@build-astron-co/nimbus 0.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (313) hide show
  1. package/LICENSE +21 -0
  2. package/README.md +628 -0
  3. package/bin/nimbus +38 -0
  4. package/package.json +80 -0
  5. package/src/__tests__/app.test.ts +76 -0
  6. package/src/__tests__/audit.test.ts +877 -0
  7. package/src/__tests__/circuit-breaker.test.ts +116 -0
  8. package/src/__tests__/cli-run.test.ts +115 -0
  9. package/src/__tests__/context-manager.test.ts +502 -0
  10. package/src/__tests__/context.test.ts +242 -0
  11. package/src/__tests__/enterprise.test.ts +401 -0
  12. package/src/__tests__/generator.test.ts +433 -0
  13. package/src/__tests__/hooks.test.ts +582 -0
  14. package/src/__tests__/init.test.ts +436 -0
  15. package/src/__tests__/intent-parser.test.ts +229 -0
  16. package/src/__tests__/llm-router.test.ts +209 -0
  17. package/src/__tests__/lsp.test.ts +293 -0
  18. package/src/__tests__/modes.test.ts +336 -0
  19. package/src/__tests__/permissions.test.ts +338 -0
  20. package/src/__tests__/serve.test.ts +275 -0
  21. package/src/__tests__/sessions.test.ts +227 -0
  22. package/src/__tests__/sharing.test.ts +288 -0
  23. package/src/__tests__/snapshots.test.ts +581 -0
  24. package/src/__tests__/state-db.test.ts +334 -0
  25. package/src/__tests__/stream-with-tools.test.ts +732 -0
  26. package/src/__tests__/subagents.test.ts +176 -0
  27. package/src/__tests__/system-prompt.test.ts +169 -0
  28. package/src/__tests__/tool-converter.test.ts +256 -0
  29. package/src/__tests__/tool-schemas.test.ts +397 -0
  30. package/src/__tests__/tools.test.ts +143 -0
  31. package/src/__tests__/version.test.ts +49 -0
  32. package/src/agent/compaction-agent.ts +227 -0
  33. package/src/agent/context-manager.ts +435 -0
  34. package/src/agent/context.ts +427 -0
  35. package/src/agent/deploy-preview.ts +426 -0
  36. package/src/agent/index.ts +68 -0
  37. package/src/agent/loop.ts +717 -0
  38. package/src/agent/modes.ts +429 -0
  39. package/src/agent/permissions.ts +466 -0
  40. package/src/agent/subagents/base.ts +116 -0
  41. package/src/agent/subagents/cost.ts +51 -0
  42. package/src/agent/subagents/explore.ts +42 -0
  43. package/src/agent/subagents/general.ts +54 -0
  44. package/src/agent/subagents/index.ts +102 -0
  45. package/src/agent/subagents/infra.ts +59 -0
  46. package/src/agent/subagents/security.ts +69 -0
  47. package/src/agent/system-prompt.ts +436 -0
  48. package/src/app.ts +122 -0
  49. package/src/audit/activity-log.ts +290 -0
  50. package/src/audit/compliance-checker.ts +540 -0
  51. package/src/audit/cost-tracker.ts +318 -0
  52. package/src/audit/index.ts +23 -0
  53. package/src/audit/security-scanner.ts +596 -0
  54. package/src/auth/guard.ts +75 -0
  55. package/src/auth/index.ts +56 -0
  56. package/src/auth/oauth.ts +455 -0
  57. package/src/auth/providers.ts +470 -0
  58. package/src/auth/sso.ts +113 -0
  59. package/src/auth/store.ts +505 -0
  60. package/src/auth/types.ts +187 -0
  61. package/src/build.ts +141 -0
  62. package/src/cli/index.ts +16 -0
  63. package/src/cli/init.ts +854 -0
  64. package/src/cli/openapi-spec.ts +356 -0
  65. package/src/cli/run.ts +237 -0
  66. package/src/cli/serve-auth.ts +80 -0
  67. package/src/cli/serve.ts +462 -0
  68. package/src/cli/web.ts +67 -0
  69. package/src/cli.ts +1417 -0
  70. package/src/clients/core-engine-client.ts +227 -0
  71. package/src/clients/enterprise-client.ts +334 -0
  72. package/src/clients/generator-client.ts +351 -0
  73. package/src/clients/git-client.ts +627 -0
  74. package/src/clients/github-client.ts +410 -0
  75. package/src/clients/helm-client.ts +504 -0
  76. package/src/clients/index.ts +80 -0
  77. package/src/clients/k8s-client.ts +497 -0
  78. package/src/clients/llm-client.ts +161 -0
  79. package/src/clients/rest-client.ts +130 -0
  80. package/src/clients/service-discovery.ts +33 -0
  81. package/src/clients/terraform-client.ts +482 -0
  82. package/src/clients/tools-client.ts +1843 -0
  83. package/src/clients/ws-client.ts +115 -0
  84. package/src/commands/analyze/index.ts +352 -0
  85. package/src/commands/apply/helm.ts +473 -0
  86. package/src/commands/apply/index.ts +213 -0
  87. package/src/commands/apply/k8s.ts +454 -0
  88. package/src/commands/apply/terraform.ts +582 -0
  89. package/src/commands/ask.ts +167 -0
  90. package/src/commands/audit/index.ts +238 -0
  91. package/src/commands/auth-cloud.ts +294 -0
  92. package/src/commands/auth-list.ts +134 -0
  93. package/src/commands/auth-profile.ts +121 -0
  94. package/src/commands/auth-status.ts +141 -0
  95. package/src/commands/aws/ec2.ts +501 -0
  96. package/src/commands/aws/iam.ts +397 -0
  97. package/src/commands/aws/index.ts +133 -0
  98. package/src/commands/aws/lambda.ts +396 -0
  99. package/src/commands/aws/rds.ts +439 -0
  100. package/src/commands/aws/s3.ts +439 -0
  101. package/src/commands/aws/vpc.ts +393 -0
  102. package/src/commands/aws-discover.ts +649 -0
  103. package/src/commands/aws-terraform.ts +805 -0
  104. package/src/commands/azure/aks.ts +376 -0
  105. package/src/commands/azure/functions.ts +253 -0
  106. package/src/commands/azure/index.ts +116 -0
  107. package/src/commands/azure/storage.ts +478 -0
  108. package/src/commands/azure/vm.ts +355 -0
  109. package/src/commands/billing/index.ts +256 -0
  110. package/src/commands/chat.ts +314 -0
  111. package/src/commands/config.ts +346 -0
  112. package/src/commands/cost/cloud-cost-estimator.ts +266 -0
  113. package/src/commands/cost/estimator.ts +79 -0
  114. package/src/commands/cost/index.ts +594 -0
  115. package/src/commands/cost/parsers/terraform.ts +273 -0
  116. package/src/commands/cost/parsers/types.ts +25 -0
  117. package/src/commands/cost/pricing/aws.ts +544 -0
  118. package/src/commands/cost/pricing/azure.ts +499 -0
  119. package/src/commands/cost/pricing/gcp.ts +396 -0
  120. package/src/commands/cost/pricing/index.ts +40 -0
  121. package/src/commands/demo.ts +250 -0
  122. package/src/commands/doctor.ts +794 -0
  123. package/src/commands/drift/index.ts +439 -0
  124. package/src/commands/explain.ts +277 -0
  125. package/src/commands/feedback.ts +389 -0
  126. package/src/commands/fix.ts +324 -0
  127. package/src/commands/fs/index.ts +402 -0
  128. package/src/commands/gcp/compute.ts +325 -0
  129. package/src/commands/gcp/functions.ts +271 -0
  130. package/src/commands/gcp/gke.ts +438 -0
  131. package/src/commands/gcp/iam.ts +344 -0
  132. package/src/commands/gcp/index.ts +129 -0
  133. package/src/commands/gcp/storage.ts +284 -0
  134. package/src/commands/generate-helm.ts +1249 -0
  135. package/src/commands/generate-k8s.ts +1560 -0
  136. package/src/commands/generate-terraform.ts +1460 -0
  137. package/src/commands/gh/index.ts +863 -0
  138. package/src/commands/git/index.ts +1343 -0
  139. package/src/commands/helm/index.ts +1126 -0
  140. package/src/commands/help.ts +539 -0
  141. package/src/commands/history.ts +142 -0
  142. package/src/commands/import.ts +868 -0
  143. package/src/commands/index.ts +367 -0
  144. package/src/commands/init.ts +1046 -0
  145. package/src/commands/k8s/index.ts +1137 -0
  146. package/src/commands/login.ts +631 -0
  147. package/src/commands/logout.ts +83 -0
  148. package/src/commands/onboarding.ts +228 -0
  149. package/src/commands/plan/display.ts +279 -0
  150. package/src/commands/plan/index.ts +599 -0
  151. package/src/commands/preview.ts +452 -0
  152. package/src/commands/questionnaire.ts +1270 -0
  153. package/src/commands/resume.ts +55 -0
  154. package/src/commands/team/index.ts +346 -0
  155. package/src/commands/template.ts +232 -0
  156. package/src/commands/tf/index.ts +1034 -0
  157. package/src/commands/upgrade.ts +550 -0
  158. package/src/commands/usage/index.ts +134 -0
  159. package/src/commands/version.ts +170 -0
  160. package/src/compat/index.ts +2 -0
  161. package/src/compat/runtime.ts +12 -0
  162. package/src/compat/sqlite.ts +107 -0
  163. package/src/config/index.ts +17 -0
  164. package/src/config/manager.ts +530 -0
  165. package/src/config/safety-policy.ts +358 -0
  166. package/src/config/schema.ts +125 -0
  167. package/src/config/types.ts +527 -0
  168. package/src/context/context-db.ts +199 -0
  169. package/src/demo/index.ts +349 -0
  170. package/src/demo/scenarios/full-journey.ts +229 -0
  171. package/src/demo/scenarios/getting-started.ts +127 -0
  172. package/src/demo/scenarios/helm-release.ts +341 -0
  173. package/src/demo/scenarios/k8s-deployment.ts +194 -0
  174. package/src/demo/scenarios/terraform-vpc.ts +170 -0
  175. package/src/demo/types.ts +92 -0
  176. package/src/engine/cost-estimator.ts +438 -0
  177. package/src/engine/diagram-generator.ts +256 -0
  178. package/src/engine/drift-detector.ts +902 -0
  179. package/src/engine/executor.ts +1035 -0
  180. package/src/engine/index.ts +76 -0
  181. package/src/engine/orchestrator.ts +636 -0
  182. package/src/engine/planner.ts +720 -0
  183. package/src/engine/safety.ts +743 -0
  184. package/src/engine/verifier.ts +770 -0
  185. package/src/enterprise/audit.ts +348 -0
  186. package/src/enterprise/auth.ts +270 -0
  187. package/src/enterprise/billing.ts +822 -0
  188. package/src/enterprise/index.ts +17 -0
  189. package/src/enterprise/teams.ts +443 -0
  190. package/src/generator/best-practices.ts +1608 -0
  191. package/src/generator/helm.ts +630 -0
  192. package/src/generator/index.ts +37 -0
  193. package/src/generator/intent-parser.ts +514 -0
  194. package/src/generator/kubernetes.ts +976 -0
  195. package/src/generator/terraform.ts +1867 -0
  196. package/src/history/index.ts +8 -0
  197. package/src/history/manager.ts +322 -0
  198. package/src/history/types.ts +34 -0
  199. package/src/hooks/config.ts +432 -0
  200. package/src/hooks/engine.ts +391 -0
  201. package/src/hooks/index.ts +4 -0
  202. package/src/llm/auth-bridge.ts +198 -0
  203. package/src/llm/circuit-breaker.ts +140 -0
  204. package/src/llm/config-loader.ts +201 -0
  205. package/src/llm/cost-calculator.ts +171 -0
  206. package/src/llm/index.ts +8 -0
  207. package/src/llm/model-aliases.ts +115 -0
  208. package/src/llm/provider-registry.ts +63 -0
  209. package/src/llm/providers/anthropic.ts +433 -0
  210. package/src/llm/providers/bedrock.ts +477 -0
  211. package/src/llm/providers/google.ts +405 -0
  212. package/src/llm/providers/ollama.ts +767 -0
  213. package/src/llm/providers/openai-compatible.ts +340 -0
  214. package/src/llm/providers/openai.ts +328 -0
  215. package/src/llm/providers/openrouter.ts +338 -0
  216. package/src/llm/router.ts +1035 -0
  217. package/src/llm/types.ts +232 -0
  218. package/src/lsp/client.ts +298 -0
  219. package/src/lsp/languages.ts +116 -0
  220. package/src/lsp/manager.ts +278 -0
  221. package/src/mcp/client.ts +402 -0
  222. package/src/mcp/index.ts +5 -0
  223. package/src/mcp/manager.ts +133 -0
  224. package/src/nimbus.ts +214 -0
  225. package/src/plugins/index.ts +27 -0
  226. package/src/plugins/loader.ts +334 -0
  227. package/src/plugins/manager.ts +376 -0
  228. package/src/plugins/types.ts +284 -0
  229. package/src/scanners/cicd-scanner.ts +258 -0
  230. package/src/scanners/cloud-scanner.ts +466 -0
  231. package/src/scanners/framework-scanner.ts +469 -0
  232. package/src/scanners/iac-scanner.ts +388 -0
  233. package/src/scanners/index.ts +539 -0
  234. package/src/scanners/language-scanner.ts +276 -0
  235. package/src/scanners/package-manager-scanner.ts +277 -0
  236. package/src/scanners/types.ts +172 -0
  237. package/src/sessions/manager.ts +365 -0
  238. package/src/sessions/types.ts +44 -0
  239. package/src/sharing/sync.ts +296 -0
  240. package/src/sharing/viewer.ts +97 -0
  241. package/src/snapshots/index.ts +2 -0
  242. package/src/snapshots/manager.ts +530 -0
  243. package/src/state/artifacts.ts +147 -0
  244. package/src/state/audit.ts +137 -0
  245. package/src/state/billing.ts +240 -0
  246. package/src/state/checkpoints.ts +117 -0
  247. package/src/state/config.ts +67 -0
  248. package/src/state/conversations.ts +14 -0
  249. package/src/state/credentials.ts +154 -0
  250. package/src/state/db.ts +58 -0
  251. package/src/state/index.ts +26 -0
  252. package/src/state/messages.ts +115 -0
  253. package/src/state/projects.ts +123 -0
  254. package/src/state/schema.ts +236 -0
  255. package/src/state/sessions.ts +147 -0
  256. package/src/state/teams.ts +200 -0
  257. package/src/telemetry.ts +108 -0
  258. package/src/tools/aws-ops.ts +952 -0
  259. package/src/tools/azure-ops.ts +579 -0
  260. package/src/tools/file-ops.ts +593 -0
  261. package/src/tools/gcp-ops.ts +625 -0
  262. package/src/tools/git-ops.ts +773 -0
  263. package/src/tools/github-ops.ts +799 -0
  264. package/src/tools/helm-ops.ts +943 -0
  265. package/src/tools/index.ts +17 -0
  266. package/src/tools/k8s-ops.ts +819 -0
  267. package/src/tools/schemas/converter.ts +184 -0
  268. package/src/tools/schemas/devops.ts +612 -0
  269. package/src/tools/schemas/index.ts +73 -0
  270. package/src/tools/schemas/standard.ts +1144 -0
  271. package/src/tools/schemas/types.ts +705 -0
  272. package/src/tools/terraform-ops.ts +862 -0
  273. package/src/types/ambient.d.ts +193 -0
  274. package/src/types/config.ts +83 -0
  275. package/src/types/drift.ts +116 -0
  276. package/src/types/enterprise.ts +335 -0
  277. package/src/types/index.ts +20 -0
  278. package/src/types/plan.ts +44 -0
  279. package/src/types/request.ts +65 -0
  280. package/src/types/response.ts +54 -0
  281. package/src/types/service.ts +51 -0
  282. package/src/ui/App.tsx +997 -0
  283. package/src/ui/DeployPreview.tsx +169 -0
  284. package/src/ui/Header.tsx +68 -0
  285. package/src/ui/InputBox.tsx +350 -0
  286. package/src/ui/MessageList.tsx +585 -0
  287. package/src/ui/PermissionPrompt.tsx +151 -0
  288. package/src/ui/StatusBar.tsx +158 -0
  289. package/src/ui/ToolCallDisplay.tsx +409 -0
  290. package/src/ui/chat-ui.ts +853 -0
  291. package/src/ui/index.ts +33 -0
  292. package/src/ui/ink/index.ts +711 -0
  293. package/src/ui/streaming.ts +176 -0
  294. package/src/ui/types.ts +57 -0
  295. package/src/utils/analytics.ts +72 -0
  296. package/src/utils/cost-warning.ts +27 -0
  297. package/src/utils/env.ts +46 -0
  298. package/src/utils/errors.ts +69 -0
  299. package/src/utils/event-bus.ts +38 -0
  300. package/src/utils/index.ts +24 -0
  301. package/src/utils/logger.ts +171 -0
  302. package/src/utils/rate-limiter.ts +121 -0
  303. package/src/utils/service-auth.ts +49 -0
  304. package/src/utils/validation.ts +53 -0
  305. package/src/version.ts +4 -0
  306. package/src/watcher/index.ts +163 -0
  307. package/src/wizard/approval.ts +383 -0
  308. package/src/wizard/index.ts +25 -0
  309. package/src/wizard/prompts.ts +338 -0
  310. package/src/wizard/types.ts +171 -0
  311. package/src/wizard/ui.ts +556 -0
  312. package/src/wizard/wizard.ts +304 -0
  313. package/tsconfig.json +24 -0
@@ -0,0 +1,596 @@
1
+ /**
2
+ * Security Scanner - Scan codebase for common security issues.
3
+ *
4
+ * Walks a directory tree, applies regex-based patterns to detect hardcoded
5
+ * secrets, open security groups, public S3 buckets, missing encryption,
6
+ * exposed ports, SQL injection risks, and insecure HTTP URLs.
7
+ *
8
+ * Binary files and configurable exclusion directories are skipped.
9
+ * Results are returned sorted by severity (CRITICAL first).
10
+ */
11
+
12
+ import * as fs from 'node:fs';
13
+ import * as path from 'node:path';
14
+
15
+ // ---------------------------------------------------------------------------
16
+ // Types
17
+ // ---------------------------------------------------------------------------
18
+
19
+ /** Severity level for a security finding */
20
+ export type Severity = 'CRITICAL' | 'HIGH' | 'MEDIUM' | 'LOW';
21
+
22
+ /** A single security finding produced by the scanner */
23
+ export interface SecurityFinding {
24
+ /** Unique identifier for this finding */
25
+ id: string;
26
+ /** Severity level */
27
+ severity: Severity;
28
+ /** Short title describing the issue */
29
+ title: string;
30
+ /** Detailed description of the issue */
31
+ description: string;
32
+ /** File where the issue was found */
33
+ file?: string;
34
+ /** Line number within the file */
35
+ line?: number;
36
+ /** Actionable recommendation to fix the issue */
37
+ recommendation: string;
38
+ }
39
+
40
+ /** Aggregate result of a security scan */
41
+ export interface ScanResult {
42
+ /** All findings discovered during the scan */
43
+ findings: SecurityFinding[];
44
+ /** Total number of files inspected */
45
+ scannedFiles: number;
46
+ /** Wall-clock duration of the scan in milliseconds */
47
+ scanDuration: number;
48
+ /** Timestamp when the scan completed */
49
+ timestamp: Date;
50
+ }
51
+
52
+ /** Options controlling which files and directories are scanned */
53
+ export interface ScanOptions {
54
+ /** Root directory to scan */
55
+ dir: string;
56
+ /** File glob patterns to include (e.g. ['*.ts', '*.tf']). If omitted, all text files are scanned. */
57
+ patterns?: string[];
58
+ /** Directory names to skip (defaults to node_modules, .git, dist) */
59
+ exclude?: string[];
60
+ /** Maximum number of files to scan (defaults to 1000) */
61
+ maxFiles?: number;
62
+ }
63
+
64
+ // ---------------------------------------------------------------------------
65
+ // Severity ordering (for sort)
66
+ // ---------------------------------------------------------------------------
67
+
68
+ const SEVERITY_ORDER: Record<Severity, number> = {
69
+ CRITICAL: 0,
70
+ HIGH: 1,
71
+ MEDIUM: 2,
72
+ LOW: 3,
73
+ };
74
+
75
+ // ---------------------------------------------------------------------------
76
+ // Detection rules
77
+ // ---------------------------------------------------------------------------
78
+
79
+ interface DetectionRule {
80
+ id: string;
81
+ severity: Severity;
82
+ title: string;
83
+ description: string;
84
+ recommendation: string;
85
+ pattern: RegExp;
86
+ /** Optional: only apply to files matching these extensions */
87
+ fileExtensions?: string[];
88
+ }
89
+
90
+ const DETECTION_RULES: DetectionRule[] = [
91
+ // -- Hardcoded secrets --
92
+ {
93
+ id: 'SEC-001',
94
+ severity: 'CRITICAL',
95
+ title: 'Hardcoded API key or secret',
96
+ description:
97
+ 'A potential API key, secret, password, or token is hardcoded in the source code. ' +
98
+ 'Hardcoded credentials can be extracted from version control history.',
99
+ recommendation:
100
+ 'Move the secret to an environment variable or a secrets manager (e.g. AWS Secrets Manager, HashiCorp Vault).',
101
+ pattern:
102
+ /(?:api[_-]?key|api[_-]?secret|secret[_-]?key|access[_-]?key|auth[_-]?token|private[_-]?key)\s*[:=]\s*['"][^'"]{8,}['"]/i,
103
+ },
104
+ {
105
+ id: 'SEC-002',
106
+ severity: 'CRITICAL',
107
+ title: 'Hardcoded password',
108
+ description:
109
+ 'A password value appears to be hardcoded in the source. This is a critical risk ' +
110
+ 'if the file is committed to version control.',
111
+ recommendation:
112
+ 'Use environment variables or a secrets manager instead of embedding passwords in code.',
113
+ pattern: /(?:password|passwd|pwd)\s*[:=]\s*['"][^'"]{4,}['"]/i,
114
+ },
115
+ {
116
+ id: 'SEC-003',
117
+ severity: 'CRITICAL',
118
+ title: 'Hardcoded bearer or authorization token',
119
+ description:
120
+ 'An authorization header or bearer token is hardcoded, allowing credential theft from source.',
121
+ recommendation: 'Inject tokens at runtime via environment variables or a credential helper.',
122
+ pattern: /(?:bearer\s+[A-Za-z0-9\-._~+/]+=*|authorization['"]\s*:\s*['"][^'"]{10,}['"])/i,
123
+ },
124
+ {
125
+ id: 'SEC-004',
126
+ severity: 'HIGH',
127
+ title: 'AWS access key ID detected',
128
+ description:
129
+ 'A string matching the AWS access key ID format (AKIA...) was found. If valid, ' +
130
+ 'it grants access to AWS resources.',
131
+ recommendation:
132
+ 'Rotate the key immediately and store credentials via AWS IAM roles or environment variables.',
133
+ pattern: /AKIA[0-9A-Z]{16}/,
134
+ },
135
+ {
136
+ id: 'SEC-005',
137
+ severity: 'HIGH',
138
+ title: 'Private key material detected',
139
+ description: 'A PEM-encoded private key header was found in source code.',
140
+ recommendation: 'Store private keys outside the repository in a secure secrets store.',
141
+ pattern: /-----BEGIN (?:RSA |EC |DSA )?PRIVATE KEY-----/,
142
+ },
143
+
144
+ // -- Terraform-specific --
145
+ {
146
+ id: 'TF-001',
147
+ severity: 'HIGH',
148
+ title: 'Open security group (0.0.0.0/0)',
149
+ description:
150
+ 'A Terraform security group rule allows traffic from any IP address (0.0.0.0/0). ' +
151
+ 'This exposes services to the entire internet.',
152
+ recommendation: 'Restrict CIDR blocks to known IP ranges required for your use case.',
153
+ pattern: /cidr_blocks\s*=\s*\[?\s*["']0\.0\.0\.0\/0["']/,
154
+ fileExtensions: ['.tf', '.tf.json'],
155
+ },
156
+ {
157
+ id: 'TF-002',
158
+ severity: 'HIGH',
159
+ title: 'Public S3 bucket ACL',
160
+ description:
161
+ 'An S3 bucket is configured with a public ACL (public-read or public-read-write). ' +
162
+ 'This makes the bucket contents accessible to anyone on the internet.',
163
+ recommendation: 'Set acl to "private" and use bucket policies for fine-grained access control.',
164
+ pattern: /acl\s*=\s*["']public-read(?:-write)?["']/,
165
+ fileExtensions: ['.tf', '.tf.json'],
166
+ },
167
+ {
168
+ id: 'TF-003',
169
+ severity: 'MEDIUM',
170
+ title: 'S3 bucket missing server-side encryption',
171
+ description:
172
+ 'An aws_s3_bucket resource was found without an accompanying server_side_encryption_configuration block.',
173
+ recommendation: 'Add a server_side_encryption_configuration block with AES256 or aws:kms.',
174
+ pattern:
175
+ /resource\s+["']aws_s3_bucket["']\s+["'][^"']+["']\s*\{(?:(?!server_side_encryption_configuration)[^}])*\}/s,
176
+ fileExtensions: ['.tf'],
177
+ },
178
+ {
179
+ id: 'TF-004',
180
+ severity: 'MEDIUM',
181
+ title: 'RDS instance missing encryption',
182
+ description:
183
+ 'An aws_db_instance resource does not have storage_encrypted = true, leaving data at rest unencrypted.',
184
+ recommendation: 'Set storage_encrypted = true on all RDS instances.',
185
+ pattern:
186
+ /resource\s+["']aws_db_instance["']\s+["'][^"']+["']\s*\{(?:(?!storage_encrypted\s*=\s*true)[^}])*\}/s,
187
+ fileExtensions: ['.tf'],
188
+ },
189
+ {
190
+ id: 'TF-005',
191
+ severity: 'HIGH',
192
+ title: 'IAM policy with wildcard actions',
193
+ description:
194
+ 'An IAM policy grants "*" (all actions), violating the principle of least privilege.',
195
+ recommendation: 'Restrict actions to only those required by the workload.',
196
+ pattern: /["']Action["']\s*:\s*["']\*["']/,
197
+ fileExtensions: ['.tf', '.json'],
198
+ },
199
+
200
+ // -- Docker / Compose --
201
+ {
202
+ id: 'DOCKER-001',
203
+ severity: 'MEDIUM',
204
+ title: 'Port bound to all interfaces (0.0.0.0)',
205
+ description:
206
+ 'A Docker Compose service binds a port to 0.0.0.0, exposing it on all network interfaces.',
207
+ recommendation:
208
+ 'Bind to 127.0.0.1 for local-only access, or use a reverse proxy for external traffic.',
209
+ pattern: /["']?0\.0\.0\.0:\d+:\d+["']?/,
210
+ fileExtensions: ['.yml', '.yaml'],
211
+ },
212
+
213
+ // -- SQL injection --
214
+ {
215
+ id: 'CODE-001',
216
+ severity: 'HIGH',
217
+ title: 'Potential SQL injection via string concatenation',
218
+ description:
219
+ 'A SQL query appears to be built with string concatenation or template literals that ' +
220
+ 'include variable interpolation, which can lead to SQL injection.',
221
+ recommendation:
222
+ 'Use parameterized queries or prepared statements instead of string concatenation.',
223
+ pattern:
224
+ /(?:SELECT|INSERT|UPDATE|DELETE|DROP|CREATE|ALTER)\s+.*(?:\$\{|\+\s*(?:req|params|query|input|user|body)\b)/i,
225
+ fileExtensions: ['.ts', '.js', '.mjs', '.cjs'],
226
+ },
227
+
228
+ // -- Insecure HTTP --
229
+ {
230
+ id: 'CODE-002',
231
+ severity: 'LOW',
232
+ title: 'Insecure HTTP URL',
233
+ description:
234
+ 'An http:// URL was found in configuration or source code. Data transmitted over ' +
235
+ 'plain HTTP is vulnerable to interception.',
236
+ recommendation: 'Use https:// to encrypt data in transit.',
237
+ pattern: /["']http:\/\/(?!localhost|127\.0\.0\.1|0\.0\.0\.0|::1)[^'"]+["']/,
238
+ fileExtensions: [
239
+ '.ts',
240
+ '.js',
241
+ '.json',
242
+ '.yml',
243
+ '.yaml',
244
+ '.tf',
245
+ '.env',
246
+ '.cfg',
247
+ '.conf',
248
+ '.toml',
249
+ ],
250
+ },
251
+
252
+ // -- Disabled TLS verification --
253
+ {
254
+ id: 'CODE-003',
255
+ severity: 'HIGH',
256
+ title: 'TLS certificate verification disabled',
257
+ description:
258
+ 'TLS/SSL certificate verification is being disabled, making connections vulnerable ' +
259
+ 'to man-in-the-middle attacks.',
260
+ recommendation: 'Do not disable certificate verification in production environments.',
261
+ pattern:
262
+ /(?:rejectUnauthorized\s*:\s*false|NODE_TLS_REJECT_UNAUTHORIZED\s*=\s*['"]?0|verify\s*=\s*False|InsecureSkipVerify\s*:\s*true)/i,
263
+ },
264
+ ];
265
+
266
+ // ---------------------------------------------------------------------------
267
+ // File extensions considered "text" (non-binary)
268
+ // ---------------------------------------------------------------------------
269
+
270
+ const TEXT_EXTENSIONS = new Set([
271
+ '.ts',
272
+ '.tsx',
273
+ '.js',
274
+ '.jsx',
275
+ '.mjs',
276
+ '.cjs',
277
+ '.json',
278
+ '.yaml',
279
+ '.yml',
280
+ '.toml',
281
+ '.cfg',
282
+ '.conf',
283
+ '.ini',
284
+ '.tf',
285
+ '.tfvars',
286
+ '.hcl',
287
+ '.sh',
288
+ '.bash',
289
+ '.zsh',
290
+ '.py',
291
+ '.rb',
292
+ '.go',
293
+ '.java',
294
+ '.rs',
295
+ '.c',
296
+ '.cpp',
297
+ '.h',
298
+ '.md',
299
+ '.txt',
300
+ '.csv',
301
+ '.sql',
302
+ '.graphql',
303
+ '.gql',
304
+ '.env',
305
+ '.env.example',
306
+ '.env.local',
307
+ '.xml',
308
+ '.html',
309
+ '.css',
310
+ '.scss',
311
+ '.less',
312
+ '.dockerfile',
313
+ '.dockerignore',
314
+ '.gitignore',
315
+ '.npmignore',
316
+ '.tf.json',
317
+ ]);
318
+
319
+ /** Names that indicate a binary or generated file regardless of extension */
320
+ const BINARY_NAMES = new Set([
321
+ 'package-lock.json',
322
+ 'bun.lock',
323
+ 'bun.lockb',
324
+ 'yarn.lock',
325
+ 'pnpm-lock.yaml',
326
+ ]);
327
+
328
+ // ---------------------------------------------------------------------------
329
+ // Helpers
330
+ // ---------------------------------------------------------------------------
331
+
332
+ const DEFAULT_EXCLUDES = [
333
+ 'node_modules',
334
+ '.git',
335
+ 'dist',
336
+ 'coverage',
337
+ '.next',
338
+ 'build',
339
+ '__pycache__',
340
+ ];
341
+
342
+ /**
343
+ * Determine whether a file should be scanned based on its extension and name.
344
+ */
345
+ function isTextFile(filePath: string): boolean {
346
+ const basename = path.basename(filePath);
347
+ if (BINARY_NAMES.has(basename)) {
348
+ return false;
349
+ }
350
+
351
+ // Files without an extension (e.g. Dockerfile, Makefile) are treated as text
352
+ const ext = path.extname(filePath).toLowerCase();
353
+ if (ext === '') {
354
+ return true;
355
+ }
356
+
357
+ return TEXT_EXTENSIONS.has(ext);
358
+ }
359
+
360
+ /**
361
+ * Check whether a file matches the user-provided glob patterns (simple suffix matching).
362
+ */
363
+ function matchesPatterns(filePath: string, patterns: string[]): boolean {
364
+ if (patterns.length === 0) {
365
+ return true;
366
+ }
367
+ const basename = path.basename(filePath);
368
+ const ext = path.extname(filePath).toLowerCase();
369
+
370
+ return patterns.some(p => {
371
+ // Handle "*.ext" patterns
372
+ if (p.startsWith('*.')) {
373
+ return ext === p.slice(1).toLowerCase() || ext === p.slice(1);
374
+ }
375
+ // Exact filename match
376
+ return basename === p;
377
+ });
378
+ }
379
+
380
+ /**
381
+ * Check whether a detection rule applies to a given file extension.
382
+ */
383
+ function ruleAppliesToFile(rule: DetectionRule, filePath: string): boolean {
384
+ if (!rule.fileExtensions) {
385
+ return true;
386
+ }
387
+ const ext = path.extname(filePath).toLowerCase();
388
+ return rule.fileExtensions.includes(ext);
389
+ }
390
+
391
+ /**
392
+ * Recursively collect file paths from a directory, respecting exclusions and limits.
393
+ */
394
+ function collectFiles(
395
+ dir: string,
396
+ exclude: Set<string>,
397
+ patterns: string[],
398
+ maxFiles: number,
399
+ collected: string[] = []
400
+ ): string[] {
401
+ if (collected.length >= maxFiles) {
402
+ return collected;
403
+ }
404
+
405
+ let entries: fs.Dirent[];
406
+ try {
407
+ entries = fs.readdirSync(dir, { withFileTypes: true });
408
+ } catch {
409
+ // Permission denied or unreadable directory -- skip silently
410
+ return collected;
411
+ }
412
+
413
+ for (const entry of entries) {
414
+ if (collected.length >= maxFiles) {
415
+ break;
416
+ }
417
+
418
+ if (entry.isDirectory()) {
419
+ if (exclude.has(entry.name)) {
420
+ continue;
421
+ }
422
+ collectFiles(path.join(dir, entry.name), exclude, patterns, maxFiles, collected);
423
+ } else if (entry.isFile()) {
424
+ const fullPath = path.join(dir, entry.name);
425
+ if (isTextFile(fullPath) && matchesPatterns(fullPath, patterns)) {
426
+ collected.push(fullPath);
427
+ }
428
+ }
429
+ }
430
+
431
+ return collected;
432
+ }
433
+
434
+ // ---------------------------------------------------------------------------
435
+ // Public API
436
+ // ---------------------------------------------------------------------------
437
+
438
+ /**
439
+ * Scan a directory tree for common security issues.
440
+ *
441
+ * Walks through files in `options.dir`, applies regex-based detection rules,
442
+ * and returns all findings sorted by severity (CRITICAL first).
443
+ *
444
+ * @param options - Configuration controlling which files are scanned
445
+ * @returns Scan result containing findings, file count, and timing information
446
+ */
447
+ export async function scanSecurity(options: ScanOptions): Promise<ScanResult> {
448
+ const startTime = Date.now();
449
+
450
+ const excludeSet = new Set(options.exclude ?? DEFAULT_EXCLUDES);
451
+ const patterns = options.patterns ?? [];
452
+ const maxFiles = options.maxFiles ?? 1000;
453
+
454
+ // Collect files to scan
455
+ const files = collectFiles(options.dir, excludeSet, patterns, maxFiles);
456
+
457
+ const findings: SecurityFinding[] = [];
458
+
459
+ for (const filePath of files) {
460
+ let content: string;
461
+ try {
462
+ content = fs.readFileSync(filePath, 'utf-8');
463
+ } catch {
464
+ // Unreadable file -- skip
465
+ continue;
466
+ }
467
+
468
+ const lines = content.split('\n');
469
+ const relativePath = path.relative(options.dir, filePath);
470
+
471
+ for (const rule of DETECTION_RULES) {
472
+ if (!ruleAppliesToFile(rule, filePath)) {
473
+ continue;
474
+ }
475
+
476
+ // For multiline patterns (dotAll flag), match against the whole file
477
+ if (rule.pattern.flags.includes('s')) {
478
+ if (rule.pattern.test(content)) {
479
+ findings.push({
480
+ id: `${rule.id}-${crypto.randomUUID().slice(0, 8)}`,
481
+ severity: rule.severity,
482
+ title: rule.title,
483
+ description: rule.description,
484
+ file: relativePath,
485
+ recommendation: rule.recommendation,
486
+ });
487
+ }
488
+ continue;
489
+ }
490
+
491
+ // Line-by-line matching for single-line patterns
492
+ for (let i = 0; i < lines.length; i++) {
493
+ if (rule.pattern.test(lines[i])) {
494
+ findings.push({
495
+ id: `${rule.id}-${crypto.randomUUID().slice(0, 8)}`,
496
+ severity: rule.severity,
497
+ title: rule.title,
498
+ description: rule.description,
499
+ file: relativePath,
500
+ line: i + 1,
501
+ recommendation: rule.recommendation,
502
+ });
503
+ }
504
+ }
505
+ }
506
+ }
507
+
508
+ // Sort by severity (CRITICAL first), then by file path
509
+ findings.sort((a, b) => {
510
+ const severityDiff = SEVERITY_ORDER[a.severity] - SEVERITY_ORDER[b.severity];
511
+ if (severityDiff !== 0) {
512
+ return severityDiff;
513
+ }
514
+ return (a.file ?? '').localeCompare(b.file ?? '');
515
+ });
516
+
517
+ return {
518
+ findings,
519
+ scannedFiles: files.length,
520
+ scanDuration: Date.now() - startTime,
521
+ timestamp: new Date(),
522
+ };
523
+ }
524
+
525
+ /**
526
+ * Format an array of security findings as a human-readable report string.
527
+ *
528
+ * Each finding is displayed with a severity indicator, title, file location,
529
+ * description, and recommendation.
530
+ *
531
+ * @param findings - The findings to format
532
+ * @returns Formatted multi-line report
533
+ */
534
+ export function formatFindings(findings: SecurityFinding[]): string {
535
+ if (findings.length === 0) {
536
+ return 'No security issues found.';
537
+ }
538
+
539
+ const severityIcon: Record<Severity, string> = {
540
+ CRITICAL: '[CRITICAL]',
541
+ HIGH: '[HIGH] ',
542
+ MEDIUM: '[MEDIUM] ',
543
+ LOW: '[LOW] ',
544
+ };
545
+
546
+ const lines: string[] = [
547
+ `Security Scan Report - ${findings.length} finding(s)`,
548
+ '='.repeat(60),
549
+ '',
550
+ ];
551
+
552
+ const grouped: Record<Severity, SecurityFinding[]> = {
553
+ CRITICAL: [],
554
+ HIGH: [],
555
+ MEDIUM: [],
556
+ LOW: [],
557
+ };
558
+
559
+ for (const f of findings) {
560
+ grouped[f.severity].push(f);
561
+ }
562
+
563
+ for (const severity of ['CRITICAL', 'HIGH', 'MEDIUM', 'LOW'] as Severity[]) {
564
+ const group = grouped[severity];
565
+ if (group.length === 0) {
566
+ continue;
567
+ }
568
+
569
+ lines.push(`--- ${severity} (${group.length}) ---`);
570
+ lines.push('');
571
+
572
+ for (const finding of group) {
573
+ lines.push(` ${severityIcon[finding.severity]} ${finding.title}`);
574
+ if (finding.file) {
575
+ const loc = finding.line ? `${finding.file}:${finding.line}` : finding.file;
576
+ lines.push(` Location: ${loc}`);
577
+ }
578
+ lines.push(` ${finding.description}`);
579
+ lines.push(` Recommendation: ${finding.recommendation}`);
580
+ lines.push('');
581
+ }
582
+ }
583
+
584
+ // Summary counts
585
+ const criticalCount = grouped.CRITICAL.length;
586
+ const highCount = grouped.HIGH.length;
587
+ const mediumCount = grouped.MEDIUM.length;
588
+ const lowCount = grouped.LOW.length;
589
+
590
+ lines.push('='.repeat(60));
591
+ lines.push(
592
+ `Summary: ${criticalCount} critical, ${highCount} high, ${mediumCount} medium, ${lowCount} low`
593
+ );
594
+
595
+ return lines.join('\n');
596
+ }
@@ -0,0 +1,75 @@
1
+ /**
2
+ * Auth Guard - First-Run Detection
3
+ * Detects when authentication is needed and triggers the login wizard
4
+ */
5
+
6
+ import { authStore } from './store';
7
+
8
+ /**
9
+ * Environment variable names for LLM provider API keys
10
+ */
11
+ const PROVIDER_ENV_VARS = [
12
+ 'ANTHROPIC_API_KEY',
13
+ 'OPENAI_API_KEY',
14
+ 'GOOGLE_API_KEY',
15
+ 'OPENROUTER_API_KEY',
16
+ 'GROQ_API_KEY',
17
+ 'TOGETHER_API_KEY',
18
+ 'DEEPSEEK_API_KEY',
19
+ 'FIREWORKS_API_KEY',
20
+ 'PERPLEXITY_API_KEY',
21
+ 'OLLAMA_BASE_URL', // Ollama doesn't need API key, just base URL
22
+ 'AWS_ACCESS_KEY_ID', // Bedrock uses AWS IAM credentials
23
+ ];
24
+
25
+ /**
26
+ * Check if any provider API key is available via environment variables
27
+ */
28
+ function hasEnvVarCredentials(): boolean {
29
+ return PROVIDER_ENV_VARS.some(envVar => !!process.env[envVar]);
30
+ }
31
+
32
+ /**
33
+ * Check if authentication is required
34
+ * Returns true if no providers configured in auth.json AND no env vars set
35
+ */
36
+ export function requiresAuth(): boolean {
37
+ // If auth.json has providers, auth is not required
38
+ if (authStore.exists()) {
39
+ return false;
40
+ }
41
+
42
+ // If any provider env var is set, auth is not required
43
+ if (hasEnvVarCredentials()) {
44
+ return false;
45
+ }
46
+
47
+ return true;
48
+ }
49
+
50
+ /**
51
+ * Check if authentication is configured
52
+ * Returns true if there are any providers configured (auth.json or env vars)
53
+ */
54
+ export function isAuthenticated(): boolean {
55
+ return authStore.exists() || hasEnvVarCredentials();
56
+ }
57
+
58
+ /**
59
+ * Get a human-readable auth status message
60
+ */
61
+ export function getAuthMessage(): string {
62
+ if (!requiresAuth()) {
63
+ const status = authStore.getStatus();
64
+ const providerCount = status.providers.length;
65
+ const defaultProvider = status.defaultProvider;
66
+
67
+ if (status.hasIdentity) {
68
+ return `Authenticated as ${status.identity?.username} with ${providerCount} provider(s). Default: ${defaultProvider}`;
69
+ }
70
+
71
+ return `Configured with ${providerCount} provider(s). Default: ${defaultProvider}`;
72
+ }
73
+
74
+ return 'Not authenticated. Run `nimbus login` to get started.';
75
+ }