@loxia-labs/loxia-autopilot-one 1.0.1 → 1.0.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +44 -54
- package/bin/cli.js +1 -115
- package/bin/loxia-terminal-v2.js +3 -0
- package/bin/loxia-terminal.js +3 -0
- package/bin/start-with-terminal.js +3 -0
- package/package.json +15 -15
- package/scripts/install-scanners.js +1 -235
- package/src/analyzers/CSSAnalyzer.js +1 -297
- package/src/analyzers/ConfigValidator.js +1 -690
- package/src/analyzers/ESLintAnalyzer.js +1 -320
- package/src/analyzers/JavaScriptAnalyzer.js +1 -261
- package/src/analyzers/PrettierFormatter.js +1 -247
- package/src/analyzers/PythonAnalyzer.js +1 -266
- package/src/analyzers/SecurityAnalyzer.js +1 -729
- package/src/analyzers/TypeScriptAnalyzer.js +1 -247
- package/src/analyzers/codeCloneDetector/analyzer.js +1 -344
- package/src/analyzers/codeCloneDetector/detector.js +1 -203
- package/src/analyzers/codeCloneDetector/index.js +1 -160
- package/src/analyzers/codeCloneDetector/parser.js +1 -199
- package/src/analyzers/codeCloneDetector/reporter.js +1 -148
- package/src/analyzers/codeCloneDetector/scanner.js +1 -59
- package/src/core/agentPool.js +1 -1474
- package/src/core/agentScheduler.js +1 -2147
- package/src/core/contextManager.js +1 -709
- package/src/core/messageProcessor.js +1 -732
- package/src/core/orchestrator.js +1 -548
- package/src/core/stateManager.js +1 -877
- package/src/index.js +1 -631
- package/src/interfaces/cli.js +1 -549
- package/src/interfaces/terminal/__tests__/smoke/advancedFeatures.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/agentControl.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/agents.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/components.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/connection.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/enhancements.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/imports.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/messages.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/tools.test.js +1 -0
- package/src/interfaces/terminal/api/apiClient.js +1 -0
- package/src/interfaces/terminal/api/messageRouter.js +1 -0
- package/src/interfaces/terminal/api/session.js +1 -0
- package/src/interfaces/terminal/api/websocket.js +1 -0
- package/src/interfaces/terminal/components/AgentCreator.js +1 -0
- package/src/interfaces/terminal/components/AgentEditor.js +1 -0
- package/src/interfaces/terminal/components/AgentSwitcher.js +1 -0
- package/src/interfaces/terminal/components/ErrorBoundary.js +1 -0
- package/src/interfaces/terminal/components/ErrorPanel.js +1 -0
- package/src/interfaces/terminal/components/Header.js +1 -0
- package/src/interfaces/terminal/components/HelpPanel.js +1 -0
- package/src/interfaces/terminal/components/InputBox.js +1 -0
- package/src/interfaces/terminal/components/Layout.js +1 -0
- package/src/interfaces/terminal/components/LoadingSpinner.js +1 -0
- package/src/interfaces/terminal/components/MessageList.js +1 -0
- package/src/interfaces/terminal/components/MultilineTextInput.js +1 -0
- package/src/interfaces/terminal/components/SearchPanel.js +1 -0
- package/src/interfaces/terminal/components/SettingsPanel.js +1 -0
- package/src/interfaces/terminal/components/StatusBar.js +1 -0
- package/src/interfaces/terminal/components/TextInput.js +1 -0
- package/src/interfaces/terminal/config/agentEditorConstants.js +1 -0
- package/src/interfaces/terminal/config/constants.js +1 -0
- package/src/interfaces/terminal/index.js +1 -0
- package/src/interfaces/terminal/state/useAgentControl.js +1 -0
- package/src/interfaces/terminal/state/useAgents.js +1 -0
- package/src/interfaces/terminal/state/useConnection.js +1 -0
- package/src/interfaces/terminal/state/useMessages.js +1 -0
- package/src/interfaces/terminal/state/useTools.js +1 -0
- package/src/interfaces/terminal/utils/debugLogger.js +1 -0
- package/src/interfaces/terminal/utils/settingsStorage.js +1 -0
- package/src/interfaces/terminal/utils/theme.js +1 -0
- package/src/interfaces/webServer.js +1 -2162
- package/src/modules/fileExplorer/controller.js +1 -280
- package/src/modules/fileExplorer/index.js +1 -37
- package/src/modules/fileExplorer/middleware.js +1 -92
- package/src/modules/fileExplorer/routes.js +1 -125
- package/src/modules/fileExplorer/types.js +1 -44
- package/src/services/aiService.js +1 -1232
- package/src/services/apiKeyManager.js +1 -164
- package/src/services/benchmarkService.js +1 -366
- package/src/services/budgetService.js +1 -539
- package/src/services/contextInjectionService.js +1 -247
- package/src/services/conversationCompactionService.js +1 -637
- package/src/services/errorHandler.js +1 -810
- package/src/services/fileAttachmentService.js +1 -544
- package/src/services/modelRouterService.js +1 -366
- package/src/services/modelsService.js +1 -322
- package/src/services/qualityInspector.js +1 -796
- package/src/services/tokenCountingService.js +1 -536
- package/src/tools/agentCommunicationTool.js +1 -1344
- package/src/tools/agentDelayTool.js +1 -485
- package/src/tools/asyncToolManager.js +1 -604
- package/src/tools/baseTool.js +1 -800
- package/src/tools/browserTool.js +1 -920
- package/src/tools/cloneDetectionTool.js +1 -621
- package/src/tools/dependencyResolverTool.js +1 -1215
- package/src/tools/fileContentReplaceTool.js +1 -875
- package/src/tools/fileSystemTool.js +1 -1107
- package/src/tools/fileTreeTool.js +1 -853
- package/src/tools/imageTool.js +1 -901
- package/src/tools/importAnalyzerTool.js +1 -1060
- package/src/tools/jobDoneTool.js +1 -248
- package/src/tools/seekTool.js +1 -956
- package/src/tools/staticAnalysisTool.js +1 -1778
- package/src/tools/taskManagerTool.js +1 -2873
- package/src/tools/terminalTool.js +1 -2304
- package/src/tools/webTool.js +1 -1430
- package/src/types/agent.js +1 -519
- package/src/types/contextReference.js +1 -972
- package/src/types/conversation.js +1 -730
- package/src/types/toolCommand.js +1 -747
- package/src/utilities/attachmentValidator.js +1 -292
- package/src/utilities/configManager.js +1 -582
- package/src/utilities/constants.js +1 -722
- package/src/utilities/directoryAccessManager.js +1 -535
- package/src/utilities/fileProcessor.js +1 -307
- package/src/utilities/logger.js +1 -436
- package/src/utilities/tagParser.js +1 -1246
- package/src/utilities/toolConstants.js +1 -317
- package/web-ui/build/index.html +2 -2
- package/web-ui/build/static/{index-Dy2bYbOa.css → index-CClD1090.css} +1 -1
- package/web-ui/build/static/{index-CjkkcnFA.js → index-lCBai6dX.js} +66 -67
|
@@ -1,729 +1 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* SecurityAnalyzer - Professional security scanning using external tools
|
|
3
|
-
*
|
|
4
|
-
* Uses industry-standard security scanners:
|
|
5
|
-
* - Semgrep: Multi-language SAST
|
|
6
|
-
* - Bandit: Python security scanner
|
|
7
|
-
* - ESLint Security Plugin: JavaScript/TypeScript security
|
|
8
|
-
* - npm audit: Node.js dependency vulnerabilities
|
|
9
|
-
* - pip-audit: Python dependency vulnerabilities
|
|
10
|
-
*/
|
|
11
|
-
|
|
12
|
-
import { exec } from 'child_process';
|
|
13
|
-
import { promisify } from 'util';
|
|
14
|
-
import path from 'path';
|
|
15
|
-
import fs from 'fs/promises';
|
|
16
|
-
import { STATIC_ANALYSIS } from '../utilities/constants.js';
|
|
17
|
-
|
|
18
|
-
const execAsync = promisify(exec);
|
|
19
|
-
|
|
20
|
-
class SecurityAnalyzer {
|
|
21
|
-
constructor(logger = null) {
|
|
22
|
-
this.logger = logger;
|
|
23
|
-
this.availableScanners = null;
|
|
24
|
-
this.scannerCache = new Map(); // Cache scanner availability checks
|
|
25
|
-
|
|
26
|
-
// Path to locally installed scanners (from postinstall script)
|
|
27
|
-
this.localScannerDir = path.join(process.cwd(), 'node_modules', '.scanners');
|
|
28
|
-
}
|
|
29
|
-
|
|
30
|
-
/**
|
|
31
|
-
* Detect which security scanners are available on the system
|
|
32
|
-
* @returns {Promise<Object>} Available scanners
|
|
33
|
-
*/
|
|
34
|
-
async detectAvailableScanners() {
|
|
35
|
-
// Return cached result if available
|
|
36
|
-
if (this.availableScanners !== null) {
|
|
37
|
-
return this.availableScanners;
|
|
38
|
-
}
|
|
39
|
-
|
|
40
|
-
const available = {
|
|
41
|
-
semgrep: false,
|
|
42
|
-
bandit: false,
|
|
43
|
-
npmAudit: false,
|
|
44
|
-
pipAudit: false,
|
|
45
|
-
eslintSecurity: false
|
|
46
|
-
};
|
|
47
|
-
|
|
48
|
-
// Check for Semgrep (local first, then system)
|
|
49
|
-
try {
|
|
50
|
-
const localSemgrep = path.join(this.localScannerDir, 'semgrep');
|
|
51
|
-
try {
|
|
52
|
-
await fs.access(localSemgrep);
|
|
53
|
-
available.semgrep = true;
|
|
54
|
-
this.logger?.debug('Semgrep scanner detected (local)');
|
|
55
|
-
} catch {
|
|
56
|
-
await execAsync('semgrep --version', { timeout: 5000 });
|
|
57
|
-
available.semgrep = true;
|
|
58
|
-
this.logger?.debug('Semgrep scanner detected (system)');
|
|
59
|
-
}
|
|
60
|
-
} catch (error) {
|
|
61
|
-
this.logger?.debug('Semgrep not available', { error: error.message });
|
|
62
|
-
}
|
|
63
|
-
|
|
64
|
-
// Check for Bandit
|
|
65
|
-
try {
|
|
66
|
-
await execAsync('bandit --version', { timeout: 5000 });
|
|
67
|
-
available.bandit = true;
|
|
68
|
-
this.logger?.debug('Bandit scanner detected');
|
|
69
|
-
} catch (error) {
|
|
70
|
-
this.logger?.debug('Bandit not available', { error: error.message });
|
|
71
|
-
}
|
|
72
|
-
|
|
73
|
-
// Check for npm (npm audit is built-in)
|
|
74
|
-
try {
|
|
75
|
-
await execAsync('npm --version', { timeout: 5000 });
|
|
76
|
-
available.npmAudit = true;
|
|
77
|
-
this.logger?.debug('npm audit available');
|
|
78
|
-
} catch (error) {
|
|
79
|
-
this.logger?.debug('npm not available', { error: error.message });
|
|
80
|
-
}
|
|
81
|
-
|
|
82
|
-
// Check for pip-audit
|
|
83
|
-
try {
|
|
84
|
-
await execAsync('pip-audit --version', { timeout: 5000 });
|
|
85
|
-
available.pipAudit = true;
|
|
86
|
-
this.logger?.debug('pip-audit detected');
|
|
87
|
-
} catch (error) {
|
|
88
|
-
this.logger?.debug('pip-audit not available', { error: error.message });
|
|
89
|
-
}
|
|
90
|
-
|
|
91
|
-
// Check for eslint-plugin-security
|
|
92
|
-
try {
|
|
93
|
-
// Check if the package is installed
|
|
94
|
-
const result = await execAsync('npm list eslint-plugin-security --depth=0 --json', {
|
|
95
|
-
timeout: 5000,
|
|
96
|
-
cwd: process.cwd()
|
|
97
|
-
});
|
|
98
|
-
const parsed = JSON.parse(result.stdout);
|
|
99
|
-
if (parsed.dependencies && parsed.dependencies['eslint-plugin-security']) {
|
|
100
|
-
available.eslintSecurity = true;
|
|
101
|
-
this.logger?.debug('eslint-plugin-security detected');
|
|
102
|
-
}
|
|
103
|
-
} catch (error) {
|
|
104
|
-
this.logger?.debug('eslint-plugin-security not available', { error: error.message });
|
|
105
|
-
}
|
|
106
|
-
|
|
107
|
-
this.availableScanners = available;
|
|
108
|
-
return available;
|
|
109
|
-
}
|
|
110
|
-
|
|
111
|
-
/**
|
|
112
|
-
* Analyze a file for security vulnerabilities
|
|
113
|
-
* @param {string} filePath - Path to file
|
|
114
|
-
* @param {string} content - File content
|
|
115
|
-
* @param {Object} options - Analysis options
|
|
116
|
-
* @returns {Promise<Array>} Security issues found
|
|
117
|
-
*/
|
|
118
|
-
async analyze(filePath, content, options = {}) {
|
|
119
|
-
const issues = [];
|
|
120
|
-
const available = await this.detectAvailableScanners();
|
|
121
|
-
const language = this.detectLanguage(filePath);
|
|
122
|
-
|
|
123
|
-
// Skip test files if requested
|
|
124
|
-
if (options.skipTestFiles !== false && this.isTestFile(filePath)) {
|
|
125
|
-
this.logger?.debug('Skipping test file for security scan', { filePath });
|
|
126
|
-
return [];
|
|
127
|
-
}
|
|
128
|
-
|
|
129
|
-
// Run appropriate scanners based on language
|
|
130
|
-
if (language === 'javascript' || language === 'typescript') {
|
|
131
|
-
// Run Semgrep for JS/TS
|
|
132
|
-
if (available.semgrep) {
|
|
133
|
-
const semgrepIssues = await this.runSemgrep(filePath, [language], options);
|
|
134
|
-
issues.push(...semgrepIssues);
|
|
135
|
-
}
|
|
136
|
-
|
|
137
|
-
// Run ESLint Security Plugin
|
|
138
|
-
if (available.eslintSecurity) {
|
|
139
|
-
const eslintIssues = await this.runESLintSecurity(filePath, content, options);
|
|
140
|
-
issues.push(...eslintIssues);
|
|
141
|
-
}
|
|
142
|
-
}
|
|
143
|
-
|
|
144
|
-
if (language === 'python') {
|
|
145
|
-
// Run Bandit for Python
|
|
146
|
-
if (available.bandit) {
|
|
147
|
-
const banditIssues = await this.runBandit(filePath, options);
|
|
148
|
-
issues.push(...banditIssues);
|
|
149
|
-
}
|
|
150
|
-
|
|
151
|
-
// Run Semgrep for Python
|
|
152
|
-
if (available.semgrep) {
|
|
153
|
-
const semgrepIssues = await this.runSemgrep(filePath, [language], options);
|
|
154
|
-
issues.push(...semgrepIssues);
|
|
155
|
-
}
|
|
156
|
-
}
|
|
157
|
-
|
|
158
|
-
// If no scanners available, return informative message
|
|
159
|
-
if (issues.length === 0 && !this.hasScannersForLanguage(available, language)) {
|
|
160
|
-
this.logger?.warn('No security scanners available for language', { language, filePath });
|
|
161
|
-
}
|
|
162
|
-
|
|
163
|
-
return this.normalizeResults(issues);
|
|
164
|
-
}
|
|
165
|
-
|
|
166
|
-
/**
|
|
167
|
-
* Analyze a project directory for security vulnerabilities
|
|
168
|
-
* @param {string} projectDir - Project directory path
|
|
169
|
-
* @param {string} language - Primary language to scan
|
|
170
|
-
* @param {Object} options - Analysis options
|
|
171
|
-
* @returns {Promise<Array>} Security issues found
|
|
172
|
-
*/
|
|
173
|
-
async analyzeProject(projectDir, language, options = {}) {
|
|
174
|
-
const issues = [];
|
|
175
|
-
const available = await this.detectAvailableScanners();
|
|
176
|
-
|
|
177
|
-
// Run dependency scanners
|
|
178
|
-
if (language === 'javascript' || language === 'typescript') {
|
|
179
|
-
if (available.npmAudit) {
|
|
180
|
-
const npmIssues = await this.runNpmAudit(projectDir, options);
|
|
181
|
-
issues.push(...npmIssues);
|
|
182
|
-
}
|
|
183
|
-
}
|
|
184
|
-
|
|
185
|
-
if (language === 'python') {
|
|
186
|
-
if (available.pipAudit) {
|
|
187
|
-
const pipIssues = await this.runPipAudit(projectDir, options);
|
|
188
|
-
issues.push(...pipIssues);
|
|
189
|
-
}
|
|
190
|
-
}
|
|
191
|
-
|
|
192
|
-
return this.normalizeResults(issues);
|
|
193
|
-
}
|
|
194
|
-
|
|
195
|
-
/**
|
|
196
|
-
* Run Semgrep scanner
|
|
197
|
-
* @private
|
|
198
|
-
*/
|
|
199
|
-
async runSemgrep(filePath, languages, options = {}) {
|
|
200
|
-
try {
|
|
201
|
-
const dir = path.dirname(filePath);
|
|
202
|
-
const result = await execAsync(
|
|
203
|
-
`semgrep --config=auto --json "${filePath}"`,
|
|
204
|
-
{
|
|
205
|
-
maxBuffer: 10 * 1024 * 1024,
|
|
206
|
-
timeout: 30000,
|
|
207
|
-
cwd: dir
|
|
208
|
-
}
|
|
209
|
-
);
|
|
210
|
-
|
|
211
|
-
const output = JSON.parse(result.stdout);
|
|
212
|
-
return this.parseSemgrepResults(output);
|
|
213
|
-
} catch (error) {
|
|
214
|
-
// Semgrep exits with non-zero if issues found, check stdout
|
|
215
|
-
if (error.stdout) {
|
|
216
|
-
try {
|
|
217
|
-
const output = JSON.parse(error.stdout);
|
|
218
|
-
return this.parseSemgrepResults(output);
|
|
219
|
-
} catch (parseError) {
|
|
220
|
-
this.logger?.error('Failed to parse Semgrep output', {
|
|
221
|
-
error: parseError.message,
|
|
222
|
-
stdout: error.stdout
|
|
223
|
-
});
|
|
224
|
-
}
|
|
225
|
-
}
|
|
226
|
-
this.logger?.error('Semgrep scan failed', { error: error.message });
|
|
227
|
-
return [];
|
|
228
|
-
}
|
|
229
|
-
}
|
|
230
|
-
|
|
231
|
-
/**
|
|
232
|
-
* Parse Semgrep results
|
|
233
|
-
* @private
|
|
234
|
-
*/
|
|
235
|
-
parseSemgrepResults(output) {
|
|
236
|
-
const issues = [];
|
|
237
|
-
|
|
238
|
-
if (output.results && Array.isArray(output.results)) {
|
|
239
|
-
for (const result of output.results) {
|
|
240
|
-
issues.push({
|
|
241
|
-
file: result.path,
|
|
242
|
-
line: result.start?.line || 1,
|
|
243
|
-
column: result.start?.col || 1,
|
|
244
|
-
severity: this.mapSemgrepSeverity(result.extra?.severity),
|
|
245
|
-
rule: result.check_id,
|
|
246
|
-
message: result.extra?.message || result.extra?.lines || 'Security issue detected',
|
|
247
|
-
category: 'security',
|
|
248
|
-
scanner: 'semgrep',
|
|
249
|
-
cwe: result.extra?.metadata?.cwe,
|
|
250
|
-
owasp: result.extra?.metadata?.owasp,
|
|
251
|
-
confidence: result.extra?.metadata?.confidence,
|
|
252
|
-
references: result.extra?.metadata?.references
|
|
253
|
-
});
|
|
254
|
-
}
|
|
255
|
-
}
|
|
256
|
-
|
|
257
|
-
return issues;
|
|
258
|
-
}
|
|
259
|
-
|
|
260
|
-
/**
|
|
261
|
-
* Run Bandit scanner for Python
|
|
262
|
-
* @private
|
|
263
|
-
*/
|
|
264
|
-
async runBandit(filePath, options = {}) {
|
|
265
|
-
try {
|
|
266
|
-
const result = await execAsync(
|
|
267
|
-
`bandit -f json "${filePath}"`,
|
|
268
|
-
{
|
|
269
|
-
maxBuffer: 10 * 1024 * 1024,
|
|
270
|
-
timeout: 30000
|
|
271
|
-
}
|
|
272
|
-
);
|
|
273
|
-
|
|
274
|
-
const output = JSON.parse(result.stdout);
|
|
275
|
-
return this.parseBanditResults(output);
|
|
276
|
-
} catch (error) {
|
|
277
|
-
// Bandit exits with non-zero if issues found
|
|
278
|
-
if (error.stdout) {
|
|
279
|
-
try {
|
|
280
|
-
const output = JSON.parse(error.stdout);
|
|
281
|
-
return this.parseBanditResults(output);
|
|
282
|
-
} catch (parseError) {
|
|
283
|
-
this.logger?.error('Failed to parse Bandit output', {
|
|
284
|
-
error: parseError.message
|
|
285
|
-
});
|
|
286
|
-
}
|
|
287
|
-
}
|
|
288
|
-
this.logger?.error('Bandit scan failed', { error: error.message });
|
|
289
|
-
return [];
|
|
290
|
-
}
|
|
291
|
-
}
|
|
292
|
-
|
|
293
|
-
/**
|
|
294
|
-
* Parse Bandit results
|
|
295
|
-
* @private
|
|
296
|
-
*/
|
|
297
|
-
parseBanditResults(output) {
|
|
298
|
-
const issues = [];
|
|
299
|
-
|
|
300
|
-
if (output.results && Array.isArray(output.results)) {
|
|
301
|
-
for (const result of output.results) {
|
|
302
|
-
issues.push({
|
|
303
|
-
file: result.filename,
|
|
304
|
-
line: result.line_number || 1,
|
|
305
|
-
column: result.col_offset || 1,
|
|
306
|
-
severity: this.mapBanditSeverity(result.issue_severity),
|
|
307
|
-
rule: result.test_id,
|
|
308
|
-
message: result.issue_text,
|
|
309
|
-
category: 'security',
|
|
310
|
-
scanner: 'bandit',
|
|
311
|
-
cwe: result.issue_cwe?.id ? `CWE-${result.issue_cwe.id}` : null,
|
|
312
|
-
confidence: result.issue_confidence,
|
|
313
|
-
moreInfo: result.more_info
|
|
314
|
-
});
|
|
315
|
-
}
|
|
316
|
-
}
|
|
317
|
-
|
|
318
|
-
return issues;
|
|
319
|
-
}
|
|
320
|
-
|
|
321
|
-
/**
|
|
322
|
-
* Run ESLint with security plugin
|
|
323
|
-
* @private
|
|
324
|
-
*/
|
|
325
|
-
async runESLintSecurity(filePath, content, options = {}) {
|
|
326
|
-
try {
|
|
327
|
-
// Use ESLint programmatically
|
|
328
|
-
const { ESLint } = await import('eslint');
|
|
329
|
-
|
|
330
|
-
const eslint = new ESLint({
|
|
331
|
-
overrideConfig: {
|
|
332
|
-
plugins: ['security'],
|
|
333
|
-
extends: ['plugin:security/recommended'],
|
|
334
|
-
parserOptions: {
|
|
335
|
-
ecmaVersion: 'latest',
|
|
336
|
-
sourceType: 'module'
|
|
337
|
-
}
|
|
338
|
-
},
|
|
339
|
-
useEslintrc: false
|
|
340
|
-
});
|
|
341
|
-
|
|
342
|
-
const results = await eslint.lintText(content, { filePath });
|
|
343
|
-
return this.parseESLintResults(results, filePath);
|
|
344
|
-
} catch (error) {
|
|
345
|
-
this.logger?.error('ESLint security scan failed', {
|
|
346
|
-
error: error.message,
|
|
347
|
-
filePath
|
|
348
|
-
});
|
|
349
|
-
return [];
|
|
350
|
-
}
|
|
351
|
-
}
|
|
352
|
-
|
|
353
|
-
/**
|
|
354
|
-
* Parse ESLint security results
|
|
355
|
-
* @private
|
|
356
|
-
*/
|
|
357
|
-
parseESLintResults(results, filePath) {
|
|
358
|
-
const issues = [];
|
|
359
|
-
|
|
360
|
-
for (const result of results) {
|
|
361
|
-
if (result.messages && Array.isArray(result.messages)) {
|
|
362
|
-
for (const message of result.messages) {
|
|
363
|
-
// Only include security plugin rules
|
|
364
|
-
if (message.ruleId && message.ruleId.startsWith('security/')) {
|
|
365
|
-
issues.push({
|
|
366
|
-
file: filePath,
|
|
367
|
-
line: message.line || 1,
|
|
368
|
-
column: message.column || 1,
|
|
369
|
-
severity: this.mapESLintSeverity(message.severity),
|
|
370
|
-
rule: message.ruleId,
|
|
371
|
-
message: message.message,
|
|
372
|
-
category: 'security',
|
|
373
|
-
scanner: 'eslint-security',
|
|
374
|
-
fixable: message.fix !== undefined
|
|
375
|
-
});
|
|
376
|
-
}
|
|
377
|
-
}
|
|
378
|
-
}
|
|
379
|
-
}
|
|
380
|
-
|
|
381
|
-
return issues;
|
|
382
|
-
}
|
|
383
|
-
|
|
384
|
-
/**
|
|
385
|
-
* Run npm audit for dependency vulnerabilities
|
|
386
|
-
* @private
|
|
387
|
-
*/
|
|
388
|
-
async runNpmAudit(projectDir, options = {}) {
|
|
389
|
-
try {
|
|
390
|
-
// Check if package.json exists
|
|
391
|
-
const packageJsonPath = path.join(projectDir, 'package.json');
|
|
392
|
-
try {
|
|
393
|
-
await fs.access(packageJsonPath);
|
|
394
|
-
} catch {
|
|
395
|
-
this.logger?.debug('No package.json found, skipping npm audit');
|
|
396
|
-
return [];
|
|
397
|
-
}
|
|
398
|
-
|
|
399
|
-
const result = await execAsync(
|
|
400
|
-
'npm audit --json',
|
|
401
|
-
{
|
|
402
|
-
cwd: projectDir,
|
|
403
|
-
maxBuffer: 10 * 1024 * 1024,
|
|
404
|
-
timeout: 60000
|
|
405
|
-
}
|
|
406
|
-
);
|
|
407
|
-
|
|
408
|
-
const output = JSON.parse(result.stdout);
|
|
409
|
-
return this.parseNpmAuditResults(output);
|
|
410
|
-
} catch (error) {
|
|
411
|
-
// npm audit exits with non-zero if vulnerabilities found
|
|
412
|
-
if (error.stdout) {
|
|
413
|
-
try {
|
|
414
|
-
const output = JSON.parse(error.stdout);
|
|
415
|
-
return this.parseNpmAuditResults(output);
|
|
416
|
-
} catch (parseError) {
|
|
417
|
-
this.logger?.error('Failed to parse npm audit output', {
|
|
418
|
-
error: parseError.message
|
|
419
|
-
});
|
|
420
|
-
}
|
|
421
|
-
}
|
|
422
|
-
return [];
|
|
423
|
-
}
|
|
424
|
-
}
|
|
425
|
-
|
|
426
|
-
/**
|
|
427
|
-
* Parse npm audit results
|
|
428
|
-
* @private
|
|
429
|
-
*/
|
|
430
|
-
parseNpmAuditResults(output) {
|
|
431
|
-
const issues = [];
|
|
432
|
-
|
|
433
|
-
// npm audit v7+ format
|
|
434
|
-
if (output.vulnerabilities) {
|
|
435
|
-
for (const [packageName, vuln] of Object.entries(output.vulnerabilities)) {
|
|
436
|
-
issues.push({
|
|
437
|
-
file: 'package.json',
|
|
438
|
-
line: 1,
|
|
439
|
-
column: 1,
|
|
440
|
-
severity: this.mapNpmSeverity(vuln.severity),
|
|
441
|
-
rule: `npm-${vuln.via[0]?.source || 'advisory'}`,
|
|
442
|
-
message: `${packageName}: ${vuln.via[0]?.title || 'Security vulnerability'}`,
|
|
443
|
-
category: 'security',
|
|
444
|
-
scanner: 'npm-audit',
|
|
445
|
-
package: packageName,
|
|
446
|
-
vulnerableVersions: vuln.range,
|
|
447
|
-
patchedVersions: vuln.fixAvailable ? 'Available' : 'None',
|
|
448
|
-
cve: vuln.via[0]?.cve,
|
|
449
|
-
cvss: vuln.via[0]?.cvss,
|
|
450
|
-
references: vuln.via[0]?.url ? [vuln.via[0].url] : []
|
|
451
|
-
});
|
|
452
|
-
}
|
|
453
|
-
}
|
|
454
|
-
|
|
455
|
-
return issues;
|
|
456
|
-
}
|
|
457
|
-
|
|
458
|
-
/**
|
|
459
|
-
* Run pip-audit for Python dependencies
|
|
460
|
-
* @private
|
|
461
|
-
*/
|
|
462
|
-
async runPipAudit(projectDir, options = {}) {
|
|
463
|
-
try {
|
|
464
|
-
// Check if requirements.txt exists
|
|
465
|
-
const requirementsPath = path.join(projectDir, 'requirements.txt');
|
|
466
|
-
try {
|
|
467
|
-
await fs.access(requirementsPath);
|
|
468
|
-
} catch {
|
|
469
|
-
this.logger?.debug('No requirements.txt found, skipping pip-audit');
|
|
470
|
-
return [];
|
|
471
|
-
}
|
|
472
|
-
|
|
473
|
-
const result = await execAsync(
|
|
474
|
-
'pip-audit --format json',
|
|
475
|
-
{
|
|
476
|
-
cwd: projectDir,
|
|
477
|
-
maxBuffer: 10 * 1024 * 1024,
|
|
478
|
-
timeout: 60000
|
|
479
|
-
}
|
|
480
|
-
);
|
|
481
|
-
|
|
482
|
-
const output = JSON.parse(result.stdout);
|
|
483
|
-
return this.parsePipAuditResults(output);
|
|
484
|
-
} catch (error) {
|
|
485
|
-
if (error.stdout) {
|
|
486
|
-
try {
|
|
487
|
-
const output = JSON.parse(error.stdout);
|
|
488
|
-
return this.parsePipAuditResults(output);
|
|
489
|
-
} catch (parseError) {
|
|
490
|
-
this.logger?.error('Failed to parse pip-audit output', {
|
|
491
|
-
error: parseError.message
|
|
492
|
-
});
|
|
493
|
-
}
|
|
494
|
-
}
|
|
495
|
-
return [];
|
|
496
|
-
}
|
|
497
|
-
}
|
|
498
|
-
|
|
499
|
-
/**
|
|
500
|
-
* Parse pip-audit results
|
|
501
|
-
* @private
|
|
502
|
-
*/
|
|
503
|
-
parsePipAuditResults(output) {
|
|
504
|
-
const issues = [];
|
|
505
|
-
|
|
506
|
-
if (output.dependencies && Array.isArray(output.dependencies)) {
|
|
507
|
-
for (const dep of output.dependencies) {
|
|
508
|
-
if (dep.vulns && Array.isArray(dep.vulns)) {
|
|
509
|
-
for (const vuln of dep.vulns) {
|
|
510
|
-
issues.push({
|
|
511
|
-
file: 'requirements.txt',
|
|
512
|
-
line: 1,
|
|
513
|
-
column: 1,
|
|
514
|
-
severity: this.mapPipAuditSeverity(vuln.severity),
|
|
515
|
-
rule: vuln.id,
|
|
516
|
-
message: `${dep.name}: ${vuln.description || 'Security vulnerability'}`,
|
|
517
|
-
category: 'security',
|
|
518
|
-
scanner: 'pip-audit',
|
|
519
|
-
package: dep.name,
|
|
520
|
-
vulnerableVersion: dep.version,
|
|
521
|
-
fixedVersions: vuln.fix_versions,
|
|
522
|
-
references: vuln.aliases || []
|
|
523
|
-
});
|
|
524
|
-
}
|
|
525
|
-
}
|
|
526
|
-
}
|
|
527
|
-
}
|
|
528
|
-
|
|
529
|
-
return issues;
|
|
530
|
-
}
|
|
531
|
-
|
|
532
|
-
/**
|
|
533
|
-
* Detect language from file extension
|
|
534
|
-
* @private
|
|
535
|
-
*/
|
|
536
|
-
detectLanguage(filePath) {
|
|
537
|
-
const ext = path.extname(filePath).toLowerCase();
|
|
538
|
-
const languageMap = {
|
|
539
|
-
'.js': 'javascript',
|
|
540
|
-
'.jsx': 'javascript',
|
|
541
|
-
'.mjs': 'javascript',
|
|
542
|
-
'.cjs': 'javascript',
|
|
543
|
-
'.ts': 'typescript',
|
|
544
|
-
'.tsx': 'typescript',
|
|
545
|
-
'.py': 'python'
|
|
546
|
-
};
|
|
547
|
-
return languageMap[ext] || null;
|
|
548
|
-
}
|
|
549
|
-
|
|
550
|
-
/**
|
|
551
|
-
* Check if file is a test file
|
|
552
|
-
* @private
|
|
553
|
-
*/
|
|
554
|
-
isTestFile(filePath) {
|
|
555
|
-
const testPatterns = [
|
|
556
|
-
/\.test\./,
|
|
557
|
-
/\.spec\./,
|
|
558
|
-
/__tests__\//,
|
|
559
|
-
/\/tests?\//,
|
|
560
|
-
/\.test$/,
|
|
561
|
-
/\.spec$/
|
|
562
|
-
];
|
|
563
|
-
return testPatterns.some(pattern => pattern.test(filePath));
|
|
564
|
-
}
|
|
565
|
-
|
|
566
|
-
/**
|
|
567
|
-
* Check if scanners are available for a language
|
|
568
|
-
* @private
|
|
569
|
-
*/
|
|
570
|
-
hasScannersForLanguage(available, language) {
|
|
571
|
-
if (language === 'javascript' || language === 'typescript') {
|
|
572
|
-
return available.semgrep || available.eslintSecurity;
|
|
573
|
-
}
|
|
574
|
-
if (language === 'python') {
|
|
575
|
-
return available.bandit || available.semgrep;
|
|
576
|
-
}
|
|
577
|
-
return false;
|
|
578
|
-
}
|
|
579
|
-
|
|
580
|
-
/**
|
|
581
|
-
* Normalize all scanner results to common format
|
|
582
|
-
* @private
|
|
583
|
-
*/
|
|
584
|
-
normalizeResults(results) {
|
|
585
|
-
return results.map(result => ({
|
|
586
|
-
file: result.file,
|
|
587
|
-
line: result.line || 1,
|
|
588
|
-
column: result.column || 1,
|
|
589
|
-
severity: result.severity || STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
590
|
-
rule: result.rule || 'unknown',
|
|
591
|
-
message: result.message || 'Security issue detected',
|
|
592
|
-
category: 'security',
|
|
593
|
-
scanner: result.scanner,
|
|
594
|
-
cwe: result.cwe || null,
|
|
595
|
-
owasp: result.owasp || null,
|
|
596
|
-
confidence: result.confidence || null,
|
|
597
|
-
fixable: result.fixable || false,
|
|
598
|
-
remediation: result.remediation || result.moreInfo || null,
|
|
599
|
-
references: result.references || [],
|
|
600
|
-
package: result.package || null
|
|
601
|
-
}));
|
|
602
|
-
}
|
|
603
|
-
|
|
604
|
-
/**
|
|
605
|
-
* Map Semgrep severity to our standard
|
|
606
|
-
* @private
|
|
607
|
-
*/
|
|
608
|
-
mapSemgrepSeverity(severity) {
|
|
609
|
-
const map = {
|
|
610
|
-
'ERROR': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
611
|
-
'WARNING': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
612
|
-
'INFO': STATIC_ANALYSIS.SEVERITY.WARNING
|
|
613
|
-
};
|
|
614
|
-
return map[severity?.toUpperCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
615
|
-
}
|
|
616
|
-
|
|
617
|
-
/**
|
|
618
|
-
* Map Bandit severity to our standard
|
|
619
|
-
* @private
|
|
620
|
-
*/
|
|
621
|
-
mapBanditSeverity(severity) {
|
|
622
|
-
const map = {
|
|
623
|
-
'HIGH': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
624
|
-
'MEDIUM': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
625
|
-
'LOW': STATIC_ANALYSIS.SEVERITY.WARNING
|
|
626
|
-
};
|
|
627
|
-
return map[severity?.toUpperCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
628
|
-
}
|
|
629
|
-
|
|
630
|
-
/**
|
|
631
|
-
* Map ESLint severity to our standard
|
|
632
|
-
* @private
|
|
633
|
-
*/
|
|
634
|
-
mapESLintSeverity(severity) {
|
|
635
|
-
return severity === 2 ? STATIC_ANALYSIS.SEVERITY.ERROR : STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
636
|
-
}
|
|
637
|
-
|
|
638
|
-
/**
|
|
639
|
-
* Map npm audit severity to our standard
|
|
640
|
-
* @private
|
|
641
|
-
*/
|
|
642
|
-
mapNpmSeverity(severity) {
|
|
643
|
-
const map = {
|
|
644
|
-
'critical': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
645
|
-
'high': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
646
|
-
'moderate': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
647
|
-
'low': STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
648
|
-
'info': STATIC_ANALYSIS.SEVERITY.INFO
|
|
649
|
-
};
|
|
650
|
-
return map[severity?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
651
|
-
}
|
|
652
|
-
|
|
653
|
-
/**
|
|
654
|
-
* Map pip-audit severity to our standard
|
|
655
|
-
* @private
|
|
656
|
-
*/
|
|
657
|
-
mapPipAuditSeverity(severity) {
|
|
658
|
-
// pip-audit doesn't always provide severity, default to ERROR
|
|
659
|
-
if (!severity) return STATIC_ANALYSIS.SEVERITY.ERROR;
|
|
660
|
-
|
|
661
|
-
const map = {
|
|
662
|
-
'critical': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
663
|
-
'high': STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
664
|
-
'medium': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
665
|
-
'low': STATIC_ANALYSIS.SEVERITY.WARNING
|
|
666
|
-
};
|
|
667
|
-
return map[severity?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.ERROR;
|
|
668
|
-
}
|
|
669
|
-
|
|
670
|
-
/**
|
|
671
|
-
* Get scanner status report
|
|
672
|
-
* @returns {Promise<Object>} Scanner availability and status
|
|
673
|
-
*/
|
|
674
|
-
async getScannerStatus() {
|
|
675
|
-
const available = await this.detectAvailableScanners();
|
|
676
|
-
return {
|
|
677
|
-
scanners: available,
|
|
678
|
-
recommendations: this.getInstallRecommendations(available)
|
|
679
|
-
};
|
|
680
|
-
}
|
|
681
|
-
|
|
682
|
-
/**
|
|
683
|
-
* Get installation recommendations for missing scanners
|
|
684
|
-
* @private
|
|
685
|
-
*/
|
|
686
|
-
getInstallRecommendations(available) {
|
|
687
|
-
const recommendations = [];
|
|
688
|
-
|
|
689
|
-
if (!available.semgrep) {
|
|
690
|
-
recommendations.push({
|
|
691
|
-
scanner: 'Semgrep',
|
|
692
|
-
reason: 'Multi-language SAST with extensive security rules',
|
|
693
|
-
install: 'pip install semgrep OR use Docker: docker pull returntocorp/semgrep',
|
|
694
|
-
priority: 'high'
|
|
695
|
-
});
|
|
696
|
-
}
|
|
697
|
-
|
|
698
|
-
if (!available.bandit) {
|
|
699
|
-
recommendations.push({
|
|
700
|
-
scanner: 'Bandit',
|
|
701
|
-
reason: 'Python security scanner',
|
|
702
|
-
install: 'pip install bandit',
|
|
703
|
-
priority: 'medium'
|
|
704
|
-
});
|
|
705
|
-
}
|
|
706
|
-
|
|
707
|
-
if (!available.eslintSecurity) {
|
|
708
|
-
recommendations.push({
|
|
709
|
-
scanner: 'eslint-plugin-security',
|
|
710
|
-
reason: 'JavaScript/TypeScript security rules',
|
|
711
|
-
install: 'npm install --save-dev eslint-plugin-security',
|
|
712
|
-
priority: 'medium'
|
|
713
|
-
});
|
|
714
|
-
}
|
|
715
|
-
|
|
716
|
-
if (!available.pipAudit) {
|
|
717
|
-
recommendations.push({
|
|
718
|
-
scanner: 'pip-audit',
|
|
719
|
-
reason: 'Python dependency vulnerability scanner',
|
|
720
|
-
install: 'pip install pip-audit',
|
|
721
|
-
priority: 'low'
|
|
722
|
-
});
|
|
723
|
-
}
|
|
724
|
-
|
|
725
|
-
return recommendations;
|
|
726
|
-
}
|
|
727
|
-
}
|
|
728
|
-
|
|
729
|
-
export default SecurityAnalyzer;
|
|
1
|
+
const a0_0x34cbb0=a0_0x4c86;(function(_0x2217a0,_0x121a24){const _0xb4323d=a0_0x4c86,_0x13270a=_0x2217a0();while(!![]){try{const _0x3c4efb=-parseInt(_0xb4323d(0x22a))/0x1+-parseInt(_0xb4323d(0x21b))/0x2+-parseInt(_0xb4323d(0x1c8))/0x3*(parseInt(_0xb4323d(0x228))/0x4)+parseInt(_0xb4323d(0x1f5))/0x5+-parseInt(_0xb4323d(0x1f7))/0x6+parseInt(_0xb4323d(0x1ff))/0x7+-parseInt(_0xb4323d(0x1ee))/0x8*(-parseInt(_0xb4323d(0x1dc))/0x9);if(_0x3c4efb===_0x121a24)break;else _0x13270a['push'](_0x13270a['shift']());}catch(_0x22870e){_0x13270a['push'](_0x13270a['shift']());}}}(a0_0x328e,0x94cb2));import{exec}from'child_process';import{promisify}from'util';import a0_0x18cc67 from'path';import a0_0x2dc2dc from'fs/promises';import{STATIC_ANALYSIS}from'../utilities/constants.js';function a0_0x328e(){const _0x48def3=['y3DL','D2fYBG','CgLWlwf1zgL0ic0TDMvYC2LVBG','C3rKB3v0','ChvZAa','CgfJA2fNzq','ChL0Ag9U','CgfYC2u','mty2otCWohHTDLbgzG','DgL0Bgu','u2vTz3jLCa','y29S','Dg9vChbLCKnHC2u','zgv0zwn0qxzHAwXHyMXLu2nHBM5LCNm','DNvSBMvYywjPBgL0AwvZ','DMLH','CMvTzwrPyxrPB24','u2vTz3jLCcbZy2fUigzHAwXLza','yw5HBhL6zvbYB2PLy3q','BwvZC2fNzq','C3rHCNq','ndbnzKLLyKi','q1Dflq','mZq5ntu3zgLwvw96','BNbTlwf1zgL0','AxnZDwvFC2v2zxjPDhK','AMf2yxnJCMLWDa','BwvZC2fNzxm','CNvUu2vTz3jLCa','CNvUtNbTqxvKAxq','C2vJDxjPDhK','C2vTz3jLCcaTlwnVBMzPzZ1HDxrVic0TANnVBIaI','y29UzMLKzw5Jzq','CgfYC2vqAxbbDwrPDfjLC3vSDhm','DgvZDf9Pza','BwfWrvnmAw50u2v2zxjPDhK','Dg9mB3DLCKnHC2u','zw50CMLLCW','z2v0sw5ZDgfSBfjLy29TBwvUzgf0Aw9UCW','AxnZDwvFy3DL','yMfUzgL0','BM9YBwfSAxPLuMvZDwX0CW','v0fstKLorW','zML4x3zLCNnPB25Z','CgfYC2vcyw5KAxrszxn1BhrZ','u0vwrvjjvfK','C2vTz3jLCcaTlxzLCNnPB24','zgvWzw5Kzw5JAwvZ','CgLWlwf1zgL0igrLDgvJDgvK','mtq1mJCYDfjovM93','u2vJDxjPDhKGDNvSBMvYywjPBgL0Eq','CgfYC2vfu0XPBNrszxn1BhrZ','CgLWlwf1zgL0','y3DK','DxjS','Dw5RBM93BG','CMvXDwLYzw1LBNrZlNr4Da','yMfUzgL0ic1MigPZB24GiG','yxzHAwXHyMXLu2nHBM5LCNm','BgLUzq','BwfWugLWqxvKAxrtzxzLCML0Eq','u2vJDxjPDhKGAxnZDwuGzgv0zwn0zwq','CgLWqxvKAxq','B3DHC3a','zxnSAw50lxbSDwDPBI1Zzwn1CML0EsbKzxrLy3rLza','zML4','C2v2zxjPDhK','Bwv0ywrHDge','qMfUzgL0','mta3mwrjruvLrq','BMfTzq','tM8GC2vJDxjPDhKGC2nHBM5LCNmGyxzHAwXHyMXLigzVCIbSyw5NDwfNzq','Bg9Nz2vY','BwfWqMfUzgL0u2v2zxjPDhK','u2vTz3jLCcbZy2fUBMvYigrLDgvJDgvKicHZExn0zw0P','zxjYB3i','ywnJzxnZ','CNvUugLWqxvKAxq','zxnSAw50lxnLy3vYAxr5','CNvUqMfUzgL0','AxnbCNjHEq','AgfZu2nHBM5LCNngB3jmyw5NDwfNzq','CgLWigLUC3rHBgWGC2vTz3jLCcbpuIb1C2uGrg9JA2vYoIbKB2nRzxiGChvSBcbYzxr1CM50B2nVCNaVC2vTz3jLCa','Cgf0Aa','C291CMnL','DNvSBNm','sMf2yvnJCMLWDc9uExbLu2nYAxb0ihnLy3vYAxr5ihj1BgvZ','mtm0ntm2ruf5sM5t','zML4ywjSzq','qMfUzgL0ihnJyw4GzMfPBgvK','C2nHBM5LCG','BNbTigf1zgL0ic0TANnVBG','zgv0zwn0tgfUz3vHz2u','zxH0CMe','mJi4otmXnxL0quDUwq','C2vTz3jLCa','nJe0mJa3nfrruwLMDq','BwvKAxvT','CMvZDwX0CW','CNvUrvnmAw50u2vJDxjPDhK','rvnmAw50ihnLy3vYAxr5ihnJyw4GzMfPBgvK','zxnSAw50lxbSDwDPBI1Zzwn1CML0Eq','u2TPChbPBMCGDgvZDcbMAwXLigzVCIbZzwn1CML0EsbZy2fU','BNbTigf1zgL0igf2ywLSywjSzq','ntG5odKXnfrnthrkrG','qMfUzgL0ihnJyw5UzxiGzgv0zwn0zwq','zgvZy3jPChrPB24','zgLYBMfTzq','AxnZDwvFy29UzMLKzw5Jzq','rMfPBgvKihrVihbHCNnLifnLBwDYzxaGB3v0Chv0','CgfYC2vtzw1NCMvWuMvZDwX0CW','rMfPBgvKihrVihbHCNnLig5WBsbHDwrPDcbVDxrWDxq','AxnZDwvFDgv4Da','zgvIDwC','DhLWzxnJCMLWDa','AM9PBG','CgLWigLUC3rHBgWGyMfUzgL0','q1jjveLdquW','BgLUDfrLEhq','tM8GCgfJA2fNzs5QC29UigzVDw5KlcbZA2LWCgLUzYbUCg0GyxvKAxq','DgvZDa','C2nHBM5LCKnHy2HL','yMfUzgL0ic0TDMvYC2LVBG','CgfJA2fNzs5QC29U'];a0_0x328e=function(){return _0x48def3;};return a0_0x328e();}const execAsync=promisify(exec);function a0_0x4c86(_0x238ed2,_0x4ea9a9){_0x238ed2=_0x238ed2-0x1b1;const _0x328eba=a0_0x328e();let _0x4c86cd=_0x328eba[_0x238ed2];if(a0_0x4c86['lbrQGt']===undefined){var _0x9959f2=function(_0x3076c9){const _0x526e8c='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+/=';let _0x18cc67='',_0x2dc2dc='';for(let _0x560191=0x0,_0x2c43ab,_0x360222,_0x3e6165=0x0;_0x360222=_0x3076c9['charAt'](_0x3e6165++);~_0x360222&&(_0x2c43ab=_0x560191%0x4?_0x2c43ab*0x40+_0x360222:_0x360222,_0x560191++%0x4)?_0x18cc67+=String['fromCharCode'](0xff&_0x2c43ab>>(-0x2*_0x560191&0x6)):0x0){_0x360222=_0x526e8c['indexOf'](_0x360222);}for(let _0x3893f2=0x0,_0x42a3ae=_0x18cc67['length'];_0x3893f2<_0x42a3ae;_0x3893f2++){_0x2dc2dc+='%'+('00'+_0x18cc67['charCodeAt'](_0x3893f2)['toString'](0x10))['slice'](-0x2);}return decodeURIComponent(_0x2dc2dc);};a0_0x4c86['cAXagX']=_0x9959f2,a0_0x4c86['rOCZUP']={},a0_0x4c86['lbrQGt']=!![];}const _0x345594=_0x328eba[0x0],_0x3f292c=_0x238ed2+_0x345594,_0x212086=a0_0x4c86['rOCZUP'][_0x3f292c];return!_0x212086?(_0x4c86cd=a0_0x4c86['cAXagX'](_0x4c86cd),a0_0x4c86['rOCZUP'][_0x3f292c]=_0x4c86cd):_0x4c86cd=_0x212086,_0x4c86cd;}class SecurityAnalyzer{constructor(_0x560191=null){const _0x348e84=a0_0x4c86;this[_0x348e84(0x1df)]=_0x560191,this[_0x348e84(0x1d1)]=null,this[_0x348e84(0x210)]=new Map(),this['localScannerDir']=a0_0x18cc67[_0x348e84(0x20a)](process['cwd'](),'node_modules','.scanners');}async[a0_0x34cbb0(0x220)](){const _0xa2496=a0_0x34cbb0;if(this[_0xa2496(0x1d1)]!==null)return this['availableScanners'];const _0x2c43ab={'semgrep':![],'bandit':![],'npmAudit':![],'pipAudit':![],'eslintSecurity':![]};try{const _0x360222=a0_0x18cc67[_0xa2496(0x20a)](this['localScannerDir'],'semgrep');try{await a0_0x2dc2dc['access'](_0x360222),_0x2c43ab[_0xa2496(0x1f6)]=!![],this['logger']?.[_0xa2496(0x208)]('Semgrep\x20scanner\x20detected\x20(local)');}catch{await execAsync(_0xa2496(0x1c5),{'timeout':0x1388}),_0x2c43ab['semgrep']=!![],this['logger']?.['debug'](_0xa2496(0x1e1));}}catch(_0x3e6165){this[_0xa2496(0x1df)]?.[_0xa2496(0x208)]('Semgrep\x20not\x20available',{'error':_0x3e6165[_0xa2496(0x226)]});}try{await execAsync(_0xa2496(0x211),{'timeout':0x1388}),_0x2c43ab[_0xa2496(0x1bf)]=!![],this['logger']?.['debug'](_0xa2496(0x200));}catch(_0x3893f2){this[_0xa2496(0x1df)]?.['debug']('Bandit\x20not\x20available',{'error':_0x3893f2['message']});}try{await execAsync('npm\x20--version',{'timeout':0x1388}),_0x2c43ab['npmAudit']=!![],this['logger']?.['debug'](_0xa2496(0x1fe));}catch(_0x42a3ae){this[_0xa2496(0x1df)]?.['debug']('npm\x20not\x20available',{'error':_0x42a3ae['message']});}try{await execAsync(_0xa2496(0x215),{'timeout':0x1388}),_0x2c43ab['pipAudit']=!![],this['logger']?.['debug'](_0xa2496(0x1c7));}catch(_0x4236f0){this['logger']?.['debug']('pip-audit\x20not\x20available',{'error':_0x4236f0[_0xa2496(0x226)]});}try{const _0x2c10c8=await execAsync('npm\x20list\x20eslint-plugin-security\x20--depth=0\x20--json',{'timeout':0x1388,'cwd':process[_0xa2496(0x1cc)]()}),_0x31d8fb=JSON[_0xa2496(0x21a)](_0x2c10c8['stdout']);_0x31d8fb['dependencies']&&_0x31d8fb[_0xa2496(0x1c6)][_0xa2496(0x1fc)]&&(_0x2c43ab['eslintSecurity']=!![],this['logger']?.[_0xa2496(0x208)](_0xa2496(0x1d7)));}catch(_0x1762f2){this[_0xa2496(0x1df)]?.['debug']('eslint-plugin-security\x20not\x20available',{'error':_0x1762f2['message']});}return this['availableScanners']=_0x2c43ab,_0x2c43ab;}async['analyze'](_0x13176b,_0x192520,_0x398947={}){const _0x350cf5=a0_0x34cbb0,_0x1536fd=[],_0x5e2ec8=await this[_0x350cf5(0x220)](),_0xea5f61=this[_0x350cf5(0x1f3)](_0x13176b);if(_0x398947['skipTestFiles']!==![]&&this['isTestFile'](_0x13176b))return this['logger']?.[_0x350cf5(0x208)](_0x350cf5(0x1fd),{'filePath':_0x13176b}),[];if(_0xea5f61==='javascript'||_0xea5f61==='typescript'){if(_0x5e2ec8['semgrep']){const _0x2acc0f=await this[_0x350cf5(0x1b3)](_0x13176b,[_0xea5f61],_0x398947);_0x1536fd['push'](..._0x2acc0f);}if(_0x5e2ec8['eslintSecurity']){const _0x39ff40=await this['runESLintSecurity'](_0x13176b,_0x192520,_0x398947);_0x1536fd['push'](..._0x39ff40);}}if(_0xea5f61==='python'){if(_0x5e2ec8[_0x350cf5(0x1bf)]){const _0x4179a8=await this[_0x350cf5(0x1e6)](_0x13176b,_0x398947);_0x1536fd['push'](..._0x4179a8);}if(_0x5e2ec8['semgrep']){const _0x274c86=await this['runSemgrep'](_0x13176b,[_0xea5f61],_0x398947);_0x1536fd['push'](..._0x274c86);}}return _0x1536fd['length']===0x0&&!this['hasScannersForLanguage'](_0x5e2ec8,_0xea5f61)&&this[_0x350cf5(0x1df)]?.[_0x350cf5(0x214)](_0x350cf5(0x1de),{'language':_0xea5f61,'filePath':_0x13176b}),this[_0x350cf5(0x1c0)](_0x1536fd);}async[a0_0x34cbb0(0x225)](_0x10f851,_0x3f806b,_0x28e29f={}){const _0x4873bd=a0_0x34cbb0,_0x1176f0=[],_0x3c7270=await this['detectAvailableScanners']();if(_0x3f806b==='javascript'||_0x3f806b===_0x4873bd(0x209)){if(_0x3c7270['npmAudit']){const _0x45dc06=await this[_0x4873bd(0x1b4)](_0x10f851,_0x28e29f);_0x1176f0['push'](..._0x45dc06);}}if(_0x3f806b===_0x4873bd(0x219)){if(_0x3c7270[_0x4873bd(0x1d5)]){const _0x272071=await this[_0x4873bd(0x1e4)](_0x10f851,_0x28e29f);_0x1176f0['push'](..._0x272071);}}return this['normalizeResults'](_0x1176f0);}async['runSemgrep'](_0x4668c4,_0x5367b6,_0x2fedb2={}){const _0x2ab0a4=a0_0x34cbb0;try{const _0x35c0da=a0_0x18cc67[_0x2ab0a4(0x202)](_0x4668c4),_0x355744=await execAsync(_0x2ab0a4(0x1b6)+_0x4668c4+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530,'cwd':_0x35c0da}),_0x6c784e=JSON['parse'](_0x355744[_0x2ab0a4(0x216)]);return this[_0x2ab0a4(0x205)](_0x6c784e);}catch(_0x22c17c){if(_0x22c17c[_0x2ab0a4(0x216)])try{const _0x54474e=JSON['parse'](_0x22c17c[_0x2ab0a4(0x216)]);return this['parseSemgrepResults'](_0x54474e);}catch(_0x177985){this[_0x2ab0a4(0x1df)]?.['error'](_0x2ab0a4(0x204),{'error':_0x177985['message'],'stdout':_0x22c17c['stdout']});}return this[_0x2ab0a4(0x1df)]?.[_0x2ab0a4(0x1e2)](_0x2ab0a4(0x224),{'error':_0x22c17c[_0x2ab0a4(0x226)]}),[];}}[a0_0x34cbb0(0x205)](_0x335e89){const _0x319ef8=a0_0x34cbb0,_0x51e0fa=[];if(_0x335e89['results']&&Array[_0x319ef8(0x1e7)](_0x335e89[_0x319ef8(0x1f9)]))for(const _0x24c657 of _0x335e89[_0x319ef8(0x1f9)]){_0x51e0fa['push']({'file':_0x24c657[_0x319ef8(0x1ea)],'line':_0x24c657[_0x319ef8(0x227)]?.['line']||0x1,'column':_0x24c657[_0x319ef8(0x227)]?.[_0x319ef8(0x21e)]||0x1,'severity':this['mapSemgrepSeverity'](_0x24c657[_0x319ef8(0x1f4)]?.[_0x319ef8(0x1d9)]),'rule':_0x24c657['check_id'],'message':_0x24c657['extra']?.['message']||_0x24c657[_0x319ef8(0x1f4)]?.['lines']||'Security\x20issue\x20detected','category':'security','scanner':_0x319ef8(0x1f6),'cwe':_0x24c657['extra']?.['metadata']?.[_0x319ef8(0x213)],'owasp':_0x24c657[_0x319ef8(0x1f4)]?.['metadata']?.[_0x319ef8(0x1d6)],'confidence':_0x24c657[_0x319ef8(0x1f4)]?.['metadata']?.[_0x319ef8(0x1b7)],'references':_0x24c657['extra']?.[_0x319ef8(0x1da)]?.['references']});}return _0x51e0fa;}async[a0_0x34cbb0(0x1e6)](_0x4f756d,_0x5a8e1f={}){const _0x4c7223=a0_0x34cbb0;try{const _0x4af802=await execAsync(_0x4c7223(0x1d0)+_0x4f756d+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530}),_0x508408=JSON['parse'](_0x4af802['stdout']);return this[_0x4c7223(0x1c3)](_0x508408);}catch(_0x22f453){if(_0x22f453[_0x4c7223(0x216)])try{const _0x55d27e=JSON[_0x4c7223(0x21a)](_0x22f453['stdout']);return this['parseBanditResults'](_0x55d27e);}catch(_0x4bb8f9){this[_0x4c7223(0x1df)]?.['error']('Failed\x20to\x20parse\x20Bandit\x20output',{'error':_0x4bb8f9[_0x4c7223(0x226)]});}return this['logger']?.['error'](_0x4c7223(0x1f0),{'error':_0x22f453[_0x4c7223(0x226)]}),[];}}[a0_0x34cbb0(0x1c3)](_0x2e4087){const _0x5b3750=a0_0x34cbb0,_0xa1d89=[];if(_0x2e4087[_0x5b3750(0x1f9)]&&Array[_0x5b3750(0x1e7)](_0x2e4087[_0x5b3750(0x1f9)]))for(const _0xc833de of _0x2e4087['results']){_0xa1d89['push']({'file':_0xc833de['filename'],'line':_0xc833de['line_number']||0x1,'column':_0xc833de['col_offset']||0x1,'severity':this['mapBanditSeverity'](_0xc833de[_0x5b3750(0x22c)]),'rule':_0xc833de[_0x5b3750(0x1b9)],'message':_0xc833de[_0x5b3750(0x207)],'category':_0x5b3750(0x1b5),'scanner':'bandit','cwe':_0xc833de[_0x5b3750(0x1be)]?.['id']?_0x5b3750(0x229)+_0xc833de['issue_cwe']['id']:null,'confidence':_0xc833de[_0x5b3750(0x203)],'moreInfo':_0xc833de['more_info']});}return _0xa1d89;}async[a0_0x34cbb0(0x1fa)](_0x1d45ab,_0x5a396a,_0x456677={}){const _0x27c57c=a0_0x34cbb0;try{const {ESLint:_0x2d479f}=await import('eslint'),_0x15e3fe=new _0x2d479f({'overrideConfig':{'plugins':['security'],'extends':['plugin:security/recommended'],'parserOptions':{'ecmaVersion':'latest','sourceType':'module'}},'useEslintrc':![]}),_0x2e1b0f=await _0x15e3fe[_0x27c57c(0x20d)](_0x5a396a,{'filePath':_0x1d45ab});return this[_0x27c57c(0x1ca)](_0x2e1b0f,_0x1d45ab);}catch(_0x338b2a){return this[_0x27c57c(0x1df)]?.['error'](_0x27c57c(0x1fb),{'error':_0x338b2a[_0x27c57c(0x226)],'filePath':_0x1d45ab}),[];}}[a0_0x34cbb0(0x1ca)](_0x28708f,_0x394db2){const _0x1e89d9=a0_0x34cbb0,_0x137f8e=[];for(const _0x3344c4 of _0x28708f){if(_0x3344c4[_0x1e89d9(0x1b2)]&&Array[_0x1e89d9(0x1e7)](_0x3344c4[_0x1e89d9(0x1b2)]))for(const _0x2f2681 of _0x3344c4[_0x1e89d9(0x1b2)]){_0x2f2681['ruleId']&&_0x2f2681['ruleId']['startsWith']('security/')&&_0x137f8e['push']({'file':_0x394db2,'line':_0x2f2681['line']||0x1,'column':_0x2f2681['column']||0x1,'severity':this[_0x1e89d9(0x1ba)](_0x2f2681[_0x1e89d9(0x1d9)]),'rule':_0x2f2681['ruleId'],'message':_0x2f2681['message'],'category':'security','scanner':_0x1e89d9(0x1e5),'fixable':_0x2f2681[_0x1e89d9(0x1d8)]!==undefined});}}return _0x137f8e;}async[a0_0x34cbb0(0x1b4)](_0x20f08c,_0x4457ca={}){const _0x25abeb=a0_0x34cbb0;try{const _0x4cf6ac=a0_0x18cc67['join'](_0x20f08c,_0x25abeb(0x212));try{await a0_0x2dc2dc[_0x25abeb(0x1e3)](_0x4cf6ac);}catch{return this[_0x25abeb(0x1df)]?.['debug'](_0x25abeb(0x20e)),[];}const _0x2508ad=await execAsync(_0x25abeb(0x1f2),{'cwd':_0x20f08c,'maxBuffer':0xa*0x400*0x400,'timeout':0xea60}),_0x5384bc=JSON['parse'](_0x2508ad['stdout']);return this['parseNpmAuditResults'](_0x5384bc);}catch(_0x33b992){if(_0x33b992['stdout'])try{const _0x5434a2=JSON['parse'](_0x33b992['stdout']);return this['parseNpmAuditResults'](_0x5434a2);}catch(_0x35798d){this[_0x25abeb(0x1df)]?.[_0x25abeb(0x1e2)](_0x25abeb(0x206),{'error':_0x35798d['message']});}return[];}}['parseNpmAuditResults'](_0x23e32e){const _0x17d303=a0_0x34cbb0,_0x47e85e=[];if(_0x23e32e[_0x17d303(0x221)])for(const [_0x51e213,_0x26d6f2]of Object[_0x17d303(0x1bc)](_0x23e32e[_0x17d303(0x221)])){_0x47e85e[_0x17d303(0x217)]({'file':_0x17d303(0x212),'line':0x1,'column':0x1,'severity':this['mapNpmSeverity'](_0x26d6f2['severity']),'rule':'npm-'+(_0x26d6f2[_0x17d303(0x222)][0x0]?.[_0x17d303(0x1eb)]||'advisory'),'message':_0x51e213+':\x20'+(_0x26d6f2['via'][0x0]?.[_0x17d303(0x21c)]||'Security\x20vulnerability'),'category':_0x17d303(0x1b5),'scanner':_0x17d303(0x22b),'package':_0x51e213,'vulnerableVersions':_0x26d6f2['range'],'patchedVersions':_0x26d6f2['fixAvailable']?'Available':'None','cve':_0x26d6f2['via'][0x0]?.['cve'],'cvss':_0x26d6f2[_0x17d303(0x222)][0x0]?.['cvss'],'references':_0x26d6f2['via'][0x0]?.[_0x17d303(0x1cd)]?[_0x26d6f2[_0x17d303(0x222)][0x0]['url']]:[]});}return _0x47e85e;}async[a0_0x34cbb0(0x1e4)](_0x302807,_0x21e8a0={}){const _0x301cd1=a0_0x34cbb0;try{const requirementsPath=a0_0x18cc67[_0x301cd1(0x20a)](_0x302807,_0x301cd1(0x1cf));try{await a0_0x2dc2dc['access'](requirementsPath);}catch{return this[_0x301cd1(0x1df)]?.[_0x301cd1(0x208)]('No\x20requirements.txt\x20found,\x20skipping\x20pip-audit'),[];}const _0x3aa648=await execAsync('pip-audit\x20--format\x20json',{'cwd':_0x302807,'maxBuffer':0xa*0x400*0x400,'timeout':0xea60}),_0x4b2078=JSON[_0x301cd1(0x21a)](_0x3aa648['stdout']);return this['parsePipAuditResults'](_0x4b2078);}catch(_0x106ec5){if(_0x106ec5[_0x301cd1(0x216)])try{const _0x1fcb2e=JSON[_0x301cd1(0x21a)](_0x106ec5['stdout']);return this['parsePipAuditResults'](_0x1fcb2e);}catch(_0x4f0af1){this[_0x301cd1(0x1df)]?.['error']('Failed\x20to\x20parse\x20pip-audit\x20output',{'error':_0x4f0af1[_0x301cd1(0x226)]});}return[];}}[a0_0x34cbb0(0x1b8)](_0xa8d9fe){const _0x5c1b64=a0_0x34cbb0,_0x354367=[];if(_0xa8d9fe[_0x5c1b64(0x1c6)]&&Array['isArray'](_0xa8d9fe[_0x5c1b64(0x1c6)]))for(const _0x55a4c7 of _0xa8d9fe['dependencies']){if(_0x55a4c7['vulns']&&Array[_0x5c1b64(0x1e7)](_0x55a4c7[_0x5c1b64(0x1ec)]))for(const _0x1bd0e9 of _0x55a4c7[_0x5c1b64(0x1ec)]){_0x354367[_0x5c1b64(0x217)]({'file':_0x5c1b64(0x1cf),'line':0x1,'column':0x1,'severity':this['mapPipAuditSeverity'](_0x1bd0e9[_0x5c1b64(0x1d9)]),'rule':_0x1bd0e9['id'],'message':_0x55a4c7[_0x5c1b64(0x1dd)]+':\x20'+(_0x1bd0e9[_0x5c1b64(0x201)]||_0x5c1b64(0x1c9)),'category':'security','scanner':'pip-audit','package':_0x55a4c7['name'],'vulnerableVersion':_0x55a4c7['version'],'fixedVersions':_0x1bd0e9[_0x5c1b64(0x1c2)],'references':_0x1bd0e9['aliases']||[]});}}return _0x354367;}[a0_0x34cbb0(0x1f3)](_0x4d1604){const _0x3f5e62=a0_0x34cbb0,_0x581ae0=a0_0x18cc67['extname'](_0x4d1604)[_0x3f5e62(0x1bb)](),_0x405414={'.js':_0x3f5e62(0x1b1),'.jsx':_0x3f5e62(0x1b1),'.mjs':'javascript','.cjs':_0x3f5e62(0x1b1),'.ts':_0x3f5e62(0x209),'.tsx':_0x3f5e62(0x209),'.py':_0x3f5e62(0x219)};return _0x405414[_0x581ae0]||null;}['isTestFile'](_0x1768bf){const _0x345761=a0_0x34cbb0,_0x47df78=[/\.test\./,/\.spec\./,/__tests__\//,/\/tests?\//,/\.test$/,/\.spec$/];return _0x47df78['some'](_0x3139c8=>_0x3139c8[_0x345761(0x20f)](_0x1768bf));}[a0_0x34cbb0(0x1e8)](_0x35cce5,_0x67faa5){const _0x21fac3=a0_0x34cbb0;if(_0x67faa5===_0x21fac3(0x1b1)||_0x67faa5==='typescript')return _0x35cce5['semgrep']||_0x35cce5['eslintSecurity'];if(_0x67faa5===_0x21fac3(0x219))return _0x35cce5[_0x21fac3(0x1bf)]||_0x35cce5['semgrep'];return![];}[a0_0x34cbb0(0x1c0)](_0x44b3b0){const _0x5782ea=a0_0x34cbb0;return _0x44b3b0['map'](_0x1f4984=>({'file':_0x1f4984['file'],'line':_0x1f4984[_0x5782ea(0x1d2)]||0x1,'column':_0x1f4984['column']||0x1,'severity':_0x1f4984['severity']||STATIC_ANALYSIS['SEVERITY'][_0x5782ea(0x1c1)],'rule':_0x1f4984['rule']||_0x5782ea(0x1ce),'message':_0x1f4984[_0x5782ea(0x226)]||_0x5782ea(0x1d4),'category':'security','scanner':_0x1f4984[_0x5782ea(0x1f1)],'cwe':_0x1f4984[_0x5782ea(0x213)]||null,'owasp':_0x1f4984['owasp']||null,'confidence':_0x1f4984['confidence']||null,'fixable':_0x1f4984[_0x5782ea(0x1ef)]||![],'remediation':_0x1f4984[_0x5782ea(0x223)]||_0x1f4984['moreInfo']||null,'references':_0x1f4984['references']||[],'package':_0x1f4984[_0x5782ea(0x218)]||null}));}['mapSemgrepSeverity'](_0x29a071){const _0xb3029c=a0_0x34cbb0,_0x14295c={'ERROR':STATIC_ANALYSIS[_0xb3029c(0x1c4)][_0xb3029c(0x20c)],'WARNING':STATIC_ANALYSIS[_0xb3029c(0x1c4)]['ERROR'],'INFO':STATIC_ANALYSIS[_0xb3029c(0x1c4)]['WARNING']};return _0x14295c[_0x29a071?.[_0xb3029c(0x21f)]()]||STATIC_ANALYSIS[_0xb3029c(0x1c4)][_0xb3029c(0x1c1)];}[a0_0x34cbb0(0x1e0)](_0x5c7095){const _0x29420b=a0_0x34cbb0,_0x59aecf={'HIGH':STATIC_ANALYSIS['SEVERITY'][_0x29420b(0x20c)],'MEDIUM':STATIC_ANALYSIS[_0x29420b(0x1c4)]['ERROR'],'LOW':STATIC_ANALYSIS[_0x29420b(0x1c4)][_0x29420b(0x1c1)]};return _0x59aecf[_0x5c7095?.['toUpperCase']()]||STATIC_ANALYSIS['SEVERITY']['WARNING'];}[a0_0x34cbb0(0x1ba)](_0x309e3f){const _0x558943=a0_0x34cbb0;return _0x309e3f===0x2?STATIC_ANALYSIS[_0x558943(0x1c4)]['ERROR']:STATIC_ANALYSIS['SEVERITY']['WARNING'];}['mapNpmSeverity'](_0x17caa3){const _0x56519c=a0_0x34cbb0,_0x4a3dda={'critical':STATIC_ANALYSIS[_0x56519c(0x1c4)][_0x56519c(0x20c)],'high':STATIC_ANALYSIS[_0x56519c(0x1c4)][_0x56519c(0x20c)],'moderate':STATIC_ANALYSIS['SEVERITY']['ERROR'],'low':STATIC_ANALYSIS[_0x56519c(0x1c4)][_0x56519c(0x1c1)],'info':STATIC_ANALYSIS[_0x56519c(0x1c4)]['INFO']};return _0x4a3dda[_0x17caa3?.['toLowerCase']()]||STATIC_ANALYSIS['SEVERITY'][_0x56519c(0x1c1)];}[a0_0x34cbb0(0x1d3)](_0x3ebb9f){const _0x2bc320=a0_0x34cbb0;if(!_0x3ebb9f)return STATIC_ANALYSIS[_0x2bc320(0x1c4)]['ERROR'];const _0x20ccfa={'critical':STATIC_ANALYSIS['SEVERITY'][_0x2bc320(0x20c)],'high':STATIC_ANALYSIS[_0x2bc320(0x1c4)][_0x2bc320(0x20c)],'medium':STATIC_ANALYSIS[_0x2bc320(0x1c4)]['ERROR'],'low':STATIC_ANALYSIS['SEVERITY'][_0x2bc320(0x1c1)]};return _0x20ccfa[_0x3ebb9f?.[_0x2bc320(0x1bb)]()]||STATIC_ANALYSIS[_0x2bc320(0x1c4)]['ERROR'];}async['getScannerStatus'](){const _0x328e04=a0_0x34cbb0,_0x5c0fcd=await this[_0x328e04(0x220)]();return{'scanners':_0x5c0fcd,'recommendations':this[_0x328e04(0x1bd)](_0x5c0fcd)};}[a0_0x34cbb0(0x1bd)](_0x50fdaf){const _0x570a13=a0_0x34cbb0,_0xe4cc2=[];return!_0x50fdaf[_0x570a13(0x1f6)]&&_0xe4cc2[_0x570a13(0x217)]({'scanner':_0x570a13(0x21d),'reason':'Multi-language\x20SAST\x20with\x20extensive\x20security\x20rules','install':_0x570a13(0x1e9),'priority':'high'}),!_0x50fdaf['bandit']&&_0xe4cc2[_0x570a13(0x217)]({'scanner':_0x570a13(0x1db),'reason':'Python\x20security\x20scanner','install':_0x570a13(0x20b),'priority':'medium'}),!_0x50fdaf['eslintSecurity']&&_0xe4cc2[_0x570a13(0x217)]({'scanner':_0x570a13(0x1fc),'reason':_0x570a13(0x1ed),'install':'npm\x20install\x20--save-dev\x20eslint-plugin-security','priority':_0x570a13(0x1f8)}),!_0x50fdaf['pipAudit']&&_0xe4cc2[_0x570a13(0x217)]({'scanner':_0x570a13(0x1cb),'reason':'Python\x20dependency\x20vulnerability\x20scanner','install':'pip\x20install\x20pip-audit','priority':'low'}),_0xe4cc2;}}export default SecurityAnalyzer;
|