@build-astron-co/nimbus 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -0
- package/README.md +628 -0
- package/bin/nimbus +38 -0
- package/package.json +80 -0
- package/src/__tests__/app.test.ts +76 -0
- package/src/__tests__/audit.test.ts +877 -0
- package/src/__tests__/circuit-breaker.test.ts +116 -0
- package/src/__tests__/cli-run.test.ts +115 -0
- package/src/__tests__/context-manager.test.ts +502 -0
- package/src/__tests__/context.test.ts +242 -0
- package/src/__tests__/enterprise.test.ts +401 -0
- package/src/__tests__/generator.test.ts +433 -0
- package/src/__tests__/hooks.test.ts +582 -0
- package/src/__tests__/init.test.ts +436 -0
- package/src/__tests__/intent-parser.test.ts +229 -0
- package/src/__tests__/llm-router.test.ts +209 -0
- package/src/__tests__/lsp.test.ts +293 -0
- package/src/__tests__/modes.test.ts +336 -0
- package/src/__tests__/permissions.test.ts +338 -0
- package/src/__tests__/serve.test.ts +275 -0
- package/src/__tests__/sessions.test.ts +227 -0
- package/src/__tests__/sharing.test.ts +288 -0
- package/src/__tests__/snapshots.test.ts +581 -0
- package/src/__tests__/state-db.test.ts +334 -0
- package/src/__tests__/stream-with-tools.test.ts +732 -0
- package/src/__tests__/subagents.test.ts +176 -0
- package/src/__tests__/system-prompt.test.ts +169 -0
- package/src/__tests__/tool-converter.test.ts +256 -0
- package/src/__tests__/tool-schemas.test.ts +397 -0
- package/src/__tests__/tools.test.ts +143 -0
- package/src/__tests__/version.test.ts +49 -0
- package/src/agent/compaction-agent.ts +227 -0
- package/src/agent/context-manager.ts +435 -0
- package/src/agent/context.ts +427 -0
- package/src/agent/deploy-preview.ts +426 -0
- package/src/agent/index.ts +68 -0
- package/src/agent/loop.ts +717 -0
- package/src/agent/modes.ts +429 -0
- package/src/agent/permissions.ts +466 -0
- package/src/agent/subagents/base.ts +116 -0
- package/src/agent/subagents/cost.ts +51 -0
- package/src/agent/subagents/explore.ts +42 -0
- package/src/agent/subagents/general.ts +54 -0
- package/src/agent/subagents/index.ts +102 -0
- package/src/agent/subagents/infra.ts +59 -0
- package/src/agent/subagents/security.ts +69 -0
- package/src/agent/system-prompt.ts +436 -0
- package/src/app.ts +122 -0
- package/src/audit/activity-log.ts +290 -0
- package/src/audit/compliance-checker.ts +540 -0
- package/src/audit/cost-tracker.ts +318 -0
- package/src/audit/index.ts +23 -0
- package/src/audit/security-scanner.ts +596 -0
- package/src/auth/guard.ts +75 -0
- package/src/auth/index.ts +56 -0
- package/src/auth/oauth.ts +455 -0
- package/src/auth/providers.ts +470 -0
- package/src/auth/sso.ts +113 -0
- package/src/auth/store.ts +505 -0
- package/src/auth/types.ts +187 -0
- package/src/build.ts +141 -0
- package/src/cli/index.ts +16 -0
- package/src/cli/init.ts +854 -0
- package/src/cli/openapi-spec.ts +356 -0
- package/src/cli/run.ts +237 -0
- package/src/cli/serve-auth.ts +80 -0
- package/src/cli/serve.ts +462 -0
- package/src/cli/web.ts +67 -0
- package/src/cli.ts +1417 -0
- package/src/clients/core-engine-client.ts +227 -0
- package/src/clients/enterprise-client.ts +334 -0
- package/src/clients/generator-client.ts +351 -0
- package/src/clients/git-client.ts +627 -0
- package/src/clients/github-client.ts +410 -0
- package/src/clients/helm-client.ts +504 -0
- package/src/clients/index.ts +80 -0
- package/src/clients/k8s-client.ts +497 -0
- package/src/clients/llm-client.ts +161 -0
- package/src/clients/rest-client.ts +130 -0
- package/src/clients/service-discovery.ts +33 -0
- package/src/clients/terraform-client.ts +482 -0
- package/src/clients/tools-client.ts +1843 -0
- package/src/clients/ws-client.ts +115 -0
- package/src/commands/analyze/index.ts +352 -0
- package/src/commands/apply/helm.ts +473 -0
- package/src/commands/apply/index.ts +213 -0
- package/src/commands/apply/k8s.ts +454 -0
- package/src/commands/apply/terraform.ts +582 -0
- package/src/commands/ask.ts +167 -0
- package/src/commands/audit/index.ts +238 -0
- package/src/commands/auth-cloud.ts +294 -0
- package/src/commands/auth-list.ts +134 -0
- package/src/commands/auth-profile.ts +121 -0
- package/src/commands/auth-status.ts +141 -0
- package/src/commands/aws/ec2.ts +501 -0
- package/src/commands/aws/iam.ts +397 -0
- package/src/commands/aws/index.ts +133 -0
- package/src/commands/aws/lambda.ts +396 -0
- package/src/commands/aws/rds.ts +439 -0
- package/src/commands/aws/s3.ts +439 -0
- package/src/commands/aws/vpc.ts +393 -0
- package/src/commands/aws-discover.ts +649 -0
- package/src/commands/aws-terraform.ts +805 -0
- package/src/commands/azure/aks.ts +376 -0
- package/src/commands/azure/functions.ts +253 -0
- package/src/commands/azure/index.ts +116 -0
- package/src/commands/azure/storage.ts +478 -0
- package/src/commands/azure/vm.ts +355 -0
- package/src/commands/billing/index.ts +256 -0
- package/src/commands/chat.ts +314 -0
- package/src/commands/config.ts +346 -0
- package/src/commands/cost/cloud-cost-estimator.ts +266 -0
- package/src/commands/cost/estimator.ts +79 -0
- package/src/commands/cost/index.ts +594 -0
- package/src/commands/cost/parsers/terraform.ts +273 -0
- package/src/commands/cost/parsers/types.ts +25 -0
- package/src/commands/cost/pricing/aws.ts +544 -0
- package/src/commands/cost/pricing/azure.ts +499 -0
- package/src/commands/cost/pricing/gcp.ts +396 -0
- package/src/commands/cost/pricing/index.ts +40 -0
- package/src/commands/demo.ts +250 -0
- package/src/commands/doctor.ts +794 -0
- package/src/commands/drift/index.ts +439 -0
- package/src/commands/explain.ts +277 -0
- package/src/commands/feedback.ts +389 -0
- package/src/commands/fix.ts +324 -0
- package/src/commands/fs/index.ts +402 -0
- package/src/commands/gcp/compute.ts +325 -0
- package/src/commands/gcp/functions.ts +271 -0
- package/src/commands/gcp/gke.ts +438 -0
- package/src/commands/gcp/iam.ts +344 -0
- package/src/commands/gcp/index.ts +129 -0
- package/src/commands/gcp/storage.ts +284 -0
- package/src/commands/generate-helm.ts +1249 -0
- package/src/commands/generate-k8s.ts +1560 -0
- package/src/commands/generate-terraform.ts +1460 -0
- package/src/commands/gh/index.ts +863 -0
- package/src/commands/git/index.ts +1343 -0
- package/src/commands/helm/index.ts +1126 -0
- package/src/commands/help.ts +539 -0
- package/src/commands/history.ts +142 -0
- package/src/commands/import.ts +868 -0
- package/src/commands/index.ts +367 -0
- package/src/commands/init.ts +1046 -0
- package/src/commands/k8s/index.ts +1137 -0
- package/src/commands/login.ts +631 -0
- package/src/commands/logout.ts +83 -0
- package/src/commands/onboarding.ts +228 -0
- package/src/commands/plan/display.ts +279 -0
- package/src/commands/plan/index.ts +599 -0
- package/src/commands/preview.ts +452 -0
- package/src/commands/questionnaire.ts +1270 -0
- package/src/commands/resume.ts +55 -0
- package/src/commands/team/index.ts +346 -0
- package/src/commands/template.ts +232 -0
- package/src/commands/tf/index.ts +1034 -0
- package/src/commands/upgrade.ts +550 -0
- package/src/commands/usage/index.ts +134 -0
- package/src/commands/version.ts +170 -0
- package/src/compat/index.ts +2 -0
- package/src/compat/runtime.ts +12 -0
- package/src/compat/sqlite.ts +107 -0
- package/src/config/index.ts +17 -0
- package/src/config/manager.ts +530 -0
- package/src/config/safety-policy.ts +358 -0
- package/src/config/schema.ts +125 -0
- package/src/config/types.ts +527 -0
- package/src/context/context-db.ts +199 -0
- package/src/demo/index.ts +349 -0
- package/src/demo/scenarios/full-journey.ts +229 -0
- package/src/demo/scenarios/getting-started.ts +127 -0
- package/src/demo/scenarios/helm-release.ts +341 -0
- package/src/demo/scenarios/k8s-deployment.ts +194 -0
- package/src/demo/scenarios/terraform-vpc.ts +170 -0
- package/src/demo/types.ts +92 -0
- package/src/engine/cost-estimator.ts +438 -0
- package/src/engine/diagram-generator.ts +256 -0
- package/src/engine/drift-detector.ts +902 -0
- package/src/engine/executor.ts +1035 -0
- package/src/engine/index.ts +76 -0
- package/src/engine/orchestrator.ts +636 -0
- package/src/engine/planner.ts +720 -0
- package/src/engine/safety.ts +743 -0
- package/src/engine/verifier.ts +770 -0
- package/src/enterprise/audit.ts +348 -0
- package/src/enterprise/auth.ts +270 -0
- package/src/enterprise/billing.ts +822 -0
- package/src/enterprise/index.ts +17 -0
- package/src/enterprise/teams.ts +443 -0
- package/src/generator/best-practices.ts +1608 -0
- package/src/generator/helm.ts +630 -0
- package/src/generator/index.ts +37 -0
- package/src/generator/intent-parser.ts +514 -0
- package/src/generator/kubernetes.ts +976 -0
- package/src/generator/terraform.ts +1867 -0
- package/src/history/index.ts +8 -0
- package/src/history/manager.ts +322 -0
- package/src/history/types.ts +34 -0
- package/src/hooks/config.ts +432 -0
- package/src/hooks/engine.ts +391 -0
- package/src/hooks/index.ts +4 -0
- package/src/llm/auth-bridge.ts +198 -0
- package/src/llm/circuit-breaker.ts +140 -0
- package/src/llm/config-loader.ts +201 -0
- package/src/llm/cost-calculator.ts +171 -0
- package/src/llm/index.ts +8 -0
- package/src/llm/model-aliases.ts +115 -0
- package/src/llm/provider-registry.ts +63 -0
- package/src/llm/providers/anthropic.ts +433 -0
- package/src/llm/providers/bedrock.ts +477 -0
- package/src/llm/providers/google.ts +405 -0
- package/src/llm/providers/ollama.ts +767 -0
- package/src/llm/providers/openai-compatible.ts +340 -0
- package/src/llm/providers/openai.ts +328 -0
- package/src/llm/providers/openrouter.ts +338 -0
- package/src/llm/router.ts +1035 -0
- package/src/llm/types.ts +232 -0
- package/src/lsp/client.ts +298 -0
- package/src/lsp/languages.ts +116 -0
- package/src/lsp/manager.ts +278 -0
- package/src/mcp/client.ts +402 -0
- package/src/mcp/index.ts +5 -0
- package/src/mcp/manager.ts +133 -0
- package/src/nimbus.ts +214 -0
- package/src/plugins/index.ts +27 -0
- package/src/plugins/loader.ts +334 -0
- package/src/plugins/manager.ts +376 -0
- package/src/plugins/types.ts +284 -0
- package/src/scanners/cicd-scanner.ts +258 -0
- package/src/scanners/cloud-scanner.ts +466 -0
- package/src/scanners/framework-scanner.ts +469 -0
- package/src/scanners/iac-scanner.ts +388 -0
- package/src/scanners/index.ts +539 -0
- package/src/scanners/language-scanner.ts +276 -0
- package/src/scanners/package-manager-scanner.ts +277 -0
- package/src/scanners/types.ts +172 -0
- package/src/sessions/manager.ts +365 -0
- package/src/sessions/types.ts +44 -0
- package/src/sharing/sync.ts +296 -0
- package/src/sharing/viewer.ts +97 -0
- package/src/snapshots/index.ts +2 -0
- package/src/snapshots/manager.ts +530 -0
- package/src/state/artifacts.ts +147 -0
- package/src/state/audit.ts +137 -0
- package/src/state/billing.ts +240 -0
- package/src/state/checkpoints.ts +117 -0
- package/src/state/config.ts +67 -0
- package/src/state/conversations.ts +14 -0
- package/src/state/credentials.ts +154 -0
- package/src/state/db.ts +58 -0
- package/src/state/index.ts +26 -0
- package/src/state/messages.ts +115 -0
- package/src/state/projects.ts +123 -0
- package/src/state/schema.ts +236 -0
- package/src/state/sessions.ts +147 -0
- package/src/state/teams.ts +200 -0
- package/src/telemetry.ts +108 -0
- package/src/tools/aws-ops.ts +952 -0
- package/src/tools/azure-ops.ts +579 -0
- package/src/tools/file-ops.ts +593 -0
- package/src/tools/gcp-ops.ts +625 -0
- package/src/tools/git-ops.ts +773 -0
- package/src/tools/github-ops.ts +799 -0
- package/src/tools/helm-ops.ts +943 -0
- package/src/tools/index.ts +17 -0
- package/src/tools/k8s-ops.ts +819 -0
- package/src/tools/schemas/converter.ts +184 -0
- package/src/tools/schemas/devops.ts +612 -0
- package/src/tools/schemas/index.ts +73 -0
- package/src/tools/schemas/standard.ts +1144 -0
- package/src/tools/schemas/types.ts +705 -0
- package/src/tools/terraform-ops.ts +862 -0
- package/src/types/ambient.d.ts +193 -0
- package/src/types/config.ts +83 -0
- package/src/types/drift.ts +116 -0
- package/src/types/enterprise.ts +335 -0
- package/src/types/index.ts +20 -0
- package/src/types/plan.ts +44 -0
- package/src/types/request.ts +65 -0
- package/src/types/response.ts +54 -0
- package/src/types/service.ts +51 -0
- package/src/ui/App.tsx +997 -0
- package/src/ui/DeployPreview.tsx +169 -0
- package/src/ui/Header.tsx +68 -0
- package/src/ui/InputBox.tsx +350 -0
- package/src/ui/MessageList.tsx +585 -0
- package/src/ui/PermissionPrompt.tsx +151 -0
- package/src/ui/StatusBar.tsx +158 -0
- package/src/ui/ToolCallDisplay.tsx +409 -0
- package/src/ui/chat-ui.ts +853 -0
- package/src/ui/index.ts +33 -0
- package/src/ui/ink/index.ts +711 -0
- package/src/ui/streaming.ts +176 -0
- package/src/ui/types.ts +57 -0
- package/src/utils/analytics.ts +72 -0
- package/src/utils/cost-warning.ts +27 -0
- package/src/utils/env.ts +46 -0
- package/src/utils/errors.ts +69 -0
- package/src/utils/event-bus.ts +38 -0
- package/src/utils/index.ts +24 -0
- package/src/utils/logger.ts +171 -0
- package/src/utils/rate-limiter.ts +121 -0
- package/src/utils/service-auth.ts +49 -0
- package/src/utils/validation.ts +53 -0
- package/src/version.ts +4 -0
- package/src/watcher/index.ts +163 -0
- package/src/wizard/approval.ts +383 -0
- package/src/wizard/index.ts +25 -0
- package/src/wizard/prompts.ts +338 -0
- package/src/wizard/types.ts +171 -0
- package/src/wizard/ui.ts +556 -0
- package/src/wizard/wizard.ts +304 -0
- package/tsconfig.json +24 -0
|
@@ -0,0 +1,596 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Security Scanner - Scan codebase for common security issues.
|
|
3
|
+
*
|
|
4
|
+
* Walks a directory tree, applies regex-based patterns to detect hardcoded
|
|
5
|
+
* secrets, open security groups, public S3 buckets, missing encryption,
|
|
6
|
+
* exposed ports, SQL injection risks, and insecure HTTP URLs.
|
|
7
|
+
*
|
|
8
|
+
* Binary files and configurable exclusion directories are skipped.
|
|
9
|
+
* Results are returned sorted by severity (CRITICAL first).
|
|
10
|
+
*/
|
|
11
|
+
|
|
12
|
+
import * as fs from 'node:fs';
|
|
13
|
+
import * as path from 'node:path';
|
|
14
|
+
|
|
15
|
+
// ---------------------------------------------------------------------------
|
|
16
|
+
// Types
|
|
17
|
+
// ---------------------------------------------------------------------------
|
|
18
|
+
|
|
19
|
+
/** Severity level for a security finding */
|
|
20
|
+
export type Severity = 'CRITICAL' | 'HIGH' | 'MEDIUM' | 'LOW';
|
|
21
|
+
|
|
22
|
+
/** A single security finding produced by the scanner */
|
|
23
|
+
export interface SecurityFinding {
|
|
24
|
+
/** Unique identifier for this finding */
|
|
25
|
+
id: string;
|
|
26
|
+
/** Severity level */
|
|
27
|
+
severity: Severity;
|
|
28
|
+
/** Short title describing the issue */
|
|
29
|
+
title: string;
|
|
30
|
+
/** Detailed description of the issue */
|
|
31
|
+
description: string;
|
|
32
|
+
/** File where the issue was found */
|
|
33
|
+
file?: string;
|
|
34
|
+
/** Line number within the file */
|
|
35
|
+
line?: number;
|
|
36
|
+
/** Actionable recommendation to fix the issue */
|
|
37
|
+
recommendation: string;
|
|
38
|
+
}
|
|
39
|
+
|
|
40
|
+
/** Aggregate result of a security scan */
|
|
41
|
+
export interface ScanResult {
|
|
42
|
+
/** All findings discovered during the scan */
|
|
43
|
+
findings: SecurityFinding[];
|
|
44
|
+
/** Total number of files inspected */
|
|
45
|
+
scannedFiles: number;
|
|
46
|
+
/** Wall-clock duration of the scan in milliseconds */
|
|
47
|
+
scanDuration: number;
|
|
48
|
+
/** Timestamp when the scan completed */
|
|
49
|
+
timestamp: Date;
|
|
50
|
+
}
|
|
51
|
+
|
|
52
|
+
/** Options controlling which files and directories are scanned */
|
|
53
|
+
export interface ScanOptions {
|
|
54
|
+
/** Root directory to scan */
|
|
55
|
+
dir: string;
|
|
56
|
+
/** File glob patterns to include (e.g. ['*.ts', '*.tf']). If omitted, all text files are scanned. */
|
|
57
|
+
patterns?: string[];
|
|
58
|
+
/** Directory names to skip (defaults to node_modules, .git, dist) */
|
|
59
|
+
exclude?: string[];
|
|
60
|
+
/** Maximum number of files to scan (defaults to 1000) */
|
|
61
|
+
maxFiles?: number;
|
|
62
|
+
}
|
|
63
|
+
|
|
64
|
+
// ---------------------------------------------------------------------------
|
|
65
|
+
// Severity ordering (for sort)
|
|
66
|
+
// ---------------------------------------------------------------------------
|
|
67
|
+
|
|
68
|
+
const SEVERITY_ORDER: Record<Severity, number> = {
|
|
69
|
+
CRITICAL: 0,
|
|
70
|
+
HIGH: 1,
|
|
71
|
+
MEDIUM: 2,
|
|
72
|
+
LOW: 3,
|
|
73
|
+
};
|
|
74
|
+
|
|
75
|
+
// ---------------------------------------------------------------------------
|
|
76
|
+
// Detection rules
|
|
77
|
+
// ---------------------------------------------------------------------------
|
|
78
|
+
|
|
79
|
+
interface DetectionRule {
|
|
80
|
+
id: string;
|
|
81
|
+
severity: Severity;
|
|
82
|
+
title: string;
|
|
83
|
+
description: string;
|
|
84
|
+
recommendation: string;
|
|
85
|
+
pattern: RegExp;
|
|
86
|
+
/** Optional: only apply to files matching these extensions */
|
|
87
|
+
fileExtensions?: string[];
|
|
88
|
+
}
|
|
89
|
+
|
|
90
|
+
const DETECTION_RULES: DetectionRule[] = [
|
|
91
|
+
// -- Hardcoded secrets --
|
|
92
|
+
{
|
|
93
|
+
id: 'SEC-001',
|
|
94
|
+
severity: 'CRITICAL',
|
|
95
|
+
title: 'Hardcoded API key or secret',
|
|
96
|
+
description:
|
|
97
|
+
'A potential API key, secret, password, or token is hardcoded in the source code. ' +
|
|
98
|
+
'Hardcoded credentials can be extracted from version control history.',
|
|
99
|
+
recommendation:
|
|
100
|
+
'Move the secret to an environment variable or a secrets manager (e.g. AWS Secrets Manager, HashiCorp Vault).',
|
|
101
|
+
pattern:
|
|
102
|
+
/(?:api[_-]?key|api[_-]?secret|secret[_-]?key|access[_-]?key|auth[_-]?token|private[_-]?key)\s*[:=]\s*['"][^'"]{8,}['"]/i,
|
|
103
|
+
},
|
|
104
|
+
{
|
|
105
|
+
id: 'SEC-002',
|
|
106
|
+
severity: 'CRITICAL',
|
|
107
|
+
title: 'Hardcoded password',
|
|
108
|
+
description:
|
|
109
|
+
'A password value appears to be hardcoded in the source. This is a critical risk ' +
|
|
110
|
+
'if the file is committed to version control.',
|
|
111
|
+
recommendation:
|
|
112
|
+
'Use environment variables or a secrets manager instead of embedding passwords in code.',
|
|
113
|
+
pattern: /(?:password|passwd|pwd)\s*[:=]\s*['"][^'"]{4,}['"]/i,
|
|
114
|
+
},
|
|
115
|
+
{
|
|
116
|
+
id: 'SEC-003',
|
|
117
|
+
severity: 'CRITICAL',
|
|
118
|
+
title: 'Hardcoded bearer or authorization token',
|
|
119
|
+
description:
|
|
120
|
+
'An authorization header or bearer token is hardcoded, allowing credential theft from source.',
|
|
121
|
+
recommendation: 'Inject tokens at runtime via environment variables or a credential helper.',
|
|
122
|
+
pattern: /(?:bearer\s+[A-Za-z0-9\-._~+/]+=*|authorization['"]\s*:\s*['"][^'"]{10,}['"])/i,
|
|
123
|
+
},
|
|
124
|
+
{
|
|
125
|
+
id: 'SEC-004',
|
|
126
|
+
severity: 'HIGH',
|
|
127
|
+
title: 'AWS access key ID detected',
|
|
128
|
+
description:
|
|
129
|
+
'A string matching the AWS access key ID format (AKIA...) was found. If valid, ' +
|
|
130
|
+
'it grants access to AWS resources.',
|
|
131
|
+
recommendation:
|
|
132
|
+
'Rotate the key immediately and store credentials via AWS IAM roles or environment variables.',
|
|
133
|
+
pattern: /AKIA[0-9A-Z]{16}/,
|
|
134
|
+
},
|
|
135
|
+
{
|
|
136
|
+
id: 'SEC-005',
|
|
137
|
+
severity: 'HIGH',
|
|
138
|
+
title: 'Private key material detected',
|
|
139
|
+
description: 'A PEM-encoded private key header was found in source code.',
|
|
140
|
+
recommendation: 'Store private keys outside the repository in a secure secrets store.',
|
|
141
|
+
pattern: /-----BEGIN (?:RSA |EC |DSA )?PRIVATE KEY-----/,
|
|
142
|
+
},
|
|
143
|
+
|
|
144
|
+
// -- Terraform-specific --
|
|
145
|
+
{
|
|
146
|
+
id: 'TF-001',
|
|
147
|
+
severity: 'HIGH',
|
|
148
|
+
title: 'Open security group (0.0.0.0/0)',
|
|
149
|
+
description:
|
|
150
|
+
'A Terraform security group rule allows traffic from any IP address (0.0.0.0/0). ' +
|
|
151
|
+
'This exposes services to the entire internet.',
|
|
152
|
+
recommendation: 'Restrict CIDR blocks to known IP ranges required for your use case.',
|
|
153
|
+
pattern: /cidr_blocks\s*=\s*\[?\s*["']0\.0\.0\.0\/0["']/,
|
|
154
|
+
fileExtensions: ['.tf', '.tf.json'],
|
|
155
|
+
},
|
|
156
|
+
{
|
|
157
|
+
id: 'TF-002',
|
|
158
|
+
severity: 'HIGH',
|
|
159
|
+
title: 'Public S3 bucket ACL',
|
|
160
|
+
description:
|
|
161
|
+
'An S3 bucket is configured with a public ACL (public-read or public-read-write). ' +
|
|
162
|
+
'This makes the bucket contents accessible to anyone on the internet.',
|
|
163
|
+
recommendation: 'Set acl to "private" and use bucket policies for fine-grained access control.',
|
|
164
|
+
pattern: /acl\s*=\s*["']public-read(?:-write)?["']/,
|
|
165
|
+
fileExtensions: ['.tf', '.tf.json'],
|
|
166
|
+
},
|
|
167
|
+
{
|
|
168
|
+
id: 'TF-003',
|
|
169
|
+
severity: 'MEDIUM',
|
|
170
|
+
title: 'S3 bucket missing server-side encryption',
|
|
171
|
+
description:
|
|
172
|
+
'An aws_s3_bucket resource was found without an accompanying server_side_encryption_configuration block.',
|
|
173
|
+
recommendation: 'Add a server_side_encryption_configuration block with AES256 or aws:kms.',
|
|
174
|
+
pattern:
|
|
175
|
+
/resource\s+["']aws_s3_bucket["']\s+["'][^"']+["']\s*\{(?:(?!server_side_encryption_configuration)[^}])*\}/s,
|
|
176
|
+
fileExtensions: ['.tf'],
|
|
177
|
+
},
|
|
178
|
+
{
|
|
179
|
+
id: 'TF-004',
|
|
180
|
+
severity: 'MEDIUM',
|
|
181
|
+
title: 'RDS instance missing encryption',
|
|
182
|
+
description:
|
|
183
|
+
'An aws_db_instance resource does not have storage_encrypted = true, leaving data at rest unencrypted.',
|
|
184
|
+
recommendation: 'Set storage_encrypted = true on all RDS instances.',
|
|
185
|
+
pattern:
|
|
186
|
+
/resource\s+["']aws_db_instance["']\s+["'][^"']+["']\s*\{(?:(?!storage_encrypted\s*=\s*true)[^}])*\}/s,
|
|
187
|
+
fileExtensions: ['.tf'],
|
|
188
|
+
},
|
|
189
|
+
{
|
|
190
|
+
id: 'TF-005',
|
|
191
|
+
severity: 'HIGH',
|
|
192
|
+
title: 'IAM policy with wildcard actions',
|
|
193
|
+
description:
|
|
194
|
+
'An IAM policy grants "*" (all actions), violating the principle of least privilege.',
|
|
195
|
+
recommendation: 'Restrict actions to only those required by the workload.',
|
|
196
|
+
pattern: /["']Action["']\s*:\s*["']\*["']/,
|
|
197
|
+
fileExtensions: ['.tf', '.json'],
|
|
198
|
+
},
|
|
199
|
+
|
|
200
|
+
// -- Docker / Compose --
|
|
201
|
+
{
|
|
202
|
+
id: 'DOCKER-001',
|
|
203
|
+
severity: 'MEDIUM',
|
|
204
|
+
title: 'Port bound to all interfaces (0.0.0.0)',
|
|
205
|
+
description:
|
|
206
|
+
'A Docker Compose service binds a port to 0.0.0.0, exposing it on all network interfaces.',
|
|
207
|
+
recommendation:
|
|
208
|
+
'Bind to 127.0.0.1 for local-only access, or use a reverse proxy for external traffic.',
|
|
209
|
+
pattern: /["']?0\.0\.0\.0:\d+:\d+["']?/,
|
|
210
|
+
fileExtensions: ['.yml', '.yaml'],
|
|
211
|
+
},
|
|
212
|
+
|
|
213
|
+
// -- SQL injection --
|
|
214
|
+
{
|
|
215
|
+
id: 'CODE-001',
|
|
216
|
+
severity: 'HIGH',
|
|
217
|
+
title: 'Potential SQL injection via string concatenation',
|
|
218
|
+
description:
|
|
219
|
+
'A SQL query appears to be built with string concatenation or template literals that ' +
|
|
220
|
+
'include variable interpolation, which can lead to SQL injection.',
|
|
221
|
+
recommendation:
|
|
222
|
+
'Use parameterized queries or prepared statements instead of string concatenation.',
|
|
223
|
+
pattern:
|
|
224
|
+
/(?:SELECT|INSERT|UPDATE|DELETE|DROP|CREATE|ALTER)\s+.*(?:\$\{|\+\s*(?:req|params|query|input|user|body)\b)/i,
|
|
225
|
+
fileExtensions: ['.ts', '.js', '.mjs', '.cjs'],
|
|
226
|
+
},
|
|
227
|
+
|
|
228
|
+
// -- Insecure HTTP --
|
|
229
|
+
{
|
|
230
|
+
id: 'CODE-002',
|
|
231
|
+
severity: 'LOW',
|
|
232
|
+
title: 'Insecure HTTP URL',
|
|
233
|
+
description:
|
|
234
|
+
'An http:// URL was found in configuration or source code. Data transmitted over ' +
|
|
235
|
+
'plain HTTP is vulnerable to interception.',
|
|
236
|
+
recommendation: 'Use https:// to encrypt data in transit.',
|
|
237
|
+
pattern: /["']http:\/\/(?!localhost|127\.0\.0\.1|0\.0\.0\.0|::1)[^'"]+["']/,
|
|
238
|
+
fileExtensions: [
|
|
239
|
+
'.ts',
|
|
240
|
+
'.js',
|
|
241
|
+
'.json',
|
|
242
|
+
'.yml',
|
|
243
|
+
'.yaml',
|
|
244
|
+
'.tf',
|
|
245
|
+
'.env',
|
|
246
|
+
'.cfg',
|
|
247
|
+
'.conf',
|
|
248
|
+
'.toml',
|
|
249
|
+
],
|
|
250
|
+
},
|
|
251
|
+
|
|
252
|
+
// -- Disabled TLS verification --
|
|
253
|
+
{
|
|
254
|
+
id: 'CODE-003',
|
|
255
|
+
severity: 'HIGH',
|
|
256
|
+
title: 'TLS certificate verification disabled',
|
|
257
|
+
description:
|
|
258
|
+
'TLS/SSL certificate verification is being disabled, making connections vulnerable ' +
|
|
259
|
+
'to man-in-the-middle attacks.',
|
|
260
|
+
recommendation: 'Do not disable certificate verification in production environments.',
|
|
261
|
+
pattern:
|
|
262
|
+
/(?:rejectUnauthorized\s*:\s*false|NODE_TLS_REJECT_UNAUTHORIZED\s*=\s*['"]?0|verify\s*=\s*False|InsecureSkipVerify\s*:\s*true)/i,
|
|
263
|
+
},
|
|
264
|
+
];
|
|
265
|
+
|
|
266
|
+
// ---------------------------------------------------------------------------
|
|
267
|
+
// File extensions considered "text" (non-binary)
|
|
268
|
+
// ---------------------------------------------------------------------------
|
|
269
|
+
|
|
270
|
+
const TEXT_EXTENSIONS = new Set([
|
|
271
|
+
'.ts',
|
|
272
|
+
'.tsx',
|
|
273
|
+
'.js',
|
|
274
|
+
'.jsx',
|
|
275
|
+
'.mjs',
|
|
276
|
+
'.cjs',
|
|
277
|
+
'.json',
|
|
278
|
+
'.yaml',
|
|
279
|
+
'.yml',
|
|
280
|
+
'.toml',
|
|
281
|
+
'.cfg',
|
|
282
|
+
'.conf',
|
|
283
|
+
'.ini',
|
|
284
|
+
'.tf',
|
|
285
|
+
'.tfvars',
|
|
286
|
+
'.hcl',
|
|
287
|
+
'.sh',
|
|
288
|
+
'.bash',
|
|
289
|
+
'.zsh',
|
|
290
|
+
'.py',
|
|
291
|
+
'.rb',
|
|
292
|
+
'.go',
|
|
293
|
+
'.java',
|
|
294
|
+
'.rs',
|
|
295
|
+
'.c',
|
|
296
|
+
'.cpp',
|
|
297
|
+
'.h',
|
|
298
|
+
'.md',
|
|
299
|
+
'.txt',
|
|
300
|
+
'.csv',
|
|
301
|
+
'.sql',
|
|
302
|
+
'.graphql',
|
|
303
|
+
'.gql',
|
|
304
|
+
'.env',
|
|
305
|
+
'.env.example',
|
|
306
|
+
'.env.local',
|
|
307
|
+
'.xml',
|
|
308
|
+
'.html',
|
|
309
|
+
'.css',
|
|
310
|
+
'.scss',
|
|
311
|
+
'.less',
|
|
312
|
+
'.dockerfile',
|
|
313
|
+
'.dockerignore',
|
|
314
|
+
'.gitignore',
|
|
315
|
+
'.npmignore',
|
|
316
|
+
'.tf.json',
|
|
317
|
+
]);
|
|
318
|
+
|
|
319
|
+
/** Names that indicate a binary or generated file regardless of extension */
|
|
320
|
+
const BINARY_NAMES = new Set([
|
|
321
|
+
'package-lock.json',
|
|
322
|
+
'bun.lock',
|
|
323
|
+
'bun.lockb',
|
|
324
|
+
'yarn.lock',
|
|
325
|
+
'pnpm-lock.yaml',
|
|
326
|
+
]);
|
|
327
|
+
|
|
328
|
+
// ---------------------------------------------------------------------------
|
|
329
|
+
// Helpers
|
|
330
|
+
// ---------------------------------------------------------------------------
|
|
331
|
+
|
|
332
|
+
const DEFAULT_EXCLUDES = [
|
|
333
|
+
'node_modules',
|
|
334
|
+
'.git',
|
|
335
|
+
'dist',
|
|
336
|
+
'coverage',
|
|
337
|
+
'.next',
|
|
338
|
+
'build',
|
|
339
|
+
'__pycache__',
|
|
340
|
+
];
|
|
341
|
+
|
|
342
|
+
/**
|
|
343
|
+
* Determine whether a file should be scanned based on its extension and name.
|
|
344
|
+
*/
|
|
345
|
+
function isTextFile(filePath: string): boolean {
|
|
346
|
+
const basename = path.basename(filePath);
|
|
347
|
+
if (BINARY_NAMES.has(basename)) {
|
|
348
|
+
return false;
|
|
349
|
+
}
|
|
350
|
+
|
|
351
|
+
// Files without an extension (e.g. Dockerfile, Makefile) are treated as text
|
|
352
|
+
const ext = path.extname(filePath).toLowerCase();
|
|
353
|
+
if (ext === '') {
|
|
354
|
+
return true;
|
|
355
|
+
}
|
|
356
|
+
|
|
357
|
+
return TEXT_EXTENSIONS.has(ext);
|
|
358
|
+
}
|
|
359
|
+
|
|
360
|
+
/**
|
|
361
|
+
* Check whether a file matches the user-provided glob patterns (simple suffix matching).
|
|
362
|
+
*/
|
|
363
|
+
function matchesPatterns(filePath: string, patterns: string[]): boolean {
|
|
364
|
+
if (patterns.length === 0) {
|
|
365
|
+
return true;
|
|
366
|
+
}
|
|
367
|
+
const basename = path.basename(filePath);
|
|
368
|
+
const ext = path.extname(filePath).toLowerCase();
|
|
369
|
+
|
|
370
|
+
return patterns.some(p => {
|
|
371
|
+
// Handle "*.ext" patterns
|
|
372
|
+
if (p.startsWith('*.')) {
|
|
373
|
+
return ext === p.slice(1).toLowerCase() || ext === p.slice(1);
|
|
374
|
+
}
|
|
375
|
+
// Exact filename match
|
|
376
|
+
return basename === p;
|
|
377
|
+
});
|
|
378
|
+
}
|
|
379
|
+
|
|
380
|
+
/**
|
|
381
|
+
* Check whether a detection rule applies to a given file extension.
|
|
382
|
+
*/
|
|
383
|
+
function ruleAppliesToFile(rule: DetectionRule, filePath: string): boolean {
|
|
384
|
+
if (!rule.fileExtensions) {
|
|
385
|
+
return true;
|
|
386
|
+
}
|
|
387
|
+
const ext = path.extname(filePath).toLowerCase();
|
|
388
|
+
return rule.fileExtensions.includes(ext);
|
|
389
|
+
}
|
|
390
|
+
|
|
391
|
+
/**
|
|
392
|
+
* Recursively collect file paths from a directory, respecting exclusions and limits.
|
|
393
|
+
*/
|
|
394
|
+
function collectFiles(
|
|
395
|
+
dir: string,
|
|
396
|
+
exclude: Set<string>,
|
|
397
|
+
patterns: string[],
|
|
398
|
+
maxFiles: number,
|
|
399
|
+
collected: string[] = []
|
|
400
|
+
): string[] {
|
|
401
|
+
if (collected.length >= maxFiles) {
|
|
402
|
+
return collected;
|
|
403
|
+
}
|
|
404
|
+
|
|
405
|
+
let entries: fs.Dirent[];
|
|
406
|
+
try {
|
|
407
|
+
entries = fs.readdirSync(dir, { withFileTypes: true });
|
|
408
|
+
} catch {
|
|
409
|
+
// Permission denied or unreadable directory -- skip silently
|
|
410
|
+
return collected;
|
|
411
|
+
}
|
|
412
|
+
|
|
413
|
+
for (const entry of entries) {
|
|
414
|
+
if (collected.length >= maxFiles) {
|
|
415
|
+
break;
|
|
416
|
+
}
|
|
417
|
+
|
|
418
|
+
if (entry.isDirectory()) {
|
|
419
|
+
if (exclude.has(entry.name)) {
|
|
420
|
+
continue;
|
|
421
|
+
}
|
|
422
|
+
collectFiles(path.join(dir, entry.name), exclude, patterns, maxFiles, collected);
|
|
423
|
+
} else if (entry.isFile()) {
|
|
424
|
+
const fullPath = path.join(dir, entry.name);
|
|
425
|
+
if (isTextFile(fullPath) && matchesPatterns(fullPath, patterns)) {
|
|
426
|
+
collected.push(fullPath);
|
|
427
|
+
}
|
|
428
|
+
}
|
|
429
|
+
}
|
|
430
|
+
|
|
431
|
+
return collected;
|
|
432
|
+
}
|
|
433
|
+
|
|
434
|
+
// ---------------------------------------------------------------------------
|
|
435
|
+
// Public API
|
|
436
|
+
// ---------------------------------------------------------------------------
|
|
437
|
+
|
|
438
|
+
/**
|
|
439
|
+
* Scan a directory tree for common security issues.
|
|
440
|
+
*
|
|
441
|
+
* Walks through files in `options.dir`, applies regex-based detection rules,
|
|
442
|
+
* and returns all findings sorted by severity (CRITICAL first).
|
|
443
|
+
*
|
|
444
|
+
* @param options - Configuration controlling which files are scanned
|
|
445
|
+
* @returns Scan result containing findings, file count, and timing information
|
|
446
|
+
*/
|
|
447
|
+
export async function scanSecurity(options: ScanOptions): Promise<ScanResult> {
|
|
448
|
+
const startTime = Date.now();
|
|
449
|
+
|
|
450
|
+
const excludeSet = new Set(options.exclude ?? DEFAULT_EXCLUDES);
|
|
451
|
+
const patterns = options.patterns ?? [];
|
|
452
|
+
const maxFiles = options.maxFiles ?? 1000;
|
|
453
|
+
|
|
454
|
+
// Collect files to scan
|
|
455
|
+
const files = collectFiles(options.dir, excludeSet, patterns, maxFiles);
|
|
456
|
+
|
|
457
|
+
const findings: SecurityFinding[] = [];
|
|
458
|
+
|
|
459
|
+
for (const filePath of files) {
|
|
460
|
+
let content: string;
|
|
461
|
+
try {
|
|
462
|
+
content = fs.readFileSync(filePath, 'utf-8');
|
|
463
|
+
} catch {
|
|
464
|
+
// Unreadable file -- skip
|
|
465
|
+
continue;
|
|
466
|
+
}
|
|
467
|
+
|
|
468
|
+
const lines = content.split('\n');
|
|
469
|
+
const relativePath = path.relative(options.dir, filePath);
|
|
470
|
+
|
|
471
|
+
for (const rule of DETECTION_RULES) {
|
|
472
|
+
if (!ruleAppliesToFile(rule, filePath)) {
|
|
473
|
+
continue;
|
|
474
|
+
}
|
|
475
|
+
|
|
476
|
+
// For multiline patterns (dotAll flag), match against the whole file
|
|
477
|
+
if (rule.pattern.flags.includes('s')) {
|
|
478
|
+
if (rule.pattern.test(content)) {
|
|
479
|
+
findings.push({
|
|
480
|
+
id: `${rule.id}-${crypto.randomUUID().slice(0, 8)}`,
|
|
481
|
+
severity: rule.severity,
|
|
482
|
+
title: rule.title,
|
|
483
|
+
description: rule.description,
|
|
484
|
+
file: relativePath,
|
|
485
|
+
recommendation: rule.recommendation,
|
|
486
|
+
});
|
|
487
|
+
}
|
|
488
|
+
continue;
|
|
489
|
+
}
|
|
490
|
+
|
|
491
|
+
// Line-by-line matching for single-line patterns
|
|
492
|
+
for (let i = 0; i < lines.length; i++) {
|
|
493
|
+
if (rule.pattern.test(lines[i])) {
|
|
494
|
+
findings.push({
|
|
495
|
+
id: `${rule.id}-${crypto.randomUUID().slice(0, 8)}`,
|
|
496
|
+
severity: rule.severity,
|
|
497
|
+
title: rule.title,
|
|
498
|
+
description: rule.description,
|
|
499
|
+
file: relativePath,
|
|
500
|
+
line: i + 1,
|
|
501
|
+
recommendation: rule.recommendation,
|
|
502
|
+
});
|
|
503
|
+
}
|
|
504
|
+
}
|
|
505
|
+
}
|
|
506
|
+
}
|
|
507
|
+
|
|
508
|
+
// Sort by severity (CRITICAL first), then by file path
|
|
509
|
+
findings.sort((a, b) => {
|
|
510
|
+
const severityDiff = SEVERITY_ORDER[a.severity] - SEVERITY_ORDER[b.severity];
|
|
511
|
+
if (severityDiff !== 0) {
|
|
512
|
+
return severityDiff;
|
|
513
|
+
}
|
|
514
|
+
return (a.file ?? '').localeCompare(b.file ?? '');
|
|
515
|
+
});
|
|
516
|
+
|
|
517
|
+
return {
|
|
518
|
+
findings,
|
|
519
|
+
scannedFiles: files.length,
|
|
520
|
+
scanDuration: Date.now() - startTime,
|
|
521
|
+
timestamp: new Date(),
|
|
522
|
+
};
|
|
523
|
+
}
|
|
524
|
+
|
|
525
|
+
/**
|
|
526
|
+
* Format an array of security findings as a human-readable report string.
|
|
527
|
+
*
|
|
528
|
+
* Each finding is displayed with a severity indicator, title, file location,
|
|
529
|
+
* description, and recommendation.
|
|
530
|
+
*
|
|
531
|
+
* @param findings - The findings to format
|
|
532
|
+
* @returns Formatted multi-line report
|
|
533
|
+
*/
|
|
534
|
+
export function formatFindings(findings: SecurityFinding[]): string {
|
|
535
|
+
if (findings.length === 0) {
|
|
536
|
+
return 'No security issues found.';
|
|
537
|
+
}
|
|
538
|
+
|
|
539
|
+
const severityIcon: Record<Severity, string> = {
|
|
540
|
+
CRITICAL: '[CRITICAL]',
|
|
541
|
+
HIGH: '[HIGH] ',
|
|
542
|
+
MEDIUM: '[MEDIUM] ',
|
|
543
|
+
LOW: '[LOW] ',
|
|
544
|
+
};
|
|
545
|
+
|
|
546
|
+
const lines: string[] = [
|
|
547
|
+
`Security Scan Report - ${findings.length} finding(s)`,
|
|
548
|
+
'='.repeat(60),
|
|
549
|
+
'',
|
|
550
|
+
];
|
|
551
|
+
|
|
552
|
+
const grouped: Record<Severity, SecurityFinding[]> = {
|
|
553
|
+
CRITICAL: [],
|
|
554
|
+
HIGH: [],
|
|
555
|
+
MEDIUM: [],
|
|
556
|
+
LOW: [],
|
|
557
|
+
};
|
|
558
|
+
|
|
559
|
+
for (const f of findings) {
|
|
560
|
+
grouped[f.severity].push(f);
|
|
561
|
+
}
|
|
562
|
+
|
|
563
|
+
for (const severity of ['CRITICAL', 'HIGH', 'MEDIUM', 'LOW'] as Severity[]) {
|
|
564
|
+
const group = grouped[severity];
|
|
565
|
+
if (group.length === 0) {
|
|
566
|
+
continue;
|
|
567
|
+
}
|
|
568
|
+
|
|
569
|
+
lines.push(`--- ${severity} (${group.length}) ---`);
|
|
570
|
+
lines.push('');
|
|
571
|
+
|
|
572
|
+
for (const finding of group) {
|
|
573
|
+
lines.push(` ${severityIcon[finding.severity]} ${finding.title}`);
|
|
574
|
+
if (finding.file) {
|
|
575
|
+
const loc = finding.line ? `${finding.file}:${finding.line}` : finding.file;
|
|
576
|
+
lines.push(` Location: ${loc}`);
|
|
577
|
+
}
|
|
578
|
+
lines.push(` ${finding.description}`);
|
|
579
|
+
lines.push(` Recommendation: ${finding.recommendation}`);
|
|
580
|
+
lines.push('');
|
|
581
|
+
}
|
|
582
|
+
}
|
|
583
|
+
|
|
584
|
+
// Summary counts
|
|
585
|
+
const criticalCount = grouped.CRITICAL.length;
|
|
586
|
+
const highCount = grouped.HIGH.length;
|
|
587
|
+
const mediumCount = grouped.MEDIUM.length;
|
|
588
|
+
const lowCount = grouped.LOW.length;
|
|
589
|
+
|
|
590
|
+
lines.push('='.repeat(60));
|
|
591
|
+
lines.push(
|
|
592
|
+
`Summary: ${criticalCount} critical, ${highCount} high, ${mediumCount} medium, ${lowCount} low`
|
|
593
|
+
);
|
|
594
|
+
|
|
595
|
+
return lines.join('\n');
|
|
596
|
+
}
|
|
@@ -0,0 +1,75 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Auth Guard - First-Run Detection
|
|
3
|
+
* Detects when authentication is needed and triggers the login wizard
|
|
4
|
+
*/
|
|
5
|
+
|
|
6
|
+
import { authStore } from './store';
|
|
7
|
+
|
|
8
|
+
/**
|
|
9
|
+
* Environment variable names for LLM provider API keys
|
|
10
|
+
*/
|
|
11
|
+
const PROVIDER_ENV_VARS = [
|
|
12
|
+
'ANTHROPIC_API_KEY',
|
|
13
|
+
'OPENAI_API_KEY',
|
|
14
|
+
'GOOGLE_API_KEY',
|
|
15
|
+
'OPENROUTER_API_KEY',
|
|
16
|
+
'GROQ_API_KEY',
|
|
17
|
+
'TOGETHER_API_KEY',
|
|
18
|
+
'DEEPSEEK_API_KEY',
|
|
19
|
+
'FIREWORKS_API_KEY',
|
|
20
|
+
'PERPLEXITY_API_KEY',
|
|
21
|
+
'OLLAMA_BASE_URL', // Ollama doesn't need API key, just base URL
|
|
22
|
+
'AWS_ACCESS_KEY_ID', // Bedrock uses AWS IAM credentials
|
|
23
|
+
];
|
|
24
|
+
|
|
25
|
+
/**
|
|
26
|
+
* Check if any provider API key is available via environment variables
|
|
27
|
+
*/
|
|
28
|
+
function hasEnvVarCredentials(): boolean {
|
|
29
|
+
return PROVIDER_ENV_VARS.some(envVar => !!process.env[envVar]);
|
|
30
|
+
}
|
|
31
|
+
|
|
32
|
+
/**
|
|
33
|
+
* Check if authentication is required
|
|
34
|
+
* Returns true if no providers configured in auth.json AND no env vars set
|
|
35
|
+
*/
|
|
36
|
+
export function requiresAuth(): boolean {
|
|
37
|
+
// If auth.json has providers, auth is not required
|
|
38
|
+
if (authStore.exists()) {
|
|
39
|
+
return false;
|
|
40
|
+
}
|
|
41
|
+
|
|
42
|
+
// If any provider env var is set, auth is not required
|
|
43
|
+
if (hasEnvVarCredentials()) {
|
|
44
|
+
return false;
|
|
45
|
+
}
|
|
46
|
+
|
|
47
|
+
return true;
|
|
48
|
+
}
|
|
49
|
+
|
|
50
|
+
/**
|
|
51
|
+
* Check if authentication is configured
|
|
52
|
+
* Returns true if there are any providers configured (auth.json or env vars)
|
|
53
|
+
*/
|
|
54
|
+
export function isAuthenticated(): boolean {
|
|
55
|
+
return authStore.exists() || hasEnvVarCredentials();
|
|
56
|
+
}
|
|
57
|
+
|
|
58
|
+
/**
|
|
59
|
+
* Get a human-readable auth status message
|
|
60
|
+
*/
|
|
61
|
+
export function getAuthMessage(): string {
|
|
62
|
+
if (!requiresAuth()) {
|
|
63
|
+
const status = authStore.getStatus();
|
|
64
|
+
const providerCount = status.providers.length;
|
|
65
|
+
const defaultProvider = status.defaultProvider;
|
|
66
|
+
|
|
67
|
+
if (status.hasIdentity) {
|
|
68
|
+
return `Authenticated as ${status.identity?.username} with ${providerCount} provider(s). Default: ${defaultProvider}`;
|
|
69
|
+
}
|
|
70
|
+
|
|
71
|
+
return `Configured with ${providerCount} provider(s). Default: ${defaultProvider}`;
|
|
72
|
+
}
|
|
73
|
+
|
|
74
|
+
return 'Not authenticated. Run `nimbus login` to get started.';
|
|
75
|
+
}
|