@loxia-labs/loxia-autopilot-one 1.0.1 → 1.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +44 -54
- package/bin/cli.js +1 -115
- package/bin/loxia-terminal-v2.js +3 -0
- package/bin/loxia-terminal.js +3 -0
- package/bin/start-with-terminal.js +3 -0
- package/package.json +14 -15
- package/scripts/install-scanners.js +1 -235
- package/src/analyzers/CSSAnalyzer.js +1 -297
- package/src/analyzers/ConfigValidator.js +1 -690
- package/src/analyzers/ESLintAnalyzer.js +1 -320
- package/src/analyzers/JavaScriptAnalyzer.js +1 -261
- package/src/analyzers/PrettierFormatter.js +1 -247
- package/src/analyzers/PythonAnalyzer.js +1 -266
- package/src/analyzers/SecurityAnalyzer.js +1 -729
- package/src/analyzers/TypeScriptAnalyzer.js +1 -247
- package/src/analyzers/codeCloneDetector/analyzer.js +1 -344
- package/src/analyzers/codeCloneDetector/detector.js +1 -203
- package/src/analyzers/codeCloneDetector/index.js +1 -160
- package/src/analyzers/codeCloneDetector/parser.js +1 -199
- package/src/analyzers/codeCloneDetector/reporter.js +1 -148
- package/src/analyzers/codeCloneDetector/scanner.js +1 -59
- package/src/core/agentPool.js +1 -1474
- package/src/core/agentScheduler.js +1 -2147
- package/src/core/contextManager.js +1 -709
- package/src/core/messageProcessor.js +1 -732
- package/src/core/orchestrator.js +1 -548
- package/src/core/stateManager.js +1 -877
- package/src/index.js +1 -631
- package/src/interfaces/cli.js +1 -549
- package/src/interfaces/terminal/__tests__/smoke/advancedFeatures.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/agentControl.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/agents.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/components.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/connection.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/enhancements.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/imports.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/messages.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/tools.test.js +1 -0
- package/src/interfaces/terminal/api/apiClient.js +1 -0
- package/src/interfaces/terminal/api/messageRouter.js +1 -0
- package/src/interfaces/terminal/api/session.js +1 -0
- package/src/interfaces/terminal/api/websocket.js +1 -0
- package/src/interfaces/terminal/components/AgentCreator.js +1 -0
- package/src/interfaces/terminal/components/AgentEditor.js +1 -0
- package/src/interfaces/terminal/components/AgentSwitcher.js +1 -0
- package/src/interfaces/terminal/components/ErrorBoundary.js +1 -0
- package/src/interfaces/terminal/components/ErrorPanel.js +1 -0
- package/src/interfaces/terminal/components/Header.js +1 -0
- package/src/interfaces/terminal/components/HelpPanel.js +1 -0
- package/src/interfaces/terminal/components/InputBox.js +1 -0
- package/src/interfaces/terminal/components/Layout.js +1 -0
- package/src/interfaces/terminal/components/LoadingSpinner.js +1 -0
- package/src/interfaces/terminal/components/MessageList.js +1 -0
- package/src/interfaces/terminal/components/MultilineTextInput.js +1 -0
- package/src/interfaces/terminal/components/SearchPanel.js +1 -0
- package/src/interfaces/terminal/components/SettingsPanel.js +1 -0
- package/src/interfaces/terminal/components/StatusBar.js +1 -0
- package/src/interfaces/terminal/components/TextInput.js +1 -0
- package/src/interfaces/terminal/config/agentEditorConstants.js +1 -0
- package/src/interfaces/terminal/config/constants.js +1 -0
- package/src/interfaces/terminal/index.js +1 -0
- package/src/interfaces/terminal/state/useAgentControl.js +1 -0
- package/src/interfaces/terminal/state/useAgents.js +1 -0
- package/src/interfaces/terminal/state/useConnection.js +1 -0
- package/src/interfaces/terminal/state/useMessages.js +1 -0
- package/src/interfaces/terminal/state/useTools.js +1 -0
- package/src/interfaces/terminal/utils/debugLogger.js +1 -0
- package/src/interfaces/terminal/utils/settingsStorage.js +1 -0
- package/src/interfaces/terminal/utils/theme.js +1 -0
- package/src/interfaces/webServer.js +1 -2162
- package/src/modules/fileExplorer/controller.js +1 -280
- package/src/modules/fileExplorer/index.js +1 -37
- package/src/modules/fileExplorer/middleware.js +1 -92
- package/src/modules/fileExplorer/routes.js +1 -125
- package/src/modules/fileExplorer/types.js +1 -44
- package/src/services/aiService.js +1 -1232
- package/src/services/apiKeyManager.js +1 -164
- package/src/services/benchmarkService.js +1 -366
- package/src/services/budgetService.js +1 -539
- package/src/services/contextInjectionService.js +1 -247
- package/src/services/conversationCompactionService.js +1 -637
- package/src/services/errorHandler.js +1 -810
- package/src/services/fileAttachmentService.js +1 -544
- package/src/services/modelRouterService.js +1 -366
- package/src/services/modelsService.js +1 -322
- package/src/services/qualityInspector.js +1 -796
- package/src/services/tokenCountingService.js +1 -536
- package/src/tools/agentCommunicationTool.js +1 -1344
- package/src/tools/agentDelayTool.js +1 -485
- package/src/tools/asyncToolManager.js +1 -604
- package/src/tools/baseTool.js +1 -800
- package/src/tools/browserTool.js +1 -920
- package/src/tools/cloneDetectionTool.js +1 -621
- package/src/tools/dependencyResolverTool.js +1 -1215
- package/src/tools/fileContentReplaceTool.js +1 -875
- package/src/tools/fileSystemTool.js +1 -1107
- package/src/tools/fileTreeTool.js +1 -853
- package/src/tools/imageTool.js +1 -901
- package/src/tools/importAnalyzerTool.js +1 -1060
- package/src/tools/jobDoneTool.js +1 -248
- package/src/tools/seekTool.js +1 -956
- package/src/tools/staticAnalysisTool.js +1 -1778
- package/src/tools/taskManagerTool.js +1 -2873
- package/src/tools/terminalTool.js +1 -2304
- package/src/tools/webTool.js +1 -1430
- package/src/types/agent.js +1 -519
- package/src/types/contextReference.js +1 -972
- package/src/types/conversation.js +1 -730
- package/src/types/toolCommand.js +1 -747
- package/src/utilities/attachmentValidator.js +1 -292
- package/src/utilities/configManager.js +1 -582
- package/src/utilities/constants.js +1 -722
- package/src/utilities/directoryAccessManager.js +1 -535
- package/src/utilities/fileProcessor.js +1 -307
- package/src/utilities/logger.js +1 -436
- package/src/utilities/tagParser.js +1 -1246
- package/src/utilities/toolConstants.js +1 -317
- package/web-ui/build/index.html +2 -2
- package/web-ui/build/static/{index-Dy2bYbOa.css → index-CClD1090.css} +1 -1
- package/web-ui/build/static/{index-CjkkcnFA.js → index-lCBai6dX.js} +66 -67
|
@@ -1,729 +1 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* SecurityAnalyzer - Professional security scanning using external tools
|
|
3
|
-
*
|
|
4
|
-
* Uses industry-standard security scanners:
|
|
5
|
-
* - Semgrep: Multi-language SAST
|
|
6
|
-
* - Bandit: Python security scanner
|
|
7
|
-
* - ESLint Security Plugin: JavaScript/TypeScript security
|
|
8
|
-
* - npm audit: Node.js dependency vulnerabilities
|
|
9
|
-
* - pip-audit: Python dependency vulnerabilities
|
|
10
|
-
*/
|
|
11
|
-
|
|
12
|
-
import { exec } from 'child_process';
|
|
13
|
-
import { promisify } from 'util';
|
|
14
|
-
import path from 'path';
|
|
15
|
-
import fs from 'fs/promises';
|
|
16
|
-
import { STATIC_ANALYSIS } from '../utilities/constants.js';
|
|
17
|
-
|
|
18
|
-
const execAsync = promisify(exec);
|
|
19
|
-
|
|
20
|
-
class SecurityAnalyzer {
|
|
21
|
-
constructor(logger = null) {
|
|
22
|
-
this.logger = logger;
|
|
23
|
-
this.availableScanners = null;
|
|
24
|
-
this.scannerCache = new Map(); // Cache scanner availability checks
|
|
25
|
-
|
|
26
|
-
// Path to locally installed scanners (from postinstall script)
|
|
27
|
-
this.localScannerDir = path.join(process.cwd(), 'node_modules', '.scanners');
|
|
28
|
-
}
|
|
29
|
-
|
|
30
|
-
/**
|
|
31
|
-
* Detect which security scanners are available on the system
|
|
32
|
-
* @returns {Promise<Object>} Available scanners
|
|
33
|
-
*/
|
|
34
|
-
async detectAvailableScanners() {
|
|
35
|
-
// Return cached result if available
|
|
36
|
-
if (this.availableScanners !== null) {
|
|
37
|
-
return this.availableScanners;
|
|
38
|
-
}
|
|
39
|
-
|
|
40
|
-
const available = {
|
|
41
|
-
semgrep: false,
|
|
42
|
-
bandit: false,
|
|
43
|
-
npmAudit: false,
|
|
44
|
-
pipAudit: false,
|
|
45
|
-
eslintSecurity: false
|
|
46
|
-
};
|
|
47
|
-
|
|
48
|
-
// Check for Semgrep (local first, then system)
|
|
49
|
-
try {
|
|
50
|
-
const localSemgrep = path.join(this.localScannerDir, 'semgrep');
|
|
51
|
-
try {
|
|
52
|
-
await fs.access(localSemgrep);
|
|
53
|
-
available.semgrep = true;
|
|
54
|
-
this.logger?.debug('Semgrep scanner detected (local)');
|
|
55
|
-
} catch {
|
|
56
|
-
await execAsync('semgrep --version', { timeout: 5000 });
|
|
57
|
-
available.semgrep = true;
|
|
58
|
-
this.logger?.debug('Semgrep scanner detected (system)');
|
|
59
|
-
}
|
|
60
|
-
} catch (error) {
|
|
61
|
-
this.logger?.debug('Semgrep not available', { error: error.message });
|
|
62
|
-
}
|
|
63
|
-
|
|
64
|
-
// Check for Bandit
|
|
65
|
-
try {
|
|
66
|
-
await execAsync('bandit --version', { timeout: 5000 });
|
|
67
|
-
available.bandit = true;
|
|
68
|
-
this.logger?.debug('Bandit scanner detected');
|
|
69
|
-
} catch (error) {
|
|
70
|
-
this.logger?.debug('Bandit not available', { error: error.message });
|
|
71
|
-
}
|
|
72
|
-
|
|
73
|
-
// Check for npm (npm audit is built-in)
|
|
74
|
-
try {
|
|
75
|
-
await execAsync('npm --version', { timeout: 5000 });
|
|
76
|
-
available.npmAudit = true;
|
|
77
|
-
this.logger?.debug('npm audit available');
|
|
78
|
-
} catch (error) {
|
|
79
|
-
this.logger?.debug('npm not available', { error: error.message });
|
|
80
|
-
}
|
|
81
|
-
|
|
82
|
-
// Check for pip-audit
|
|
83
|
-
try {
|
|
84
|
-
await execAsync('pip-audit --version', { timeout: 5000 });
|
|
85
|
-
available.pipAudit = true;
|
|
86
|
-
this.logger?.debug('pip-audit detected');
|
|
87
|
-
} catch (error) {
|
|
88
|
-
this.logger?.debug('pip-audit not available', { error: error.message });
|
|
89
|
-
}
|
|
90
|
-
|
|
91
|
-
// Check for eslint-plugin-security
|
|
92
|
-
try {
|
|
93
|
-
// Check if the package is installed
|
|
94
|
-
const result = await execAsync('npm list eslint-plugin-security --depth=0 --json', {
|
|
95
|
-
timeout: 5000,
|
|
96
|
-
cwd: process.cwd()
|
|
97
|
-
});
|
|
98
|
-
const parsed = JSON.parse(result.stdout);
|
|
99
|
-
if (parsed.dependencies && parsed.dependencies['eslint-plugin-security']) {
|
|
100
|
-
available.eslintSecurity = true;
|
|
101
|
-
this.logger?.debug('eslint-plugin-security detected');
|
|
102
|
-
}
|
|
103
|
-
} catch (error) {
|
|
104
|
-
this.logger?.debug('eslint-plugin-security not available', { error: error.message });
|
|
105
|
-
}
|
|
106
|
-
|
|
107
|
-
this.availableScanners = available;
|
|
108
|
-
return available;
|
|
109
|
-
}
|
|
110
|
-
|
|
111
|
-
/**
|
|
112
|
-
* Analyze a file for security vulnerabilities
|
|
113
|
-
* @param {string} filePath - Path to file
|
|
114
|
-
* @param {string} content - File content
|
|
115
|
-
* @param {Object} options - Analysis options
|
|
116
|
-
* @returns {Promise<Array>} Security issues found
|
|
117
|
-
*/
|
|
118
|
-
async analyze(filePath, content, options = {}) {
|
|
119
|
-
const issues = [];
|
|
120
|
-
const available = await this.detectAvailableScanners();
|
|
121
|
-
const language = this.detectLanguage(filePath);
|
|
122
|
-
|
|
123
|
-
// Skip test files if requested
|
|
124
|
-
if (options.skipTestFiles !== false && this.isTestFile(filePath)) {
|
|
125
|
-
this.logger?.debug('Skipping test file for security scan', { filePath });
|
|
126
|
-
return [];
|
|
127
|
-
}
|
|
128
|
-
|
|
129
|
-
// Run appropriate scanners based on language
|
|
130
|
-
if (language === 'javascript' || language === 'typescript') {
|
|
131
|
-
// Run Semgrep for JS/TS
|
|
132
|
-
if (available.semgrep) {
|
|
133
|
-
const semgrepIssues = await this.runSemgrep(filePath, [language], options);
|
|
134
|
-
issues.push(...semgrepIssues);
|
|
135
|
-
}
|
|
136
|
-
|
|
137
|
-
// Run ESLint Security Plugin
|
|
138
|
-
if (available.eslintSecurity) {
|
|
139
|
-
const eslintIssues = await this.runESLintSecurity(filePath, content, options);
|
|
140
|
-
issues.push(...eslintIssues);
|
|
141
|
-
}
|
|
142
|
-
}
|
|
143
|
-
|
|
144
|
-
if (language === 'python') {
|
|
145
|
-
// Run Bandit for Python
|
|
146
|
-
if (available.bandit) {
|
|
147
|
-
const banditIssues = await this.runBandit(filePath, options);
|
|
148
|
-
issues.push(...banditIssues);
|
|
149
|
-
}
|
|
150
|
-
|
|
151
|
-
// Run Semgrep for Python
|
|
152
|
-
if (available.semgrep) {
|
|
153
|
-
const semgrepIssues = await this.runSemgrep(filePath, [language], options);
|
|
154
|
-
issues.push(...semgrepIssues);
|
|
155
|
-
}
|
|
156
|
-
}
|
|
157
|
-
|
|
158
|
-
// If no scanners available, return informative message
|
|
159
|
-
if (issues.length === 0 && !this.hasScannersForLanguage(available, language)) {
|
|
160
|
-
this.logger?.warn('No security scanners available for language', { language, filePath });
|
|
161
|
-
}
|
|
162
|
-
|
|
163
|
-
return this.normalizeResults(issues);
|
|
164
|
-
}
|
|
165
|
-
|
|
166
|
-
/**
|
|
167
|
-
* Analyze a project directory for security vulnerabilities
|
|
168
|
-
* @param {string} projectDir - Project directory path
|
|
169
|
-
* @param {string} language - Primary language to scan
|
|
170
|
-
* @param {Object} options - Analysis options
|
|
171
|
-
* @returns {Promise<Array>} Security issues found
|
|
172
|
-
*/
|
|
173
|
-
async analyzeProject(projectDir, language, options = {}) {
|
|
174
|
-
const issues = [];
|
|
175
|
-
const available = await this.detectAvailableScanners();
|
|
176
|
-
|
|
177
|
-
// Run dependency scanners
|
|
178
|
-
if (language === 'javascript' || language === 'typescript') {
|
|
179
|
-
if (available.npmAudit) {
|
|
180
|
-
const npmIssues = await this.runNpmAudit(projectDir, options);
|
|
181
|
-
issues.push(...npmIssues);
|
|
182
|
-
}
|
|
183
|
-
}
|
|
184
|
-
|
|
185
|
-
if (language === 'python') {
|
|
186
|
-
if (available.pipAudit) {
|
|
187
|
-
const pipIssues = await this.runPipAudit(projectDir, options);
|
|
188
|
-
issues.push(...pipIssues);
|
|
189
|
-
}
|
|
190
|
-
}
|
|
191
|
-
|
|
192
|
-
return this.normalizeResults(issues);
|
|
193
|
-
}
|
|
194
|
-
|
|
195
|
-
/**
|
|
196
|
-
* Run Semgrep scanner
|
|
197
|
-
* @private
|
|
198
|
-
*/
|
|
199
|
-
async runSemgrep(filePath, languages, options = {}) {
|
|
200
|
-
try {
|
|
201
|
-
const dir = path.dirname(filePath);
|
|
202
|
-
const result = await execAsync(
|
|
203
|
-
`semgrep --config=auto --json "${filePath}"`,
|
|
204
|
-
{
|
|
205
|
-
maxBuffer: 10 * 1024 * 1024,
|
|
206
|
-
timeout: 30000,
|
|
207
|
-
cwd: dir
|
|
208
|
-
}
|
|
209
|
-
);
|
|
210
|
-
|
|
211
|
-
const output = JSON.parse(result.stdout);
|
|
212
|
-
return this.parseSemgrepResults(output);
|
|
213
|
-
} catch (error) {
|
|
214
|
-
// Semgrep exits with non-zero if issues found, check stdout
|
|
215
|
-
if (error.stdout) {
|
|
216
|
-
try {
|
|
217
|
-
const output = JSON.parse(error.stdout);
|
|
218
|
-
return this.parseSemgrepResults(output);
|
|
219
|
-
} catch (parseError) {
|
|
220
|
-
this.logger?.error('Failed to parse Semgrep output', {
|
|
221
|
-
error: parseError.message,
|
|
222
|
-
stdout: error.stdout
|
|
223
|
-
});
|
|
224
|
-
}
|
|
225
|
-
}
|
|
226
|
-
this.logger?.error('Semgrep scan failed', { error: error.message });
|
|
227
|
-
return [];
|
|
228
|
-
}
|
|
229
|
-
}
|
|
230
|
-
|
|
231
|
-
/**
|
|
232
|
-
* Parse Semgrep results
|
|
233
|
-
* @private
|
|
234
|
-
*/
|
|
235
|
-
parseSemgrepResults(output) {
|
|
236
|
-
const issues = [];
|
|
237
|
-
|
|
238
|
-
if (output.results && Array.isArray(output.results)) {
|
|
239
|
-
for (const result of output.results) {
|
|
240
|
-
issues.push({
|
|
241
|
-
file: result.path,
|
|
242
|
-
line: result.start?.line || 1,
|
|
243
|
-
column: result.start?.col || 1,
|
|
244
|
-
severity: this.mapSemgrepSeverity(result.extra?.severity),
|
|
245
|
-
rule: result.check_id,
|
|
246
|
-
message: result.extra?.message || result.extra?.lines || 'Security issue detected',
|
|
247
|
-
category: 'security',
|
|
248
|
-
scanner: 'semgrep',
|
|
249
|
-
cwe: result.extra?.metadata?.cwe,
|
|
250
|
-
owasp: result.extra?.metadata?.owasp,
|
|
251
|
-
confidence: result.extra?.metadata?.confidence,
|
|
252
|
-
references: result.extra?.metadata?.references
|
|
253
|
-
});
|
|
254
|
-
}
|
|
255
|
-
}
|
|
256
|
-
|
|
257
|
-
return issues;
|
|
258
|
-
}
|
|
259
|
-
|
|
260
|
-
/**
|
|
261
|
-
* Run Bandit scanner for Python
|
|
262
|
-
* @private
|
|
263
|
-
*/
|
|
264
|
-
async runBandit(filePath, options = {}) {
|
|
265
|
-
try {
|
|
266
|
-
const result = await execAsync(
|
|
267
|
-
`bandit -f json "${filePath}"`,
|
|
268
|
-
{
|
|
269
|
-
maxBuffer: 10 * 1024 * 1024,
|
|
270
|
-
timeout: 30000
|
|
271
|
-
}
|
|
272
|
-
);
|
|
273
|
-
|
|
274
|
-
const output = JSON.parse(result.stdout);
|
|
275
|
-
return this.parseBanditResults(output);
|
|
276
|
-
} catch (error) {
|
|
277
|
-
// Bandit exits with non-zero if issues found
|
|
278
|
-
if (error.stdout) {
|
|
279
|
-
try {
|
|
280
|
-
const output = JSON.parse(error.stdout);
|
|
281
|
-
return this.parseBanditResults(output);
|
|
282
|
-
} catch (parseError) {
|
|
283
|
-
this.logger?.error('Failed to parse Bandit output', {
|
|
284
|
-
error: parseError.message
|
|
285
|
-
});
|
|
286
|
-
}
|
|
287
|
-
}
|
|
288
|
-
this.logger?.error('Bandit scan failed', { error: error.message });
|
|
289
|
-
return [];
|
|
290
|
-
}
|
|
291
|
-
}
|
|
292
|
-
|
|
293
|
-
/**
|
|
294
|
-
* Parse Bandit results
|
|
295
|
-
* @private
|
|
296
|
-
*/
|
|
297
|
-
parseBanditResults(output) {
|
|
298
|
-
const issues = [];
|
|
299
|
-
|
|
300
|
-
if (output.results && Array.isArray(output.results)) {
|
|
301
|
-
for (const result of output.results) {
|
|
302
|
-
issues.push({
|
|
303
|
-
file: result.filename,
|
|
304
|
-
line: result.line_number || 1,
|
|
305
|
-
column: result.col_offset || 1,
|
|
306
|
-
severity: this.mapBanditSeverity(result.issue_severity),
|
|
307
|
-
rule: result.test_id,
|
|
308
|
-
message: result.issue_text,
|
|
309
|
-
category: 'security',
|
|
310
|
-
scanner: 'bandit',
|
|
311
|
-
cwe: result.issue_cwe?.id ? `CWE-${result.issue_cwe.id}` : null,
|
|
312
|
-
confidence: result.issue_confidence,
|
|
313
|
-
moreInfo: result.more_info
|
|
314
|
-
});
|
|
315
|
-
}
|
|
316
|
-
}
|
|
317
|
-
|
|
318
|
-
return issues;
|
|
319
|
-
}
|
|
320
|
-
|
|
321
|
-
/**
|
|
322
|
-
* Run ESLint with security plugin
|
|
323
|
-
* @private
|
|
324
|
-
*/
|
|
325
|
-
async runESLintSecurity(filePath, content, options = {}) {
|
|
326
|
-
try {
|
|
327
|
-
// Use ESLint programmatically
|
|
328
|
-
const { ESLint } = await import('eslint');
|
|
329
|
-
|
|
330
|
-
const eslint = new ESLint({
|
|
331
|
-
overrideConfig: {
|
|
332
|
-
plugins: ['security'],
|
|
333
|
-
extends: ['plugin:security/recommended'],
|
|
334
|
-
parserOptions: {
|
|
335
|
-
ecmaVersion: 'latest',
|
|
336
|
-
sourceType: 'module'
|
|
337
|
-
}
|
|
338
|
-
},
|
|
339
|
-
useEslintrc: false
|
|
340
|
-
});
|
|
341
|
-
|
|
342
|
-
const results = await eslint.lintText(content, { filePath });
|
|
343
|
-
return this.parseESLintResults(results, filePath);
|
|
344
|
-
} catch (error) {
|
|
345
|
-
this.logger?.error('ESLint security scan failed', {
|
|
346
|
-
error: error.message,
|
|
347
|
-
filePath
|
|
348
|
-
});
|
|
349
|
-
return [];
|
|
350
|
-
}
|
|
351
|
-
}
|
|
352
|
-
|
|
353
|
-
/**
|
|
354
|
-
* Parse ESLint security results
|
|
355
|
-
* @private
|
|
356
|
-
*/
|
|
357
|
-
parseESLintResults(results, filePath) {
|
|
358
|
-
const issues = [];
|
|
359
|
-
|
|
360
|
-
for (const result of results) {
|
|
361
|
-
if (result.messages && Array.isArray(result.messages)) {
|
|
362
|
-
for (const message of result.messages) {
|
|
363
|
-
// Only include security plugin rules
|
|
364
|
-
if (message.ruleId && message.ruleId.startsWith('security/')) {
|
|
365
|
-
issues.push({
|
|
366
|
-
file: filePath,
|
|
367
|
-
line: message.line || 1,
|
|
368
|
-
column: message.column || 1,
|
|
369
|
-
severity: this.mapESLintSeverity(message.severity),
|
|
370
|
-
rule: message.ruleId,
|
|
371
|
-
message: message.message,
|
|
372
|
-
category: 'security',
|
|
373
|
-
scanner: 'eslint-security',
|
|
374
|
-
fixable: message.fix !== undefined
|
|
375
|
-
});
|
|
376
|
-
}
|
|
377
|
-
}
|
|
378
|
-
}
|
|
379
|
-
}
|
|
380
|
-
|
|
381
|
-
return issues;
|
|
382
|
-
}
|
|
383
|
-
|
|
384
|
-
/**
|
|
385
|
-
* Run npm audit for dependency vulnerabilities
|
|
386
|
-
* @private
|
|
387
|
-
*/
|
|
388
|
-
async runNpmAudit(projectDir, options = {}) {
|
|
389
|
-
try {
|
|
390
|
-
// Check if package.json exists
|
|
391
|
-
const packageJsonPath = path.join(projectDir, 'package.json');
|
|
392
|
-
try {
|
|
393
|
-
await fs.access(packageJsonPath);
|
|
394
|
-
} catch {
|
|
395
|
-
this.logger?.debug('No package.json found, skipping npm audit');
|
|
396
|
-
return [];
|
|
397
|
-
}
|
|
398
|
-
|
|
399
|
-
const result = await execAsync(
|
|
400
|
-
'npm audit --json',
|
|
401
|
-
{
|
|
402
|
-
cwd: projectDir,
|
|
403
|
-
maxBuffer: 10 * 1024 * 1024,
|
|
404
|
-
timeout: 60000
|
|
405
|
-
}
|
|
406
|
-
);
|
|
407
|
-
|
|
408
|
-
const output = JSON.parse(result.stdout);
|
|
409
|
-
return this.parseNpmAuditResults(output);
|
|
410
|
-
} catch (error) {
|
|
411
|
-
// npm audit exits with non-zero if vulnerabilities found
|
|
412
|
-
if (error.stdout) {
|
|
413
|
-
try {
|
|
414
|
-
const output = JSON.parse(error.stdout);
|
|
415
|
-
return this.parseNpmAuditResults(output);
|
|
416
|
-
} catch (parseError) {
|
|
417
|
-
this.logger?.error('Failed to parse npm audit output', {
|
|
418
|
-
error: parseError.message
|
|
419
|
-
});
|
|
420
|
-
}
|
|
421
|
-
}
|
|
422
|
-
return [];
|
|
423
|
-
}
|
|
424
|
-
}
|
|
425
|
-
|
|
426
|
-
/**
|
|
427
|
-
* Parse npm audit results
|
|
428
|
-
* @private
|
|
429
|
-
*/
|
|
430
|
-
parseNpmAuditResults(output) {
|
|
431
|
-
const issues = [];
|
|
432
|
-
|
|
433
|
-
// npm audit v7+ format
|
|
434
|
-
if (output.vulnerabilities) {
|
|
435
|
-
for (const [packageName, vuln] of Object.entries(output.vulnerabilities)) {
|
|
436
|
-
issues.push({
|
|
437
|
-
file: 'package.json',
|
|
438
|
-
line: 1,
|
|
439
|
-
column: 1,
|
|
440
|
-
severity: this.mapNpmSeverity(vuln.severity),
|
|
441
|
-
rule: `npm-${vuln.via[0]?.source || 'advisory'}`,
|
|
442
|
-
message: `${packageName}: ${vuln.via[0]?.title || 'Security vulnerability'}`,
|
|
443
|
-
category: 'security',
|
|
444
|
-
scanner: 'npm-audit',
|
|
445
|
-
package: packageName,
|
|
446
|
-
vulnerableVersions: vuln.range,
|
|
447
|
-
patchedVersions: vuln.fixAvailable ? 'Available' : 'None',
|
|
448
|
-
cve: vuln.via[0]?.cve,
|
|
449
|
-
cvss: vuln.via[0]?.cvss,
|
|
450
|
-
references: vuln.via[0]?.url ? [vuln.via[0].url] : []
|
|
451
|
-
});
|
|
452
|
-
}
|
|
453
|
-
}
|
|
454
|
-
|
|
455
|
-
return issues;
|
|
456
|
-
}
|
|
457
|
-
|
|
458
|
-
/**
|
|
459
|
-
* Run pip-audit for Python dependencies
|
|
460
|
-
* @private
|
|
461
|
-
*/
|
|
462
|
-
async runPipAudit(projectDir, options = {}) {
|
|
463
|
-
try {
|
|
464
|
-
// Check if requirements.txt exists
|
|
465
|
-
const requirementsPath = path.join(projectDir, 'requirements.txt');
|
|
466
|
-
try {
|
|
467
|
-
await fs.access(requirementsPath);
|
|
468
|
-
} catch {
|
|
469
|
-
this.logger?.debug('No requirements.txt found, skipping pip-audit');
|
|
470
|
-
return [];
|
|
471
|
-
}
|
|
472
|
-
|
|
473
|
-
const result = await execAsync(
|
|
474
|
-
'pip-audit --format json',
|
|
475
|
-
{
|
|
476
|
-
cwd: projectDir,
|
|
477
|
-
maxBuffer: 10 * 1024 * 1024,
|
|
478
|
-
timeout: 60000
|
|
479
|
-
}
|
|
480
|
-
);
|
|
481
|
-
|
|
482
|
-
const output = JSON.parse(result.stdout);
|
|
483
|
-
return this.parsePipAuditResults(output);
|
|
484
|
-
} catch (error) {
|
|
485
|
-
if (error.stdout) {
|
|
486
|
-
try {
|
|
487
|
-
const output = JSON.parse(error.stdout);
|
|
488
|
-
return this.parsePipAuditResults(output);
|
|
489
|
-
} catch (parseError) {
|
|
490
|
-
this.logger?.error('Failed to parse pip-audit output', {
|
|
491
|
-
error: parseError.message
|
|
492
|
-
});
|
|
493
|
-
}
|
|
494
|
-
}
|
|
495
|
-
return [];
|
|
496
|
-
}
|
|
497
|
-
}
|
|
498
|
-
|
|
499
|
-
/**
|
|
500
|
-
* Parse pip-audit results
|
|
501
|
-
* @private
|
|
502
|
-
*/
|
|
503
|
-
parsePipAuditResults(output) {
|
|
504
|
-
const issues = [];
|
|
505
|
-
|
|
506
|
-
if (output.dependencies && Array.isArray(output.dependencies)) {
|
|
507
|
-
for (const dep of output.dependencies) {
|
|
508
|
-
if (dep.vulns && Array.isArray(dep.vulns)) {
|
|
509
|
-
for (const vuln of dep.vulns) {
|
|
510
|
-
issues.push({
|
|
511
|
-
file: 'requirements.txt',
|
|
512
|
-
line: 1,
|
|
513
|
-
column: 1,
|
|
514
|
-
severity: this.mapPipAuditSeverity(vuln.severity),
|
|
515
|
-
rule: vuln.id,
|
|
516
|
-
message: `${dep.name}: ${vuln.description || 'Security vulnerability'}`,
|
|
517
|
-
category: 'security',
|
|
518
|
-
scanner: 'pip-audit',
|
|
519
|
-
package: dep.name,
|
|
520
|
-
vulnerableVersion: dep.version,
|
|
521
|
-
fixedVersions: vuln.fix_versions,
|
|
522
|
-
references: vuln.aliases || []
|
|
523
|
-
});
|
|
524
|
-
}
|
|
525
|
-
}
|
|
526
|
-
}
|
|
527
|
-
}
|
|
528
|
-
|
|
529
|
-
return issues;
|
|
530
|
-
}
|
|
531
|
-
|
|
532
|
-
/**
|
|
533
|
-
* Detect language from file extension
|
|
534
|
-
* @private
|
|
535
|
-
*/
|
|
536
|
-
detectLanguage(filePath) {
|
|
537
|
-
const ext = path.extname(filePath).toLowerCase();
|
|
538
|
-
const languageMap = {
|
|
539
|
-
'.js': 'javascript',
|
|
540
|
-
'.jsx': 'javascript',
|
|
541
|
-
'.mjs': 'javascript',
|
|
542
|
-
'.cjs': 'javascript',
|
|
543
|
-
'.ts': 'typescript',
|
|
544
|
-
'.tsx': 'typescript',
|
|
545
|
-
'.py': 'python'
|
|
546
|
-
};
|
|
547
|
-
return languageMap[ext] || null;
|
|
548
|
-
}
|
|
549
|
-
|
|
550
|
-
/**
|
|
551
|
-
* Check if file is a test file
|
|
552
|
-
* @private
|
|
553
|
-
*/
|
|
554
|
-
isTestFile(filePath) {
|
|
555
|
-
const testPatterns = [
|
|
556
|
-
/\.test\./,
|
|
557
|
-
/\.spec\./,
|
|
558
|
-
/__tests__\//,
|
|
559
|
-
/\/tests?\//,
|
|
560
|
-
/\.test$/,
|
|
561
|
-
/\.spec$/
|
|
562
|
-
];
|
|
563
|
-
return testPatterns.some(pattern => pattern.test(filePath));
|
|
564
|
-
}
|
|
565
|
-
|
|
566
|
-
/**
|
|
567
|
-
* Check if scanners are available for a language
|
|
568
|
-
* @private
|
|
569
|
-
*/
|
|
570
|
-
hasScannersForLanguage(available, language) {
|
|
571
|
-
if (language === 'javascript' || language === 'typescript') {
|
|
572
|
-
return available.semgrep || available.eslintSecurity;
|
|
573
|
-
}
|
|
574
|
-
if (language === 'python') {
|
|
575
|
-
return available.bandit || available.semgrep;
|
|
576
|
-
}
|
|
577
|
-
return false;
|
|
578
|
-
}
|
|
579
|
-
|
|
580
|
-
/**
|
|
581
|
-
* Normalize all scanner results to common format
|
|
582
|
-
* @private
|
|
583
|
-
*/
|
|
584
|
-
normalizeResults(results) {
|
|
585
|
-
return results.map(result => ({
|
|
586
|
-
file: result.file,
|
|
587
|
-
line: result.line || 1,
|
|
588
|
-
column: result.column || 1,
|
|
589
|
-
severity: result.severity || STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
590
|
-
rule: result.rule || 'unknown',
|
|
591
|
-
message: result.message || 'Security issue detected',
|
|
592
|
-
category: 'security',
|
|
593
|
-
scanner: result.scanner,
|
|
594
|
-
cwe: result.cwe || null,
|
|
595
|
-
owasp: result.owasp || null,
|
|
596
|
-
confidence: result.confidence || null,
|
|
597
|
-
fixable: result.fixable || false,
|
|
598
|
-
remediation: result.remediation || result.moreInfo || null,
|
|
599
|
-
references: result.references || [],
|
|
600
|
-
package: result.package || null
|
|
601
|
-
}));
|
|
602
|
-
}
|
|
603
|
-
|
|
604
|
-
/**
|
|
605
|
-
* Map Semgrep severity to our standard
|
|
606
|
-
* @private
|
|
607
|
-
*/
|
|
608
|
-
mapSemgrepSeverity(severity) {
|
|
609
|
-
const map = {
|
|
610
|
-
'ERROR': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
611
|
-
'WARNING': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
612
|
-
'INFO': STATIC_ANALYSIS.SEVERITY.WARNING
|
|
613
|
-
};
|
|
614
|
-
return map[severity?.toUpperCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
615
|
-
}
|
|
616
|
-
|
|
617
|
-
/**
|
|
618
|
-
* Map Bandit severity to our standard
|
|
619
|
-
* @private
|
|
620
|
-
*/
|
|
621
|
-
mapBanditSeverity(severity) {
|
|
622
|
-
const map = {
|
|
623
|
-
'HIGH': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
624
|
-
'MEDIUM': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
625
|
-
'LOW': STATIC_ANALYSIS.SEVERITY.WARNING
|
|
626
|
-
};
|
|
627
|
-
return map[severity?.toUpperCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
628
|
-
}
|
|
629
|
-
|
|
630
|
-
/**
|
|
631
|
-
* Map ESLint severity to our standard
|
|
632
|
-
* @private
|
|
633
|
-
*/
|
|
634
|
-
mapESLintSeverity(severity) {
|
|
635
|
-
return severity === 2 ? STATIC_ANALYSIS.SEVERITY.ERROR : STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
636
|
-
}
|
|
637
|
-
|
|
638
|
-
/**
|
|
639
|
-
* Map npm audit severity to our standard
|
|
640
|
-
* @private
|
|
641
|
-
*/
|
|
642
|
-
mapNpmSeverity(severity) {
|
|
643
|
-
const map = {
|
|
644
|
-
'critical': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
645
|
-
'high': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
646
|
-
'moderate': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
647
|
-
'low': STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
648
|
-
'info': STATIC_ANALYSIS.SEVERITY.INFO
|
|
649
|
-
};
|
|
650
|
-
return map[severity?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
651
|
-
}
|
|
652
|
-
|
|
653
|
-
/**
|
|
654
|
-
* Map pip-audit severity to our standard
|
|
655
|
-
* @private
|
|
656
|
-
*/
|
|
657
|
-
mapPipAuditSeverity(severity) {
|
|
658
|
-
// pip-audit doesn't always provide severity, default to ERROR
|
|
659
|
-
if (!severity) return STATIC_ANALYSIS.SEVERITY.ERROR;
|
|
660
|
-
|
|
661
|
-
const map = {
|
|
662
|
-
'critical': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
663
|
-
'high': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
664
|
-
'medium': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
665
|
-
'low': STATIC_ANALYSIS.SEVERITY.WARNING
|
|
666
|
-
};
|
|
667
|
-
return map[severity?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.ERROR;
|
|
668
|
-
}
|
|
669
|
-
|
|
670
|
-
/**
|
|
671
|
-
* Get scanner status report
|
|
672
|
-
* @returns {Promise<Object>} Scanner availability and status
|
|
673
|
-
*/
|
|
674
|
-
async getScannerStatus() {
|
|
675
|
-
const available = await this.detectAvailableScanners();
|
|
676
|
-
return {
|
|
677
|
-
scanners: available,
|
|
678
|
-
recommendations: this.getInstallRecommendations(available)
|
|
679
|
-
};
|
|
680
|
-
}
|
|
681
|
-
|
|
682
|
-
/**
|
|
683
|
-
* Get installation recommendations for missing scanners
|
|
684
|
-
* @private
|
|
685
|
-
*/
|
|
686
|
-
getInstallRecommendations(available) {
|
|
687
|
-
const recommendations = [];
|
|
688
|
-
|
|
689
|
-
if (!available.semgrep) {
|
|
690
|
-
recommendations.push({
|
|
691
|
-
scanner: 'Semgrep',
|
|
692
|
-
reason: 'Multi-language SAST with extensive security rules',
|
|
693
|
-
install: 'pip install semgrep OR use Docker: docker pull returntocorp/semgrep',
|
|
694
|
-
priority: 'high'
|
|
695
|
-
});
|
|
696
|
-
}
|
|
697
|
-
|
|
698
|
-
if (!available.bandit) {
|
|
699
|
-
recommendations.push({
|
|
700
|
-
scanner: 'Bandit',
|
|
701
|
-
reason: 'Python security scanner',
|
|
702
|
-
install: 'pip install bandit',
|
|
703
|
-
priority: 'medium'
|
|
704
|
-
});
|
|
705
|
-
}
|
|
706
|
-
|
|
707
|
-
if (!available.eslintSecurity) {
|
|
708
|
-
recommendations.push({
|
|
709
|
-
scanner: 'eslint-plugin-security',
|
|
710
|
-
reason: 'JavaScript/TypeScript security rules',
|
|
711
|
-
install: 'npm install --save-dev eslint-plugin-security',
|
|
712
|
-
priority: 'medium'
|
|
713
|
-
});
|
|
714
|
-
}
|
|
715
|
-
|
|
716
|
-
if (!available.pipAudit) {
|
|
717
|
-
recommendations.push({
|
|
718
|
-
scanner: 'pip-audit',
|
|
719
|
-
reason: 'Python dependency vulnerability scanner',
|
|
720
|
-
install: 'pip install pip-audit',
|
|
721
|
-
priority: 'low'
|
|
722
|
-
});
|
|
723
|
-
}
|
|
724
|
-
|
|
725
|
-
return recommendations;
|
|
726
|
-
}
|
|
727
|
-
}
|
|
728
|
-
|
|
729
|
-
export default SecurityAnalyzer;
|
|
1
|
+
const a0_0x5d6f5b=a0_0x5e88;(function(_0xdd22f0,_0x5982ee){const _0x1fe4e0=a0_0x5e88,_0x31f1d1=_0xdd22f0();while(!![]){try{const _0x2a7f69=parseInt(_0x1fe4e0(0x1a6))/0x1+-parseInt(_0x1fe4e0(0x1e8))/0x2+parseInt(_0x1fe4e0(0x205))/0x3+-parseInt(_0x1fe4e0(0x207))/0x4+parseInt(_0x1fe4e0(0x1dd))/0x5+-parseInt(_0x1fe4e0(0x1eb))/0x6*(parseInt(_0x1fe4e0(0x1d6))/0x7)+-parseInt(_0x1fe4e0(0x191))/0x8;if(_0x2a7f69===_0x5982ee)break;else _0x31f1d1['push'](_0x31f1d1['shift']());}catch(_0x2245d9){_0x31f1d1['push'](_0x31f1d1['shift']());}}}(a0_0xb888,0xdadad));import{exec}from'child_process';import{promisify}from'util';import a0_0x3a5a26 from'path';import a0_0x5dd803 from'fs/promises';import{STATIC_ANALYSIS}from'../utilities/constants.js';function a0_0xb888(){const _0x2410fa=['zML4','D2fYBG','q1Dflq','CgfYC2vcyw5KAxrszxn1BhrZ','CgLWlwf1zgL0','C2nHBM5LCKnHy2HL','BM9Kzv9TB2r1BgvZ','BNbTigf1zgL0igf2ywLSywjSzq','AgfZu2nHBM5LCNngB3jmyw5NDwfNzq','CMvMzxjLBMnLCW','rvnmAw50ihnLy3vYAxr5ihnJyw4GzMfPBgvK','zgvZy3jPChrPB24','v0fstKLorW','Bwv0ywrHDge','CMvXDwLYzw1LBNrZlNr4Da','y3zZCW','qMfUzgL0','Dw5RBM93BG','BwvZC2fNzq','CgLWlwf1zgL0ic0TzM9YBwf0igPZB24','Bg9Nz2vY','u0vwrvjjvfK','Bg9JywXty2fUBMvYrgLY','CNvUu2vTz3jLCa','zxH0BMfTzq','yxzHAwXHyMXLu2nHBM5LCNm','y29Sx29MzNnLDa','u2vTz3jLCcbZy2fUBMvYigrLDgvJDgvKicHSB2nHBcK','mteYD3PdDvbp','zxjYB3i','CNvUtNbTqxvKAxq','C2v2zxjPDhK','u2vTz3jLCcbZy2fUigzHAwXLza','rMfPBgvKihrVihbHCNnLifnLBwDYzxaGB3v0Chv0','BNbTigLUC3rHBgWGls1ZyxzLlwrLDIbLC2XPBNqTCgX1z2LUlxnLy3vYAxr5','nJiXodaWmhrRBMXewq','C3rHCNq','CgfJA2fNzq','ywXPyxnLCW','BwfW','Bw9KDwXL','zgv0zwn0qxzHAwXHyMXLu2nHBM5LCNm','DMLH','zxH0CMe','CgLWlwf1zgL0ic0TDMvYC2LVBG','z2v0u2nHBM5LCLn0yxr1CW','otGWntm4rLf5D29p','CgfYC2vfu0XPBNrszxn1BhrZ','AM9PBG','mJa5mZG4zvvRthfT','BNbTig5VDcbHDMfPBgfIBgu','CgfYC2vtzw1NCMvWuMvZDwX0CW','ChvZAa','CNvSzuLK','CgfYC2vqAxbbDwrPDfjLC3vSDhm','zxnSAw50u2vJDxjPDhK','y3zL','lNnJyw5UzxjZ','AxnbCNjHEq','zxnSAw50lxbSDwDPBI1Zzwn1CML0EsbKzxrLy3rLza','AMf2yxnJCMLWDa','tM8GC2vJDxjPDhKGC2nHBM5LCNmGyxzHAwXHyMXLigzVCIbSyw5NDwfNzq','C2vTz3jLCcaTlxzLCNnPB24','ChL0Ag9U','CgfYC2u','CgLWqxvKAxq','BgLUzq','BNbTic0TDMvYC2LVBG','BwfWrvnmAw50u2v2zxjPDhK','q1jjveLdquW','DxjS','Dg9mB3DLCKnHC2u','AxnZDwvFy3DL','B3DHC3a','C291CMnL','mtC2mtm4n0HqEg5swG','BNbTigf1zgL0ic0TANnVBG','mtm1ndyYngTzv3D0qq','yMfUzgL0','DNvSBNm','BNbTlq','Axnuzxn0rMLSzq','txvSDgKTBgfUz3vHz2uGu0ftvcb3AxrOigv4DgvUC2L2zsbZzwn1CML0EsbYDwXLCW','z2v0sw5ZDgfSBfjLy29TBwvUzgf0Aw9UCW','BMfTzq','Dg9vChbLCKnHC2u','BNbTqxvKAxq','BwfWqMfUzgL0u2v2zxjPDhK','C3rKB3v0','C2vTz3jLCcaTlwnVBMzPzZ1HDxrVic0TANnVBIaI','oti0mtq3mMnKyLLUCq','uhL0Ag9UigrLCgvUzgvUy3KGDNvSBMvYywjPBgL0EsbZy2fUBMvY','y29UzMLKzw5Jzq','y29S','zgvIDwC','Bw9Yzv9PBMzV','BwfWu2vTz3jLCfnLDMvYAxr5','su5gtW','zxnSAw50lxbSDwDPBI1Zzwn1CML0Eq','qxzHAwXHyMXL','rvjst1i','BM9YBwfSAxPLuMvZDwX0CW','CMfUz2u','AxnZDwvFDgv4Da','CgLWigLUC3rHBgWGCgLWlwf1zgL0','zgv0zwn0tgfUz3vHz2u','C2vJDxjPDhK','y2HLy2TFAwq','C2vTz3jLCa','CNvUqMfUzgL0','y3DL','mtyWode3n1DNzxzqza','Bg93','CgfYC2voCg1bDwrPDfjLC3vSDhm','zML4qxzHAwXHyMXL','zgLYBMfTzq','y3DK','u2vJDxjPDhKGDNvSBMvYywjPBgL0Eq','BwfWtNbTu2v2zxjPDhK','CMvTzwrPyxrPB24','rMfPBgvKihrVihbHCNnLig5WBsbHDwrPDcbVDxrWDxq','tM9Uzq','ywnJzxnZ','BwfWugLWqxvKAxrtzxzLCML0Eq','zgvWzw5Kzw5JAwvZ','CMvZDwX0CW','u2TPChbPBMCGDgvZDcbMAwXLigzVCIbZzwn1CML0EsbZy2fU','DNvSBMvYywjPBgL0AwvZ','yw5HBhL6zq','AgLNAa','AxnZDwvFC2v2zxjPDhK'];a0_0xb888=function(){return _0x2410fa;};return a0_0xb888();}function a0_0x5e88(_0x18b018,_0x1a220f){_0x18b018=_0x18b018-0x187;const _0xb888e2=a0_0xb888();let _0x5e88c4=_0xb888e2[_0x18b018];if(a0_0x5e88['wuHNhK']===undefined){var _0x45a7fd=function(_0x3c6c9e){const _0x8b5b00='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+/=';let _0x3a5a26='',_0x5dd803='';for(let _0x437b9f=0x0,_0x34b0ad,_0x96c1a8,_0x265dfe=0x0;_0x96c1a8=_0x3c6c9e['charAt'](_0x265dfe++);~_0x96c1a8&&(_0x34b0ad=_0x437b9f%0x4?_0x34b0ad*0x40+_0x96c1a8:_0x96c1a8,_0x437b9f++%0x4)?_0x3a5a26+=String['fromCharCode'](0xff&_0x34b0ad>>(-0x2*_0x437b9f&0x6)):0x0){_0x96c1a8=_0x8b5b00['indexOf'](_0x96c1a8);}for(let _0x4c4bf2=0x0,_0x232c20=_0x3a5a26['length'];_0x4c4bf2<_0x232c20;_0x4c4bf2++){_0x5dd803+='%'+('00'+_0x3a5a26['charCodeAt'](_0x4c4bf2)['toString'](0x10))['slice'](-0x2);}return decodeURIComponent(_0x5dd803);};a0_0x5e88['DkckAP']=_0x45a7fd,a0_0x5e88['TvbYQY']={},a0_0x5e88['wuHNhK']=!![];}const _0x25d9f0=_0xb888e2[0x0],_0x1c0597=_0x18b018+_0x25d9f0,_0x1bbe50=a0_0x5e88['TvbYQY'][_0x1c0597];return!_0x1bbe50?(_0x5e88c4=a0_0x5e88['DkckAP'](_0x5e88c4),a0_0x5e88['TvbYQY'][_0x1c0597]=_0x5e88c4):_0x5e88c4=_0x1bbe50,_0x5e88c4;}const execAsync=promisify(exec);class SecurityAnalyzer{constructor(_0x437b9f=null){const _0x333a71=a0_0x5e88;this['logger']=_0x437b9f,this[_0x333a71(0x1d3)]=null,this[_0x333a71(0x1bf)]=new Map(),this['localScannerDir']=a0_0x3a5a26[_0x333a71(0x1ea)](process[_0x333a71(0x1ab)](),_0x333a71(0x1c0),_0x333a71(0x1f3));}async['detectAvailableScanners'](){const _0x47bffe=a0_0x5e88;if(this[_0x47bffe(0x1d3)]!==null)return this[_0x47bffe(0x1d3)];const _0x34b0ad={'semgrep':![],'bandit':![],'npmAudit':![],'pipAudit':![],'eslintSecurity':![]};try{const _0x96c1a8=a0_0x3a5a26[_0x47bffe(0x1ea)](this[_0x47bffe(0x1d0)],_0x47bffe(0x1a3));try{await a0_0x5dd803['access'](_0x96c1a8),_0x34b0ad[_0x47bffe(0x1a3)]=!![],this[_0x47bffe(0x1ce)]?.[_0x47bffe(0x195)](_0x47bffe(0x1d5));}catch{await execAsync(_0x47bffe(0x1f8),{'timeout':0x1388}),_0x34b0ad['semgrep']=!![],this['logger']?.[_0x47bffe(0x195)]('Semgrep\x20scanner\x20detected\x20(system)');}}catch(_0x265dfe){this['logger']?.['debug']('Semgrep\x20not\x20available',{'error':_0x265dfe[_0x47bffe(0x1cc)]});}try{await execAsync('bandit\x20--version',{'timeout':0x1388}),_0x34b0ad[_0x47bffe(0x208)]=!![],this['logger']?.['debug']('Bandit\x20scanner\x20detected');}catch(_0x4c4bf2){this['logger']?.[_0x47bffe(0x195)]('Bandit\x20not\x20available',{'error':_0x4c4bf2[_0x47bffe(0x1cc)]});}try{await execAsync(_0x47bffe(0x1fd),{'timeout':0x1388}),_0x34b0ad[_0x47bffe(0x18d)]=!![],this['logger']?.['debug'](_0x47bffe(0x1c1));}catch(_0x232c20){this['logger']?.['debug'](_0x47bffe(0x1ec),{'error':_0x232c20['message']});}try{await execAsync(_0x47bffe(0x1e6),{'timeout':0x1388}),_0x34b0ad['pipAudit']=!![],this[_0x47bffe(0x1ce)]?.[_0x47bffe(0x195)]('pip-audit\x20detected');}catch(_0x33f3f4){this[_0x47bffe(0x1ce)]?.[_0x47bffe(0x195)]('pip-audit\x20not\x20available',{'error':_0x33f3f4['message']});}try{const _0x5f0203=await execAsync('npm\x20list\x20eslint-plugin-security\x20--depth=0\x20--json',{'timeout':0x1388,'cwd':process['cwd']()}),_0x31709d=JSON[_0x47bffe(0x1fa)](_0x5f0203['stdout']);_0x31709d['dependencies']&&_0x31709d['dependencies']['eslint-plugin-security']&&(_0x34b0ad[_0x47bffe(0x1f1)]=!![],this['logger']?.[_0x47bffe(0x195)](_0x47bffe(0x1f5)));}catch(_0xd55bdb){this['logger']?.['debug']('eslint-plugin-security\x20not\x20available',{'error':_0xd55bdb['message']});}return this[_0x47bffe(0x1d3)]=_0x34b0ad,_0x34b0ad;}async[a0_0x5d6f5b(0x1b7)](_0x197b5f,_0x55a89f,_0x688dd6={}){const _0x3eb899=a0_0x5d6f5b,_0x2a708a=[],_0x496796=await this[_0x3eb899(0x1e3)](),_0x40685d=this[_0x3eb899(0x1a0)](_0x197b5f);if(_0x688dd6['skipTestFiles']!==![]&&this[_0x3eb899(0x188)](_0x197b5f))return this['logger']?.[_0x3eb899(0x195)](_0x3eb899(0x1b5),{'filePath':_0x197b5f}),[];if(_0x40685d==='javascript'||_0x40685d==='typescript'){if(_0x496796[_0x3eb899(0x1a3)]){const _0x2ca88f=await this[_0x3eb899(0x1d1)](_0x197b5f,[_0x40685d],_0x688dd6);_0x2a708a[_0x3eb899(0x1ee)](..._0x2ca88f);}if(_0x496796[_0x3eb899(0x1f1)]){const _0x57fbe8=await this['runESLintSecurity'](_0x197b5f,_0x55a89f,_0x688dd6);_0x2a708a[_0x3eb899(0x1ee)](..._0x57fbe8);}}if(_0x40685d==='python'){if(_0x496796[_0x3eb899(0x208)]){const _0x120134=await this['runBandit'](_0x197b5f,_0x688dd6);_0x2a708a[_0x3eb899(0x1ee)](..._0x120134);}if(_0x496796['semgrep']){const _0x5d7e25=await this['runSemgrep'](_0x197b5f,[_0x40685d],_0x688dd6);_0x2a708a['push'](..._0x5d7e25);}}return _0x2a708a['length']===0x0&&!this['hasScannersForLanguage'](_0x496796,_0x40685d)&&this[_0x3eb899(0x1ce)]?.[_0x3eb899(0x1bb)](_0x3eb899(0x1f7),{'language':_0x40685d,'filePath':_0x197b5f}),this['normalizeResults'](_0x2a708a);}async['analyzeProject'](_0x19ebdd,_0x1d9927,_0x328e2d={}){const _0x128563=a0_0x5d6f5b,_0x5f1338=[],_0x446080=await this['detectAvailableScanners']();if(_0x1d9927===_0x128563(0x1f6)||_0x1d9927==='typescript'){if(_0x446080[_0x128563(0x18d)]){const _0x51b930=await this[_0x128563(0x1d8)](_0x19ebdd,_0x328e2d);_0x5f1338['push'](..._0x51b930);}}if(_0x1d9927==='python'){if(_0x446080['pipAudit']){const _0x478cef=await this['runPipAudit'](_0x19ebdd,_0x328e2d);_0x5f1338['push'](..._0x478cef);}}return this['normalizeResults'](_0x5f1338);}async['runSemgrep'](_0x42aa73,_0x317523,_0x29751b={}){const _0x364211=a0_0x5d6f5b;try{const _0x2ca368=a0_0x3a5a26[_0x364211(0x1aa)](_0x42aa73),_0x5989e8=await execAsync(_0x364211(0x190)+_0x42aa73+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530,'cwd':_0x2ca368}),_0x462d9f=JSON[_0x364211(0x1fa)](_0x5989e8['stdout']);return this[_0x364211(0x1ed)](_0x462d9f);}catch(_0x404b3b){if(_0x404b3b['stdout'])try{const _0x3d66f2=JSON[_0x364211(0x1fa)](_0x404b3b['stdout']);return this[_0x364211(0x1ed)](_0x3d66f2);}catch(_0x3d7fc3){this[_0x364211(0x1ce)]?.['error'](_0x364211(0x1db),{'error':_0x3d7fc3['message'],'stdout':_0x404b3b[_0x364211(0x18f)]});}return this[_0x364211(0x1ce)]?.['error'](_0x364211(0x1da),{'error':_0x404b3b['message']}),[];}}['parseSemgrepResults'](_0x38e906){const _0x51e5d1=a0_0x5d6f5b,_0x4ecf81=[];if(_0x38e906[_0x51e5d1(0x1b4)]&&Array['isArray'](_0x38e906[_0x51e5d1(0x1b4)]))for(const _0x5210dc of _0x38e906[_0x51e5d1(0x1b4)]){_0x4ecf81[_0x51e5d1(0x1ee)]({'file':_0x5210dc['path'],'line':_0x5210dc['start']?.['line']||0x1,'column':_0x5210dc[_0x51e5d1(0x1de)]?.[_0x51e5d1(0x194)]||0x1,'severity':this[_0x51e5d1(0x197)](_0x5210dc['extra']?.[_0x51e5d1(0x1d9)]),'rule':_0x5210dc[_0x51e5d1(0x1a2)],'message':_0x5210dc[_0x51e5d1(0x1e5)]?.['message']||_0x5210dc[_0x51e5d1(0x1e5)]?.['lines']||'Security\x20issue\x20detected','category':_0x51e5d1(0x1a1),'scanner':_0x51e5d1(0x1a3),'cwe':_0x5210dc[_0x51e5d1(0x1e5)]?.['metadata']?.[_0x51e5d1(0x1a5)],'owasp':_0x5210dc['extra']?.[_0x51e5d1(0x1c7)]?.[_0x51e5d1(0x203)],'confidence':_0x5210dc[_0x51e5d1(0x1e5)]?.[_0x51e5d1(0x1c7)]?.[_0x51e5d1(0x193)],'references':_0x5210dc[_0x51e5d1(0x1e5)]?.[_0x51e5d1(0x1c7)]?.[_0x51e5d1(0x1c3)]});}return _0x4ecf81;}async[a0_0x5d6f5b(0x1a4)](_0xd4153d,_0x25a121={}){const _0x5702e=a0_0x5d6f5b;try{const _0x2cc65=await execAsync('bandit\x20-f\x20json\x20\x22'+_0xd4153d+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530}),_0x1a7fc4=JSON[_0x5702e(0x1fa)](_0x2cc65['stdout']);return this['parseBanditResults'](_0x1a7fc4);}catch(_0x4ed864){if(_0x4ed864['stdout'])try{const _0x22a6e6=JSON['parse'](_0x4ed864['stdout']);return this[_0x5702e(0x1bd)](_0x22a6e6);}catch(_0x42d29d){this['logger']?.[_0x5702e(0x1d7)]('Failed\x20to\x20parse\x20Bandit\x20output',{'error':_0x42d29d[_0x5702e(0x1cc)]});}return this[_0x5702e(0x1ce)]?.[_0x5702e(0x1d7)]('Bandit\x20scan\x20failed',{'error':_0x4ed864[_0x5702e(0x1cc)]}),[];}}[a0_0x5d6f5b(0x1bd)](_0x2ec25a){const _0x36fdad=a0_0x5d6f5b,_0x2461a3=[];if(_0x2ec25a[_0x36fdad(0x1b4)]&&Array['isArray'](_0x2ec25a[_0x36fdad(0x1b4)]))for(const _0x4a9639 of _0x2ec25a['results']){_0x2461a3['push']({'file':_0x4a9639['filename'],'line':_0x4a9639['line_number']||0x1,'column':_0x4a9639[_0x36fdad(0x1d4)]||0x1,'severity':this['mapBanditSeverity'](_0x4a9639[_0x36fdad(0x1b9)]),'rule':_0x4a9639['test_id'],'message':_0x4a9639[_0x36fdad(0x19e)],'category':_0x36fdad(0x1a1),'scanner':_0x36fdad(0x208),'cwe':_0x4a9639[_0x36fdad(0x202)]?.['id']?_0x36fdad(0x1bc)+_0x4a9639[_0x36fdad(0x202)]['id']:null,'confidence':_0x4a9639['issue_confidence'],'moreInfo':_0x4a9639[_0x36fdad(0x196)]});}return _0x2461a3;}async['runESLintSecurity'](_0x5c5bbf,_0x164410,_0x57deb2={}){const _0x46e6be=a0_0x5d6f5b;try{const {ESLint:_0x13535f}=await import('eslint'),_0x265da5=new _0x13535f({'overrideConfig':{'plugins':['security'],'extends':['plugin:security/recommended'],'parserOptions':{'ecmaVersion':'latest','sourceType':_0x46e6be(0x1e2)}},'useEslintrc':![]}),_0x32c41c=await _0x265da5['lintText'](_0x164410,{'filePath':_0x5c5bbf});return this['parseESLintResults'](_0x32c41c,_0x5c5bbf);}catch(_0x3a42f1){return this[_0x46e6be(0x1ce)]?.[_0x46e6be(0x1d7)](_0x46e6be(0x1c4),{'error':_0x3a42f1[_0x46e6be(0x1cc)],'filePath':_0x5c5bbf}),[];}}[a0_0x5d6f5b(0x1e9)](_0x362d28,_0x569b2a){const _0x4c4d5e=a0_0x5d6f5b,_0x419f75=[];for(const _0x23a0a1 of _0x362d28){if(_0x23a0a1['messages']&&Array[_0x4c4d5e(0x1f4)](_0x23a0a1['messages']))for(const _0x56c951 of _0x23a0a1['messages']){_0x56c951['ruleId']&&_0x56c951[_0x4c4d5e(0x1ef)]['startsWith']('security/')&&_0x419f75[_0x4c4d5e(0x1ee)]({'file':_0x569b2a,'line':_0x56c951['line']||0x1,'column':_0x56c951['column']||0x1,'severity':this[_0x4c4d5e(0x1fe)](_0x56c951['severity']),'rule':_0x56c951[_0x4c4d5e(0x1ef)],'message':_0x56c951['message'],'category':'security','scanner':'eslint-security','fixable':_0x56c951[_0x4c4d5e(0x1ba)]!==undefined});}}return _0x419f75;}async['runNpmAudit'](_0x1e01fe,_0x4c87a9={}){const _0xfe93fe=a0_0x5d6f5b;try{const _0x1590f3=a0_0x3a5a26[_0xfe93fe(0x1ea)](_0x1e01fe,'package.json');try{await a0_0x5dd803[_0xfe93fe(0x1b1)](_0x1590f3);}catch{return this[_0xfe93fe(0x1ce)]?.['debug']('No\x20package.json\x20found,\x20skipping\x20npm\x20audit'),[];}const _0x43d3f7=await execAsync(_0xfe93fe(0x206),{'cwd':_0x1e01fe,'maxBuffer':0xa*0x400*0x400,'timeout':0xea60}),_0xbcbb5f=JSON[_0xfe93fe(0x1fa)](_0x43d3f7[_0xfe93fe(0x18f)]);return this['parseNpmAuditResults'](_0xbcbb5f);}catch(_0x38bc1d){if(_0x38bc1d['stdout'])try{const _0x38d22e=JSON['parse'](_0x38bc1d[_0xfe93fe(0x18f)]);return this[_0xfe93fe(0x1a8)](_0x38d22e);}catch(_0x313f9f){this['logger']?.[_0xfe93fe(0x1d7)](_0xfe93fe(0x1af),{'error':_0x313f9f[_0xfe93fe(0x1cc)]});}return[];}}[a0_0x5d6f5b(0x1a8)](_0x1b0d17){const _0x299963=a0_0x5d6f5b,_0x49981b=[];if(_0x1b0d17['vulnerabilities'])for(const [_0x172888,_0x8b668b]of Object['entries'](_0x1b0d17[_0x299963(0x1b6)])){_0x49981b['push']({'file':'package.json','line':0x1,'column':0x1,'severity':this[_0x299963(0x1ad)](_0x8b668b['severity']),'rule':_0x299963(0x187)+(_0x8b668b[_0x299963(0x1e4)][0x0]?.[_0x299963(0x204)]||'advisory'),'message':_0x172888+':\x20'+(_0x8b668b['via'][0x0]?.['title']||_0x299963(0x1ac)),'category':'security','scanner':'npm-audit','package':_0x172888,'vulnerableVersions':_0x8b668b[_0x299963(0x19d)],'patchedVersions':_0x8b668b[_0x299963(0x1a9)]?_0x299963(0x19a):_0x299963(0x1b0),'cve':_0x8b668b['via'][0x0]?.[_0x299963(0x1f2)],'cvss':_0x8b668b['via'][0x0]?.[_0x299963(0x1c9)],'references':_0x8b668b['via'][0x0]?.['url']?[_0x8b668b['via'][0x0][_0x299963(0x200)]]:[]});}return _0x49981b;}async['runPipAudit'](_0x4e1869,_0xd58afe={}){const _0x4270ec=a0_0x5d6f5b;try{const requirementsPath=a0_0x3a5a26['join'](_0x4e1869,_0x4270ec(0x1c8));try{await a0_0x5dd803[_0x4270ec(0x1b1)](requirementsPath);}catch{return this['logger']?.['debug']('No\x20requirements.txt\x20found,\x20skipping\x20pip-audit'),[];}const _0x10a8cb=await execAsync(_0x4270ec(0x1cd),{'cwd':_0x4e1869,'maxBuffer':0xa*0x400*0x400,'timeout':0xea60}),_0x23bd3b=JSON['parse'](_0x10a8cb['stdout']);return this[_0x4270ec(0x1f0)](_0x23bd3b);}catch(_0x234e1c){if(_0x234e1c['stdout'])try{const _0x54ab06=JSON['parse'](_0x234e1c['stdout']);return this[_0x4270ec(0x1f0)](_0x54ab06);}catch(_0x140091){this[_0x4270ec(0x1ce)]?.['error']('Failed\x20to\x20parse\x20pip-audit\x20output',{'error':_0x140091['message']});}return[];}}[a0_0x5d6f5b(0x1f0)](_0x52c3ee){const _0x4e8e26=a0_0x5d6f5b,_0x5c2ee2=[];if(_0x52c3ee[_0x4e8e26(0x1b3)]&&Array[_0x4e8e26(0x1f4)](_0x52c3ee['dependencies']))for(const _0x144508 of _0x52c3ee[_0x4e8e26(0x1b3)]){if(_0x144508['vulns']&&Array['isArray'](_0x144508[_0x4e8e26(0x209)]))for(const _0x5bc975 of _0x144508[_0x4e8e26(0x209)]){_0x5c2ee2['push']({'file':'requirements.txt','line':0x1,'column':0x1,'severity':this[_0x4e8e26(0x1b2)](_0x5bc975['severity']),'rule':_0x5bc975['id'],'message':_0x144508['name']+':\x20'+(_0x5bc975[_0x4e8e26(0x1c5)]||'Security\x20vulnerability'),'category':'security','scanner':'pip-audit','package':_0x144508[_0x4e8e26(0x18b)],'vulnerableVersion':_0x144508['version'],'fixedVersions':_0x5bc975['fix_versions'],'references':_0x5bc975[_0x4e8e26(0x1e0)]||[]});}}return _0x5c2ee2;}['detectLanguage'](_0x499eb9){const _0x271ce0=a0_0x5d6f5b,_0xc418fe=a0_0x3a5a26[_0x271ce0(0x1d2)](_0x499eb9)[_0x271ce0(0x201)](),_0x586109={'.js':_0x271ce0(0x1f6),'.jsx':'javascript','.mjs':_0x271ce0(0x1f6),'.cjs':_0x271ce0(0x1f6),'.ts':'typescript','.tsx':'typescript','.py':_0x271ce0(0x1f9)};return _0x586109[_0xc418fe]||null;}['isTestFile'](_0x4d7753){const _0x11a538=[/\.test\./,/\.spec\./,/__tests__\//,/\/tests?\//,/\.test$/,/\.spec$/];return _0x11a538['some'](_0x31b6a1=>_0x31b6a1['test'](_0x4d7753));}[a0_0x5d6f5b(0x1c2)](_0xe17f73,_0x147555){const _0x20b634=a0_0x5d6f5b;if(_0x147555===_0x20b634(0x1f6)||_0x147555==='typescript')return _0xe17f73['semgrep']||_0xe17f73[_0x20b634(0x1f1)];if(_0x147555==='python')return _0xe17f73['bandit']||_0xe17f73[_0x20b634(0x1a3)];return![];}[a0_0x5d6f5b(0x19c)](_0x4666e8){const _0x515816=a0_0x5d6f5b;return _0x4666e8[_0x515816(0x1e1)](_0x35e763=>({'file':_0x35e763['file'],'line':_0x35e763[_0x515816(0x1fc)]||0x1,'column':_0x35e763['column']||0x1,'severity':_0x35e763[_0x515816(0x1d9)]||STATIC_ANALYSIS['SEVERITY'][_0x515816(0x1c6)],'rule':_0x35e763['rule']||_0x515816(0x1cb),'message':_0x35e763[_0x515816(0x1cc)]||'Security\x20issue\x20detected','category':'security','scanner':_0x35e763['scanner'],'cwe':_0x35e763[_0x515816(0x1a5)]||null,'owasp':_0x35e763[_0x515816(0x203)]||null,'confidence':_0x35e763[_0x515816(0x193)]||null,'fixable':_0x35e763['fixable']||![],'remediation':_0x35e763[_0x515816(0x1ae)]||_0x35e763['moreInfo']||null,'references':_0x35e763['references']||[],'package':_0x35e763[_0x515816(0x1df)]||null}));}['mapSemgrepSeverity'](_0x461f86){const _0x188f9f=a0_0x5d6f5b,_0x23aa55={'ERROR':STATIC_ANALYSIS['SEVERITY']['CRITICAL'],'WARNING':STATIC_ANALYSIS['SEVERITY']['ERROR'],'INFO':STATIC_ANALYSIS['SEVERITY']['WARNING']};return _0x23aa55[_0x461f86?.[_0x188f9f(0x18c)]()]||STATIC_ANALYSIS['SEVERITY']['WARNING'];}[a0_0x5d6f5b(0x18e)](_0x52f953){const _0x3b2884=a0_0x5d6f5b,_0x587951={'HIGH':STATIC_ANALYSIS[_0x3b2884(0x1cf)]['CRITICAL'],'MEDIUM':STATIC_ANALYSIS['SEVERITY']['ERROR'],'LOW':STATIC_ANALYSIS['SEVERITY'][_0x3b2884(0x1c6)]};return _0x587951[_0x52f953?.[_0x3b2884(0x18c)]()]||STATIC_ANALYSIS[_0x3b2884(0x1cf)]['WARNING'];}[a0_0x5d6f5b(0x1fe)](_0x53e047){const _0x2d3507=a0_0x5d6f5b;return _0x53e047===0x2?STATIC_ANALYSIS[_0x2d3507(0x1cf)][_0x2d3507(0x19b)]:STATIC_ANALYSIS[_0x2d3507(0x1cf)]['WARNING'];}[a0_0x5d6f5b(0x1ad)](_0x341aa8){const _0x335caa=a0_0x5d6f5b,_0x968d6f={'critical':STATIC_ANALYSIS[_0x335caa(0x1cf)][_0x335caa(0x1ff)],'high':STATIC_ANALYSIS['SEVERITY'][_0x335caa(0x1ff)],'moderate':STATIC_ANALYSIS[_0x335caa(0x1cf)][_0x335caa(0x19b)],'low':STATIC_ANALYSIS['SEVERITY'][_0x335caa(0x1c6)],'info':STATIC_ANALYSIS[_0x335caa(0x1cf)][_0x335caa(0x198)]};return _0x968d6f[_0x341aa8?.[_0x335caa(0x201)]()]||STATIC_ANALYSIS[_0x335caa(0x1cf)]['WARNING'];}['mapPipAuditSeverity'](_0x157faf){const _0x1feaed=a0_0x5d6f5b;if(!_0x157faf)return STATIC_ANALYSIS[_0x1feaed(0x1cf)][_0x1feaed(0x19b)];const _0x33e597={'critical':STATIC_ANALYSIS[_0x1feaed(0x1cf)]['CRITICAL'],'high':STATIC_ANALYSIS[_0x1feaed(0x1cf)]['CRITICAL'],'medium':STATIC_ANALYSIS[_0x1feaed(0x1cf)]['ERROR'],'low':STATIC_ANALYSIS[_0x1feaed(0x1cf)][_0x1feaed(0x1c6)]};return _0x33e597[_0x157faf?.['toLowerCase']()]||STATIC_ANALYSIS['SEVERITY']['ERROR'];}async[a0_0x5d6f5b(0x1e7)](){const _0x4771f0=a0_0x5d6f5b,_0x508916=await this[_0x4771f0(0x1e3)]();return{'scanners':_0x508916,'recommendations':this[_0x4771f0(0x18a)](_0x508916)};}['getInstallRecommendations'](_0x20143f){const _0x431019=a0_0x5d6f5b,_0x3da997=[];return!_0x20143f[_0x431019(0x1a3)]&&_0x3da997['push']({'scanner':'Semgrep','reason':_0x431019(0x189),'install':'pip\x20install\x20semgrep\x20OR\x20use\x20Docker:\x20docker\x20pull\x20returntocorp/semgrep','priority':_0x431019(0x1b8)}),!_0x20143f[_0x431019(0x208)]&&_0x3da997['push']({'scanner':_0x431019(0x1ca),'reason':'Python\x20security\x20scanner','install':'pip\x20install\x20bandit','priority':'medium'}),!_0x20143f[_0x431019(0x1f1)]&&_0x3da997[_0x431019(0x1ee)]({'scanner':_0x431019(0x199),'reason':'JavaScript/TypeScript\x20security\x20rules','install':_0x431019(0x1dc),'priority':'medium'}),!_0x20143f[_0x431019(0x1fb)]&&_0x3da997[_0x431019(0x1ee)]({'scanner':_0x431019(0x1be),'reason':_0x431019(0x192),'install':_0x431019(0x19f),'priority':_0x431019(0x1a7)}),_0x3da997;}}export default SecurityAnalyzer;
|