- High Performance: Built with napi-rs and VirusTotal/yara-x
- Async Support: First-class support for asynchronous scanning
- WASM Compilation: Compile rules to WebAssembly for portable execution
- Zero Dependencies: No external runtime dependencies
npm install @litko/yara-xReleases are built on GitHub-hosted runners and published to npm with Trusted Publishing and provenance. Native .node artifacts are also covered by GitHub artifact attestations.
Verify npm registry signatures and provenance attestations after install:
npm audit signaturesVerify downloaded native artifacts against GitHub attestations:
gh attestation verify path/to/yara-x.*.node -R cawalch/node-yara-ximport { compile } from "@litko/yara-x";
// Compile yara rules
const rules = compile(`
rule test_rule {
strings:
$a = "hello world"
condition:
$a
}
`);
// Scan a buffer
const buffer = Buffer.from("This is a test with hello world in it");
const matches = rules.scan(buffer);
// Process matches
if (matches.length > 0) {
console.log(`Found ${matches.length} matching rules:`);
matches.forEach((match) => {
console.log(`- Rule: ${match.ruleIdentifier}`);
match.matches.forEach((stringMatch) => {
console.log(
` * Match at offset ${stringMatch.offset}: ${stringMatch.data}`,
);
});
});
} else {
console.log("No matches found");
}import { fromFile, compile } from "@litko/yara-x";
import { readFileSync } from "fs";
// Load rules from a file
const rules = fromFile("./rules/malware_rules.yar");
try {
// Scan a file directly
const matches = rules.scanFile("./samples/suspicious_file.exe");
console.log(`Found ${matches.length} matching rules`);
} catch (error) {
console.error(`Scanning error: ${error.message}`);
}import { compile } from "@litko/yara-x";
async function scanLargeFile() {
const rules = compile(`rule large_file_rule {
strings:
$a = "sensitive data"
condition:
$a
}
`);
try {
// Scan a file asynchronously
const matches = await rules.scanFileAsync("./samples/large_file.bin");
console.log(`Found ${matches.length} matching rules`);
} catch (error) {
console.error(`Async scanning error: ${error.message}`);
}
}
scanLargeFile();import { compile } from "@litko/yara-x";
// Create a scanner with variables
const rules = compile(
`
rule variable_rule {
condition:
string_var contains "secret" and int_var > 10 and bool_var
}
`,
{
defineVariables: {
string_var: "this is a secret message",
int_var: 20,
bool_var: true,
},
},
);
// Scan with default variables
let matches = rules.scan(Buffer.from("test data"));
console.log(`Matches with default variables: ${matches.length}`);
// Override variables at scan time
matches = rules.scan(Buffer.from("test data"), {
string_var: "no secrets here",
int_var: 5,
bool_var: false,
});
console.log(`Matches with overridden variables: ${matches.length}`);import { compile, create } from "@litko/yara-x";
// Compile a source into a YARA namespace
const rules = compile(
`
rule namespaced_rule {
strings:
$a = "namespace test"
condition:
$a
}
`,
{ namespace: "alpha" },
);
const [match] = rules.scan(Buffer.from("namespace test"));
console.log(match.namespace); // "alpha"
// Add sources incrementally into separate namespaces
const scanner = create();
scanner.addRuleSource('rule shared { strings: $a = "one" condition: $a }', "one");
scanner.addRuleSource('rule shared { strings: $a = "two" condition: $a }', "two");import { compile, compileToWasm } from "@litko/yara-x";
// Compile rules to WASM
const rule = `
rule wasm_test {
strings:
$a = "compile to wasm"
condition:
$a
}
`;
// Static compilation
compileToWasm(rule, "./output/rules.wasm");
// Or from a compiled rules instance
const compiledRules = compile(rule);
compiledRules.emitWasmFile("./output/instance_rules.wasm");
// Async compilation
await compiledRules.emitWasmFileAsync("./output/async_rules.wasm");import { create } from "@litko/yara-x";
// Create an empty scanner
const scanner = create();
// Add rules incrementally
scanner.addRuleSource(`
wrule first_rule {
strings:
$a = "first pattern"
condition:
$a
}
`);
// Add rules from a file
scanner.addRuleFile("./rules/more_rules.yar");
// Add another rule
scanner.addRuleSource(`
rule another_rule {
strings:
$a = "another pattern"
condition:
$a
}
`);
// Now scan with all the rules
const matches = scanner.scan(Buffer.from("test data with first pattern"));import { validate } from "@litko/yara-x";
// Validate rules without executing them
const result = validate(`
rule valid_rule {
strings:
$a = "valid"
condition:
$a
}
`);
if (result.errors.length === 0) {
console.log("Rules are valid!");
} else {
console.error("Rule validation failed:");
result.errors.forEach((error) => {
console.error(`- ${error.code}: ${error.message}`);
});
}import { compile } from "@litko/yara-x";
// Create a scanner with advanced options
const rules = compile(
`
rule advanced_rule {
strings:
$a = /hello[[:space:]]world/ // Using POSIX character class
condition:
$a and test_var > 10
}
`,
{
// Define variables
defineVariables: {
test_var: "20",
},
// Compile these rules into a YARA namespace
namespace: "research",
// Enable relaxed regular expression syntax
relaxedReSyntax: true,
// Enable condition optimization
conditionOptimization: true,
// Ignore specific modules
ignoreModules: ["pe"],
// Error on potentially slow patterns
errorOnSlowPattern: true,
// Error on potentially slow loops
errorOnSlowLoop: true,
// Specify directories for include statements (v1.5.0+)
includeDirectories: ["./rules/includes", "./rules/common"],
// Enable or disable include statements (v1.5.0+)
enableIncludes: true,
},
);import { compile } from "@litko/yara-x";
try {
// This will throw an error due to invalid syntax
const rules = compile(`
rule invalid_rule {
strings:
$a = "unclosed string
condition:
$a
}
`);
} catch (error) {
console.error(`Compilation error: ${error.message}`);
// Output: Compilation error: error[E001]: syntax error
// --> line:3:28
// |
// 3 | $a = "unclosed string
// | ^ expecting `"`, found end of file
// 278: }
}import { compile } from "@litko/yara-x";
const rules = compile(`
rule test_rule {
condition:
true
}
`);
try {
// This will throw if the file doesn't exist
rules.scanFile("/path/to/nonexistent/file.bin");
} catch (error) {
console.error(`Scanning error: ${error.message}`);
// Output: Scanning error: Error reading file: No such file or directory (os error 2)
}import { compile, compileToWasm } from "@litko/yara-x";
async function handleAsyncErrors() {
const rules = compile(`
rule test_rule {
condition:
true
}
`);
try {
await rules.scanFileAsync("/path/to/nonexistent/file.bin");
} catch (error) {
console.error(`Async scanning error: ${error.message}`);
}
try {
await compileToWasm(
"rule test { condition: true }",
"/invalid/path/rules.wasm",
);
} catch (error) {
console.error(`WASM compilation error: ${error.message}`);
}
}
handleAsyncErrors();import { compile } from "@litko/yara-x";
// Create a scanner with a rule that generates warnings
const rules = compile(`
rule warning_rule {
strings:
$a = "unused string"
condition:
true // Warning: invariant expression
}
`);
// Get and display warnings
const warnings = rules.getWarnings();
if (warnings.length > 0) {
console.log("Compiler warnings:");
warnings.forEach((warning) => {
console.log(`- ${warning.code}: ${warning.message}`);
});
}import { compile } from "@litko/yara-x";
// Create a main rule that includes other rules
const mainRule = `
include "common/strings.yar"
include "malware/pe_patterns.yar"
rule main_detection {
condition:
common_string_rule or pe_malware_rule
}
`;
// Compile with include directories
const rules = compile(mainRule, {
includeDirectories: [
"./rules", // Base directory
"./rules/common", // Additional include path
"./rules/malware", // Another include path
],
});
// Scan as usual
const matches = rules.scan(Buffer.from("test data"));Control scanning behavior for better performance or safety.
Prevent excessive memory usage by limiting the number of matches per pattern:
import { compile } from "@litko/yara-x";
const rules = compile(`
rule find_pattern {
strings:
$a = "pattern"
condition:
$a
}
`);
// Limit to 1000 matches per pattern
rules.setMaxMatchesPerPattern(1000);
// Scan data with many occurrences
const data = Buffer.from("pattern ".repeat(10000));
const matches = rules.scan(data);
// Will only return up to 1000 matches per pattern
console.log(`Found ${matches[0].matches.length} matches (limited to 1000)`);Control whether to use memory-mapped files for scanning:
import { compile } from "@litko/yara-x";
const rules = compile(`
rule test {
strings:
$a = "test"
condition:
$a
}
`);
// Disable memory-mapped files for safer scanning
// (slower but safer for untrusted files)
rules.setUseMmap(false);
// Scan file without memory mapping
const matches = rules.scanFile("./sample.bin");Set a timeout for scan operations to prevent runaway scans:
import { compile } from "@litko/yara-x";
const rules = compile(`
rule slow_rule {
strings:
$a = /(.+)*\1/
condition:
$a
}
`);
// Set a 5-second timeout
rules.setTimeout(5000);
const matches = rules.scan(Buffer.from("test data"));You can retrieve surrounding bytes around a match by setting the match context size. This is useful for analyzing matches within their broader context.
import { compile } from "@litko/yara-x";
const rules = compile(`
rule context_rule {
strings:
$a = "secret"
condition:
$a
}
`);
// Request 10 bytes of context before and after the match
rules.setMatchContextSize(10);
const data = Buffer.from("this is a top secret document containing sensitive info");
const matches = rules.scan(data);
if (matches.length > 0) {
matches[0].matches.forEach(match => {
console.log(`Match: ${match.data}`);
// "secret"
console.log(`Context: ${match.contextData}`);
// " a top secret document"
console.log(`Match offset within context: ${match.contextMatchOffset}`);
});
}node-yara-x delivers exceptional performance through intelligent scanner caching and optimized Rust implementation.
Test Environment: MacBook Pro M3 Max, 36GB RAM, Release build with LTO Methodology: Statistical analysis across multiple iterations with percentile reporting
| Rule Type | Mean | p50 | p95 | p99 |
|---|---|---|---|---|
| Simple Rule | 2.43ms | 2.41ms | 2.87ms | 3.11ms |
| Complex Rule | 2.57ms | 2.52ms | 2.96ms | 3.06ms |
| Regex Rule | 7.57ms | 7.47ms | 8.29ms | 8.70ms |
| Multiple Rules | 2.05ms | 2.03ms | 2.24ms | 2.42ms |
| Data Size | Rule Type | Mean | Throughput |
|---|---|---|---|
| 64 bytes | Simple | 3μs | ~21 MB/s |
| 100KB | Simple | 6μs | ~16.7 GB/s |
| 100KB | Complex | 73μs | ~1.4 GB/s |
| 100KB | Regex | 7μs | ~14.3 GB/s |
| 100KB | Multiple Rules | 73μs | ~1.4 GB/s |
| 10MB | Simple | 204μs | ~49 GB/s |
| Feature | Mean | Notes |
|---|---|---|
| Variable Scanning | 1μs | Pre-compiled variables |
| Runtime Variables | 2μs | Variables set at scan time |
| Async Scanning | 11μs | Non-blocking operations |
compile(ruleSource: string, options?: CompilerOptions)- Compiles yara rules from a string.compileToWasm(ruleSource: string, outputPath: string, options?: CompilerOptions)- Compiles yara rules from a string to WASM file.compileFileToWasm(rulesPath: string, outputPath: string, options?: CompilerOptions)- Compiles yara rules from a file to WASM file.validate(ruleSource: string, options?: CompilerOptions)- Validates yara rules without executing them.create()- Creates an empty rules scanner to add rules incrementally.fromFile(rulePath: string, options?: CompilerOptions)- Compiles yara rules from a file.
getWarnings()- Get compiler warnings.scan(data: Buffer, variables?: Record<string, string | number | boolean>)- Scan a buffer.scanFile(filePath: string, variables?: Record<string, string | number | boolean>)- Scan a file.scanAsync(data: Buffer, variables?: Record<string, object | undefined | null>)- Scan a buffer asynchronously.scanFileAsync(filePath: string, variables?: Record<string, object | undefined | null>)- Scan a file asynchronously.emitWasmFile(filePath: string)- Emit compiled rules to WASM file synchronously.emitWasmFileAsync(filePath: string)- Emit compiled rules to WASM file asynchronously.addRuleSource(rules: string)- Add rules from a string to an existing scanner.addRuleFile(filePath: string)- Add rules from a file to an existing scanner.defineVariable(name: string, value: string)- Define a variable for the YARA compiler.setMaxMatchesPerPattern(maxMatches: number)- Set the maximum number of matches per pattern.setUseMmap(useMmap: boolean)- Enable or disable memory-mapped files for scanning.setTimeout(timeoutMs: number)- Set the scan timeout in milliseconds.setMatchContextSize(size: number)- Set the number of context bytes to retrieve around the matched string.
defineVariables?: object- Define global variables for the YARA rules.ignoreModules?: string[]- List of module names to ignore during compilation.bannedModules?: BannedModule[]- List of banned modules that cannot be used.features?: string[]- List of features to enable for the YARA rules.relaxedReSyntax?: boolean- Use relaxed regular expression syntax.conditionOptimization?: boolean- Optimize conditions in the YARA rules.errorOnSlowPattern?: boolean- Raise an error on slow patterns.errorOnSlowLoop?: boolean- Raise an error on slow loops.includeDirectories?: string[]- (v1.5.0+) Directories where the compiler should look for included files.enableIncludes?: boolean- (v1.5.0+) Enable or disable include statements in YARA rules.
This project incorporates code under two distinct licenses:
- MIT License:
- The node.js bindings and other code specific to this module are licensed under the MIT license.
- See
LICENSE-MITfor the full text.
- BSD-3-Clause License:
- The included yara-x library is licensed under the BSD-3-Clause license.
- See
LICENSE-BSD-3-Clausefor the full text.