@bryan-thompson/inspector-assessment 1.2.0 → 1.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -89,7 +89,7 @@ Our enhanced fork maintains high code quality standards with comprehensive testi
89
89
  - Context-aware security testing with zero false positives
90
90
  - Realistic test data generation and boundary testing
91
91
  - **Total Project Tests**: 582 tests including assessment modules, UI components, and core inspector functionality
92
- - All tests updated to reflect comprehensive mode (18 security patterns × 3 payloads per tool)
92
+ - All tests updated to reflect focused backend testing (8 security patterns × 3 payloads per tool)
93
93
  - Test files: `client/src/services/__tests__/` and `client/src/services/assessment/__tests__/`
94
94
  - **Code Quality**: ✅ Production code uses proper TypeScript types
95
95
  - 229 lint issues remaining (down 18% from 280 after recent cleanup)
@@ -205,7 +205,7 @@ Response: "The answer is 4"
205
205
 
206
206
  ### 5. Streamlined Assessment Architecture
207
207
 
208
- **Based on Real-World Testing**: Our methodology has been validated through systematic testing using the taskmanager MCP server as a case study (11 tools tested with 17 security injection patterns, detailed in [ASSESSMENT_METHODOLOGY.md](docs/ASSESSMENT_METHODOLOGY.md)).
208
+ **Based on Real-World Testing**: Our methodology has been validated through systematic testing using the taskmanager MCP server as a case study (11 tools tested with 8 backend security patterns, detailed in [ASSESSMENT_METHODOLOGY.md](docs/ASSESSMENT_METHODOLOGY.md)).
209
209
 
210
210
  **Six Core Assessors** aligned with Anthropic's MCP directory submission requirements:
211
211
 
@@ -480,7 +480,11 @@ These 208 tests specifically validate:
480
480
  **Test Categories**:
481
481
 
482
482
  - **Functionality Assessment**: Multi-scenario validation, progressive complexity (2 levels: minimal → simple), business logic error detection
483
- - **Security Assessment**: 8 injection patterns (direct command, role override, data exfiltration, SQL, XSS, path traversal, LDAP, nested)
483
+ - **Security Assessment**: 8 backend-focused patterns
484
+ - **Critical Injection (3)**: Command Injection, SQL Injection, Path Traversal
485
+ - **Input Validation (3)**: Type Safety, Boundary Testing, Required Fields
486
+ - **Protocol Compliance (2)**: MCP Error Format, Timeout Handling
487
+ - **Scope**: Tests backend API security only (not LLM prompt injection)
484
488
  - **Documentation Analysis**: README structure validation, code example extraction, parameter documentation checks
485
489
  - **Error Handling**: MCP protocol compliance (error codes -32600 to -32603), validation quality scoring, timeout handling
486
490
  - **Usability Evaluation**: Naming convention analysis, parameter clarity assessment, schema completeness validation
@@ -491,7 +495,7 @@ These 208 tests specifically validate:
491
495
  - **Test Files**: Located in `client/src/services/__tests__/` and `client/src/services/assessment/__tests__/`
492
496
  - **Recent Improvements**:
493
497
  - Achieved 100% test pass rate (582 passing, 0 failing) - 2025-10-11
494
- - Updated all tests for comprehensive mode (18 security patterns × 3 payloads) - 2025-10-11
498
+ - Updated all tests for focused backend testing (8 security patterns × 3 payloads) - 2025-10-12
495
499
  - Fixed all failing tests after upstream sync - 2025-10-04
496
500
  - Added boundary testing optimization validation - 2025-10-05
497
501
 
@@ -992,7 +996,7 @@ All performance claims in this README are backed by implementation analysis and
992
996
  | ----------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------- |
993
997
  | Progressive complexity testing (2 levels) | Implementation in [TestScenarioEngine.ts](client/src/services/assessment/TestScenarioEngine.ts) | Measured |
994
998
  | 50% faster comprehensive testing | Analysis in [PHASE1_OPTIMIZATION_COMPLETED.md](docs/PHASE1_OPTIMIZATION_COMPLETED.md) and [COMPREHENSIVE_TESTING_ANALYSIS.md](docs/COMPREHENSIVE_TESTING_ANALYSIS.md) | Measured |
995
- | 17 security injection patterns | Implementation in [ASSESSMENT_METHODOLOGY.md](docs/ASSESSMENT_METHODOLOGY.md#eight-security-test-patterns) and assessmentTypes.ts | Measured |
999
+ | 8 backend security patterns | Implementation in [securityPatterns.ts](client/src/lib/securityPatterns.ts) - focused on API security, not LLM behaviors | Measured |
996
1000
  | Zero false positives in security testing | Context-aware reflection detection in [SecurityAssessor.ts](client/src/services/assessment/modules/SecurityAssessor.ts) | Validated |
997
1001
  | Context-aware test data generation | Implementation in [TestDataGenerator.ts](client/src/services/assessment/TestDataGenerator.ts) | Measured |
998
1002
  | MCP error code recognition | Implementation in [ResponseValidator.ts](client/src/services/assessment/ResponseValidator.ts) | Measured |
@@ -1,4 +1,4 @@
1
- import { u as useToast, r as reactExports, j as jsxRuntimeExports, p as parseOAuthCallbackParams, g as generateOAuthErrorDescription, S as SESSION_KEYS, I as InspectorOAuthClientProvider, a as auth } from "./index-CkSRacMw.js";
1
+ import { u as useToast, r as reactExports, j as jsxRuntimeExports, p as parseOAuthCallbackParams, g as generateOAuthErrorDescription, S as SESSION_KEYS, I as InspectorOAuthClientProvider, a as auth } from "./index-D12b6zCd.js";
2
2
  const OAuthCallback = ({ onConnect }) => {
3
3
  const { toast } = useToast();
4
4
  const hasProcessedRef = reactExports.useRef(false);
@@ -1,4 +1,4 @@
1
- import { r as reactExports, S as SESSION_KEYS, p as parseOAuthCallbackParams, j as jsxRuntimeExports, g as generateOAuthErrorDescription } from "./index-CkSRacMw.js";
1
+ import { r as reactExports, S as SESSION_KEYS, p as parseOAuthCallbackParams, j as jsxRuntimeExports, g as generateOAuthErrorDescription } from "./index-D12b6zCd.js";
2
2
  const OAuthDebugCallback = ({ onConnect }) => {
3
3
  reactExports.useEffect(() => {
4
4
  let isProcessed = false;