@sparkleideas/security 3.0.0-alpha.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/README.md +234 -0
  2. package/__tests__/acceptance/security-compliance.test.ts +674 -0
  3. package/__tests__/credential-generator.test.ts +310 -0
  4. package/__tests__/fixtures/configurations.ts +419 -0
  5. package/__tests__/fixtures/index.ts +21 -0
  6. package/__tests__/helpers/create-mock.ts +469 -0
  7. package/__tests__/helpers/index.ts +32 -0
  8. package/__tests__/input-validator.test.ts +381 -0
  9. package/__tests__/integration/security-flow.test.ts +606 -0
  10. package/__tests__/password-hasher.test.ts +239 -0
  11. package/__tests__/path-validator.test.ts +302 -0
  12. package/__tests__/safe-executor.test.ts +292 -0
  13. package/__tests__/token-generator.test.ts +371 -0
  14. package/__tests__/unit/credential-generator.test.ts +182 -0
  15. package/__tests__/unit/password-hasher.test.ts +359 -0
  16. package/__tests__/unit/path-validator.test.ts +509 -0
  17. package/__tests__/unit/safe-executor.test.ts +667 -0
  18. package/__tests__/unit/token-generator.test.ts +310 -0
  19. package/package.json +28 -0
  20. package/src/CVE-REMEDIATION.ts +251 -0
  21. package/src/application/index.ts +10 -0
  22. package/src/application/services/security-application-service.ts +193 -0
  23. package/src/credential-generator.ts +368 -0
  24. package/src/domain/entities/security-context.ts +173 -0
  25. package/src/domain/index.ts +17 -0
  26. package/src/domain/services/security-domain-service.ts +296 -0
  27. package/src/index.ts +271 -0
  28. package/src/input-validator.ts +466 -0
  29. package/src/password-hasher.ts +270 -0
  30. package/src/path-validator.ts +525 -0
  31. package/src/safe-executor.ts +525 -0
  32. package/src/token-generator.ts +463 -0
  33. package/tmp.json +0 -0
  34. package/tsconfig.json +9 -0
@@ -0,0 +1,193 @@
1
+ /**
2
+ * Security Application Service - Application Layer
3
+ *
4
+ * Orchestrates security operations and provides simplified interface.
5
+ *
6
+ * @module v3/security/application/services
7
+ */
8
+
9
+ import { SecurityContext, PermissionLevel } from '../../domain/entities/security-context.js';
10
+ import { SecurityDomainService, ValidationResult, ThreatDetectionResult } from '../../domain/services/security-domain-service.js';
11
+
12
+ /**
13
+ * Security audit result
14
+ */
15
+ export interface SecurityAuditResult {
16
+ passed: boolean;
17
+ score: number;
18
+ checks: Array<{
19
+ name: string;
20
+ passed: boolean;
21
+ severity: 'low' | 'medium' | 'high' | 'critical';
22
+ message: string;
23
+ }>;
24
+ recommendations: string[];
25
+ }
26
+
27
+ /**
28
+ * Security Application Service
29
+ */
30
+ export class SecurityApplicationService {
31
+ private readonly domainService: SecurityDomainService;
32
+ private readonly contexts: Map<string, SecurityContext> = new Map();
33
+
34
+ constructor() {
35
+ this.domainService = new SecurityDomainService();
36
+ }
37
+
38
+ // ============================================================================
39
+ // Context Management
40
+ // ============================================================================
41
+
42
+ /**
43
+ * Create and register security context for agent
44
+ */
45
+ createAgentContext(agentId: string, role: string): SecurityContext {
46
+ const context = this.domainService.createAgentContext(agentId, role);
47
+ this.contexts.set(agentId, context);
48
+ return context;
49
+ }
50
+
51
+ /**
52
+ * Get security context
53
+ */
54
+ getContext(principalId: string): SecurityContext | undefined {
55
+ return this.contexts.get(principalId);
56
+ }
57
+
58
+ /**
59
+ * Remove security context
60
+ */
61
+ removeContext(principalId: string): boolean {
62
+ return this.contexts.delete(principalId);
63
+ }
64
+
65
+ // ============================================================================
66
+ // Validation
67
+ // ============================================================================
68
+
69
+ /**
70
+ * Validate path access
71
+ */
72
+ validatePath(path: string, principalId: string): ValidationResult {
73
+ const context = this.contexts.get(principalId);
74
+ if (!context) {
75
+ return {
76
+ valid: false,
77
+ errors: ['Security context not found'],
78
+ warnings: [],
79
+ };
80
+ }
81
+
82
+ return this.domainService.validatePath(path, context);
83
+ }
84
+
85
+ /**
86
+ * Validate command execution
87
+ */
88
+ validateCommand(command: string, principalId: string): ValidationResult {
89
+ const context = this.contexts.get(principalId);
90
+ if (!context) {
91
+ return {
92
+ valid: false,
93
+ errors: ['Security context not found'],
94
+ warnings: [],
95
+ };
96
+ }
97
+
98
+ return this.domainService.validateCommand(command, context);
99
+ }
100
+
101
+ /**
102
+ * Validate user input
103
+ */
104
+ validateInput(input: string): ValidationResult {
105
+ return this.domainService.validateInput(input);
106
+ }
107
+
108
+ /**
109
+ * Detect threats in content
110
+ */
111
+ detectThreats(content: string): ThreatDetectionResult {
112
+ return this.domainService.detectThreats(content);
113
+ }
114
+
115
+ // ============================================================================
116
+ // Audit
117
+ // ============================================================================
118
+
119
+ /**
120
+ * Run security audit on codebase
121
+ */
122
+ async auditCodebase(files: Array<{ path: string; content: string }>): Promise<SecurityAuditResult> {
123
+ const checks: SecurityAuditResult['checks'] = [];
124
+ const recommendations: string[] = [];
125
+ let criticalCount = 0;
126
+ let highCount = 0;
127
+
128
+ for (const file of files) {
129
+ const threats = this.domainService.detectThreats(file.content);
130
+
131
+ for (const threat of threats.threats) {
132
+ checks.push({
133
+ name: `${threat.type} in ${file.path}`,
134
+ passed: false,
135
+ severity: threat.severity,
136
+ message: threat.description,
137
+ });
138
+
139
+ if (threat.severity === 'critical') criticalCount++;
140
+ if (threat.severity === 'high') highCount++;
141
+ }
142
+
143
+ if (threats.safe) {
144
+ checks.push({
145
+ name: `Security check: ${file.path}`,
146
+ passed: true,
147
+ severity: 'low',
148
+ message: 'No threats detected',
149
+ });
150
+ }
151
+ }
152
+
153
+ // Generate recommendations
154
+ if (criticalCount > 0) {
155
+ recommendations.push('Address critical security issues immediately');
156
+ }
157
+ if (highCount > 0) {
158
+ recommendations.push('Review and fix high-severity findings');
159
+ }
160
+ recommendations.push('Run regular security scans');
161
+ recommendations.push('Keep dependencies updated');
162
+
163
+ // Calculate score
164
+ const totalChecks = checks.length;
165
+ const passedChecks = checks.filter((c) => c.passed).length;
166
+ const score = totalChecks > 0 ? Math.round((passedChecks / totalChecks) * 100) : 100;
167
+
168
+ return {
169
+ passed: criticalCount === 0 && highCount === 0,
170
+ score,
171
+ checks,
172
+ recommendations,
173
+ };
174
+ }
175
+
176
+ /**
177
+ * Check if operation is allowed
178
+ */
179
+ isOperationAllowed(
180
+ principalId: string,
181
+ operation: 'path' | 'command',
182
+ target: string
183
+ ): boolean {
184
+ const context = this.contexts.get(principalId);
185
+ if (!context || context.isExpired()) return false;
186
+
187
+ if (operation === 'path') {
188
+ return context.canAccessPath(target);
189
+ } else {
190
+ return context.canExecuteCommand(target);
191
+ }
192
+ }
193
+ }
@@ -0,0 +1,368 @@
1
+ /**
2
+ * Credential Generator - CVE-3 Remediation
3
+ *
4
+ * Fixes hardcoded default credentials by providing secure random
5
+ * credential generation for installation and runtime.
6
+ *
7
+ * Security Properties:
8
+ * - Uses crypto.randomBytes for cryptographically secure randomness
9
+ * - Configurable entropy levels
10
+ * - No hardcoded defaults stored in code
11
+ * - Secure credential storage recommendations
12
+ *
13
+ * @module v3/security/credential-generator
14
+ */
15
+
16
+ import { randomBytes, randomUUID } from 'crypto';
17
+
18
+ export interface CredentialConfig {
19
+ /**
20
+ * Length of generated passwords.
21
+ * Default: 32 characters
22
+ */
23
+ passwordLength?: number;
24
+
25
+ /**
26
+ * Length of generated API keys.
27
+ * Default: 48 characters
28
+ */
29
+ apiKeyLength?: number;
30
+
31
+ /**
32
+ * Length of generated secrets (JWT, session, etc.).
33
+ * Default: 64 characters
34
+ */
35
+ secretLength?: number;
36
+
37
+ /**
38
+ * Character set for password generation.
39
+ * Default: alphanumeric + special
40
+ */
41
+ passwordCharset?: string;
42
+
43
+ /**
44
+ * Character set for API key generation.
45
+ * Default: alphanumeric only (URL-safe)
46
+ */
47
+ apiKeyCharset?: string;
48
+ }
49
+
50
+ export interface GeneratedCredentials {
51
+ adminPassword: string;
52
+ servicePassword: string;
53
+ jwtSecret: string;
54
+ sessionSecret: string;
55
+ encryptionKey: string;
56
+ generatedAt: Date;
57
+ expiresAt?: Date;
58
+ }
59
+
60
+ export interface ApiKeyCredential {
61
+ key: string;
62
+ prefix: string;
63
+ keyId: string;
64
+ createdAt: Date;
65
+ }
66
+
67
+ export class CredentialGeneratorError extends Error {
68
+ constructor(
69
+ message: string,
70
+ public readonly code: string,
71
+ ) {
72
+ super(message);
73
+ this.name = 'CredentialGeneratorError';
74
+ }
75
+ }
76
+
77
+ /**
78
+ * Character sets for credential generation
79
+ */
80
+ const CHARSETS = {
81
+ UPPERCASE: 'ABCDEFGHIJKLMNOPQRSTUVWXYZ',
82
+ LOWERCASE: 'abcdefghijklmnopqrstuvwxyz',
83
+ DIGITS: '0123456789',
84
+ SPECIAL: '!@#$%^&*()_+-=[]{}|;:,.<>?',
85
+ // URL-safe characters for API keys
86
+ URL_SAFE: 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_',
87
+ // Hex characters for secrets
88
+ HEX: '0123456789abcdef',
89
+ } as const;
90
+
91
+ /**
92
+ * Secure credential generator.
93
+ *
94
+ * This class provides cryptographically secure credential generation
95
+ * to replace hardcoded default credentials.
96
+ *
97
+ * @example
98
+ * ```typescript
99
+ * const generator = new CredentialGenerator();
100
+ * const credentials = generator.generateInstallationCredentials();
101
+ * // Store credentials securely (environment variables, secrets manager)
102
+ * ```
103
+ */
104
+ export class CredentialGenerator {
105
+ private readonly config: Required<CredentialConfig>;
106
+
107
+ constructor(config: CredentialConfig = {}) {
108
+ this.config = {
109
+ passwordLength: config.passwordLength ?? 32,
110
+ apiKeyLength: config.apiKeyLength ?? 48,
111
+ secretLength: config.secretLength ?? 64,
112
+ passwordCharset: config.passwordCharset ??
113
+ CHARSETS.UPPERCASE + CHARSETS.LOWERCASE + CHARSETS.DIGITS + CHARSETS.SPECIAL,
114
+ apiKeyCharset: config.apiKeyCharset ?? CHARSETS.URL_SAFE,
115
+ };
116
+
117
+ this.validateConfig();
118
+ }
119
+
120
+ /**
121
+ * Validates configuration parameters.
122
+ */
123
+ private validateConfig(): void {
124
+ if (this.config.passwordLength < 16) {
125
+ throw new CredentialGeneratorError(
126
+ 'Password length must be at least 16 characters',
127
+ 'INVALID_PASSWORD_LENGTH'
128
+ );
129
+ }
130
+
131
+ if (this.config.apiKeyLength < 32) {
132
+ throw new CredentialGeneratorError(
133
+ 'API key length must be at least 32 characters',
134
+ 'INVALID_API_KEY_LENGTH'
135
+ );
136
+ }
137
+
138
+ if (this.config.secretLength < 32) {
139
+ throw new CredentialGeneratorError(
140
+ 'Secret length must be at least 32 characters',
141
+ 'INVALID_SECRET_LENGTH'
142
+ );
143
+ }
144
+ }
145
+
146
+ /**
147
+ * Generates a cryptographically secure random string using rejection sampling
148
+ * to eliminate modulo bias.
149
+ *
150
+ * @param length - Length of the string to generate
151
+ * @param charset - Character set to use
152
+ * @returns Random string
153
+ */
154
+ private generateSecureString(length: number, charset: string): string {
155
+ const charsetLength = charset.length;
156
+ const result = new Array(length);
157
+
158
+ // Calculate rejection threshold to eliminate modulo bias
159
+ // For a byte (0-255), we reject values >= (256 - (256 % charsetLength))
160
+ // This ensures uniform distribution over charset indices
161
+ const maxValidValue = 256 - (256 % charsetLength);
162
+
163
+ let i = 0;
164
+ while (i < length) {
165
+ // Generate more random bytes than needed to reduce iterations
166
+ const randomBuffer = randomBytes(Math.max(length - i, 16));
167
+
168
+ for (let j = 0; j < randomBuffer.length && i < length; j++) {
169
+ const randomValue = randomBuffer[j];
170
+
171
+ // Rejection sampling: only accept values below threshold
172
+ if (randomValue < maxValidValue) {
173
+ result[i] = charset[randomValue % charsetLength];
174
+ i++;
175
+ }
176
+ // Values >= maxValidValue are rejected to avoid bias
177
+ }
178
+ }
179
+
180
+ return result.join('');
181
+ }
182
+
183
+ /**
184
+ * Generates a secure random password.
185
+ *
186
+ * @param length - Optional custom length (default from config)
187
+ * @returns Secure random password
188
+ */
189
+ generatePassword(length?: number): string {
190
+ const len = length ?? this.config.passwordLength;
191
+
192
+ // Ensure password contains at least one of each required character type
193
+ const password = this.generateSecureString(len, this.config.passwordCharset);
194
+
195
+ // Validate the generated password meets requirements
196
+ if (!this.hasRequiredCharacterTypes(password)) {
197
+ // Regenerate if requirements not met (rare case)
198
+ return this.generatePassword(length);
199
+ }
200
+
201
+ return password;
202
+ }
203
+
204
+ /**
205
+ * Checks if password has required character types.
206
+ */
207
+ private hasRequiredCharacterTypes(password: string): boolean {
208
+ const hasUppercase = /[A-Z]/.test(password);
209
+ const hasLowercase = /[a-z]/.test(password);
210
+ const hasDigit = /\d/.test(password);
211
+ const hasSpecial = /[!@#$%^&*()_+\-=\[\]{}|;:,.<>?]/.test(password);
212
+
213
+ return hasUppercase && hasLowercase && hasDigit && hasSpecial;
214
+ }
215
+
216
+ /**
217
+ * Generates a secure API key.
218
+ *
219
+ * @param prefix - Optional prefix for the key (e.g., 'cf_')
220
+ * @returns API key credential with metadata
221
+ */
222
+ generateApiKey(prefix = 'cf_'): ApiKeyCredential {
223
+ const keyBody = this.generateSecureString(
224
+ this.config.apiKeyLength - prefix.length,
225
+ this.config.apiKeyCharset
226
+ );
227
+
228
+ const key = `${prefix}${keyBody}`;
229
+ const keyId = randomUUID();
230
+
231
+ return {
232
+ key,
233
+ prefix,
234
+ keyId,
235
+ createdAt: new Date(),
236
+ };
237
+ }
238
+
239
+ /**
240
+ * Generates a secure secret for JWT, sessions, etc.
241
+ *
242
+ * @param length - Optional custom length (default from config)
243
+ * @returns Hex-encoded secret
244
+ */
245
+ generateSecret(length?: number): string {
246
+ const len = length ?? this.config.secretLength;
247
+ // Generate raw bytes and encode as hex for consistent storage
248
+ return randomBytes(Math.ceil(len / 2)).toString('hex').slice(0, len);
249
+ }
250
+
251
+ /**
252
+ * Generates an encryption key suitable for AES-256.
253
+ *
254
+ * @returns 32-byte key encoded as hex (64 characters)
255
+ */
256
+ generateEncryptionKey(): string {
257
+ return randomBytes(32).toString('hex');
258
+ }
259
+
260
+ /**
261
+ * Generates a complete set of installation credentials.
262
+ *
263
+ * These should be stored securely (environment variables,
264
+ * secrets manager, etc.) and NEVER committed to version control.
265
+ *
266
+ * @param expirationDays - Optional expiration period in days
267
+ * @returns Complete credential set
268
+ */
269
+ generateInstallationCredentials(expirationDays?: number): GeneratedCredentials {
270
+ const now = new Date();
271
+ const expiresAt = expirationDays
272
+ ? new Date(now.getTime() + expirationDays * 24 * 60 * 60 * 1000)
273
+ : undefined;
274
+
275
+ return {
276
+ adminPassword: this.generatePassword(),
277
+ servicePassword: this.generatePassword(),
278
+ jwtSecret: this.generateSecret(64),
279
+ sessionSecret: this.generateSecret(64),
280
+ encryptionKey: this.generateEncryptionKey(),
281
+ generatedAt: now,
282
+ expiresAt,
283
+ };
284
+ }
285
+
286
+ /**
287
+ * Generates a secure session token.
288
+ *
289
+ * @returns URL-safe session token
290
+ */
291
+ generateSessionToken(): string {
292
+ return this.generateSecureString(64, CHARSETS.URL_SAFE);
293
+ }
294
+
295
+ /**
296
+ * Generates a secure CSRF token.
297
+ *
298
+ * @returns CSRF token
299
+ */
300
+ generateCsrfToken(): string {
301
+ return randomBytes(32).toString('base64url');
302
+ }
303
+
304
+ /**
305
+ * Generates a secure nonce for one-time use.
306
+ *
307
+ * @returns Unique nonce value
308
+ */
309
+ generateNonce(): string {
310
+ return randomBytes(16).toString('hex');
311
+ }
312
+
313
+ /**
314
+ * Creates a setup script output for secure credential deployment.
315
+ *
316
+ * @param credentials - Generated credentials
317
+ * @returns Environment variable export script
318
+ */
319
+ createEnvScript(credentials: GeneratedCredentials): string {
320
+ return `# Claude Flow V3 - Generated Credentials
321
+ # Generated: ${credentials.generatedAt.toISOString()}
322
+ # IMPORTANT: Store these securely and delete this file after use
323
+
324
+ export CLAUDE_FLOW_ADMIN_PASSWORD="${credentials.adminPassword}"
325
+ export CLAUDE_FLOW_SERVICE_PASSWORD="${credentials.servicePassword}"
326
+ export CLAUDE_FLOW_JWT_SECRET="${credentials.jwtSecret}"
327
+ export CLAUDE_FLOW_SESSION_SECRET="${credentials.sessionSecret}"
328
+ export CLAUDE_FLOW_ENCRYPTION_KEY="${credentials.encryptionKey}"
329
+ `;
330
+ }
331
+
332
+ /**
333
+ * Creates a JSON configuration output for secure credential deployment.
334
+ *
335
+ * @param credentials - Generated credentials
336
+ * @returns JSON configuration (for secrets manager import)
337
+ */
338
+ createJsonConfig(credentials: GeneratedCredentials): string {
339
+ return JSON.stringify({
340
+ '@sparkleideas/claude-flow/admin-password': credentials.adminPassword,
341
+ '@sparkleideas/claude-flow/service-password': credentials.servicePassword,
342
+ '@sparkleideas/claude-flow/jwt-secret': credentials.jwtSecret,
343
+ '@sparkleideas/claude-flow/session-secret': credentials.sessionSecret,
344
+ '@sparkleideas/claude-flow/encryption-key': credentials.encryptionKey,
345
+ '@sparkleideas/claude-flow/generated-at': credentials.generatedAt.toISOString(),
346
+ '@sparkleideas/claude-flow/expires-at': credentials.expiresAt?.toISOString() ?? null,
347
+ }, null, 2);
348
+ }
349
+ }
350
+
351
+ /**
352
+ * Factory function to create a production credential generator.
353
+ *
354
+ * @returns Configured CredentialGenerator instance
355
+ */
356
+ export function createCredentialGenerator(): CredentialGenerator {
357
+ return new CredentialGenerator();
358
+ }
359
+
360
+ /**
361
+ * Quick credential generation for CLI usage.
362
+ *
363
+ * @returns Generated installation credentials
364
+ */
365
+ export function generateCredentials(): GeneratedCredentials {
366
+ const generator = new CredentialGenerator();
367
+ return generator.generateInstallationCredentials();
368
+ }