
|
|
|
75 |
|
|
export default class MessageRuleService extends Service implements HasEventListeners { |
76 |
|
|
private config(guildId: Snowflake) { |
77 |
|
|
return this.client.configManager.config[guildId]?.message_rules; |
78 |
|
|
} |
79 |
|
|
|
80 |
|
|
async onMessageCreate(message: Message<boolean>) { |
81 |
|
|
if (message.author.bot) { |
82 |
|
|
return false; |
83 |
|
|
} |
84 |
|
|
|
85 |
|
|
const config = this.config(message.guildId!); |
86 |
|
|
|
87 |
|
|
if ( |
88 |
|
|
!config?.enabled || |
89 |
|
|
config?.global_disabled_channels?.includes(message.channelId!) || |
90 |
|
|
(await this.client.permissionManager.isImmuneToAutoMod(message.member!, PermissionFlagsBits.ManageGuild)) |
91 |
|
|
) { |
92 |
|
|
return false; |
93 |
|
|
} |
94 |
|
|
|
95 |
|
|
return this.processMessageRules(message, config.rules); |
96 |
|
|
} |
97 |
|
|
|
98 |
|
|
private async processMessageRules(message: Message, rules: Array<MessageRuleType>) { |
99 |
|
|
for (const rule of rules) { |
100 |
|
|
if (rule.actions.length === 0) { |
101 |
|
|
log("No action found in this rule! Considering it as disabled."); |
102 |
|
|
continue; |
103 |
|
|
} |
104 |
|
|
|
105 |
|
|
if (rule.actions.length === 1 && rule.actions.includes("delete") && !message.deletable) { |
106 |
|
|
log("Missing permissions to delete messages, but the rule actions include `delete`. Skipping."); |
107 |
|
|
continue; |
108 |
|
|
} |
109 |
|
|
|
110 |
|
|
if (rule.actions.includes("mute") && rule.actions.includes("warn")) { |
111 |
|
|
logWarn("You cannot include mute and warn together as message rule actions! Skipping."); |
112 |
|
|
continue; |
113 |
|
|
} |
114 |
|
|
|
115 |
|
|
if (rule.disabled_channels.includes(message.channelId!)) { |
116 |
|
|
logWarn("This rule is disabled in this channel."); |
117 |
|
|
continue; |
118 |
|
|
} |
119 |
|
|
|
120 |
|
|
if (rule.immune_users.includes(message.author.id)) { |
121 |
|
|
logWarn("This user is immune to this rule."); |
122 |
|
|
continue; |
123 |
|
|
} |
124 |
|
|
|
125 |
|
|
if (message.member?.roles.cache.hasAny(...rule.immune_roles)) { |
126 |
|
|
logWarn("This user is immune to this rule, due to having some whitelisted roles."); |
127 |
|
|
continue; |
128 |
|
|
} |
129 |
|
|
|
130 |
|
|
const handlerFunctionInfo = handlers[rule.type]; |
131 |
|
|
const handlerFunctionName: RuleHandlerMethod | undefined = |
132 |
|
|
typeof handlerFunctionInfo === "string" ? handlerFunctionInfo : handlerFunctionInfo?.method; |
133 |
|
|
const handlerFunctionMetaInfo = (typeof handlerFunctionInfo === "string" ? null : handlerFunctionInfo) ?? { |
134 |
|
|
method: handlerFunctionName, |
135 |
|
|
autoHandleModes: true |
136 |
|
|
}; |
137 |
|
|
|
138 |
|
|
if (!handlerFunctionInfo || !handlerFunctionName?.startsWith("rule")) { |
139 |
|
|
continue; |
140 |
|
|
} |
141 |
|
|
|
142 |
|
|
const handler = this[handlerFunctionName] as ( |
143 |
|
|
...args: unknown[] |
144 |
|
|
) => Promise<boolean | null | undefined | CreateLogEmbedOptions>; |
145 |
|
|
|
146 |
|
|
if (typeof handler !== "function") { |
147 |
|
|
continue; |
148 |
|
|
} |
149 |
|
|
|
150 |
|
|
try { |
151 |
|
|
const result = await handler.call(this, message, rule); |
152 |
|
|
const inverse = rule.mode === "inverse"; |
153 |
|
|
const { autoHandleModes } = handlerFunctionMetaInfo; |
154 |
|
|
|
155 |
|
|
if ((result && !inverse) || (inverse && ((autoHandleModes && !result) || (!autoHandleModes && result)))) { |
156 |
|
|
try { |
157 |
|
|
for (const action of rule.actions) { |
158 |
|
|
log("Taking action: ", action); |
159 |
|
|
await this.takeAction(message, rule, action); |
160 |
|
|
} |
161 |
|
|
|
162 |
|
|
const embedOptions = |
163 |
|
|
result && typeof result === "object" && !inverse |
164 |
|
|
? result |
165 |
|
|
: inverse |
166 |
|
|
? { |
167 |
|
|
options: { |
168 |
|
|
description: `${getEmoji(this.client, "info")} This rule was __inversed__.`, |
169 |
|
|
...(result && typeof result === "object" && "options" in result ? result.options : {}) |
170 |
|
|
}, |
171 |
|
|
...(result && typeof result === "object" ? result : {}) |
172 |
|
|
} |
173 |
|
|
: undefined; |
174 |
|
|
|
175 |
|
|
log(embedOptions); |
176 |
|
|
|
177 |
|
|
await this.client.loggerService |
178 |
|
|
.logMessageRuleAction({ |
179 |
|
|
message, |
180 |
|
|
actions: rule.actions, |
181 |
|
|
rule: rule.type, |
182 |
|
|
embedOptions |
183 |
|
|
}) |
184 |
|
|
.catch(logError); |
185 |
|
|
} catch (e) { |
186 |
|
|
logError(e); |
187 |
|
|
} |
188 |
|
|
|
189 |
|
|
return true; |
190 |
|
|
} |
191 |
|
|
} catch (e) { |
192 |
|
|
logError(e); |
193 |
|
|
continue; |
194 |
|
|
} |
195 |
|
|
} |
196 |
|
|
|
197 |
|
|
return false; |
198 |
|
|
} |
199 |
|
|
|
200 |
|
|
private getReason(rule: MessageRuleType, key: Extract<keyof MessageRuleType, `${string}_reason`>) { |
201 |
|
|
return rule[key] ?? rule.common_reason ?? "Your message violated the server rules. Please be careful next time."; |
202 |
|
|
} |
203 |
|
|
|
204 |
|
|
private async takeAction(message: Message, rule: MessageRuleType, action: MessageRuleAction) { |
205 |
|
|
switch (action) { |
206 |
|
|
case "delete": |
207 |
|
|
if (message.deletable) { |
208 |
|
|
await message.delete().catch(logError); |
209 |
|
|
} |
210 |
|
|
|
211 |
|
|
break; |
212 |
|
|
|
213 |
|
|
case "verbal_warn": |
214 |
|
|
{ |
215 |
|
|
const content = this.getReason(rule, "verbal_warning_reason"); |
216 |
|
|
|
217 |
|
|
await message.reply({ |
218 |
|
|
content |
219 |
|
|
}); |
220 |
|
|
} |
221 |
|
|
|
222 |
|
|
break; |
223 |
|
|
|
224 |
|
|
case "warn": |
225 |
|
|
{ |
226 |
|
|
const reason = this.getReason(rule, "warning_reason"); |
227 |
|
|
|
228 |
|
|
await this.client.infractionManager.createMemberWarn(message.member!, { |
229 |
|
|
guild: message.guild!, |
230 |
|
|
moderator: this.client.user!, |
231 |
|
|
notifyUser: true, |
232 |
|
|
reason, |
233 |
|
|
sendLog: true |
234 |
|
|
}); |
235 |
|
|
} |
236 |
|
|
|
237 |
|
|
break; |
238 |
|
|
|
239 |
|
|
case "mute": |
240 |
|
|
{ |
241 |
|
|
const reason = this.getReason(rule, "mute_reason"); |
242 |
|
|
|
243 |
|
|
await this.client.infractionManager.createMemberMute(message.member!, { |
244 |
|
|
guild: message.guild!, |
245 |
|
|
moderator: this.client.user!, |
246 |
|
|
notifyUser: true, |
247 |
|
|
reason, |
248 |
|
|
sendLog: true, |
249 |
|
|
autoRemoveQueue: true, |
250 |
|
|
duration: rule.mute_duration === -1 ? 60_000 : rule.mute_duration |
251 |
|
|
}); |
252 |
|
|
} |
253 |
|
|
|
254 |
|
|
break; |
255 |
|
|
|
256 |
|
|
case "clear": |
257 |
|
|
{ |
258 |
|
|
await this.client.infractionManager.bulkDeleteMessages({ |
259 |
|
|
guild: message.guild!, |
260 |
|
|
moderator: this.client.user!, |
261 |
|
|
count: 50, |
262 |
|
|
sendLog: true, |
263 |
|
|
messageChannel: message.channel! as TextChannel, |
264 |
|
|
user: message.member!.user, |
265 |
|
|
reason: "Message rule triggered" |
266 |
|
|
}); |
267 |
|
|
} |
268 |
|
|
|
269 |
|
|
break; |
270 |
|
|
} |
271 |
|
|
} |
272 |
|
|
|
273 |
|
|
private scanForBlockedWordsAndTokens(tokens: string[] = [], words: string[] = [], ...strings: (string | null | undefined)[]) { |
274 |
|
|
for (const string of strings) { |
275 |
|
|
if (!string) { |
276 |
|
|
continue; |
277 |
|
|
} |
278 |
|
|
|
279 |
|
|
for (const token of tokens) { |
280 |
|
|
if (string.includes(token)) { |
281 |
|
|
return { includes: true, token }; |
282 |
|
|
} |
283 |
|
|
} |
284 |
|
|
|
285 |
|
|
const splitted = string.split(/\s+/); |
286 |
|
|
|
287 |
|
|
for (const word of words) { |
288 |
|
|
if (splitted.includes(word)) { |
289 |
|
|
return { includes: true, word }; |
290 |
|
|
} |
291 |
|
|
} |
292 |
|
|
} |
293 |
|
|
|
294 |
|
|
return { includes: false }; |
295 |
|
|
} |
296 |
|
|
|
297 |
|
|
async ruleNSFWFilter(message: Message, rule: Extract<MessageRuleType, { type: "EXPERIMENTAL_nsfw_filter" }>) { |
298 |
|
|
logDebug("Scanning for NSFW content"); |
299 |
|
|
|
300 |
|
|
if (message.attachments.size === 0) { |
301 |
|
|
return null; |
302 |
|
|
} |
303 |
|
|
|
304 |
|
|
const { score_thresholds } = rule; |
305 |
|
|
|
306 |
|
|
for (const attachment of message.attachments.values()) { |
307 |
|
|
logDebug("Scanning attachment", attachment.id); |
308 |
|
|
|
309 |
|
|
if (attachment instanceof Attachment && attachment.contentType?.startsWith("image/")) { |
310 |
|
|
logDebug("Scanning image attachment", attachment.id); |
311 |
|
|
|
312 |
|
|
const [response, error] = await request({ |
313 |
|
|
url: attachment.proxyURL, |
314 |
|
|
method: "GET", |
315 |
|
|
responseType: "arraybuffer" |
316 |
|
|
}); |
317 |
|
|
|
318 |
|
|
if (error || !response) { |
319 |
|
|
logError(error); |
320 |
|
|
return; |
321 |
|
|
} |
322 |
|
|
|
323 |
|
|
const imageData = Buffer.from(response.data, "binary"); |
324 |
|
|
const sharpMethodName = attachment.contentType.startsWith("image/gif") |
325 |
|
|
? "gif" |
326 |
|
|
: attachment.contentType.startsWith("image/png") |
327 |
|
|
? "png" |
328 |
|
|
: attachment.contentType.startsWith("image/jpeg") |
329 |
|
|
? "jpeg" |
330 |
|
|
: "unknown"; |
331 |
|
|
|
332 |
|
|
if (sharpMethodName === "unknown") { |
333 |
|
|
logWarn("Unknown image type"); |
334 |
|
|
continue; |
335 |
|
|
} |
336 |
|
|
|
337 |
|
|
const sharpInfo = sharp(imageData); |
338 |
|
|
const sharpMethod = sharpInfo[sharpMethodName].bind(sharpInfo); |
339 |
|
|
const convertedImageBuffer = await sharpMethod().toBuffer(); |
340 |
|
|
const result = await this.client.imageRecognitionService.detectNSFW(convertedImageBuffer); |
341 |
|
|
const isNSFW = |
342 |
|
|
result.hentai >= score_thresholds.hentai || |
343 |
|
|
result.porn >= score_thresholds.porn || |
344 |
|
|
result.sexy >= score_thresholds.sexy; |
345 |
|
|
|
346 |
|
|
logDebug("NSFW result", result); |
347 |
|
|
|
348 |
|
|
if (isNSFW) { |
349 |
|
|
return { |
350 |
|
|
title: "NSFW content detected in image", |
351 |
|
|
fields: [ |
352 |
|
|
{ |
353 |
|
|
name: "Scores", |
354 |
|
|
value: `Hentai: ${Math.round(result.hentai * 100)}%\nPorn: ${Math.round( |
355 |
|
|
result.porn * 100 |
356 |
|
|
)}%\nSexy: ${Math.round(result.sexy * 100)}%\nNeutral: ${Math.round(result.neutral * 100)}%` |
357 |
|
|
} |
358 |
|
|
] |
359 |
|
|
} as CreateLogEmbedOptions; |
360 |
|
|
} |
361 |
|
|
} |
362 |
|
|
} |
363 |
|
|
|
364 |
|
|
return null; |
365 |
|
|
} |
366 |
|
|
|
367 |
|
|
async ruleEmbed(message: Message, rule: Extract<MessageRuleType, { type: "embed" }>) { |
368 |
|
|
if (message.embeds.length === 0) { |
369 |
|
|
return null; |
370 |
|
|
} |
371 |
|
|
|
372 |
|
|
const config = this.client.configManager.config[message.guildId!]?.message_filter; |
373 |
|
|
const { mode, tokens, words, inherit_from_word_filter } = rule; |
374 |
|
|
|
375 |
|
|
if (config?.enabled && inherit_from_word_filter) { |
376 |
|
|
words.push(...config.data.blocked_words); |
377 |
|
|
tokens.push(...config.data.blocked_tokens); |
378 |
|
|
} |
379 |
|
|
|
380 |
|
|
for (const embed of message.embeds) { |
381 |
|
|
const fieldsStrings = embed.fields.reduce((acc, value) => { |
382 |
|
|
acc.push(value.name, value.value); |
383 |
|
|
return acc; |
384 |
|
|
}, [] as string[]); |
385 |
|
|
const { includes, word, token } = this.scanForBlockedWordsAndTokens( |
386 |
|
|
tokens, |
387 |
|
|
words, |
388 |
|
|
embed.author?.name, |
389 |
|
|
embed.description, |
390 |
|
|
embed.title, |
391 |
|
|
embed.footer?.text, |
392 |
|
|
...fieldsStrings |
393 |
|
|
); |
394 |
|
|
|
395 |
|
|
if (includes && mode === "normal") { |
396 |
|
|
return { |
397 |
|
|
title: `Blocked ${token ? "token" : word ? "word" : "word/token"}(s) detected in embed`, |
398 |
|
|
fields: [ |
399 |
|
|
{ |
400 |
|
|
name: `${token ? "Token" : word ? "Word" : "Word/Token"}`, |
401 |
|
|
value: `||${escapeMarkdown(token ?? word ?? "[???]")}||` |
402 |
|
|
}, |
403 |
|
|
{ |
404 |
|
|
name: "Method", |
405 |
|
|
value: "Embed Scan" |
406 |
|
|
} |
407 |
|
|
] |
408 |
|
|
} as CreateLogEmbedOptions; |
409 |
|
|
} else if (!includes && mode === "inverse") { |
410 |
|
|
return { |
411 |
|
|
title: `Blocked ${token ? "token" : word ? "word" : "word/token"}(s) was not found in embed`, |
412 |
|
|
fields: [ |
413 |
|
|
{ |
414 |
|
|
name: `${token ? "Token" : word ? "Word" : "Word/Token"}`, |
415 |
|
|
value: `||${escapeMarkdown(token ?? word ?? "[???]")}||` |
416 |
|
|
}, |
417 |
|
|
{ |
418 |
|
|
name: "Method", |
419 |
|
|
value: "Embed Scan" |
420 |
|
|
} |
421 |
|
|
] |
422 |
|
|
} as CreateLogEmbedOptions; |
423 |
|
|
} |
424 |
|
|
} |
425 |
|
|
|
426 |
|
|
return null; |
427 |
|
|
} |
428 |
|
|
|
429 |
|
|
async ruleImage(message: Message, rule: Extract<MessageRuleType, { type: "image" }>) { |
430 |
|
|
if (message.attachments.size === 0 && (!rule.scan_embeds || message.embeds.length === 0)) { |
431 |
|
|
return null; |
432 |
|
|
} |
433 |
|
|
|
434 |
|
|
const config = this.client.configManager.config[message.guildId!]?.message_filter; |
435 |
|
|
const { mode, tokens, words, inherit_from_word_filter, scan_embeds } = rule; |
436 |
|
|
|
437 |
|
|
if (config?.enabled && inherit_from_word_filter) { |
438 |
|
|
words.push(...config.data.blocked_words); |
439 |
|
|
tokens.push(...config.data.blocked_tokens); |
440 |
|
|
} |
441 |
|
|
|
442 |
|
|
const attachments: Array<EmbedAssetData | Attachment> = [...message.attachments.values()]; |
443 |
|
|
|
444 |
|
|
if (scan_embeds) { |
445 |
|
|
for (const embed of message.embeds) { |
446 |
|
|
if (embed.image) { |
447 |
|
|
attachments.push(embed.image); |
448 |
|
|
} |
449 |
|
|
|
450 |
|
|
if (embed.thumbnail) { |
451 |
|
|
attachments.push(embed.thumbnail); |
452 |
|
|
} |
453 |
|
|
|
454 |
|
|
if (embed.author?.proxyIconURL ?? embed.author?.iconURL) { |
455 |
|
|
attachments.push({ |
456 |
|
|
url: embed.author?.proxyIconURL ?? embed.author?.iconURL ?? "" |
457 |
|
|
}); |
458 |
|
|
} |
459 |
|
|
} |
460 |
|
|
} |
461 |
|
|
|
462 |
|
|
for (const attachment of attachments) { |
463 |
|
|
if (attachment instanceof Attachment && !attachment.contentType?.startsWith("image/")) { |
464 |
|
|
log(`Not scanning attachment ${attachment.id} as it's not an image`); |
465 |
|
|
continue; |
466 |
|
|
} |
467 |
|
|
|
468 |
|
|
const { |
469 |
|
|
data: { text: actualText, words: textWords } |
470 |
|
|
} = await this.client.imageRecognitionService.recognize(attachment.proxyURL ?? attachment.url); |
471 |
|
|
const text = actualText.toLowerCase(); |
472 |
|
|
|
473 |
|
|
for (const token of tokens) { |
474 |
|
|
const includes = text.includes(token.toLowerCase()); |
475 |
|
|
|
476 |
|
|
if (includes && mode === "normal") { |
477 |
|
|
return { |
478 |
|
|
title: "Blocked token(s) detected in image", |
479 |
|
|
fields: [ |
480 |
|
|
{ |
481 |
|
|
name: "Token", |
482 |
|
|
value: `||${escapeMarkdown(token)}||` |
483 |
|
|
}, |
484 |
|
|
{ |
485 |
|
|
name: "Method", |
486 |
|
|
value: "Image Scan" |
487 |
|
|
} |
488 |
|
|
] |
489 |
|
|
} satisfies CreateLogEmbedOptions; |
490 |
|
|
} else if (!includes && mode === "inverse") { |
491 |
|
|
return { |
492 |
|
|
title: "Required token(s) were not found in image", |
493 |
|
|
fields: [ |
494 |
|
|
{ |
495 |
|
|
name: "Token", |
496 |
|
|
value: `||${escapeMarkdown(token)}||` |
497 |
|
|
}, |
498 |
|
|
{ |
499 |
|
|
name: "Method", |
500 |
|
|
value: "Image Scan" |
501 |
|
|
} |
502 |
|
|
] |
503 |
|
|
} satisfies CreateLogEmbedOptions; |
504 |
|
|
} |
505 |
|
|
} |
506 |
|
|
|
507 |
|
|
for (const textWord of textWords) { |
508 |
|
|
const includes = words.includes(textWord.text.toLowerCase()); |
509 |
|
|
|
510 |
|
|
if (includes && mode === "normal") { |
511 |
|
|
return { |
512 |
|
|
title: "Blocked word(s) detected in image", |
513 |
|
|
fields: [ |
514 |
|
|
{ |
515 |
|
|
name: "Word", |
516 |
|
|
value: `||${escapeMarkdown(textWord.text)}||` |
517 |
|
|
}, |
518 |
|
|
{ |
519 |
|
|
name: "Method", |
520 |
|
|
value: "Image Scan" |
521 |
|
|
} |
522 |
|
|
] |
523 |
|
|
} satisfies CreateLogEmbedOptions; |
524 |
|
|
} else if (!includes && mode === "inverse") { |
525 |
|
|
return { |
526 |
|
|
title: "Required word(s) were not found in image", |
527 |
|
|
fields: [ |
528 |
|
|
{ |
529 |
|
|
name: "Word", |
530 |
|
|
value: `||${escapeMarkdown(textWord.text)}||` |
531 |
|
|
}, |
532 |
|
|
{ |
533 |
|
|
name: "Method", |
534 |
|
|
value: "Image Scan" |
535 |
|
|
} |
536 |
|
|
] |
537 |
|
|
} satisfies CreateLogEmbedOptions; |
538 |
|
|
} |
539 |
|
|
} |
540 |
|
|
} |
541 |
|
|
|
542 |
|
|
log("Image scan passed"); |
543 |
|
|
return null; |
544 |
|
|
} |
545 |
|
|
|
546 |
|
|
/** This rule is experimental. It needs caching support. */ |
547 |
|
|
async ruleURLCrawl(message: Message, rule: Extract<MessageRuleType, { type: "EXPERIMENTAL_url_crawl" }>) { |
548 |
|
|
if (message.content.trim() === "") { |
549 |
|
|
return null; |
550 |
|
|
} |
551 |
|
|
|
552 |
|
|
const { excluded_domains_regex, excluded_link_regex, excluded_links, words, tokens, inherit_from_word_filter } = rule; |
553 |
|
|
const config = this.client.configManager.config[message.guildId!]?.message_filter; |
554 |
|
|
|
555 |
|
|
const matches = message.content.matchAll(/https?:\/\/([A-Za-z0-9-.]*[A-Za-z0-9-])[\S]*/gim); |
556 |
|
|
|
557 |
|
|
for (const match of matches) { |
558 |
|
|
const url = match[0].toLowerCase(); |
559 |
|
|
const domain = match[1].toLowerCase(); |
560 |
|
|
|
561 |
|
|
if (excluded_links.includes(url)) { |
562 |
|
|
return null; |
563 |
|
|
} |
564 |
|
|
|
565 |
|
|
for (const regex of excluded_domains_regex) { |
566 |
|
|
if (new RegExp(regex, "gim").test(domain)) { |
567 |
|
|
return null; |
568 |
|
|
} |
569 |
|
|
} |
570 |
|
|
|
571 |
|
|
for (const regex of excluded_link_regex) { |
572 |
|
|
if (new RegExp(regex, "gim").test(url)) { |
573 |
|
|
return null; |
574 |
|
|
} |
575 |
|
|
} |
576 |
|
|
} |
577 |
|
|
|
578 |
|
|
if (config?.enabled && inherit_from_word_filter) { |
579 |
|
|
words.push(...config.data.blocked_words); |
580 |
|
|
tokens.push(...config.data.blocked_tokens); |
581 |
|
|
} |
582 |
|
|
|
583 |
|
|
for (const match of matches) { |
584 |
|
|
const url = match[0].toLowerCase(); |
585 |
|
|
|
586 |
|
|
const [response, error] = await request({ |
587 |
|
|
url, |
588 |
|
|
method: "GET", |
589 |
|
|
transformResponse: r => r |
590 |
|
|
}); |
591 |
|
|
|
592 |
|
|
if (error) { |
593 |
|
|
logError(error); |
594 |
|
|
continue; |
595 |
|
|
} |
596 |
|
|
|
597 |
|
|
if (typeof response?.data !== "string") { |
598 |
|
|
logWarn("The response returned by the server during URL crawl is invalid"); |
599 |
|
|
continue; |
600 |
|
|
} |
601 |
|
|
|
602 |
|
|
const lowerCasedData = response.data.toLowerCase(); |
603 |
|
|
|
604 |
|
|
for (const token of tokens) { |
605 |
|
|
if (lowerCasedData.includes(token)) { |
606 |
|
|
return { |
607 |
|
|
title: "Website contains blocked token(s)", |
608 |
|
|
fields: [ |
609 |
|
|
{ |
610 |
|
|
name: "Token", |
611 |
|
|
value: `||${token}||` |
612 |
|
|
}, |
613 |
|
|
{ |
614 |
|
|
name: "Method", |
615 |
|
|
value: "URL Crawling" |
616 |
|
|
} |
617 |
|
|
] |
618 |
|
|
} satisfies CreateLogEmbedOptions; |
619 |
|
|
} |
620 |
|
|
} |
621 |
|
|
|
622 |
|
|
const textWords = lowerCasedData.split(/\s+/); |
623 |
|
|
|
624 |
|
|
for (const word of words) { |
625 |
|
|
if (textWords.includes(word)) { |
626 |
|
|
return { |
627 |
|
|
title: "Website contains blocked word(s)", |
628 |
|
|
fields: [ |
629 |
|
|
{ |
630 |
|
|
name: "Word", |
631 |
|
|
value: `||${word}||` |
632 |
|
|
}, |
633 |
|
|
{ |
634 |
|
|
name: "Method", |
635 |
|
|
value: "URL Crawling" |
636 |
|
|
} |
637 |
|
|
] |
638 |
|
|
} satisfies CreateLogEmbedOptions; |
639 |
|
|
} |
640 |
|
|
} |
641 |
|
|
} |
642 |
|
|
|
643 |
|
|
return null; |
644 |
|
|
} |
645 |
|
|
|
646 |
|
|
async ruleDomain(message: Message, rule: Extract<MessageRuleType, { type: "domain" }>) { |
647 |
|
|
if (message.content.trim() === "") { |
648 |
|
|
return null; |
649 |
|
|
} |
650 |
|
|
|
651 |
|
|
const { domains, scan_links_only, mode } = rule; |
652 |
|
|
|
653 |
|
|
const prefix = scan_links_only ? "(https?://)" : "(https?://)?"; |
654 |
|
|
let specificRegex = `${prefix}(`; |
655 |
|
|
const genericRegex = `${prefix}([a-zA-Z0-9.-]+\\.[a-zA-Z]{2,})`; |
656 |
|
|
|
657 |
|
|
let index = 0; |
658 |
|
|
for (const domain of domains) { |
659 |
|
|
const escapedDomain = escapeRegex(domain).replace(/\\\*/g, "[A-Za-z0-9-]+"); |
660 |
|
|
specificRegex += `${escapedDomain}`; |
661 |
|
|
|
662 |
|
|
if (index < domains.length - 1) { |
663 |
|
|
specificRegex += "|"; |
664 |
|
|
} |
665 |
|
|
|
666 |
|
|
index++; |
667 |
|
|
} |
668 |
|
|
|
669 |
|
|
specificRegex += ")\\S*"; |
670 |
|
|
log(specificRegex); |
671 |
|
|
|
672 |
|
|
const specificMatches = [...(new RegExp(specificRegex, "i").exec(message.content) ?? [])]; |
673 |
|
|
log(specificMatches); |
674 |
|
|
|
675 |
|
|
const genericMatches = [...(new RegExp(genericRegex, "i").exec(message.content) ?? [])]; |
676 |
|
|
log(genericMatches); |
677 |
|
|
|
678 |
|
|
if (specificMatches.length > 0) { |
679 |
|
|
const cleanedDomain = (specificMatches[2] ?? specificMatches[1] ?? specificMatches[0]).replace(/https?:\/\//, ""); |
680 |
|
|
if (mode === "normal") { |
681 |
|
|
return { |
682 |
|
|
title: "Blocked domain(s) detected", |
683 |
|
|
fields: [ |
684 |
|
|
{ |
685 |
|
|
name: "Domain", |
686 |
|
|
value: `\`${escapeMarkdown(cleanedDomain)}\`` |
687 |
|
|
} |
688 |
|
|
] |
689 |
|
|
} satisfies CreateLogEmbedOptions; |
690 |
|
|
} else if (mode === "inverse") { |
691 |
|
|
return false; |
692 |
|
|
} |
693 |
|
|
} else if (genericMatches.length > 0 && mode === "inverse" && !scan_links_only) { |
694 |
|
|
const cleanedDomain = (genericMatches[2] ?? genericMatches[1] ?? genericMatches[0]).replace(/https?:\/\//, ""); |
695 |
|
|
return { |
696 |
|
|
title: "Blocked domain(s) detected", |
697 |
|
|
fields: [ |
698 |
|
|
{ |
699 |
|
|
name: "Domain", |
700 |
|
|
value: `\`${escapeMarkdown(cleanedDomain)}\`` |
701 |
|
|
} |
702 |
|
|
] |
703 |
|
|
} satisfies CreateLogEmbedOptions; |
704 |
|
|
} |
705 |
|
|
|
706 |
|
|
return false; |
707 |
|
|
} |
708 |
|
|
|
709 |
|
|
async ruleBlockedFileExtension(message: Message, rule: Extract<MessageRuleType, { type: "blocked_file_extension" }>) { |
710 |
|
|
for (const attachment of message.attachments.values()) { |
711 |
|
|
for (const extension of rule.data) { |
712 |
|
|
if (attachment.proxyURL.endsWith(`.${extension}`)) { |
713 |
|
|
return { |
714 |
|
|
title: "File(s) with blocked extensions found", |
715 |
|
|
fields: [ |
716 |
|
|
{ |
717 |
|
|
name: "File", |
718 |
|
|
value: `[${attachment.name}](${attachment.url}): \`.${escapeMarkdown(extension)}\`` |
719 |
|
|
} |
720 |
|
|
] |
721 |
|
|
}; |
722 |
|
|
} |
723 |
|
|
} |
724 |
|
|
} |
725 |
|
|
|
726 |
|
|
return null; |
727 |
|
|
} |
728 |
|
|
|
729 |
|
|
async ruleBlockedMimeType(message: Message, rule: Extract<MessageRuleType, { type: "blocked_mime_type" }>) { |
730 |
|
|
for (const attachment of message.attachments.values()) { |
731 |
|
|
if (rule.data.includes(attachment.contentType ?? "unknown")) { |
732 |
|
|
return { |
733 |
|
|
title: "File(s) with blocked MIME-type found", |
734 |
|
|
fields: [ |
735 |
|
|
{ |
736 |
|
|
name: "File", |
737 |
|
|
value: `[${attachment.name}](${attachment.url}): \`${attachment.contentType}\`` |
738 |
|
|
} |
739 |
|
|
] |
740 |
|
|
}; |
741 |
|
|
} |
742 |
|
|
} |
743 |
|
|
|
744 |
|
|
return null; |
745 |
|
|
} |
746 |
|
|
|
747 |
|
|
async ruleAntiInvite(message: Message, rule: Extract<MessageRuleType, { type: "anti_invite" }>) { |
748 |
|
|
if (message.content.trim() === "") { |
749 |
|
|
return null; |
750 |
|
|
} |
751 |
|
|
|
752 |
|
|
const allowedInviteCodes = rule.allowed_invite_codes; |
753 |
|
|
const regex = /(https?:\/\/)?discord.(gg|com\/invite)\/([A-Za-z0-9_]+)/gi; |
754 |
|
|
const matches = message.content.matchAll(regex); |
755 |
|
|
|
756 |
|
|
for (const match of matches) { |
757 |
|
|
if (match[3] && !allowedInviteCodes.includes(match[3])) { |
758 |
|
|
if (rule.allow_internal_invites && this.client.inviteTracker.invites.has(`${message.guildId!}_${match[3]}`)) { |
759 |
|
|
continue; |
760 |
|
|
} |
761 |
|
|
|
762 |
|
|
return { |
763 |
|
|
title: "Posted Invite(s)", |
764 |
|
|
fields: [ |
765 |
|
|
{ |
766 |
|
|
name: "Invite URL", |
767 |
|
|
value: `\`https://discord.gg/${match[3]}\`` |
768 |
|
|
} |
769 |
|
|
] |
770 |
|
|
}; |
771 |
|
|
} |
772 |
|
|
} |
773 |
|
|
|
774 |
|
|
return null; |
775 |
|
|
} |
776 |
|
|
|
777 |
|
|
async ruleRegexMustMatch(message: Message, rule: Extract<MessageRuleType, { type: "regex_must_match" }>) { |
778 |
|
|
if (message.content.trim() === "") { |
779 |
|
|
return null; |
780 |
|
|
} |
781 |
|
|
|
782 |
|
|
const { patterns } = rule; |
783 |
|
|
|
784 |
|
|
for (const pattern of patterns) { |
785 |
|
|
const regex = new RegExp( |
786 |
|
|
typeof pattern === "string" ? pattern : pattern[0], |
787 |
|
|
typeof pattern === "string" ? "gi" : pattern[1] |
788 |
|
|
); |
789 |
|
|
|
790 |
|
|
if (regex.test(message.content)) { |
791 |
|
|
return null; |
792 |
|
|
} |
793 |
|
|
} |
794 |
|
|
|
795 |
|
|
return { |
796 |
|
|
title: "Message did not match with the specified regex patterns" |
797 |
|
|
}; |
798 |
|
|
} |
799 |
|
|
|
800 |
|
|
async ruleRegexFilter(message: Message, rule: Extract<MessageRuleType, { type: "regex_filter" }>) { |
801 |
|
|
if (message.content.trim() === "") { |
802 |
|
|
return null; |
803 |
|
|
} |
804 |
|
|
|
805 |
|
|
const { patterns } = rule; |
806 |
|
|
|
807 |
|
|
for (const pattern of patterns) { |
808 |
|
|
const regex = new RegExp( |
809 |
|
|
typeof pattern === "string" ? pattern : pattern[0], |
810 |
|
|
typeof pattern === "string" ? "gi" : pattern[1] |
811 |
|
|
); |
812 |
|
|
|
813 |
|
|
if (regex.test(message.content)) { |
814 |
|
|
return { |
815 |
|
|
title: "Message matched with a blocked regex pattern", |
816 |
|
|
fields: [ |
817 |
|
|
{ |
818 |
|
|
name: "Pattern Info", |
819 |
|
|
value: `Pattern: \`${escapeInlineCode( |
820 |
|
|
escapeCodeBlock(typeof pattern === "string" ? pattern : pattern[0]) |
821 |
|
|
)}\`\nFlags: \`${escapeInlineCode( |
822 |
|
|
escapeCodeBlock(typeof pattern === "string" ? "gi" : pattern[1]) |
823 |
|
|
)}\`` |
824 |
|
|
} |
825 |
|
|
] |
826 |
|
|
}; |
827 |
|
|
} |
828 |
|
|
} |
829 |
|
|
|
830 |
|
|
return null; |
831 |
|
|
} |
832 |
|
|
|
833 |
|
|
async ruleRepeatedText(message: Message, rule: Extract<MessageRuleType, { type: "block_repeated_text" }>) { |
834 |
|
|
if (message.content.trim() === "") { |
835 |
|
|
return null; |
836 |
|
|
} |
837 |
|
|
|
838 |
|
|
if (new RegExp("(.+)\\1{" + rule.max_repeated_chars + ",}", "gm").test(message.content)) { |
839 |
|
|
return { |
840 |
|
|
title: "Repeated text detected", |
841 |
|
|
fields: [ |
842 |
|
|
{ |
843 |
|
|
name: "Description", |
844 |
|
|
value: "Too many repetitive characters were found" |
845 |
|
|
} |
846 |
|
|
] |
847 |
|
|
}; |
848 |
|
|
} else if (new RegExp("^(.+)(?: +\\1){" + rule.max_repeated_words + "}", "gm").test(message.content)) { |
849 |
|
|
return { |
850 |
|
|
title: "Repeated text detected", |
851 |
|
|
fields: [ |
852 |
|
|
{ |
853 |
|
|
name: "Description", |
854 |
|
|
value: "Too many repetitive words were found" |
855 |
|
|
} |
856 |
|
|
] |
857 |
|
|
}; |
858 |
|
|
} |
859 |
|
|
|
860 |
|
|
return null; |
861 |
|
|
} |
862 |
|
|
|
863 |
|
|
async ruleBlockMassMention(message: Message, rule: Extract<MessageRuleType, { type: "block_mass_mention" }>) { |
864 |
|
|
if (message.content.trim() === "") { |
865 |
|
|
return null; |
866 |
|
|
} |
867 |
|
|
|
868 |
|
|
let data = [...message.content.matchAll(new RegExp("<@[0-9]+>", "gm"))]; |
869 |
|
|
|
870 |
|
|
console.log("users", data); |
871 |
|
|
|
872 |
|
|
if (data.length >= rule.max_mentions || (rule.max_user_mentions > 0 && data.length >= rule.max_user_mentions)) { |
873 |
|
|
return { |
874 |
|
|
title: "Mass mentions detected", |
875 |
|
|
fields: [ |
876 |
|
|
{ |
877 |
|
|
name: "Description", |
878 |
|
|
value: "Too many users were mentioned" |
879 |
|
|
} |
880 |
|
|
] |
881 |
|
|
}; |
882 |
|
|
} |
883 |
|
|
|
884 |
|
|
data = [...message.content.matchAll(new RegExp("<@&[0-9]+>", "gm"))]; |
885 |
|
|
|
886 |
|
|
if (data.length >= rule.max_mentions || (rule.max_role_mentions > 0 && data.length >= rule.max_role_mentions)) { |
887 |
|
|
return { |
888 |
|
|
title: "Repeated text detected", |
889 |
|
|
fields: [ |
890 |
|
|
{ |
891 |
|
|
name: "Description", |
892 |
|
|
value: "Too many roles were mentioned" |
893 |
|
|
} |
894 |
|
|
] |
895 |
|
|
}; |
896 |
|
|
} |
897 |
|
|
|
898 |
|
|
return null; |
899 |
|
|
} |
900 |
|
|
} |