@sparkleideas/security 3.0.0-alpha.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/README.md +234 -0
  2. package/__tests__/acceptance/security-compliance.test.ts +674 -0
  3. package/__tests__/credential-generator.test.ts +310 -0
  4. package/__tests__/fixtures/configurations.ts +419 -0
  5. package/__tests__/fixtures/index.ts +21 -0
  6. package/__tests__/helpers/create-mock.ts +469 -0
  7. package/__tests__/helpers/index.ts +32 -0
  8. package/__tests__/input-validator.test.ts +381 -0
  9. package/__tests__/integration/security-flow.test.ts +606 -0
  10. package/__tests__/password-hasher.test.ts +239 -0
  11. package/__tests__/path-validator.test.ts +302 -0
  12. package/__tests__/safe-executor.test.ts +292 -0
  13. package/__tests__/token-generator.test.ts +371 -0
  14. package/__tests__/unit/credential-generator.test.ts +182 -0
  15. package/__tests__/unit/password-hasher.test.ts +359 -0
  16. package/__tests__/unit/path-validator.test.ts +509 -0
  17. package/__tests__/unit/safe-executor.test.ts +667 -0
  18. package/__tests__/unit/token-generator.test.ts +310 -0
  19. package/package.json +28 -0
  20. package/src/CVE-REMEDIATION.ts +251 -0
  21. package/src/application/index.ts +10 -0
  22. package/src/application/services/security-application-service.ts +193 -0
  23. package/src/credential-generator.ts +368 -0
  24. package/src/domain/entities/security-context.ts +173 -0
  25. package/src/domain/index.ts +17 -0
  26. package/src/domain/services/security-domain-service.ts +296 -0
  27. package/src/index.ts +271 -0
  28. package/src/input-validator.ts +466 -0
  29. package/src/password-hasher.ts +270 -0
  30. package/src/path-validator.ts +525 -0
  31. package/src/safe-executor.ts +525 -0
  32. package/src/token-generator.ts +463 -0
  33. package/tmp.json +0 -0
  34. package/tsconfig.json +9 -0
@@ -0,0 +1,173 @@
1
+ /**
2
+ * Security Context Entity - Domain Layer
3
+ *
4
+ * Represents security context for operations with validation and policy enforcement.
5
+ *
6
+ * @module v3/security/domain/entities
7
+ */
8
+
9
+ import { randomUUID } from 'crypto';
10
+
11
+ /**
12
+ * Permission levels
13
+ */
14
+ export type PermissionLevel = 'read' | 'write' | 'execute' | 'admin';
15
+
16
+ /**
17
+ * Security context properties
18
+ */
19
+ export interface SecurityContextProps {
20
+ id?: string;
21
+ principalId: string;
22
+ principalType: 'agent' | 'user' | 'system';
23
+ permissions: PermissionLevel[];
24
+ allowedPaths?: string[];
25
+ blockedPaths?: string[];
26
+ allowedCommands?: string[];
27
+ blockedCommands?: string[];
28
+ metadata?: Record<string, unknown>;
29
+ expiresAt?: Date;
30
+ createdAt?: Date;
31
+ }
32
+
33
+ /**
34
+ * Security Context - Entity
35
+ */
36
+ export class SecurityContext {
37
+ private _id: string;
38
+ private _principalId: string;
39
+ private _principalType: 'agent' | 'user' | 'system';
40
+ private _permissions: Set<PermissionLevel>;
41
+ private _allowedPaths: Set<string>;
42
+ private _blockedPaths: Set<string>;
43
+ private _allowedCommands: Set<string>;
44
+ private _blockedCommands: Set<string>;
45
+ private _metadata: Record<string, unknown>;
46
+ private _expiresAt?: Date;
47
+ private _createdAt: Date;
48
+
49
+ private constructor(props: SecurityContextProps) {
50
+ this._id = props.id ?? randomUUID();
51
+ this._principalId = props.principalId;
52
+ this._principalType = props.principalType;
53
+ this._permissions = new Set(props.permissions);
54
+ this._allowedPaths = new Set(props.allowedPaths ?? []);
55
+ this._blockedPaths = new Set(props.blockedPaths ?? []);
56
+ this._allowedCommands = new Set(props.allowedCommands ?? []);
57
+ this._blockedCommands = new Set(props.blockedCommands ?? []);
58
+ this._metadata = props.metadata ?? {};
59
+ this._expiresAt = props.expiresAt;
60
+ this._createdAt = props.createdAt ?? new Date();
61
+ }
62
+
63
+ static create(props: SecurityContextProps): SecurityContext {
64
+ return new SecurityContext(props);
65
+ }
66
+
67
+ static fromPersistence(props: SecurityContextProps): SecurityContext {
68
+ return new SecurityContext(props);
69
+ }
70
+
71
+ get id(): string { return this._id; }
72
+ get principalId(): string { return this._principalId; }
73
+ get principalType(): string { return this._principalType; }
74
+ get permissions(): PermissionLevel[] { return Array.from(this._permissions); }
75
+ get allowedPaths(): string[] { return Array.from(this._allowedPaths); }
76
+ get blockedPaths(): string[] { return Array.from(this._blockedPaths); }
77
+ get allowedCommands(): string[] { return Array.from(this._allowedCommands); }
78
+ get blockedCommands(): string[] { return Array.from(this._blockedCommands); }
79
+ get metadata(): Record<string, unknown> { return { ...this._metadata }; }
80
+ get expiresAt(): Date | undefined { return this._expiresAt; }
81
+ get createdAt(): Date { return new Date(this._createdAt); }
82
+
83
+ // Business Logic
84
+
85
+ hasPermission(level: PermissionLevel): boolean {
86
+ return this._permissions.has(level) || this._permissions.has('admin');
87
+ }
88
+
89
+ isExpired(): boolean {
90
+ if (!this._expiresAt) return false;
91
+ return Date.now() > this._expiresAt.getTime();
92
+ }
93
+
94
+ canAccessPath(path: string): boolean {
95
+ if (this.isExpired()) return false;
96
+
97
+ // Check blocked paths first
98
+ for (const blocked of this._blockedPaths) {
99
+ if (path.startsWith(blocked) || this.matchGlob(path, blocked)) {
100
+ return false;
101
+ }
102
+ }
103
+
104
+ // If no allowed paths specified, allow all non-blocked
105
+ if (this._allowedPaths.size === 0) return true;
106
+
107
+ // Check allowed paths
108
+ for (const allowed of this._allowedPaths) {
109
+ if (path.startsWith(allowed) || this.matchGlob(path, allowed)) {
110
+ return true;
111
+ }
112
+ }
113
+
114
+ return false;
115
+ }
116
+
117
+ canExecuteCommand(command: string): boolean {
118
+ if (this.isExpired()) return false;
119
+
120
+ const cmdBase = command.split(' ')[0];
121
+
122
+ // Check blocked commands first
123
+ if (this._blockedCommands.has(cmdBase) || this._blockedCommands.has(command)) {
124
+ return false;
125
+ }
126
+
127
+ // If no allowed commands specified, allow all non-blocked
128
+ if (this._allowedCommands.size === 0) return true;
129
+
130
+ // Check allowed commands
131
+ return this._allowedCommands.has(cmdBase) || this._allowedCommands.has(command);
132
+ }
133
+
134
+ private matchGlob(path: string, pattern: string): boolean {
135
+ const regex = pattern
136
+ .replace(/\*\*/g, '.*')
137
+ .replace(/\*/g, '[^/]*')
138
+ .replace(/\?/g, '.');
139
+ return new RegExp(`^${regex}$`).test(path);
140
+ }
141
+
142
+ grantPermission(level: PermissionLevel): void {
143
+ this._permissions.add(level);
144
+ }
145
+
146
+ revokePermission(level: PermissionLevel): void {
147
+ this._permissions.delete(level);
148
+ }
149
+
150
+ addAllowedPath(path: string): void {
151
+ this._allowedPaths.add(path);
152
+ }
153
+
154
+ addBlockedPath(path: string): void {
155
+ this._blockedPaths.add(path);
156
+ }
157
+
158
+ toPersistence(): Record<string, unknown> {
159
+ return {
160
+ id: this._id,
161
+ principalId: this._principalId,
162
+ principalType: this._principalType,
163
+ permissions: Array.from(this._permissions),
164
+ allowedPaths: Array.from(this._allowedPaths),
165
+ blockedPaths: Array.from(this._blockedPaths),
166
+ allowedCommands: Array.from(this._allowedCommands),
167
+ blockedCommands: Array.from(this._blockedCommands),
168
+ metadata: this._metadata,
169
+ expiresAt: this._expiresAt?.toISOString(),
170
+ createdAt: this._createdAt.toISOString(),
171
+ };
172
+ }
173
+ }
@@ -0,0 +1,17 @@
1
+ /**
2
+ * Security Domain Layer - Public Exports
3
+ *
4
+ * @module v3/security/domain
5
+ */
6
+
7
+ export {
8
+ SecurityContext,
9
+ type PermissionLevel,
10
+ type SecurityContextProps,
11
+ } from './entities/security-context.js';
12
+
13
+ export {
14
+ SecurityDomainService,
15
+ type ValidationResult,
16
+ type ThreatDetectionResult,
17
+ } from './services/security-domain-service.js';
@@ -0,0 +1,296 @@
1
+ /**
2
+ * Security Domain Service - Domain Layer
3
+ *
4
+ * Contains security logic for validation, policy enforcement, and threat detection.
5
+ *
6
+ * @module v3/security/domain/services
7
+ */
8
+
9
+ import { SecurityContext, PermissionLevel } from '../entities/security-context.js';
10
+
11
+ /**
12
+ * Validation result
13
+ */
14
+ export interface ValidationResult {
15
+ valid: boolean;
16
+ errors: string[];
17
+ warnings: string[];
18
+ sanitized?: string;
19
+ }
20
+
21
+ /**
22
+ * Threat detection result
23
+ */
24
+ export interface ThreatDetectionResult {
25
+ safe: boolean;
26
+ threats: Array<{
27
+ type: string;
28
+ severity: 'low' | 'medium' | 'high' | 'critical';
29
+ description: string;
30
+ location?: string;
31
+ }>;
32
+ }
33
+
34
+ /**
35
+ * Security Domain Service
36
+ */
37
+ export class SecurityDomainService {
38
+ // Dangerous patterns for path traversal
39
+ private static readonly PATH_TRAVERSAL_PATTERNS = [
40
+ /\.\./,
41
+ /~\//,
42
+ /^\/etc\//,
43
+ /^\/tmp\//,
44
+ /^\/var\/log\//,
45
+ /^C:\\Windows/i,
46
+ /^C:\\Users\\[^\\]+\\AppData/i,
47
+ ];
48
+
49
+ // Dangerous command patterns
50
+ private static readonly DANGEROUS_COMMANDS = [
51
+ /^rm\s+-rf\s+\//,
52
+ /^rm\s+-rf\s+\*/,
53
+ /^dd\s+if=/,
54
+ /^mkfs\./,
55
+ /^format\s+/i,
56
+ /^del\s+\/s\s+\/q/i,
57
+ />\s*\/dev\/sd[a-z]/,
58
+ /\|\s*bash$/,
59
+ /\|\s*sh$/,
60
+ /eval\s*\(/,
61
+ /exec\s*\(/,
62
+ ];
63
+
64
+ // SQL injection patterns
65
+ private static readonly SQL_INJECTION_PATTERNS = [
66
+ /'\s*OR\s+'1'\s*=\s*'1/i,
67
+ /'\s*OR\s+1\s*=\s*1/i,
68
+ /;\s*DROP\s+TABLE/i,
69
+ /;\s*DELETE\s+FROM/i,
70
+ /UNION\s+SELECT/i,
71
+ /--\s*$/,
72
+ ];
73
+
74
+ // XSS patterns
75
+ private static readonly XSS_PATTERNS = [
76
+ /<script[\s>]/i,
77
+ /javascript:/i,
78
+ /on\w+\s*=/i,
79
+ /<iframe/i,
80
+ /<object/i,
81
+ /<embed/i,
82
+ ];
83
+
84
+ /**
85
+ * Validate a file path
86
+ */
87
+ validatePath(path: string, context: SecurityContext): ValidationResult {
88
+ const errors: string[] = [];
89
+ const warnings: string[] = [];
90
+
91
+ // Check path traversal
92
+ for (const pattern of SecurityDomainService.PATH_TRAVERSAL_PATTERNS) {
93
+ if (pattern.test(path)) {
94
+ errors.push(`Path traversal detected: ${pattern.source}`);
95
+ }
96
+ }
97
+
98
+ // Check context permissions
99
+ if (!context.canAccessPath(path)) {
100
+ errors.push(`Access denied to path: ${path}`);
101
+ }
102
+
103
+ // Check for suspicious paths
104
+ if (path.includes('..')) {
105
+ warnings.push('Path contains parent directory reference');
106
+ }
107
+
108
+ return {
109
+ valid: errors.length === 0,
110
+ errors,
111
+ warnings,
112
+ sanitized: this.sanitizePath(path),
113
+ };
114
+ }
115
+
116
+ /**
117
+ * Validate a command
118
+ */
119
+ validateCommand(command: string, context: SecurityContext): ValidationResult {
120
+ const errors: string[] = [];
121
+ const warnings: string[] = [];
122
+
123
+ // Check dangerous commands
124
+ for (const pattern of SecurityDomainService.DANGEROUS_COMMANDS) {
125
+ if (pattern.test(command)) {
126
+ errors.push(`Dangerous command pattern detected: ${pattern.source}`);
127
+ }
128
+ }
129
+
130
+ // Check context permissions
131
+ if (!context.canExecuteCommand(command)) {
132
+ errors.push(`Command execution denied: ${command}`);
133
+ }
134
+
135
+ if (!context.hasPermission('execute')) {
136
+ errors.push('Execute permission required');
137
+ }
138
+
139
+ // Check for shell injection
140
+ if (/[;&|`$(){}]/.test(command)) {
141
+ warnings.push('Command contains shell metacharacters');
142
+ }
143
+
144
+ return {
145
+ valid: errors.length === 0,
146
+ errors,
147
+ warnings,
148
+ sanitized: this.sanitizeCommand(command),
149
+ };
150
+ }
151
+
152
+ /**
153
+ * Validate user input
154
+ */
155
+ validateInput(input: string): ValidationResult {
156
+ const errors: string[] = [];
157
+ const warnings: string[] = [];
158
+
159
+ // Check for SQL injection
160
+ for (const pattern of SecurityDomainService.SQL_INJECTION_PATTERNS) {
161
+ if (pattern.test(input)) {
162
+ errors.push(`SQL injection pattern detected`);
163
+ break;
164
+ }
165
+ }
166
+
167
+ // Check for XSS
168
+ for (const pattern of SecurityDomainService.XSS_PATTERNS) {
169
+ if (pattern.test(input)) {
170
+ errors.push(`XSS pattern detected`);
171
+ break;
172
+ }
173
+ }
174
+
175
+ // Check length
176
+ if (input.length > 10000) {
177
+ warnings.push('Input exceeds recommended length');
178
+ }
179
+
180
+ return {
181
+ valid: errors.length === 0,
182
+ errors,
183
+ warnings,
184
+ sanitized: this.sanitizeInput(input),
185
+ };
186
+ }
187
+
188
+ /**
189
+ * Detect threats in content
190
+ */
191
+ detectThreats(content: string): ThreatDetectionResult {
192
+ const threats: ThreatDetectionResult['threats'] = [];
193
+
194
+ // Check for various threat patterns
195
+ if (/<script/i.test(content)) {
196
+ threats.push({
197
+ type: 'xss',
198
+ severity: 'high',
199
+ description: 'Script tag detected',
200
+ });
201
+ }
202
+
203
+ if (/password\s*[:=]\s*["'][^"']+["']/i.test(content)) {
204
+ threats.push({
205
+ type: 'credential-exposure',
206
+ severity: 'critical',
207
+ description: 'Hardcoded password detected',
208
+ });
209
+ }
210
+
211
+ if (/api[_-]?key\s*[:=]\s*["'][^"']+["']/i.test(content)) {
212
+ threats.push({
213
+ type: 'credential-exposure',
214
+ severity: 'critical',
215
+ description: 'API key detected',
216
+ });
217
+ }
218
+
219
+ if (/eval\s*\(/.test(content)) {
220
+ threats.push({
221
+ type: 'code-injection',
222
+ severity: 'high',
223
+ description: 'Eval statement detected',
224
+ });
225
+ }
226
+
227
+ return {
228
+ safe: threats.length === 0,
229
+ threats,
230
+ };
231
+ }
232
+
233
+ /**
234
+ * Sanitize path
235
+ */
236
+ private sanitizePath(path: string): string {
237
+ return path
238
+ .replace(/\.\./g, '')
239
+ .replace(/\/\//g, '/')
240
+ .replace(/^~\//, '')
241
+ .trim();
242
+ }
243
+
244
+ /**
245
+ * Sanitize command
246
+ */
247
+ private sanitizeCommand(command: string): string {
248
+ return command
249
+ .replace(/[;&|`$]/g, '')
250
+ .replace(/\$\([^)]*\)/g, '')
251
+ .trim();
252
+ }
253
+
254
+ /**
255
+ * Sanitize user input
256
+ */
257
+ private sanitizeInput(input: string): string {
258
+ return input
259
+ .replace(/</g, '&lt;')
260
+ .replace(/>/g, '&gt;')
261
+ .replace(/"/g, '&quot;')
262
+ .replace(/'/g, '&#x27;')
263
+ .replace(/\//g, '&#x2F;');
264
+ }
265
+
266
+ /**
267
+ * Create security context for agent
268
+ */
269
+ createAgentContext(
270
+ agentId: string,
271
+ role: string,
272
+ customPaths?: string[]
273
+ ): SecurityContext {
274
+ // Default permissions based on role
275
+ const rolePermissions: Record<string, PermissionLevel[]> = {
276
+ 'queen-coordinator': ['read', 'write', 'execute', 'admin'],
277
+ 'security-architect': ['read', 'write', 'execute', 'admin'],
278
+ 'coder': ['read', 'write', 'execute'],
279
+ 'reviewer': ['read'],
280
+ 'tester': ['read', 'execute'],
281
+ default: ['read'],
282
+ };
283
+
284
+ const permissions = rolePermissions[role] ?? rolePermissions.default;
285
+
286
+ return SecurityContext.create({
287
+ principalId: agentId,
288
+ principalType: 'agent',
289
+ permissions,
290
+ allowedPaths: customPaths ?? ['./src', './tests', './docs'],
291
+ blockedPaths: ['/etc', '/var', '~/', '../'],
292
+ allowedCommands: ['npm', 'npx', 'node', 'git', 'vitest'],
293
+ blockedCommands: ['rm -rf /', 'dd', 'mkfs', 'format'],
294
+ });
295
+ }
296
+ }