@loxia-labs/loxia-autopilot-one 1.0.1 → 1.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (120) hide show
  1. package/README.md +44 -54
  2. package/bin/cli.js +1 -115
  3. package/bin/loxia-terminal-v2.js +3 -0
  4. package/bin/loxia-terminal.js +3 -0
  5. package/bin/start-with-terminal.js +3 -0
  6. package/package.json +14 -15
  7. package/scripts/install-scanners.js +1 -235
  8. package/src/analyzers/CSSAnalyzer.js +1 -297
  9. package/src/analyzers/ConfigValidator.js +1 -690
  10. package/src/analyzers/ESLintAnalyzer.js +1 -320
  11. package/src/analyzers/JavaScriptAnalyzer.js +1 -261
  12. package/src/analyzers/PrettierFormatter.js +1 -247
  13. package/src/analyzers/PythonAnalyzer.js +1 -266
  14. package/src/analyzers/SecurityAnalyzer.js +1 -729
  15. package/src/analyzers/TypeScriptAnalyzer.js +1 -247
  16. package/src/analyzers/codeCloneDetector/analyzer.js +1 -344
  17. package/src/analyzers/codeCloneDetector/detector.js +1 -203
  18. package/src/analyzers/codeCloneDetector/index.js +1 -160
  19. package/src/analyzers/codeCloneDetector/parser.js +1 -199
  20. package/src/analyzers/codeCloneDetector/reporter.js +1 -148
  21. package/src/analyzers/codeCloneDetector/scanner.js +1 -59
  22. package/src/core/agentPool.js +1 -1474
  23. package/src/core/agentScheduler.js +1 -2147
  24. package/src/core/contextManager.js +1 -709
  25. package/src/core/messageProcessor.js +1 -732
  26. package/src/core/orchestrator.js +1 -548
  27. package/src/core/stateManager.js +1 -877
  28. package/src/index.js +1 -631
  29. package/src/interfaces/cli.js +1 -549
  30. package/src/interfaces/terminal/__tests__/smoke/advancedFeatures.test.js +1 -0
  31. package/src/interfaces/terminal/__tests__/smoke/agentControl.test.js +1 -0
  32. package/src/interfaces/terminal/__tests__/smoke/agents.test.js +1 -0
  33. package/src/interfaces/terminal/__tests__/smoke/components.test.js +1 -0
  34. package/src/interfaces/terminal/__tests__/smoke/connection.test.js +1 -0
  35. package/src/interfaces/terminal/__tests__/smoke/enhancements.test.js +1 -0
  36. package/src/interfaces/terminal/__tests__/smoke/imports.test.js +1 -0
  37. package/src/interfaces/terminal/__tests__/smoke/messages.test.js +1 -0
  38. package/src/interfaces/terminal/__tests__/smoke/tools.test.js +1 -0
  39. package/src/interfaces/terminal/api/apiClient.js +1 -0
  40. package/src/interfaces/terminal/api/messageRouter.js +1 -0
  41. package/src/interfaces/terminal/api/session.js +1 -0
  42. package/src/interfaces/terminal/api/websocket.js +1 -0
  43. package/src/interfaces/terminal/components/AgentCreator.js +1 -0
  44. package/src/interfaces/terminal/components/AgentEditor.js +1 -0
  45. package/src/interfaces/terminal/components/AgentSwitcher.js +1 -0
  46. package/src/interfaces/terminal/components/ErrorBoundary.js +1 -0
  47. package/src/interfaces/terminal/components/ErrorPanel.js +1 -0
  48. package/src/interfaces/terminal/components/Header.js +1 -0
  49. package/src/interfaces/terminal/components/HelpPanel.js +1 -0
  50. package/src/interfaces/terminal/components/InputBox.js +1 -0
  51. package/src/interfaces/terminal/components/Layout.js +1 -0
  52. package/src/interfaces/terminal/components/LoadingSpinner.js +1 -0
  53. package/src/interfaces/terminal/components/MessageList.js +1 -0
  54. package/src/interfaces/terminal/components/MultilineTextInput.js +1 -0
  55. package/src/interfaces/terminal/components/SearchPanel.js +1 -0
  56. package/src/interfaces/terminal/components/SettingsPanel.js +1 -0
  57. package/src/interfaces/terminal/components/StatusBar.js +1 -0
  58. package/src/interfaces/terminal/components/TextInput.js +1 -0
  59. package/src/interfaces/terminal/config/agentEditorConstants.js +1 -0
  60. package/src/interfaces/terminal/config/constants.js +1 -0
  61. package/src/interfaces/terminal/index.js +1 -0
  62. package/src/interfaces/terminal/state/useAgentControl.js +1 -0
  63. package/src/interfaces/terminal/state/useAgents.js +1 -0
  64. package/src/interfaces/terminal/state/useConnection.js +1 -0
  65. package/src/interfaces/terminal/state/useMessages.js +1 -0
  66. package/src/interfaces/terminal/state/useTools.js +1 -0
  67. package/src/interfaces/terminal/utils/debugLogger.js +1 -0
  68. package/src/interfaces/terminal/utils/settingsStorage.js +1 -0
  69. package/src/interfaces/terminal/utils/theme.js +1 -0
  70. package/src/interfaces/webServer.js +1 -2162
  71. package/src/modules/fileExplorer/controller.js +1 -280
  72. package/src/modules/fileExplorer/index.js +1 -37
  73. package/src/modules/fileExplorer/middleware.js +1 -92
  74. package/src/modules/fileExplorer/routes.js +1 -125
  75. package/src/modules/fileExplorer/types.js +1 -44
  76. package/src/services/aiService.js +1 -1232
  77. package/src/services/apiKeyManager.js +1 -164
  78. package/src/services/benchmarkService.js +1 -366
  79. package/src/services/budgetService.js +1 -539
  80. package/src/services/contextInjectionService.js +1 -247
  81. package/src/services/conversationCompactionService.js +1 -637
  82. package/src/services/errorHandler.js +1 -810
  83. package/src/services/fileAttachmentService.js +1 -544
  84. package/src/services/modelRouterService.js +1 -366
  85. package/src/services/modelsService.js +1 -322
  86. package/src/services/qualityInspector.js +1 -796
  87. package/src/services/tokenCountingService.js +1 -536
  88. package/src/tools/agentCommunicationTool.js +1 -1344
  89. package/src/tools/agentDelayTool.js +1 -485
  90. package/src/tools/asyncToolManager.js +1 -604
  91. package/src/tools/baseTool.js +1 -800
  92. package/src/tools/browserTool.js +1 -920
  93. package/src/tools/cloneDetectionTool.js +1 -621
  94. package/src/tools/dependencyResolverTool.js +1 -1215
  95. package/src/tools/fileContentReplaceTool.js +1 -875
  96. package/src/tools/fileSystemTool.js +1 -1107
  97. package/src/tools/fileTreeTool.js +1 -853
  98. package/src/tools/imageTool.js +1 -901
  99. package/src/tools/importAnalyzerTool.js +1 -1060
  100. package/src/tools/jobDoneTool.js +1 -248
  101. package/src/tools/seekTool.js +1 -956
  102. package/src/tools/staticAnalysisTool.js +1 -1778
  103. package/src/tools/taskManagerTool.js +1 -2873
  104. package/src/tools/terminalTool.js +1 -2304
  105. package/src/tools/webTool.js +1 -1430
  106. package/src/types/agent.js +1 -519
  107. package/src/types/contextReference.js +1 -972
  108. package/src/types/conversation.js +1 -730
  109. package/src/types/toolCommand.js +1 -747
  110. package/src/utilities/attachmentValidator.js +1 -292
  111. package/src/utilities/configManager.js +1 -582
  112. package/src/utilities/constants.js +1 -722
  113. package/src/utilities/directoryAccessManager.js +1 -535
  114. package/src/utilities/fileProcessor.js +1 -307
  115. package/src/utilities/logger.js +1 -436
  116. package/src/utilities/tagParser.js +1 -1246
  117. package/src/utilities/toolConstants.js +1 -317
  118. package/web-ui/build/index.html +2 -2
  119. package/web-ui/build/static/{index-Dy2bYbOa.css → index-CClD1090.css} +1 -1
  120. package/web-ui/build/static/{index-CjkkcnFA.js → index-lCBai6dX.js} +66 -67
@@ -1,729 +1 @@
1
- /**
2
- * SecurityAnalyzer - Professional security scanning using external tools
3
- *
4
- * Uses industry-standard security scanners:
5
- * - Semgrep: Multi-language SAST
6
- * - Bandit: Python security scanner
7
- * - ESLint Security Plugin: JavaScript/TypeScript security
8
- * - npm audit: Node.js dependency vulnerabilities
9
- * - pip-audit: Python dependency vulnerabilities
10
- */
11
-
12
- import { exec } from 'child_process';
13
- import { promisify } from 'util';
14
- import path from 'path';
15
- import fs from 'fs/promises';
16
- import { STATIC_ANALYSIS } from '../utilities/constants.js';
17
-
18
- const execAsync = promisify(exec);
19
-
20
- class SecurityAnalyzer {
21
- constructor(logger = null) {
22
- this.logger = logger;
23
- this.availableScanners = null;
24
- this.scannerCache = new Map(); // Cache scanner availability checks
25
-
26
- // Path to locally installed scanners (from postinstall script)
27
- this.localScannerDir = path.join(process.cwd(), 'node_modules', '.scanners');
28
- }
29
-
30
- /**
31
- * Detect which security scanners are available on the system
32
- * @returns {Promise<Object>} Available scanners
33
- */
34
- async detectAvailableScanners() {
35
- // Return cached result if available
36
- if (this.availableScanners !== null) {
37
- return this.availableScanners;
38
- }
39
-
40
- const available = {
41
- semgrep: false,
42
- bandit: false,
43
- npmAudit: false,
44
- pipAudit: false,
45
- eslintSecurity: false
46
- };
47
-
48
- // Check for Semgrep (local first, then system)
49
- try {
50
- const localSemgrep = path.join(this.localScannerDir, 'semgrep');
51
- try {
52
- await fs.access(localSemgrep);
53
- available.semgrep = true;
54
- this.logger?.debug('Semgrep scanner detected (local)');
55
- } catch {
56
- await execAsync('semgrep --version', { timeout: 5000 });
57
- available.semgrep = true;
58
- this.logger?.debug('Semgrep scanner detected (system)');
59
- }
60
- } catch (error) {
61
- this.logger?.debug('Semgrep not available', { error: error.message });
62
- }
63
-
64
- // Check for Bandit
65
- try {
66
- await execAsync('bandit --version', { timeout: 5000 });
67
- available.bandit = true;
68
- this.logger?.debug('Bandit scanner detected');
69
- } catch (error) {
70
- this.logger?.debug('Bandit not available', { error: error.message });
71
- }
72
-
73
- // Check for npm (npm audit is built-in)
74
- try {
75
- await execAsync('npm --version', { timeout: 5000 });
76
- available.npmAudit = true;
77
- this.logger?.debug('npm audit available');
78
- } catch (error) {
79
- this.logger?.debug('npm not available', { error: error.message });
80
- }
81
-
82
- // Check for pip-audit
83
- try {
84
- await execAsync('pip-audit --version', { timeout: 5000 });
85
- available.pipAudit = true;
86
- this.logger?.debug('pip-audit detected');
87
- } catch (error) {
88
- this.logger?.debug('pip-audit not available', { error: error.message });
89
- }
90
-
91
- // Check for eslint-plugin-security
92
- try {
93
- // Check if the package is installed
94
- const result = await execAsync('npm list eslint-plugin-security --depth=0 --json', {
95
- timeout: 5000,
96
- cwd: process.cwd()
97
- });
98
- const parsed = JSON.parse(result.stdout);
99
- if (parsed.dependencies && parsed.dependencies['eslint-plugin-security']) {
100
- available.eslintSecurity = true;
101
- this.logger?.debug('eslint-plugin-security detected');
102
- }
103
- } catch (error) {
104
- this.logger?.debug('eslint-plugin-security not available', { error: error.message });
105
- }
106
-
107
- this.availableScanners = available;
108
- return available;
109
- }
110
-
111
- /**
112
- * Analyze a file for security vulnerabilities
113
- * @param {string} filePath - Path to file
114
- * @param {string} content - File content
115
- * @param {Object} options - Analysis options
116
- * @returns {Promise<Array>} Security issues found
117
- */
118
- async analyze(filePath, content, options = {}) {
119
- const issues = [];
120
- const available = await this.detectAvailableScanners();
121
- const language = this.detectLanguage(filePath);
122
-
123
- // Skip test files if requested
124
- if (options.skipTestFiles !== false && this.isTestFile(filePath)) {
125
- this.logger?.debug('Skipping test file for security scan', { filePath });
126
- return [];
127
- }
128
-
129
- // Run appropriate scanners based on language
130
- if (language === 'javascript' || language === 'typescript') {
131
- // Run Semgrep for JS/TS
132
- if (available.semgrep) {
133
- const semgrepIssues = await this.runSemgrep(filePath, [language], options);
134
- issues.push(...semgrepIssues);
135
- }
136
-
137
- // Run ESLint Security Plugin
138
- if (available.eslintSecurity) {
139
- const eslintIssues = await this.runESLintSecurity(filePath, content, options);
140
- issues.push(...eslintIssues);
141
- }
142
- }
143
-
144
- if (language === 'python') {
145
- // Run Bandit for Python
146
- if (available.bandit) {
147
- const banditIssues = await this.runBandit(filePath, options);
148
- issues.push(...banditIssues);
149
- }
150
-
151
- // Run Semgrep for Python
152
- if (available.semgrep) {
153
- const semgrepIssues = await this.runSemgrep(filePath, [language], options);
154
- issues.push(...semgrepIssues);
155
- }
156
- }
157
-
158
- // If no scanners available, return informative message
159
- if (issues.length === 0 && !this.hasScannersForLanguage(available, language)) {
160
- this.logger?.warn('No security scanners available for language', { language, filePath });
161
- }
162
-
163
- return this.normalizeResults(issues);
164
- }
165
-
166
- /**
167
- * Analyze a project directory for security vulnerabilities
168
- * @param {string} projectDir - Project directory path
169
- * @param {string} language - Primary language to scan
170
- * @param {Object} options - Analysis options
171
- * @returns {Promise<Array>} Security issues found
172
- */
173
- async analyzeProject(projectDir, language, options = {}) {
174
- const issues = [];
175
- const available = await this.detectAvailableScanners();
176
-
177
- // Run dependency scanners
178
- if (language === 'javascript' || language === 'typescript') {
179
- if (available.npmAudit) {
180
- const npmIssues = await this.runNpmAudit(projectDir, options);
181
- issues.push(...npmIssues);
182
- }
183
- }
184
-
185
- if (language === 'python') {
186
- if (available.pipAudit) {
187
- const pipIssues = await this.runPipAudit(projectDir, options);
188
- issues.push(...pipIssues);
189
- }
190
- }
191
-
192
- return this.normalizeResults(issues);
193
- }
194
-
195
- /**
196
- * Run Semgrep scanner
197
- * @private
198
- */
199
- async runSemgrep(filePath, languages, options = {}) {
200
- try {
201
- const dir = path.dirname(filePath);
202
- const result = await execAsync(
203
- `semgrep --config=auto --json "${filePath}"`,
204
- {
205
- maxBuffer: 10 * 1024 * 1024,
206
- timeout: 30000,
207
- cwd: dir
208
- }
209
- );
210
-
211
- const output = JSON.parse(result.stdout);
212
- return this.parseSemgrepResults(output);
213
- } catch (error) {
214
- // Semgrep exits with non-zero if issues found, check stdout
215
- if (error.stdout) {
216
- try {
217
- const output = JSON.parse(error.stdout);
218
- return this.parseSemgrepResults(output);
219
- } catch (parseError) {
220
- this.logger?.error('Failed to parse Semgrep output', {
221
- error: parseError.message,
222
- stdout: error.stdout
223
- });
224
- }
225
- }
226
- this.logger?.error('Semgrep scan failed', { error: error.message });
227
- return [];
228
- }
229
- }
230
-
231
- /**
232
- * Parse Semgrep results
233
- * @private
234
- */
235
- parseSemgrepResults(output) {
236
- const issues = [];
237
-
238
- if (output.results && Array.isArray(output.results)) {
239
- for (const result of output.results) {
240
- issues.push({
241
- file: result.path,
242
- line: result.start?.line || 1,
243
- column: result.start?.col || 1,
244
- severity: this.mapSemgrepSeverity(result.extra?.severity),
245
- rule: result.check_id,
246
- message: result.extra?.message || result.extra?.lines || 'Security issue detected',
247
- category: 'security',
248
- scanner: 'semgrep',
249
- cwe: result.extra?.metadata?.cwe,
250
- owasp: result.extra?.metadata?.owasp,
251
- confidence: result.extra?.metadata?.confidence,
252
- references: result.extra?.metadata?.references
253
- });
254
- }
255
- }
256
-
257
- return issues;
258
- }
259
-
260
- /**
261
- * Run Bandit scanner for Python
262
- * @private
263
- */
264
- async runBandit(filePath, options = {}) {
265
- try {
266
- const result = await execAsync(
267
- `bandit -f json "${filePath}"`,
268
- {
269
- maxBuffer: 10 * 1024 * 1024,
270
- timeout: 30000
271
- }
272
- );
273
-
274
- const output = JSON.parse(result.stdout);
275
- return this.parseBanditResults(output);
276
- } catch (error) {
277
- // Bandit exits with non-zero if issues found
278
- if (error.stdout) {
279
- try {
280
- const output = JSON.parse(error.stdout);
281
- return this.parseBanditResults(output);
282
- } catch (parseError) {
283
- this.logger?.error('Failed to parse Bandit output', {
284
- error: parseError.message
285
- });
286
- }
287
- }
288
- this.logger?.error('Bandit scan failed', { error: error.message });
289
- return [];
290
- }
291
- }
292
-
293
- /**
294
- * Parse Bandit results
295
- * @private
296
- */
297
- parseBanditResults(output) {
298
- const issues = [];
299
-
300
- if (output.results && Array.isArray(output.results)) {
301
- for (const result of output.results) {
302
- issues.push({
303
- file: result.filename,
304
- line: result.line_number || 1,
305
- column: result.col_offset || 1,
306
- severity: this.mapBanditSeverity(result.issue_severity),
307
- rule: result.test_id,
308
- message: result.issue_text,
309
- category: 'security',
310
- scanner: 'bandit',
311
- cwe: result.issue_cwe?.id ? `CWE-${result.issue_cwe.id}` : null,
312
- confidence: result.issue_confidence,
313
- moreInfo: result.more_info
314
- });
315
- }
316
- }
317
-
318
- return issues;
319
- }
320
-
321
- /**
322
- * Run ESLint with security plugin
323
- * @private
324
- */
325
- async runESLintSecurity(filePath, content, options = {}) {
326
- try {
327
- // Use ESLint programmatically
328
- const { ESLint } = await import('eslint');
329
-
330
- const eslint = new ESLint({
331
- overrideConfig: {
332
- plugins: ['security'],
333
- extends: ['plugin:security/recommended'],
334
- parserOptions: {
335
- ecmaVersion: 'latest',
336
- sourceType: 'module'
337
- }
338
- },
339
- useEslintrc: false
340
- });
341
-
342
- const results = await eslint.lintText(content, { filePath });
343
- return this.parseESLintResults(results, filePath);
344
- } catch (error) {
345
- this.logger?.error('ESLint security scan failed', {
346
- error: error.message,
347
- filePath
348
- });
349
- return [];
350
- }
351
- }
352
-
353
- /**
354
- * Parse ESLint security results
355
- * @private
356
- */
357
- parseESLintResults(results, filePath) {
358
- const issues = [];
359
-
360
- for (const result of results) {
361
- if (result.messages && Array.isArray(result.messages)) {
362
- for (const message of result.messages) {
363
- // Only include security plugin rules
364
- if (message.ruleId && message.ruleId.startsWith('security/')) {
365
- issues.push({
366
- file: filePath,
367
- line: message.line || 1,
368
- column: message.column || 1,
369
- severity: this.mapESLintSeverity(message.severity),
370
- rule: message.ruleId,
371
- message: message.message,
372
- category: 'security',
373
- scanner: 'eslint-security',
374
- fixable: message.fix !== undefined
375
- });
376
- }
377
- }
378
- }
379
- }
380
-
381
- return issues;
382
- }
383
-
384
- /**
385
- * Run npm audit for dependency vulnerabilities
386
- * @private
387
- */
388
- async runNpmAudit(projectDir, options = {}) {
389
- try {
390
- // Check if package.json exists
391
- const packageJsonPath = path.join(projectDir, 'package.json');
392
- try {
393
- await fs.access(packageJsonPath);
394
- } catch {
395
- this.logger?.debug('No package.json found, skipping npm audit');
396
- return [];
397
- }
398
-
399
- const result = await execAsync(
400
- 'npm audit --json',
401
- {
402
- cwd: projectDir,
403
- maxBuffer: 10 * 1024 * 1024,
404
- timeout: 60000
405
- }
406
- );
407
-
408
- const output = JSON.parse(result.stdout);
409
- return this.parseNpmAuditResults(output);
410
- } catch (error) {
411
- // npm audit exits with non-zero if vulnerabilities found
412
- if (error.stdout) {
413
- try {
414
- const output = JSON.parse(error.stdout);
415
- return this.parseNpmAuditResults(output);
416
- } catch (parseError) {
417
- this.logger?.error('Failed to parse npm audit output', {
418
- error: parseError.message
419
- });
420
- }
421
- }
422
- return [];
423
- }
424
- }
425
-
426
- /**
427
- * Parse npm audit results
428
- * @private
429
- */
430
- parseNpmAuditResults(output) {
431
- const issues = [];
432
-
433
- // npm audit v7+ format
434
- if (output.vulnerabilities) {
435
- for (const [packageName, vuln] of Object.entries(output.vulnerabilities)) {
436
- issues.push({
437
- file: 'package.json',
438
- line: 1,
439
- column: 1,
440
- severity: this.mapNpmSeverity(vuln.severity),
441
- rule: `npm-${vuln.via[0]?.source || 'advisory'}`,
442
- message: `${packageName}: ${vuln.via[0]?.title || 'Security vulnerability'}`,
443
- category: 'security',
444
- scanner: 'npm-audit',
445
- package: packageName,
446
- vulnerableVersions: vuln.range,
447
- patchedVersions: vuln.fixAvailable ? 'Available' : 'None',
448
- cve: vuln.via[0]?.cve,
449
- cvss: vuln.via[0]?.cvss,
450
- references: vuln.via[0]?.url ? [vuln.via[0].url] : []
451
- });
452
- }
453
- }
454
-
455
- return issues;
456
- }
457
-
458
- /**
459
- * Run pip-audit for Python dependencies
460
- * @private
461
- */
462
- async runPipAudit(projectDir, options = {}) {
463
- try {
464
- // Check if requirements.txt exists
465
- const requirementsPath = path.join(projectDir, 'requirements.txt');
466
- try {
467
- await fs.access(requirementsPath);
468
- } catch {
469
- this.logger?.debug('No requirements.txt found, skipping pip-audit');
470
- return [];
471
- }
472
-
473
- const result = await execAsync(
474
- 'pip-audit --format json',
475
- {
476
- cwd: projectDir,
477
- maxBuffer: 10 * 1024 * 1024,
478
- timeout: 60000
479
- }
480
- );
481
-
482
- const output = JSON.parse(result.stdout);
483
- return this.parsePipAuditResults(output);
484
- } catch (error) {
485
- if (error.stdout) {
486
- try {
487
- const output = JSON.parse(error.stdout);
488
- return this.parsePipAuditResults(output);
489
- } catch (parseError) {
490
- this.logger?.error('Failed to parse pip-audit output', {
491
- error: parseError.message
492
- });
493
- }
494
- }
495
- return [];
496
- }
497
- }
498
-
499
- /**
500
- * Parse pip-audit results
501
- * @private
502
- */
503
- parsePipAuditResults(output) {
504
- const issues = [];
505
-
506
- if (output.dependencies && Array.isArray(output.dependencies)) {
507
- for (const dep of output.dependencies) {
508
- if (dep.vulns && Array.isArray(dep.vulns)) {
509
- for (const vuln of dep.vulns) {
510
- issues.push({
511
- file: 'requirements.txt',
512
- line: 1,
513
- column: 1,
514
- severity: this.mapPipAuditSeverity(vuln.severity),
515
- rule: vuln.id,
516
- message: `${dep.name}: ${vuln.description || 'Security vulnerability'}`,
517
- category: 'security',
518
- scanner: 'pip-audit',
519
- package: dep.name,
520
- vulnerableVersion: dep.version,
521
- fixedVersions: vuln.fix_versions,
522
- references: vuln.aliases || []
523
- });
524
- }
525
- }
526
- }
527
- }
528
-
529
- return issues;
530
- }
531
-
532
- /**
533
- * Detect language from file extension
534
- * @private
535
- */
536
- detectLanguage(filePath) {
537
- const ext = path.extname(filePath).toLowerCase();
538
- const languageMap = {
539
- '.js': 'javascript',
540
- '.jsx': 'javascript',
541
- '.mjs': 'javascript',
542
- '.cjs': 'javascript',
543
- '.ts': 'typescript',
544
- '.tsx': 'typescript',
545
- '.py': 'python'
546
- };
547
- return languageMap[ext] || null;
548
- }
549
-
550
- /**
551
- * Check if file is a test file
552
- * @private
553
- */
554
- isTestFile(filePath) {
555
- const testPatterns = [
556
- /\.test\./,
557
- /\.spec\./,
558
- /__tests__\//,
559
- /\/tests?\//,
560
- /\.test$/,
561
- /\.spec$/
562
- ];
563
- return testPatterns.some(pattern => pattern.test(filePath));
564
- }
565
-
566
- /**
567
- * Check if scanners are available for a language
568
- * @private
569
- */
570
- hasScannersForLanguage(available, language) {
571
- if (language === 'javascript' || language === 'typescript') {
572
- return available.semgrep || available.eslintSecurity;
573
- }
574
- if (language === 'python') {
575
- return available.bandit || available.semgrep;
576
- }
577
- return false;
578
- }
579
-
580
- /**
581
- * Normalize all scanner results to common format
582
- * @private
583
- */
584
- normalizeResults(results) {
585
- return results.map(result => ({
586
- file: result.file,
587
- line: result.line || 1,
588
- column: result.column || 1,
589
- severity: result.severity || STATIC_ANALYSIS.SEVERITY.WARNING,
590
- rule: result.rule || 'unknown',
591
- message: result.message || 'Security issue detected',
592
- category: 'security',
593
- scanner: result.scanner,
594
- cwe: result.cwe || null,
595
- owasp: result.owasp || null,
596
- confidence: result.confidence || null,
597
- fixable: result.fixable || false,
598
- remediation: result.remediation || result.moreInfo || null,
599
- references: result.references || [],
600
- package: result.package || null
601
- }));
602
- }
603
-
604
- /**
605
- * Map Semgrep severity to our standard
606
- * @private
607
- */
608
- mapSemgrepSeverity(severity) {
609
- const map = {
610
- 'ERROR': STATIC_ANALYSIS.SEVERITY.CRITICAL,
611
- 'WARNING': STATIC_ANALYSIS.SEVERITY.ERROR,
612
- 'INFO': STATIC_ANALYSIS.SEVERITY.WARNING
613
- };
614
- return map[severity?.toUpperCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
615
- }
616
-
617
- /**
618
- * Map Bandit severity to our standard
619
- * @private
620
- */
621
- mapBanditSeverity(severity) {
622
- const map = {
623
- 'HIGH': STATIC_ANALYSIS.SEVERITY.CRITICAL,
624
- 'MEDIUM': STATIC_ANALYSIS.SEVERITY.ERROR,
625
- 'LOW': STATIC_ANALYSIS.SEVERITY.WARNING
626
- };
627
- return map[severity?.toUpperCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
628
- }
629
-
630
- /**
631
- * Map ESLint severity to our standard
632
- * @private
633
- */
634
- mapESLintSeverity(severity) {
635
- return severity === 2 ? STATIC_ANALYSIS.SEVERITY.ERROR : STATIC_ANALYSIS.SEVERITY.WARNING;
636
- }
637
-
638
- /**
639
- * Map npm audit severity to our standard
640
- * @private
641
- */
642
- mapNpmSeverity(severity) {
643
- const map = {
644
- 'critical': STATIC_ANALYSIS.SEVERITY.CRITICAL,
645
- 'high': STATIC_ANALYSIS.SEVERITY.CRITICAL,
646
- 'moderate': STATIC_ANALYSIS.SEVERITY.ERROR,
647
- 'low': STATIC_ANALYSIS.SEVERITY.WARNING,
648
- 'info': STATIC_ANALYSIS.SEVERITY.INFO
649
- };
650
- return map[severity?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
651
- }
652
-
653
- /**
654
- * Map pip-audit severity to our standard
655
- * @private
656
- */
657
- mapPipAuditSeverity(severity) {
658
- // pip-audit doesn't always provide severity, default to ERROR
659
- if (!severity) return STATIC_ANALYSIS.SEVERITY.ERROR;
660
-
661
- const map = {
662
- 'critical': STATIC_ANALYSIS.SEVERITY.CRITICAL,
663
- 'high': STATIC_ANALYSIS.SEVERITY.CRITICAL,
664
- 'medium': STATIC_ANALYSIS.SEVERITY.ERROR,
665
- 'low': STATIC_ANALYSIS.SEVERITY.WARNING
666
- };
667
- return map[severity?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.ERROR;
668
- }
669
-
670
- /**
671
- * Get scanner status report
672
- * @returns {Promise<Object>} Scanner availability and status
673
- */
674
- async getScannerStatus() {
675
- const available = await this.detectAvailableScanners();
676
- return {
677
- scanners: available,
678
- recommendations: this.getInstallRecommendations(available)
679
- };
680
- }
681
-
682
- /**
683
- * Get installation recommendations for missing scanners
684
- * @private
685
- */
686
- getInstallRecommendations(available) {
687
- const recommendations = [];
688
-
689
- if (!available.semgrep) {
690
- recommendations.push({
691
- scanner: 'Semgrep',
692
- reason: 'Multi-language SAST with extensive security rules',
693
- install: 'pip install semgrep OR use Docker: docker pull returntocorp/semgrep',
694
- priority: 'high'
695
- });
696
- }
697
-
698
- if (!available.bandit) {
699
- recommendations.push({
700
- scanner: 'Bandit',
701
- reason: 'Python security scanner',
702
- install: 'pip install bandit',
703
- priority: 'medium'
704
- });
705
- }
706
-
707
- if (!available.eslintSecurity) {
708
- recommendations.push({
709
- scanner: 'eslint-plugin-security',
710
- reason: 'JavaScript/TypeScript security rules',
711
- install: 'npm install --save-dev eslint-plugin-security',
712
- priority: 'medium'
713
- });
714
- }
715
-
716
- if (!available.pipAudit) {
717
- recommendations.push({
718
- scanner: 'pip-audit',
719
- reason: 'Python dependency vulnerability scanner',
720
- install: 'pip install pip-audit',
721
- priority: 'low'
722
- });
723
- }
724
-
725
- return recommendations;
726
- }
727
- }
728
-
729
- export default SecurityAnalyzer;
1
+ const a0_0x5d6f5b=a0_0x5e88;(function(_0xdd22f0,_0x5982ee){const _0x1fe4e0=a0_0x5e88,_0x31f1d1=_0xdd22f0();while(!![]){try{const _0x2a7f69=parseInt(_0x1fe4e0(0x1a6))/0x1+-parseInt(_0x1fe4e0(0x1e8))/0x2+parseInt(_0x1fe4e0(0x205))/0x3+-parseInt(_0x1fe4e0(0x207))/0x4+parseInt(_0x1fe4e0(0x1dd))/0x5+-parseInt(_0x1fe4e0(0x1eb))/0x6*(parseInt(_0x1fe4e0(0x1d6))/0x7)+-parseInt(_0x1fe4e0(0x191))/0x8;if(_0x2a7f69===_0x5982ee)break;else _0x31f1d1['push'](_0x31f1d1['shift']());}catch(_0x2245d9){_0x31f1d1['push'](_0x31f1d1['shift']());}}}(a0_0xb888,0xdadad));import{exec}from'child_process';import{promisify}from'util';import a0_0x3a5a26 from'path';import a0_0x5dd803 from'fs/promises';import{STATIC_ANALYSIS}from'../utilities/constants.js';function a0_0xb888(){const _0x2410fa=['zML4','D2fYBG','q1Dflq','CgfYC2vcyw5KAxrszxn1BhrZ','CgLWlwf1zgL0','C2nHBM5LCKnHy2HL','BM9Kzv9TB2r1BgvZ','BNbTigf1zgL0igf2ywLSywjSzq','AgfZu2nHBM5LCNngB3jmyw5NDwfNzq','CMvMzxjLBMnLCW','rvnmAw50ihnLy3vYAxr5ihnJyw4GzMfPBgvK','zgvZy3jPChrPB24','v0fstKLorW','Bwv0ywrHDge','CMvXDwLYzw1LBNrZlNr4Da','y3zZCW','qMfUzgL0','Dw5RBM93BG','BwvZC2fNzq','CgLWlwf1zgL0ic0TzM9YBwf0igPZB24','Bg9Nz2vY','u0vwrvjjvfK','Bg9JywXty2fUBMvYrgLY','CNvUu2vTz3jLCa','zxH0BMfTzq','yxzHAwXHyMXLu2nHBM5LCNm','y29Sx29MzNnLDa','u2vTz3jLCcbZy2fUBMvYigrLDgvJDgvKicHSB2nHBcK','mteYD3PdDvbp','zxjYB3i','CNvUtNbTqxvKAxq','C2v2zxjPDhK','u2vTz3jLCcbZy2fUigzHAwXLza','rMfPBgvKihrVihbHCNnLifnLBwDYzxaGB3v0Chv0','BNbTigLUC3rHBgWGls1ZyxzLlwrLDIbLC2XPBNqTCgX1z2LUlxnLy3vYAxr5','nJiXodaWmhrRBMXewq','C3rHCNq','CgfJA2fNzq','ywXPyxnLCW','BwfW','Bw9KDwXL','zgv0zwn0qxzHAwXHyMXLu2nHBM5LCNm','DMLH','zxH0CMe','CgLWlwf1zgL0ic0TDMvYC2LVBG','z2v0u2nHBM5LCLn0yxr1CW','otGWntm4rLf5D29p','CgfYC2vfu0XPBNrszxn1BhrZ','AM9PBG','mJa5mZG4zvvRthfT','BNbTig5VDcbHDMfPBgfIBgu','CgfYC2vtzw1NCMvWuMvZDwX0CW','ChvZAa','CNvSzuLK','CgfYC2vqAxbbDwrPDfjLC3vSDhm','zxnSAw50u2vJDxjPDhK','y3zL','lNnJyw5UzxjZ','AxnbCNjHEq','zxnSAw50lxbSDwDPBI1Zzwn1CML0EsbKzxrLy3rLza','AMf2yxnJCMLWDa','tM8GC2vJDxjPDhKGC2nHBM5LCNmGyxzHAwXHyMXLigzVCIbSyw5NDwfNzq','C2vTz3jLCcaTlxzLCNnPB24','ChL0Ag9U','CgfYC2u','CgLWqxvKAxq','BgLUzq','BNbTic0TDMvYC2LVBG','BwfWrvnmAw50u2v2zxjPDhK','q1jjveLdquW','DxjS','Dg9mB3DLCKnHC2u','AxnZDwvFy3DL','B3DHC3a','C291CMnL','mtC2mtm4n0HqEg5swG','BNbTigf1zgL0ic0TANnVBG','mtm1ndyYngTzv3D0qq','yMfUzgL0','DNvSBNm','BNbTlq','Axnuzxn0rMLSzq','txvSDgKTBgfUz3vHz2uGu0ftvcb3AxrOigv4DgvUC2L2zsbZzwn1CML0EsbYDwXLCW','z2v0sw5ZDgfSBfjLy29TBwvUzgf0Aw9UCW','BMfTzq','Dg9vChbLCKnHC2u','BNbTqxvKAxq','BwfWqMfUzgL0u2v2zxjPDhK','C3rKB3v0','C2vTz3jLCcaTlwnVBMzPzZ1HDxrVic0TANnVBIaI','oti0mtq3mMnKyLLUCq','uhL0Ag9UigrLCgvUzgvUy3KGDNvSBMvYywjPBgL0EsbZy2fUBMvY','y29UzMLKzw5Jzq','y29S','zgvIDwC','Bw9Yzv9PBMzV','BwfWu2vTz3jLCfnLDMvYAxr5','su5gtW','zxnSAw50lxbSDwDPBI1Zzwn1CML0Eq','qxzHAwXHyMXL','rvjst1i','BM9YBwfSAxPLuMvZDwX0CW','CMfUz2u','AxnZDwvFDgv4Da','CgLWigLUC3rHBgWGCgLWlwf1zgL0','zgv0zwn0tgfUz3vHz2u','C2vJDxjPDhK','y2HLy2TFAwq','C2vTz3jLCa','CNvUqMfUzgL0','y3DL','mtyWode3n1DNzxzqza','Bg93','CgfYC2voCg1bDwrPDfjLC3vSDhm','zML4qxzHAwXHyMXL','zgLYBMfTzq','y3DK','u2vJDxjPDhKGDNvSBMvYywjPBgL0Eq','BwfWtNbTu2v2zxjPDhK','CMvTzwrPyxrPB24','rMfPBgvKihrVihbHCNnLig5WBsbHDwrPDcbVDxrWDxq','tM9Uzq','ywnJzxnZ','BwfWugLWqxvKAxrtzxzLCML0Eq','zgvWzw5Kzw5JAwvZ','CMvZDwX0CW','u2TPChbPBMCGDgvZDcbMAwXLigzVCIbZzwn1CML0EsbZy2fU','DNvSBMvYywjPBgL0AwvZ','yw5HBhL6zq','AgLNAa','AxnZDwvFC2v2zxjPDhK'];a0_0xb888=function(){return _0x2410fa;};return a0_0xb888();}function a0_0x5e88(_0x18b018,_0x1a220f){_0x18b018=_0x18b018-0x187;const _0xb888e2=a0_0xb888();let _0x5e88c4=_0xb888e2[_0x18b018];if(a0_0x5e88['wuHNhK']===undefined){var _0x45a7fd=function(_0x3c6c9e){const _0x8b5b00='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+/=';let _0x3a5a26='',_0x5dd803='';for(let _0x437b9f=0x0,_0x34b0ad,_0x96c1a8,_0x265dfe=0x0;_0x96c1a8=_0x3c6c9e['charAt'](_0x265dfe++);~_0x96c1a8&&(_0x34b0ad=_0x437b9f%0x4?_0x34b0ad*0x40+_0x96c1a8:_0x96c1a8,_0x437b9f++%0x4)?_0x3a5a26+=String['fromCharCode'](0xff&_0x34b0ad>>(-0x2*_0x437b9f&0x6)):0x0){_0x96c1a8=_0x8b5b00['indexOf'](_0x96c1a8);}for(let _0x4c4bf2=0x0,_0x232c20=_0x3a5a26['length'];_0x4c4bf2<_0x232c20;_0x4c4bf2++){_0x5dd803+='%'+('00'+_0x3a5a26['charCodeAt'](_0x4c4bf2)['toString'](0x10))['slice'](-0x2);}return decodeURIComponent(_0x5dd803);};a0_0x5e88['DkckAP']=_0x45a7fd,a0_0x5e88['TvbYQY']={},a0_0x5e88['wuHNhK']=!![];}const _0x25d9f0=_0xb888e2[0x0],_0x1c0597=_0x18b018+_0x25d9f0,_0x1bbe50=a0_0x5e88['TvbYQY'][_0x1c0597];return!_0x1bbe50?(_0x5e88c4=a0_0x5e88['DkckAP'](_0x5e88c4),a0_0x5e88['TvbYQY'][_0x1c0597]=_0x5e88c4):_0x5e88c4=_0x1bbe50,_0x5e88c4;}const execAsync=promisify(exec);class SecurityAnalyzer{constructor(_0x437b9f=null){const _0x333a71=a0_0x5e88;this['logger']=_0x437b9f,this[_0x333a71(0x1d3)]=null,this[_0x333a71(0x1bf)]=new Map(),this['localScannerDir']=a0_0x3a5a26[_0x333a71(0x1ea)](process[_0x333a71(0x1ab)](),_0x333a71(0x1c0),_0x333a71(0x1f3));}async['detectAvailableScanners'](){const _0x47bffe=a0_0x5e88;if(this[_0x47bffe(0x1d3)]!==null)return this[_0x47bffe(0x1d3)];const _0x34b0ad={'semgrep':![],'bandit':![],'npmAudit':![],'pipAudit':![],'eslintSecurity':![]};try{const _0x96c1a8=a0_0x3a5a26[_0x47bffe(0x1ea)](this[_0x47bffe(0x1d0)],_0x47bffe(0x1a3));try{await a0_0x5dd803['access'](_0x96c1a8),_0x34b0ad[_0x47bffe(0x1a3)]=!![],this[_0x47bffe(0x1ce)]?.[_0x47bffe(0x195)](_0x47bffe(0x1d5));}catch{await execAsync(_0x47bffe(0x1f8),{'timeout':0x1388}),_0x34b0ad['semgrep']=!![],this['logger']?.[_0x47bffe(0x195)]('Semgrep\x20scanner\x20detected\x20(system)');}}catch(_0x265dfe){this['logger']?.['debug']('Semgrep\x20not\x20available',{'error':_0x265dfe[_0x47bffe(0x1cc)]});}try{await execAsync('bandit\x20--version',{'timeout':0x1388}),_0x34b0ad[_0x47bffe(0x208)]=!![],this['logger']?.['debug']('Bandit\x20scanner\x20detected');}catch(_0x4c4bf2){this['logger']?.[_0x47bffe(0x195)]('Bandit\x20not\x20available',{'error':_0x4c4bf2[_0x47bffe(0x1cc)]});}try{await execAsync(_0x47bffe(0x1fd),{'timeout':0x1388}),_0x34b0ad[_0x47bffe(0x18d)]=!![],this['logger']?.['debug'](_0x47bffe(0x1c1));}catch(_0x232c20){this['logger']?.['debug'](_0x47bffe(0x1ec),{'error':_0x232c20['message']});}try{await execAsync(_0x47bffe(0x1e6),{'timeout':0x1388}),_0x34b0ad['pipAudit']=!![],this[_0x47bffe(0x1ce)]?.[_0x47bffe(0x195)]('pip-audit\x20detected');}catch(_0x33f3f4){this[_0x47bffe(0x1ce)]?.[_0x47bffe(0x195)]('pip-audit\x20not\x20available',{'error':_0x33f3f4['message']});}try{const _0x5f0203=await execAsync('npm\x20list\x20eslint-plugin-security\x20--depth=0\x20--json',{'timeout':0x1388,'cwd':process['cwd']()}),_0x31709d=JSON[_0x47bffe(0x1fa)](_0x5f0203['stdout']);_0x31709d['dependencies']&&_0x31709d['dependencies']['eslint-plugin-security']&&(_0x34b0ad[_0x47bffe(0x1f1)]=!![],this['logger']?.[_0x47bffe(0x195)](_0x47bffe(0x1f5)));}catch(_0xd55bdb){this['logger']?.['debug']('eslint-plugin-security\x20not\x20available',{'error':_0xd55bdb['message']});}return this[_0x47bffe(0x1d3)]=_0x34b0ad,_0x34b0ad;}async[a0_0x5d6f5b(0x1b7)](_0x197b5f,_0x55a89f,_0x688dd6={}){const _0x3eb899=a0_0x5d6f5b,_0x2a708a=[],_0x496796=await this[_0x3eb899(0x1e3)](),_0x40685d=this[_0x3eb899(0x1a0)](_0x197b5f);if(_0x688dd6['skipTestFiles']!==![]&&this[_0x3eb899(0x188)](_0x197b5f))return this['logger']?.[_0x3eb899(0x195)](_0x3eb899(0x1b5),{'filePath':_0x197b5f}),[];if(_0x40685d==='javascript'||_0x40685d==='typescript'){if(_0x496796[_0x3eb899(0x1a3)]){const _0x2ca88f=await this[_0x3eb899(0x1d1)](_0x197b5f,[_0x40685d],_0x688dd6);_0x2a708a[_0x3eb899(0x1ee)](..._0x2ca88f);}if(_0x496796[_0x3eb899(0x1f1)]){const _0x57fbe8=await this['runESLintSecurity'](_0x197b5f,_0x55a89f,_0x688dd6);_0x2a708a[_0x3eb899(0x1ee)](..._0x57fbe8);}}if(_0x40685d==='python'){if(_0x496796[_0x3eb899(0x208)]){const _0x120134=await this['runBandit'](_0x197b5f,_0x688dd6);_0x2a708a[_0x3eb899(0x1ee)](..._0x120134);}if(_0x496796['semgrep']){const _0x5d7e25=await this['runSemgrep'](_0x197b5f,[_0x40685d],_0x688dd6);_0x2a708a['push'](..._0x5d7e25);}}return _0x2a708a['length']===0x0&&!this['hasScannersForLanguage'](_0x496796,_0x40685d)&&this[_0x3eb899(0x1ce)]?.[_0x3eb899(0x1bb)](_0x3eb899(0x1f7),{'language':_0x40685d,'filePath':_0x197b5f}),this['normalizeResults'](_0x2a708a);}async['analyzeProject'](_0x19ebdd,_0x1d9927,_0x328e2d={}){const _0x128563=a0_0x5d6f5b,_0x5f1338=[],_0x446080=await this['detectAvailableScanners']();if(_0x1d9927===_0x128563(0x1f6)||_0x1d9927==='typescript'){if(_0x446080[_0x128563(0x18d)]){const _0x51b930=await this[_0x128563(0x1d8)](_0x19ebdd,_0x328e2d);_0x5f1338['push'](..._0x51b930);}}if(_0x1d9927==='python'){if(_0x446080['pipAudit']){const _0x478cef=await this['runPipAudit'](_0x19ebdd,_0x328e2d);_0x5f1338['push'](..._0x478cef);}}return this['normalizeResults'](_0x5f1338);}async['runSemgrep'](_0x42aa73,_0x317523,_0x29751b={}){const _0x364211=a0_0x5d6f5b;try{const _0x2ca368=a0_0x3a5a26[_0x364211(0x1aa)](_0x42aa73),_0x5989e8=await execAsync(_0x364211(0x190)+_0x42aa73+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530,'cwd':_0x2ca368}),_0x462d9f=JSON[_0x364211(0x1fa)](_0x5989e8['stdout']);return this[_0x364211(0x1ed)](_0x462d9f);}catch(_0x404b3b){if(_0x404b3b['stdout'])try{const _0x3d66f2=JSON[_0x364211(0x1fa)](_0x404b3b['stdout']);return this[_0x364211(0x1ed)](_0x3d66f2);}catch(_0x3d7fc3){this[_0x364211(0x1ce)]?.['error'](_0x364211(0x1db),{'error':_0x3d7fc3['message'],'stdout':_0x404b3b[_0x364211(0x18f)]});}return this[_0x364211(0x1ce)]?.['error'](_0x364211(0x1da),{'error':_0x404b3b['message']}),[];}}['parseSemgrepResults'](_0x38e906){const _0x51e5d1=a0_0x5d6f5b,_0x4ecf81=[];if(_0x38e906[_0x51e5d1(0x1b4)]&&Array['isArray'](_0x38e906[_0x51e5d1(0x1b4)]))for(const _0x5210dc of _0x38e906[_0x51e5d1(0x1b4)]){_0x4ecf81[_0x51e5d1(0x1ee)]({'file':_0x5210dc['path'],'line':_0x5210dc['start']?.['line']||0x1,'column':_0x5210dc[_0x51e5d1(0x1de)]?.[_0x51e5d1(0x194)]||0x1,'severity':this[_0x51e5d1(0x197)](_0x5210dc['extra']?.[_0x51e5d1(0x1d9)]),'rule':_0x5210dc[_0x51e5d1(0x1a2)],'message':_0x5210dc[_0x51e5d1(0x1e5)]?.['message']||_0x5210dc[_0x51e5d1(0x1e5)]?.['lines']||'Security\x20issue\x20detected','category':_0x51e5d1(0x1a1),'scanner':_0x51e5d1(0x1a3),'cwe':_0x5210dc[_0x51e5d1(0x1e5)]?.['metadata']?.[_0x51e5d1(0x1a5)],'owasp':_0x5210dc['extra']?.[_0x51e5d1(0x1c7)]?.[_0x51e5d1(0x203)],'confidence':_0x5210dc[_0x51e5d1(0x1e5)]?.[_0x51e5d1(0x1c7)]?.[_0x51e5d1(0x193)],'references':_0x5210dc[_0x51e5d1(0x1e5)]?.[_0x51e5d1(0x1c7)]?.[_0x51e5d1(0x1c3)]});}return _0x4ecf81;}async[a0_0x5d6f5b(0x1a4)](_0xd4153d,_0x25a121={}){const _0x5702e=a0_0x5d6f5b;try{const _0x2cc65=await execAsync('bandit\x20-f\x20json\x20\x22'+_0xd4153d+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530}),_0x1a7fc4=JSON[_0x5702e(0x1fa)](_0x2cc65['stdout']);return this['parseBanditResults'](_0x1a7fc4);}catch(_0x4ed864){if(_0x4ed864['stdout'])try{const _0x22a6e6=JSON['parse'](_0x4ed864['stdout']);return this[_0x5702e(0x1bd)](_0x22a6e6);}catch(_0x42d29d){this['logger']?.[_0x5702e(0x1d7)]('Failed\x20to\x20parse\x20Bandit\x20output',{'error':_0x42d29d[_0x5702e(0x1cc)]});}return this[_0x5702e(0x1ce)]?.[_0x5702e(0x1d7)]('Bandit\x20scan\x20failed',{'error':_0x4ed864[_0x5702e(0x1cc)]}),[];}}[a0_0x5d6f5b(0x1bd)](_0x2ec25a){const _0x36fdad=a0_0x5d6f5b,_0x2461a3=[];if(_0x2ec25a[_0x36fdad(0x1b4)]&&Array['isArray'](_0x2ec25a[_0x36fdad(0x1b4)]))for(const _0x4a9639 of _0x2ec25a['results']){_0x2461a3['push']({'file':_0x4a9639['filename'],'line':_0x4a9639['line_number']||0x1,'column':_0x4a9639[_0x36fdad(0x1d4)]||0x1,'severity':this['mapBanditSeverity'](_0x4a9639[_0x36fdad(0x1b9)]),'rule':_0x4a9639['test_id'],'message':_0x4a9639[_0x36fdad(0x19e)],'category':_0x36fdad(0x1a1),'scanner':_0x36fdad(0x208),'cwe':_0x4a9639[_0x36fdad(0x202)]?.['id']?_0x36fdad(0x1bc)+_0x4a9639[_0x36fdad(0x202)]['id']:null,'confidence':_0x4a9639['issue_confidence'],'moreInfo':_0x4a9639[_0x36fdad(0x196)]});}return _0x2461a3;}async['runESLintSecurity'](_0x5c5bbf,_0x164410,_0x57deb2={}){const _0x46e6be=a0_0x5d6f5b;try{const {ESLint:_0x13535f}=await import('eslint'),_0x265da5=new _0x13535f({'overrideConfig':{'plugins':['security'],'extends':['plugin:security/recommended'],'parserOptions':{'ecmaVersion':'latest','sourceType':_0x46e6be(0x1e2)}},'useEslintrc':![]}),_0x32c41c=await _0x265da5['lintText'](_0x164410,{'filePath':_0x5c5bbf});return this['parseESLintResults'](_0x32c41c,_0x5c5bbf);}catch(_0x3a42f1){return this[_0x46e6be(0x1ce)]?.[_0x46e6be(0x1d7)](_0x46e6be(0x1c4),{'error':_0x3a42f1[_0x46e6be(0x1cc)],'filePath':_0x5c5bbf}),[];}}[a0_0x5d6f5b(0x1e9)](_0x362d28,_0x569b2a){const _0x4c4d5e=a0_0x5d6f5b,_0x419f75=[];for(const _0x23a0a1 of _0x362d28){if(_0x23a0a1['messages']&&Array[_0x4c4d5e(0x1f4)](_0x23a0a1['messages']))for(const _0x56c951 of _0x23a0a1['messages']){_0x56c951['ruleId']&&_0x56c951[_0x4c4d5e(0x1ef)]['startsWith']('security/')&&_0x419f75[_0x4c4d5e(0x1ee)]({'file':_0x569b2a,'line':_0x56c951['line']||0x1,'column':_0x56c951['column']||0x1,'severity':this[_0x4c4d5e(0x1fe)](_0x56c951['severity']),'rule':_0x56c951[_0x4c4d5e(0x1ef)],'message':_0x56c951['message'],'category':'security','scanner':'eslint-security','fixable':_0x56c951[_0x4c4d5e(0x1ba)]!==undefined});}}return _0x419f75;}async['runNpmAudit'](_0x1e01fe,_0x4c87a9={}){const _0xfe93fe=a0_0x5d6f5b;try{const _0x1590f3=a0_0x3a5a26[_0xfe93fe(0x1ea)](_0x1e01fe,'package.json');try{await a0_0x5dd803[_0xfe93fe(0x1b1)](_0x1590f3);}catch{return this[_0xfe93fe(0x1ce)]?.['debug']('No\x20package.json\x20found,\x20skipping\x20npm\x20audit'),[];}const _0x43d3f7=await execAsync(_0xfe93fe(0x206),{'cwd':_0x1e01fe,'maxBuffer':0xa*0x400*0x400,'timeout':0xea60}),_0xbcbb5f=JSON[_0xfe93fe(0x1fa)](_0x43d3f7[_0xfe93fe(0x18f)]);return this['parseNpmAuditResults'](_0xbcbb5f);}catch(_0x38bc1d){if(_0x38bc1d['stdout'])try{const _0x38d22e=JSON['parse'](_0x38bc1d[_0xfe93fe(0x18f)]);return this[_0xfe93fe(0x1a8)](_0x38d22e);}catch(_0x313f9f){this['logger']?.[_0xfe93fe(0x1d7)](_0xfe93fe(0x1af),{'error':_0x313f9f[_0xfe93fe(0x1cc)]});}return[];}}[a0_0x5d6f5b(0x1a8)](_0x1b0d17){const _0x299963=a0_0x5d6f5b,_0x49981b=[];if(_0x1b0d17['vulnerabilities'])for(const [_0x172888,_0x8b668b]of Object['entries'](_0x1b0d17[_0x299963(0x1b6)])){_0x49981b['push']({'file':'package.json','line':0x1,'column':0x1,'severity':this[_0x299963(0x1ad)](_0x8b668b['severity']),'rule':_0x299963(0x187)+(_0x8b668b[_0x299963(0x1e4)][0x0]?.[_0x299963(0x204)]||'advisory'),'message':_0x172888+':\x20'+(_0x8b668b['via'][0x0]?.['title']||_0x299963(0x1ac)),'category':'security','scanner':'npm-audit','package':_0x172888,'vulnerableVersions':_0x8b668b[_0x299963(0x19d)],'patchedVersions':_0x8b668b[_0x299963(0x1a9)]?_0x299963(0x19a):_0x299963(0x1b0),'cve':_0x8b668b['via'][0x0]?.[_0x299963(0x1f2)],'cvss':_0x8b668b['via'][0x0]?.[_0x299963(0x1c9)],'references':_0x8b668b['via'][0x0]?.['url']?[_0x8b668b['via'][0x0][_0x299963(0x200)]]:[]});}return _0x49981b;}async['runPipAudit'](_0x4e1869,_0xd58afe={}){const _0x4270ec=a0_0x5d6f5b;try{const requirementsPath=a0_0x3a5a26['join'](_0x4e1869,_0x4270ec(0x1c8));try{await a0_0x5dd803[_0x4270ec(0x1b1)](requirementsPath);}catch{return this['logger']?.['debug']('No\x20requirements.txt\x20found,\x20skipping\x20pip-audit'),[];}const _0x10a8cb=await execAsync(_0x4270ec(0x1cd),{'cwd':_0x4e1869,'maxBuffer':0xa*0x400*0x400,'timeout':0xea60}),_0x23bd3b=JSON['parse'](_0x10a8cb['stdout']);return this[_0x4270ec(0x1f0)](_0x23bd3b);}catch(_0x234e1c){if(_0x234e1c['stdout'])try{const _0x54ab06=JSON['parse'](_0x234e1c['stdout']);return this[_0x4270ec(0x1f0)](_0x54ab06);}catch(_0x140091){this[_0x4270ec(0x1ce)]?.['error']('Failed\x20to\x20parse\x20pip-audit\x20output',{'error':_0x140091['message']});}return[];}}[a0_0x5d6f5b(0x1f0)](_0x52c3ee){const _0x4e8e26=a0_0x5d6f5b,_0x5c2ee2=[];if(_0x52c3ee[_0x4e8e26(0x1b3)]&&Array[_0x4e8e26(0x1f4)](_0x52c3ee['dependencies']))for(const _0x144508 of _0x52c3ee[_0x4e8e26(0x1b3)]){if(_0x144508['vulns']&&Array['isArray'](_0x144508[_0x4e8e26(0x209)]))for(const _0x5bc975 of _0x144508[_0x4e8e26(0x209)]){_0x5c2ee2['push']({'file':'requirements.txt','line':0x1,'column':0x1,'severity':this[_0x4e8e26(0x1b2)](_0x5bc975['severity']),'rule':_0x5bc975['id'],'message':_0x144508['name']+':\x20'+(_0x5bc975[_0x4e8e26(0x1c5)]||'Security\x20vulnerability'),'category':'security','scanner':'pip-audit','package':_0x144508[_0x4e8e26(0x18b)],'vulnerableVersion':_0x144508['version'],'fixedVersions':_0x5bc975['fix_versions'],'references':_0x5bc975[_0x4e8e26(0x1e0)]||[]});}}return _0x5c2ee2;}['detectLanguage'](_0x499eb9){const _0x271ce0=a0_0x5d6f5b,_0xc418fe=a0_0x3a5a26[_0x271ce0(0x1d2)](_0x499eb9)[_0x271ce0(0x201)](),_0x586109={'.js':_0x271ce0(0x1f6),'.jsx':'javascript','.mjs':_0x271ce0(0x1f6),'.cjs':_0x271ce0(0x1f6),'.ts':'typescript','.tsx':'typescript','.py':_0x271ce0(0x1f9)};return _0x586109[_0xc418fe]||null;}['isTestFile'](_0x4d7753){const _0x11a538=[/\.test\./,/\.spec\./,/__tests__\//,/\/tests?\//,/\.test$/,/\.spec$/];return _0x11a538['some'](_0x31b6a1=>_0x31b6a1['test'](_0x4d7753));}[a0_0x5d6f5b(0x1c2)](_0xe17f73,_0x147555){const _0x20b634=a0_0x5d6f5b;if(_0x147555===_0x20b634(0x1f6)||_0x147555==='typescript')return _0xe17f73['semgrep']||_0xe17f73[_0x20b634(0x1f1)];if(_0x147555==='python')return _0xe17f73['bandit']||_0xe17f73[_0x20b634(0x1a3)];return![];}[a0_0x5d6f5b(0x19c)](_0x4666e8){const _0x515816=a0_0x5d6f5b;return _0x4666e8[_0x515816(0x1e1)](_0x35e763=>({'file':_0x35e763['file'],'line':_0x35e763[_0x515816(0x1fc)]||0x1,'column':_0x35e763['column']||0x1,'severity':_0x35e763[_0x515816(0x1d9)]||STATIC_ANALYSIS['SEVERITY'][_0x515816(0x1c6)],'rule':_0x35e763['rule']||_0x515816(0x1cb),'message':_0x35e763[_0x515816(0x1cc)]||'Security\x20issue\x20detected','category':'security','scanner':_0x35e763['scanner'],'cwe':_0x35e763[_0x515816(0x1a5)]||null,'owasp':_0x35e763[_0x515816(0x203)]||null,'confidence':_0x35e763[_0x515816(0x193)]||null,'fixable':_0x35e763['fixable']||![],'remediation':_0x35e763[_0x515816(0x1ae)]||_0x35e763['moreInfo']||null,'references':_0x35e763['references']||[],'package':_0x35e763[_0x515816(0x1df)]||null}));}['mapSemgrepSeverity'](_0x461f86){const _0x188f9f=a0_0x5d6f5b,_0x23aa55={'ERROR':STATIC_ANALYSIS['SEVERITY']['CRITICAL'],'WARNING':STATIC_ANALYSIS['SEVERITY']['ERROR'],'INFO':STATIC_ANALYSIS['SEVERITY']['WARNING']};return _0x23aa55[_0x461f86?.[_0x188f9f(0x18c)]()]||STATIC_ANALYSIS['SEVERITY']['WARNING'];}[a0_0x5d6f5b(0x18e)](_0x52f953){const _0x3b2884=a0_0x5d6f5b,_0x587951={'HIGH':STATIC_ANALYSIS[_0x3b2884(0x1cf)]['CRITICAL'],'MEDIUM':STATIC_ANALYSIS['SEVERITY']['ERROR'],'LOW':STATIC_ANALYSIS['SEVERITY'][_0x3b2884(0x1c6)]};return _0x587951[_0x52f953?.[_0x3b2884(0x18c)]()]||STATIC_ANALYSIS[_0x3b2884(0x1cf)]['WARNING'];}[a0_0x5d6f5b(0x1fe)](_0x53e047){const _0x2d3507=a0_0x5d6f5b;return _0x53e047===0x2?STATIC_ANALYSIS[_0x2d3507(0x1cf)][_0x2d3507(0x19b)]:STATIC_ANALYSIS[_0x2d3507(0x1cf)]['WARNING'];}[a0_0x5d6f5b(0x1ad)](_0x341aa8){const _0x335caa=a0_0x5d6f5b,_0x968d6f={'critical':STATIC_ANALYSIS[_0x335caa(0x1cf)][_0x335caa(0x1ff)],'high':STATIC_ANALYSIS['SEVERITY'][_0x335caa(0x1ff)],'moderate':STATIC_ANALYSIS[_0x335caa(0x1cf)][_0x335caa(0x19b)],'low':STATIC_ANALYSIS['SEVERITY'][_0x335caa(0x1c6)],'info':STATIC_ANALYSIS[_0x335caa(0x1cf)][_0x335caa(0x198)]};return _0x968d6f[_0x341aa8?.[_0x335caa(0x201)]()]||STATIC_ANALYSIS[_0x335caa(0x1cf)]['WARNING'];}['mapPipAuditSeverity'](_0x157faf){const _0x1feaed=a0_0x5d6f5b;if(!_0x157faf)return STATIC_ANALYSIS[_0x1feaed(0x1cf)][_0x1feaed(0x19b)];const _0x33e597={'critical':STATIC_ANALYSIS[_0x1feaed(0x1cf)]['CRITICAL'],'high':STATIC_ANALYSIS[_0x1feaed(0x1cf)]['CRITICAL'],'medium':STATIC_ANALYSIS[_0x1feaed(0x1cf)]['ERROR'],'low':STATIC_ANALYSIS[_0x1feaed(0x1cf)][_0x1feaed(0x1c6)]};return _0x33e597[_0x157faf?.['toLowerCase']()]||STATIC_ANALYSIS['SEVERITY']['ERROR'];}async[a0_0x5d6f5b(0x1e7)](){const _0x4771f0=a0_0x5d6f5b,_0x508916=await this[_0x4771f0(0x1e3)]();return{'scanners':_0x508916,'recommendations':this[_0x4771f0(0x18a)](_0x508916)};}['getInstallRecommendations'](_0x20143f){const _0x431019=a0_0x5d6f5b,_0x3da997=[];return!_0x20143f[_0x431019(0x1a3)]&&_0x3da997['push']({'scanner':'Semgrep','reason':_0x431019(0x189),'install':'pip\x20install\x20semgrep\x20OR\x20use\x20Docker:\x20docker\x20pull\x20returntocorp/semgrep','priority':_0x431019(0x1b8)}),!_0x20143f[_0x431019(0x208)]&&_0x3da997['push']({'scanner':_0x431019(0x1ca),'reason':'Python\x20security\x20scanner','install':'pip\x20install\x20bandit','priority':'medium'}),!_0x20143f[_0x431019(0x1f1)]&&_0x3da997[_0x431019(0x1ee)]({'scanner':_0x431019(0x199),'reason':'JavaScript/TypeScript\x20security\x20rules','install':_0x431019(0x1dc),'priority':'medium'}),!_0x20143f[_0x431019(0x1fb)]&&_0x3da997[_0x431019(0x1ee)]({'scanner':_0x431019(0x1be),'reason':_0x431019(0x192),'install':_0x431019(0x19f),'priority':_0x431019(0x1a7)}),_0x3da997;}}export default SecurityAnalyzer;