@loxia-labs/loxia-autopilot-one 1.0.1 → 1.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (120) hide show
  1. package/README.md +44 -54
  2. package/bin/cli.js +1 -115
  3. package/bin/loxia-terminal-v2.js +3 -0
  4. package/bin/loxia-terminal.js +3 -0
  5. package/bin/start-with-terminal.js +3 -0
  6. package/package.json +14 -15
  7. package/scripts/install-scanners.js +1 -235
  8. package/src/analyzers/CSSAnalyzer.js +1 -297
  9. package/src/analyzers/ConfigValidator.js +1 -690
  10. package/src/analyzers/ESLintAnalyzer.js +1 -320
  11. package/src/analyzers/JavaScriptAnalyzer.js +1 -261
  12. package/src/analyzers/PrettierFormatter.js +1 -247
  13. package/src/analyzers/PythonAnalyzer.js +1 -266
  14. package/src/analyzers/SecurityAnalyzer.js +1 -729
  15. package/src/analyzers/TypeScriptAnalyzer.js +1 -247
  16. package/src/analyzers/codeCloneDetector/analyzer.js +1 -344
  17. package/src/analyzers/codeCloneDetector/detector.js +1 -203
  18. package/src/analyzers/codeCloneDetector/index.js +1 -160
  19. package/src/analyzers/codeCloneDetector/parser.js +1 -199
  20. package/src/analyzers/codeCloneDetector/reporter.js +1 -148
  21. package/src/analyzers/codeCloneDetector/scanner.js +1 -59
  22. package/src/core/agentPool.js +1 -1474
  23. package/src/core/agentScheduler.js +1 -2147
  24. package/src/core/contextManager.js +1 -709
  25. package/src/core/messageProcessor.js +1 -732
  26. package/src/core/orchestrator.js +1 -548
  27. package/src/core/stateManager.js +1 -877
  28. package/src/index.js +1 -631
  29. package/src/interfaces/cli.js +1 -549
  30. package/src/interfaces/terminal/__tests__/smoke/advancedFeatures.test.js +1 -0
  31. package/src/interfaces/terminal/__tests__/smoke/agentControl.test.js +1 -0
  32. package/src/interfaces/terminal/__tests__/smoke/agents.test.js +1 -0
  33. package/src/interfaces/terminal/__tests__/smoke/components.test.js +1 -0
  34. package/src/interfaces/terminal/__tests__/smoke/connection.test.js +1 -0
  35. package/src/interfaces/terminal/__tests__/smoke/enhancements.test.js +1 -0
  36. package/src/interfaces/terminal/__tests__/smoke/imports.test.js +1 -0
  37. package/src/interfaces/terminal/__tests__/smoke/messages.test.js +1 -0
  38. package/src/interfaces/terminal/__tests__/smoke/tools.test.js +1 -0
  39. package/src/interfaces/terminal/api/apiClient.js +1 -0
  40. package/src/interfaces/terminal/api/messageRouter.js +1 -0
  41. package/src/interfaces/terminal/api/session.js +1 -0
  42. package/src/interfaces/terminal/api/websocket.js +1 -0
  43. package/src/interfaces/terminal/components/AgentCreator.js +1 -0
  44. package/src/interfaces/terminal/components/AgentEditor.js +1 -0
  45. package/src/interfaces/terminal/components/AgentSwitcher.js +1 -0
  46. package/src/interfaces/terminal/components/ErrorBoundary.js +1 -0
  47. package/src/interfaces/terminal/components/ErrorPanel.js +1 -0
  48. package/src/interfaces/terminal/components/Header.js +1 -0
  49. package/src/interfaces/terminal/components/HelpPanel.js +1 -0
  50. package/src/interfaces/terminal/components/InputBox.js +1 -0
  51. package/src/interfaces/terminal/components/Layout.js +1 -0
  52. package/src/interfaces/terminal/components/LoadingSpinner.js +1 -0
  53. package/src/interfaces/terminal/components/MessageList.js +1 -0
  54. package/src/interfaces/terminal/components/MultilineTextInput.js +1 -0
  55. package/src/interfaces/terminal/components/SearchPanel.js +1 -0
  56. package/src/interfaces/terminal/components/SettingsPanel.js +1 -0
  57. package/src/interfaces/terminal/components/StatusBar.js +1 -0
  58. package/src/interfaces/terminal/components/TextInput.js +1 -0
  59. package/src/interfaces/terminal/config/agentEditorConstants.js +1 -0
  60. package/src/interfaces/terminal/config/constants.js +1 -0
  61. package/src/interfaces/terminal/index.js +1 -0
  62. package/src/interfaces/terminal/state/useAgentControl.js +1 -0
  63. package/src/interfaces/terminal/state/useAgents.js +1 -0
  64. package/src/interfaces/terminal/state/useConnection.js +1 -0
  65. package/src/interfaces/terminal/state/useMessages.js +1 -0
  66. package/src/interfaces/terminal/state/useTools.js +1 -0
  67. package/src/interfaces/terminal/utils/debugLogger.js +1 -0
  68. package/src/interfaces/terminal/utils/settingsStorage.js +1 -0
  69. package/src/interfaces/terminal/utils/theme.js +1 -0
  70. package/src/interfaces/webServer.js +1 -2162
  71. package/src/modules/fileExplorer/controller.js +1 -280
  72. package/src/modules/fileExplorer/index.js +1 -37
  73. package/src/modules/fileExplorer/middleware.js +1 -92
  74. package/src/modules/fileExplorer/routes.js +1 -125
  75. package/src/modules/fileExplorer/types.js +1 -44
  76. package/src/services/aiService.js +1 -1232
  77. package/src/services/apiKeyManager.js +1 -164
  78. package/src/services/benchmarkService.js +1 -366
  79. package/src/services/budgetService.js +1 -539
  80. package/src/services/contextInjectionService.js +1 -247
  81. package/src/services/conversationCompactionService.js +1 -637
  82. package/src/services/errorHandler.js +1 -810
  83. package/src/services/fileAttachmentService.js +1 -544
  84. package/src/services/modelRouterService.js +1 -366
  85. package/src/services/modelsService.js +1 -322
  86. package/src/services/qualityInspector.js +1 -796
  87. package/src/services/tokenCountingService.js +1 -536
  88. package/src/tools/agentCommunicationTool.js +1 -1344
  89. package/src/tools/agentDelayTool.js +1 -485
  90. package/src/tools/asyncToolManager.js +1 -604
  91. package/src/tools/baseTool.js +1 -800
  92. package/src/tools/browserTool.js +1 -920
  93. package/src/tools/cloneDetectionTool.js +1 -621
  94. package/src/tools/dependencyResolverTool.js +1 -1215
  95. package/src/tools/fileContentReplaceTool.js +1 -875
  96. package/src/tools/fileSystemTool.js +1 -1107
  97. package/src/tools/fileTreeTool.js +1 -853
  98. package/src/tools/imageTool.js +1 -901
  99. package/src/tools/importAnalyzerTool.js +1 -1060
  100. package/src/tools/jobDoneTool.js +1 -248
  101. package/src/tools/seekTool.js +1 -956
  102. package/src/tools/staticAnalysisTool.js +1 -1778
  103. package/src/tools/taskManagerTool.js +1 -2873
  104. package/src/tools/terminalTool.js +1 -2304
  105. package/src/tools/webTool.js +1 -1430
  106. package/src/types/agent.js +1 -519
  107. package/src/types/contextReference.js +1 -972
  108. package/src/types/conversation.js +1 -730
  109. package/src/types/toolCommand.js +1 -747
  110. package/src/utilities/attachmentValidator.js +1 -292
  111. package/src/utilities/configManager.js +1 -582
  112. package/src/utilities/constants.js +1 -722
  113. package/src/utilities/directoryAccessManager.js +1 -535
  114. package/src/utilities/fileProcessor.js +1 -307
  115. package/src/utilities/logger.js +1 -436
  116. package/src/utilities/tagParser.js +1 -1246
  117. package/src/utilities/toolConstants.js +1 -317
  118. package/web-ui/build/index.html +2 -2
  119. package/web-ui/build/static/{index-Dy2bYbOa.css → index-CClD1090.css} +1 -1
  120. package/web-ui/build/static/{index-CjkkcnFA.js → index-lCBai6dX.js} +66 -67
@@ -1,690 +1 @@
1
- /**
2
- * ConfigValidator - Validate configuration files for errors and security issues
3
- *
4
- * Validates common configuration files:
5
- * - package.json, tsconfig.json (JSON Schema)
6
- * - Dockerfile (hadolint)
7
- * - docker-compose.yml (yamllint)
8
- * - Kubernetes YAML (checkov, yamllint)
9
- * - Terraform (checkov)
10
- * - .env files (secret detection)
11
- * - GitHub Actions workflows (yamllint)
12
- */
13
-
14
- import { exec } from 'child_process';
15
- import { promisify } from 'util';
16
- import path from 'path';
17
- import fs from 'fs/promises';
18
- import { STATIC_ANALYSIS } from '../utilities/constants.js';
19
-
20
- const execAsync = promisify(exec);
21
-
22
- class ConfigValidator {
23
- constructor(logger = null) {
24
- this.logger = logger;
25
- this.availableScanners = null;
26
- this.scannerCache = new Map();
27
- }
28
-
29
- /**
30
- * Detect which validation tools are available
31
- * @returns {Promise<Object>} Available validators
32
- */
33
- async detectAvailableValidators() {
34
- // Return cached result if available
35
- if (this.availableScanners !== null) {
36
- return this.availableScanners;
37
- }
38
-
39
- const available = {
40
- checkov: false,
41
- hadolint: false,
42
- yamllint: false,
43
- jsonSchema: false
44
- };
45
-
46
- // Check for checkov (Infrastructure as Code scanner)
47
- try {
48
- await execAsync('checkov --version', { timeout: 5000 });
49
- available.checkov = true;
50
- this.logger?.debug('checkov detected');
51
- } catch (error) {
52
- this.logger?.debug('checkov not available', { error: error.message });
53
- }
54
-
55
- // Check for hadolint (Dockerfile linter)
56
- try {
57
- await execAsync('hadolint --version', { timeout: 5000 });
58
- available.hadolint = true;
59
- this.logger?.debug('hadolint detected');
60
- } catch (error) {
61
- this.logger?.debug('hadolint not available', { error: error.message });
62
- }
63
-
64
- // Check for yamllint (YAML linter)
65
- try {
66
- await execAsync('yamllint --version', { timeout: 5000 });
67
- available.yamllint = true;
68
- this.logger?.debug('yamllint detected');
69
- } catch (error) {
70
- this.logger?.debug('yamllint not available', { error: error.message });
71
- }
72
-
73
- // Check for ajv (JSON Schema validation - npm package)
74
- try {
75
- await import('ajv');
76
- available.jsonSchema = true;
77
- this.logger?.debug('JSON Schema validation available');
78
- } catch (error) {
79
- this.logger?.debug('ajv not available', { error: error.message });
80
- }
81
-
82
- this.availableScanners = available;
83
- return available;
84
- }
85
-
86
- /**
87
- * Validate a configuration file
88
- * @param {string} filePath - Path to config file
89
- * @param {Object} options - Validation options
90
- * @returns {Promise<Array>} Validation issues
91
- */
92
- async validate(filePath, options = {}) {
93
- const issues = [];
94
- const available = await this.detectAvailableValidators();
95
- const fileType = this.detectFileType(filePath);
96
-
97
- this.logger?.debug('Validating config file', { filePath, fileType });
98
-
99
- // Route to appropriate validator based on file type
100
- switch (fileType) {
101
- case 'dockerfile':
102
- if (available.hadolint) {
103
- const hadolintIssues = await this.validateDockerfile(filePath, options);
104
- issues.push(...hadolintIssues);
105
- }
106
- if (available.checkov) {
107
- const checkovIssues = await this.validateWithCheckov(filePath, 'dockerfile', options);
108
- issues.push(...checkovIssues);
109
- }
110
- break;
111
-
112
- case 'docker-compose':
113
- if (available.yamllint) {
114
- const yamlIssues = await this.validateYAML(filePath, options);
115
- issues.push(...yamlIssues);
116
- }
117
- if (available.checkov) {
118
- const checkovIssues = await this.validateWithCheckov(filePath, 'docker_compose', options);
119
- issues.push(...checkovIssues);
120
- }
121
- break;
122
-
123
- case 'kubernetes':
124
- if (available.yamllint) {
125
- const yamlIssues = await this.validateYAML(filePath, options);
126
- issues.push(...yamlIssues);
127
- }
128
- if (available.checkov) {
129
- const checkovIssues = await this.validateWithCheckov(filePath, 'kubernetes', options);
130
- issues.push(...checkovIssues);
131
- }
132
- break;
133
-
134
- case 'terraform':
135
- if (available.checkov) {
136
- const checkovIssues = await this.validateWithCheckov(filePath, 'terraform', options);
137
- issues.push(...checkovIssues);
138
- }
139
- break;
140
-
141
- case 'package.json':
142
- if (available.jsonSchema) {
143
- const schemaIssues = await this.validatePackageJson(filePath, options);
144
- issues.push(...schemaIssues);
145
- }
146
- break;
147
-
148
- case 'tsconfig.json':
149
- if (available.jsonSchema) {
150
- const schemaIssues = await this.validateTsConfig(filePath, options);
151
- issues.push(...schemaIssues);
152
- }
153
- break;
154
-
155
- case 'github-actions':
156
- if (available.yamllint) {
157
- const yamlIssues = await this.validateYAML(filePath, options);
158
- issues.push(...yamlIssues);
159
- }
160
- break;
161
-
162
- case 'env':
163
- // Always check .env files for secrets (no external tool needed)
164
- const secretIssues = await this.validateEnvFile(filePath, options);
165
- issues.push(...secretIssues);
166
- break;
167
-
168
- case 'yaml':
169
- if (available.yamllint) {
170
- const yamlIssues = await this.validateYAML(filePath, options);
171
- issues.push(...yamlIssues);
172
- }
173
- break;
174
-
175
- default:
176
- this.logger?.warn('Unknown config file type', { filePath, fileType });
177
- return [];
178
- }
179
-
180
- return this.normalizeResults(issues);
181
- }
182
-
183
- /**
184
- * Validate Dockerfile using hadolint
185
- * @private
186
- */
187
- async validateDockerfile(filePath, options = {}) {
188
- try {
189
- const result = await execAsync(
190
- `hadolint --format json "${filePath}"`,
191
- {
192
- maxBuffer: 10 * 1024 * 1024,
193
- timeout: 30000
194
- }
195
- );
196
-
197
- const output = JSON.parse(result.stdout);
198
- return this.parseHadolintResults(output, filePath);
199
- } catch (error) {
200
- // hadolint exits with non-zero if issues found
201
- if (error.stdout) {
202
- try {
203
- const output = JSON.parse(error.stdout);
204
- return this.parseHadolintResults(output, filePath);
205
- } catch (parseError) {
206
- this.logger?.error('Failed to parse hadolint output', {
207
- error: parseError.message
208
- });
209
- }
210
- }
211
- this.logger?.error('hadolint validation failed', { error: error.message });
212
- return [];
213
- }
214
- }
215
-
216
- /**
217
- * Parse hadolint results
218
- * @private
219
- */
220
- parseHadolintResults(output, filePath) {
221
- const issues = [];
222
-
223
- if (Array.isArray(output)) {
224
- for (const issue of output) {
225
- issues.push({
226
- file: filePath,
227
- line: issue.line || 1,
228
- column: issue.column || 1,
229
- severity: this.mapHadolintSeverity(issue.level),
230
- rule: issue.code,
231
- message: issue.message,
232
- category: 'dockerfile',
233
- validator: 'hadolint'
234
- });
235
- }
236
- }
237
-
238
- return issues;
239
- }
240
-
241
- /**
242
- * Validate YAML files using yamllint
243
- * @private
244
- */
245
- async validateYAML(filePath, options = {}) {
246
- try {
247
- const result = await execAsync(
248
- `yamllint -f parsable "${filePath}"`,
249
- {
250
- maxBuffer: 10 * 1024 * 1024,
251
- timeout: 30000
252
- }
253
- );
254
-
255
- return this.parseYamllintResults(result.stdout, filePath);
256
- } catch (error) {
257
- // yamllint exits with non-zero if issues found
258
- if (error.stdout) {
259
- return this.parseYamllintResults(error.stdout, filePath);
260
- }
261
- this.logger?.error('yamllint validation failed', { error: error.message });
262
- return [];
263
- }
264
- }
265
-
266
- /**
267
- * Parse yamllint results
268
- * @private
269
- */
270
- parseYamllintResults(output, filePath) {
271
- const issues = [];
272
- const lines = output.split('\n').filter(line => line.trim());
273
-
274
- for (const line of lines) {
275
- // Format: file:line:column: [level] message (rule)
276
- const match = line.match(/^(.+?):(\d+):(\d+):\s*\[(\w+)\]\s*(.+?)\s*\((.+?)\)/);
277
- if (match) {
278
- const [, file, lineNum, col, level, message, rule] = match;
279
- issues.push({
280
- file: filePath,
281
- line: parseInt(lineNum, 10),
282
- column: parseInt(col, 10),
283
- severity: this.mapYamllintSeverity(level),
284
- rule: rule,
285
- message: message,
286
- category: 'yaml',
287
- validator: 'yamllint'
288
- });
289
- }
290
- }
291
-
292
- return issues;
293
- }
294
-
295
- /**
296
- * Validate with checkov (Infrastructure as Code)
297
- * @private
298
- */
299
- async validateWithCheckov(filePath, framework, options = {}) {
300
- try {
301
- const result = await execAsync(
302
- `checkov -f "${filePath}" --framework ${framework} --output json --compact`,
303
- {
304
- maxBuffer: 10 * 1024 * 1024,
305
- timeout: 60000
306
- }
307
- );
308
-
309
- const output = JSON.parse(result.stdout);
310
- return this.parseCheckovResults(output, filePath);
311
- } catch (error) {
312
- // checkov exits with non-zero if issues found
313
- if (error.stdout) {
314
- try {
315
- const output = JSON.parse(error.stdout);
316
- return this.parseCheckovResults(output, filePath);
317
- } catch (parseError) {
318
- this.logger?.error('Failed to parse checkov output', {
319
- error: parseError.message
320
- });
321
- }
322
- }
323
- this.logger?.error('checkov validation failed', { error: error.message });
324
- return [];
325
- }
326
- }
327
-
328
- /**
329
- * Parse checkov results
330
- * @private
331
- */
332
- parseCheckovResults(output, filePath) {
333
- const issues = [];
334
-
335
- if (output.results && output.results.failed_checks) {
336
- for (const check of output.results.failed_checks) {
337
- issues.push({
338
- file: filePath,
339
- line: check.file_line_range ? check.file_line_range[0] : 1,
340
- column: 1,
341
- severity: this.mapCheckovSeverity(check.check_class),
342
- rule: check.check_id,
343
- message: check.check_name || check.check_id,
344
- category: 'security',
345
- validator: 'checkov',
346
- remediation: check.guideline,
347
- cwe: check.cwe,
348
- references: check.guideline ? [check.guideline] : []
349
- });
350
- }
351
- }
352
-
353
- return issues;
354
- }
355
-
356
- /**
357
- * Validate package.json using JSON Schema
358
- * @private
359
- */
360
- async validatePackageJson(filePath, options = {}) {
361
- try {
362
- const Ajv = (await import('ajv')).default;
363
- const addFormats = (await import('ajv-formats')).default;
364
-
365
- const content = await fs.readFile(filePath, 'utf-8');
366
- const packageJson = JSON.parse(content);
367
-
368
- const ajv = new Ajv({ allErrors: true, strict: false });
369
- addFormats(ajv);
370
-
371
- // Basic package.json schema (simplified)
372
- const schema = {
373
- type: 'object',
374
- required: ['name', 'version'],
375
- properties: {
376
- name: { type: 'string', pattern: '^(?:@[a-z0-9-~][a-z0-9-._~]*/)?[a-z0-9-~][a-z0-9-._~]*$' },
377
- version: { type: 'string' },
378
- description: { type: 'string' },
379
- main: { type: 'string' },
380
- type: { type: 'string', enum: ['module', 'commonjs'] },
381
- scripts: { type: 'object' },
382
- dependencies: { type: 'object' },
383
- devDependencies: { type: 'object' }
384
- },
385
- additionalProperties: true
386
- };
387
-
388
- const validate = ajv.compile(schema);
389
- const valid = validate(packageJson);
390
-
391
- if (!valid && validate.errors) {
392
- return validate.errors.map(error => ({
393
- file: filePath,
394
- line: 1,
395
- column: 1,
396
- severity: STATIC_ANALYSIS.SEVERITY.ERROR,
397
- rule: 'json-schema',
398
- message: error.instancePath ? `${error.instancePath} ${error.message}` : `must have required property '${error.params.missingProperty}'`,
399
- category: 'validation',
400
- validator: 'json-schema'
401
- }));
402
- }
403
-
404
- return [];
405
- } catch (error) {
406
- this.logger?.error('package.json validation failed', { error: error.message });
407
- return [{
408
- file: filePath,
409
- line: 1,
410
- column: 1,
411
- severity: STATIC_ANALYSIS.SEVERITY.ERROR,
412
- rule: 'json-parse',
413
- message: `Invalid JSON: ${error.message}`,
414
- category: 'syntax',
415
- validator: 'json-parse'
416
- }];
417
- }
418
- }
419
-
420
- /**
421
- * Validate tsconfig.json using JSON Schema
422
- * @private
423
- */
424
- async validateTsConfig(filePath, options = {}) {
425
- try {
426
- const content = await fs.readFile(filePath, 'utf-8');
427
- const tsconfig = JSON.parse(content);
428
-
429
- const issues = [];
430
-
431
- // Check for common misconfigurations
432
- if (tsconfig.compilerOptions) {
433
- const opts = tsconfig.compilerOptions;
434
-
435
- // Check for strict mode
436
- if (!opts.strict) {
437
- issues.push({
438
- file: filePath,
439
- line: 1,
440
- column: 1,
441
- severity: STATIC_ANALYSIS.SEVERITY.WARNING,
442
- rule: 'strict-mode',
443
- message: 'Consider enabling "strict" mode for better type safety',
444
- category: 'best-practice',
445
- validator: 'tsconfig-validator'
446
- });
447
- }
448
-
449
- // Check for noImplicitAny
450
- if (opts.noImplicitAny === false) {
451
- issues.push({
452
- file: filePath,
453
- line: 1,
454
- column: 1,
455
- severity: STATIC_ANALYSIS.SEVERITY.WARNING,
456
- rule: 'no-implicit-any',
457
- message: 'Disabling noImplicitAny reduces type safety',
458
- category: 'best-practice',
459
- validator: 'tsconfig-validator'
460
- });
461
- }
462
- }
463
-
464
- return issues;
465
- } catch (error) {
466
- this.logger?.error('tsconfig.json validation failed', { error: error.message });
467
- return [{
468
- file: filePath,
469
- line: 1,
470
- column: 1,
471
- severity: STATIC_ANALYSIS.SEVERITY.ERROR,
472
- rule: 'json-parse',
473
- message: `Invalid JSON: ${error.message}`,
474
- category: 'syntax',
475
- validator: 'json-parse'
476
- }];
477
- }
478
- }
479
-
480
- /**
481
- * Validate .env file for security issues
482
- * @private
483
- */
484
- async validateEnvFile(filePath, options = {}) {
485
- try {
486
- const content = await fs.readFile(filePath, 'utf-8');
487
- const issues = [];
488
- const lines = content.split('\n');
489
-
490
- const secretPatterns = [
491
- { pattern: /password|passwd|pwd/i, name: 'password' },
492
- { pattern: /api[_-]?key/i, name: 'API key' },
493
- { pattern: /secret/i, name: 'secret' },
494
- { pattern: /token/i, name: 'token' },
495
- { pattern: /private[_-]?key/i, name: 'private key' },
496
- { pattern: /aws[_-]?access/i, name: 'AWS credentials' }
497
- ];
498
-
499
- lines.forEach((line, index) => {
500
- const trimmed = line.trim();
501
-
502
- // Skip comments and empty lines
503
- if (!trimmed || trimmed.startsWith('#')) return;
504
-
505
- // Check for hardcoded values (not references to other env vars)
506
- if (trimmed.includes('=')) {
507
- const [key, value] = trimmed.split('=');
508
- const keyLower = key.toLowerCase();
509
- const valueTrimmed = value?.trim() || '';
510
-
511
- // Check if value looks like a real secret (not empty, not a placeholder)
512
- const looksLikeSecret = valueTrimmed &&
513
- valueTrimmed !== '' &&
514
- !valueTrimmed.startsWith('$') && // Not env var reference
515
- valueTrimmed !== 'your-key-here' &&
516
- valueTrimmed !== 'changeme' &&
517
- valueTrimmed.length > 5;
518
-
519
- if (looksLikeSecret) {
520
- for (const { pattern, name } of secretPatterns) {
521
- if (pattern.test(keyLower)) {
522
- issues.push({
523
- file: filePath,
524
- line: index + 1,
525
- column: 1,
526
- severity: STATIC_ANALYSIS.SEVERITY.CRITICAL,
527
- rule: 'hardcoded-secret',
528
- message: `Potential hardcoded ${name} detected in .env file`,
529
- category: 'security',
530
- validator: 'env-validator',
531
- remediation: 'Use environment-specific .env files and add .env to .gitignore'
532
- });
533
- break;
534
- }
535
- }
536
- }
537
- }
538
- });
539
-
540
- return issues;
541
- } catch (error) {
542
- this.logger?.error('.env validation failed', { error: error.message });
543
- return [];
544
- }
545
- }
546
-
547
- /**
548
- * Detect configuration file type
549
- * @private
550
- */
551
- detectFileType(filePath) {
552
- const basename = path.basename(filePath).toLowerCase();
553
- const dirname = path.dirname(filePath);
554
-
555
- // Exact filename matches
556
- if (basename === 'dockerfile') return 'dockerfile';
557
- if (basename === 'docker-compose.yml' || basename === 'docker-compose.yaml') return 'docker-compose';
558
- if (basename === 'package.json') return 'package.json';
559
- if (basename === 'tsconfig.json') return 'tsconfig.json';
560
- if (basename === '.env' || basename.endsWith('.env')) return 'env';
561
-
562
- // Path-based detection
563
- if (dirname.includes('.github/workflows')) return 'github-actions';
564
- if (dirname.includes('kubernetes') || dirname.includes('k8s')) return 'kubernetes';
565
-
566
- // Extension-based detection
567
- const ext = path.extname(filePath).toLowerCase();
568
- if (ext === '.tf' || ext === '.tfvars') return 'terraform';
569
- if (ext === '.yml' || ext === '.yaml') return 'yaml';
570
- if (ext === '.json') return 'json';
571
-
572
- return 'unknown';
573
- }
574
-
575
- /**
576
- * Normalize all validator results to common format
577
- * @private
578
- */
579
- normalizeResults(results) {
580
- return results.map(result => ({
581
- file: result.file,
582
- line: result.line || 1,
583
- column: result.column || 1,
584
- severity: result.severity || STATIC_ANALYSIS.SEVERITY.WARNING,
585
- rule: result.rule || 'unknown',
586
- message: result.message || 'Validation issue detected',
587
- category: result.category || 'validation',
588
- validator: result.validator,
589
- cwe: result.cwe || null,
590
- remediation: result.remediation || null,
591
- references: result.references || []
592
- }));
593
- }
594
-
595
- /**
596
- * Map hadolint severity to our standard
597
- * @private
598
- */
599
- mapHadolintSeverity(level) {
600
- const map = {
601
- 'error': STATIC_ANALYSIS.SEVERITY.ERROR,
602
- 'warning': STATIC_ANALYSIS.SEVERITY.WARNING,
603
- 'info': STATIC_ANALYSIS.SEVERITY.INFO,
604
- 'style': STATIC_ANALYSIS.SEVERITY.INFO
605
- };
606
- return map[level?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
607
- }
608
-
609
- /**
610
- * Map yamllint severity to our standard
611
- * @private
612
- */
613
- mapYamllintSeverity(level) {
614
- const map = {
615
- 'error': STATIC_ANALYSIS.SEVERITY.ERROR,
616
- 'warning': STATIC_ANALYSIS.SEVERITY.WARNING
617
- };
618
- return map[level?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
619
- }
620
-
621
- /**
622
- * Map checkov severity to our standard
623
- * @private
624
- */
625
- mapCheckovSeverity(checkClass) {
626
- // checkov uses check_class to categorize severity
627
- // Most security issues are treated as errors
628
- return STATIC_ANALYSIS.SEVERITY.ERROR;
629
- }
630
-
631
- /**
632
- * Get validator status report
633
- * @returns {Promise<Object>} Validator availability and status
634
- */
635
- async getValidatorStatus() {
636
- const available = await this.detectAvailableValidators();
637
- return {
638
- validators: available,
639
- recommendations: this.getInstallRecommendations(available)
640
- };
641
- }
642
-
643
- /**
644
- * Get installation recommendations for missing validators
645
- * @private
646
- */
647
- getInstallRecommendations(available) {
648
- const recommendations = [];
649
-
650
- if (!available.checkov) {
651
- recommendations.push({
652
- validator: 'checkov',
653
- reason: 'Infrastructure as Code security scanning (Docker, Kubernetes, Terraform)',
654
- install: 'pip install checkov',
655
- priority: 'high'
656
- });
657
- }
658
-
659
- if (!available.hadolint) {
660
- recommendations.push({
661
- validator: 'hadolint',
662
- reason: 'Dockerfile linting and best practices',
663
- install: 'Download from https://github.com/hadolint/hadolint/releases',
664
- priority: 'high'
665
- });
666
- }
667
-
668
- if (!available.yamllint) {
669
- recommendations.push({
670
- validator: 'yamllint',
671
- reason: 'YAML file validation',
672
- install: 'pip install yamllint',
673
- priority: 'medium'
674
- });
675
- }
676
-
677
- if (!available.jsonSchema) {
678
- recommendations.push({
679
- validator: 'ajv (JSON Schema)',
680
- reason: 'JSON configuration validation',
681
- install: 'npm install ajv ajv-formats',
682
- priority: 'medium'
683
- });
684
- }
685
-
686
- return recommendations;
687
- }
688
- }
689
-
690
- export default ConfigValidator;
1
+ const a0_0x271c1c=a0_0x5021;(function(_0x150aa3,_0x483e44){const _0x3fd058=a0_0x5021,_0x35e91b=_0x150aa3();while(!![]){try{const _0x2eafc8=parseInt(_0x3fd058(0x131))/0x1+-parseInt(_0x3fd058(0x153))/0x2+parseInt(_0x3fd058(0x189))/0x3+-parseInt(_0x3fd058(0x161))/0x4*(parseInt(_0x3fd058(0x142))/0x5)+-parseInt(_0x3fd058(0x16f))/0x6+parseInt(_0x3fd058(0x19b))/0x7+parseInt(_0x3fd058(0x192))/0x8*(parseInt(_0x3fd058(0x134))/0x9);if(_0x2eafc8===_0x483e44)break;else _0x35e91b['push'](_0x35e91b['shift']());}catch(_0xbd959){_0x35e91b['push'](_0x35e91b['shift']());}}}(a0_0x4ada,0x83457));import{exec}from'child_process';import{promisify}from'util';function a0_0x4ada(){const _0x288d8b=['u0vwrvjjvfK','D2fYBG','nde4mdq2m21ct3D6CG','CgfJA2fNzs5QC29UihzHBgLKyxrPB24GzMfPBgvK','zxjYB3i','rMfPBgvKihrVihbHCNnLignOzwnRB3yGB3v0Chv0','CgfJA2fNzs5QC29U','CgLWigLUC3rHBgWGEwfTBgXPBNq','zgv0zwn0qxzHAwXHyMXLvMfSAwrHDg9YCW','y2HLy2TVDG','ANnVBI1Zy2HLBwe','lNLTBa','z2L0AhvIlwfJDgLVBNm','sw52ywXPzcbku09ooIa','AgfKB2XPBNq','zg9JA2vYzMLSzq','Aw5ZDgfUy2vqyxrO','C3rKB3v0','C3bSAxq','sLnptIbJB25MAwD1CMf0Aw9UihzHBgLKyxrPB24','DMfSAwrHDgvzqu1m','nJC5nZmZrKPeAuLh','ANnVBI1WyxjZzq','CMvTzwrPyxrPB24','mtm3nJuYm3Dcq3HIta','ANnVBLnJAgvTyq','y2HLy2TFy2XHC3m','Ew91CI1RzxKTAgvYzq','vxnLigvUDMLYB25Tzw50lxnWzwnPzMLJic5LBNyGzMLSzxmGyw5KigfKzcaUzw52ihrVic5NAxrPz25VCMu','ywP2','yxzHAwXHyMXLu2nHBM5LCNm','DhjPBq','ChvZAa','BwfWq2HLy2TVDLnLDMvYAxr5','Bg9Nz2vY','EwfTBa','zgvIDwC','z2v0sw5ZDgfSBfjLy29TBwvUzgf0Aw9UCW','mtGXodvNruTbrK0','ANnVBG','y29Kzq','vMfSAwrHDgLUzYbJB25MAwCGzMLSzq','vMfSAwrHDgLVBIbPC3n1zsbKzxrLy3rLza','DMfSAwrHDgvxAxrOq2HLy2TVDG','BwvZC2fNzq','zxjYB3jZ','DgvYCMfMB3jT','AgfKB2XPBNqGls1MB3jTyxqGANnVBIaI','rg9JA2vYzMLSzsbSAw50Aw5NigfUzcbIzxn0ihbYywn0AwnLCW','zgLYBMfTzq','v0fstKLorW','DhnJB25MAwCUANnVBG','ug90zw50AwfSigHHCMrJB2rLzca','AgfKB2XPBNqGBM90igf2ywLSywjSzq','BgLUzq','mtCWode2nfbkq0Xxva','zg9JA2vYlwnVBxbVC2uUEw1S','zMLSzq','y29TCgLSzq','C2vJDxjPDhK','DMfSAwrHDgLVBG','AgfYzgnVzgvKlxnLy3jLDa','CgfYC2vdAgvJA292uMvZDwX0CW','BxvZDcbOyxzLihjLCxvPCMvKihbYB3bLCNr5icC','y2HHBMDLBwu','BgvUz3rO','DMfSAwrHDg9Y','AgLNAa','CMvHzezPBgu','odm2wMrrqvn1','DMfSAwrHDgvfBNzgAwXL','Dg9mB3DLCKnHC2u','CgfYyw1Z','yMvZDc1WCMfJDgLJzq','BwfWwwfTBgXPBNrtzxzLCML0Eq','A3vIzxjUzxrLCW','Bgv2zwW','lMDPDgH1yI93B3jRzMXVD3m','igrLDgvJDgvKigLUic5LBNyGzMLSzq','rvjst1i','Dw5RBM93BG','BwfWsgfKB2XPBNrtzxzLCML0Eq','CgfYC2viywrVBgLUDfjLC3vSDhm','mJmXmdC1mgzlswj4uG','rMfPBgvKihrVihbHCNnLigHHzg9SAw50ig91Dhb1Da','BwLZC2LUz1bYB3bLCNr5','CgfYC2u','wufntcbMAwXLihzHBgLKyxrPB24','C2nHBM5LCKnHy2HL','EwfTBgXPBNqGDMfSAwrHDgLVBIbMywLSzwq','ywP2icHku09oifnJAgvTysK','C2v2zxjPDhK','EwfTBgXPBNq','BwvKAxvT','DxrMltG','C3LUDgf4','DhnJB25MAwCUANnVBIb2ywXPzgf0Aw9UigzHAwXLza','y2HLy2TVDIaTlxzLCNnPB24','Aw5JBhvKzxm','EwfTBgXPBNqGzgv0zwn0zwq','BM9YBwfSAxPLuMvZDwX0CW','zMLSzv9SAw5Lx3jHBMDL','y2HLy2TFAwq','C3rYAwn0lw1Vzgu','C3rYAw5N','CgLWigLUC3rHBgWGy2HLy2TVDG','zMfPBgvKx2nOzwnRCW','AgfKB2XPBNqGDMfSAwrHDgLVBIbMywLSzwq','C3rHCNrZv2L0Aa','mJqWmZCZmKrZCvv4uW','CNvSzq','qvDtignYzwrLBNrPywXZ','zgv0zwn0rMLSzvr5Cgu','lNrM','lNrMDMfYCW','zg9JA2vYlwnVBxbVC2u','CMvZDwX0CW','B2jQzwn0','mJr6CMjbsLK','z3vPzgvSAw5L','CgfYC2vzyw1SBgLUDfjLC3vSDhm','ywP2lwzVCM1HDhm','C3rYAwn0','lNLHBwW','zw52lxzHBgLKyxrVCG'];a0_0x4ada=function(){return _0x288d8b;};return a0_0x4ada();}import a0_0x93ea92 from'path';import a0_0x110e41 from'fs/promises';import{STATIC_ANALYSIS}from'../utilities/constants.js';const execAsync=promisify(exec);class ConfigValidator{constructor(_0x40cb36=null){const _0x56703c=a0_0x5021;this['logger']=_0x40cb36,this[_0x56703c(0x13a)]=null,this[_0x56703c(0x174)]=new Map();}async[a0_0x271c1c(0x124)](){const _0x1d5fa0=a0_0x271c1c;if(this['availableScanners']!==null)return this[_0x1d5fa0(0x13a)];const _0x55ed33={'checkov':![],'hadolint':![],'yamllint':![],'jsonSchema':![]};try{await execAsync(_0x1d5fa0(0x17d),{'timeout':0x1388}),_0x55ed33['checkov']=!![],this[_0x1d5fa0(0x13e)]?.['debug']('checkov\x20detected');}catch(_0x1a6027){this[_0x1d5fa0(0x13e)]?.[_0x1d5fa0(0x140)]('checkov\x20not\x20available',{'error':_0x1a6027[_0x1d5fa0(0x148)]});}try{await execAsync('hadolint\x20--version',{'timeout':0x1388}),_0x55ed33[_0x1d5fa0(0x12a)]=!![],this[_0x1d5fa0(0x13e)]?.[_0x1d5fa0(0x140)]('hadolint\x20detected');}catch(_0x1e12ae){this['logger']?.['debug'](_0x1d5fa0(0x151),{'error':_0x1e12ae[_0x1d5fa0(0x148)]});}try{await execAsync('yamllint\x20--version',{'timeout':0x1388}),_0x55ed33[_0x1d5fa0(0x178)]=!![],this['logger']?.['debug'](_0x1d5fa0(0x17f));}catch(_0x3fac13){this['logger']?.['debug']('yamllint\x20not\x20available',{'error':_0x3fac13[_0x1d5fa0(0x148)]});}try{await import(_0x1d5fa0(0x139)),_0x55ed33['jsonSchema']=!![],this['logger']?.[_0x1d5fa0(0x140)]('JSON\x20Schema\x20validation\x20available');}catch(_0xb494e0){this['logger']?.['debug']('ajv\x20not\x20available',{'error':_0xb494e0[_0x1d5fa0(0x148)]});}return this[_0x1d5fa0(0x13a)]=_0x55ed33,_0x55ed33;}async['validate'](_0x188ab1,_0x563622={}){const _0x5c2ad7=a0_0x271c1c,_0x291894=[],_0x5d68eb=await this['detectAvailableValidators'](),_0x5bfd30=this[_0x5c2ad7(0x18c)](_0x188ab1);this['logger']?.[_0x5c2ad7(0x140)](_0x5c2ad7(0x145),{'filePath':_0x188ab1,'fileType':_0x5bfd30});switch(_0x5bfd30){case'dockerfile':if(_0x5d68eb['hadolint']){const _0x16f097=await this['validateDockerfile'](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x16f097);}if(_0x5d68eb['checkov']){const _0x49f71c=await this['validateWithCheckov'](_0x188ab1,'dockerfile',_0x563622);_0x291894['push'](..._0x49f71c);}break;case _0x5c2ad7(0x18f):if(_0x5d68eb[_0x5c2ad7(0x178)]){const _0x387b8d=await this[_0x5c2ad7(0x130)](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x387b8d);}if(_0x5d68eb[_0x5c2ad7(0x125)]){const _0x59ed27=await this['validateWithCheckov'](_0x188ab1,'docker_compose',_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x59ed27);}break;case _0x5c2ad7(0x167):if(_0x5d68eb['yamllint']){const _0x30fc38=await this[_0x5c2ad7(0x130)](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x30fc38);}if(_0x5d68eb['checkov']){const _0x1bc14e=await this[_0x5c2ad7(0x147)](_0x188ab1,_0x5c2ad7(0x167),_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x1bc14e);}break;case'terraform':if(_0x5d68eb['checkov']){const _0x3a2b32=await this[_0x5c2ad7(0x147)](_0x188ab1,'terraform',_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x3a2b32);}break;case _0x5c2ad7(0x122):if(_0x5d68eb[_0x5c2ad7(0x135)]){const _0x9ca265=await this['validatePackageJson'](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x9ca265);}break;case _0x5c2ad7(0x14f):if(_0x5d68eb['jsonSchema']){const _0x520947=await this['validateTsConfig'](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x520947);}break;case _0x5c2ad7(0x128):if(_0x5d68eb['yamllint']){const _0x38f97b=await this[_0x5c2ad7(0x130)](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x38f97b);}break;case'env':const _0x4fcc23=await this[_0x5c2ad7(0x162)](_0x188ab1,_0x563622);_0x291894['push'](..._0x4fcc23);break;case'yaml':if(_0x5d68eb[_0x5c2ad7(0x178)]){const _0x235ee0=await this[_0x5c2ad7(0x130)](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x235ee0);}break;default:this[_0x5c2ad7(0x13e)]?.[_0x5c2ad7(0x19a)]('Unknown\x20config\x20file\x20type',{'filePath':_0x188ab1,'fileType':_0x5bfd30});return[];}return this['normalizeResults'](_0x291894);}async['validateDockerfile'](_0x9577e3,_0x2394e3={}){const _0xd8a849=a0_0x271c1c;try{const _0x28b04f=await execAsync(_0xd8a849(0x14b)+_0x9577e3+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530}),_0x248246=JSON[_0xd8a849(0x172)](_0x28b04f['stdout']);return this[_0xd8a849(0x16e)](_0x248246,_0x9577e3);}catch(_0x5f1360){if(_0x5f1360['stdout'])try{const _0x1e7d03=JSON[_0xd8a849(0x172)](_0x5f1360['stdout']);return this[_0xd8a849(0x16e)](_0x1e7d03,_0x9577e3);}catch(_0x5aa668){this[_0xd8a849(0x13e)]?.[_0xd8a849(0x19d)](_0xd8a849(0x170),{'error':_0x5aa668['message']});}return this[_0xd8a849(0x13e)]?.['error'](_0xd8a849(0x187),{'error':_0x5f1360['message']}),[];}}[a0_0x271c1c(0x16e)](_0x151185,_0x4cf6b1){const _0x59ed34=a0_0x271c1c,_0x578758=[];if(Array['isArray'](_0x151185))for(const _0x5b688f of _0x151185){_0x578758[_0x59ed34(0x13c)]({'file':_0x4cf6b1,'line':_0x5b688f[_0x59ed34(0x152)]||0x1,'column':_0x5b688f['column']||0x1,'severity':this[_0x59ed34(0x16d)](_0x5b688f[_0x59ed34(0x168)]),'rule':_0x5b688f[_0x59ed34(0x144)],'message':_0x5b688f[_0x59ed34(0x148)],'category':'dockerfile','validator':_0x59ed34(0x12a)});}return _0x578758;}async['validateYAML'](_0x290904,_0x2d8d3f={}){const _0x385f1e=a0_0x271c1c;try{const _0x245937=await execAsync('yamllint\x20-f\x20parsable\x20\x22'+_0x290904+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530});return this[_0x385f1e(0x194)](_0x245937[_0x385f1e(0x12d)],_0x290904);}catch(_0x38ff87){if(_0x38ff87['stdout'])return this['parseYamllintResults'](_0x38ff87[_0x385f1e(0x12d)],_0x290904);return this['logger']?.[_0x385f1e(0x19d)](_0x385f1e(0x175),{'error':_0x38ff87[_0x385f1e(0x148)]}),[];}}['parseYamllintResults'](_0x2a0aa8,_0x20f3b4){const _0x4696a2=a0_0x271c1c,_0x4ca861=[],_0x3e36c3=_0x2a0aa8[_0x4696a2(0x12e)]('\x0a')['filter'](_0x4919b2=>_0x4919b2[_0x4696a2(0x13b)]());for(const _0x525979 of _0x3e36c3){const _0x57481a=_0x525979['match'](/^(.+?):(\d+):(\d+):\s*\[(\w+)\]\s*(.+?)\s*\((.+?)\)/);if(_0x57481a){const [,_0x4bdc0e,_0xa53462,_0x3dd132,_0x2a7a59,_0x43a980,_0x2594a7]=_0x57481a;_0x4ca861['push']({'file':_0x20f3b4,'line':parseInt(_0xa53462,0xa),'column':parseInt(_0x3dd132,0xa),'severity':this[_0x4696a2(0x166)](_0x2a7a59),'rule':_0x2594a7,'message':_0x43a980,'category':'yaml','validator':'yamllint'});}}return _0x4ca861;}async[a0_0x271c1c(0x147)](_0x48d896,_0x54ab1c,_0x289402={}){const _0x202575=a0_0x271c1c;try{const _0x41fee9=await execAsync('checkov\x20-f\x20\x22'+_0x48d896+'\x22\x20--framework\x20'+_0x54ab1c+'\x20--output\x20json\x20--compact',{'maxBuffer':0xa*0x400*0x400,'timeout':0xea60}),_0x554e8d=JSON[_0x202575(0x172)](_0x41fee9[_0x202575(0x12d)]);return this[_0x202575(0x15a)](_0x554e8d,_0x48d896);}catch(_0x8dcb7a){if(_0x8dcb7a['stdout'])try{const _0xf71fad=JSON[_0x202575(0x172)](_0x8dcb7a['stdout']);return this['parseCheckovResults'](_0xf71fad,_0x48d896);}catch(_0x8bbe2d){this['logger']?.[_0x202575(0x19d)](_0x202575(0x121),{'error':_0x8bbe2d[_0x202575(0x148)]});}return this[_0x202575(0x13e)]?.[_0x202575(0x19d)]('checkov\x20validation\x20failed',{'error':_0x8dcb7a[_0x202575(0x148)]}),[];}}[a0_0x271c1c(0x15a)](_0x4009dc,_0xe45095){const _0x11f162=a0_0x271c1c,_0x19125e=[];if(_0x4009dc['results']&&_0x4009dc['results'][_0x11f162(0x186)])for(const _0x2b627e of _0x4009dc[_0x11f162(0x190)][_0x11f162(0x186)]){_0x19125e[_0x11f162(0x13c)]({'file':_0xe45095,'line':_0x2b627e['file_line_range']?_0x2b627e[_0x11f162(0x181)][0x0]:0x1,'column':0x1,'severity':this[_0x11f162(0x13d)](_0x2b627e[_0x11f162(0x136)]),'rule':_0x2b627e['check_id'],'message':_0x2b627e['check_name']||_0x2b627e[_0x11f162(0x182)],'category':_0x11f162(0x157),'validator':'checkov','remediation':_0x2b627e[_0x11f162(0x193)],'cwe':_0x2b627e['cwe'],'references':_0x2b627e[_0x11f162(0x193)]?[_0x2b627e['guideline']]:[]});}return _0x19125e;}async['validatePackageJson'](_0x99a87f,_0x319cd9={}){const _0x4902b3=a0_0x271c1c;try{const _0x44ae93=(await import(_0x4902b3(0x139)))['default'],_0x27c9f=(await import(_0x4902b3(0x195)))['default'],_0x22a26e=await a0_0x110e41['readFile'](_0x99a87f,'utf-8'),_0x9caa7c=JSON[_0x4902b3(0x172)](_0x22a26e),_0x421efd=new _0x44ae93({'allErrors':!![],'strict':![]});_0x27c9f(_0x421efd);const _0x4a88bd={'type':'object','required':['name','version'],'properties':{'name':{'type':_0x4902b3(0x184),'pattern':'^(?:@[a-z0-9-~][a-z0-9-._~]*/)?[a-z0-9-~][a-z0-9-._~]*$'},'version':{'type':'string'},'description':{'type':'string'},'main':{'type':_0x4902b3(0x184)},'type':{'type':'string','enum':['module','commonjs']},'scripts':{'type':_0x4902b3(0x191)},'dependencies':{'type':'object'},'devDependencies':{'type':'object'}},'additionalProperties':!![]},_0x117cc3=_0x421efd[_0x4902b3(0x156)](_0x4a88bd),_0x1599e6=_0x117cc3(_0x9caa7c);if(!_0x1599e6&&_0x117cc3['errors'])return _0x117cc3[_0x4902b3(0x149)]['map'](_0x45bab5=>({'file':_0x99a87f,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS['SEVERITY'][_0x4902b3(0x16b)],'rule':_0x4902b3(0x126),'message':_0x45bab5[_0x4902b3(0x12c)]?_0x45bab5['instancePath']+'\x20'+_0x45bab5[_0x4902b3(0x148)]:_0x4902b3(0x15b)+_0x45bab5[_0x4902b3(0x164)][_0x4902b3(0x171)]+'\x27','category':_0x4902b3(0x158),'validator':'json-schema'}));return[];}catch(_0x10fe52){return this[_0x4902b3(0x13e)]?.[_0x4902b3(0x19d)](_0x4902b3(0x19c),{'error':_0x10fe52['message']}),[{'file':_0x99a87f,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS[_0x4902b3(0x199)]['ERROR'],'rule':'json-parse','message':_0x4902b3(0x129)+_0x10fe52['message'],'category':_0x4902b3(0x17b),'validator':_0x4902b3(0x132)}];}}async['validateTsConfig'](_0x357c41,_0x41bc21={}){const _0x3e3687=a0_0x271c1c;try{const _0x4cebac=await a0_0x110e41[_0x3e3687(0x160)](_0x357c41,_0x3e3687(0x17a)),_0x30e347=JSON[_0x3e3687(0x172)](_0x4cebac),_0x1dbcdf=[];if(_0x30e347['compilerOptions']){const _0xbb4db1=_0x30e347['compilerOptions'];!_0xbb4db1[_0x3e3687(0x196)]&&_0x1dbcdf[_0x3e3687(0x13c)]({'file':_0x357c41,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS['SEVERITY']['WARNING'],'rule':_0x3e3687(0x183),'message':'Consider\x20enabling\x20\x22strict\x22\x20mode\x20for\x20better\x20type\x20safety','category':_0x3e3687(0x165),'validator':'tsconfig-validator'}),_0xbb4db1['noImplicitAny']===![]&&_0x1dbcdf[_0x3e3687(0x13c)]({'file':_0x357c41,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS['SEVERITY'][_0x3e3687(0x14e)],'rule':'no-implicit-any','message':'Disabling\x20noImplicitAny\x20reduces\x20type\x20safety','category':'best-practice','validator':'tsconfig-validator'});}return _0x1dbcdf;}catch(_0x254da7){return this[_0x3e3687(0x13e)]?.[_0x3e3687(0x19d)](_0x3e3687(0x17c),{'error':_0x254da7['message']}),[{'file':_0x357c41,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS[_0x3e3687(0x199)][_0x3e3687(0x16b)],'rule':_0x3e3687(0x132),'message':_0x3e3687(0x129)+_0x254da7[_0x3e3687(0x148)],'category':_0x3e3687(0x17b),'validator':'json-parse'}];}}async[a0_0x271c1c(0x162)](_0x159fcd,_0x44c65b={}){const _0x364880=a0_0x271c1c;try{const _0x3da7ca=await a0_0x110e41['readFile'](_0x159fcd,_0x364880(0x17a)),_0x2448d0=[],_0x2e9558=_0x3da7ca['split']('\x0a'),_0x5d904c=[{'pattern':/password|passwd|pwd/i,'name':'password'},{'pattern':/api[_-]?key/i,'name':'API\x20key'},{'pattern':/secret/i,'name':'secret'},{'pattern':/token/i,'name':'token'},{'pattern':/private[_-]?key/i,'name':'private\x20key'},{'pattern':/aws[_-]?access/i,'name':_0x364880(0x18b)}];return _0x2e9558['forEach']((_0x10d18a,_0x4c0113)=>{const _0x2f1145=_0x364880,_0x1e221d=_0x10d18a[_0x2f1145(0x13b)]();if(!_0x1e221d||_0x1e221d['startsWith']('#'))return;if(_0x1e221d[_0x2f1145(0x17e)]('=')){const [_0x3e6bec,_0x54a176]=_0x1e221d[_0x2f1145(0x12e)]('='),_0x2c5db5=_0x3e6bec['toLowerCase'](),_0x305bd2=_0x54a176?.[_0x2f1145(0x13b)]()||'',_0x22f52a=_0x305bd2&&_0x305bd2!==''&&!_0x305bd2[_0x2f1145(0x188)]('$')&&_0x305bd2!==_0x2f1145(0x137)&&_0x305bd2!==_0x2f1145(0x15c)&&_0x305bd2[_0x2f1145(0x15d)]>0x5;if(_0x22f52a)for(const {pattern:_0x1c11eb,name:_0x52ba33}of _0x5d904c){if(_0x1c11eb['test'](_0x2c5db5)){_0x2448d0[_0x2f1145(0x13c)]({'file':_0x159fcd,'line':_0x4c0113+0x1,'column':0x1,'severity':STATIC_ANALYSIS[_0x2f1145(0x199)]['CRITICAL'],'rule':_0x2f1145(0x159),'message':_0x2f1145(0x150)+_0x52ba33+_0x2f1145(0x16a),'category':'security','validator':_0x2f1145(0x198),'remediation':_0x2f1145(0x138)});break;}}}}),_0x2448d0;}catch(_0x2b68ba){return this['logger']?.['error']('.env\x20validation\x20failed',{'error':_0x2b68ba['message']}),[];}}[a0_0x271c1c(0x18c)](_0x2a2f02){const _0x5e3951=a0_0x271c1c,_0x56546a=a0_0x93ea92['basename'](_0x2a2f02)[_0x5e3951(0x163)](),_0x5ecc41=a0_0x93ea92[_0x5e3951(0x14d)](_0x2a2f02);if(_0x56546a==='dockerfile')return _0x5e3951(0x12b);if(_0x56546a===_0x5e3951(0x154)||_0x56546a==='docker-compose.yaml')return'docker-compose';if(_0x56546a===_0x5e3951(0x122))return'package.json';if(_0x56546a==='tsconfig.json')return'tsconfig.json';if(_0x56546a==='.env'||_0x56546a['endsWith']('.env'))return'env';if(_0x5ecc41[_0x5e3951(0x17e)](_0x5e3951(0x169)))return _0x5e3951(0x128);if(_0x5ecc41[_0x5e3951(0x17e)]('kubernetes')||_0x5ecc41[_0x5e3951(0x17e)]('k8s'))return _0x5e3951(0x167);const _0x5e9b88=a0_0x93ea92['extname'](_0x2a2f02)[_0x5e3951(0x163)]();if(_0x5e9b88===_0x5e3951(0x18d)||_0x5e9b88===_0x5e3951(0x18e))return _0x5e3951(0x14a);if(_0x5e9b88===_0x5e3951(0x127)||_0x5e9b88===_0x5e3951(0x197))return _0x5e3951(0x13f);if(_0x5e9b88==='.json')return _0x5e3951(0x143);return _0x5e3951(0x16c);}[a0_0x271c1c(0x180)](_0x4b4264){const _0x7f6348=a0_0x271c1c;return _0x4b4264['map'](_0x2469f7=>({'file':_0x2469f7[_0x7f6348(0x155)],'line':_0x2469f7[_0x7f6348(0x152)]||0x1,'column':_0x2469f7['column']||0x1,'severity':_0x2469f7[_0x7f6348(0x177)]||STATIC_ANALYSIS['SEVERITY'][_0x7f6348(0x14e)],'rule':_0x2469f7[_0x7f6348(0x18a)]||_0x7f6348(0x16c),'message':_0x2469f7[_0x7f6348(0x148)]||_0x7f6348(0x146),'category':_0x2469f7['category']||_0x7f6348(0x158),'validator':_0x2469f7[_0x7f6348(0x15e)],'cwe':_0x2469f7['cwe']||null,'remediation':_0x2469f7[_0x7f6348(0x133)]||null,'references':_0x2469f7['references']||[]}));}['mapHadolintSeverity'](_0xc2cdbc){const _0x109218=a0_0x271c1c,_0x1e8ac4={'error':STATIC_ANALYSIS[_0x109218(0x199)]['ERROR'],'warning':STATIC_ANALYSIS[_0x109218(0x199)][_0x109218(0x14e)],'info':STATIC_ANALYSIS[_0x109218(0x199)]['INFO'],'style':STATIC_ANALYSIS['SEVERITY']['INFO']};return _0x1e8ac4[_0xc2cdbc?.['toLowerCase']()]||STATIC_ANALYSIS['SEVERITY']['WARNING'];}['mapYamllintSeverity'](_0x2e9f96){const _0x5cfb55=a0_0x271c1c,_0x2a0b46={'error':STATIC_ANALYSIS[_0x5cfb55(0x199)][_0x5cfb55(0x16b)],'warning':STATIC_ANALYSIS[_0x5cfb55(0x199)]['WARNING']};return _0x2a0b46[_0x2e9f96?.[_0x5cfb55(0x163)]()]||STATIC_ANALYSIS['SEVERITY']['WARNING'];}['mapCheckovSeverity'](_0x2565df){const _0x551de5=a0_0x271c1c;return STATIC_ANALYSIS['SEVERITY'][_0x551de5(0x16b)];}async['getValidatorStatus'](){const _0x52bd9f=a0_0x271c1c,_0x5512a8=await this[_0x52bd9f(0x124)]();return{'validators':_0x5512a8,'recommendations':this['getInstallRecommendations'](_0x5512a8)};}[a0_0x271c1c(0x141)](_0x235060){const _0x3cfe23=a0_0x271c1c,_0x2219a4=[];return!_0x235060[_0x3cfe23(0x125)]&&_0x2219a4['push']({'validator':_0x3cfe23(0x125),'reason':'Infrastructure\x20as\x20Code\x20security\x20scanning\x20(Docker,\x20Kubernetes,\x20Terraform)','install':_0x3cfe23(0x185),'priority':_0x3cfe23(0x15f)}),!_0x235060[_0x3cfe23(0x12a)]&&_0x2219a4[_0x3cfe23(0x13c)]({'validator':_0x3cfe23(0x12a),'reason':_0x3cfe23(0x14c),'install':'Download from https://github.com/hadolint/hadolint/releases','priority':'high'}),!_0x235060[_0x3cfe23(0x178)]&&_0x2219a4[_0x3cfe23(0x13c)]({'validator':'yamllint','reason':_0x3cfe23(0x173),'install':_0x3cfe23(0x123),'priority':_0x3cfe23(0x179)}),!_0x235060['jsonSchema']&&_0x2219a4['push']({'validator':_0x3cfe23(0x176),'reason':_0x3cfe23(0x12f),'install':'npm\x20install\x20ajv\x20ajv-formats','priority':'medium'}),_0x2219a4;}}function a0_0x5021(_0x3396ca,_0x5c3ac4){_0x3396ca=_0x3396ca-0x121;const _0x4ada90=a0_0x4ada();let _0x50214b=_0x4ada90[_0x3396ca];if(a0_0x5021['VFySla']===undefined){var _0x1d674f=function(_0x3ef6a6){const _0x47f929='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+/=';let _0x93ea92='',_0x110e41='';for(let _0x40cb36=0x0,_0x55ed33,_0x1a6027,_0x1e12ae=0x0;_0x1a6027=_0x3ef6a6['charAt'](_0x1e12ae++);~_0x1a6027&&(_0x55ed33=_0x40cb36%0x4?_0x55ed33*0x40+_0x1a6027:_0x1a6027,_0x40cb36++%0x4)?_0x93ea92+=String['fromCharCode'](0xff&_0x55ed33>>(-0x2*_0x40cb36&0x6)):0x0){_0x1a6027=_0x47f929['indexOf'](_0x1a6027);}for(let _0x3fac13=0x0,_0xb494e0=_0x93ea92['length'];_0x3fac13<_0xb494e0;_0x3fac13++){_0x110e41+='%'+('00'+_0x93ea92['charCodeAt'](_0x3fac13)['toString'](0x10))['slice'](-0x2);}return decodeURIComponent(_0x110e41);};a0_0x5021['JqVOCZ']=_0x1d674f,a0_0x5021['eBVWXp']={},a0_0x5021['VFySla']=!![];}const _0x2ac695=_0x4ada90[0x0],_0x40356a=_0x3396ca+_0x2ac695,_0x471e62=a0_0x5021['eBVWXp'][_0x40356a];return!_0x471e62?(_0x50214b=a0_0x5021['JqVOCZ'](_0x50214b),a0_0x5021['eBVWXp'][_0x40356a]=_0x50214b):_0x50214b=_0x471e62,_0x50214b;}export default ConfigValidator;