@northbridge-security/secureai 0.1.13
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/README.md +122 -0
- package/.claude/commands/architect/clean.md +978 -0
- package/.claude/commands/architect/kiss.md +762 -0
- package/.claude/commands/architect/review.md +704 -0
- package/.claude/commands/catchup.md +90 -0
- package/.claude/commands/code.md +115 -0
- package/.claude/commands/commit.md +1218 -0
- package/.claude/commands/cover.md +1298 -0
- package/.claude/commands/fmea.md +275 -0
- package/.claude/commands/kaizen.md +312 -0
- package/.claude/commands/pr.md +503 -0
- package/.claude/commands/todo.md +99 -0
- package/.claude/commands/worktree.md +738 -0
- package/.claude/commands/wrapup.md +103 -0
- package/LICENSE +183 -0
- package/README.md +108 -0
- package/dist/cli.js +75634 -0
- package/docs/agents/devops-reviewer.md +889 -0
- package/docs/agents/kiss-simplifier.md +1088 -0
- package/docs/agents/typescript.md +8 -0
- package/docs/guides/README.md +109 -0
- package/docs/guides/agents.clean.arch.md +244 -0
- package/docs/guides/agents.clean.arch.ts.md +1314 -0
- package/docs/guides/agents.gotask.md +1037 -0
- package/docs/guides/agents.markdown.md +1209 -0
- package/docs/guides/agents.onepassword.md +285 -0
- package/docs/guides/agents.sonar.md +857 -0
- package/docs/guides/agents.tdd.md +838 -0
- package/docs/guides/agents.tdd.ts.md +1062 -0
- package/docs/guides/agents.typesript.md +1389 -0
- package/docs/guides/github-mcp.md +1075 -0
- package/package.json +130 -0
- package/packages/secureai-cli/src/cli.ts +21 -0
- package/tasks/README.md +880 -0
- package/tasks/aws.yml +64 -0
- package/tasks/bash.yml +118 -0
- package/tasks/bun.yml +738 -0
- package/tasks/claude.yml +183 -0
- package/tasks/docker.yml +420 -0
- package/tasks/docs.yml +127 -0
- package/tasks/git.yml +1336 -0
- package/tasks/gotask.yml +132 -0
- package/tasks/json.yml +77 -0
- package/tasks/markdown.yml +95 -0
- package/tasks/onepassword.yml +350 -0
- package/tasks/security.yml +102 -0
- package/tasks/sonar.yml +437 -0
- package/tasks/template.yml +74 -0
- package/tasks/vscode.yml +103 -0
- package/tasks/yaml.yml +121 -0
|
@@ -0,0 +1,103 @@
|
|
|
1
|
+
# Wrapup: Document and Restart
|
|
2
|
+
|
|
3
|
+
Wrap up the session before `/clear`. Document decisions and status for the next session.
|
|
4
|
+
|
|
5
|
+
**CRITICAL**: The next session's `/catchup` reads `docs/TODO.md` and `docs/ADR.md`. Any work not documented there will be lost to the next agent.
|
|
6
|
+
|
|
7
|
+
## Tasks
|
|
8
|
+
|
|
9
|
+
1. **Update docs/TODO.md** (REQUIRED)
|
|
10
|
+
- **In Progress**: Add incomplete tasks with clear next steps
|
|
11
|
+
- **Done**: Move completed tasks with date
|
|
12
|
+
- **Backlog**: Add discovered tasks for future
|
|
13
|
+
- Reference PRD files for context: `See docs/requirements/prd.xxx.md`
|
|
14
|
+
|
|
15
|
+
2. **Document decisions in docs/ADR.md** (if any)
|
|
16
|
+
- A decision has: alternatives considered, a non-obvious rationale, future relevance
|
|
17
|
+
- If yes: Append using the ADR template below
|
|
18
|
+
|
|
19
|
+
3. **End session**
|
|
20
|
+
- Run: `secureai session end`
|
|
21
|
+
- This removes the session flag so the next session runs catchup
|
|
22
|
+
|
|
23
|
+
4. **Git commit docs** (if changed)
|
|
24
|
+
- Stage: `docs/TODO.md`, `docs/ADR.md`
|
|
25
|
+
- Commit: `docs: update TODO and ADR for session handoff`
|
|
26
|
+
|
|
27
|
+
5. **Output summary**
|
|
28
|
+
- What's in TODO.md for next session?
|
|
29
|
+
- Reminder: Run `/clear` to clear context
|
|
30
|
+
|
|
31
|
+
## ADR Template
|
|
32
|
+
|
|
33
|
+
When adding to `docs/ADR.md`, use this format:
|
|
34
|
+
|
|
35
|
+
```markdown
|
|
36
|
+
---
|
|
37
|
+
|
|
38
|
+
## ADR-NNN: <Title>
|
|
39
|
+
|
|
40
|
+
**Date**: YYYY-MM-DD
|
|
41
|
+
**Status**: Accepted | Proposed | Deprecated | Superseded by ADR-XXX
|
|
42
|
+
|
|
43
|
+
### Context
|
|
44
|
+
|
|
45
|
+
What is the issue or situation that requires a decision?
|
|
46
|
+
|
|
47
|
+
### Decision
|
|
48
|
+
|
|
49
|
+
What is the decision that was made?
|
|
50
|
+
|
|
51
|
+
### Alternatives Considered
|
|
52
|
+
|
|
53
|
+
1. **Alternative A**: Description. Rejected because...
|
|
54
|
+
2. **Alternative B**: Description. Rejected because...
|
|
55
|
+
|
|
56
|
+
### Consequences
|
|
57
|
+
|
|
58
|
+
- Positive: ...
|
|
59
|
+
- Negative: ...
|
|
60
|
+
- Neutral: ...
|
|
61
|
+
|
|
62
|
+
### Implementation Notes
|
|
63
|
+
|
|
64
|
+
Any specific guidance for implementing this decision.
|
|
65
|
+
```
|
|
66
|
+
|
|
67
|
+
## ADR.md File Structure
|
|
68
|
+
|
|
69
|
+
If `docs/ADR.md` doesn't exist, create it:
|
|
70
|
+
|
|
71
|
+
```markdown
|
|
72
|
+
# Architecture Decision Records
|
|
73
|
+
|
|
74
|
+
This document captures significant architectural and design decisions for the project.
|
|
75
|
+
Decisions are numbered sequentially (ADR-001, ADR-002, etc.).
|
|
76
|
+
|
|
77
|
+
## Index
|
|
78
|
+
|
|
79
|
+
| ADR | Title | Date | Status |
|
|
80
|
+
|-----|-------|------|--------|
|
|
81
|
+
| ADR-001 | Example decision | 2024-01-15 | Accepted |
|
|
82
|
+
|
|
83
|
+
---
|
|
84
|
+
|
|
85
|
+
## ADR-001: Example decision
|
|
86
|
+
|
|
87
|
+
...
|
|
88
|
+
```
|
|
89
|
+
|
|
90
|
+
## What Qualifies as an ADR?
|
|
91
|
+
|
|
92
|
+
| Include | Exclude |
|
|
93
|
+
|---------|---------|
|
|
94
|
+
| Technology choices | Bug fixes |
|
|
95
|
+
| Architecture patterns | Implementation details |
|
|
96
|
+
| Breaking changes | Temporary workarounds |
|
|
97
|
+
| API design decisions | Style preferences |
|
|
98
|
+
| Security policies | Config tweaks |
|
|
99
|
+
| Data model changes | Dependency updates (minor) |
|
|
100
|
+
|
|
101
|
+
## Note
|
|
102
|
+
|
|
103
|
+
After this command, manually run `/clear` to start fresh.
|
package/LICENSE
ADDED
|
@@ -0,0 +1,183 @@
|
|
|
1
|
+
PROPRIETARY SOFTWARE LICENSE
|
|
2
|
+
|
|
3
|
+
Copyright (c) 2025 Northbridge Security AB. All rights reserved.
|
|
4
|
+
|
|
5
|
+
IMPORTANT: This software and associated documentation files (the "Software") are
|
|
6
|
+
proprietary and confidential to Northbridge Security AB ("Northbridge").
|
|
7
|
+
|
|
8
|
+
This Software is NOT open source and is NOT licensed under MIT, Apache, GPL, or
|
|
9
|
+
any other open-source license.
|
|
10
|
+
|
|
11
|
+
================================================================================
|
|
12
|
+
1. GRANT OF LICENSE
|
|
13
|
+
================================================================================
|
|
14
|
+
|
|
15
|
+
Subject to the terms and conditions of this License, Northbridge grants a
|
|
16
|
+
limited, non-exclusive, non-transferable, revocable license to use the Software
|
|
17
|
+
ONLY to the following authorized parties ("Authorized Users"):
|
|
18
|
+
|
|
19
|
+
a) Employees of Northbridge Security AB
|
|
20
|
+
b) Employees of Northbridge Security (US entity)
|
|
21
|
+
c) Employees of companies within the TechStars portfolio group
|
|
22
|
+
d) Approved business partners explicitly authorized in writing by Northbridge
|
|
23
|
+
|
|
24
|
+
This license is granted solely for:
|
|
25
|
+
- Internal business operations of the authorized organizations
|
|
26
|
+
- Approved development and engineering activities
|
|
27
|
+
- Approved research and development projects
|
|
28
|
+
|
|
29
|
+
================================================================================
|
|
30
|
+
2. RESTRICTIONS
|
|
31
|
+
================================================================================
|
|
32
|
+
|
|
33
|
+
You are expressly PROHIBITED from:
|
|
34
|
+
|
|
35
|
+
a) Using the Software in client assignments or consulting projects without
|
|
36
|
+
explicit written approval from Northbridge management
|
|
37
|
+
|
|
38
|
+
b) Using the Software in personal projects without explicit written approval
|
|
39
|
+
from Northbridge management
|
|
40
|
+
|
|
41
|
+
c) Distributing, sublicensing, selling, or transferring the Software to any
|
|
42
|
+
third party not listed as an Authorized User
|
|
43
|
+
|
|
44
|
+
d) Creating derivative works based on the Software for use outside the
|
|
45
|
+
authorized organizations
|
|
46
|
+
|
|
47
|
+
e) Removing, altering, or obscuring any proprietary notices, labels, or marks
|
|
48
|
+
from the Software
|
|
49
|
+
|
|
50
|
+
f) Reverse engineering, decompiling, or disassembling the Software (except as
|
|
51
|
+
permitted by applicable law)
|
|
52
|
+
|
|
53
|
+
g) Copying or cloning the Software or any portion thereof for use outside of
|
|
54
|
+
Northbridge Security, Northbridge AB, or the TechStars group
|
|
55
|
+
|
|
56
|
+
h) Disclosing, sharing, or making available the Software source code to any
|
|
57
|
+
unauthorized individuals or entities
|
|
58
|
+
|
|
59
|
+
i) Using the Software for any purpose that competes with Northbridge's
|
|
60
|
+
business interests
|
|
61
|
+
|
|
62
|
+
================================================================================
|
|
63
|
+
3. CONTRACTORS AND CONSULTANTS
|
|
64
|
+
================================================================================
|
|
65
|
+
|
|
66
|
+
External contractors and consultants working with Authorized Users:
|
|
67
|
+
|
|
68
|
+
a) Must sign a separate Confidentiality and Non-Disclosure Agreement (NDA)
|
|
69
|
+
|
|
70
|
+
b) Are granted access only for the specific duration and scope of their
|
|
71
|
+
authorized engagement
|
|
72
|
+
|
|
73
|
+
c) Must immediately cease all use and return/delete all copies of the Software
|
|
74
|
+
upon completion or termination of their engagement
|
|
75
|
+
|
|
76
|
+
d) Are expressly PROHIBITED from retaining, copying, or using the Software in
|
|
77
|
+
any capacity after their engagement ends
|
|
78
|
+
|
|
79
|
+
e) Are PROHIBITED from using the Software for any other clients or projects
|
|
80
|
+
|
|
81
|
+
================================================================================
|
|
82
|
+
4. CONFIDENTIALITY
|
|
83
|
+
================================================================================
|
|
84
|
+
|
|
85
|
+
The Software is confidential and proprietary to Northbridge. Authorized Users
|
|
86
|
+
must:
|
|
87
|
+
|
|
88
|
+
a) Maintain the confidentiality of the Software
|
|
89
|
+
b) Use the same degree of care as they use for their own confidential information
|
|
90
|
+
c) Not disclose the Software to any unauthorized third parties
|
|
91
|
+
d) Immediately notify Northbridge of any unauthorized access or disclosure
|
|
92
|
+
|
|
93
|
+
================================================================================
|
|
94
|
+
5. INTELLECTUAL PROPERTY
|
|
95
|
+
================================================================================
|
|
96
|
+
|
|
97
|
+
a) Northbridge retains all rights, title, and interest in and to the Software,
|
|
98
|
+
including all intellectual property rights
|
|
99
|
+
|
|
100
|
+
b) No ownership rights are transferred under this License
|
|
101
|
+
|
|
102
|
+
c) All modifications, enhancements, or derivative works created remain the
|
|
103
|
+
exclusive property of Northbridge
|
|
104
|
+
|
|
105
|
+
d) Authorized Users agree to assign all rights in any contributions or
|
|
106
|
+
modifications to Northbridge
|
|
107
|
+
|
|
108
|
+
================================================================================
|
|
109
|
+
6. TERMINATION
|
|
110
|
+
================================================================================
|
|
111
|
+
|
|
112
|
+
a) This License is effective until terminated
|
|
113
|
+
|
|
114
|
+
b) Northbridge may terminate this License at any time with or without cause
|
|
115
|
+
|
|
116
|
+
c) This License automatically terminates if you breach any terms
|
|
117
|
+
|
|
118
|
+
d) Upon termination, you must immediately:
|
|
119
|
+
- Cease all use of the Software
|
|
120
|
+
- Delete all copies of the Software in your possession
|
|
121
|
+
- Certify in writing the destruction of all copies (if requested)
|
|
122
|
+
|
|
123
|
+
e) Employment termination or end of contractor engagement automatically
|
|
124
|
+
terminates this License
|
|
125
|
+
|
|
126
|
+
================================================================================
|
|
127
|
+
7. NO WARRANTY
|
|
128
|
+
================================================================================
|
|
129
|
+
|
|
130
|
+
THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
131
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
132
|
+
FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT.
|
|
133
|
+
|
|
134
|
+
NORTHBRIDGE DOES NOT WARRANT THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS OR
|
|
135
|
+
THAT THE OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE.
|
|
136
|
+
|
|
137
|
+
================================================================================
|
|
138
|
+
8. LIMITATION OF LIABILITY
|
|
139
|
+
================================================================================
|
|
140
|
+
|
|
141
|
+
IN NO EVENT SHALL NORTHBRIDGE BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT,
|
|
142
|
+
OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR
|
|
143
|
+
LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION,
|
|
144
|
+
OR ANY OTHER PECUNIARY LOSS) ARISING OUT OF THE USE OF OR INABILITY TO USE THE
|
|
145
|
+
SOFTWARE, EVEN IF NORTHBRIDGE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
|
|
146
|
+
DAMAGES.
|
|
147
|
+
|
|
148
|
+
================================================================================
|
|
149
|
+
9. GENERAL PROVISIONS
|
|
150
|
+
================================================================================
|
|
151
|
+
|
|
152
|
+
a) Governing Law: This License shall be governed by the laws of Sweden
|
|
153
|
+
|
|
154
|
+
b) Severability: If any provision is found invalid, the remainder continues
|
|
155
|
+
in effect
|
|
156
|
+
|
|
157
|
+
c) Entire Agreement: This License constitutes the entire agreement regarding
|
|
158
|
+
the Software
|
|
159
|
+
|
|
160
|
+
d) Amendments: Northbridge may modify this License at any time by providing
|
|
161
|
+
notice to Authorized Users
|
|
162
|
+
|
|
163
|
+
e) No Waiver: Failure to enforce any provision does not waive future enforcement
|
|
164
|
+
|
|
165
|
+
================================================================================
|
|
166
|
+
10. CONTACT AND APPROVAL REQUESTS
|
|
167
|
+
================================================================================
|
|
168
|
+
|
|
169
|
+
For license clarifications, approval requests, or questions, contact:
|
|
170
|
+
|
|
171
|
+
Northbridge Security AB
|
|
172
|
+
Legal/Compliance Department
|
|
173
|
+
[Insert contact email or address]
|
|
174
|
+
|
|
175
|
+
================================================================================
|
|
176
|
+
|
|
177
|
+
BY ACCESSING, DOWNLOADING, OR USING THE SOFTWARE, YOU ACKNOWLEDGE THAT YOU HAVE
|
|
178
|
+
READ THIS LICENSE, UNDERSTAND IT, AND AGREE TO BE BOUND BY ITS TERMS AND
|
|
179
|
+
CONDITIONS.
|
|
180
|
+
|
|
181
|
+
IF YOU DO NOT AGREE TO THESE TERMS, YOU ARE NOT AUTHORIZED TO USE THE SOFTWARE.
|
|
182
|
+
|
|
183
|
+
================================================================================
|
package/README.md
ADDED
|
@@ -0,0 +1,108 @@
|
|
|
1
|
+
# Secure AI by Northbridge Security
|
|
2
|
+
|
|
3
|
+
**AI agents are team members, not tools. They follow the same rules as humans.**
|
|
4
|
+
|
|
5
|
+
Secure AI enforces your Secure Development Lifecycle (SDLC) for both humans and AI agents, ensuring all code delivered meets the same standards: secure, validated, documented, deployed, and observable.
|
|
6
|
+
|
|
7
|
+
## Features
|
|
8
|
+
|
|
9
|
+
### Security Controls
|
|
10
|
+
|
|
11
|
+
Code meets security standards based on regulatory context.
|
|
12
|
+
|
|
13
|
+
- **No secrets in code** - Blocks commits containing API keys, tokens, and passwords
|
|
14
|
+
- **No PII exposure** - Prevents sensitive data from reaching AI providers
|
|
15
|
+
- **Supply chain integrity** - Pins dependencies and validates provenance
|
|
16
|
+
- **Static and dynamic analysis** - Detects vulnerabilities before and after deployment
|
|
17
|
+
|
|
18
|
+
### Quality Enforcement
|
|
19
|
+
|
|
20
|
+
Code is efficient, maintainable, well-designed, and fit for purpose.
|
|
21
|
+
|
|
22
|
+
- **Test coverage** - Enforces minimum coverage thresholds
|
|
23
|
+
- **Code standards** - Validates against company-wide coding standards
|
|
24
|
+
- **Requirements traceability** - Maps PRDs to tasks to commits
|
|
25
|
+
- **Human approval** - All code reviewed before merge
|
|
26
|
+
|
|
27
|
+
### Human-in-the-Loop
|
|
28
|
+
|
|
29
|
+
AI agents propose. Humans approve.
|
|
30
|
+
|
|
31
|
+
- **Sandboxed development** - AI agents work in isolated worktrees
|
|
32
|
+
- **Approval gates** - Human approval required for tasks, merges, and deploys
|
|
33
|
+
- **Blocked actions** - AI cannot push, deploy, or publish
|
|
34
|
+
- **Full audit trail** - Complete visibility into AI operations
|
|
35
|
+
|
|
36
|
+
## Alpha 0.2
|
|
37
|
+
|
|
38
|
+
This release adds real-time protection for AI agent interactions:
|
|
39
|
+
|
|
40
|
+
- **PII Detection** - Blocks prompts containing emails, phone numbers, credit cards, and other sensitive data before they reach AI providers
|
|
41
|
+
- **Secret Scanning** - Detects AWS keys, GitHub tokens, private keys, and database connection strings
|
|
42
|
+
- **Guard Hooks** - PreToolUse and UserPromptSubmit hooks for Claude Code
|
|
43
|
+
- **VSCode Dashboard** - Visual display of security findings
|
|
44
|
+
|
|
45
|
+
See [Alpha 0.2 Release Notes](docs/user/v0.2.md) for installation instructions and detailed feature documentation.
|
|
46
|
+
|
|
47
|
+
## Quick Start
|
|
48
|
+
|
|
49
|
+
```bash
|
|
50
|
+
# Install CLI
|
|
51
|
+
npm install -g @northbridge-security/secureai-cli
|
|
52
|
+
|
|
53
|
+
# Configure security hooks
|
|
54
|
+
secureai install
|
|
55
|
+
```
|
|
56
|
+
|
|
57
|
+
## Documentation
|
|
58
|
+
|
|
59
|
+
### Getting Started
|
|
60
|
+
|
|
61
|
+
| Document | Description |
|
|
62
|
+
| ------------------------------------------- | -------------------------------------------- |
|
|
63
|
+
| [Vision](docs/VISION.md) | Business value proposition and Code Complete |
|
|
64
|
+
| [Installation Guide](docs/installer.md) | Detailed installation and configuration |
|
|
65
|
+
| [Usage Guide](docs/USAGE.md) | CLI commands, tips, and troubleshooting |
|
|
66
|
+
| [Security Guard Rails](docs/user/guards.md) | Configure AI assistant security boundaries |
|
|
67
|
+
| [1Password Integration](docs/1password.md) | Secret management setup |
|
|
68
|
+
|
|
69
|
+
### Quality and Operations
|
|
70
|
+
|
|
71
|
+
| Document | Description |
|
|
72
|
+
| ------------------------------------------ | ---------------------------------------------- |
|
|
73
|
+
| [Quality Assurance](docs/QA.md) | Test strategy, coverage, and quality gates |
|
|
74
|
+
| [Security Policy](docs/SECURITY.md) | Security practices and vulnerability reporting |
|
|
75
|
+
| [AI Control Mode](docs/AI_CONTROL_MODE.md) | Configure AI permission levels |
|
|
76
|
+
|
|
77
|
+
### Architecture
|
|
78
|
+
|
|
79
|
+
| Document | Description |
|
|
80
|
+
| ------------------------------------------------------------ | ---------------------------------------- |
|
|
81
|
+
| [Domain Model](docs/domains.md) | System architecture and bounded contexts |
|
|
82
|
+
| [Clean Architecture Guide](docs/guides/agents.clean.arch.md) | Architectural patterns and principles |
|
|
83
|
+
|
|
84
|
+
### AI Agent Resources
|
|
85
|
+
|
|
86
|
+
| Document | Description |
|
|
87
|
+
| --------------------------------------------- | ---------------------------------- |
|
|
88
|
+
| [Agent Guidelines](docs/agents.md) | Slash commands and MCP tools |
|
|
89
|
+
| [Slash Commands](docs/commands.md) | Available commands for AI agents |
|
|
90
|
+
| [Best Practice Guides](docs/guides/README.md) | Standards for AI-generated content |
|
|
91
|
+
|
|
92
|
+
## Contributing
|
|
93
|
+
|
|
94
|
+
Interested in contributing? See [CONTRIBUTING.md](docs/CONTRIBUTING.md) for:
|
|
95
|
+
|
|
96
|
+
- Development setup and prerequisites
|
|
97
|
+
- Code style guidelines and naming conventions
|
|
98
|
+
- Testing guidelines and coverage requirements
|
|
99
|
+
- Commit message format (conventional commits)
|
|
100
|
+
- Pull request process
|
|
101
|
+
- MCP server development
|
|
102
|
+
- NPM publishing workflow
|
|
103
|
+
|
|
104
|
+
## License
|
|
105
|
+
|
|
106
|
+
This software is proprietary and confidential to Northbridge Security AB. See [LICENSE](LICENSE) for full terms.
|
|
107
|
+
|
|
108
|
+
**Important**: This is NOT open-source software. Usage is restricted to authorized Northbridge Security, Northbridge AB, and TechStars portfolio personnel only.
|