@loxia-labs/loxia-autopilot-one 1.0.1 → 1.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (120) hide show
  1. package/README.md +44 -54
  2. package/bin/cli.js +1 -115
  3. package/bin/loxia-terminal-v2.js +3 -0
  4. package/bin/loxia-terminal.js +3 -0
  5. package/bin/start-with-terminal.js +3 -0
  6. package/package.json +15 -15
  7. package/scripts/install-scanners.js +1 -235
  8. package/src/analyzers/CSSAnalyzer.js +1 -297
  9. package/src/analyzers/ConfigValidator.js +1 -690
  10. package/src/analyzers/ESLintAnalyzer.js +1 -320
  11. package/src/analyzers/JavaScriptAnalyzer.js +1 -261
  12. package/src/analyzers/PrettierFormatter.js +1 -247
  13. package/src/analyzers/PythonAnalyzer.js +1 -266
  14. package/src/analyzers/SecurityAnalyzer.js +1 -729
  15. package/src/analyzers/TypeScriptAnalyzer.js +1 -247
  16. package/src/analyzers/codeCloneDetector/analyzer.js +1 -344
  17. package/src/analyzers/codeCloneDetector/detector.js +1 -203
  18. package/src/analyzers/codeCloneDetector/index.js +1 -160
  19. package/src/analyzers/codeCloneDetector/parser.js +1 -199
  20. package/src/analyzers/codeCloneDetector/reporter.js +1 -148
  21. package/src/analyzers/codeCloneDetector/scanner.js +1 -59
  22. package/src/core/agentPool.js +1 -1474
  23. package/src/core/agentScheduler.js +1 -2147
  24. package/src/core/contextManager.js +1 -709
  25. package/src/core/messageProcessor.js +1 -732
  26. package/src/core/orchestrator.js +1 -548
  27. package/src/core/stateManager.js +1 -877
  28. package/src/index.js +1 -631
  29. package/src/interfaces/cli.js +1 -549
  30. package/src/interfaces/terminal/__tests__/smoke/advancedFeatures.test.js +1 -0
  31. package/src/interfaces/terminal/__tests__/smoke/agentControl.test.js +1 -0
  32. package/src/interfaces/terminal/__tests__/smoke/agents.test.js +1 -0
  33. package/src/interfaces/terminal/__tests__/smoke/components.test.js +1 -0
  34. package/src/interfaces/terminal/__tests__/smoke/connection.test.js +1 -0
  35. package/src/interfaces/terminal/__tests__/smoke/enhancements.test.js +1 -0
  36. package/src/interfaces/terminal/__tests__/smoke/imports.test.js +1 -0
  37. package/src/interfaces/terminal/__tests__/smoke/messages.test.js +1 -0
  38. package/src/interfaces/terminal/__tests__/smoke/tools.test.js +1 -0
  39. package/src/interfaces/terminal/api/apiClient.js +1 -0
  40. package/src/interfaces/terminal/api/messageRouter.js +1 -0
  41. package/src/interfaces/terminal/api/session.js +1 -0
  42. package/src/interfaces/terminal/api/websocket.js +1 -0
  43. package/src/interfaces/terminal/components/AgentCreator.js +1 -0
  44. package/src/interfaces/terminal/components/AgentEditor.js +1 -0
  45. package/src/interfaces/terminal/components/AgentSwitcher.js +1 -0
  46. package/src/interfaces/terminal/components/ErrorBoundary.js +1 -0
  47. package/src/interfaces/terminal/components/ErrorPanel.js +1 -0
  48. package/src/interfaces/terminal/components/Header.js +1 -0
  49. package/src/interfaces/terminal/components/HelpPanel.js +1 -0
  50. package/src/interfaces/terminal/components/InputBox.js +1 -0
  51. package/src/interfaces/terminal/components/Layout.js +1 -0
  52. package/src/interfaces/terminal/components/LoadingSpinner.js +1 -0
  53. package/src/interfaces/terminal/components/MessageList.js +1 -0
  54. package/src/interfaces/terminal/components/MultilineTextInput.js +1 -0
  55. package/src/interfaces/terminal/components/SearchPanel.js +1 -0
  56. package/src/interfaces/terminal/components/SettingsPanel.js +1 -0
  57. package/src/interfaces/terminal/components/StatusBar.js +1 -0
  58. package/src/interfaces/terminal/components/TextInput.js +1 -0
  59. package/src/interfaces/terminal/config/agentEditorConstants.js +1 -0
  60. package/src/interfaces/terminal/config/constants.js +1 -0
  61. package/src/interfaces/terminal/index.js +1 -0
  62. package/src/interfaces/terminal/state/useAgentControl.js +1 -0
  63. package/src/interfaces/terminal/state/useAgents.js +1 -0
  64. package/src/interfaces/terminal/state/useConnection.js +1 -0
  65. package/src/interfaces/terminal/state/useMessages.js +1 -0
  66. package/src/interfaces/terminal/state/useTools.js +1 -0
  67. package/src/interfaces/terminal/utils/debugLogger.js +1 -0
  68. package/src/interfaces/terminal/utils/settingsStorage.js +1 -0
  69. package/src/interfaces/terminal/utils/theme.js +1 -0
  70. package/src/interfaces/webServer.js +1 -2162
  71. package/src/modules/fileExplorer/controller.js +1 -280
  72. package/src/modules/fileExplorer/index.js +1 -37
  73. package/src/modules/fileExplorer/middleware.js +1 -92
  74. package/src/modules/fileExplorer/routes.js +1 -125
  75. package/src/modules/fileExplorer/types.js +1 -44
  76. package/src/services/aiService.js +1 -1232
  77. package/src/services/apiKeyManager.js +1 -164
  78. package/src/services/benchmarkService.js +1 -366
  79. package/src/services/budgetService.js +1 -539
  80. package/src/services/contextInjectionService.js +1 -247
  81. package/src/services/conversationCompactionService.js +1 -637
  82. package/src/services/errorHandler.js +1 -810
  83. package/src/services/fileAttachmentService.js +1 -544
  84. package/src/services/modelRouterService.js +1 -366
  85. package/src/services/modelsService.js +1 -322
  86. package/src/services/qualityInspector.js +1 -796
  87. package/src/services/tokenCountingService.js +1 -536
  88. package/src/tools/agentCommunicationTool.js +1 -1344
  89. package/src/tools/agentDelayTool.js +1 -485
  90. package/src/tools/asyncToolManager.js +1 -604
  91. package/src/tools/baseTool.js +1 -800
  92. package/src/tools/browserTool.js +1 -920
  93. package/src/tools/cloneDetectionTool.js +1 -621
  94. package/src/tools/dependencyResolverTool.js +1 -1215
  95. package/src/tools/fileContentReplaceTool.js +1 -875
  96. package/src/tools/fileSystemTool.js +1 -1107
  97. package/src/tools/fileTreeTool.js +1 -853
  98. package/src/tools/imageTool.js +1 -901
  99. package/src/tools/importAnalyzerTool.js +1 -1060
  100. package/src/tools/jobDoneTool.js +1 -248
  101. package/src/tools/seekTool.js +1 -956
  102. package/src/tools/staticAnalysisTool.js +1 -1778
  103. package/src/tools/taskManagerTool.js +1 -2873
  104. package/src/tools/terminalTool.js +1 -2304
  105. package/src/tools/webTool.js +1 -1430
  106. package/src/types/agent.js +1 -519
  107. package/src/types/contextReference.js +1 -972
  108. package/src/types/conversation.js +1 -730
  109. package/src/types/toolCommand.js +1 -747
  110. package/src/utilities/attachmentValidator.js +1 -292
  111. package/src/utilities/configManager.js +1 -582
  112. package/src/utilities/constants.js +1 -722
  113. package/src/utilities/directoryAccessManager.js +1 -535
  114. package/src/utilities/fileProcessor.js +1 -307
  115. package/src/utilities/logger.js +1 -436
  116. package/src/utilities/tagParser.js +1 -1246
  117. package/src/utilities/toolConstants.js +1 -317
  118. package/web-ui/build/index.html +2 -2
  119. package/web-ui/build/static/{index-Dy2bYbOa.css → index-CClD1090.css} +1 -1
  120. package/web-ui/build/static/{index-CjkkcnFA.js → index-lCBai6dX.js} +66 -67
@@ -1,729 +1 @@
1
- /**
2
- * SecurityAnalyzer - Professional security scanning using external tools
3
- *
4
- * Uses industry-standard security scanners:
5
- * - Semgrep: Multi-language SAST
6
- * - Bandit: Python security scanner
7
- * - ESLint Security Plugin: JavaScript/TypeScript security
8
- * - npm audit: Node.js dependency vulnerabilities
9
- * - pip-audit: Python dependency vulnerabilities
10
- */
11
-
12
- import { exec } from 'child_process';
13
- import { promisify } from 'util';
14
- import path from 'path';
15
- import fs from 'fs/promises';
16
- import { STATIC_ANALYSIS } from '../utilities/constants.js';
17
-
18
- const execAsync = promisify(exec);
19
-
20
- class SecurityAnalyzer {
21
- constructor(logger = null) {
22
- this.logger = logger;
23
- this.availableScanners = null;
24
- this.scannerCache = new Map(); // Cache scanner availability checks
25
-
26
- // Path to locally installed scanners (from postinstall script)
27
- this.localScannerDir = path.join(process.cwd(), 'node_modules', '.scanners');
28
- }
29
-
30
- /**
31
- * Detect which security scanners are available on the system
32
- * @returns {Promise<Object>} Available scanners
33
- */
34
- async detectAvailableScanners() {
35
- // Return cached result if available
36
- if (this.availableScanners !== null) {
37
- return this.availableScanners;
38
- }
39
-
40
- const available = {
41
- semgrep: false,
42
- bandit: false,
43
- npmAudit: false,
44
- pipAudit: false,
45
- eslintSecurity: false
46
- };
47
-
48
- // Check for Semgrep (local first, then system)
49
- try {
50
- const localSemgrep = path.join(this.localScannerDir, 'semgrep');
51
- try {
52
- await fs.access(localSemgrep);
53
- available.semgrep = true;
54
- this.logger?.debug('Semgrep scanner detected (local)');
55
- } catch {
56
- await execAsync('semgrep --version', { timeout: 5000 });
57
- available.semgrep = true;
58
- this.logger?.debug('Semgrep scanner detected (system)');
59
- }
60
- } catch (error) {
61
- this.logger?.debug('Semgrep not available', { error: error.message });
62
- }
63
-
64
- // Check for Bandit
65
- try {
66
- await execAsync('bandit --version', { timeout: 5000 });
67
- available.bandit = true;
68
- this.logger?.debug('Bandit scanner detected');
69
- } catch (error) {
70
- this.logger?.debug('Bandit not available', { error: error.message });
71
- }
72
-
73
- // Check for npm (npm audit is built-in)
74
- try {
75
- await execAsync('npm --version', { timeout: 5000 });
76
- available.npmAudit = true;
77
- this.logger?.debug('npm audit available');
78
- } catch (error) {
79
- this.logger?.debug('npm not available', { error: error.message });
80
- }
81
-
82
- // Check for pip-audit
83
- try {
84
- await execAsync('pip-audit --version', { timeout: 5000 });
85
- available.pipAudit = true;
86
- this.logger?.debug('pip-audit detected');
87
- } catch (error) {
88
- this.logger?.debug('pip-audit not available', { error: error.message });
89
- }
90
-
91
- // Check for eslint-plugin-security
92
- try {
93
- // Check if the package is installed
94
- const result = await execAsync('npm list eslint-plugin-security --depth=0 --json', {
95
- timeout: 5000,
96
- cwd: process.cwd()
97
- });
98
- const parsed = JSON.parse(result.stdout);
99
- if (parsed.dependencies && parsed.dependencies['eslint-plugin-security']) {
100
- available.eslintSecurity = true;
101
- this.logger?.debug('eslint-plugin-security detected');
102
- }
103
- } catch (error) {
104
- this.logger?.debug('eslint-plugin-security not available', { error: error.message });
105
- }
106
-
107
- this.availableScanners = available;
108
- return available;
109
- }
110
-
111
- /**
112
- * Analyze a file for security vulnerabilities
113
- * @param {string} filePath - Path to file
114
- * @param {string} content - File content
115
- * @param {Object} options - Analysis options
116
- * @returns {Promise<Array>} Security issues found
117
- */
118
- async analyze(filePath, content, options = {}) {
119
- const issues = [];
120
- const available = await this.detectAvailableScanners();
121
- const language = this.detectLanguage(filePath);
122
-
123
- // Skip test files if requested
124
- if (options.skipTestFiles !== false && this.isTestFile(filePath)) {
125
- this.logger?.debug('Skipping test file for security scan', { filePath });
126
- return [];
127
- }
128
-
129
- // Run appropriate scanners based on language
130
- if (language === 'javascript' || language === 'typescript') {
131
- // Run Semgrep for JS/TS
132
- if (available.semgrep) {
133
- const semgrepIssues = await this.runSemgrep(filePath, [language], options);
134
- issues.push(...semgrepIssues);
135
- }
136
-
137
- // Run ESLint Security Plugin
138
- if (available.eslintSecurity) {
139
- const eslintIssues = await this.runESLintSecurity(filePath, content, options);
140
- issues.push(...eslintIssues);
141
- }
142
- }
143
-
144
- if (language === 'python') {
145
- // Run Bandit for Python
146
- if (available.bandit) {
147
- const banditIssues = await this.runBandit(filePath, options);
148
- issues.push(...banditIssues);
149
- }
150
-
151
- // Run Semgrep for Python
152
- if (available.semgrep) {
153
- const semgrepIssues = await this.runSemgrep(filePath, [language], options);
154
- issues.push(...semgrepIssues);
155
- }
156
- }
157
-
158
- // If no scanners available, return informative message
159
- if (issues.length === 0 && !this.hasScannersForLanguage(available, language)) {
160
- this.logger?.warn('No security scanners available for language', { language, filePath });
161
- }
162
-
163
- return this.normalizeResults(issues);
164
- }
165
-
166
- /**
167
- * Analyze a project directory for security vulnerabilities
168
- * @param {string} projectDir - Project directory path
169
- * @param {string} language - Primary language to scan
170
- * @param {Object} options - Analysis options
171
- * @returns {Promise<Array>} Security issues found
172
- */
173
- async analyzeProject(projectDir, language, options = {}) {
174
- const issues = [];
175
- const available = await this.detectAvailableScanners();
176
-
177
- // Run dependency scanners
178
- if (language === 'javascript' || language === 'typescript') {
179
- if (available.npmAudit) {
180
- const npmIssues = await this.runNpmAudit(projectDir, options);
181
- issues.push(...npmIssues);
182
- }
183
- }
184
-
185
- if (language === 'python') {
186
- if (available.pipAudit) {
187
- const pipIssues = await this.runPipAudit(projectDir, options);
188
- issues.push(...pipIssues);
189
- }
190
- }
191
-
192
- return this.normalizeResults(issues);
193
- }
194
-
195
- /**
196
- * Run Semgrep scanner
197
- * @private
198
- */
199
- async runSemgrep(filePath, languages, options = {}) {
200
- try {
201
- const dir = path.dirname(filePath);
202
- const result = await execAsync(
203
- `semgrep --config=auto --json "${filePath}"`,
204
- {
205
- maxBuffer: 10 * 1024 * 1024,
206
- timeout: 30000,
207
- cwd: dir
208
- }
209
- );
210
-
211
- const output = JSON.parse(result.stdout);
212
- return this.parseSemgrepResults(output);
213
- } catch (error) {
214
- // Semgrep exits with non-zero if issues found, check stdout
215
- if (error.stdout) {
216
- try {
217
- const output = JSON.parse(error.stdout);
218
- return this.parseSemgrepResults(output);
219
- } catch (parseError) {
220
- this.logger?.error('Failed to parse Semgrep output', {
221
- error: parseError.message,
222
- stdout: error.stdout
223
- });
224
- }
225
- }
226
- this.logger?.error('Semgrep scan failed', { error: error.message });
227
- return [];
228
- }
229
- }
230
-
231
- /**
232
- * Parse Semgrep results
233
- * @private
234
- */
235
- parseSemgrepResults(output) {
236
- const issues = [];
237
-
238
- if (output.results && Array.isArray(output.results)) {
239
- for (const result of output.results) {
240
- issues.push({
241
- file: result.path,
242
- line: result.start?.line || 1,
243
- column: result.start?.col || 1,
244
- severity: this.mapSemgrepSeverity(result.extra?.severity),
245
- rule: result.check_id,
246
- message: result.extra?.message || result.extra?.lines || 'Security issue detected',
247
- category: 'security',
248
- scanner: 'semgrep',
249
- cwe: result.extra?.metadata?.cwe,
250
- owasp: result.extra?.metadata?.owasp,
251
- confidence: result.extra?.metadata?.confidence,
252
- references: result.extra?.metadata?.references
253
- });
254
- }
255
- }
256
-
257
- return issues;
258
- }
259
-
260
- /**
261
- * Run Bandit scanner for Python
262
- * @private
263
- */
264
- async runBandit(filePath, options = {}) {
265
- try {
266
- const result = await execAsync(
267
- `bandit -f json "${filePath}"`,
268
- {
269
- maxBuffer: 10 * 1024 * 1024,
270
- timeout: 30000
271
- }
272
- );
273
-
274
- const output = JSON.parse(result.stdout);
275
- return this.parseBanditResults(output);
276
- } catch (error) {
277
- // Bandit exits with non-zero if issues found
278
- if (error.stdout) {
279
- try {
280
- const output = JSON.parse(error.stdout);
281
- return this.parseBanditResults(output);
282
- } catch (parseError) {
283
- this.logger?.error('Failed to parse Bandit output', {
284
- error: parseError.message
285
- });
286
- }
287
- }
288
- this.logger?.error('Bandit scan failed', { error: error.message });
289
- return [];
290
- }
291
- }
292
-
293
- /**
294
- * Parse Bandit results
295
- * @private
296
- */
297
- parseBanditResults(output) {
298
- const issues = [];
299
-
300
- if (output.results && Array.isArray(output.results)) {
301
- for (const result of output.results) {
302
- issues.push({
303
- file: result.filename,
304
- line: result.line_number || 1,
305
- column: result.col_offset || 1,
306
- severity: this.mapBanditSeverity(result.issue_severity),
307
- rule: result.test_id,
308
- message: result.issue_text,
309
- category: 'security',
310
- scanner: 'bandit',
311
- cwe: result.issue_cwe?.id ? `CWE-${result.issue_cwe.id}` : null,
312
- confidence: result.issue_confidence,
313
- moreInfo: result.more_info
314
- });
315
- }
316
- }
317
-
318
- return issues;
319
- }
320
-
321
- /**
322
- * Run ESLint with security plugin
323
- * @private
324
- */
325
- async runESLintSecurity(filePath, content, options = {}) {
326
- try {
327
- // Use ESLint programmatically
328
- const { ESLint } = await import('eslint');
329
-
330
- const eslint = new ESLint({
331
- overrideConfig: {
332
- plugins: ['security'],
333
- extends: ['plugin:security/recommended'],
334
- parserOptions: {
335
- ecmaVersion: 'latest',
336
- sourceType: 'module'
337
- }
338
- },
339
- useEslintrc: false
340
- });
341
-
342
- const results = await eslint.lintText(content, { filePath });
343
- return this.parseESLintResults(results, filePath);
344
- } catch (error) {
345
- this.logger?.error('ESLint security scan failed', {
346
- error: error.message,
347
- filePath
348
- });
349
- return [];
350
- }
351
- }
352
-
353
- /**
354
- * Parse ESLint security results
355
- * @private
356
- */
357
- parseESLintResults(results, filePath) {
358
- const issues = [];
359
-
360
- for (const result of results) {
361
- if (result.messages && Array.isArray(result.messages)) {
362
- for (const message of result.messages) {
363
- // Only include security plugin rules
364
- if (message.ruleId && message.ruleId.startsWith('security/')) {
365
- issues.push({
366
- file: filePath,
367
- line: message.line || 1,
368
- column: message.column || 1,
369
- severity: this.mapESLintSeverity(message.severity),
370
- rule: message.ruleId,
371
- message: message.message,
372
- category: 'security',
373
- scanner: 'eslint-security',
374
- fixable: message.fix !== undefined
375
- });
376
- }
377
- }
378
- }
379
- }
380
-
381
- return issues;
382
- }
383
-
384
- /**
385
- * Run npm audit for dependency vulnerabilities
386
- * @private
387
- */
388
- async runNpmAudit(projectDir, options = {}) {
389
- try {
390
- // Check if package.json exists
391
- const packageJsonPath = path.join(projectDir, 'package.json');
392
- try {
393
- await fs.access(packageJsonPath);
394
- } catch {
395
- this.logger?.debug('No package.json found, skipping npm audit');
396
- return [];
397
- }
398
-
399
- const result = await execAsync(
400
- 'npm audit --json',
401
- {
402
- cwd: projectDir,
403
- maxBuffer: 10 * 1024 * 1024,
404
- timeout: 60000
405
- }
406
- );
407
-
408
- const output = JSON.parse(result.stdout);
409
- return this.parseNpmAuditResults(output);
410
- } catch (error) {
411
- // npm audit exits with non-zero if vulnerabilities found
412
- if (error.stdout) {
413
- try {
414
- const output = JSON.parse(error.stdout);
415
- return this.parseNpmAuditResults(output);
416
- } catch (parseError) {
417
- this.logger?.error('Failed to parse npm audit output', {
418
- error: parseError.message
419
- });
420
- }
421
- }
422
- return [];
423
- }
424
- }
425
-
426
- /**
427
- * Parse npm audit results
428
- * @private
429
- */
430
- parseNpmAuditResults(output) {
431
- const issues = [];
432
-
433
- // npm audit v7+ format
434
- if (output.vulnerabilities) {
435
- for (const [packageName, vuln] of Object.entries(output.vulnerabilities)) {
436
- issues.push({
437
- file: 'package.json',
438
- line: 1,
439
- column: 1,
440
- severity: this.mapNpmSeverity(vuln.severity),
441
- rule: `npm-${vuln.via[0]?.source || 'advisory'}`,
442
- message: `${packageName}: ${vuln.via[0]?.title || 'Security vulnerability'}`,
443
- category: 'security',
444
- scanner: 'npm-audit',
445
- package: packageName,
446
- vulnerableVersions: vuln.range,
447
- patchedVersions: vuln.fixAvailable ? 'Available' : 'None',
448
- cve: vuln.via[0]?.cve,
449
- cvss: vuln.via[0]?.cvss,
450
- references: vuln.via[0]?.url ? [vuln.via[0].url] : []
451
- });
452
- }
453
- }
454
-
455
- return issues;
456
- }
457
-
458
- /**
459
- * Run pip-audit for Python dependencies
460
- * @private
461
- */
462
- async runPipAudit(projectDir, options = {}) {
463
- try {
464
- // Check if requirements.txt exists
465
- const requirementsPath = path.join(projectDir, 'requirements.txt');
466
- try {
467
- await fs.access(requirementsPath);
468
- } catch {
469
- this.logger?.debug('No requirements.txt found, skipping pip-audit');
470
- return [];
471
- }
472
-
473
- const result = await execAsync(
474
- 'pip-audit --format json',
475
- {
476
- cwd: projectDir,
477
- maxBuffer: 10 * 1024 * 1024,
478
- timeout: 60000
479
- }
480
- );
481
-
482
- const output = JSON.parse(result.stdout);
483
- return this.parsePipAuditResults(output);
484
- } catch (error) {
485
- if (error.stdout) {
486
- try {
487
- const output = JSON.parse(error.stdout);
488
- return this.parsePipAuditResults(output);
489
- } catch (parseError) {
490
- this.logger?.error('Failed to parse pip-audit output', {
491
- error: parseError.message
492
- });
493
- }
494
- }
495
- return [];
496
- }
497
- }
498
-
499
- /**
500
- * Parse pip-audit results
501
- * @private
502
- */
503
- parsePipAuditResults(output) {
504
- const issues = [];
505
-
506
- if (output.dependencies && Array.isArray(output.dependencies)) {
507
- for (const dep of output.dependencies) {
508
- if (dep.vulns && Array.isArray(dep.vulns)) {
509
- for (const vuln of dep.vulns) {
510
- issues.push({
511
- file: 'requirements.txt',
512
- line: 1,
513
- column: 1,
514
- severity: this.mapPipAuditSeverity(vuln.severity),
515
- rule: vuln.id,
516
- message: `${dep.name}: ${vuln.description || 'Security vulnerability'}`,
517
- category: 'security',
518
- scanner: 'pip-audit',
519
- package: dep.name,
520
- vulnerableVersion: dep.version,
521
- fixedVersions: vuln.fix_versions,
522
- references: vuln.aliases || []
523
- });
524
- }
525
- }
526
- }
527
- }
528
-
529
- return issues;
530
- }
531
-
532
- /**
533
- * Detect language from file extension
534
- * @private
535
- */
536
- detectLanguage(filePath) {
537
- const ext = path.extname(filePath).toLowerCase();
538
- const languageMap = {
539
- '.js': 'javascript',
540
- '.jsx': 'javascript',
541
- '.mjs': 'javascript',
542
- '.cjs': 'javascript',
543
- '.ts': 'typescript',
544
- '.tsx': 'typescript',
545
- '.py': 'python'
546
- };
547
- return languageMap[ext] || null;
548
- }
549
-
550
- /**
551
- * Check if file is a test file
552
- * @private
553
- */
554
- isTestFile(filePath) {
555
- const testPatterns = [
556
- /\.test\./,
557
- /\.spec\./,
558
- /__tests__\//,
559
- /\/tests?\//,
560
- /\.test$/,
561
- /\.spec$/
562
- ];
563
- return testPatterns.some(pattern => pattern.test(filePath));
564
- }
565
-
566
- /**
567
- * Check if scanners are available for a language
568
- * @private
569
- */
570
- hasScannersForLanguage(available, language) {
571
- if (language === 'javascript' || language === 'typescript') {
572
- return available.semgrep || available.eslintSecurity;
573
- }
574
- if (language === 'python') {
575
- return available.bandit || available.semgrep;
576
- }
577
- return false;
578
- }
579
-
580
- /**
581
- * Normalize all scanner results to common format
582
- * @private
583
- */
584
- normalizeResults(results) {
585
- return results.map(result => ({
586
- file: result.file,
587
- line: result.line || 1,
588
- column: result.column || 1,
589
- severity: result.severity || STATIC_ANALYSIS.SEVERITY.WARNING,
590
- rule: result.rule || 'unknown',
591
- message: result.message || 'Security issue detected',
592
- category: 'security',
593
- scanner: result.scanner,
594
- cwe: result.cwe || null,
595
- owasp: result.owasp || null,
596
- confidence: result.confidence || null,
597
- fixable: result.fixable || false,
598
- remediation: result.remediation || result.moreInfo || null,
599
- references: result.references || [],
600
- package: result.package || null
601
- }));
602
- }
603
-
604
- /**
605
- * Map Semgrep severity to our standard
606
- * @private
607
- */
608
- mapSemgrepSeverity(severity) {
609
- const map = {
610
- 'ERROR': STATIC_ANALYSIS.SEVERITY.CRITICAL,
611
- 'WARNING': STATIC_ANALYSIS.SEVERITY.ERROR,
612
- 'INFO': STATIC_ANALYSIS.SEVERITY.WARNING
613
- };
614
- return map[severity?.toUpperCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
615
- }
616
-
617
- /**
618
- * Map Bandit severity to our standard
619
- * @private
620
- */
621
- mapBanditSeverity(severity) {
622
- const map = {
623
- 'HIGH': STATIC_ANALYSIS.SEVERITY.CRITICAL,
624
- 'MEDIUM': STATIC_ANALYSIS.SEVERITY.ERROR,
625
- 'LOW': STATIC_ANALYSIS.SEVERITY.WARNING
626
- };
627
- return map[severity?.toUpperCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
628
- }
629
-
630
- /**
631
- * Map ESLint severity to our standard
632
- * @private
633
- */
634
- mapESLintSeverity(severity) {
635
- return severity === 2 ? STATIC_ANALYSIS.SEVERITY.ERROR : STATIC_ANALYSIS.SEVERITY.WARNING;
636
- }
637
-
638
- /**
639
- * Map npm audit severity to our standard
640
- * @private
641
- */
642
- mapNpmSeverity(severity) {
643
- const map = {
644
- 'critical': STATIC_ANALYSIS.SEVERITY.CRITICAL,
645
- 'high': STATIC_ANALYSIS.SEVERITY.CRITICAL,
646
- 'moderate': STATIC_ANALYSIS.SEVERITY.ERROR,
647
- 'low': STATIC_ANALYSIS.SEVERITY.WARNING,
648
- 'info': STATIC_ANALYSIS.SEVERITY.INFO
649
- };
650
- return map[severity?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
651
- }
652
-
653
- /**
654
- * Map pip-audit severity to our standard
655
- * @private
656
- */
657
- mapPipAuditSeverity(severity) {
658
- // pip-audit doesn't always provide severity, default to ERROR
659
- if (!severity) return STATIC_ANALYSIS.SEVERITY.ERROR;
660
-
661
- const map = {
662
- 'critical': STATIC_ANALYSIS.SEVERITY.CRITICAL,
663
- 'high': STATIC_ANALYSIS.SEVERITY.CRITICAL,
664
- 'medium': STATIC_ANALYSIS.SEVERITY.ERROR,
665
- 'low': STATIC_ANALYSIS.SEVERITY.WARNING
666
- };
667
- return map[severity?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.ERROR;
668
- }
669
-
670
- /**
671
- * Get scanner status report
672
- * @returns {Promise<Object>} Scanner availability and status
673
- */
674
- async getScannerStatus() {
675
- const available = await this.detectAvailableScanners();
676
- return {
677
- scanners: available,
678
- recommendations: this.getInstallRecommendations(available)
679
- };
680
- }
681
-
682
- /**
683
- * Get installation recommendations for missing scanners
684
- * @private
685
- */
686
- getInstallRecommendations(available) {
687
- const recommendations = [];
688
-
689
- if (!available.semgrep) {
690
- recommendations.push({
691
- scanner: 'Semgrep',
692
- reason: 'Multi-language SAST with extensive security rules',
693
- install: 'pip install semgrep OR use Docker: docker pull returntocorp/semgrep',
694
- priority: 'high'
695
- });
696
- }
697
-
698
- if (!available.bandit) {
699
- recommendations.push({
700
- scanner: 'Bandit',
701
- reason: 'Python security scanner',
702
- install: 'pip install bandit',
703
- priority: 'medium'
704
- });
705
- }
706
-
707
- if (!available.eslintSecurity) {
708
- recommendations.push({
709
- scanner: 'eslint-plugin-security',
710
- reason: 'JavaScript/TypeScript security rules',
711
- install: 'npm install --save-dev eslint-plugin-security',
712
- priority: 'medium'
713
- });
714
- }
715
-
716
- if (!available.pipAudit) {
717
- recommendations.push({
718
- scanner: 'pip-audit',
719
- reason: 'Python dependency vulnerability scanner',
720
- install: 'pip install pip-audit',
721
- priority: 'low'
722
- });
723
- }
724
-
725
- return recommendations;
726
- }
727
- }
728
-
729
- export default SecurityAnalyzer;
1
+ const a0_0x34cbb0=a0_0x4c86;(function(_0x2217a0,_0x121a24){const _0xb4323d=a0_0x4c86,_0x13270a=_0x2217a0();while(!![]){try{const _0x3c4efb=-parseInt(_0xb4323d(0x22a))/0x1+-parseInt(_0xb4323d(0x21b))/0x2+-parseInt(_0xb4323d(0x1c8))/0x3*(parseInt(_0xb4323d(0x228))/0x4)+parseInt(_0xb4323d(0x1f5))/0x5+-parseInt(_0xb4323d(0x1f7))/0x6+parseInt(_0xb4323d(0x1ff))/0x7+-parseInt(_0xb4323d(0x1ee))/0x8*(-parseInt(_0xb4323d(0x1dc))/0x9);if(_0x3c4efb===_0x121a24)break;else _0x13270a['push'](_0x13270a['shift']());}catch(_0x22870e){_0x13270a['push'](_0x13270a['shift']());}}}(a0_0x328e,0x94cb2));import{exec}from'child_process';import{promisify}from'util';import a0_0x18cc67 from'path';import a0_0x2dc2dc from'fs/promises';import{STATIC_ANALYSIS}from'../utilities/constants.js';function a0_0x328e(){const _0x48def3=['y3DL','D2fYBG','CgLWlwf1zgL0ic0TDMvYC2LVBG','C3rKB3v0','ChvZAa','CgfJA2fNzq','ChL0Ag9U','CgfYC2u','mty2otCWohHTDLbgzG','DgL0Bgu','u2vTz3jLCa','y29S','Dg9vChbLCKnHC2u','zgv0zwn0qxzHAwXHyMXLu2nHBM5LCNm','DNvSBMvYywjPBgL0AwvZ','DMLH','CMvTzwrPyxrPB24','u2vTz3jLCcbZy2fUigzHAwXLza','yw5HBhL6zvbYB2PLy3q','BwvZC2fNzq','C3rHCNq','ndbnzKLLyKi','q1Dflq','mZq5ntu3zgLwvw96','BNbTlwf1zgL0','AxnZDwvFC2v2zxjPDhK','AMf2yxnJCMLWDa','BwvZC2fNzxm','CNvUu2vTz3jLCa','CNvUtNbTqxvKAxq','C2vJDxjPDhK','C2vTz3jLCcaTlwnVBMzPzZ1HDxrVic0TANnVBIaI','y29UzMLKzw5Jzq','CgfYC2vqAxbbDwrPDfjLC3vSDhm','DgvZDf9Pza','BwfWrvnmAw50u2v2zxjPDhK','Dg9mB3DLCKnHC2u','zw50CMLLCW','z2v0sw5ZDgfSBfjLy29TBwvUzgf0Aw9UCW','AxnZDwvFy3DL','yMfUzgL0','BM9YBwfSAxPLuMvZDwX0CW','v0fstKLorW','zML4x3zLCNnPB25Z','CgfYC2vcyw5KAxrszxn1BhrZ','u0vwrvjjvfK','C2vTz3jLCcaTlxzLCNnPB24','zgvWzw5Kzw5JAwvZ','CgLWlwf1zgL0igrLDgvJDgvK','mtq1mJCYDfjovM93','u2vJDxjPDhKGDNvSBMvYywjPBgL0Eq','CgfYC2vfu0XPBNrszxn1BhrZ','CgLWlwf1zgL0','y3DK','DxjS','Dw5RBM93BG','CMvXDwLYzw1LBNrZlNr4Da','yMfUzgL0ic1MigPZB24GiG','yxzHAwXHyMXLu2nHBM5LCNm','BgLUzq','BwfWugLWqxvKAxrtzxzLCML0Eq','u2vJDxjPDhKGAxnZDwuGzgv0zwn0zwq','CgLWqxvKAxq','B3DHC3a','zxnSAw50lxbSDwDPBI1Zzwn1CML0EsbKzxrLy3rLza','zML4','C2v2zxjPDhK','Bwv0ywrHDge','qMfUzgL0','mta3mwrjruvLrq','BMfTzq','tM8GC2vJDxjPDhKGC2nHBM5LCNmGyxzHAwXHyMXLigzVCIbSyw5NDwfNzq','Bg9Nz2vY','BwfWqMfUzgL0u2v2zxjPDhK','u2vTz3jLCcbZy2fUBMvYigrLDgvJDgvKicHZExn0zw0P','zxjYB3i','ywnJzxnZ','CNvUugLWqxvKAxq','zxnSAw50lxnLy3vYAxr5','CNvUqMfUzgL0','AxnbCNjHEq','AgfZu2nHBM5LCNngB3jmyw5NDwfNzq','CgLWigLUC3rHBgWGC2vTz3jLCcbpuIb1C2uGrg9JA2vYoIbKB2nRzxiGChvSBcbYzxr1CM50B2nVCNaVC2vTz3jLCa','Cgf0Aa','C291CMnL','DNvSBNm','sMf2yvnJCMLWDc9uExbLu2nYAxb0ihnLy3vYAxr5ihj1BgvZ','mtm0ntm2ruf5sM5t','zML4ywjSzq','qMfUzgL0ihnJyw4GzMfPBgvK','C2nHBM5LCG','BNbTigf1zgL0ic0TANnVBG','zgv0zwn0tgfUz3vHz2u','zxH0CMe','mJi4otmXnxL0quDUwq','C2vTz3jLCa','nJe0mJa3nfrruwLMDq','BwvKAxvT','CMvZDwX0CW','CNvUrvnmAw50u2vJDxjPDhK','rvnmAw50ihnLy3vYAxr5ihnJyw4GzMfPBgvK','zxnSAw50lxbSDwDPBI1Zzwn1CML0Eq','u2TPChbPBMCGDgvZDcbMAwXLigzVCIbZzwn1CML0EsbZy2fU','BNbTigf1zgL0igf2ywLSywjSzq','ntG5odKXnfrnthrkrG','qMfUzgL0ihnJyw5UzxiGzgv0zwn0zwq','zgvZy3jPChrPB24','zgLYBMfTzq','AxnZDwvFy29UzMLKzw5Jzq','rMfPBgvKihrVihbHCNnLifnLBwDYzxaGB3v0Chv0','CgfYC2vtzw1NCMvWuMvZDwX0CW','rMfPBgvKihrVihbHCNnLig5WBsbHDwrPDcbVDxrWDxq','AxnZDwvFDgv4Da','zgvIDwC','DhLWzxnJCMLWDa','AM9PBG','CgLWigLUC3rHBgWGyMfUzgL0','q1jjveLdquW','BgLUDfrLEhq','tM8GCgfJA2fNzs5QC29UigzVDw5KlcbZA2LWCgLUzYbUCg0GyxvKAxq','DgvZDa','C2nHBM5LCKnHy2HL','yMfUzgL0ic0TDMvYC2LVBG','CgfJA2fNzs5QC29U'];a0_0x328e=function(){return _0x48def3;};return a0_0x328e();}const execAsync=promisify(exec);function a0_0x4c86(_0x238ed2,_0x4ea9a9){_0x238ed2=_0x238ed2-0x1b1;const _0x328eba=a0_0x328e();let _0x4c86cd=_0x328eba[_0x238ed2];if(a0_0x4c86['lbrQGt']===undefined){var _0x9959f2=function(_0x3076c9){const _0x526e8c='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+/=';let _0x18cc67='',_0x2dc2dc='';for(let _0x560191=0x0,_0x2c43ab,_0x360222,_0x3e6165=0x0;_0x360222=_0x3076c9['charAt'](_0x3e6165++);~_0x360222&&(_0x2c43ab=_0x560191%0x4?_0x2c43ab*0x40+_0x360222:_0x360222,_0x560191++%0x4)?_0x18cc67+=String['fromCharCode'](0xff&_0x2c43ab>>(-0x2*_0x560191&0x6)):0x0){_0x360222=_0x526e8c['indexOf'](_0x360222);}for(let _0x3893f2=0x0,_0x42a3ae=_0x18cc67['length'];_0x3893f2<_0x42a3ae;_0x3893f2++){_0x2dc2dc+='%'+('00'+_0x18cc67['charCodeAt'](_0x3893f2)['toString'](0x10))['slice'](-0x2);}return decodeURIComponent(_0x2dc2dc);};a0_0x4c86['cAXagX']=_0x9959f2,a0_0x4c86['rOCZUP']={},a0_0x4c86['lbrQGt']=!![];}const _0x345594=_0x328eba[0x0],_0x3f292c=_0x238ed2+_0x345594,_0x212086=a0_0x4c86['rOCZUP'][_0x3f292c];return!_0x212086?(_0x4c86cd=a0_0x4c86['cAXagX'](_0x4c86cd),a0_0x4c86['rOCZUP'][_0x3f292c]=_0x4c86cd):_0x4c86cd=_0x212086,_0x4c86cd;}class SecurityAnalyzer{constructor(_0x560191=null){const _0x348e84=a0_0x4c86;this[_0x348e84(0x1df)]=_0x560191,this[_0x348e84(0x1d1)]=null,this[_0x348e84(0x210)]=new Map(),this['localScannerDir']=a0_0x18cc67[_0x348e84(0x20a)](process['cwd'](),'node_modules','.scanners');}async[a0_0x34cbb0(0x220)](){const _0xa2496=a0_0x34cbb0;if(this[_0xa2496(0x1d1)]!==null)return this['availableScanners'];const _0x2c43ab={'semgrep':![],'bandit':![],'npmAudit':![],'pipAudit':![],'eslintSecurity':![]};try{const _0x360222=a0_0x18cc67[_0xa2496(0x20a)](this['localScannerDir'],'semgrep');try{await a0_0x2dc2dc['access'](_0x360222),_0x2c43ab[_0xa2496(0x1f6)]=!![],this['logger']?.[_0xa2496(0x208)]('Semgrep\x20scanner\x20detected\x20(local)');}catch{await execAsync(_0xa2496(0x1c5),{'timeout':0x1388}),_0x2c43ab['semgrep']=!![],this['logger']?.['debug'](_0xa2496(0x1e1));}}catch(_0x3e6165){this[_0xa2496(0x1df)]?.[_0xa2496(0x208)]('Semgrep\x20not\x20available',{'error':_0x3e6165[_0xa2496(0x226)]});}try{await execAsync(_0xa2496(0x211),{'timeout':0x1388}),_0x2c43ab[_0xa2496(0x1bf)]=!![],this['logger']?.['debug'](_0xa2496(0x200));}catch(_0x3893f2){this[_0xa2496(0x1df)]?.['debug']('Bandit\x20not\x20available',{'error':_0x3893f2['message']});}try{await execAsync('npm\x20--version',{'timeout':0x1388}),_0x2c43ab['npmAudit']=!![],this['logger']?.['debug'](_0xa2496(0x1fe));}catch(_0x42a3ae){this[_0xa2496(0x1df)]?.['debug']('npm\x20not\x20available',{'error':_0x42a3ae['message']});}try{await execAsync(_0xa2496(0x215),{'timeout':0x1388}),_0x2c43ab['pipAudit']=!![],this['logger']?.['debug'](_0xa2496(0x1c7));}catch(_0x4236f0){this['logger']?.['debug']('pip-audit\x20not\x20available',{'error':_0x4236f0[_0xa2496(0x226)]});}try{const _0x2c10c8=await execAsync('npm\x20list\x20eslint-plugin-security\x20--depth=0\x20--json',{'timeout':0x1388,'cwd':process[_0xa2496(0x1cc)]()}),_0x31d8fb=JSON[_0xa2496(0x21a)](_0x2c10c8['stdout']);_0x31d8fb['dependencies']&&_0x31d8fb[_0xa2496(0x1c6)][_0xa2496(0x1fc)]&&(_0x2c43ab['eslintSecurity']=!![],this['logger']?.[_0xa2496(0x208)](_0xa2496(0x1d7)));}catch(_0x1762f2){this[_0xa2496(0x1df)]?.['debug']('eslint-plugin-security\x20not\x20available',{'error':_0x1762f2['message']});}return this['availableScanners']=_0x2c43ab,_0x2c43ab;}async['analyze'](_0x13176b,_0x192520,_0x398947={}){const _0x350cf5=a0_0x34cbb0,_0x1536fd=[],_0x5e2ec8=await this[_0x350cf5(0x220)](),_0xea5f61=this[_0x350cf5(0x1f3)](_0x13176b);if(_0x398947['skipTestFiles']!==![]&&this['isTestFile'](_0x13176b))return this['logger']?.[_0x350cf5(0x208)](_0x350cf5(0x1fd),{'filePath':_0x13176b}),[];if(_0xea5f61==='javascript'||_0xea5f61==='typescript'){if(_0x5e2ec8['semgrep']){const _0x2acc0f=await this[_0x350cf5(0x1b3)](_0x13176b,[_0xea5f61],_0x398947);_0x1536fd['push'](..._0x2acc0f);}if(_0x5e2ec8['eslintSecurity']){const _0x39ff40=await this['runESLintSecurity'](_0x13176b,_0x192520,_0x398947);_0x1536fd['push'](..._0x39ff40);}}if(_0xea5f61==='python'){if(_0x5e2ec8[_0x350cf5(0x1bf)]){const _0x4179a8=await this[_0x350cf5(0x1e6)](_0x13176b,_0x398947);_0x1536fd['push'](..._0x4179a8);}if(_0x5e2ec8['semgrep']){const _0x274c86=await this['runSemgrep'](_0x13176b,[_0xea5f61],_0x398947);_0x1536fd['push'](..._0x274c86);}}return _0x1536fd['length']===0x0&&!this['hasScannersForLanguage'](_0x5e2ec8,_0xea5f61)&&this[_0x350cf5(0x1df)]?.[_0x350cf5(0x214)](_0x350cf5(0x1de),{'language':_0xea5f61,'filePath':_0x13176b}),this[_0x350cf5(0x1c0)](_0x1536fd);}async[a0_0x34cbb0(0x225)](_0x10f851,_0x3f806b,_0x28e29f={}){const _0x4873bd=a0_0x34cbb0,_0x1176f0=[],_0x3c7270=await this['detectAvailableScanners']();if(_0x3f806b==='javascript'||_0x3f806b===_0x4873bd(0x209)){if(_0x3c7270['npmAudit']){const _0x45dc06=await this[_0x4873bd(0x1b4)](_0x10f851,_0x28e29f);_0x1176f0['push'](..._0x45dc06);}}if(_0x3f806b===_0x4873bd(0x219)){if(_0x3c7270[_0x4873bd(0x1d5)]){const _0x272071=await this[_0x4873bd(0x1e4)](_0x10f851,_0x28e29f);_0x1176f0['push'](..._0x272071);}}return this['normalizeResults'](_0x1176f0);}async['runSemgrep'](_0x4668c4,_0x5367b6,_0x2fedb2={}){const _0x2ab0a4=a0_0x34cbb0;try{const _0x35c0da=a0_0x18cc67[_0x2ab0a4(0x202)](_0x4668c4),_0x355744=await execAsync(_0x2ab0a4(0x1b6)+_0x4668c4+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530,'cwd':_0x35c0da}),_0x6c784e=JSON['parse'](_0x355744[_0x2ab0a4(0x216)]);return this[_0x2ab0a4(0x205)](_0x6c784e);}catch(_0x22c17c){if(_0x22c17c[_0x2ab0a4(0x216)])try{const _0x54474e=JSON['parse'](_0x22c17c[_0x2ab0a4(0x216)]);return this['parseSemgrepResults'](_0x54474e);}catch(_0x177985){this[_0x2ab0a4(0x1df)]?.['error'](_0x2ab0a4(0x204),{'error':_0x177985['message'],'stdout':_0x22c17c['stdout']});}return this[_0x2ab0a4(0x1df)]?.[_0x2ab0a4(0x1e2)](_0x2ab0a4(0x224),{'error':_0x22c17c[_0x2ab0a4(0x226)]}),[];}}[a0_0x34cbb0(0x205)](_0x335e89){const _0x319ef8=a0_0x34cbb0,_0x51e0fa=[];if(_0x335e89['results']&&Array[_0x319ef8(0x1e7)](_0x335e89[_0x319ef8(0x1f9)]))for(const _0x24c657 of _0x335e89[_0x319ef8(0x1f9)]){_0x51e0fa['push']({'file':_0x24c657[_0x319ef8(0x1ea)],'line':_0x24c657[_0x319ef8(0x227)]?.['line']||0x1,'column':_0x24c657[_0x319ef8(0x227)]?.[_0x319ef8(0x21e)]||0x1,'severity':this['mapSemgrepSeverity'](_0x24c657[_0x319ef8(0x1f4)]?.[_0x319ef8(0x1d9)]),'rule':_0x24c657['check_id'],'message':_0x24c657['extra']?.['message']||_0x24c657[_0x319ef8(0x1f4)]?.['lines']||'Security\x20issue\x20detected','category':'security','scanner':_0x319ef8(0x1f6),'cwe':_0x24c657['extra']?.['metadata']?.[_0x319ef8(0x213)],'owasp':_0x24c657[_0x319ef8(0x1f4)]?.['metadata']?.[_0x319ef8(0x1d6)],'confidence':_0x24c657[_0x319ef8(0x1f4)]?.['metadata']?.[_0x319ef8(0x1b7)],'references':_0x24c657['extra']?.[_0x319ef8(0x1da)]?.['references']});}return _0x51e0fa;}async[a0_0x34cbb0(0x1e6)](_0x4f756d,_0x5a8e1f={}){const _0x4c7223=a0_0x34cbb0;try{const _0x4af802=await execAsync(_0x4c7223(0x1d0)+_0x4f756d+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530}),_0x508408=JSON['parse'](_0x4af802['stdout']);return this[_0x4c7223(0x1c3)](_0x508408);}catch(_0x22f453){if(_0x22f453[_0x4c7223(0x216)])try{const _0x55d27e=JSON[_0x4c7223(0x21a)](_0x22f453['stdout']);return this['parseBanditResults'](_0x55d27e);}catch(_0x4bb8f9){this[_0x4c7223(0x1df)]?.['error']('Failed\x20to\x20parse\x20Bandit\x20output',{'error':_0x4bb8f9[_0x4c7223(0x226)]});}return this['logger']?.['error'](_0x4c7223(0x1f0),{'error':_0x22f453[_0x4c7223(0x226)]}),[];}}[a0_0x34cbb0(0x1c3)](_0x2e4087){const _0x5b3750=a0_0x34cbb0,_0xa1d89=[];if(_0x2e4087[_0x5b3750(0x1f9)]&&Array[_0x5b3750(0x1e7)](_0x2e4087[_0x5b3750(0x1f9)]))for(const _0xc833de of _0x2e4087['results']){_0xa1d89['push']({'file':_0xc833de['filename'],'line':_0xc833de['line_number']||0x1,'column':_0xc833de['col_offset']||0x1,'severity':this['mapBanditSeverity'](_0xc833de[_0x5b3750(0x22c)]),'rule':_0xc833de[_0x5b3750(0x1b9)],'message':_0xc833de[_0x5b3750(0x207)],'category':_0x5b3750(0x1b5),'scanner':'bandit','cwe':_0xc833de[_0x5b3750(0x1be)]?.['id']?_0x5b3750(0x229)+_0xc833de['issue_cwe']['id']:null,'confidence':_0xc833de[_0x5b3750(0x203)],'moreInfo':_0xc833de['more_info']});}return _0xa1d89;}async[a0_0x34cbb0(0x1fa)](_0x1d45ab,_0x5a396a,_0x456677={}){const _0x27c57c=a0_0x34cbb0;try{const {ESLint:_0x2d479f}=await import('eslint'),_0x15e3fe=new _0x2d479f({'overrideConfig':{'plugins':['security'],'extends':['plugin:security/recommended'],'parserOptions':{'ecmaVersion':'latest','sourceType':'module'}},'useEslintrc':![]}),_0x2e1b0f=await _0x15e3fe[_0x27c57c(0x20d)](_0x5a396a,{'filePath':_0x1d45ab});return this[_0x27c57c(0x1ca)](_0x2e1b0f,_0x1d45ab);}catch(_0x338b2a){return this[_0x27c57c(0x1df)]?.['error'](_0x27c57c(0x1fb),{'error':_0x338b2a[_0x27c57c(0x226)],'filePath':_0x1d45ab}),[];}}[a0_0x34cbb0(0x1ca)](_0x28708f,_0x394db2){const _0x1e89d9=a0_0x34cbb0,_0x137f8e=[];for(const _0x3344c4 of _0x28708f){if(_0x3344c4[_0x1e89d9(0x1b2)]&&Array[_0x1e89d9(0x1e7)](_0x3344c4[_0x1e89d9(0x1b2)]))for(const _0x2f2681 of _0x3344c4[_0x1e89d9(0x1b2)]){_0x2f2681['ruleId']&&_0x2f2681['ruleId']['startsWith']('security/')&&_0x137f8e['push']({'file':_0x394db2,'line':_0x2f2681['line']||0x1,'column':_0x2f2681['column']||0x1,'severity':this[_0x1e89d9(0x1ba)](_0x2f2681[_0x1e89d9(0x1d9)]),'rule':_0x2f2681['ruleId'],'message':_0x2f2681['message'],'category':'security','scanner':_0x1e89d9(0x1e5),'fixable':_0x2f2681[_0x1e89d9(0x1d8)]!==undefined});}}return _0x137f8e;}async[a0_0x34cbb0(0x1b4)](_0x20f08c,_0x4457ca={}){const _0x25abeb=a0_0x34cbb0;try{const _0x4cf6ac=a0_0x18cc67['join'](_0x20f08c,_0x25abeb(0x212));try{await a0_0x2dc2dc[_0x25abeb(0x1e3)](_0x4cf6ac);}catch{return this[_0x25abeb(0x1df)]?.['debug'](_0x25abeb(0x20e)),[];}const _0x2508ad=await execAsync(_0x25abeb(0x1f2),{'cwd':_0x20f08c,'maxBuffer':0xa*0x400*0x400,'timeout':0xea60}),_0x5384bc=JSON['parse'](_0x2508ad['stdout']);return this['parseNpmAuditResults'](_0x5384bc);}catch(_0x33b992){if(_0x33b992['stdout'])try{const _0x5434a2=JSON['parse'](_0x33b992['stdout']);return this['parseNpmAuditResults'](_0x5434a2);}catch(_0x35798d){this[_0x25abeb(0x1df)]?.[_0x25abeb(0x1e2)](_0x25abeb(0x206),{'error':_0x35798d['message']});}return[];}}['parseNpmAuditResults'](_0x23e32e){const _0x17d303=a0_0x34cbb0,_0x47e85e=[];if(_0x23e32e[_0x17d303(0x221)])for(const [_0x51e213,_0x26d6f2]of Object[_0x17d303(0x1bc)](_0x23e32e[_0x17d303(0x221)])){_0x47e85e[_0x17d303(0x217)]({'file':_0x17d303(0x212),'line':0x1,'column':0x1,'severity':this['mapNpmSeverity'](_0x26d6f2['severity']),'rule':'npm-'+(_0x26d6f2[_0x17d303(0x222)][0x0]?.[_0x17d303(0x1eb)]||'advisory'),'message':_0x51e213+':\x20'+(_0x26d6f2['via'][0x0]?.[_0x17d303(0x21c)]||'Security\x20vulnerability'),'category':_0x17d303(0x1b5),'scanner':_0x17d303(0x22b),'package':_0x51e213,'vulnerableVersions':_0x26d6f2['range'],'patchedVersions':_0x26d6f2['fixAvailable']?'Available':'None','cve':_0x26d6f2['via'][0x0]?.['cve'],'cvss':_0x26d6f2[_0x17d303(0x222)][0x0]?.['cvss'],'references':_0x26d6f2['via'][0x0]?.[_0x17d303(0x1cd)]?[_0x26d6f2[_0x17d303(0x222)][0x0]['url']]:[]});}return _0x47e85e;}async[a0_0x34cbb0(0x1e4)](_0x302807,_0x21e8a0={}){const _0x301cd1=a0_0x34cbb0;try{const requirementsPath=a0_0x18cc67[_0x301cd1(0x20a)](_0x302807,_0x301cd1(0x1cf));try{await a0_0x2dc2dc['access'](requirementsPath);}catch{return this[_0x301cd1(0x1df)]?.[_0x301cd1(0x208)]('No\x20requirements.txt\x20found,\x20skipping\x20pip-audit'),[];}const _0x3aa648=await execAsync('pip-audit\x20--format\x20json',{'cwd':_0x302807,'maxBuffer':0xa*0x400*0x400,'timeout':0xea60}),_0x4b2078=JSON[_0x301cd1(0x21a)](_0x3aa648['stdout']);return this['parsePipAuditResults'](_0x4b2078);}catch(_0x106ec5){if(_0x106ec5[_0x301cd1(0x216)])try{const _0x1fcb2e=JSON[_0x301cd1(0x21a)](_0x106ec5['stdout']);return this['parsePipAuditResults'](_0x1fcb2e);}catch(_0x4f0af1){this[_0x301cd1(0x1df)]?.['error']('Failed\x20to\x20parse\x20pip-audit\x20output',{'error':_0x4f0af1[_0x301cd1(0x226)]});}return[];}}[a0_0x34cbb0(0x1b8)](_0xa8d9fe){const _0x5c1b64=a0_0x34cbb0,_0x354367=[];if(_0xa8d9fe[_0x5c1b64(0x1c6)]&&Array['isArray'](_0xa8d9fe[_0x5c1b64(0x1c6)]))for(const _0x55a4c7 of _0xa8d9fe['dependencies']){if(_0x55a4c7['vulns']&&Array[_0x5c1b64(0x1e7)](_0x55a4c7[_0x5c1b64(0x1ec)]))for(const _0x1bd0e9 of _0x55a4c7[_0x5c1b64(0x1ec)]){_0x354367[_0x5c1b64(0x217)]({'file':_0x5c1b64(0x1cf),'line':0x1,'column':0x1,'severity':this['mapPipAuditSeverity'](_0x1bd0e9[_0x5c1b64(0x1d9)]),'rule':_0x1bd0e9['id'],'message':_0x55a4c7[_0x5c1b64(0x1dd)]+':\x20'+(_0x1bd0e9[_0x5c1b64(0x201)]||_0x5c1b64(0x1c9)),'category':'security','scanner':'pip-audit','package':_0x55a4c7['name'],'vulnerableVersion':_0x55a4c7['version'],'fixedVersions':_0x1bd0e9[_0x5c1b64(0x1c2)],'references':_0x1bd0e9['aliases']||[]});}}return _0x354367;}[a0_0x34cbb0(0x1f3)](_0x4d1604){const _0x3f5e62=a0_0x34cbb0,_0x581ae0=a0_0x18cc67['extname'](_0x4d1604)[_0x3f5e62(0x1bb)](),_0x405414={'.js':_0x3f5e62(0x1b1),'.jsx':_0x3f5e62(0x1b1),'.mjs':'javascript','.cjs':_0x3f5e62(0x1b1),'.ts':_0x3f5e62(0x209),'.tsx':_0x3f5e62(0x209),'.py':_0x3f5e62(0x219)};return _0x405414[_0x581ae0]||null;}['isTestFile'](_0x1768bf){const _0x345761=a0_0x34cbb0,_0x47df78=[/\.test\./,/\.spec\./,/__tests__\//,/\/tests?\//,/\.test$/,/\.spec$/];return _0x47df78['some'](_0x3139c8=>_0x3139c8[_0x345761(0x20f)](_0x1768bf));}[a0_0x34cbb0(0x1e8)](_0x35cce5,_0x67faa5){const _0x21fac3=a0_0x34cbb0;if(_0x67faa5===_0x21fac3(0x1b1)||_0x67faa5==='typescript')return _0x35cce5['semgrep']||_0x35cce5['eslintSecurity'];if(_0x67faa5===_0x21fac3(0x219))return _0x35cce5[_0x21fac3(0x1bf)]||_0x35cce5['semgrep'];return![];}[a0_0x34cbb0(0x1c0)](_0x44b3b0){const _0x5782ea=a0_0x34cbb0;return _0x44b3b0['map'](_0x1f4984=>({'file':_0x1f4984['file'],'line':_0x1f4984[_0x5782ea(0x1d2)]||0x1,'column':_0x1f4984['column']||0x1,'severity':_0x1f4984['severity']||STATIC_ANALYSIS['SEVERITY'][_0x5782ea(0x1c1)],'rule':_0x1f4984['rule']||_0x5782ea(0x1ce),'message':_0x1f4984[_0x5782ea(0x226)]||_0x5782ea(0x1d4),'category':'security','scanner':_0x1f4984[_0x5782ea(0x1f1)],'cwe':_0x1f4984[_0x5782ea(0x213)]||null,'owasp':_0x1f4984['owasp']||null,'confidence':_0x1f4984['confidence']||null,'fixable':_0x1f4984[_0x5782ea(0x1ef)]||![],'remediation':_0x1f4984[_0x5782ea(0x223)]||_0x1f4984['moreInfo']||null,'references':_0x1f4984['references']||[],'package':_0x1f4984[_0x5782ea(0x218)]||null}));}['mapSemgrepSeverity'](_0x29a071){const _0xb3029c=a0_0x34cbb0,_0x14295c={'ERROR':STATIC_ANALYSIS[_0xb3029c(0x1c4)][_0xb3029c(0x20c)],'WARNING':STATIC_ANALYSIS[_0xb3029c(0x1c4)]['ERROR'],'INFO':STATIC_ANALYSIS[_0xb3029c(0x1c4)]['WARNING']};return _0x14295c[_0x29a071?.[_0xb3029c(0x21f)]()]||STATIC_ANALYSIS[_0xb3029c(0x1c4)][_0xb3029c(0x1c1)];}[a0_0x34cbb0(0x1e0)](_0x5c7095){const _0x29420b=a0_0x34cbb0,_0x59aecf={'HIGH':STATIC_ANALYSIS['SEVERITY'][_0x29420b(0x20c)],'MEDIUM':STATIC_ANALYSIS[_0x29420b(0x1c4)]['ERROR'],'LOW':STATIC_ANALYSIS[_0x29420b(0x1c4)][_0x29420b(0x1c1)]};return _0x59aecf[_0x5c7095?.['toUpperCase']()]||STATIC_ANALYSIS['SEVERITY']['WARNING'];}[a0_0x34cbb0(0x1ba)](_0x309e3f){const _0x558943=a0_0x34cbb0;return _0x309e3f===0x2?STATIC_ANALYSIS[_0x558943(0x1c4)]['ERROR']:STATIC_ANALYSIS['SEVERITY']['WARNING'];}['mapNpmSeverity'](_0x17caa3){const _0x56519c=a0_0x34cbb0,_0x4a3dda={'critical':STATIC_ANALYSIS[_0x56519c(0x1c4)][_0x56519c(0x20c)],'high':STATIC_ANALYSIS[_0x56519c(0x1c4)][_0x56519c(0x20c)],'moderate':STATIC_ANALYSIS['SEVERITY']['ERROR'],'low':STATIC_ANALYSIS[_0x56519c(0x1c4)][_0x56519c(0x1c1)],'info':STATIC_ANALYSIS[_0x56519c(0x1c4)]['INFO']};return _0x4a3dda[_0x17caa3?.['toLowerCase']()]||STATIC_ANALYSIS['SEVERITY'][_0x56519c(0x1c1)];}[a0_0x34cbb0(0x1d3)](_0x3ebb9f){const _0x2bc320=a0_0x34cbb0;if(!_0x3ebb9f)return STATIC_ANALYSIS[_0x2bc320(0x1c4)]['ERROR'];const _0x20ccfa={'critical':STATIC_ANALYSIS['SEVERITY'][_0x2bc320(0x20c)],'high':STATIC_ANALYSIS[_0x2bc320(0x1c4)][_0x2bc320(0x20c)],'medium':STATIC_ANALYSIS[_0x2bc320(0x1c4)]['ERROR'],'low':STATIC_ANALYSIS['SEVERITY'][_0x2bc320(0x1c1)]};return _0x20ccfa[_0x3ebb9f?.[_0x2bc320(0x1bb)]()]||STATIC_ANALYSIS[_0x2bc320(0x1c4)]['ERROR'];}async['getScannerStatus'](){const _0x328e04=a0_0x34cbb0,_0x5c0fcd=await this[_0x328e04(0x220)]();return{'scanners':_0x5c0fcd,'recommendations':this[_0x328e04(0x1bd)](_0x5c0fcd)};}[a0_0x34cbb0(0x1bd)](_0x50fdaf){const _0x570a13=a0_0x34cbb0,_0xe4cc2=[];return!_0x50fdaf[_0x570a13(0x1f6)]&&_0xe4cc2[_0x570a13(0x217)]({'scanner':_0x570a13(0x21d),'reason':'Multi-language\x20SAST\x20with\x20extensive\x20security\x20rules','install':_0x570a13(0x1e9),'priority':'high'}),!_0x50fdaf['bandit']&&_0xe4cc2[_0x570a13(0x217)]({'scanner':_0x570a13(0x1db),'reason':'Python\x20security\x20scanner','install':_0x570a13(0x20b),'priority':'medium'}),!_0x50fdaf['eslintSecurity']&&_0xe4cc2[_0x570a13(0x217)]({'scanner':_0x570a13(0x1fc),'reason':_0x570a13(0x1ed),'install':'npm\x20install\x20--save-dev\x20eslint-plugin-security','priority':_0x570a13(0x1f8)}),!_0x50fdaf['pipAudit']&&_0xe4cc2[_0x570a13(0x217)]({'scanner':_0x570a13(0x1cb),'reason':'Python\x20dependency\x20vulnerability\x20scanner','install':'pip\x20install\x20pip-audit','priority':'low'}),_0xe4cc2;}}export default SecurityAnalyzer;