@trac3r/oh-my-god 2.2.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (638) hide show
  1. package/CHANGELOG.md +188 -0
  2. package/INSTALL-VERIFICATION-INDEX.md +51 -0
  3. package/LICENSE +21 -0
  4. package/OMG-setup.sh +2549 -0
  5. package/QUICK-REFERENCE.md +58 -0
  6. package/README.md +207 -0
  7. package/agents/__init__.py +1 -0
  8. package/agents/__pycache__/model_roles.cpython-313.pyc +0 -0
  9. package/agents/_model_roles.yaml +26 -0
  10. package/agents/designer.md +67 -0
  11. package/agents/explore.md +60 -0
  12. package/agents/model_roles.py +196 -0
  13. package/agents/omg-api-builder.md +23 -0
  14. package/agents/omg-architect-mode.md +41 -0
  15. package/agents/omg-architect.md +13 -0
  16. package/agents/omg-backend-engineer.md +41 -0
  17. package/agents/omg-critic.md +16 -0
  18. package/agents/omg-database-engineer.md +41 -0
  19. package/agents/omg-escalation-router.md +17 -0
  20. package/agents/omg-executor.md +12 -0
  21. package/agents/omg-frontend-designer.md +41 -0
  22. package/agents/omg-implement-mode.md +49 -0
  23. package/agents/omg-infra-engineer.md +41 -0
  24. package/agents/omg-qa-tester.md +16 -0
  25. package/agents/omg-research-mode.md +41 -0
  26. package/agents/omg-security-auditor.md +41 -0
  27. package/agents/omg-testing-engineer.md +41 -0
  28. package/agents/plan.md +80 -0
  29. package/agents/quick_task.md +64 -0
  30. package/agents/reviewer.md +83 -0
  31. package/agents/task.md +71 -0
  32. package/bin/omg +41 -0
  33. package/commands/OMG:ai-commit.md +113 -0
  34. package/commands/OMG:api-twin.md +22 -0
  35. package/commands/OMG:arch.md +313 -0
  36. package/commands/OMG:browser.md +29 -0
  37. package/commands/OMG:ccg.md +22 -0
  38. package/commands/OMG:compat.md +57 -0
  39. package/commands/OMG:cost.md +181 -0
  40. package/commands/OMG:crazy.md +125 -0
  41. package/commands/OMG:create-agent.md +183 -0
  42. package/commands/OMG:deep-plan.md +18 -0
  43. package/commands/OMG:deps.md +248 -0
  44. package/commands/OMG:diagnose-plugins.md +33 -0
  45. package/commands/OMG:doctor.md +37 -0
  46. package/commands/OMG:domain-init.md +11 -0
  47. package/commands/OMG:escalate.md +52 -0
  48. package/commands/OMG:forge.md +103 -0
  49. package/commands/OMG:health-check.md +48 -0
  50. package/commands/OMG:init.md +134 -0
  51. package/commands/OMG:issue.md +56 -0
  52. package/commands/OMG:mode.md +44 -0
  53. package/commands/OMG:playwright.md +17 -0
  54. package/commands/OMG:preflight.md +26 -0
  55. package/commands/OMG:preset.md +49 -0
  56. package/commands/OMG:profile-review.md +58 -0
  57. package/commands/OMG:project-init.md +11 -0
  58. package/commands/OMG:ralph-start.md +43 -0
  59. package/commands/OMG:ralph-stop.md +23 -0
  60. package/commands/OMG:security-check.md +28 -0
  61. package/commands/OMG:session-branch.md +101 -0
  62. package/commands/OMG:session-fork.md +57 -0
  63. package/commands/OMG:session-merge.md +138 -0
  64. package/commands/OMG:setup.md +82 -0
  65. package/commands/OMG:ship.md +18 -0
  66. package/commands/OMG:stats.md +225 -0
  67. package/commands/OMG:teams.md +54 -0
  68. package/commands/OMG:theme.md +44 -0
  69. package/commands/OMG:validate.md +59 -0
  70. package/commands/__init__.py +1 -0
  71. package/docs/command-surface.md +55 -0
  72. package/docs/install/claude-code.md +53 -0
  73. package/docs/install/codex.md +45 -0
  74. package/docs/install/gemini.md +43 -0
  75. package/docs/install/github-action.md +81 -0
  76. package/docs/install/github-app-required-checks.md +107 -0
  77. package/docs/install/github-app.md +161 -0
  78. package/docs/install/kimi.md +43 -0
  79. package/docs/install/opencode.md +38 -0
  80. package/docs/proof.md +182 -0
  81. package/hooks/__init__.py +0 -0
  82. package/hooks/__pycache__/__init__.cpython-313.pyc +0 -0
  83. package/hooks/__pycache__/_agent_registry.cpython-313.pyc +0 -0
  84. package/hooks/__pycache__/_analytics.cpython-313.pyc +0 -0
  85. package/hooks/__pycache__/_budget.cpython-313.pyc +0 -0
  86. package/hooks/__pycache__/_common.cpython-313.pyc +0 -0
  87. package/hooks/__pycache__/_compression_optimizer.cpython-313.pyc +0 -0
  88. package/hooks/__pycache__/_cost_ledger.cpython-313.pyc +0 -0
  89. package/hooks/__pycache__/_learnings.cpython-313.pyc +0 -0
  90. package/hooks/__pycache__/_memory.cpython-313.pyc +0 -0
  91. package/hooks/__pycache__/_post_write.cpython-313.pyc +0 -0
  92. package/hooks/__pycache__/_protected_context.cpython-313.pyc +0 -0
  93. package/hooks/__pycache__/_token_counter.cpython-313.pyc +0 -0
  94. package/hooks/__pycache__/branch_manager.cpython-313.pyc +0 -0
  95. package/hooks/__pycache__/budget_governor.cpython-313.pyc +0 -0
  96. package/hooks/__pycache__/circuit-breaker.cpython-313.pyc +0 -0
  97. package/hooks/__pycache__/compression_feedback.cpython-313.pyc +0 -0
  98. package/hooks/__pycache__/config-guard.cpython-313.pyc +0 -0
  99. package/hooks/__pycache__/context_pressure.cpython-313.pyc +0 -0
  100. package/hooks/__pycache__/credential_store.cpython-313.pyc +0 -0
  101. package/hooks/__pycache__/fetch-rate-limits.cpython-313.pyc +0 -0
  102. package/hooks/__pycache__/firewall.cpython-313.pyc +0 -0
  103. package/hooks/__pycache__/hashline-formatter-bridge.cpython-313.pyc +0 -0
  104. package/hooks/__pycache__/hashline-injector.cpython-313.pyc +0 -0
  105. package/hooks/__pycache__/hashline-validator.cpython-313.pyc +0 -0
  106. package/hooks/__pycache__/idle-detector.cpython-313.pyc +0 -0
  107. package/hooks/__pycache__/instructions-loaded.cpython-313.pyc +0 -0
  108. package/hooks/__pycache__/intentgate-keyword-detector.cpython-313.pyc +0 -0
  109. package/hooks/__pycache__/magic-keyword-router.cpython-313.pyc +0 -0
  110. package/hooks/__pycache__/policy_engine.cpython-313.pyc +0 -0
  111. package/hooks/__pycache__/post-tool-failure.cpython-313.pyc +0 -0
  112. package/hooks/__pycache__/post-write.cpython-313.pyc +0 -0
  113. package/hooks/__pycache__/post_write.cpython-313.pyc +0 -0
  114. package/hooks/__pycache__/pre-compact.cpython-313.pyc +0 -0
  115. package/hooks/__pycache__/pre-tool-inject.cpython-313.pyc +0 -0
  116. package/hooks/__pycache__/prompt-enhancer.cpython-313.pyc +0 -0
  117. package/hooks/__pycache__/quality-runner.cpython-313.pyc +0 -0
  118. package/hooks/__pycache__/query.cpython-313.pyc +0 -0
  119. package/hooks/__pycache__/secret-guard.cpython-313.pyc +0 -0
  120. package/hooks/__pycache__/secret_audit.cpython-313.pyc +0 -0
  121. package/hooks/__pycache__/security_validators.cpython-313.pyc +0 -0
  122. package/hooks/__pycache__/session-end-capture.cpython-313.pyc +0 -0
  123. package/hooks/__pycache__/session-start.cpython-313.pyc +0 -0
  124. package/hooks/__pycache__/setup_wizard.cpython-313.pyc +0 -0
  125. package/hooks/__pycache__/shadow_manager.cpython-313.pyc +0 -0
  126. package/hooks/__pycache__/state_migration.cpython-313.pyc +0 -0
  127. package/hooks/__pycache__/stop-gate.cpython-313.pyc +0 -0
  128. package/hooks/__pycache__/stop_dispatcher.cpython-313.pyc +0 -0
  129. package/hooks/__pycache__/tdd-gate.cpython-313.pyc +0 -0
  130. package/hooks/__pycache__/terms-guard.cpython-313.pyc +0 -0
  131. package/hooks/__pycache__/test-validator.cpython-313.pyc +0 -0
  132. package/hooks/__pycache__/test_generator_hook.cpython-313.pyc +0 -0
  133. package/hooks/__pycache__/todo-state-tracker.cpython-313.pyc +0 -0
  134. package/hooks/__pycache__/tool-ledger.cpython-313.pyc +0 -0
  135. package/hooks/__pycache__/trust_review.cpython-313.pyc +0 -0
  136. package/hooks/__pycache__/user-prompt-submit.cpython-313.pyc +0 -0
  137. package/hooks/_agent_registry.py +481 -0
  138. package/hooks/_analytics.py +291 -0
  139. package/hooks/_budget.py +31 -0
  140. package/hooks/_common.py +761 -0
  141. package/hooks/_compression_optimizer.py +119 -0
  142. package/hooks/_cost_ledger.py +176 -0
  143. package/hooks/_learnings.py +126 -0
  144. package/hooks/_memory.py +103 -0
  145. package/hooks/_post_write.py +46 -0
  146. package/hooks/_protected_context.py +150 -0
  147. package/hooks/_token_counter.py +221 -0
  148. package/hooks/branch_manager.py +255 -0
  149. package/hooks/budget_governor.py +326 -0
  150. package/hooks/circuit-breaker.py +270 -0
  151. package/hooks/compression_feedback.py +254 -0
  152. package/hooks/config-guard.py +193 -0
  153. package/hooks/context_pressure.py +119 -0
  154. package/hooks/credential_store.py +970 -0
  155. package/hooks/fetch-rate-limits.py +212 -0
  156. package/hooks/firewall.py +323 -0
  157. package/hooks/hashline-formatter-bridge.py +224 -0
  158. package/hooks/hashline-injector.py +273 -0
  159. package/hooks/hashline-validator.py +216 -0
  160. package/hooks/idle-detector.py +97 -0
  161. package/hooks/instructions-loaded.py +26 -0
  162. package/hooks/intentgate-keyword-detector.py +200 -0
  163. package/hooks/magic-keyword-router.py +195 -0
  164. package/hooks/policy_engine.py +767 -0
  165. package/hooks/post-tool-failure.py +19 -0
  166. package/hooks/post-write.py +233 -0
  167. package/hooks/pre-compact.py +470 -0
  168. package/hooks/pre-tool-inject.py +98 -0
  169. package/hooks/prompt-enhancer.py +879 -0
  170. package/hooks/quality-runner.py +191 -0
  171. package/hooks/query.py +512 -0
  172. package/hooks/secret-guard.py +120 -0
  173. package/hooks/secret_audit.py +144 -0
  174. package/hooks/security_validators.py +93 -0
  175. package/hooks/session-end-capture.py +505 -0
  176. package/hooks/session-start.py +261 -0
  177. package/hooks/setup_wizard.py +1101 -0
  178. package/hooks/shadow_manager.py +476 -0
  179. package/hooks/state_migration.py +228 -0
  180. package/hooks/stop-gate.py +7 -0
  181. package/hooks/stop_dispatcher.py +1259 -0
  182. package/hooks/tdd-gate.py +10 -0
  183. package/hooks/terms-guard.py +98 -0
  184. package/hooks/test-validator.py +462 -0
  185. package/hooks/test_generator_hook.py +123 -0
  186. package/hooks/todo-state-tracker.py +114 -0
  187. package/hooks/tool-ledger.py +165 -0
  188. package/hooks/trust_review.py +662 -0
  189. package/hooks/user-prompt-submit.py +12 -0
  190. package/hud/omg-hud.mjs +1571 -0
  191. package/lab/__init__.py +1 -0
  192. package/lab/__pycache__/__init__.cpython-313.pyc +0 -0
  193. package/lab/__pycache__/axolotl_adapter.cpython-313.pyc +0 -0
  194. package/lab/__pycache__/forge_runner.cpython-313.pyc +0 -0
  195. package/lab/__pycache__/gazebo_adapter.cpython-313.pyc +0 -0
  196. package/lab/__pycache__/isaac_gym_adapter.cpython-313.pyc +0 -0
  197. package/lab/__pycache__/mock_isaac_env.cpython-313.pyc +0 -0
  198. package/lab/__pycache__/pipeline.cpython-313.pyc +0 -0
  199. package/lab/__pycache__/policies.cpython-313.pyc +0 -0
  200. package/lab/__pycache__/pybullet_adapter.cpython-313.pyc +0 -0
  201. package/lab/axolotl_adapter.py +531 -0
  202. package/lab/forge_runner.py +103 -0
  203. package/lab/gazebo_adapter.py +168 -0
  204. package/lab/isaac_gym_adapter.py +190 -0
  205. package/lab/mock_isaac_env.py +47 -0
  206. package/lab/pipeline.py +712 -0
  207. package/lab/policies.py +52 -0
  208. package/lab/pybullet_adapter.py +192 -0
  209. package/package.json +61 -0
  210. package/plugins/README.md +78 -0
  211. package/plugins/__init__.py +1 -0
  212. package/plugins/__pycache__/__init__.cpython-313.pyc +0 -0
  213. package/plugins/advanced/commands/OMG-code-review.md +114 -0
  214. package/plugins/advanced/commands/OMG-deep-plan.md +266 -0
  215. package/plugins/advanced/commands/OMG-handoff.md +115 -0
  216. package/plugins/advanced/commands/OMG-learn.md +110 -0
  217. package/plugins/advanced/commands/OMG-maintainer.md +31 -0
  218. package/plugins/advanced/commands/OMG-ralph-start.md +43 -0
  219. package/plugins/advanced/commands/OMG-ralph-stop.md +23 -0
  220. package/plugins/advanced/commands/OMG-security-review.md +16 -0
  221. package/plugins/advanced/commands/OMG-sequential-thinking.md +20 -0
  222. package/plugins/advanced/commands/OMG-ship.md +46 -0
  223. package/plugins/advanced/commands/OMG:code-review.md +114 -0
  224. package/plugins/advanced/commands/OMG:deep-plan.md +266 -0
  225. package/plugins/advanced/commands/OMG:handoff.md +115 -0
  226. package/plugins/advanced/commands/OMG:learn.md +110 -0
  227. package/plugins/advanced/commands/OMG:maintainer.md +31 -0
  228. package/plugins/advanced/commands/OMG:ralph-start.md +43 -0
  229. package/plugins/advanced/commands/OMG:ralph-stop.md +23 -0
  230. package/plugins/advanced/commands/OMG:security-review.md +16 -0
  231. package/plugins/advanced/commands/OMG:sequential-thinking.md +20 -0
  232. package/plugins/advanced/commands/OMG:ship.md +46 -0
  233. package/plugins/advanced/plugin.json +104 -0
  234. package/plugins/core/plugin.json +204 -0
  235. package/plugins/dephealth/__init__.py +0 -0
  236. package/plugins/dephealth/__pycache__/__init__.cpython-313.pyc +0 -0
  237. package/plugins/dephealth/__pycache__/cve_scanner.cpython-313.pyc +0 -0
  238. package/plugins/dephealth/__pycache__/license_checker.cpython-313.pyc +0 -0
  239. package/plugins/dephealth/__pycache__/manifest_detector.cpython-313.pyc +0 -0
  240. package/plugins/dephealth/__pycache__/vuln_analyzer.cpython-313.pyc +0 -0
  241. package/plugins/dephealth/cve_scanner.py +279 -0
  242. package/plugins/dephealth/license_checker.py +135 -0
  243. package/plugins/dephealth/manifest_detector.py +423 -0
  244. package/plugins/dephealth/vuln_analyzer.py +176 -0
  245. package/plugins/testgen/__init__.py +0 -0
  246. package/plugins/testgen/__pycache__/__init__.cpython-313.pyc +0 -0
  247. package/plugins/testgen/__pycache__/codamosa_engine.cpython-313.pyc +0 -0
  248. package/plugins/testgen/__pycache__/edge_case_synthesizer.cpython-313.pyc +0 -0
  249. package/plugins/testgen/__pycache__/framework_detector.cpython-313.pyc +0 -0
  250. package/plugins/testgen/__pycache__/skeleton_generator.cpython-313.pyc +0 -0
  251. package/plugins/testgen/codamosa_engine.py +402 -0
  252. package/plugins/testgen/edge_case_synthesizer.py +184 -0
  253. package/plugins/testgen/framework_detector.py +271 -0
  254. package/plugins/testgen/skeleton_generator.py +219 -0
  255. package/plugins/viz/__init__.py +0 -0
  256. package/plugins/viz/__pycache__/__init__.cpython-313.pyc +0 -0
  257. package/plugins/viz/__pycache__/ast_parser.cpython-313.pyc +0 -0
  258. package/plugins/viz/__pycache__/diagram_generator.cpython-313.pyc +0 -0
  259. package/plugins/viz/__pycache__/graph_builder.cpython-313.pyc +0 -0
  260. package/plugins/viz/__pycache__/native_parsers.cpython-313.pyc +0 -0
  261. package/plugins/viz/__pycache__/regex_parser.cpython-313.pyc +0 -0
  262. package/plugins/viz/ast_parser.py +139 -0
  263. package/plugins/viz/diagram_generator.py +192 -0
  264. package/plugins/viz/graph_builder.py +444 -0
  265. package/plugins/viz/native_parsers.py +259 -0
  266. package/plugins/viz/regex_parser.py +112 -0
  267. package/pyproject.toml +143 -0
  268. package/registry/__init__.py +1 -0
  269. package/registry/__pycache__/__init__.cpython-313.pyc +0 -0
  270. package/registry/__pycache__/approval_artifact.cpython-313.pyc +0 -0
  271. package/registry/__pycache__/verify_artifact.cpython-313.pyc +0 -0
  272. package/registry/approval_artifact.py +236 -0
  273. package/registry/bundles/algorithms.yaml +45 -0
  274. package/registry/bundles/api-twin.yaml +48 -0
  275. package/registry/bundles/ast-pack.yaml +80 -0
  276. package/registry/bundles/claim-judge.yaml +49 -0
  277. package/registry/bundles/control-plane.yaml +192 -0
  278. package/registry/bundles/data-lineage.yaml +47 -0
  279. package/registry/bundles/delta-classifier.yaml +47 -0
  280. package/registry/bundles/eval-gate.yaml +47 -0
  281. package/registry/bundles/hash-edit.yaml +73 -0
  282. package/registry/bundles/health.yaml +45 -0
  283. package/registry/bundles/hook-governor.yaml +101 -0
  284. package/registry/bundles/incident-replay.yaml +47 -0
  285. package/registry/bundles/lsp-pack.yaml +80 -0
  286. package/registry/bundles/mcp-fabric.yaml +53 -0
  287. package/registry/bundles/plan-council.yaml +56 -0
  288. package/registry/bundles/preflight.yaml +48 -0
  289. package/registry/bundles/proof-gate.yaml +49 -0
  290. package/registry/bundles/remote-supervisor.yaml +49 -0
  291. package/registry/bundles/robotics.yaml +45 -0
  292. package/registry/bundles/secure-worktree-pipeline.yaml +69 -0
  293. package/registry/bundles/security-check.yaml +50 -0
  294. package/registry/bundles/terminal-lane.yaml +61 -0
  295. package/registry/bundles/test-intent-lock.yaml +49 -0
  296. package/registry/bundles/tracebank.yaml +47 -0
  297. package/registry/bundles/vision.yaml +45 -0
  298. package/registry/omg-capability.schema.json +378 -0
  299. package/registry/policy-packs/airgapped.lock.json +11 -0
  300. package/registry/policy-packs/airgapped.signature.json +10 -0
  301. package/registry/policy-packs/airgapped.yaml +16 -0
  302. package/registry/policy-packs/fintech.lock.json +11 -0
  303. package/registry/policy-packs/fintech.signature.json +10 -0
  304. package/registry/policy-packs/fintech.yaml +15 -0
  305. package/registry/policy-packs/locked-prod.lock.json +11 -0
  306. package/registry/policy-packs/locked-prod.signature.json +10 -0
  307. package/registry/policy-packs/locked-prod.yaml +18 -0
  308. package/registry/trusted_signers.json +44 -0
  309. package/registry/verify_artifact.py +493 -0
  310. package/runtime/__init__.py +36 -0
  311. package/runtime/__pycache__/__init__.cpython-313.pyc +0 -0
  312. package/runtime/__pycache__/adoption.cpython-313.pyc +0 -0
  313. package/runtime/__pycache__/agent_selector.cpython-313.pyc +0 -0
  314. package/runtime/__pycache__/api_twin.cpython-313.pyc +0 -0
  315. package/runtime/__pycache__/architecture_signal.cpython-313.pyc +0 -0
  316. package/runtime/__pycache__/artifact_parsers.cpython-313.pyc +0 -0
  317. package/runtime/__pycache__/asset_loader.cpython-313.pyc +0 -0
  318. package/runtime/__pycache__/background_verification.cpython-313.pyc +0 -0
  319. package/runtime/__pycache__/budget_envelopes.cpython-313.pyc +0 -0
  320. package/runtime/__pycache__/business_workflow.cpython-313.pyc +0 -0
  321. package/runtime/__pycache__/canonical_surface.cpython-313.pyc +0 -0
  322. package/runtime/__pycache__/canonical_taxonomy.cpython-313.pyc +0 -0
  323. package/runtime/__pycache__/claim_judge.cpython-313.pyc +0 -0
  324. package/runtime/__pycache__/cli_provider.cpython-313.pyc +0 -0
  325. package/runtime/__pycache__/compat.cpython-313.pyc +0 -0
  326. package/runtime/__pycache__/complexity_scorer.cpython-313.pyc +0 -0
  327. package/runtime/__pycache__/compliance_governor.cpython-313.pyc +0 -0
  328. package/runtime/__pycache__/config_transaction.cpython-313.pyc +0 -0
  329. package/runtime/__pycache__/context_compiler.cpython-313.pyc +0 -0
  330. package/runtime/__pycache__/context_engine.cpython-313.pyc +0 -0
  331. package/runtime/__pycache__/context_limits.cpython-313.pyc +0 -0
  332. package/runtime/__pycache__/contract_compiler.cpython-313.pyc +0 -0
  333. package/runtime/__pycache__/custom_agent_loader.cpython-313.pyc +0 -0
  334. package/runtime/__pycache__/data_lineage.cpython-313.pyc +0 -0
  335. package/runtime/__pycache__/defense_state.cpython-313.pyc +0 -0
  336. package/runtime/__pycache__/delta_classifier.cpython-313.pyc +0 -0
  337. package/runtime/__pycache__/dispatcher.cpython-313.pyc +0 -0
  338. package/runtime/__pycache__/doc_generator.cpython-313.pyc +0 -0
  339. package/runtime/__pycache__/domain_packs.cpython-313.pyc +0 -0
  340. package/runtime/__pycache__/ecosystem.cpython-313.pyc +0 -0
  341. package/runtime/__pycache__/equalizer.cpython-313.pyc +0 -0
  342. package/runtime/__pycache__/eval_gate.cpython-313.pyc +0 -0
  343. package/runtime/__pycache__/evidence_narrator.cpython-313.pyc +0 -0
  344. package/runtime/__pycache__/evidence_query.cpython-313.pyc +0 -0
  345. package/runtime/__pycache__/evidence_registry.cpython-313.pyc +0 -0
  346. package/runtime/__pycache__/evidence_requirements.cpython-313.pyc +0 -0
  347. package/runtime/__pycache__/exec_kernel.cpython-313.pyc +0 -0
  348. package/runtime/__pycache__/explainer_formatter.cpython-313.pyc +0 -0
  349. package/runtime/__pycache__/feature_registry.cpython-313.pyc +0 -0
  350. package/runtime/__pycache__/forge_agents.cpython-313.pyc +0 -0
  351. package/runtime/__pycache__/forge_contracts.cpython-313.pyc +0 -0
  352. package/runtime/__pycache__/forge_domains.cpython-313.pyc +0 -0
  353. package/runtime/__pycache__/forge_run_id.cpython-313.pyc +0 -0
  354. package/runtime/__pycache__/github_integration.cpython-313.pyc +0 -0
  355. package/runtime/__pycache__/github_review_bot.cpython-313.pyc +0 -0
  356. package/runtime/__pycache__/github_review_contract.cpython-313.pyc +0 -0
  357. package/runtime/__pycache__/github_review_formatter.cpython-313.pyc +0 -0
  358. package/runtime/__pycache__/guide_assert.cpython-313.pyc +0 -0
  359. package/runtime/__pycache__/hook_governor.cpython-313.pyc +0 -0
  360. package/runtime/__pycache__/host_parity.cpython-313.pyc +0 -0
  361. package/runtime/__pycache__/incident_replay.cpython-313.pyc +0 -0
  362. package/runtime/__pycache__/install_planner.cpython-313.pyc +0 -0
  363. package/runtime/__pycache__/interaction_journal.cpython-313.pyc +0 -0
  364. package/runtime/__pycache__/issue_surface.cpython-313.pyc +0 -0
  365. package/runtime/__pycache__/legacy_compat.cpython-313.pyc +0 -0
  366. package/runtime/__pycache__/mcp_config_writers.cpython-313.pyc +0 -0
  367. package/runtime/__pycache__/mcp_lifecycle.cpython-313.pyc +0 -0
  368. package/runtime/__pycache__/mcp_memory_server.cpython-313.pyc +0 -0
  369. package/runtime/__pycache__/memory_store.cpython-313.pyc +0 -0
  370. package/runtime/__pycache__/merge_writer.cpython-313.pyc +0 -0
  371. package/runtime/__pycache__/music_omr_testbed.cpython-313.pyc +0 -0
  372. package/runtime/__pycache__/mutation_gate.cpython-313.pyc +0 -0
  373. package/runtime/__pycache__/omc_compat.cpython-313.pyc +0 -0
  374. package/runtime/__pycache__/omg_browser_cli.cpython-313.pyc +0 -0
  375. package/runtime/__pycache__/omg_mcp_server.cpython-313.pyc +0 -0
  376. package/runtime/__pycache__/opus_plan.cpython-313.pyc +0 -0
  377. package/runtime/__pycache__/playwright_adapter.cpython-313.pyc +0 -0
  378. package/runtime/__pycache__/playwright_pack.cpython-313.pyc +0 -0
  379. package/runtime/__pycache__/plugin_diagnostics.cpython-313.pyc +0 -0
  380. package/runtime/__pycache__/plugin_interop.cpython-313.pyc +0 -0
  381. package/runtime/__pycache__/policy_pack_loader.cpython-313.pyc +0 -0
  382. package/runtime/__pycache__/preflight.cpython-313.pyc +0 -0
  383. package/runtime/__pycache__/profile_io.cpython-313.pyc +0 -0
  384. package/runtime/__pycache__/prompt_compiler.cpython-313.pyc +0 -0
  385. package/runtime/__pycache__/proof_chain.cpython-313.pyc +0 -0
  386. package/runtime/__pycache__/proof_gate.cpython-313.pyc +0 -0
  387. package/runtime/__pycache__/provider_parity_eval.cpython-313.pyc +0 -0
  388. package/runtime/__pycache__/release_artifact_audit.cpython-313.pyc +0 -0
  389. package/runtime/__pycache__/release_run_coordinator.cpython-313.pyc +0 -0
  390. package/runtime/__pycache__/release_surface_compiler.cpython-313.pyc +0 -0
  391. package/runtime/__pycache__/release_surface_registry.cpython-313.pyc +0 -0
  392. package/runtime/__pycache__/release_surfaces.cpython-313.pyc +0 -0
  393. package/runtime/__pycache__/remote_supervisor.cpython-313.pyc +0 -0
  394. package/runtime/__pycache__/repro_pack.cpython-313.pyc +0 -0
  395. package/runtime/__pycache__/rollback_manifest.cpython-313.pyc +0 -0
  396. package/runtime/__pycache__/router_critics.cpython-313.pyc +0 -0
  397. package/runtime/__pycache__/router_executor.cpython-313.pyc +0 -0
  398. package/runtime/__pycache__/router_selector.cpython-313.pyc +0 -0
  399. package/runtime/__pycache__/runtime_contracts.cpython-313.pyc +0 -0
  400. package/runtime/__pycache__/runtime_profile.cpython-313.pyc +0 -0
  401. package/runtime/__pycache__/security_check.cpython-313.pyc +0 -0
  402. package/runtime/__pycache__/session_health.cpython-313.pyc +0 -0
  403. package/runtime/__pycache__/skill_evolution.cpython-313.pyc +0 -0
  404. package/runtime/__pycache__/skill_registry.cpython-313.pyc +0 -0
  405. package/runtime/__pycache__/subagent_dispatcher.cpython-313.pyc +0 -0
  406. package/runtime/__pycache__/subscription_tiers.cpython-313.pyc +0 -0
  407. package/runtime/__pycache__/team_router.cpython-313.pyc +0 -0
  408. package/runtime/__pycache__/test_intent_lock.cpython-313-pytest-9.0.2.pyc +0 -0
  409. package/runtime/__pycache__/test_intent_lock.cpython-313.pyc +0 -0
  410. package/runtime/__pycache__/tmux_session_manager.cpython-313.pyc +0 -0
  411. package/runtime/__pycache__/tool_fabric.cpython-313.pyc +0 -0
  412. package/runtime/__pycache__/tool_plan_gate.cpython-313.pyc +0 -0
  413. package/runtime/__pycache__/tool_relevance.cpython-313.pyc +0 -0
  414. package/runtime/__pycache__/tracebank.cpython-313.pyc +0 -0
  415. package/runtime/__pycache__/untrusted_content.cpython-313.pyc +0 -0
  416. package/runtime/__pycache__/validate.cpython-313.pyc +0 -0
  417. package/runtime/__pycache__/verdict_schema.cpython-313.pyc +0 -0
  418. package/runtime/__pycache__/verification_controller.cpython-313.pyc +0 -0
  419. package/runtime/__pycache__/verification_loop.cpython-313.pyc +0 -0
  420. package/runtime/__pycache__/vision_artifacts.cpython-313.pyc +0 -0
  421. package/runtime/__pycache__/vision_cache.cpython-313.pyc +0 -0
  422. package/runtime/__pycache__/vision_jobs.cpython-313.pyc +0 -0
  423. package/runtime/__pycache__/worker_watchdog.cpython-313.pyc +0 -0
  424. package/runtime/adapters/__init__.py +13 -0
  425. package/runtime/adapters/__pycache__/__init__.cpython-313.pyc +0 -0
  426. package/runtime/adapters/__pycache__/claude.cpython-313.pyc +0 -0
  427. package/runtime/adapters/__pycache__/gpt.cpython-313.pyc +0 -0
  428. package/runtime/adapters/__pycache__/local.cpython-313.pyc +0 -0
  429. package/runtime/adapters/claude.py +63 -0
  430. package/runtime/adapters/gpt.py +56 -0
  431. package/runtime/adapters/local.py +56 -0
  432. package/runtime/adoption.py +280 -0
  433. package/runtime/api_twin.py +450 -0
  434. package/runtime/architecture_signal.py +226 -0
  435. package/runtime/artifact_parsers.py +161 -0
  436. package/runtime/asset_loader.py +62 -0
  437. package/runtime/background_verification.py +178 -0
  438. package/runtime/budget_envelopes.py +398 -0
  439. package/runtime/business_workflow.py +234 -0
  440. package/runtime/canonical_surface.py +53 -0
  441. package/runtime/canonical_taxonomy.py +27 -0
  442. package/runtime/claim_judge.py +648 -0
  443. package/runtime/cli_provider.py +105 -0
  444. package/runtime/compat.py +2222 -0
  445. package/runtime/complexity_scorer.py +148 -0
  446. package/runtime/compliance_governor.py +505 -0
  447. package/runtime/config_transaction.py +304 -0
  448. package/runtime/context_compiler.py +131 -0
  449. package/runtime/context_engine.py +708 -0
  450. package/runtime/context_limits.py +363 -0
  451. package/runtime/contract_compiler.py +3664 -0
  452. package/runtime/custom_agent_loader.py +366 -0
  453. package/runtime/data_lineage.py +244 -0
  454. package/runtime/defense_state.py +261 -0
  455. package/runtime/delta_classifier.py +231 -0
  456. package/runtime/dispatcher.py +47 -0
  457. package/runtime/doc_generator.py +319 -0
  458. package/runtime/domain_packs.py +75 -0
  459. package/runtime/ecosystem.py +371 -0
  460. package/runtime/equalizer.py +268 -0
  461. package/runtime/eval_gate.py +96 -0
  462. package/runtime/evidence_narrator.py +147 -0
  463. package/runtime/evidence_query.py +303 -0
  464. package/runtime/evidence_registry.py +16 -0
  465. package/runtime/evidence_requirements.py +157 -0
  466. package/runtime/exec_kernel.py +267 -0
  467. package/runtime/explainer_formatter.py +82 -0
  468. package/runtime/feature_registry.py +109 -0
  469. package/runtime/forge_agents.py +915 -0
  470. package/runtime/forge_contracts.py +519 -0
  471. package/runtime/forge_domains.py +68 -0
  472. package/runtime/forge_run_id.py +86 -0
  473. package/runtime/guide_assert.py +135 -0
  474. package/runtime/hook_governor.py +156 -0
  475. package/runtime/host_parity.py +373 -0
  476. package/runtime/incident_replay.py +310 -0
  477. package/runtime/install_planner.py +617 -0
  478. package/runtime/interaction_journal.py +566 -0
  479. package/runtime/issue_surface.py +472 -0
  480. package/runtime/legacy_compat.py +7 -0
  481. package/runtime/mcp_config_writers.py +360 -0
  482. package/runtime/mcp_lifecycle.py +175 -0
  483. package/runtime/mcp_memory_server.py +220 -0
  484. package/runtime/memory_parsers/__init__.py +0 -0
  485. package/runtime/memory_parsers/__pycache__/__init__.cpython-313.pyc +0 -0
  486. package/runtime/memory_parsers/__pycache__/chatgpt_parser.cpython-313.pyc +0 -0
  487. package/runtime/memory_parsers/__pycache__/claude_import.cpython-313.pyc +0 -0
  488. package/runtime/memory_parsers/__pycache__/export.cpython-313.pyc +0 -0
  489. package/runtime/memory_parsers/__pycache__/gemini_import.cpython-313.pyc +0 -0
  490. package/runtime/memory_parsers/__pycache__/kimi_import.cpython-313.pyc +0 -0
  491. package/runtime/memory_parsers/chatgpt_parser.py +257 -0
  492. package/runtime/memory_parsers/claude_import.py +107 -0
  493. package/runtime/memory_parsers/export.py +97 -0
  494. package/runtime/memory_parsers/gemini_import.py +91 -0
  495. package/runtime/memory_parsers/kimi_import.py +91 -0
  496. package/runtime/memory_store.py +1182 -0
  497. package/runtime/merge_writer.py +445 -0
  498. package/runtime/music_omr_testbed.py +336 -0
  499. package/runtime/mutation_gate.py +320 -0
  500. package/runtime/omc_compat.py +7 -0
  501. package/runtime/omg_browser_cli.py +95 -0
  502. package/runtime/omg_compat_contract_snapshot.json +936 -0
  503. package/runtime/omg_contract_snapshot.json +936 -0
  504. package/runtime/omg_mcp_server.py +306 -0
  505. package/runtime/playwright_adapter.py +39 -0
  506. package/runtime/playwright_pack.py +253 -0
  507. package/runtime/plugin_diagnostics.py +308 -0
  508. package/runtime/plugin_interop.py +1060 -0
  509. package/runtime/policy_pack_loader.py +147 -0
  510. package/runtime/preflight.py +135 -0
  511. package/runtime/profile_io.py +328 -0
  512. package/runtime/proof_chain.py +472 -0
  513. package/runtime/proof_gate.py +442 -0
  514. package/runtime/provider_parity_eval.py +109 -0
  515. package/runtime/providers/__init__.py +0 -0
  516. package/runtime/providers/__pycache__/__init__.cpython-313.pyc +0 -0
  517. package/runtime/providers/__pycache__/codex_provider.cpython-313.pyc +0 -0
  518. package/runtime/providers/__pycache__/gemini_provider.cpython-313.pyc +0 -0
  519. package/runtime/providers/__pycache__/kimi_provider.cpython-313.pyc +0 -0
  520. package/runtime/providers/__pycache__/opencode_provider.cpython-313.pyc +0 -0
  521. package/runtime/providers/codex_provider.py +129 -0
  522. package/runtime/providers/gemini_provider.py +143 -0
  523. package/runtime/providers/kimi_provider.py +167 -0
  524. package/runtime/providers/opencode_provider.py +99 -0
  525. package/runtime/release_artifact_audit.py +556 -0
  526. package/runtime/release_run_coordinator.py +574 -0
  527. package/runtime/release_surface_compiler.py +643 -0
  528. package/runtime/release_surface_registry.py +283 -0
  529. package/runtime/release_surfaces.py +320 -0
  530. package/runtime/remote_supervisor.py +79 -0
  531. package/runtime/repro_pack.py +398 -0
  532. package/runtime/rollback_manifest.py +143 -0
  533. package/runtime/router_critics.py +229 -0
  534. package/runtime/router_executor.py +142 -0
  535. package/runtime/router_selector.py +99 -0
  536. package/runtime/runtime_contracts.py +292 -0
  537. package/runtime/runtime_profile.py +133 -0
  538. package/runtime/security_check.py +1094 -0
  539. package/runtime/session_health.py +546 -0
  540. package/runtime/skill_evolution.py +221 -0
  541. package/runtime/skill_registry.py +53 -0
  542. package/runtime/subagent_dispatcher.py +604 -0
  543. package/runtime/subscription_tiers.py +258 -0
  544. package/runtime/team_router.py +1399 -0
  545. package/runtime/test_intent_lock.py +543 -0
  546. package/runtime/tmux_session_manager.py +172 -0
  547. package/runtime/tool_fabric.py +570 -0
  548. package/runtime/tool_plan_gate.py +460 -0
  549. package/runtime/tracebank.py +125 -0
  550. package/runtime/untrusted_content.py +360 -0
  551. package/runtime/validate.py +293 -0
  552. package/runtime/verdict_schema.py +198 -0
  553. package/runtime/verification_controller.py +235 -0
  554. package/runtime/verification_loop.py +73 -0
  555. package/runtime/vision_artifacts.py +31 -0
  556. package/runtime/vision_cache.py +38 -0
  557. package/runtime/vision_jobs.py +92 -0
  558. package/runtime/worker_watchdog.py +526 -0
  559. package/scripts/__pycache__/audit-published-artifact.cpython-313.pyc +0 -0
  560. package/scripts/__pycache__/check-doc-parity.cpython-313.pyc +0 -0
  561. package/scripts/__pycache__/check-omg-standalone-clean.cpython-313.pyc +0 -0
  562. package/scripts/__pycache__/github_review_helpers.cpython-313.pyc +0 -0
  563. package/scripts/__pycache__/omg.cpython-313.pyc +0 -0
  564. package/scripts/__pycache__/prepare-release-proof-fixtures.cpython-313.pyc +0 -0
  565. package/scripts/__pycache__/sync-release-identity.cpython-313.pyc +0 -0
  566. package/scripts/__pycache__/validate-release-identity.cpython-313.pyc +0 -0
  567. package/scripts/audit-published-artifact.py +59 -0
  568. package/scripts/check-omg-compat-contract-snapshot.py +137 -0
  569. package/scripts/check-omg-contract-snapshot.py +12 -0
  570. package/scripts/check-omg-public-ready.py +273 -0
  571. package/scripts/check-omg-standalone-clean.py +133 -0
  572. package/scripts/emit_host_parity.py +72 -0
  573. package/scripts/legacy_to_omg_migrate.py +29 -0
  574. package/scripts/migrate-legacy.py +464 -0
  575. package/scripts/omc_to_omg_migrate.py +12 -0
  576. package/scripts/omg.py +2962 -0
  577. package/scripts/pre-release-check.sh +38 -0
  578. package/scripts/prepare-release-proof-fixtures.py +602 -0
  579. package/scripts/print-canonical-version.py +80 -0
  580. package/scripts/settings-merge.py +289 -0
  581. package/scripts/sync-release-identity.py +481 -0
  582. package/scripts/validate-release-identity.py +632 -0
  583. package/scripts/verify-no-omc.sh +5 -0
  584. package/scripts/verify-standalone.sh +35 -0
  585. package/settings.json +751 -0
  586. package/tools/__init__.py +2 -0
  587. package/tools/__pycache__/__init__.cpython-313.pyc +0 -0
  588. package/tools/__pycache__/browser_consent.cpython-313.pyc +0 -0
  589. package/tools/__pycache__/browser_stealth.cpython-313.pyc +0 -0
  590. package/tools/__pycache__/browser_tool.cpython-313.pyc +0 -0
  591. package/tools/__pycache__/changelog_generator.cpython-313.pyc +0 -0
  592. package/tools/__pycache__/commit_splitter.cpython-313.pyc +0 -0
  593. package/tools/__pycache__/config_discovery.cpython-313.pyc +0 -0
  594. package/tools/__pycache__/config_merger.cpython-313.pyc +0 -0
  595. package/tools/__pycache__/dashboard_generator.cpython-313.pyc +0 -0
  596. package/tools/__pycache__/git_inspector.cpython-313.pyc +0 -0
  597. package/tools/__pycache__/lsp_client.cpython-313.pyc +0 -0
  598. package/tools/__pycache__/lsp_operations.cpython-313.pyc +0 -0
  599. package/tools/__pycache__/pr_generator.cpython-313.pyc +0 -0
  600. package/tools/__pycache__/python_repl.cpython-313.pyc +0 -0
  601. package/tools/__pycache__/python_sandbox.cpython-313.pyc +0 -0
  602. package/tools/__pycache__/session_snapshot.cpython-313.pyc +0 -0
  603. package/tools/__pycache__/ssh_manager.cpython-313.pyc +0 -0
  604. package/tools/__pycache__/theme_engine.cpython-313.pyc +0 -0
  605. package/tools/__pycache__/theme_selector.cpython-313.pyc +0 -0
  606. package/tools/__pycache__/web_search.cpython-313.pyc +0 -0
  607. package/tools/browser_consent.py +289 -0
  608. package/tools/browser_stealth.py +481 -0
  609. package/tools/browser_tool.py +448 -0
  610. package/tools/changelog_generator.py +347 -0
  611. package/tools/commit_splitter.py +749 -0
  612. package/tools/config_discovery.py +151 -0
  613. package/tools/config_merger.py +449 -0
  614. package/tools/dashboard_generator.py +300 -0
  615. package/tools/git_inspector.py +298 -0
  616. package/tools/lsp_client.py +275 -0
  617. package/tools/lsp_discovery.py +231 -0
  618. package/tools/lsp_operations.py +392 -0
  619. package/tools/pr_generator.py +404 -0
  620. package/tools/python_repl.py +712 -0
  621. package/tools/python_sandbox.py +768 -0
  622. package/tools/search_providers/__init__.py +77 -0
  623. package/tools/search_providers/__pycache__/__init__.cpython-313.pyc +0 -0
  624. package/tools/search_providers/__pycache__/brave.cpython-313.pyc +0 -0
  625. package/tools/search_providers/__pycache__/exa.cpython-313.pyc +0 -0
  626. package/tools/search_providers/__pycache__/jina.cpython-313.pyc +0 -0
  627. package/tools/search_providers/__pycache__/perplexity.cpython-313.pyc +0 -0
  628. package/tools/search_providers/__pycache__/synthetic.cpython-313.pyc +0 -0
  629. package/tools/search_providers/brave.py +115 -0
  630. package/tools/search_providers/exa.py +116 -0
  631. package/tools/search_providers/jina.py +104 -0
  632. package/tools/search_providers/perplexity.py +139 -0
  633. package/tools/search_providers/synthetic.py +74 -0
  634. package/tools/session_snapshot.py +851 -0
  635. package/tools/ssh_manager.py +912 -0
  636. package/tools/theme_engine.py +296 -0
  637. package/tools/theme_selector.py +137 -0
  638. package/tools/web_search.py +675 -0
@@ -0,0 +1,1094 @@
1
+ """Canonical OMG security check engine."""
2
+ from __future__ import annotations
3
+
4
+ import ast
5
+ from collections import Counter
6
+ from importlib import import_module
7
+ from datetime import datetime, timezone
8
+ from hashlib import sha256
9
+ import json
10
+ from pathlib import Path
11
+ import re
12
+ import shutil
13
+ import subprocess
14
+ from typing import Any
15
+
16
+ from hooks.security_validators import ensure_path_within_dir
17
+ from plugins.dephealth.cve_scanner import scan_for_cves
18
+ from plugins.dephealth.license_checker import check_license_compatibility
19
+ from plugins.dephealth.manifest_detector import detect_manifests
20
+ from plugins.dephealth.vuln_analyzer import analyze_reachability
21
+ from runtime.adoption import CANONICAL_VERSION
22
+ from runtime.delta_classifier import classify_project_changes
23
+ from runtime.tracebank import record_trace
24
+
25
+
26
+ _SCAN_EXCLUDED_DIRS: frozenset[str] = frozenset({'.git', '.omg', '.sisyphus', 'build', 'dist', 'node_modules', 'tests'})
27
+
28
+ _SANCTIONED_CALLSITES: dict[tuple[str, str], str] = {
29
+ ("tools/python_repl.py", "B307"): "Intentional eval() in REPL backend (contract: tools/python_repl.py, tests: tests/tools/test_python_repl.py)",
30
+ ("tools/python_repl.py", "B102"): "Intentional exec() in REPL backend (contract: tools/python_repl.py, tests: tests/tools/test_python_repl.py)",
31
+ ("tools/python_sandbox.py", "B307"): "Intentional eval() in sandboxed executor (contract: tools/python_sandbox.py, tests: tests/tools/test_python_sandbox.py)",
32
+ ("tools/python_sandbox.py", "B102"): "Intentional exec() in sandboxed executor (contract: tools/python_sandbox.py, tests: tests/tools/test_python_sandbox.py)",
33
+ ("omg_natives/shell.py", "B602"): "Intentional shell execution in native shell helper (contract: omg_natives/shell.py)",
34
+ }
35
+
36
+ SEVERITY_ORDER = {
37
+ "critical": 0,
38
+ "high": 1,
39
+ "medium": 2,
40
+ "low": 3,
41
+ }
42
+
43
+ _PYTHON_AST_RULES: tuple[tuple[str, str, str, str], ...] = (
44
+ ("B602", "subprocess-shell-true", "high", "Avoid shell=True in subprocess calls."),
45
+ ("B307", "eval-use", "high", "Replace eval with explicit parsing."),
46
+ ("B102", "exec-use", "high", "Replace exec with explicit control flow."),
47
+ ("B301", "pickle-load", "high", "Avoid unsafe deserialization of pickle payloads."),
48
+ )
49
+
50
+ _SECRET_PATTERNS: tuple[tuple[str, re.Pattern[str], str, str], ...] = (
51
+ ("SEC001", re.compile(r"AKIA[0-9A-Z]{16}"), "high", "AWS access key-like token detected."),
52
+ ("SEC002", re.compile(r"-----BEGIN (?:RSA|EC|OPENSSH|DSA) PRIVATE KEY-----"), "critical", "Private key material detected."),
53
+ (
54
+ "SEC003",
55
+ re.compile(r"(?i)(?:secret|api[_-]?key|token|password)\s*[:=]\s*['\"][A-Za-z0-9_\-\+/=]{12,}['\"]"),
56
+ "high",
57
+ "Hard-coded secret-like credential detected.",
58
+ ),
59
+ )
60
+
61
+ _CONFIG_PATTERNS: tuple[tuple[str, re.Pattern[str], str, str], ...] = (
62
+ ("CFG001", re.compile(r"0\.0\.0\.0/0"), "high", "Wildcard ingress rule detected."),
63
+ ("CFG002", re.compile(r"(?i)verify\s*=\s*false"), "high", "TLS verification appears disabled."),
64
+ ("CFG003", re.compile(r"(?i)(?:ssl_verify|verify_ssl)\s*[:=]\s*false"), "high", "TLS verification appears disabled."),
65
+ ("CFG004", re.compile(r"(?i)allow_privilege_escalation\s*[:=]\s*true"), "high", "Privilege escalation enabled in runtime policy."),
66
+ ("CFG005", re.compile(r"(?i)publicly_accessible\s*=\s*true"), "medium", "Publicly accessible infrastructure flag enabled."),
67
+ )
68
+
69
+ _CONFIG_FILE_HINTS = (
70
+ ".tf",
71
+ ".tfvars",
72
+ ".yaml",
73
+ ".yml",
74
+ ".json",
75
+ ".env",
76
+ "dockerfile",
77
+ "kustomization",
78
+ "helm",
79
+ "policy",
80
+ "config",
81
+ )
82
+
83
+ _SBOM_ECOSYSTEM_PURL = {
84
+ "npm": "npm",
85
+ "PyPI": "pypi",
86
+ "crates.io": "cargo",
87
+ "Go": "golang",
88
+ "RubyGems": "gem",
89
+ }
90
+
91
+
92
+ def run_security_check(
93
+ *,
94
+ project_dir: str,
95
+ scope: str = ".",
96
+ include_live_enrichment: bool = False,
97
+ external_inputs: list[dict[str, Any]] | None = None,
98
+ waivers: list[dict[str, Any] | str] | None = None,
99
+ ) -> dict[str, Any]:
100
+ scope_path = _resolve_scope(project_dir, scope)
101
+ findings: list[dict[str, Any]] = []
102
+ manifests = detect_manifests(str(scope_path))
103
+ waiver_map = _normalize_waivers(waivers or [])
104
+
105
+ findings.extend(_scan_python_ast(scope_path))
106
+ findings.extend(_scan_secret_patterns(scope_path))
107
+ findings.extend(_scan_config_and_iac(scope_path))
108
+ findings.extend(_scan_dependency_health(scope_path, include_live_enrichment))
109
+ findings = _finalize_findings(findings, waiver_map, project_dir=project_dir)
110
+ findings.sort(key=lambda finding: (SEVERITY_ORDER.get(finding["severity"], 99), finding["id"]))
111
+
112
+ severity_counts = Counter(finding["severity"] for finding in findings)
113
+ source_counts = Counter(finding["source"] for finding in findings)
114
+ relative_scope = _display_scope(project_dir, scope_path)
115
+ delta = classify_project_changes(project_dir, touched_files=_delta_touched_files(project_dir, scope_path), goal="security check")
116
+ evidence_requirements = _requirements_for_profile(delta.get("evidence_profile"))
117
+ unresolved_high_risk = [
118
+ finding
119
+ for finding in findings
120
+ if finding.get("severity") in {"critical", "high"} and not finding.get("waived", False)
121
+ ]
122
+ provenance = _build_provenance(
123
+ scope=relative_scope,
124
+ manifests=manifests.manifests,
125
+ findings=findings,
126
+ include_live_enrichment=include_live_enrichment,
127
+ external_inputs=external_inputs or [],
128
+ )
129
+ trust_scores = _build_trust_scores(findings)
130
+ generated_at = datetime.now(timezone.utc).isoformat()
131
+ license_artifact = _build_license_artifact(
132
+ project_dir=project_dir,
133
+ scope_path=scope_path,
134
+ manifests=manifests,
135
+ generated_at=generated_at,
136
+ )
137
+ unresolved_risks = [
138
+ {
139
+ "finding_id": finding.get("finding_id"),
140
+ "id": finding.get("id"),
141
+ "severity": finding.get("severity"),
142
+ "exploitability": finding.get("exploitability", "unknown"),
143
+ "reachability": finding.get("reachability", "unknown"),
144
+ "kev_listed": finding.get("kev_listed", False),
145
+ "epss_score": finding.get("epss_score"),
146
+ "waived": bool(finding.get("waived")),
147
+ "waiver_justification": finding.get("waiver_justification", ""),
148
+ "message": finding.get("message", ""),
149
+ }
150
+ for finding in findings
151
+ if finding.get("severity") in {"critical", "high"}
152
+ ]
153
+ trace = record_trace(
154
+ project_dir,
155
+ trace_type="security-check",
156
+ route="security-check",
157
+ status="error" if unresolved_high_risk else "ok",
158
+ plan={"scope": relative_scope, "delta_categories": delta["categories"]},
159
+ verify={"finding_count": len(findings), "unresolved_high_risk_count": len(unresolved_high_risk)},
160
+ failures=[finding["finding_id"] for finding in unresolved_high_risk],
161
+ rejections=[],
162
+ )
163
+ artifacts = _write_evidence_artifacts(
164
+ project_dir,
165
+ scope=relative_scope,
166
+ generated_at=generated_at,
167
+ findings=findings,
168
+ provenance=provenance,
169
+ trust_scores=trust_scores,
170
+ include_live_enrichment=include_live_enrichment,
171
+ waivers=waivers or [],
172
+ license_artifact=license_artifact,
173
+ manifests=manifests,
174
+ unresolved_risks=unresolved_risks,
175
+ )
176
+ return {
177
+ "schema": "SecurityCheckResult",
178
+ "status": "error" if unresolved_high_risk else "ok",
179
+ "scope": relative_scope,
180
+ "findings": findings,
181
+ "waivers": {
182
+ "requested": len(waivers or []),
183
+ "applied": len([finding for finding in findings if finding.get("waived")]),
184
+ },
185
+ "release_blocked": bool(unresolved_high_risk),
186
+ "unresolved_risks": unresolved_risks,
187
+ "security_scans": [
188
+ {
189
+ "tool": "security-check",
190
+ "path": artifacts["json_path"],
191
+ "sarif_path": artifacts["sarif_path"],
192
+ "sbom_path": artifacts["sbom_path"],
193
+ "license_path": artifacts["license_path"],
194
+ "findings": findings,
195
+ }
196
+ ],
197
+ "summary": {
198
+ "finding_count": len(findings),
199
+ "unresolved_high_risk_count": len(unresolved_high_risk),
200
+ "by_severity": dict(sorted(severity_counts.items())),
201
+ "by_source": dict(sorted(source_counts.items())),
202
+ "live_enrichment": include_live_enrichment,
203
+ "scan_status": "completed",
204
+ "manifest_count": len(manifests.manifests),
205
+ "delta_categories": delta["categories"],
206
+ "delta_evidence_profile": delta.get("evidence_profile"),
207
+ "evidence_requirements": evidence_requirements,
208
+ },
209
+ "evidence_requirements": evidence_requirements,
210
+ "provenance": provenance,
211
+ "trust_scores": trust_scores,
212
+ "license": license_artifact,
213
+ "sbom": _build_sbom_payload(generated_at=generated_at, manifests=manifests),
214
+ "evidence": {
215
+ "path": artifacts["json_path"],
216
+ "json_path": artifacts["json_path"],
217
+ "sarif_path": artifacts["sarif_path"],
218
+ "sbom_path": artifacts["sbom_path"],
219
+ "license_path": artifacts["license_path"],
220
+ },
221
+ "trace": {"trace_id": trace["trace_id"], "path": trace["path"]},
222
+ }
223
+
224
+
225
+ def _requirements_for_profile(evidence_profile: str | None) -> list[str]:
226
+ module = import_module("runtime.evidence_requirements")
227
+ resolver = getattr(module, "requirements_for_profile", None)
228
+ if callable(resolver):
229
+ resolved = resolver(evidence_profile)
230
+ if isinstance(resolved, (list, tuple, set)):
231
+ return [str(item) for item in resolved]
232
+ full = getattr(module, "FULL_REQUIREMENTS", [])
233
+ return [str(item) for item in full]
234
+
235
+
236
+ def security_check(
237
+ *,
238
+ project_dir: str,
239
+ scope: str = ".",
240
+ include_live_enrichment: bool = False,
241
+ external_inputs: list[dict[str, Any]] | None = None,
242
+ waivers: list[dict[str, Any] | str] | None = None,
243
+ ) -> dict[str, Any]:
244
+ return run_security_check(
245
+ project_dir=project_dir,
246
+ scope=scope,
247
+ include_live_enrichment=include_live_enrichment,
248
+ external_inputs=external_inputs,
249
+ waivers=waivers,
250
+ )
251
+
252
+
253
+ def _resolve_scope(project_dir: str, scope: str) -> Path:
254
+ if not scope:
255
+ return Path(project_dir).resolve()
256
+ candidate = Path(scope)
257
+ if candidate.is_absolute():
258
+ return candidate.resolve()
259
+ base = Path(project_dir).resolve()
260
+ resolved = Path(ensure_path_within_dir(base, base / candidate))
261
+ return resolved
262
+
263
+
264
+ def _display_scope(project_dir: str, scope_path: Path) -> str:
265
+ base = Path(project_dir).resolve()
266
+ try:
267
+ return scope_path.relative_to(base).as_posix() or "."
268
+ except ValueError:
269
+ return str(scope_path)
270
+
271
+
272
+ def _delta_touched_files(project_dir: str, scope_path: Path) -> list[str]:
273
+ base = Path(project_dir).resolve()
274
+ if scope_path.is_file():
275
+ return [_display_scope(project_dir, scope_path)]
276
+ touched: list[str] = []
277
+ for path in sorted(scope_path.rglob("*")):
278
+ if not path.is_file():
279
+ continue
280
+ try:
281
+ rel = path.resolve().relative_to(base).as_posix()
282
+ except ValueError:
283
+ rel = str(path.resolve())
284
+ touched.append(rel)
285
+ if len(touched) >= 64:
286
+ break
287
+ return touched or [_display_scope(project_dir, scope_path)]
288
+
289
+
290
+ def _scan_python_ast(scope_path: Path) -> list[dict[str, Any]]:
291
+ findings: list[dict[str, Any]] = []
292
+ for py_file in _iter_python_files(scope_path):
293
+ try:
294
+ source = py_file.read_text(encoding="utf-8")
295
+ except OSError:
296
+ continue
297
+ findings.extend(_scan_python_file(py_file, source))
298
+ findings.extend(_run_bandit_if_available(scope_path))
299
+ findings.extend(_scan_semgrep(scope_path))
300
+ return findings
301
+
302
+
303
+ def run_semgrep_scan(project_dir: str, rules: str = "auto") -> dict[str, Any]:
304
+ unavailable = {"status": "unavailable", "findings": [], "error": "semgrep not found"}
305
+ if shutil.which("semgrep") is None:
306
+ return unavailable
307
+
308
+ cmd = ["semgrep", "--json", "--config", rules, project_dir]
309
+ try:
310
+ proc = subprocess.run(cmd, capture_output=True, text=True, check=False, timeout=60)
311
+ except Exception:
312
+ return unavailable
313
+
314
+ if proc.returncode not in {0, 1}:
315
+ return unavailable
316
+
317
+ try:
318
+ payload = json.loads(proc.stdout or "{}")
319
+ except Exception:
320
+ return unavailable
321
+
322
+ findings: list[dict[str, Any]] = []
323
+ for item in payload.get("results", []):
324
+ extra = item.get("extra") if isinstance(item.get("extra"), dict) else {}
325
+ start = item.get("start") if isinstance(item.get("start"), dict) else {}
326
+ findings.append(
327
+ {
328
+ "severity": _normalize_semgrep_severity(str(extra.get("severity", "WARNING"))),
329
+ "rule": str(item.get("check_id", "semgrep")),
330
+ "path": str(item.get("path", "")),
331
+ "line": _safe_int(start.get("line", 1), default=1),
332
+ "message": str(extra.get("message", "Semgrep finding")),
333
+ }
334
+ )
335
+ return {"status": "ok", "findings": findings, "error": ""}
336
+
337
+
338
+ def _normalize_semgrep_severity(raw: str) -> str:
339
+ lowered = raw.lower()
340
+ if lowered in {"error", "critical"}:
341
+ return "high"
342
+ if lowered in {"warning", "warn"}:
343
+ return "medium"
344
+ if lowered in {"info", "note", "low"}:
345
+ return "low"
346
+ return _normalize_severity(lowered)
347
+
348
+
349
+ def _scan_semgrep(scope_path: Path) -> list[dict[str, Any]]:
350
+ result = run_semgrep_scan(str(scope_path))
351
+ if result.get("status") != "ok":
352
+ return []
353
+
354
+ findings: list[dict[str, Any]] = []
355
+ for item in result.get("findings", []):
356
+ if not isinstance(item, dict):
357
+ continue
358
+ file_path = Path(str(item.get("path", "")))
359
+ findings.append(
360
+ _finding(
361
+ rule_id=str(item.get("rule", "semgrep")),
362
+ source_name="semgrep-ce",
363
+ category="python_ast",
364
+ severity=_normalize_severity(str(item.get("severity", "medium"))),
365
+ path=file_path,
366
+ line=_safe_int(item.get("line", 1), default=1),
367
+ message=str(item.get("message", "Semgrep finding")),
368
+ recommendation="Review Semgrep finding and apply the suggested remediation.",
369
+ snippet="",
370
+ )
371
+ )
372
+ return findings
373
+
374
+
375
+ def _safe_int(value: Any, *, default: int) -> int:
376
+ try:
377
+ return int(value)
378
+ except (TypeError, ValueError):
379
+ return default
380
+
381
+
382
+ def _scan_secret_patterns(scope_path: Path) -> list[dict[str, Any]]:
383
+ findings: list[dict[str, Any]] = []
384
+ for candidate in _iter_text_candidates(scope_path):
385
+ try:
386
+ source = candidate.read_text(encoding="utf-8")
387
+ except (OSError, UnicodeDecodeError):
388
+ continue
389
+ for line_no, line in enumerate(source.splitlines(), start=1):
390
+ for rule_id, pattern, severity, message in _SECRET_PATTERNS:
391
+ if not pattern.search(line):
392
+ continue
393
+ findings.append(
394
+ _finding(
395
+ rule_id=rule_id,
396
+ source_name="secret-scan",
397
+ category="secret",
398
+ severity=severity,
399
+ path=candidate,
400
+ line=line_no,
401
+ message=message,
402
+ recommendation="Move secrets to an approved secret manager or environment injection.",
403
+ snippet=line.strip(),
404
+ )
405
+ )
406
+ return findings
407
+
408
+
409
+ def _scan_config_and_iac(scope_path: Path) -> list[dict[str, Any]]:
410
+ findings: list[dict[str, Any]] = []
411
+ for candidate in _iter_text_candidates(scope_path):
412
+ lowered = candidate.name.lower()
413
+ rel_lower = candidate.as_posix().lower()
414
+ if not any(hint in lowered or hint in rel_lower for hint in _CONFIG_FILE_HINTS):
415
+ continue
416
+ try:
417
+ source = candidate.read_text(encoding="utf-8")
418
+ except (OSError, UnicodeDecodeError):
419
+ continue
420
+ for line_no, line in enumerate(source.splitlines(), start=1):
421
+ for rule_id, pattern, severity, message in _CONFIG_PATTERNS:
422
+ if not pattern.search(line):
423
+ continue
424
+ findings.append(
425
+ _finding(
426
+ rule_id=rule_id,
427
+ source_name="config-scan",
428
+ category="config",
429
+ severity=severity,
430
+ path=candidate,
431
+ line=line_no,
432
+ message=message,
433
+ recommendation="Apply least-privilege defaults and tighten network/transport policy.",
434
+ snippet=line.strip(),
435
+ )
436
+ )
437
+ return findings
438
+
439
+
440
+ def _iter_text_candidates(scope_path: Path) -> list[Path]:
441
+ if scope_path.is_file():
442
+ return [scope_path]
443
+ if not scope_path.exists():
444
+ return []
445
+ candidates: list[Path] = []
446
+ for path in sorted(scope_path.rglob("*")):
447
+ if not path.is_file():
448
+ continue
449
+ try:
450
+ size = path.stat().st_size
451
+ except OSError:
452
+ continue
453
+ if size > 1_000_000:
454
+ continue
455
+ if any(part in _SCAN_EXCLUDED_DIRS for part in path.parts):
456
+ continue
457
+ candidates.append(path)
458
+ return candidates
459
+
460
+
461
+ def _iter_python_files(scope_path: Path) -> list[Path]:
462
+ if scope_path.is_file():
463
+ return [scope_path] if scope_path.suffix == ".py" else []
464
+ if not scope_path.exists():
465
+ return []
466
+ result = []
467
+ for path in sorted(scope_path.rglob("*.py")):
468
+ if not path.is_file():
469
+ continue
470
+ if any(part in _SCAN_EXCLUDED_DIRS for part in path.parts):
471
+ continue
472
+ result.append(path)
473
+ return result
474
+
475
+
476
+ def _scan_python_file(path: Path, source: str) -> list[dict[str, Any]]:
477
+ try:
478
+ tree = ast.parse(source)
479
+ except SyntaxError:
480
+ return []
481
+
482
+ findings: list[dict[str, Any]] = []
483
+ for node in ast.walk(tree):
484
+ if isinstance(node, ast.Call):
485
+ findings.extend(_call_findings(path, node, source))
486
+ return findings
487
+
488
+
489
+ def _call_findings(path: Path, node: ast.Call, source: str) -> list[dict[str, Any]]:
490
+ findings: list[dict[str, Any]] = []
491
+ callee = _call_name(node.func)
492
+ if callee in {"subprocess.run", "subprocess.Popen", "os.system"}:
493
+ if any(keyword.arg == "shell" and isinstance(keyword.value, ast.Constant) and keyword.value.value is True for keyword in node.keywords):
494
+ findings.append(
495
+ _finding(
496
+ rule_id="B602",
497
+ source_name="bandit-lite",
498
+ category="python_ast",
499
+ severity="high",
500
+ path=path,
501
+ line=getattr(node, "lineno", 1),
502
+ message="subprocess call uses shell=True",
503
+ recommendation="Avoid shell=True in subprocess calls.",
504
+ snippet=_source_line(source, getattr(node, "lineno", 1)),
505
+ )
506
+ )
507
+ if callee == "eval":
508
+ findings.append(
509
+ _finding(
510
+ rule_id="B307",
511
+ source_name="bandit-lite",
512
+ category="python_ast",
513
+ severity="high",
514
+ path=path,
515
+ line=getattr(node, "lineno", 1),
516
+ message="eval() detected",
517
+ recommendation="Replace eval with explicit parsing.",
518
+ snippet=_source_line(source, getattr(node, "lineno", 1)),
519
+ )
520
+ )
521
+ if callee == "exec":
522
+ findings.append(
523
+ _finding(
524
+ rule_id="B102",
525
+ source_name="bandit-lite",
526
+ category="python_ast",
527
+ severity="high",
528
+ path=path,
529
+ line=getattr(node, "lineno", 1),
530
+ message="exec() detected",
531
+ recommendation="Replace exec with explicit control flow.",
532
+ snippet=_source_line(source, getattr(node, "lineno", 1)),
533
+ )
534
+ )
535
+ if callee in {"pickle.load", "pickle.loads"}:
536
+ findings.append(
537
+ _finding(
538
+ rule_id="B301",
539
+ source_name="bandit-lite",
540
+ category="python_ast",
541
+ severity="high",
542
+ path=path,
543
+ line=getattr(node, "lineno", 1),
544
+ message="pickle deserialization detected",
545
+ recommendation="Avoid unsafe deserialization of pickle payloads.",
546
+ snippet=_source_line(source, getattr(node, "lineno", 1)),
547
+ )
548
+ )
549
+ return findings
550
+
551
+
552
+ def _call_name(func: ast.AST) -> str:
553
+ if isinstance(func, ast.Name):
554
+ return func.id
555
+ if isinstance(func, ast.Attribute):
556
+ prefix = _call_name(func.value)
557
+ return f"{prefix}.{func.attr}" if prefix else func.attr
558
+ return ""
559
+
560
+
561
+ def _source_line(source: str, line: int) -> str:
562
+ lines = source.splitlines()
563
+ if 1 <= line <= len(lines):
564
+ return lines[line - 1].strip()
565
+ return ""
566
+
567
+
568
+ def _run_bandit_if_available(scope_path: Path) -> list[dict[str, Any]]:
569
+ if not _command_exists("bandit"):
570
+ return []
571
+
572
+ cmd = ["bandit", "-r", str(scope_path), "-f", "json"]
573
+ proc = subprocess.run(cmd, capture_output=True, text=True, check=False, timeout=30)
574
+ if proc.returncode not in {0, 1}:
575
+ return []
576
+ try:
577
+ import json
578
+
579
+ payload = json.loads(proc.stdout or "{}")
580
+ except Exception:
581
+ return []
582
+
583
+ findings: list[dict[str, Any]] = []
584
+ for item in payload.get("results", []):
585
+ issue_severity = str(item.get("issue_severity", "LOW")).lower()
586
+ findings.append(
587
+ {
588
+ "id": str(item.get("test_id", "bandit")),
589
+ "source": "bandit",
590
+ "category": "python_ast",
591
+ "severity": "medium" if issue_severity == "medium" else ("critical" if issue_severity == "critical" else issue_severity),
592
+ "exploitability": "unknown",
593
+ "reachability": "unknown",
594
+ "evidence": {
595
+ "path": str(item.get("filename", "")),
596
+ "line": int(item.get("line_number", 1)),
597
+ "snippet": str(item.get("code", "")).strip(),
598
+ },
599
+ "recommendation": str(item.get("more_info", "")) or "Review Bandit finding and remediate.",
600
+ "message": str(item.get("issue_text", "Bandit finding")),
601
+ }
602
+ )
603
+ return findings
604
+
605
+
606
+ def _command_exists(command: str) -> bool:
607
+ return shutil.which(command) is not None
608
+
609
+
610
+ def _scan_dependency_health(scope_path: Path, include_live_enrichment: bool) -> list[dict[str, Any]]:
611
+ manifests = detect_manifests(str(scope_path))
612
+ dependencies = [
613
+ {
614
+ "name": package.name,
615
+ "version": _normalize_version(package.version),
616
+ "ecosystem": _ecosystem_from_manifest(package.source_manifest),
617
+ }
618
+ for package in manifests.packages
619
+ if package.name
620
+ ]
621
+ if not dependencies or not include_live_enrichment:
622
+ return []
623
+
624
+ osv_result = scan_for_cves(dependencies, str(scope_path))
625
+ raw_results = osv_result.get("results", {})
626
+ findings: list[dict[str, Any]] = []
627
+ for dependency in dependencies:
628
+ package_name = dependency["name"]
629
+ for vuln in raw_results.get(package_name, []):
630
+ reachability = analyze_reachability(
631
+ {
632
+ "package": package_name,
633
+ "id": vuln.get("id", ""),
634
+ "summary": vuln.get("summary", ""),
635
+ "fixed_version": vuln.get("fixed_version", ""),
636
+ },
637
+ str(scope_path),
638
+ )
639
+ findings.append(
640
+ {
641
+ "id": str(vuln.get("id", "")),
642
+ "source": "osv",
643
+ "category": "dependency",
644
+ "severity": _normalize_severity(str(vuln.get("severity", "unknown"))),
645
+ "exploitability": _risk_to_exploitability(str(reachability.get("risk_level", ""))),
646
+ "reachability": _normalize_reachability(str(reachability.get("reachability", "unknown"))),
647
+ "kev_listed": reachability.get("kev_listed", False),
648
+ "epss_score": reachability.get("epss_score"),
649
+ "evidence": {
650
+ "package": package_name,
651
+ "version": dependency["version"],
652
+ "fixed_version": str(vuln.get("fixed_version", "")),
653
+ "summary": str(vuln.get("summary", "")),
654
+ },
655
+ "recommendation": reachability.get("recommendation", "Upgrade the dependency to a fixed version."),
656
+ "message": str(vuln.get("summary", "")) or f"Known vulnerability in {package_name}",
657
+ }
658
+ )
659
+ return findings
660
+
661
+
662
+ def _risk_to_exploitability(risk_level: str) -> str:
663
+ lowered = risk_level.lower()
664
+ if lowered in {"critical", "high"}:
665
+ return "high"
666
+ if lowered == "medium":
667
+ return "medium"
668
+ if lowered == "low":
669
+ return "low"
670
+ return "unknown"
671
+
672
+
673
+ def _normalize_reachability(raw: str) -> str:
674
+ lowered = raw.lower()
675
+ if lowered in {"reachable", "potentially_reachable", "potentially-reachable"}:
676
+ return "reachable"
677
+ if lowered == "unreachable":
678
+ return "unreachable"
679
+ return "unknown"
680
+
681
+
682
+ def _normalize_version(version: str) -> str:
683
+ normalized = (version or "").strip()
684
+ for prefix in ("==", ">=", "<=", "~=", "^", ">"):
685
+ if normalized.startswith(prefix):
686
+ return normalized[len(prefix):].strip()
687
+ return normalized
688
+
689
+
690
+ def _ecosystem_from_manifest(manifest_path: str) -> str:
691
+ suffix = Path(manifest_path).name
692
+ return {
693
+ "package.json": "npm",
694
+ "requirements.txt": "PyPI",
695
+ "pyproject.toml": "PyPI",
696
+ "Cargo.toml": "crates.io",
697
+ "go.mod": "Go",
698
+ "Gemfile": "RubyGems",
699
+ }.get(suffix, "npm")
700
+
701
+
702
+ def _normalize_severity(raw: str) -> str:
703
+ lowered = raw.lower()
704
+ if "critical" in lowered:
705
+ return "critical"
706
+ if "high" in lowered:
707
+ return "high"
708
+ if "medium" in lowered or "moderate" in lowered:
709
+ return "medium"
710
+ if "low" in lowered:
711
+ return "low"
712
+ return "medium"
713
+
714
+
715
+ def _finding(
716
+ *,
717
+ rule_id: str,
718
+ source_name: str,
719
+ category: str,
720
+ severity: str,
721
+ path: Path,
722
+ line: int,
723
+ message: str,
724
+ recommendation: str,
725
+ snippet: str,
726
+ ) -> dict[str, Any]:
727
+ exploitability = "high" if severity in {"critical", "high"} else ("medium" if severity == "medium" else "low")
728
+ return {
729
+ "id": rule_id,
730
+ "source": source_name,
731
+ "category": category,
732
+ "severity": severity,
733
+ "exploitability": exploitability,
734
+ "reachability": "reachable",
735
+ "evidence": {
736
+ "path": str(path),
737
+ "line": line,
738
+ "snippet": snippet,
739
+ },
740
+ "recommendation": recommendation,
741
+ "message": message,
742
+ }
743
+
744
+
745
+ def _normalize_waivers(waivers: list[dict[str, Any] | str]) -> dict[str, str]:
746
+ normalized: dict[str, str] = {}
747
+ for waiver in waivers:
748
+ if isinstance(waiver, str):
749
+ key = waiver.strip()
750
+ if key:
751
+ normalized[key] = "waived"
752
+ continue
753
+ if not isinstance(waiver, dict):
754
+ continue
755
+ target = str(waiver.get("finding_id") or waiver.get("id") or "").strip()
756
+ if not target:
757
+ continue
758
+ justification = str(waiver.get("justification") or waiver.get("reason") or "waived").strip()
759
+ normalized[target] = justification
760
+ return normalized
761
+
762
+
763
+ def _finding_instance_id(finding: dict[str, Any]) -> str:
764
+ evidence = finding.get("evidence", {})
765
+ base = "|".join(
766
+ [
767
+ str(finding.get("id", "")),
768
+ str(evidence.get("path", "")),
769
+ str(evidence.get("line", "")),
770
+ str(finding.get("message", "")),
771
+ ]
772
+ )
773
+ digest = sha256(base.encode("utf-8")).hexdigest()
774
+ return f"{finding.get('id', 'SEC')}-{digest[:12]}"
775
+
776
+
777
+ def _finalize_findings(findings: list[dict[str, Any]], waiver_map: dict[str, str], *, project_dir: str = "") -> list[dict[str, Any]]:
778
+ finalized: list[dict[str, Any]] = []
779
+ project_root = Path(project_dir).resolve() if project_dir else None
780
+ for finding in findings:
781
+ item = dict(finding)
782
+ item["severity"] = _normalize_severity(str(item.get("severity", "medium")))
783
+ item.setdefault("exploitability", "unknown")
784
+ item.setdefault("reachability", "unknown")
785
+ item["exploitability"] = _normalize_exploitability(str(item.get("exploitability", "unknown")), item)
786
+ item["reachability"] = _normalize_reachability(str(item.get("reachability", "unknown")))
787
+ item["finding_id"] = _finding_instance_id(item)
788
+ sanctioned_justification: str | None = None
789
+ evidence_path = str(item.get("evidence", {}).get("path", ""))
790
+ rule_id = str(item.get("id", ""))
791
+ if evidence_path and rule_id:
792
+ rel_path = evidence_path.replace("\\", "/")
793
+ if project_root is not None:
794
+ try:
795
+ rel_path = str(Path(evidence_path).resolve().relative_to(project_root))
796
+ except ValueError:
797
+ pass
798
+ rel_path = rel_path.replace("\\", "/")
799
+ sanctioned_justification = _SANCTIONED_CALLSITES.get((rel_path, rule_id))
800
+ justification = sanctioned_justification or waiver_map.get(item["finding_id"]) or waiver_map.get(str(item.get("id", "")))
801
+ if justification:
802
+ item["waived"] = True
803
+ item["waiver_justification"] = justification
804
+ else:
805
+ item["waived"] = False
806
+ finalized.append(item)
807
+ return finalized
808
+
809
+
810
+ def _normalize_exploitability(raw: str, finding: dict[str, Any]) -> str:
811
+ lowered = raw.lower()
812
+ if lowered in {"high", "medium", "low"}:
813
+ return lowered
814
+ category = str(finding.get("category", "")).lower()
815
+ severity = str(finding.get("severity", "medium")).lower()
816
+ if category in {"secret", "python_ast"}:
817
+ return "high"
818
+ if severity in {"critical", "high"}:
819
+ return "high"
820
+ if severity == "medium":
821
+ return "medium"
822
+ if severity == "low":
823
+ return "low"
824
+ return "unknown"
825
+
826
+
827
+ def _build_provenance(
828
+ *,
829
+ scope: str,
830
+ manifests: list[Any],
831
+ findings: list[dict[str, Any]],
832
+ include_live_enrichment: bool,
833
+ external_inputs: list[dict[str, Any]],
834
+ ) -> list[dict[str, Any]]:
835
+ provenance = [
836
+ {
837
+ "source": "bandit-lite",
838
+ "scope": scope,
839
+ "mode": "static",
840
+ "finding_count": len([finding for finding in findings if finding["source"] == "bandit-lite"]),
841
+ },
842
+ {
843
+ "source": "manifest-detector",
844
+ "scope": scope,
845
+ "manifest_count": len(manifests),
846
+ "mode": "live" if include_live_enrichment else "offline",
847
+ },
848
+ ]
849
+ if include_live_enrichment:
850
+ provenance.append(
851
+ {
852
+ "source": "osv",
853
+ "scope": scope,
854
+ "mode": "live-enrichment",
855
+ }
856
+ )
857
+ if external_inputs:
858
+ provenance.append(
859
+ {
860
+ "source": "external-content",
861
+ "scope": scope,
862
+ "mode": "zero-trust",
863
+ "count": len(external_inputs),
864
+ }
865
+ )
866
+ return provenance
867
+
868
+
869
+ def _build_trust_scores(findings: list[dict[str, Any]]) -> dict[str, float]:
870
+ if not findings:
871
+ return {"overall": 1.0}
872
+ weighted = 0.0
873
+ for finding in findings:
874
+ severity = finding.get("severity", "medium")
875
+ weighted += {"critical": 0.4, "high": 0.25, "medium": 0.1, "low": 0.05}.get(str(severity), 0.1)
876
+ overall = max(0.0, round(1.0 - min(weighted, 0.95), 3))
877
+ return {"overall": overall}
878
+
879
+
880
+ def _timestamp_slug() -> str:
881
+ return datetime.now(timezone.utc).strftime("%Y%m%dT%H%M%SZ")
882
+
883
+
884
+ def _build_sarif_payload(findings: list[dict[str, Any]]) -> dict[str, Any]:
885
+ rules_by_id: dict[str, dict[str, Any]] = {}
886
+ results: list[dict[str, Any]] = []
887
+ for finding in findings:
888
+ rule_id = str(finding.get("id", "OMG000"))
889
+ if rule_id not in rules_by_id:
890
+ rules_by_id[rule_id] = {
891
+ "id": rule_id,
892
+ "name": str(finding.get("category", "security")),
893
+ "shortDescription": {"text": str(finding.get("message", "Security finding"))},
894
+ "help": {"text": str(finding.get("recommendation", "Review finding and remediate."))},
895
+ }
896
+ evidence = finding.get("evidence", {})
897
+ level = "warning"
898
+ if finding.get("severity") in {"critical", "high"}:
899
+ level = "error"
900
+ elif finding.get("severity") == "low":
901
+ level = "note"
902
+ location = {
903
+ "physicalLocation": {
904
+ "artifactLocation": {"uri": str(evidence.get("path", ""))},
905
+ "region": {"startLine": int(evidence.get("line", 1) or 1)},
906
+ }
907
+ }
908
+ result_payload: dict[str, Any] = {
909
+ "ruleId": rule_id,
910
+ "level": level,
911
+ "message": {"text": str(finding.get("message", "Security finding"))},
912
+ "partialFingerprints": {
913
+ "findingId": str(finding.get("finding_id", "")),
914
+ },
915
+ "properties": {
916
+ "severity": str(finding.get("severity", "medium")),
917
+ "exploitability": str(finding.get("exploitability", "unknown")),
918
+ "reachability": str(finding.get("reachability", "unknown")),
919
+ "waived": bool(finding.get("waived", False)),
920
+ },
921
+ "locations": [location],
922
+ }
923
+ if finding.get("waived"):
924
+ result_payload["suppressions"] = [
925
+ {
926
+ "kind": "inSource",
927
+ "justification": str(finding.get("waiver_justification", "waived")),
928
+ }
929
+ ]
930
+ results.append(result_payload)
931
+
932
+ return {
933
+ "$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json",
934
+ "version": "2.1.0",
935
+ "runs": [
936
+ {
937
+ "tool": {
938
+ "driver": {
939
+ "name": "omg-security-check",
940
+ "version": CANONICAL_VERSION,
941
+ "rules": [rules_by_id[key] for key in sorted(rules_by_id.keys())],
942
+ }
943
+ },
944
+ "results": results,
945
+ }
946
+ ],
947
+ }
948
+
949
+
950
+ def _build_sbom_payload(*, generated_at: str, manifests: Any) -> dict[str, Any]:
951
+ components: list[dict[str, Any]] = []
952
+ for package in manifests.packages:
953
+ version = _normalize_version(package.version)
954
+ ecosystem = _ecosystem_from_manifest(package.source_manifest)
955
+ purl_type = _SBOM_ECOSYSTEM_PURL.get(ecosystem, "generic")
956
+ purl = f"pkg:{purl_type}/{package.name}"
957
+ if version:
958
+ purl = f"{purl}@{version}"
959
+ component = {
960
+ "type": "library",
961
+ "name": package.name,
962
+ "version": version,
963
+ "purl": purl,
964
+ }
965
+ components.append(component)
966
+ return {
967
+ "bomFormat": "CycloneDX",
968
+ "specVersion": "1.4",
969
+ "version": 1,
970
+ "metadata": {
971
+ "timestamp": generated_at,
972
+ "tools": [{"vendor": "OMG", "name": "omg-security-check", "version": CANONICAL_VERSION}],
973
+ },
974
+ "components": components,
975
+ }
976
+
977
+
978
+ def _build_license_artifact(*, project_dir: str, scope_path: Path, manifests: Any, generated_at: str) -> dict[str, Any]:
979
+ project_license = _detect_project_license(project_dir=project_dir, scope_path=scope_path)
980
+ dependencies = [{"name": package.name, "license": "UNKNOWN"} for package in manifests.packages]
981
+ compatibility = check_license_compatibility(project_license, dependencies)
982
+ packages_by_license: dict[str, list[str]] = {}
983
+ for dependency in dependencies:
984
+ package_name = str(dependency.get("name", "")).strip()
985
+ if not package_name:
986
+ continue
987
+ spdx_id = str(dependency.get("license", "UNKNOWN") or "UNKNOWN").strip() or "UNKNOWN"
988
+ packages_by_license.setdefault(spdx_id, []).append(package_name)
989
+
990
+ licenses = [
991
+ {
992
+ "name": spdx_id,
993
+ "spdx_id": spdx_id,
994
+ "packages": sorted(packages),
995
+ }
996
+ for spdx_id, packages in sorted(packages_by_license.items())
997
+ ]
998
+
999
+ if not licenses:
1000
+ licenses = [{"name": project_license, "spdx_id": project_license, "packages": []}]
1001
+
1002
+ return {
1003
+ "timestamp": generated_at,
1004
+ "licenses": licenses,
1005
+ "project_license": project_license,
1006
+ "compatibility": compatibility,
1007
+ }
1008
+
1009
+
1010
+ def _detect_project_license(*, project_dir: str, scope_path: Path) -> str:
1011
+ candidates = [scope_path / "package.json", Path(project_dir).resolve() / "package.json"]
1012
+ for candidate in candidates:
1013
+ if not candidate.exists():
1014
+ continue
1015
+ try:
1016
+ payload = json.loads(candidate.read_text(encoding="utf-8"))
1017
+ except (OSError, json.JSONDecodeError):
1018
+ continue
1019
+ if isinstance(payload, dict) and isinstance(payload.get("license"), str) and payload["license"].strip():
1020
+ return str(payload["license"]).strip()
1021
+ if (Path(project_dir).resolve() / "LICENSE").exists() or (Path(project_dir).resolve() / "LICENSE.md").exists():
1022
+ return "MIT"
1023
+ return "UNKNOWN"
1024
+
1025
+
1026
+ def _write_json_file(path: Path, payload: dict[str, Any]) -> None:
1027
+ path.parent.mkdir(parents=True, exist_ok=True)
1028
+ path.write_text(json.dumps(payload, indent=2, ensure_ascii=True) + "\n", encoding="utf-8")
1029
+
1030
+
1031
+ def _write_evidence_artifacts(
1032
+ project_dir: str,
1033
+ *,
1034
+ scope: str,
1035
+ generated_at: str,
1036
+ findings: list[dict[str, Any]],
1037
+ provenance: list[dict[str, Any]],
1038
+ trust_scores: dict[str, float],
1039
+ include_live_enrichment: bool,
1040
+ waivers: list[dict[str, Any] | str],
1041
+ license_artifact: dict[str, Any],
1042
+ manifests: Any,
1043
+ unresolved_risks: list[dict[str, Any]],
1044
+ ) -> dict[str, str]:
1045
+ stamp = _timestamp_slug()
1046
+ evidence_dir = Path(project_dir) / ".omg" / "evidence"
1047
+ evidence_dir.mkdir(parents=True, exist_ok=True)
1048
+
1049
+ json_rel = Path(".omg") / "evidence" / f"security-{stamp}.json"
1050
+ sarif_rel = Path(".omg") / "evidence" / f"security-{stamp}.sarif"
1051
+ sbom_rel = Path(".omg") / "evidence" / f"sbom-{stamp}.cdx.json"
1052
+ license_rel = Path(".omg") / "evidence" / f"license-{stamp}.json"
1053
+
1054
+ unresolved_high_risk = [
1055
+ finding
1056
+ for finding in findings
1057
+ if finding.get("severity") in {"critical", "high"} and not finding.get("waived", False)
1058
+ ]
1059
+
1060
+ payload = {
1061
+ "schema": "SecurityCheckEvidence",
1062
+ "generated_at": generated_at,
1063
+ "scope": scope,
1064
+ "scan_status": "completed",
1065
+ "live_enrichment": include_live_enrichment,
1066
+ "findings": findings,
1067
+ "waivers": waivers,
1068
+ "unresolved_high_risk": [finding.get("finding_id") for finding in unresolved_high_risk],
1069
+ "unresolved_risks": unresolved_risks,
1070
+ "security_scans": [
1071
+ {
1072
+ "tool": "security-check",
1073
+ "path": json_rel.as_posix(),
1074
+ "findings": findings,
1075
+ }
1076
+ ],
1077
+ "provenance": provenance,
1078
+ "trust_scores": trust_scores,
1079
+ "artifacts": {
1080
+ "sarif_path": sarif_rel.as_posix(),
1081
+ "sbom_path": sbom_rel.as_posix(),
1082
+ "license_path": license_rel.as_posix(),
1083
+ },
1084
+ }
1085
+ _write_json_file(Path(project_dir) / json_rel, payload)
1086
+ _write_json_file(Path(project_dir) / sarif_rel, _build_sarif_payload(findings))
1087
+ _write_json_file(Path(project_dir) / sbom_rel, _build_sbom_payload(generated_at=generated_at, manifests=manifests))
1088
+ _write_json_file(Path(project_dir) / license_rel, license_artifact)
1089
+ return {
1090
+ "json_path": json_rel.as_posix(),
1091
+ "sarif_path": sarif_rel.as_posix(),
1092
+ "sbom_path": sbom_rel.as_posix(),
1093
+ "license_path": license_rel.as_posix(),
1094
+ }