@loxia-labs/loxia-autopilot-one 1.0.1 → 1.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (120) hide show
  1. package/README.md +44 -54
  2. package/bin/cli.js +1 -115
  3. package/bin/loxia-terminal-v2.js +3 -0
  4. package/bin/loxia-terminal.js +3 -0
  5. package/bin/start-with-terminal.js +3 -0
  6. package/package.json +15 -15
  7. package/scripts/install-scanners.js +1 -235
  8. package/src/analyzers/CSSAnalyzer.js +1 -297
  9. package/src/analyzers/ConfigValidator.js +1 -690
  10. package/src/analyzers/ESLintAnalyzer.js +1 -320
  11. package/src/analyzers/JavaScriptAnalyzer.js +1 -261
  12. package/src/analyzers/PrettierFormatter.js +1 -247
  13. package/src/analyzers/PythonAnalyzer.js +1 -266
  14. package/src/analyzers/SecurityAnalyzer.js +1 -729
  15. package/src/analyzers/TypeScriptAnalyzer.js +1 -247
  16. package/src/analyzers/codeCloneDetector/analyzer.js +1 -344
  17. package/src/analyzers/codeCloneDetector/detector.js +1 -203
  18. package/src/analyzers/codeCloneDetector/index.js +1 -160
  19. package/src/analyzers/codeCloneDetector/parser.js +1 -199
  20. package/src/analyzers/codeCloneDetector/reporter.js +1 -148
  21. package/src/analyzers/codeCloneDetector/scanner.js +1 -59
  22. package/src/core/agentPool.js +1 -1474
  23. package/src/core/agentScheduler.js +1 -2147
  24. package/src/core/contextManager.js +1 -709
  25. package/src/core/messageProcessor.js +1 -732
  26. package/src/core/orchestrator.js +1 -548
  27. package/src/core/stateManager.js +1 -877
  28. package/src/index.js +1 -631
  29. package/src/interfaces/cli.js +1 -549
  30. package/src/interfaces/terminal/__tests__/smoke/advancedFeatures.test.js +1 -0
  31. package/src/interfaces/terminal/__tests__/smoke/agentControl.test.js +1 -0
  32. package/src/interfaces/terminal/__tests__/smoke/agents.test.js +1 -0
  33. package/src/interfaces/terminal/__tests__/smoke/components.test.js +1 -0
  34. package/src/interfaces/terminal/__tests__/smoke/connection.test.js +1 -0
  35. package/src/interfaces/terminal/__tests__/smoke/enhancements.test.js +1 -0
  36. package/src/interfaces/terminal/__tests__/smoke/imports.test.js +1 -0
  37. package/src/interfaces/terminal/__tests__/smoke/messages.test.js +1 -0
  38. package/src/interfaces/terminal/__tests__/smoke/tools.test.js +1 -0
  39. package/src/interfaces/terminal/api/apiClient.js +1 -0
  40. package/src/interfaces/terminal/api/messageRouter.js +1 -0
  41. package/src/interfaces/terminal/api/session.js +1 -0
  42. package/src/interfaces/terminal/api/websocket.js +1 -0
  43. package/src/interfaces/terminal/components/AgentCreator.js +1 -0
  44. package/src/interfaces/terminal/components/AgentEditor.js +1 -0
  45. package/src/interfaces/terminal/components/AgentSwitcher.js +1 -0
  46. package/src/interfaces/terminal/components/ErrorBoundary.js +1 -0
  47. package/src/interfaces/terminal/components/ErrorPanel.js +1 -0
  48. package/src/interfaces/terminal/components/Header.js +1 -0
  49. package/src/interfaces/terminal/components/HelpPanel.js +1 -0
  50. package/src/interfaces/terminal/components/InputBox.js +1 -0
  51. package/src/interfaces/terminal/components/Layout.js +1 -0
  52. package/src/interfaces/terminal/components/LoadingSpinner.js +1 -0
  53. package/src/interfaces/terminal/components/MessageList.js +1 -0
  54. package/src/interfaces/terminal/components/MultilineTextInput.js +1 -0
  55. package/src/interfaces/terminal/components/SearchPanel.js +1 -0
  56. package/src/interfaces/terminal/components/SettingsPanel.js +1 -0
  57. package/src/interfaces/terminal/components/StatusBar.js +1 -0
  58. package/src/interfaces/terminal/components/TextInput.js +1 -0
  59. package/src/interfaces/terminal/config/agentEditorConstants.js +1 -0
  60. package/src/interfaces/terminal/config/constants.js +1 -0
  61. package/src/interfaces/terminal/index.js +1 -0
  62. package/src/interfaces/terminal/state/useAgentControl.js +1 -0
  63. package/src/interfaces/terminal/state/useAgents.js +1 -0
  64. package/src/interfaces/terminal/state/useConnection.js +1 -0
  65. package/src/interfaces/terminal/state/useMessages.js +1 -0
  66. package/src/interfaces/terminal/state/useTools.js +1 -0
  67. package/src/interfaces/terminal/utils/debugLogger.js +1 -0
  68. package/src/interfaces/terminal/utils/settingsStorage.js +1 -0
  69. package/src/interfaces/terminal/utils/theme.js +1 -0
  70. package/src/interfaces/webServer.js +1 -2162
  71. package/src/modules/fileExplorer/controller.js +1 -280
  72. package/src/modules/fileExplorer/index.js +1 -37
  73. package/src/modules/fileExplorer/middleware.js +1 -92
  74. package/src/modules/fileExplorer/routes.js +1 -125
  75. package/src/modules/fileExplorer/types.js +1 -44
  76. package/src/services/aiService.js +1 -1232
  77. package/src/services/apiKeyManager.js +1 -164
  78. package/src/services/benchmarkService.js +1 -366
  79. package/src/services/budgetService.js +1 -539
  80. package/src/services/contextInjectionService.js +1 -247
  81. package/src/services/conversationCompactionService.js +1 -637
  82. package/src/services/errorHandler.js +1 -810
  83. package/src/services/fileAttachmentService.js +1 -544
  84. package/src/services/modelRouterService.js +1 -366
  85. package/src/services/modelsService.js +1 -322
  86. package/src/services/qualityInspector.js +1 -796
  87. package/src/services/tokenCountingService.js +1 -536
  88. package/src/tools/agentCommunicationTool.js +1 -1344
  89. package/src/tools/agentDelayTool.js +1 -485
  90. package/src/tools/asyncToolManager.js +1 -604
  91. package/src/tools/baseTool.js +1 -800
  92. package/src/tools/browserTool.js +1 -920
  93. package/src/tools/cloneDetectionTool.js +1 -621
  94. package/src/tools/dependencyResolverTool.js +1 -1215
  95. package/src/tools/fileContentReplaceTool.js +1 -875
  96. package/src/tools/fileSystemTool.js +1 -1107
  97. package/src/tools/fileTreeTool.js +1 -853
  98. package/src/tools/imageTool.js +1 -901
  99. package/src/tools/importAnalyzerTool.js +1 -1060
  100. package/src/tools/jobDoneTool.js +1 -248
  101. package/src/tools/seekTool.js +1 -956
  102. package/src/tools/staticAnalysisTool.js +1 -1778
  103. package/src/tools/taskManagerTool.js +1 -2873
  104. package/src/tools/terminalTool.js +1 -2304
  105. package/src/tools/webTool.js +1 -1430
  106. package/src/types/agent.js +1 -519
  107. package/src/types/contextReference.js +1 -972
  108. package/src/types/conversation.js +1 -730
  109. package/src/types/toolCommand.js +1 -747
  110. package/src/utilities/attachmentValidator.js +1 -292
  111. package/src/utilities/configManager.js +1 -582
  112. package/src/utilities/constants.js +1 -722
  113. package/src/utilities/directoryAccessManager.js +1 -535
  114. package/src/utilities/fileProcessor.js +1 -307
  115. package/src/utilities/logger.js +1 -436
  116. package/src/utilities/tagParser.js +1 -1246
  117. package/src/utilities/toolConstants.js +1 -317
  118. package/web-ui/build/index.html +2 -2
  119. package/web-ui/build/static/{index-Dy2bYbOa.css → index-CClD1090.css} +1 -1
  120. package/web-ui/build/static/{index-CjkkcnFA.js → index-lCBai6dX.js} +66 -67
@@ -1,690 +1 @@
1
- /**
2
- * ConfigValidator - Validate configuration files for errors and security issues
3
- *
4
- * Validates common configuration files:
5
- * - package.json, tsconfig.json (JSON Schema)
6
- * - Dockerfile (hadolint)
7
- * - docker-compose.yml (yamllint)
8
- * - Kubernetes YAML (checkov, yamllint)
9
- * - Terraform (checkov)
10
- * - .env files (secret detection)
11
- * - GitHub Actions workflows (yamllint)
12
- */
13
-
14
- import { exec } from 'child_process';
15
- import { promisify } from 'util';
16
- import path from 'path';
17
- import fs from 'fs/promises';
18
- import { STATIC_ANALYSIS } from '../utilities/constants.js';
19
-
20
- const execAsync = promisify(exec);
21
-
22
- class ConfigValidator {
23
- constructor(logger = null) {
24
- this.logger = logger;
25
- this.availableScanners = null;
26
- this.scannerCache = new Map();
27
- }
28
-
29
- /**
30
- * Detect which validation tools are available
31
- * @returns {Promise<Object>} Available validators
32
- */
33
- async detectAvailableValidators() {
34
- // Return cached result if available
35
- if (this.availableScanners !== null) {
36
- return this.availableScanners;
37
- }
38
-
39
- const available = {
40
- checkov: false,
41
- hadolint: false,
42
- yamllint: false,
43
- jsonSchema: false
44
- };
45
-
46
- // Check for checkov (Infrastructure as Code scanner)
47
- try {
48
- await execAsync('checkov --version', { timeout: 5000 });
49
- available.checkov = true;
50
- this.logger?.debug('checkov detected');
51
- } catch (error) {
52
- this.logger?.debug('checkov not available', { error: error.message });
53
- }
54
-
55
- // Check for hadolint (Dockerfile linter)
56
- try {
57
- await execAsync('hadolint --version', { timeout: 5000 });
58
- available.hadolint = true;
59
- this.logger?.debug('hadolint detected');
60
- } catch (error) {
61
- this.logger?.debug('hadolint not available', { error: error.message });
62
- }
63
-
64
- // Check for yamllint (YAML linter)
65
- try {
66
- await execAsync('yamllint --version', { timeout: 5000 });
67
- available.yamllint = true;
68
- this.logger?.debug('yamllint detected');
69
- } catch (error) {
70
- this.logger?.debug('yamllint not available', { error: error.message });
71
- }
72
-
73
- // Check for ajv (JSON Schema validation - npm package)
74
- try {
75
- await import('ajv');
76
- available.jsonSchema = true;
77
- this.logger?.debug('JSON Schema validation available');
78
- } catch (error) {
79
- this.logger?.debug('ajv not available', { error: error.message });
80
- }
81
-
82
- this.availableScanners = available;
83
- return available;
84
- }
85
-
86
- /**
87
- * Validate a configuration file
88
- * @param {string} filePath - Path to config file
89
- * @param {Object} options - Validation options
90
- * @returns {Promise<Array>} Validation issues
91
- */
92
- async validate(filePath, options = {}) {
93
- const issues = [];
94
- const available = await this.detectAvailableValidators();
95
- const fileType = this.detectFileType(filePath);
96
-
97
- this.logger?.debug('Validating config file', { filePath, fileType });
98
-
99
- // Route to appropriate validator based on file type
100
- switch (fileType) {
101
- case 'dockerfile':
102
- if (available.hadolint) {
103
- const hadolintIssues = await this.validateDockerfile(filePath, options);
104
- issues.push(...hadolintIssues);
105
- }
106
- if (available.checkov) {
107
- const checkovIssues = await this.validateWithCheckov(filePath, 'dockerfile', options);
108
- issues.push(...checkovIssues);
109
- }
110
- break;
111
-
112
- case 'docker-compose':
113
- if (available.yamllint) {
114
- const yamlIssues = await this.validateYAML(filePath, options);
115
- issues.push(...yamlIssues);
116
- }
117
- if (available.checkov) {
118
- const checkovIssues = await this.validateWithCheckov(filePath, 'docker_compose', options);
119
- issues.push(...checkovIssues);
120
- }
121
- break;
122
-
123
- case 'kubernetes':
124
- if (available.yamllint) {
125
- const yamlIssues = await this.validateYAML(filePath, options);
126
- issues.push(...yamlIssues);
127
- }
128
- if (available.checkov) {
129
- const checkovIssues = await this.validateWithCheckov(filePath, 'kubernetes', options);
130
- issues.push(...checkovIssues);
131
- }
132
- break;
133
-
134
- case 'terraform':
135
- if (available.checkov) {
136
- const checkovIssues = await this.validateWithCheckov(filePath, 'terraform', options);
137
- issues.push(...checkovIssues);
138
- }
139
- break;
140
-
141
- case 'package.json':
142
- if (available.jsonSchema) {
143
- const schemaIssues = await this.validatePackageJson(filePath, options);
144
- issues.push(...schemaIssues);
145
- }
146
- break;
147
-
148
- case 'tsconfig.json':
149
- if (available.jsonSchema) {
150
- const schemaIssues = await this.validateTsConfig(filePath, options);
151
- issues.push(...schemaIssues);
152
- }
153
- break;
154
-
155
- case 'github-actions':
156
- if (available.yamllint) {
157
- const yamlIssues = await this.validateYAML(filePath, options);
158
- issues.push(...yamlIssues);
159
- }
160
- break;
161
-
162
- case 'env':
163
- // Always check .env files for secrets (no external tool needed)
164
- const secretIssues = await this.validateEnvFile(filePath, options);
165
- issues.push(...secretIssues);
166
- break;
167
-
168
- case 'yaml':
169
- if (available.yamllint) {
170
- const yamlIssues = await this.validateYAML(filePath, options);
171
- issues.push(...yamlIssues);
172
- }
173
- break;
174
-
175
- default:
176
- this.logger?.warn('Unknown config file type', { filePath, fileType });
177
- return [];
178
- }
179
-
180
- return this.normalizeResults(issues);
181
- }
182
-
183
- /**
184
- * Validate Dockerfile using hadolint
185
- * @private
186
- */
187
- async validateDockerfile(filePath, options = {}) {
188
- try {
189
- const result = await execAsync(
190
- `hadolint --format json "${filePath}"`,
191
- {
192
- maxBuffer: 10 * 1024 * 1024,
193
- timeout: 30000
194
- }
195
- );
196
-
197
- const output = JSON.parse(result.stdout);
198
- return this.parseHadolintResults(output, filePath);
199
- } catch (error) {
200
- // hadolint exits with non-zero if issues found
201
- if (error.stdout) {
202
- try {
203
- const output = JSON.parse(error.stdout);
204
- return this.parseHadolintResults(output, filePath);
205
- } catch (parseError) {
206
- this.logger?.error('Failed to parse hadolint output', {
207
- error: parseError.message
208
- });
209
- }
210
- }
211
- this.logger?.error('hadolint validation failed', { error: error.message });
212
- return [];
213
- }
214
- }
215
-
216
- /**
217
- * Parse hadolint results
218
- * @private
219
- */
220
- parseHadolintResults(output, filePath) {
221
- const issues = [];
222
-
223
- if (Array.isArray(output)) {
224
- for (const issue of output) {
225
- issues.push({
226
- file: filePath,
227
- line: issue.line || 1,
228
- column: issue.column || 1,
229
- severity: this.mapHadolintSeverity(issue.level),
230
- rule: issue.code,
231
- message: issue.message,
232
- category: 'dockerfile',
233
- validator: 'hadolint'
234
- });
235
- }
236
- }
237
-
238
- return issues;
239
- }
240
-
241
- /**
242
- * Validate YAML files using yamllint
243
- * @private
244
- */
245
- async validateYAML(filePath, options = {}) {
246
- try {
247
- const result = await execAsync(
248
- `yamllint -f parsable "${filePath}"`,
249
- {
250
- maxBuffer: 10 * 1024 * 1024,
251
- timeout: 30000
252
- }
253
- );
254
-
255
- return this.parseYamllintResults(result.stdout, filePath);
256
- } catch (error) {
257
- // yamllint exits with non-zero if issues found
258
- if (error.stdout) {
259
- return this.parseYamllintResults(error.stdout, filePath);
260
- }
261
- this.logger?.error('yamllint validation failed', { error: error.message });
262
- return [];
263
- }
264
- }
265
-
266
- /**
267
- * Parse yamllint results
268
- * @private
269
- */
270
- parseYamllintResults(output, filePath) {
271
- const issues = [];
272
- const lines = output.split('\n').filter(line => line.trim());
273
-
274
- for (const line of lines) {
275
- // Format: file:line:column: [level] message (rule)
276
- const match = line.match(/^(.+?):(\d+):(\d+):\s*\[(\w+)\]\s*(.+?)\s*\((.+?)\)/);
277
- if (match) {
278
- const [, file, lineNum, col, level, message, rule] = match;
279
- issues.push({
280
- file: filePath,
281
- line: parseInt(lineNum, 10),
282
- column: parseInt(col, 10),
283
- severity: this.mapYamllintSeverity(level),
284
- rule: rule,
285
- message: message,
286
- category: 'yaml',
287
- validator: 'yamllint'
288
- });
289
- }
290
- }
291
-
292
- return issues;
293
- }
294
-
295
- /**
296
- * Validate with checkov (Infrastructure as Code)
297
- * @private
298
- */
299
- async validateWithCheckov(filePath, framework, options = {}) {
300
- try {
301
- const result = await execAsync(
302
- `checkov -f "${filePath}" --framework ${framework} --output json --compact`,
303
- {
304
- maxBuffer: 10 * 1024 * 1024,
305
- timeout: 60000
306
- }
307
- );
308
-
309
- const output = JSON.parse(result.stdout);
310
- return this.parseCheckovResults(output, filePath);
311
- } catch (error) {
312
- // checkov exits with non-zero if issues found
313
- if (error.stdout) {
314
- try {
315
- const output = JSON.parse(error.stdout);
316
- return this.parseCheckovResults(output, filePath);
317
- } catch (parseError) {
318
- this.logger?.error('Failed to parse checkov output', {
319
- error: parseError.message
320
- });
321
- }
322
- }
323
- this.logger?.error('checkov validation failed', { error: error.message });
324
- return [];
325
- }
326
- }
327
-
328
- /**
329
- * Parse checkov results
330
- * @private
331
- */
332
- parseCheckovResults(output, filePath) {
333
- const issues = [];
334
-
335
- if (output.results && output.results.failed_checks) {
336
- for (const check of output.results.failed_checks) {
337
- issues.push({
338
- file: filePath,
339
- line: check.file_line_range ? check.file_line_range[0] : 1,
340
- column: 1,
341
- severity: this.mapCheckovSeverity(check.check_class),
342
- rule: check.check_id,
343
- message: check.check_name || check.check_id,
344
- category: 'security',
345
- validator: 'checkov',
346
- remediation: check.guideline,
347
- cwe: check.cwe,
348
- references: check.guideline ? [check.guideline] : []
349
- });
350
- }
351
- }
352
-
353
- return issues;
354
- }
355
-
356
- /**
357
- * Validate package.json using JSON Schema
358
- * @private
359
- */
360
- async validatePackageJson(filePath, options = {}) {
361
- try {
362
- const Ajv = (await import('ajv')).default;
363
- const addFormats = (await import('ajv-formats')).default;
364
-
365
- const content = await fs.readFile(filePath, 'utf-8');
366
- const packageJson = JSON.parse(content);
367
-
368
- const ajv = new Ajv({ allErrors: true, strict: false });
369
- addFormats(ajv);
370
-
371
- // Basic package.json schema (simplified)
372
- const schema = {
373
- type: 'object',
374
- required: ['name', 'version'],
375
- properties: {
376
- name: { type: 'string', pattern: '^(?:@[a-z0-9-~][a-z0-9-._~]*/)?[a-z0-9-~][a-z0-9-._~]*$' },
377
- version: { type: 'string' },
378
- description: { type: 'string' },
379
- main: { type: 'string' },
380
- type: { type: 'string', enum: ['module', 'commonjs'] },
381
- scripts: { type: 'object' },
382
- dependencies: { type: 'object' },
383
- devDependencies: { type: 'object' }
384
- },
385
- additionalProperties: true
386
- };
387
-
388
- const validate = ajv.compile(schema);
389
- const valid = validate(packageJson);
390
-
391
- if (!valid && validate.errors) {
392
- return validate.errors.map(error => ({
393
- file: filePath,
394
- line: 1,
395
- column: 1,
396
- severity: STATIC_ANALYSIS.SEVERITY.ERROR,
397
- rule: 'json-schema',
398
- message: error.instancePath ? `${error.instancePath} ${error.message}` : `must have required property '${error.params.missingProperty}'`,
399
- category: 'validation',
400
- validator: 'json-schema'
401
- }));
402
- }
403
-
404
- return [];
405
- } catch (error) {
406
- this.logger?.error('package.json validation failed', { error: error.message });
407
- return [{
408
- file: filePath,
409
- line: 1,
410
- column: 1,
411
- severity: STATIC_ANALYSIS.SEVERITY.ERROR,
412
- rule: 'json-parse',
413
- message: `Invalid JSON: ${error.message}`,
414
- category: 'syntax',
415
- validator: 'json-parse'
416
- }];
417
- }
418
- }
419
-
420
- /**
421
- * Validate tsconfig.json using JSON Schema
422
- * @private
423
- */
424
- async validateTsConfig(filePath, options = {}) {
425
- try {
426
- const content = await fs.readFile(filePath, 'utf-8');
427
- const tsconfig = JSON.parse(content);
428
-
429
- const issues = [];
430
-
431
- // Check for common misconfigurations
432
- if (tsconfig.compilerOptions) {
433
- const opts = tsconfig.compilerOptions;
434
-
435
- // Check for strict mode
436
- if (!opts.strict) {
437
- issues.push({
438
- file: filePath,
439
- line: 1,
440
- column: 1,
441
- severity: STATIC_ANALYSIS.SEVERITY.WARNING,
442
- rule: 'strict-mode',
443
- message: 'Consider enabling "strict" mode for better type safety',
444
- category: 'best-practice',
445
- validator: 'tsconfig-validator'
446
- });
447
- }
448
-
449
- // Check for noImplicitAny
450
- if (opts.noImplicitAny === false) {
451
- issues.push({
452
- file: filePath,
453
- line: 1,
454
- column: 1,
455
- severity: STATIC_ANALYSIS.SEVERITY.WARNING,
456
- rule: 'no-implicit-any',
457
- message: 'Disabling noImplicitAny reduces type safety',
458
- category: 'best-practice',
459
- validator: 'tsconfig-validator'
460
- });
461
- }
462
- }
463
-
464
- return issues;
465
- } catch (error) {
466
- this.logger?.error('tsconfig.json validation failed', { error: error.message });
467
- return [{
468
- file: filePath,
469
- line: 1,
470
- column: 1,
471
- severity: STATIC_ANALYSIS.SEVERITY.ERROR,
472
- rule: 'json-parse',
473
- message: `Invalid JSON: ${error.message}`,
474
- category: 'syntax',
475
- validator: 'json-parse'
476
- }];
477
- }
478
- }
479
-
480
- /**
481
- * Validate .env file for security issues
482
- * @private
483
- */
484
- async validateEnvFile(filePath, options = {}) {
485
- try {
486
- const content = await fs.readFile(filePath, 'utf-8');
487
- const issues = [];
488
- const lines = content.split('\n');
489
-
490
- const secretPatterns = [
491
- { pattern: /password|passwd|pwd/i, name: 'password' },
492
- { pattern: /api[_-]?key/i, name: 'API key' },
493
- { pattern: /secret/i, name: 'secret' },
494
- { pattern: /token/i, name: 'token' },
495
- { pattern: /private[_-]?key/i, name: 'private key' },
496
- { pattern: /aws[_-]?access/i, name: 'AWS credentials' }
497
- ];
498
-
499
- lines.forEach((line, index) => {
500
- const trimmed = line.trim();
501
-
502
- // Skip comments and empty lines
503
- if (!trimmed || trimmed.startsWith('#')) return;
504
-
505
- // Check for hardcoded values (not references to other env vars)
506
- if (trimmed.includes('=')) {
507
- const [key, value] = trimmed.split('=');
508
- const keyLower = key.toLowerCase();
509
- const valueTrimmed = value?.trim() || '';
510
-
511
- // Check if value looks like a real secret (not empty, not a placeholder)
512
- const looksLikeSecret = valueTrimmed &&
513
- valueTrimmed !== '' &&
514
- !valueTrimmed.startsWith('$') && // Not env var reference
515
- valueTrimmed !== 'your-key-here' &&
516
- valueTrimmed !== 'changeme' &&
517
- valueTrimmed.length > 5;
518
-
519
- if (looksLikeSecret) {
520
- for (const { pattern, name } of secretPatterns) {
521
- if (pattern.test(keyLower)) {
522
- issues.push({
523
- file: filePath,
524
- line: index + 1,
525
- column: 1,
526
- severity: STATIC_ANALYSIS.SEVERITY.CRITICAL,
527
- rule: 'hardcoded-secret',
528
- message: `Potential hardcoded ${name} detected in .env file`,
529
- category: 'security',
530
- validator: 'env-validator',
531
- remediation: 'Use environment-specific .env files and add .env to .gitignore'
532
- });
533
- break;
534
- }
535
- }
536
- }
537
- }
538
- });
539
-
540
- return issues;
541
- } catch (error) {
542
- this.logger?.error('.env validation failed', { error: error.message });
543
- return [];
544
- }
545
- }
546
-
547
- /**
548
- * Detect configuration file type
549
- * @private
550
- */
551
- detectFileType(filePath) {
552
- const basename = path.basename(filePath).toLowerCase();
553
- const dirname = path.dirname(filePath);
554
-
555
- // Exact filename matches
556
- if (basename === 'dockerfile') return 'dockerfile';
557
- if (basename === 'docker-compose.yml' || basename === 'docker-compose.yaml') return 'docker-compose';
558
- if (basename === 'package.json') return 'package.json';
559
- if (basename === 'tsconfig.json') return 'tsconfig.json';
560
- if (basename === '.env' || basename.endsWith('.env')) return 'env';
561
-
562
- // Path-based detection
563
- if (dirname.includes('.github/workflows')) return 'github-actions';
564
- if (dirname.includes('kubernetes') || dirname.includes('k8s')) return 'kubernetes';
565
-
566
- // Extension-based detection
567
- const ext = path.extname(filePath).toLowerCase();
568
- if (ext === '.tf' || ext === '.tfvars') return 'terraform';
569
- if (ext === '.yml' || ext === '.yaml') return 'yaml';
570
- if (ext === '.json') return 'json';
571
-
572
- return 'unknown';
573
- }
574
-
575
- /**
576
- * Normalize all validator results to common format
577
- * @private
578
- */
579
- normalizeResults(results) {
580
- return results.map(result => ({
581
- file: result.file,
582
- line: result.line || 1,
583
- column: result.column || 1,
584
- severity: result.severity || STATIC_ANALYSIS.SEVERITY.WARNING,
585
- rule: result.rule || 'unknown',
586
- message: result.message || 'Validation issue detected',
587
- category: result.category || 'validation',
588
- validator: result.validator,
589
- cwe: result.cwe || null,
590
- remediation: result.remediation || null,
591
- references: result.references || []
592
- }));
593
- }
594
-
595
- /**
596
- * Map hadolint severity to our standard
597
- * @private
598
- */
599
- mapHadolintSeverity(level) {
600
- const map = {
601
- 'error': STATIC_ANALYSIS.SEVERITY.ERROR,
602
- 'warning': STATIC_ANALYSIS.SEVERITY.WARNING,
603
- 'info': STATIC_ANALYSIS.SEVERITY.INFO,
604
- 'style': STATIC_ANALYSIS.SEVERITY.INFO
605
- };
606
- return map[level?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
607
- }
608
-
609
- /**
610
- * Map yamllint severity to our standard
611
- * @private
612
- */
613
- mapYamllintSeverity(level) {
614
- const map = {
615
- 'error': STATIC_ANALYSIS.SEVERITY.ERROR,
616
- 'warning': STATIC_ANALYSIS.SEVERITY.WARNING
617
- };
618
- return map[level?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
619
- }
620
-
621
- /**
622
- * Map checkov severity to our standard
623
- * @private
624
- */
625
- mapCheckovSeverity(checkClass) {
626
- // checkov uses check_class to categorize severity
627
- // Most security issues are treated as errors
628
- return STATIC_ANALYSIS.SEVERITY.ERROR;
629
- }
630
-
631
- /**
632
- * Get validator status report
633
- * @returns {Promise<Object>} Validator availability and status
634
- */
635
- async getValidatorStatus() {
636
- const available = await this.detectAvailableValidators();
637
- return {
638
- validators: available,
639
- recommendations: this.getInstallRecommendations(available)
640
- };
641
- }
642
-
643
- /**
644
- * Get installation recommendations for missing validators
645
- * @private
646
- */
647
- getInstallRecommendations(available) {
648
- const recommendations = [];
649
-
650
- if (!available.checkov) {
651
- recommendations.push({
652
- validator: 'checkov',
653
- reason: 'Infrastructure as Code security scanning (Docker, Kubernetes, Terraform)',
654
- install: 'pip install checkov',
655
- priority: 'high'
656
- });
657
- }
658
-
659
- if (!available.hadolint) {
660
- recommendations.push({
661
- validator: 'hadolint',
662
- reason: 'Dockerfile linting and best practices',
663
- install: 'Download from https://github.com/hadolint/hadolint/releases',
664
- priority: 'high'
665
- });
666
- }
667
-
668
- if (!available.yamllint) {
669
- recommendations.push({
670
- validator: 'yamllint',
671
- reason: 'YAML file validation',
672
- install: 'pip install yamllint',
673
- priority: 'medium'
674
- });
675
- }
676
-
677
- if (!available.jsonSchema) {
678
- recommendations.push({
679
- validator: 'ajv (JSON Schema)',
680
- reason: 'JSON configuration validation',
681
- install: 'npm install ajv ajv-formats',
682
- priority: 'medium'
683
- });
684
- }
685
-
686
- return recommendations;
687
- }
688
- }
689
-
690
- export default ConfigValidator;
1
+ const a0_0x586458=a0_0x5e58;(function(_0x35c3cd,_0x3c549e){const _0x3644b3=a0_0x5e58,_0x151018=_0x35c3cd();while(!![]){try{const _0x56dc0a=-parseInt(_0x3644b3(0x104))/0x1+parseInt(_0x3644b3(0x11f))/0x2+parseInt(_0x3644b3(0xcc))/0x3+parseInt(_0x3644b3(0xb3))/0x4*(parseInt(_0x3644b3(0xc0))/0x5)+parseInt(_0x3644b3(0x123))/0x6+parseInt(_0x3644b3(0xef))/0x7+-parseInt(_0x3644b3(0xd5))/0x8*(parseInt(_0x3644b3(0xc9))/0x9);if(_0x56dc0a===_0x3c549e)break;else _0x151018['push'](_0x151018['shift']());}catch(_0x45cef7){_0x151018['push'](_0x151018['shift']());}}}(a0_0x3982,0x99c19));function a0_0x5e58(_0x3353b0,_0x35e7fd){_0x3353b0=_0x3353b0-0xb1;const _0x39823a=a0_0x3982();let _0x5e584e=_0x39823a[_0x3353b0];if(a0_0x5e58['Vrotfd']===undefined){var _0x2b98d4=function(_0x4cb4f9){const _0x39b724='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+/=';let _0x278bd0='',_0x2551d8='';for(let _0x45eaa1=0x0,_0x276455,_0x31c172,_0x3094d2=0x0;_0x31c172=_0x4cb4f9['charAt'](_0x3094d2++);~_0x31c172&&(_0x276455=_0x45eaa1%0x4?_0x276455*0x40+_0x31c172:_0x31c172,_0x45eaa1++%0x4)?_0x278bd0+=String['fromCharCode'](0xff&_0x276455>>(-0x2*_0x45eaa1&0x6)):0x0){_0x31c172=_0x39b724['indexOf'](_0x31c172);}for(let _0x1b895f=0x0,_0x46bed4=_0x278bd0['length'];_0x1b895f<_0x46bed4;_0x1b895f++){_0x2551d8+='%'+('00'+_0x278bd0['charCodeAt'](_0x1b895f)['toString'](0x10))['slice'](-0x2);}return decodeURIComponent(_0x2551d8);};a0_0x5e58['kZNAMi']=_0x2b98d4,a0_0x5e58['pyFUaE']={},a0_0x5e58['Vrotfd']=!![];}const _0x2e447a=_0x39823a[0x0],_0xacbb97=_0x3353b0+_0x2e447a,_0x1d7a82=a0_0x5e58['pyFUaE'][_0xacbb97];return!_0x1d7a82?(_0x5e584e=a0_0x5e58['kZNAMi'](_0x5e584e),a0_0x5e58['pyFUaE'][_0xacbb97]=_0x5e584e):_0x5e584e=_0x1d7a82,_0x5e584e;}import{exec}from'child_process';import{promisify}from'util';import a0_0x278bd0 from'path';import a0_0x2551d8 from'fs/promises';import{STATIC_ANALYSIS}from'../utilities/constants.js';const execAsync=promisify(exec);class ConfigValidator{constructor(_0x45eaa1=null){const _0x3ff73a=a0_0x5e58;this[_0x3ff73a(0x114)]=_0x45eaa1,this['availableScanners']=null,this[_0x3ff73a(0xc3)]=new Map();}async['detectAvailableValidators'](){const _0x2cbeb2=a0_0x5e58;if(this[_0x2cbeb2(0xee)]!==null)return this['availableScanners'];const _0x276455={'checkov':![],'hadolint':![],'yamllint':![],'jsonSchema':![]};try{await execAsync(_0x2cbeb2(0xdd),{'timeout':0x1388}),_0x276455[_0x2cbeb2(0xe4)]=!![],this['logger']?.[_0x2cbeb2(0xb7)]('checkov\x20detected');}catch(_0x31c172){this['logger']?.[_0x2cbeb2(0xb7)]('checkov\x20not\x20available',{'error':_0x31c172[_0x2cbeb2(0xf8)]});}try{await execAsync(_0x2cbeb2(0xc2),{'timeout':0x1388}),_0x276455[_0x2cbeb2(0xc8)]=!![],this['logger']?.['debug'](_0x2cbeb2(0xe9));}catch(_0x3094d2){this[_0x2cbeb2(0x114)]?.[_0x2cbeb2(0xb7)]('hadolint\x20not\x20available',{'error':_0x3094d2[_0x2cbeb2(0xf8)]});}try{await execAsync(_0x2cbeb2(0xe1),{'timeout':0x1388}),_0x276455['yamllint']=!![],this[_0x2cbeb2(0x114)]?.['debug'](_0x2cbeb2(0x110));}catch(_0x1b895f){this['logger']?.[_0x2cbeb2(0xb7)]('yamllint\x20not\x20available',{'error':_0x1b895f['message']});}try{await import(_0x2cbeb2(0xd6)),_0x276455[_0x2cbeb2(0xbe)]=!![],this['logger']?.['debug']('JSON\x20Schema\x20validation\x20available');}catch(_0x46bed4){this[_0x2cbeb2(0x114)]?.['debug']('ajv\x20not\x20available',{'error':_0x46bed4['message']});}return this['availableScanners']=_0x276455,_0x276455;}async['validate'](_0x2c8ffe,_0x581320={}){const _0x4dd8ea=a0_0x5e58,_0x26a8a7=[],_0x5ebced=await this['detectAvailableValidators'](),_0x53fb3e=this[_0x4dd8ea(0x10d)](_0x2c8ffe);this['logger']?.[_0x4dd8ea(0xb7)](_0x4dd8ea(0xd3),{'filePath':_0x2c8ffe,'fileType':_0x53fb3e});switch(_0x53fb3e){case'dockerfile':if(_0x5ebced[_0x4dd8ea(0xc8)]){const _0x2c6591=await this['validateDockerfile'](_0x2c8ffe,_0x581320);_0x26a8a7[_0x4dd8ea(0x117)](..._0x2c6591);}if(_0x5ebced['checkov']){const _0x192d3c=await this['validateWithCheckov'](_0x2c8ffe,_0x4dd8ea(0x116),_0x581320);_0x26a8a7[_0x4dd8ea(0x117)](..._0x192d3c);}break;case _0x4dd8ea(0xfb):if(_0x5ebced[_0x4dd8ea(0xb9)]){const _0x3bb9a1=await this['validateYAML'](_0x2c8ffe,_0x581320);_0x26a8a7[_0x4dd8ea(0x117)](..._0x3bb9a1);}if(_0x5ebced['checkov']){const _0x2881de=await this[_0x4dd8ea(0x11c)](_0x2c8ffe,_0x4dd8ea(0xec),_0x581320);_0x26a8a7['push'](..._0x2881de);}break;case _0x4dd8ea(0xda):if(_0x5ebced['yamllint']){const _0x2b1f14=await this[_0x4dd8ea(0xbc)](_0x2c8ffe,_0x581320);_0x26a8a7[_0x4dd8ea(0x117)](..._0x2b1f14);}if(_0x5ebced[_0x4dd8ea(0xe4)]){const _0x131049=await this['validateWithCheckov'](_0x2c8ffe,_0x4dd8ea(0xda),_0x581320);_0x26a8a7['push'](..._0x131049);}break;case'terraform':if(_0x5ebced[_0x4dd8ea(0xe4)]){const _0x466df5=await this['validateWithCheckov'](_0x2c8ffe,_0x4dd8ea(0xe5),_0x581320);_0x26a8a7[_0x4dd8ea(0x117)](..._0x466df5);}break;case'package.json':if(_0x5ebced[_0x4dd8ea(0xbe)]){const _0x4183a8=await this['validatePackageJson'](_0x2c8ffe,_0x581320);_0x26a8a7['push'](..._0x4183a8);}break;case'tsconfig.json':if(_0x5ebced[_0x4dd8ea(0xbe)]){const _0x119ddb=await this[_0x4dd8ea(0xde)](_0x2c8ffe,_0x581320);_0x26a8a7[_0x4dd8ea(0x117)](..._0x119ddb);}break;case'github-actions':if(_0x5ebced[_0x4dd8ea(0xb9)]){const _0x211789=await this[_0x4dd8ea(0xbc)](_0x2c8ffe,_0x581320);_0x26a8a7[_0x4dd8ea(0x117)](..._0x211789);}break;case'env':const _0x2c9863=await this['validateEnvFile'](_0x2c8ffe,_0x581320);_0x26a8a7[_0x4dd8ea(0x117)](..._0x2c9863);break;case'yaml':if(_0x5ebced[_0x4dd8ea(0xb9)]){const _0x54d14b=await this[_0x4dd8ea(0xbc)](_0x2c8ffe,_0x581320);_0x26a8a7['push'](..._0x54d14b);}break;default:this['logger']?.[_0x4dd8ea(0xf9)]('Unknown\x20config\x20file\x20type',{'filePath':_0x2c8ffe,'fileType':_0x53fb3e});return[];}return this['normalizeResults'](_0x26a8a7);}async['validateDockerfile'](_0x1a5460,_0x3821bd={}){const _0x98e1fd=a0_0x5e58;try{const _0x441077=await execAsync(_0x98e1fd(0x101)+_0x1a5460+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530}),_0x387040=JSON[_0x98e1fd(0xf7)](_0x441077['stdout']);return this[_0x98e1fd(0xf1)](_0x387040,_0x1a5460);}catch(_0x384876){if(_0x384876['stdout'])try{const _0xdce353=JSON[_0x98e1fd(0xf7)](_0x384876['stdout']);return this[_0x98e1fd(0xf1)](_0xdce353,_0x1a5460);}catch(_0x364250){this['logger']?.[_0x98e1fd(0xbf)](_0x98e1fd(0xb8),{'error':_0x364250[_0x98e1fd(0xf8)]});}return this['logger']?.['error'](_0x98e1fd(0xf3),{'error':_0x384876[_0x98e1fd(0xf8)]}),[];}}['parseHadolintResults'](_0x1f32ce,_0x5440b3){const _0x338d94=a0_0x5e58,_0x526d6c=[];if(Array[_0x338d94(0xc1)](_0x1f32ce))for(const _0x51fe12 of _0x1f32ce){_0x526d6c[_0x338d94(0x117)]({'file':_0x5440b3,'line':_0x51fe12[_0x338d94(0xcd)]||0x1,'column':_0x51fe12[_0x338d94(0xdf)]||0x1,'severity':this['mapHadolintSeverity'](_0x51fe12[_0x338d94(0x121)]),'rule':_0x51fe12[_0x338d94(0xc6)],'message':_0x51fe12['message'],'category':'dockerfile','validator':_0x338d94(0xc8)});}return _0x526d6c;}async['validateYAML'](_0x4f6073,_0x2ac88c={}){const _0x1a36f6=a0_0x5e58;try{const _0x49b3b1=await execAsync(_0x1a36f6(0xbd)+_0x4f6073+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530});return this[_0x1a36f6(0xf6)](_0x49b3b1['stdout'],_0x4f6073);}catch(_0x5c5e5b){if(_0x5c5e5b['stdout'])return this['parseYamllintResults'](_0x5c5e5b['stdout'],_0x4f6073);return this[_0x1a36f6(0x114)]?.['error']('yamllint\x20validation\x20failed',{'error':_0x5c5e5b['message']}),[];}}[a0_0x586458(0xf6)](_0x2dd4cd,_0x320049){const _0x5bb419=a0_0x586458,_0x1e8965=[],_0x17fcb4=_0x2dd4cd['split']('\x0a')['filter'](_0x86ef3e=>_0x86ef3e[_0x5bb419(0xf2)]());for(const _0x31e3b3 of _0x17fcb4){const _0x5744c8=_0x31e3b3[_0x5bb419(0xb1)](/^(.+?):(\d+):(\d+):\s*\[(\w+)\]\s*(.+?)\s*\((.+?)\)/);if(_0x5744c8){const [,_0x414391,_0x4f6f61,_0x2c4600,_0x3e2b7f,_0x32f189,_0x22c6bb]=_0x5744c8;_0x1e8965['push']({'file':_0x320049,'line':parseInt(_0x4f6f61,0xa),'column':parseInt(_0x2c4600,0xa),'severity':this['mapYamllintSeverity'](_0x3e2b7f),'rule':_0x22c6bb,'message':_0x32f189,'category':_0x5bb419(0xd2),'validator':'yamllint'});}}return _0x1e8965;}async['validateWithCheckov'](_0x3ae2de,_0x51f4b7,_0x25229e={}){const _0x279510=a0_0x586458;try{const _0x2d4455=await execAsync(_0x279510(0x11a)+_0x3ae2de+'\x22\x20--framework\x20'+_0x51f4b7+_0x279510(0xe2),{'maxBuffer':0xa*0x400*0x400,'timeout':0xea60}),_0x41125b=JSON['parse'](_0x2d4455[_0x279510(0xeb)]);return this[_0x279510(0x120)](_0x41125b,_0x3ae2de);}catch(_0x557347){if(_0x557347['stdout'])try{const _0x54b49b=JSON['parse'](_0x557347['stdout']);return this[_0x279510(0x120)](_0x54b49b,_0x3ae2de);}catch(_0x1dca15){this['logger']?.[_0x279510(0xbf)]('Failed\x20to\x20parse\x20checkov\x20output',{'error':_0x1dca15['message']});}return this[_0x279510(0x114)]?.['error']('checkov\x20validation\x20failed',{'error':_0x557347[_0x279510(0xf8)]}),[];}}['parseCheckovResults'](_0x23afb8,_0x154a11){const _0x5d3893=a0_0x586458,_0x15f5b2=[];if(_0x23afb8[_0x5d3893(0xfe)]&&_0x23afb8['results'][_0x5d3893(0xb4)])for(const _0x2552d4 of _0x23afb8['results']['failed_checks']){_0x15f5b2[_0x5d3893(0x117)]({'file':_0x154a11,'line':_0x2552d4[_0x5d3893(0xd4)]?_0x2552d4['file_line_range'][0x0]:0x1,'column':0x1,'severity':this['mapCheckovSeverity'](_0x2552d4[_0x5d3893(0x11e)]),'rule':_0x2552d4[_0x5d3893(0x124)],'message':_0x2552d4['check_name']||_0x2552d4[_0x5d3893(0x124)],'category':'security','validator':_0x5d3893(0xe4),'remediation':_0x2552d4['guideline'],'cwe':_0x2552d4['cwe'],'references':_0x2552d4[_0x5d3893(0xb5)]?[_0x2552d4['guideline']]:[]});}return _0x15f5b2;}async[a0_0x586458(0x106)](_0x59a5de,_0x2205f6={}){const _0x599357=a0_0x586458;try{const _0x3e7ef6=(await import('ajv'))[_0x599357(0xfc)],_0x352c42=(await import(_0x599357(0xdb)))[_0x599357(0xfc)],_0x3366da=await a0_0x2551d8['readFile'](_0x59a5de,'utf-8'),_0x5ca12d=JSON[_0x599357(0xf7)](_0x3366da),_0x7c7171=new _0x3e7ef6({'allErrors':!![],'strict':![]});_0x352c42(_0x7c7171);const _0x1e4e57={'type':'object','required':['name','version'],'properties':{'name':{'type':_0x599357(0x11b),'pattern':'^(?:@[a-z0-9-~][a-z0-9-._~]*/)?[a-z0-9-~][a-z0-9-._~]*$'},'version':{'type':'string'},'description':{'type':_0x599357(0x11b)},'main':{'type':'string'},'type':{'type':_0x599357(0x11b),'enum':['module','commonjs']},'scripts':{'type':'object'},'dependencies':{'type':_0x599357(0x112)},'devDependencies':{'type':'object'}},'additionalProperties':!![]},_0x250206=_0x7c7171[_0x599357(0x107)](_0x1e4e57),_0x47e0ae=_0x250206(_0x5ca12d);if(!_0x47e0ae&&_0x250206['errors'])return _0x250206['errors']['map'](_0x7d432a=>({'file':_0x59a5de,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS[_0x599357(0x109)][_0x599357(0xc5)],'rule':_0x599357(0x118),'message':_0x7d432a['instancePath']?_0x7d432a[_0x599357(0xd7)]+'\x20'+_0x7d432a['message']:_0x599357(0xb6)+_0x7d432a[_0x599357(0x108)][_0x599357(0x10b)]+'\x27','category':'validation','validator':'json-schema'}));return[];}catch(_0x1d6da4){return this['logger']?.['error']('package.json\x20validation\x20failed',{'error':_0x1d6da4[_0x599357(0xf8)]}),[{'file':_0x59a5de,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS['SEVERITY'][_0x599357(0xc5)],'rule':_0x599357(0xbb),'message':'Invalid\x20JSON:\x20'+_0x1d6da4[_0x599357(0xf8)],'category':'syntax','validator':_0x599357(0xbb)}];}}async[a0_0x586458(0xde)](_0xb4ec7b,_0xd9e96a={}){const _0x374b7b=a0_0x586458;try{const _0x17d492=await a0_0x2551d8['readFile'](_0xb4ec7b,_0x374b7b(0xea)),_0x5df003=JSON['parse'](_0x17d492),_0x938cdb=[];if(_0x5df003[_0x374b7b(0xcb)]){const _0x28664e=_0x5df003[_0x374b7b(0xcb)];!_0x28664e['strict']&&_0x938cdb[_0x374b7b(0x117)]({'file':_0xb4ec7b,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS[_0x374b7b(0x109)]['WARNING'],'rule':'strict-mode','message':'Consider\x20enabling\x20\x22strict\x22\x20mode\x20for\x20better\x20type\x20safety','category':'best-practice','validator':'tsconfig-validator'}),_0x28664e['noImplicitAny']===![]&&_0x938cdb[_0x374b7b(0x117)]({'file':_0xb4ec7b,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS[_0x374b7b(0x109)]['WARNING'],'rule':_0x374b7b(0xd9),'message':'Disabling\x20noImplicitAny\x20reduces\x20type\x20safety','category':'best-practice','validator':'tsconfig-validator'});}return _0x938cdb;}catch(_0x107f2d){return this[_0x374b7b(0x114)]?.['error']('tsconfig.json\x20validation\x20failed',{'error':_0x107f2d['message']}),[{'file':_0xb4ec7b,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS['SEVERITY'][_0x374b7b(0xc5)],'rule':'json-parse','message':'Invalid\x20JSON:\x20'+_0x107f2d['message'],'category':_0x374b7b(0xb2),'validator':'json-parse'}];}}async['validateEnvFile'](_0x44e354,_0x1adef2={}){const _0x20e14f=a0_0x586458;try{const _0x2ba652=await a0_0x2551d8[_0x20e14f(0xba)](_0x44e354,_0x20e14f(0xea)),_0x4c5eca=[],_0x16b553=_0x2ba652[_0x20e14f(0x119)]('\x0a'),_0x1ac4cd=[{'pattern':/password|passwd|pwd/i,'name':'password'},{'pattern':/api[_-]?key/i,'name':'API\x20key'},{'pattern':/secret/i,'name':'secret'},{'pattern':/token/i,'name':'token'},{'pattern':/private[_-]?key/i,'name':_0x20e14f(0xd8)},{'pattern':/aws[_-]?access/i,'name':'AWS\x20credentials'}];return _0x16b553[_0x20e14f(0xfa)]((_0x445543,_0x44be88)=>{const _0xe563b=_0x20e14f,_0x12c713=_0x445543[_0xe563b(0xf2)]();if(!_0x12c713||_0x12c713[_0xe563b(0xd0)]('#'))return;if(_0x12c713[_0xe563b(0x113)]('=')){const [_0x529fff,_0x34176]=_0x12c713['split']('='),_0x79c175=_0x529fff['toLowerCase'](),_0x20def7=_0x34176?.[_0xe563b(0xf2)]()||'',_0x2fe992=_0x20def7&&_0x20def7!==''&&!_0x20def7[_0xe563b(0xd0)]('$')&&_0x20def7!=='your-key-here'&&_0x20def7!=='changeme'&&_0x20def7[_0xe563b(0xf0)]>0x5;if(_0x2fe992)for(const {pattern:_0x53fdf6,name:_0x2692c5}of _0x1ac4cd){if(_0x53fdf6['test'](_0x79c175)){_0x4c5eca[_0xe563b(0x117)]({'file':_0x44e354,'line':_0x44be88+0x1,'column':0x1,'severity':STATIC_ANALYSIS[_0xe563b(0x109)][_0xe563b(0xdc)],'rule':_0xe563b(0x10f),'message':_0xe563b(0x105)+_0x2692c5+'\x20detected\x20in\x20.env\x20file','category':_0xe563b(0x10e),'validator':'env-validator','remediation':_0xe563b(0x103)});break;}}}}),_0x4c5eca;}catch(_0x6e73f4){return this['logger']?.[_0x20e14f(0xbf)](_0x20e14f(0xed),{'error':_0x6e73f4['message']}),[];}}['detectFileType'](_0x887416){const _0x22cecb=a0_0x586458,_0x4100fe=a0_0x278bd0[_0x22cecb(0xe0)](_0x887416)['toLowerCase'](),_0x335a8c=a0_0x278bd0[_0x22cecb(0xf5)](_0x887416);if(_0x4100fe==='dockerfile')return'dockerfile';if(_0x4100fe===_0x22cecb(0xce)||_0x4100fe==='docker-compose.yaml')return _0x22cecb(0xfb);if(_0x4100fe==='package.json')return _0x22cecb(0xf4);if(_0x4100fe===_0x22cecb(0x100))return _0x22cecb(0x100);if(_0x4100fe===_0x22cecb(0x122)||_0x4100fe['endsWith'](_0x22cecb(0x122)))return'env';if(_0x335a8c[_0x22cecb(0x113)](_0x22cecb(0x11d)))return'github-actions';if(_0x335a8c[_0x22cecb(0x113)](_0x22cecb(0xda))||_0x335a8c[_0x22cecb(0x113)]('k8s'))return _0x22cecb(0xda);const _0x506dec=a0_0x278bd0['extname'](_0x887416)[_0x22cecb(0x102)]();if(_0x506dec==='.tf'||_0x506dec==='.tfvars')return'terraform';if(_0x506dec===_0x22cecb(0xc4)||_0x506dec===_0x22cecb(0xe8))return'yaml';if(_0x506dec===_0x22cecb(0x125))return'json';return'unknown';}['normalizeResults'](_0x1f9c26){const _0x5a3244=a0_0x586458;return _0x1f9c26[_0x5a3244(0x10a)](_0x3b48d1=>({'file':_0x3b48d1['file'],'line':_0x3b48d1['line']||0x1,'column':_0x3b48d1['column']||0x1,'severity':_0x3b48d1[_0x5a3244(0xfd)]||STATIC_ANALYSIS['SEVERITY'][_0x5a3244(0x111)],'rule':_0x3b48d1['rule']||'unknown','message':_0x3b48d1[_0x5a3244(0xf8)]||'Validation\x20issue\x20detected','category':_0x3b48d1['category']||'validation','validator':_0x3b48d1['validator'],'cwe':_0x3b48d1['cwe']||null,'remediation':_0x3b48d1['remediation']||null,'references':_0x3b48d1[_0x5a3244(0xca)]||[]}));}[a0_0x586458(0xe3)](_0x41d322){const _0x3cd5cd=a0_0x586458,_0x1820f5={'error':STATIC_ANALYSIS['SEVERITY']['ERROR'],'warning':STATIC_ANALYSIS[_0x3cd5cd(0x109)]['WARNING'],'info':STATIC_ANALYSIS[_0x3cd5cd(0x109)]['INFO'],'style':STATIC_ANALYSIS['SEVERITY'][_0x3cd5cd(0xe7)]};return _0x1820f5[_0x41d322?.[_0x3cd5cd(0x102)]()]||STATIC_ANALYSIS['SEVERITY'][_0x3cd5cd(0x111)];}['mapYamllintSeverity'](_0x578cb1){const _0x191604=a0_0x586458,_0x2dee29={'error':STATIC_ANALYSIS[_0x191604(0x109)]['ERROR'],'warning':STATIC_ANALYSIS[_0x191604(0x109)]['WARNING']};return _0x2dee29[_0x578cb1?.[_0x191604(0x102)]()]||STATIC_ANALYSIS[_0x191604(0x109)]['WARNING'];}['mapCheckovSeverity'](_0x4bd7fc){const _0x20ac25=a0_0x586458;return STATIC_ANALYSIS[_0x20ac25(0x109)][_0x20ac25(0xc5)];}async['getValidatorStatus'](){const _0x29111c=a0_0x586458,_0x5bea5d=await this[_0x29111c(0xe6)]();return{'validators':_0x5bea5d,'recommendations':this['getInstallRecommendations'](_0x5bea5d)};}[a0_0x586458(0xcf)](_0x4039fd){const _0x17ca34=a0_0x586458,_0x5b1c4b=[];return!_0x4039fd['checkov']&&_0x5b1c4b['push']({'validator':_0x17ca34(0xe4),'reason':'Infrastructure\x20as\x20Code\x20security\x20scanning\x20(Docker,\x20Kubernetes,\x20Terraform)','install':_0x17ca34(0xff),'priority':'high'}),!_0x4039fd['hadolint']&&_0x5b1c4b['push']({'validator':_0x17ca34(0xc8),'reason':_0x17ca34(0x115),'install':'Download from https://github.com/hadolint/hadolint/releases','priority':'high'}),!_0x4039fd[_0x17ca34(0xb9)]&&_0x5b1c4b['push']({'validator':_0x17ca34(0xb9),'reason':_0x17ca34(0xc7),'install':'pip\x20install\x20yamllint','priority':_0x17ca34(0x10c)}),!_0x4039fd['jsonSchema']&&_0x5b1c4b[_0x17ca34(0x117)]({'validator':'ajv\x20(JSON\x20Schema)','reason':'JSON\x20configuration\x20validation','install':_0x17ca34(0xd1),'priority':_0x17ca34(0x10c)}),_0x5b1c4b;}}export default ConfigValidator;function a0_0x3982(){const _0x4bb5ce=['C2vJDxjPDhK','AgfYzgnVzgvKlxnLy3jLDa','EwfTBgXPBNqGzgv0zwn0zwq','v0fstKLorW','B2jQzwn0','Aw5JBhvKzxm','Bg9Nz2vY','rg9JA2vYzMLSzsbSAw50Aw5NigfUzcbIzxn0ihbYywn0AwnLCW','zg9JA2vYzMLSzq','ChvZAa','ANnVBI1Zy2HLBwe','C3bSAxq','y2HLy2TVDIaTzIaI','C3rYAw5N','DMfSAwrHDgvxAxrOq2HLy2TVDG','lMDPDgH1yI93B3jRzMXVD3m','y2HLy2TFy2XHC3m','mJiWndKYmKrxCLrnua','CgfYC2vdAgvJA292uMvZDwX0CW','Bgv2zwW','lMvUDG','mta3mZy1mNzNDfH1vq','y2HLy2TFAwq','lMPZB24','Bwf0y2G','C3LUDgf4','nejiweLrsa','zMfPBgvKx2nOzwnRCW','z3vPzgvSAw5L','BxvZDcbOyxzLihjLCxvPCMvKihbYB3bLCNr5icC','zgvIDwC','rMfPBgvKihrVihbHCNnLigHHzg9SAw50ig91Dhb1Da','EwfTBgXPBNq','CMvHzezPBgu','ANnVBI1WyxjZzq','DMfSAwrHDgvzqu1m','EwfTBgXPBNqGlwyGCgfYC2fIBguGiG','ANnVBLnJAgvTyq','zxjYB3i','mZq5mJC1uM1zwLzJ','AxnbCNjHEq','AgfKB2XPBNqGls12zxjZAw9U','C2nHBM5LCKnHy2HL','lNLTBa','rvjst1i','y29Kzq','wufntcbMAwXLihzHBgLKyxrPB24','AgfKB2XPBNq','ntuYodDWtxfdD3a','CMvMzxjLBMnLCW','y29TCgLSzxjpChrPB25Z','nJy0nde2qwjeCK9m','BgLUzq','zg9JA2vYlwnVBxbVC2uUEw1S','z2v0sw5ZDgfSBfjLy29TBwvUzgf0Aw9UCW','C3rHCNrZv2L0Aa','BNbTigLUC3rHBgWGywP2igfQDI1MB3jTyxrZ','EwfTBa','vMfSAwrHDgLUzYbJB25MAwCGzMLSzq','zMLSzv9SAw5Lx3jHBMDL','mty2nfn2rurlta','ywP2','Aw5ZDgfUy2vqyxrO','ChjPDMf0zsbRzxK','BM8TAw1WBgLJAxqTyw55','A3vIzxjUzxrLCW','ywP2lwzVCM1HDhm','q1jjveLdquW','y2HLy2TVDIaTlxzLCNnPB24','DMfSAwrHDgvuC0nVBMzPzW','y29SDw1U','yMfZzw5HBwu','EwfTBgXPBNqGls12zxjZAw9U','ic0TB3v0Chv0igPZB24Gls1JB21Wywn0','BwfWsgfKB2XPBNrtzxzLCML0Eq','y2HLy2TVDG','DgvYCMfMB3jT','zgv0zwn0qxzHAwXHyMXLvMfSAwrHDg9YCW','su5gtW','lNLHBwW','AgfKB2XPBNqGzgv0zwn0zwq','DxrMltG','C3rKB3v0','zg9JA2vYx2nVBxbVC2u','lMvUDIb2ywXPzgf0Aw9UigzHAwXLza','yxzHAwXHyMXLu2nHBM5LCNm','ntu3mJm3ohDpvxfusW','BgvUz3rO','CgfYC2viywrVBgLUDfjLC3vSDhm','DhjPBq','AgfKB2XPBNqGDMfSAwrHDgLVBIbMywLSzwq','CgfJA2fNzs5QC29U','zgLYBMfTzq','CgfYC2vzyw1SBgLUDfjLC3vSDhm','CgfYC2u','BwvZC2fNzq','D2fYBG','zM9YrwfJAa','zg9JA2vYlwnVBxbVC2u','zgvMyxvSDa','C2v2zxjPDhK','CMvZDwX0CW','CgLWigLUC3rHBgWGy2HLy2TVDG','DhnJB25MAwCUANnVBG','AgfKB2XPBNqGls1MB3jTyxqGANnVBIaI','Dg9mB3DLCKnHC2u','vxnLigvUDMLYB25Tzw50lxnWzwnPzMLJic5LBNyGzMLSzxmGyw5KigfKzcaUzw52ihrVic5NAxrPz25VCMu','ndyXmJu1BKj3A0vL','ug90zw50AwfSigHHCMrJB2rLzca','DMfSAwrHDgvqywnRywDLsNnVBG','y29TCgLSzq','CgfYyw1Z','u0vwrvjjvfK','BwfW','BwLZC2LUz1bYB3bLCNr5','BwvKAxvT','zgv0zwn0rMLSzvr5Cgu'];a0_0x3982=function(){return _0x4bb5ce;};return a0_0x3982();}