Parse URLS from ICS string fields #150
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Enhanced ScanIcs to extract URLs embedded in text fields (DESCRIPTION, SUMMARY, LOCATION) - a critical capability for detecting phishing attacks delivered via calendar invitations.
Previously, the scanner only extracted URLs from the dedicated iCalendar URL property. However, phishing campaigns commonly embed malicious URLs directly in the event description using patterns like Openhttps://malicious-site.com.
This change adds:
Describe testing procedures
Added net new tests
Tests include:
Sample output
{ "elapsed": 0.002724, "flags": [], "total": { "components": 5, "events": 1, "todos": 0, "journals": 0, "timezones": 1, "alarms": 0, "attachments": 0, "extracted_files": 0, "attendees": 2, "organizers": 1, "urls": 3 }, "calendars": [ { "prodid": "Microsoft Exchange Server 2010", "version": "2.0", "method": "REQUEST", "components": [ { "type": "VEVENT", "attendees": [ { "email": "[email protected]", "name": "ACME Corp IT Help Desk", "display_name": "ACME Corp IT Help Desk <[email protected]>", "role": "REQ-PARTICIPANT", "partstat": "NEEDS-ACTION", "rsvp": "TRUE" } ], "organizers": [ { "email": "AcmeCorp", "name": "ACME Corp Share-File", "display_name": "ACME Corp Share-File <AcmeCorp>" } ], "attachments": [], "urls": [ "http://www.linkedin.com/company/example", "https://malicious-phishing-site.lambda-url.us-east-1.on.aws/?e=dGVzdEBleGFtcGxlLmNvbQ==", "https://www.facebook.com/example" ], "summary": "Fw: Reminder - 2026 Annual Work Report ", "description": "Good morning,\n\nIs this phishing?...\nOpen<https://malicious-phishing-site.lambda-url.us-east-1.on.aws/?e=dGVzdEBleGFtcGxlLmNvbQ==>\n...", "uid": "test-uid-12345-phishing-ics", "dtstart": "2026-01-14T18:56:53+00:00", "dtend": "2026-01-14T18:56:53+00:00", "location": "Conference Room", "status": "CONFIRMED" } ] } ] }Checklist
[x] My code follows the style guidelines of this project
[x] I have performed a self-review of and tested my code
[x] I have commented my code, particularly in hard-to-understand areas
[x] I have made corresponding changes to the documentation
[x] My changes generate no new warnings