@mrtrinhvn/ag-kit 1.0.11 → 1.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (219) hide show
  1. package/LICENSE +21 -0
  2. package/README.md +1 -0
  3. package/bin/cli.js +62 -0
  4. package/package.json +7 -1
  5. package/template/.agent/rules/GEMINI.md +1 -1
  6. package/template/.agent/skills/regent-orchestrator/SKILL.md +31 -0
  7. package/template/.agent/skills/telegram-bridge/SKILL.md +30 -0
  8. package/.agent/.shared/ui-ux-pro-max/data/charts.csv +0 -26
  9. package/.agent/.shared/ui-ux-pro-max/data/colors.csv +0 -97
  10. package/.agent/.shared/ui-ux-pro-max/data/icons.csv +0 -101
  11. package/.agent/.shared/ui-ux-pro-max/data/landing.csv +0 -31
  12. package/.agent/.shared/ui-ux-pro-max/data/products.csv +0 -97
  13. package/.agent/.shared/ui-ux-pro-max/data/prompts.csv +0 -24
  14. package/.agent/.shared/ui-ux-pro-max/data/react-performance.csv +0 -45
  15. package/.agent/.shared/ui-ux-pro-max/data/stacks/flutter.csv +0 -53
  16. package/.agent/.shared/ui-ux-pro-max/data/stacks/html-tailwind.csv +0 -56
  17. package/.agent/.shared/ui-ux-pro-max/data/stacks/jetpack-compose.csv +0 -53
  18. package/.agent/.shared/ui-ux-pro-max/data/stacks/nextjs.csv +0 -53
  19. package/.agent/.shared/ui-ux-pro-max/data/stacks/nuxt-ui.csv +0 -51
  20. package/.agent/.shared/ui-ux-pro-max/data/stacks/nuxtjs.csv +0 -59
  21. package/.agent/.shared/ui-ux-pro-max/data/stacks/react-native.csv +0 -52
  22. package/.agent/.shared/ui-ux-pro-max/data/stacks/react.csv +0 -54
  23. package/.agent/.shared/ui-ux-pro-max/data/stacks/shadcn.csv +0 -61
  24. package/.agent/.shared/ui-ux-pro-max/data/stacks/svelte.csv +0 -54
  25. package/.agent/.shared/ui-ux-pro-max/data/stacks/swiftui.csv +0 -51
  26. package/.agent/.shared/ui-ux-pro-max/data/stacks/vue.csv +0 -50
  27. package/.agent/.shared/ui-ux-pro-max/data/styles.csv +0 -59
  28. package/.agent/.shared/ui-ux-pro-max/data/typography.csv +0 -58
  29. package/.agent/.shared/ui-ux-pro-max/data/ui-reasoning.csv +0 -101
  30. package/.agent/.shared/ui-ux-pro-max/data/ux-guidelines.csv +0 -100
  31. package/.agent/.shared/ui-ux-pro-max/data/web-interface.csv +0 -31
  32. package/.agent/.shared/ui-ux-pro-max/scripts/__pycache__/core.cpython-313.pyc +0 -0
  33. package/.agent/.shared/ui-ux-pro-max/scripts/__pycache__/design_system.cpython-313.pyc +0 -0
  34. package/.agent/.shared/ui-ux-pro-max/scripts/core.py +0 -258
  35. package/.agent/.shared/ui-ux-pro-max/scripts/design_system.py +0 -1067
  36. package/.agent/.shared/ui-ux-pro-max/scripts/search.py +0 -106
  37. package/.agent/ARCHITECTURE.md +0 -288
  38. package/.agent/agents/backend-specialist.md +0 -263
  39. package/.agent/agents/code-archaeologist.md +0 -106
  40. package/.agent/agents/database-architect.md +0 -226
  41. package/.agent/agents/debugger.md +0 -225
  42. package/.agent/agents/devops-engineer.md +0 -242
  43. package/.agent/agents/documentation-writer.md +0 -104
  44. package/.agent/agents/explorer-agent.md +0 -73
  45. package/.agent/agents/frontend-specialist.md +0 -556
  46. package/.agent/agents/game-developer.md +0 -162
  47. package/.agent/agents/mobile-developer.md +0 -377
  48. package/.agent/agents/orchestrator.md +0 -416
  49. package/.agent/agents/penetration-tester.md +0 -188
  50. package/.agent/agents/performance-optimizer.md +0 -187
  51. package/.agent/agents/product-manager.md +0 -112
  52. package/.agent/agents/product-owner.md +0 -95
  53. package/.agent/agents/project-planner.md +0 -406
  54. package/.agent/agents/qa-automation-engineer.md +0 -103
  55. package/.agent/agents/quant-architect.md +0 -31
  56. package/.agent/agents/security-auditor.md +0 -170
  57. package/.agent/agents/seo-specialist.md +0 -111
  58. package/.agent/agents/test-engineer.md +0 -158
  59. package/.agent/mcp_config.json +0 -24
  60. package/.agent/rules/GEMINI.md +0 -280
  61. package/.agent/scripts/auto_preview.py +0 -148
  62. package/.agent/scripts/checklist.py +0 -217
  63. package/.agent/scripts/session_manager.py +0 -120
  64. package/.agent/scripts/verify_all.py +0 -327
  65. package/.agent/skills/api-patterns/SKILL.md +0 -81
  66. package/.agent/skills/api-patterns/api-style.md +0 -42
  67. package/.agent/skills/api-patterns/auth.md +0 -24
  68. package/.agent/skills/api-patterns/documentation.md +0 -26
  69. package/.agent/skills/api-patterns/graphql.md +0 -41
  70. package/.agent/skills/api-patterns/rate-limiting.md +0 -31
  71. package/.agent/skills/api-patterns/response.md +0 -37
  72. package/.agent/skills/api-patterns/rest.md +0 -40
  73. package/.agent/skills/api-patterns/scripts/api_validator.py +0 -211
  74. package/.agent/skills/api-patterns/security-testing.md +0 -122
  75. package/.agent/skills/api-patterns/trpc.md +0 -41
  76. package/.agent/skills/api-patterns/versioning.md +0 -22
  77. package/.agent/skills/app-builder/SKILL.md +0 -75
  78. package/.agent/skills/app-builder/agent-coordination.md +0 -71
  79. package/.agent/skills/app-builder/feature-building.md +0 -53
  80. package/.agent/skills/app-builder/project-detection.md +0 -34
  81. package/.agent/skills/app-builder/scaffolding.md +0 -118
  82. package/.agent/skills/app-builder/tech-stack.md +0 -40
  83. package/.agent/skills/app-builder/templates/SKILL.md +0 -39
  84. package/.agent/skills/app-builder/templates/astro-static/TEMPLATE.md +0 -76
  85. package/.agent/skills/app-builder/templates/chrome-extension/TEMPLATE.md +0 -92
  86. package/.agent/skills/app-builder/templates/cli-tool/TEMPLATE.md +0 -88
  87. package/.agent/skills/app-builder/templates/electron-desktop/TEMPLATE.md +0 -88
  88. package/.agent/skills/app-builder/templates/express-api/TEMPLATE.md +0 -83
  89. package/.agent/skills/app-builder/templates/flutter-app/TEMPLATE.md +0 -90
  90. package/.agent/skills/app-builder/templates/monorepo-turborepo/TEMPLATE.md +0 -90
  91. package/.agent/skills/app-builder/templates/nextjs-fullstack/TEMPLATE.md +0 -82
  92. package/.agent/skills/app-builder/templates/nextjs-saas/TEMPLATE.md +0 -100
  93. package/.agent/skills/app-builder/templates/nextjs-static/TEMPLATE.md +0 -106
  94. package/.agent/skills/app-builder/templates/nuxt-app/TEMPLATE.md +0 -101
  95. package/.agent/skills/app-builder/templates/python-fastapi/TEMPLATE.md +0 -83
  96. package/.agent/skills/app-builder/templates/react-native-app/TEMPLATE.md +0 -93
  97. package/.agent/skills/architecture/SKILL.md +0 -55
  98. package/.agent/skills/architecture/context-discovery.md +0 -43
  99. package/.agent/skills/architecture/examples.md +0 -94
  100. package/.agent/skills/architecture/pattern-selection.md +0 -68
  101. package/.agent/skills/architecture/patterns-reference.md +0 -50
  102. package/.agent/skills/architecture/trade-off-analysis.md +0 -77
  103. package/.agent/skills/bash-linux/SKILL.md +0 -199
  104. package/.agent/skills/behavioral-modes/SKILL.md +0 -242
  105. package/.agent/skills/brainstorming/SKILL.md +0 -168
  106. package/.agent/skills/brainstorming/dynamic-questioning.md +0 -350
  107. package/.agent/skills/business-ops/SKILL.md +0 -26
  108. package/.agent/skills/clean-code/SKILL.md +0 -202
  109. package/.agent/skills/cli-generator/SKILL.md +0 -48
  110. package/.agent/skills/code-review-checklist/SKILL.md +0 -109
  111. package/.agent/skills/cognitive-session/SKILL.md +0 -28
  112. package/.agent/skills/data-science/SKILL.md +0 -28
  113. package/.agent/skills/database-design/SKILL.md +0 -52
  114. package/.agent/skills/database-design/database-selection.md +0 -43
  115. package/.agent/skills/database-design/indexing.md +0 -39
  116. package/.agent/skills/database-design/migrations.md +0 -48
  117. package/.agent/skills/database-design/optimization.md +0 -36
  118. package/.agent/skills/database-design/orm-selection.md +0 -30
  119. package/.agent/skills/database-design/schema-design.md +0 -56
  120. package/.agent/skills/database-design/scripts/schema_validator.py +0 -172
  121. package/.agent/skills/deployment-procedures/SKILL.md +0 -241
  122. package/.agent/skills/doc.md +0 -177
  123. package/.agent/skills/documentation-templates/SKILL.md +0 -194
  124. package/.agent/skills/frontend-design/SKILL.md +0 -418
  125. package/.agent/skills/frontend-design/animation-guide.md +0 -331
  126. package/.agent/skills/frontend-design/color-system.md +0 -311
  127. package/.agent/skills/frontend-design/decision-trees.md +0 -418
  128. package/.agent/skills/frontend-design/motion-graphics.md +0 -306
  129. package/.agent/skills/frontend-design/scripts/accessibility_checker.py +0 -183
  130. package/.agent/skills/frontend-design/scripts/ux_audit.py +0 -722
  131. package/.agent/skills/frontend-design/typography-system.md +0 -345
  132. package/.agent/skills/frontend-design/ux-psychology.md +0 -541
  133. package/.agent/skills/frontend-design/visual-effects.md +0 -383
  134. package/.agent/skills/game-development/2d-games/SKILL.md +0 -119
  135. package/.agent/skills/game-development/3d-games/SKILL.md +0 -135
  136. package/.agent/skills/game-development/SKILL.md +0 -167
  137. package/.agent/skills/game-development/game-art/SKILL.md +0 -185
  138. package/.agent/skills/game-development/game-audio/SKILL.md +0 -190
  139. package/.agent/skills/game-development/game-design/SKILL.md +0 -129
  140. package/.agent/skills/game-development/mobile-games/SKILL.md +0 -108
  141. package/.agent/skills/game-development/multiplayer/SKILL.md +0 -132
  142. package/.agent/skills/game-development/pc-games/SKILL.md +0 -144
  143. package/.agent/skills/game-development/vr-ar/SKILL.md +0 -123
  144. package/.agent/skills/game-development/web-games/SKILL.md +0 -150
  145. package/.agent/skills/geo-fundamentals/SKILL.md +0 -156
  146. package/.agent/skills/geo-fundamentals/scripts/geo_checker.py +0 -289
  147. package/.agent/skills/i18n-localization/SKILL.md +0 -154
  148. package/.agent/skills/i18n-localization/scripts/i18n_checker.py +0 -241
  149. package/.agent/skills/intelligent-routing/SKILL.md +0 -335
  150. package/.agent/skills/knowledge-management/SKILL.md +0 -66
  151. package/.agent/skills/lint-and-validate/SKILL.md +0 -45
  152. package/.agent/skills/lint-and-validate/scripts/lint_runner.py +0 -172
  153. package/.agent/skills/lint-and-validate/scripts/type_coverage.py +0 -173
  154. package/.agent/skills/llm-routing-quirks/SKILL.md +0 -41
  155. package/.agent/skills/mcp-builder/SKILL.md +0 -176
  156. package/.agent/skills/memory-architecture/SKILL.md +0 -107
  157. package/.agent/skills/mini-antigravity-injection/SKILL.md +0 -66
  158. package/.agent/skills/mobile-design/SKILL.md +0 -394
  159. package/.agent/skills/mobile-design/decision-trees.md +0 -516
  160. package/.agent/skills/mobile-design/mobile-backend.md +0 -491
  161. package/.agent/skills/mobile-design/mobile-color-system.md +0 -420
  162. package/.agent/skills/mobile-design/mobile-debugging.md +0 -122
  163. package/.agent/skills/mobile-design/mobile-design-thinking.md +0 -357
  164. package/.agent/skills/mobile-design/mobile-navigation.md +0 -458
  165. package/.agent/skills/mobile-design/mobile-performance.md +0 -767
  166. package/.agent/skills/mobile-design/mobile-testing.md +0 -356
  167. package/.agent/skills/mobile-design/mobile-typography.md +0 -433
  168. package/.agent/skills/mobile-design/platform-android.md +0 -666
  169. package/.agent/skills/mobile-design/platform-ios.md +0 -561
  170. package/.agent/skills/mobile-design/scripts/mobile_audit.py +0 -670
  171. package/.agent/skills/mobile-design/touch-psychology.md +0 -537
  172. package/.agent/skills/nextjs-react-expert/1-async-eliminating-waterfalls.md +0 -312
  173. package/.agent/skills/nextjs-react-expert/2-bundle-bundle-size-optimization.md +0 -240
  174. package/.agent/skills/nextjs-react-expert/3-server-server-side-performance.md +0 -490
  175. package/.agent/skills/nextjs-react-expert/4-client-client-side-data-fetching.md +0 -264
  176. package/.agent/skills/nextjs-react-expert/5-rerender-re-render-optimization.md +0 -581
  177. package/.agent/skills/nextjs-react-expert/6-rendering-rendering-performance.md +0 -432
  178. package/.agent/skills/nextjs-react-expert/7-js-javascript-performance.md +0 -684
  179. package/.agent/skills/nextjs-react-expert/8-advanced-advanced-patterns.md +0 -150
  180. package/.agent/skills/nextjs-react-expert/9-cache-components.md +0 -103
  181. package/.agent/skills/nextjs-react-expert/SKILL.md +0 -267
  182. package/.agent/skills/nextjs-react-expert/scripts/convert_rules.py +0 -222
  183. package/.agent/skills/nextjs-react-expert/scripts/react_performance_checker.py +0 -252
  184. package/.agent/skills/nodejs-best-practices/SKILL.md +0 -333
  185. package/.agent/skills/parallel-agents/SKILL.md +0 -175
  186. package/.agent/skills/performance-profiling/SKILL.md +0 -143
  187. package/.agent/skills/performance-profiling/scripts/lighthouse_audit.py +0 -76
  188. package/.agent/skills/plan-writing/SKILL.md +0 -153
  189. package/.agent/skills/powershell-windows/SKILL.md +0 -167
  190. package/.agent/skills/product-management/SKILL.md +0 -30
  191. package/.agent/skills/python-patterns/SKILL.md +0 -441
  192. package/.agent/skills/red-team-tactics/SKILL.md +0 -199
  193. package/.agent/skills/rust-pro/SKILL.md +0 -176
  194. package/.agent/skills/seo-fundamentals/SKILL.md +0 -129
  195. package/.agent/skills/seo-fundamentals/scripts/seo_checker.py +0 -219
  196. package/.agent/skills/server-management/SKILL.md +0 -161
  197. package/.agent/skills/systematic-debugging/SKILL.md +0 -120
  198. package/.agent/skills/tailwind-patterns/SKILL.md +0 -269
  199. package/.agent/skills/tdd-workflow/SKILL.md +0 -148
  200. package/.agent/skills/telegram-agentic-gateway/SKILL.md +0 -80
  201. package/.agent/skills/testing-patterns/SKILL.md +0 -178
  202. package/.agent/skills/testing-patterns/scripts/test_runner.py +0 -219
  203. package/.agent/skills/vulnerability-scanner/SKILL.md +0 -276
  204. package/.agent/skills/vulnerability-scanner/checklists.md +0 -121
  205. package/.agent/skills/vulnerability-scanner/scripts/security_scan.py +0 -458
  206. package/.agent/skills/web-design-guidelines/SKILL.md +0 -57
  207. package/.agent/skills/webapp-testing/SKILL.md +0 -187
  208. package/.agent/skills/webapp-testing/scripts/playwright_runner.py +0 -173
  209. package/.agent/workflows/brainstorm.md +0 -113
  210. package/.agent/workflows/create.md +0 -59
  211. package/.agent/workflows/debug.md +0 -103
  212. package/.agent/workflows/deploy.md +0 -176
  213. package/.agent/workflows/enhance.md +0 -63
  214. package/.agent/workflows/orchestrate.md +0 -237
  215. package/.agent/workflows/plan.md +0 -89
  216. package/.agent/workflows/preview.md +0 -81
  217. package/.agent/workflows/status.md +0 -86
  218. package/.agent/workflows/test.md +0 -144
  219. package/.agent/workflows/ui-ux-pro-max.md +0 -296
@@ -1,121 +0,0 @@
1
- # Security Checklists
2
-
3
- > Quick reference checklists for security audits. Use alongside vulnerability-scanner principles.
4
-
5
- ---
6
-
7
- ## OWASP Top 10 Audit Checklist
8
-
9
- ### A01: Broken Access Control
10
- - [ ] Authorization on all protected routes
11
- - [ ] Deny by default
12
- - [ ] Rate limiting implemented
13
- - [ ] CORS properly configured
14
-
15
- ### A02: Cryptographic Failures
16
- - [ ] Passwords hashed (bcrypt/argon2, cost 12+)
17
- - [ ] Sensitive data encrypted at rest
18
- - [ ] TLS 1.2+ for all connections
19
- - [ ] No secrets in code/logs
20
-
21
- ### A03: Injection
22
- - [ ] Parameterized queries
23
- - [ ] Input validation on all user data
24
- - [ ] Output encoding for XSS
25
- - [ ] No eval() or dynamic code execution
26
-
27
- ### A04: Insecure Design
28
- - [ ] Threat modeling done
29
- - [ ] Security requirements defined
30
- - [ ] Business logic validated
31
-
32
- ### A05: Security Misconfiguration
33
- - [ ] Unnecessary features disabled
34
- - [ ] Error messages sanitized
35
- - [ ] Security headers configured
36
- - [ ] Default credentials changed
37
-
38
- ### A06: Vulnerable Components
39
- - [ ] Dependencies up to date
40
- - [ ] No known vulnerabilities
41
- - [ ] Unused dependencies removed
42
-
43
- ### A07: Authentication Failures
44
- - [ ] MFA available
45
- - [ ] Session invalidation on logout
46
- - [ ] Session timeout implemented
47
- - [ ] Brute force protection
48
-
49
- ### A08: Integrity Failures
50
- - [ ] Dependency integrity verified
51
- - [ ] CI/CD pipeline secured
52
- - [ ] Update mechanism secured
53
-
54
- ### A09: Logging Failures
55
- - [ ] Security events logged
56
- - [ ] Logs protected
57
- - [ ] No sensitive data in logs
58
- - [ ] Alerting configured
59
-
60
- ### A10: SSRF
61
- - [ ] URL validation implemented
62
- - [ ] Allow-list for external calls
63
- - [ ] Network segmentation
64
-
65
- ---
66
-
67
- ## Authentication Checklist
68
-
69
- - [ ] Strong password policy
70
- - [ ] Account lockout
71
- - [ ] Secure password reset
72
- - [ ] Session management
73
- - [ ] Token expiration
74
- - [ ] Logout invalidation
75
-
76
- ---
77
-
78
- ## API Security Checklist
79
-
80
- - [ ] Authentication required
81
- - [ ] Authorization per endpoint
82
- - [ ] Input validation
83
- - [ ] Rate limiting
84
- - [ ] Output sanitization
85
- - [ ] Error handling
86
-
87
- ---
88
-
89
- ## Data Protection Checklist
90
-
91
- - [ ] Encryption at rest
92
- - [ ] Encryption in transit
93
- - [ ] Key management
94
- - [ ] Data minimization
95
- - [ ] Secure deletion
96
-
97
- ---
98
-
99
- ## Security Headers
100
-
101
- | Header | Purpose |
102
- |--------|---------|
103
- | **Content-Security-Policy** | XSS prevention |
104
- | **X-Content-Type-Options** | MIME sniffing |
105
- | **X-Frame-Options** | Clickjacking |
106
- | **Strict-Transport-Security** | Force HTTPS |
107
- | **Referrer-Policy** | Referrer control |
108
-
109
- ---
110
-
111
- ## Quick Audit Commands
112
-
113
- | Check | What to Look For |
114
- |-------|------------------|
115
- | Secrets in code | password, api_key, secret |
116
- | Dangerous patterns | eval, innerHTML, SQL concat |
117
- | Dependency issues | npm audit, snyk |
118
-
119
- ---
120
-
121
- > **Usage:** Copy relevant checklists into your PLAN.md or security report.
@@ -1,458 +0,0 @@
1
- #!/usr/bin/env python3
2
- """
3
- Skill: vulnerability-scanner
4
- Script: security_scan.py
5
- Purpose: Validate that security principles from SKILL.md are applied correctly
6
- Usage: python security_scan.py <project_path> [--scan-type all|deps|secrets|patterns|config]
7
- Output: JSON with validation findings
8
-
9
- This script verifies:
10
- 1. Dependencies - Supply chain security (OWASP A03)
11
- 2. Secrets - No hardcoded credentials (OWASP A04)
12
- 3. Code Patterns - Dangerous patterns identified (OWASP A05)
13
- 4. Configuration - Security settings validated (OWASP A02)
14
- """
15
- import subprocess
16
- import json
17
- import os
18
- import sys
19
- import re
20
- import argparse
21
- from pathlib import Path
22
- from typing import Dict, List, Any
23
- from datetime import datetime
24
-
25
- # Fix Windows console encoding for Unicode output
26
- try:
27
- sys.stdout.reconfigure(encoding='utf-8', errors='replace')
28
- sys.stderr.reconfigure(encoding='utf-8', errors='replace')
29
- except AttributeError:
30
- pass # Python < 3.7
31
-
32
-
33
- # ============================================================================
34
- # CONFIGURATION
35
- # ============================================================================
36
-
37
- SECRET_PATTERNS = [
38
- # API Keys & Tokens
39
- (r'api[_-]?key\s*[=:]\s*["\'][^"\']{10,}["\']', "API Key", "high"),
40
- (r'token\s*[=:]\s*["\'][^"\']{10,}["\']', "Token", "high"),
41
- (r'bearer\s+[a-zA-Z0-9\-_.]+', "Bearer Token", "critical"),
42
-
43
- # Cloud Credentials
44
- (r'AKIA[0-9A-Z]{16}', "AWS Access Key", "critical"),
45
- (r'aws[_-]?secret[_-]?access[_-]?key\s*[=:]\s*["\'][^"\']+["\']', "AWS Secret", "critical"),
46
- (r'AZURE[_-]?[A-Z_]+\s*[=:]\s*["\'][^"\']+["\']', "Azure Credential", "critical"),
47
- (r'GOOGLE[_-]?[A-Z_]+\s*[=:]\s*["\'][^"\']+["\']', "GCP Credential", "critical"),
48
-
49
- # Database & Connections
50
- (r'password\s*[=:]\s*["\'][^"\']{4,}["\']', "Password", "high"),
51
- (r'(mongodb|postgres|mysql|redis):\/\/[^\s"\']+', "Database Connection String", "critical"),
52
-
53
- # Private Keys
54
- (r'-----BEGIN\s+(RSA|PRIVATE|EC)\s+KEY-----', "Private Key", "critical"),
55
- (r'ssh-rsa\s+[A-Za-z0-9+/]+', "SSH Key", "critical"),
56
-
57
- # JWT
58
- (r'eyJ[A-Za-z0-9-_]+\.eyJ[A-Za-z0-9-_]+\.[A-Za-z0-9-_]+', "JWT Token", "high"),
59
- ]
60
-
61
- DANGEROUS_PATTERNS = [
62
- # Injection risks
63
- (r'eval\s*\(', "eval() usage", "critical", "Code Injection risk"),
64
- (r'exec\s*\(', "exec() usage", "critical", "Code Injection risk"),
65
- (r'new\s+Function\s*\(', "Function constructor", "high", "Code Injection risk"),
66
- (r'child_process\.exec\s*\(', "child_process.exec", "high", "Command Injection risk"),
67
- (r'subprocess\.call\s*\([^)]*shell\s*=\s*True', "subprocess with shell=True", "high", "Command Injection risk"),
68
-
69
- # XSS risks
70
- (r'dangerouslySetInnerHTML', "dangerouslySetInnerHTML", "high", "XSS risk"),
71
- (r'\.innerHTML\s*=', "innerHTML assignment", "medium", "XSS risk"),
72
- (r'document\.write\s*\(', "document.write", "medium", "XSS risk"),
73
-
74
- # SQL Injection indicators
75
- (r'["\'][^"\']*\+\s*[a-zA-Z_]+\s*\+\s*["\'].*(?:SELECT|INSERT|UPDATE|DELETE)', "SQL String Concat", "critical", "SQL Injection risk"),
76
- (r'f"[^"]*(?:SELECT|INSERT|UPDATE|DELETE)[^"]*\{', "SQL f-string", "critical", "SQL Injection risk"),
77
-
78
- # Insecure configurations
79
- (r'verify\s*=\s*False', "SSL Verify Disabled", "high", "MITM risk"),
80
- (r'--insecure', "Insecure flag", "medium", "Security disabled"),
81
- (r'disable[_-]?ssl', "SSL Disabled", "high", "MITM risk"),
82
-
83
- # Unsafe deserialization
84
- (r'pickle\.loads?\s*\(', "pickle usage", "high", "Deserialization risk"),
85
- (r'yaml\.load\s*\([^)]*\)(?!\s*,\s*Loader)', "Unsafe YAML load", "high", "Deserialization risk"),
86
- ]
87
-
88
- SKIP_DIRS = {'node_modules', '.git', 'dist', 'build', '__pycache__', '.venv', 'venv', '.next'}
89
- CODE_EXTENSIONS = {'.js', '.ts', '.jsx', '.tsx', '.py', '.go', '.java', '.rb', '.php'}
90
- CONFIG_EXTENSIONS = {'.json', '.yaml', '.yml', '.toml', '.env', '.env.local', '.env.development'}
91
-
92
-
93
- # ============================================================================
94
- # SCANNING FUNCTIONS
95
- # ============================================================================
96
-
97
- def scan_dependencies(project_path: str) -> Dict[str, Any]:
98
- """
99
- Validate supply chain security (OWASP A03).
100
- Checks: npm audit, lock file presence, dependency age.
101
- """
102
- results = {"tool": "dependency_scanner", "findings": [], "status": "[OK] Secure"}
103
-
104
- # Check for lock files
105
- lock_files = {
106
- "npm": ["package-lock.json", "npm-shrinkwrap.json"],
107
- "yarn": ["yarn.lock"],
108
- "pnpm": ["pnpm-lock.yaml"],
109
- "pip": ["requirements.txt", "Pipfile.lock", "poetry.lock"],
110
- }
111
-
112
- found_locks = []
113
- missing_locks = []
114
-
115
- for manager, files in lock_files.items():
116
- pkg_file = "package.json" if manager in ["npm", "yarn", "pnpm"] else "setup.py"
117
- pkg_path = Path(project_path) / pkg_file
118
-
119
- if pkg_path.exists() or (manager == "pip" and (Path(project_path) / "requirements.txt").exists()):
120
- has_lock = any((Path(project_path) / f).exists() for f in files)
121
- if has_lock:
122
- found_locks.append(manager)
123
- else:
124
- missing_locks.append(manager)
125
- results["findings"].append({
126
- "type": "Missing Lock File",
127
- "severity": "high",
128
- "message": f"{manager}: No lock file found. Supply chain integrity at risk."
129
- })
130
-
131
- # Run npm audit if applicable
132
- if (Path(project_path) / "package.json").exists():
133
- try:
134
- result = subprocess.run(
135
- ["npm", "audit", "--json"],
136
- cwd=project_path,
137
- capture_output=True,
138
- text=True,
139
- timeout=60
140
- )
141
-
142
- try:
143
- audit_data = json.loads(result.stdout)
144
- vulnerabilities = audit_data.get("vulnerabilities", {})
145
-
146
- severity_count = {"critical": 0, "high": 0, "moderate": 0, "low": 0}
147
- for vuln in vulnerabilities.values():
148
- sev = vuln.get("severity", "low").lower()
149
- if sev in severity_count:
150
- severity_count[sev] += 1
151
-
152
- if severity_count["critical"] > 0:
153
- results["status"] = "[!!] Critical vulnerabilities"
154
- results["findings"].append({
155
- "type": "npm audit",
156
- "severity": "critical",
157
- "message": f"{severity_count['critical']} critical vulnerabilities in dependencies"
158
- })
159
- elif severity_count["high"] > 0:
160
- results["status"] = "[!] High vulnerabilities"
161
- results["findings"].append({
162
- "type": "npm audit",
163
- "severity": "high",
164
- "message": f"{severity_count['high']} high severity vulnerabilities"
165
- })
166
-
167
- results["npm_audit"] = severity_count
168
-
169
- except json.JSONDecodeError:
170
- pass
171
-
172
- except (FileNotFoundError, subprocess.TimeoutExpired):
173
- pass
174
-
175
- if not results["findings"]:
176
- results["status"] = "[OK] Supply chain checks passed"
177
-
178
- return results
179
-
180
-
181
- def scan_secrets(project_path: str) -> Dict[str, Any]:
182
- """
183
- Validate no hardcoded secrets (OWASP A04).
184
- Checks: API keys, tokens, passwords, cloud credentials.
185
- """
186
- results = {
187
- "tool": "secret_scanner",
188
- "findings": [],
189
- "status": "[OK] No secrets detected",
190
- "scanned_files": 0,
191
- "by_severity": {"critical": 0, "high": 0, "medium": 0}
192
- }
193
-
194
- for root, dirs, files in os.walk(project_path):
195
- dirs[:] = [d for d in dirs if d not in SKIP_DIRS]
196
-
197
- for file in files:
198
- ext = Path(file).suffix.lower()
199
- if ext not in CODE_EXTENSIONS and ext not in CONFIG_EXTENSIONS:
200
- continue
201
-
202
- filepath = Path(root) / file
203
- results["scanned_files"] += 1
204
-
205
- try:
206
- with open(filepath, 'r', encoding='utf-8', errors='ignore') as f:
207
- content = f.read()
208
-
209
- for pattern, secret_type, severity in SECRET_PATTERNS:
210
- matches = re.findall(pattern, content, re.IGNORECASE)
211
- if matches:
212
- results["findings"].append({
213
- "file": str(filepath.relative_to(project_path)),
214
- "type": secret_type,
215
- "severity": severity,
216
- "count": len(matches)
217
- })
218
- results["by_severity"][severity] += len(matches)
219
-
220
- except Exception:
221
- pass
222
-
223
- if results["by_severity"]["critical"] > 0:
224
- results["status"] = "[!!] CRITICAL: Secrets exposed!"
225
- elif results["by_severity"]["high"] > 0:
226
- results["status"] = "[!] HIGH: Secrets found"
227
- elif sum(results["by_severity"].values()) > 0:
228
- results["status"] = "[?] Potential secrets detected"
229
-
230
- # Limit findings for output
231
- results["findings"] = results["findings"][:15]
232
-
233
- return results
234
-
235
-
236
- def scan_code_patterns(project_path: str) -> Dict[str, Any]:
237
- """
238
- Validate dangerous code patterns (OWASP A05).
239
- Checks: Injection risks, XSS, unsafe deserialization.
240
- """
241
- results = {
242
- "tool": "pattern_scanner",
243
- "findings": [],
244
- "status": "[OK] No dangerous patterns",
245
- "scanned_files": 0,
246
- "by_category": {}
247
- }
248
-
249
- for root, dirs, files in os.walk(project_path):
250
- dirs[:] = [d for d in dirs if d not in SKIP_DIRS]
251
-
252
- for file in files:
253
- ext = Path(file).suffix.lower()
254
- if ext not in CODE_EXTENSIONS:
255
- continue
256
-
257
- filepath = Path(root) / file
258
- results["scanned_files"] += 1
259
-
260
- try:
261
- with open(filepath, 'r', encoding='utf-8', errors='ignore') as f:
262
- lines = f.readlines()
263
-
264
- for line_num, line in enumerate(lines, 1):
265
- for pattern, name, severity, category in DANGEROUS_PATTERNS:
266
- if re.search(pattern, line, re.IGNORECASE):
267
- results["findings"].append({
268
- "file": str(filepath.relative_to(project_path)),
269
- "line": line_num,
270
- "pattern": name,
271
- "severity": severity,
272
- "category": category,
273
- "snippet": line.strip()[:80]
274
- })
275
- results["by_category"][category] = results["by_category"].get(category, 0) + 1
276
-
277
- except Exception:
278
- pass
279
-
280
- critical_count = sum(1 for f in results["findings"] if f["severity"] == "critical")
281
- high_count = sum(1 for f in results["findings"] if f["severity"] == "high")
282
-
283
- if critical_count > 0:
284
- results["status"] = f"[!!] CRITICAL: {critical_count} dangerous patterns"
285
- elif high_count > 0:
286
- results["status"] = f"[!] HIGH: {high_count} risky patterns"
287
- elif results["findings"]:
288
- results["status"] = "[?] Some patterns need review"
289
-
290
- # Limit findings
291
- results["findings"] = results["findings"][:20]
292
-
293
- return results
294
-
295
-
296
- def scan_configuration(project_path: str) -> Dict[str, Any]:
297
- """
298
- Validate security configuration (OWASP A02).
299
- Checks: Security headers, CORS, debug modes.
300
- """
301
- results = {
302
- "tool": "config_scanner",
303
- "findings": [],
304
- "status": "[OK] Configuration secure",
305
- "checks": {}
306
- }
307
-
308
- # Check common config files for issues
309
- config_issues = [
310
- (r'"DEBUG"\s*:\s*true', "Debug mode enabled", "high"),
311
- (r'debug\s*=\s*True', "Debug mode enabled", "high"),
312
- (r'NODE_ENV.*development', "Development mode in config", "medium"),
313
- (r'"CORS_ALLOW_ALL".*true', "CORS allow all origins", "high"),
314
- (r'"Access-Control-Allow-Origin".*\*', "CORS wildcard", "high"),
315
- (r'allowCredentials.*true.*origin.*\*', "Dangerous CORS combo", "critical"),
316
- ]
317
-
318
- for root, dirs, files in os.walk(project_path):
319
- dirs[:] = [d for d in dirs if d not in SKIP_DIRS]
320
-
321
- for file in files:
322
- ext = Path(file).suffix.lower()
323
- if ext not in CONFIG_EXTENSIONS and file not in ['next.config.js', 'webpack.config.js', '.eslintrc.js']:
324
- continue
325
-
326
- filepath = Path(root) / file
327
-
328
- try:
329
- with open(filepath, 'r', encoding='utf-8', errors='ignore') as f:
330
- content = f.read()
331
-
332
- for pattern, issue, severity in config_issues:
333
- if re.search(pattern, content, re.IGNORECASE):
334
- results["findings"].append({
335
- "file": str(filepath.relative_to(project_path)),
336
- "issue": issue,
337
- "severity": severity
338
- })
339
-
340
- except Exception:
341
- pass
342
-
343
- # Check for security header configurations
344
- header_files = ["next.config.js", "next.config.mjs", "middleware.ts", "nginx.conf"]
345
- for hf in header_files:
346
- hf_path = Path(project_path) / hf
347
- if hf_path.exists():
348
- results["checks"]["security_headers_config"] = True
349
- break
350
- else:
351
- results["checks"]["security_headers_config"] = False
352
- results["findings"].append({
353
- "issue": "No security headers configuration found",
354
- "severity": "medium",
355
- "recommendation": "Configure CSP, HSTS, X-Frame-Options headers"
356
- })
357
-
358
- if any(f["severity"] == "critical" for f in results["findings"]):
359
- results["status"] = "[!!] CRITICAL: Configuration issues"
360
- elif any(f["severity"] == "high" for f in results["findings"]):
361
- results["status"] = "[!] HIGH: Configuration review needed"
362
- elif results["findings"]:
363
- results["status"] = "[?] Minor configuration issues"
364
-
365
- return results
366
-
367
-
368
- # ============================================================================
369
- # MAIN
370
- # ============================================================================
371
-
372
- def run_full_scan(project_path: str, scan_type: str = "all") -> Dict[str, Any]:
373
- """Execute security validation scans."""
374
-
375
- report = {
376
- "project": project_path,
377
- "timestamp": datetime.now().isoformat(),
378
- "scan_type": scan_type,
379
- "scans": {},
380
- "summary": {
381
- "total_findings": 0,
382
- "critical": 0,
383
- "high": 0,
384
- "overall_status": "[OK] SECURE"
385
- }
386
- }
387
-
388
- scanners = {
389
- "deps": ("dependencies", scan_dependencies),
390
- "secrets": ("secrets", scan_secrets),
391
- "patterns": ("code_patterns", scan_code_patterns),
392
- "config": ("configuration", scan_configuration),
393
- }
394
-
395
- for key, (name, scanner) in scanners.items():
396
- if scan_type == "all" or scan_type == key:
397
- result = scanner(project_path)
398
- report["scans"][name] = result
399
-
400
- findings_count = len(result.get("findings", []))
401
- report["summary"]["total_findings"] += findings_count
402
-
403
- for finding in result.get("findings", []):
404
- sev = finding.get("severity", "low")
405
- if sev == "critical":
406
- report["summary"]["critical"] += 1
407
- elif sev == "high":
408
- report["summary"]["high"] += 1
409
-
410
- # Determine overall status
411
- if report["summary"]["critical"] > 0:
412
- report["summary"]["overall_status"] = "[!!] CRITICAL ISSUES FOUND"
413
- elif report["summary"]["high"] > 0:
414
- report["summary"]["overall_status"] = "[!] HIGH RISK ISSUES"
415
- elif report["summary"]["total_findings"] > 0:
416
- report["summary"]["overall_status"] = "[?] REVIEW RECOMMENDED"
417
-
418
- return report
419
-
420
-
421
- def main():
422
- parser = argparse.ArgumentParser(
423
- description="Validate security principles from vulnerability-scanner skill"
424
- )
425
- parser.add_argument("project_path", nargs="?", default=".", help="Project directory to scan")
426
- parser.add_argument("--scan-type", choices=["all", "deps", "secrets", "patterns", "config"],
427
- default="all", help="Type of scan to run")
428
- parser.add_argument("--output", choices=["json", "summary"], default="json",
429
- help="Output format")
430
-
431
- args = parser.parse_args()
432
-
433
- if not os.path.isdir(args.project_path):
434
- print(json.dumps({"error": f"Directory not found: {args.project_path}"}))
435
- sys.exit(1)
436
-
437
- result = run_full_scan(args.project_path, args.scan_type)
438
-
439
- if args.output == "summary":
440
- print(f"\n{'='*60}")
441
- print(f"Security Scan: {result['project']}")
442
- print(f"{'='*60}")
443
- print(f"Status: {result['summary']['overall_status']}")
444
- print(f"Total Findings: {result['summary']['total_findings']}")
445
- print(f" Critical: {result['summary']['critical']}")
446
- print(f" High: {result['summary']['high']}")
447
- print(f"{'='*60}\n")
448
-
449
- for scan_name, scan_result in result['scans'].items():
450
- print(f"\n{scan_name.upper()}: {scan_result['status']}")
451
- for finding in scan_result.get('findings', [])[:5]:
452
- print(f" - {finding}")
453
- else:
454
- print(json.dumps(result, indent=2))
455
-
456
-
457
- if __name__ == "__main__":
458
- main()
@@ -1,57 +0,0 @@
1
- ---
2
- name: web-design-guidelines
3
- description: Review UI code for Web Interface Guidelines compliance. Use when asked to "review my UI", "check accessibility", "audit design", "review UX", or "check my site against best practices".
4
- metadata:
5
- author: vercel
6
- version: "1.0.0"
7
- argument-hint: <file-or-pattern>
8
- ---
9
-
10
- # Web Interface Guidelines
11
-
12
- Review files for compliance with Web Interface Guidelines.
13
-
14
- ## How It Works
15
-
16
- 1. Fetch the latest guidelines from the source URL below
17
- 2. Read the specified files (or prompt user for files/pattern)
18
- 3. Check against all rules in the fetched guidelines
19
- 4. Output findings in the terse `file:line` format
20
-
21
- ## Guidelines Source
22
-
23
- Fetch fresh guidelines before each review:
24
-
25
- ```
26
- https://raw.githubusercontent.com/vercel-labs/web-interface-guidelines/main/command.md
27
- ```
28
-
29
- Use WebFetch to retrieve the latest rules. The fetched content contains all the rules and output format instructions.
30
-
31
- ## Usage
32
-
33
- When a user provides a file or pattern argument:
34
- 1. Fetch guidelines from the source URL above
35
- 2. Read the specified files
36
- 3. Apply all rules from the fetched guidelines
37
- 4. Output findings using the format specified in the guidelines
38
-
39
- If no files specified, ask the user which files to review.
40
-
41
- ---
42
-
43
- ## Related Skills
44
-
45
- | Skill | When to Use |
46
- |-------|-------------|
47
- | **[frontend-design](../frontend-design/SKILL.md)** | Before coding - Learn design principles (color, typography, UX psychology) |
48
- | **web-design-guidelines** (this) | After coding - Audit for accessibility, performance, and best practices |
49
-
50
- ## Design Workflow
51
-
52
- ```
53
- 1. DESIGN → Read frontend-design principles
54
- 2. CODE → Implement the design
55
- 3. AUDIT → Run web-design-guidelines review ← YOU ARE HERE
56
- 4. FIX → Address findings from audit
57
- ```