@trac3r/oh-my-god 2.2.11
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +188 -0
- package/INSTALL-VERIFICATION-INDEX.md +51 -0
- package/LICENSE +21 -0
- package/OMG-setup.sh +2549 -0
- package/QUICK-REFERENCE.md +58 -0
- package/README.md +207 -0
- package/agents/__init__.py +1 -0
- package/agents/__pycache__/model_roles.cpython-313.pyc +0 -0
- package/agents/_model_roles.yaml +26 -0
- package/agents/designer.md +67 -0
- package/agents/explore.md +60 -0
- package/agents/model_roles.py +196 -0
- package/agents/omg-api-builder.md +23 -0
- package/agents/omg-architect-mode.md +41 -0
- package/agents/omg-architect.md +13 -0
- package/agents/omg-backend-engineer.md +41 -0
- package/agents/omg-critic.md +16 -0
- package/agents/omg-database-engineer.md +41 -0
- package/agents/omg-escalation-router.md +17 -0
- package/agents/omg-executor.md +12 -0
- package/agents/omg-frontend-designer.md +41 -0
- package/agents/omg-implement-mode.md +49 -0
- package/agents/omg-infra-engineer.md +41 -0
- package/agents/omg-qa-tester.md +16 -0
- package/agents/omg-research-mode.md +41 -0
- package/agents/omg-security-auditor.md +41 -0
- package/agents/omg-testing-engineer.md +41 -0
- package/agents/plan.md +80 -0
- package/agents/quick_task.md +64 -0
- package/agents/reviewer.md +83 -0
- package/agents/task.md +71 -0
- package/bin/omg +41 -0
- package/commands/OMG:ai-commit.md +113 -0
- package/commands/OMG:api-twin.md +22 -0
- package/commands/OMG:arch.md +313 -0
- package/commands/OMG:browser.md +29 -0
- package/commands/OMG:ccg.md +22 -0
- package/commands/OMG:compat.md +57 -0
- package/commands/OMG:cost.md +181 -0
- package/commands/OMG:crazy.md +125 -0
- package/commands/OMG:create-agent.md +183 -0
- package/commands/OMG:deep-plan.md +18 -0
- package/commands/OMG:deps.md +248 -0
- package/commands/OMG:diagnose-plugins.md +33 -0
- package/commands/OMG:doctor.md +37 -0
- package/commands/OMG:domain-init.md +11 -0
- package/commands/OMG:escalate.md +52 -0
- package/commands/OMG:forge.md +103 -0
- package/commands/OMG:health-check.md +48 -0
- package/commands/OMG:init.md +134 -0
- package/commands/OMG:issue.md +56 -0
- package/commands/OMG:mode.md +44 -0
- package/commands/OMG:playwright.md +17 -0
- package/commands/OMG:preflight.md +26 -0
- package/commands/OMG:preset.md +49 -0
- package/commands/OMG:profile-review.md +58 -0
- package/commands/OMG:project-init.md +11 -0
- package/commands/OMG:ralph-start.md +43 -0
- package/commands/OMG:ralph-stop.md +23 -0
- package/commands/OMG:security-check.md +28 -0
- package/commands/OMG:session-branch.md +101 -0
- package/commands/OMG:session-fork.md +57 -0
- package/commands/OMG:session-merge.md +138 -0
- package/commands/OMG:setup.md +82 -0
- package/commands/OMG:ship.md +18 -0
- package/commands/OMG:stats.md +225 -0
- package/commands/OMG:teams.md +54 -0
- package/commands/OMG:theme.md +44 -0
- package/commands/OMG:validate.md +59 -0
- package/commands/__init__.py +1 -0
- package/docs/command-surface.md +55 -0
- package/docs/install/claude-code.md +53 -0
- package/docs/install/codex.md +45 -0
- package/docs/install/gemini.md +43 -0
- package/docs/install/github-action.md +81 -0
- package/docs/install/github-app-required-checks.md +107 -0
- package/docs/install/github-app.md +161 -0
- package/docs/install/kimi.md +43 -0
- package/docs/install/opencode.md +38 -0
- package/docs/proof.md +182 -0
- package/hooks/__init__.py +0 -0
- package/hooks/__pycache__/__init__.cpython-313.pyc +0 -0
- package/hooks/__pycache__/_agent_registry.cpython-313.pyc +0 -0
- package/hooks/__pycache__/_analytics.cpython-313.pyc +0 -0
- package/hooks/__pycache__/_budget.cpython-313.pyc +0 -0
- package/hooks/__pycache__/_common.cpython-313.pyc +0 -0
- package/hooks/__pycache__/_compression_optimizer.cpython-313.pyc +0 -0
- package/hooks/__pycache__/_cost_ledger.cpython-313.pyc +0 -0
- package/hooks/__pycache__/_learnings.cpython-313.pyc +0 -0
- package/hooks/__pycache__/_memory.cpython-313.pyc +0 -0
- package/hooks/__pycache__/_post_write.cpython-313.pyc +0 -0
- package/hooks/__pycache__/_protected_context.cpython-313.pyc +0 -0
- package/hooks/__pycache__/_token_counter.cpython-313.pyc +0 -0
- package/hooks/__pycache__/branch_manager.cpython-313.pyc +0 -0
- package/hooks/__pycache__/budget_governor.cpython-313.pyc +0 -0
- package/hooks/__pycache__/circuit-breaker.cpython-313.pyc +0 -0
- package/hooks/__pycache__/compression_feedback.cpython-313.pyc +0 -0
- package/hooks/__pycache__/config-guard.cpython-313.pyc +0 -0
- package/hooks/__pycache__/context_pressure.cpython-313.pyc +0 -0
- package/hooks/__pycache__/credential_store.cpython-313.pyc +0 -0
- package/hooks/__pycache__/fetch-rate-limits.cpython-313.pyc +0 -0
- package/hooks/__pycache__/firewall.cpython-313.pyc +0 -0
- package/hooks/__pycache__/hashline-formatter-bridge.cpython-313.pyc +0 -0
- package/hooks/__pycache__/hashline-injector.cpython-313.pyc +0 -0
- package/hooks/__pycache__/hashline-validator.cpython-313.pyc +0 -0
- package/hooks/__pycache__/idle-detector.cpython-313.pyc +0 -0
- package/hooks/__pycache__/instructions-loaded.cpython-313.pyc +0 -0
- package/hooks/__pycache__/intentgate-keyword-detector.cpython-313.pyc +0 -0
- package/hooks/__pycache__/magic-keyword-router.cpython-313.pyc +0 -0
- package/hooks/__pycache__/policy_engine.cpython-313.pyc +0 -0
- package/hooks/__pycache__/post-tool-failure.cpython-313.pyc +0 -0
- package/hooks/__pycache__/post-write.cpython-313.pyc +0 -0
- package/hooks/__pycache__/post_write.cpython-313.pyc +0 -0
- package/hooks/__pycache__/pre-compact.cpython-313.pyc +0 -0
- package/hooks/__pycache__/pre-tool-inject.cpython-313.pyc +0 -0
- package/hooks/__pycache__/prompt-enhancer.cpython-313.pyc +0 -0
- package/hooks/__pycache__/quality-runner.cpython-313.pyc +0 -0
- package/hooks/__pycache__/query.cpython-313.pyc +0 -0
- package/hooks/__pycache__/secret-guard.cpython-313.pyc +0 -0
- package/hooks/__pycache__/secret_audit.cpython-313.pyc +0 -0
- package/hooks/__pycache__/security_validators.cpython-313.pyc +0 -0
- package/hooks/__pycache__/session-end-capture.cpython-313.pyc +0 -0
- package/hooks/__pycache__/session-start.cpython-313.pyc +0 -0
- package/hooks/__pycache__/setup_wizard.cpython-313.pyc +0 -0
- package/hooks/__pycache__/shadow_manager.cpython-313.pyc +0 -0
- package/hooks/__pycache__/state_migration.cpython-313.pyc +0 -0
- package/hooks/__pycache__/stop-gate.cpython-313.pyc +0 -0
- package/hooks/__pycache__/stop_dispatcher.cpython-313.pyc +0 -0
- package/hooks/__pycache__/tdd-gate.cpython-313.pyc +0 -0
- package/hooks/__pycache__/terms-guard.cpython-313.pyc +0 -0
- package/hooks/__pycache__/test-validator.cpython-313.pyc +0 -0
- package/hooks/__pycache__/test_generator_hook.cpython-313.pyc +0 -0
- package/hooks/__pycache__/todo-state-tracker.cpython-313.pyc +0 -0
- package/hooks/__pycache__/tool-ledger.cpython-313.pyc +0 -0
- package/hooks/__pycache__/trust_review.cpython-313.pyc +0 -0
- package/hooks/__pycache__/user-prompt-submit.cpython-313.pyc +0 -0
- package/hooks/_agent_registry.py +481 -0
- package/hooks/_analytics.py +291 -0
- package/hooks/_budget.py +31 -0
- package/hooks/_common.py +761 -0
- package/hooks/_compression_optimizer.py +119 -0
- package/hooks/_cost_ledger.py +176 -0
- package/hooks/_learnings.py +126 -0
- package/hooks/_memory.py +103 -0
- package/hooks/_post_write.py +46 -0
- package/hooks/_protected_context.py +150 -0
- package/hooks/_token_counter.py +221 -0
- package/hooks/branch_manager.py +255 -0
- package/hooks/budget_governor.py +326 -0
- package/hooks/circuit-breaker.py +270 -0
- package/hooks/compression_feedback.py +254 -0
- package/hooks/config-guard.py +193 -0
- package/hooks/context_pressure.py +119 -0
- package/hooks/credential_store.py +970 -0
- package/hooks/fetch-rate-limits.py +212 -0
- package/hooks/firewall.py +323 -0
- package/hooks/hashline-formatter-bridge.py +224 -0
- package/hooks/hashline-injector.py +273 -0
- package/hooks/hashline-validator.py +216 -0
- package/hooks/idle-detector.py +97 -0
- package/hooks/instructions-loaded.py +26 -0
- package/hooks/intentgate-keyword-detector.py +200 -0
- package/hooks/magic-keyword-router.py +195 -0
- package/hooks/policy_engine.py +767 -0
- package/hooks/post-tool-failure.py +19 -0
- package/hooks/post-write.py +233 -0
- package/hooks/pre-compact.py +470 -0
- package/hooks/pre-tool-inject.py +98 -0
- package/hooks/prompt-enhancer.py +879 -0
- package/hooks/quality-runner.py +191 -0
- package/hooks/query.py +512 -0
- package/hooks/secret-guard.py +120 -0
- package/hooks/secret_audit.py +144 -0
- package/hooks/security_validators.py +93 -0
- package/hooks/session-end-capture.py +505 -0
- package/hooks/session-start.py +261 -0
- package/hooks/setup_wizard.py +1101 -0
- package/hooks/shadow_manager.py +476 -0
- package/hooks/state_migration.py +228 -0
- package/hooks/stop-gate.py +7 -0
- package/hooks/stop_dispatcher.py +1259 -0
- package/hooks/tdd-gate.py +10 -0
- package/hooks/terms-guard.py +98 -0
- package/hooks/test-validator.py +462 -0
- package/hooks/test_generator_hook.py +123 -0
- package/hooks/todo-state-tracker.py +114 -0
- package/hooks/tool-ledger.py +165 -0
- package/hooks/trust_review.py +662 -0
- package/hooks/user-prompt-submit.py +12 -0
- package/hud/omg-hud.mjs +1571 -0
- package/lab/__init__.py +1 -0
- package/lab/__pycache__/__init__.cpython-313.pyc +0 -0
- package/lab/__pycache__/axolotl_adapter.cpython-313.pyc +0 -0
- package/lab/__pycache__/forge_runner.cpython-313.pyc +0 -0
- package/lab/__pycache__/gazebo_adapter.cpython-313.pyc +0 -0
- package/lab/__pycache__/isaac_gym_adapter.cpython-313.pyc +0 -0
- package/lab/__pycache__/mock_isaac_env.cpython-313.pyc +0 -0
- package/lab/__pycache__/pipeline.cpython-313.pyc +0 -0
- package/lab/__pycache__/policies.cpython-313.pyc +0 -0
- package/lab/__pycache__/pybullet_adapter.cpython-313.pyc +0 -0
- package/lab/axolotl_adapter.py +531 -0
- package/lab/forge_runner.py +103 -0
- package/lab/gazebo_adapter.py +168 -0
- package/lab/isaac_gym_adapter.py +190 -0
- package/lab/mock_isaac_env.py +47 -0
- package/lab/pipeline.py +712 -0
- package/lab/policies.py +52 -0
- package/lab/pybullet_adapter.py +192 -0
- package/package.json +61 -0
- package/plugins/README.md +78 -0
- package/plugins/__init__.py +1 -0
- package/plugins/__pycache__/__init__.cpython-313.pyc +0 -0
- package/plugins/advanced/commands/OMG-code-review.md +114 -0
- package/plugins/advanced/commands/OMG-deep-plan.md +266 -0
- package/plugins/advanced/commands/OMG-handoff.md +115 -0
- package/plugins/advanced/commands/OMG-learn.md +110 -0
- package/plugins/advanced/commands/OMG-maintainer.md +31 -0
- package/plugins/advanced/commands/OMG-ralph-start.md +43 -0
- package/plugins/advanced/commands/OMG-ralph-stop.md +23 -0
- package/plugins/advanced/commands/OMG-security-review.md +16 -0
- package/plugins/advanced/commands/OMG-sequential-thinking.md +20 -0
- package/plugins/advanced/commands/OMG-ship.md +46 -0
- package/plugins/advanced/commands/OMG:code-review.md +114 -0
- package/plugins/advanced/commands/OMG:deep-plan.md +266 -0
- package/plugins/advanced/commands/OMG:handoff.md +115 -0
- package/plugins/advanced/commands/OMG:learn.md +110 -0
- package/plugins/advanced/commands/OMG:maintainer.md +31 -0
- package/plugins/advanced/commands/OMG:ralph-start.md +43 -0
- package/plugins/advanced/commands/OMG:ralph-stop.md +23 -0
- package/plugins/advanced/commands/OMG:security-review.md +16 -0
- package/plugins/advanced/commands/OMG:sequential-thinking.md +20 -0
- package/plugins/advanced/commands/OMG:ship.md +46 -0
- package/plugins/advanced/plugin.json +104 -0
- package/plugins/core/plugin.json +204 -0
- package/plugins/dephealth/__init__.py +0 -0
- package/plugins/dephealth/__pycache__/__init__.cpython-313.pyc +0 -0
- package/plugins/dephealth/__pycache__/cve_scanner.cpython-313.pyc +0 -0
- package/plugins/dephealth/__pycache__/license_checker.cpython-313.pyc +0 -0
- package/plugins/dephealth/__pycache__/manifest_detector.cpython-313.pyc +0 -0
- package/plugins/dephealth/__pycache__/vuln_analyzer.cpython-313.pyc +0 -0
- package/plugins/dephealth/cve_scanner.py +279 -0
- package/plugins/dephealth/license_checker.py +135 -0
- package/plugins/dephealth/manifest_detector.py +423 -0
- package/plugins/dephealth/vuln_analyzer.py +176 -0
- package/plugins/testgen/__init__.py +0 -0
- package/plugins/testgen/__pycache__/__init__.cpython-313.pyc +0 -0
- package/plugins/testgen/__pycache__/codamosa_engine.cpython-313.pyc +0 -0
- package/plugins/testgen/__pycache__/edge_case_synthesizer.cpython-313.pyc +0 -0
- package/plugins/testgen/__pycache__/framework_detector.cpython-313.pyc +0 -0
- package/plugins/testgen/__pycache__/skeleton_generator.cpython-313.pyc +0 -0
- package/plugins/testgen/codamosa_engine.py +402 -0
- package/plugins/testgen/edge_case_synthesizer.py +184 -0
- package/plugins/testgen/framework_detector.py +271 -0
- package/plugins/testgen/skeleton_generator.py +219 -0
- package/plugins/viz/__init__.py +0 -0
- package/plugins/viz/__pycache__/__init__.cpython-313.pyc +0 -0
- package/plugins/viz/__pycache__/ast_parser.cpython-313.pyc +0 -0
- package/plugins/viz/__pycache__/diagram_generator.cpython-313.pyc +0 -0
- package/plugins/viz/__pycache__/graph_builder.cpython-313.pyc +0 -0
- package/plugins/viz/__pycache__/native_parsers.cpython-313.pyc +0 -0
- package/plugins/viz/__pycache__/regex_parser.cpython-313.pyc +0 -0
- package/plugins/viz/ast_parser.py +139 -0
- package/plugins/viz/diagram_generator.py +192 -0
- package/plugins/viz/graph_builder.py +444 -0
- package/plugins/viz/native_parsers.py +259 -0
- package/plugins/viz/regex_parser.py +112 -0
- package/pyproject.toml +143 -0
- package/registry/__init__.py +1 -0
- package/registry/__pycache__/__init__.cpython-313.pyc +0 -0
- package/registry/__pycache__/approval_artifact.cpython-313.pyc +0 -0
- package/registry/__pycache__/verify_artifact.cpython-313.pyc +0 -0
- package/registry/approval_artifact.py +236 -0
- package/registry/bundles/algorithms.yaml +45 -0
- package/registry/bundles/api-twin.yaml +48 -0
- package/registry/bundles/ast-pack.yaml +80 -0
- package/registry/bundles/claim-judge.yaml +49 -0
- package/registry/bundles/control-plane.yaml +192 -0
- package/registry/bundles/data-lineage.yaml +47 -0
- package/registry/bundles/delta-classifier.yaml +47 -0
- package/registry/bundles/eval-gate.yaml +47 -0
- package/registry/bundles/hash-edit.yaml +73 -0
- package/registry/bundles/health.yaml +45 -0
- package/registry/bundles/hook-governor.yaml +101 -0
- package/registry/bundles/incident-replay.yaml +47 -0
- package/registry/bundles/lsp-pack.yaml +80 -0
- package/registry/bundles/mcp-fabric.yaml +53 -0
- package/registry/bundles/plan-council.yaml +56 -0
- package/registry/bundles/preflight.yaml +48 -0
- package/registry/bundles/proof-gate.yaml +49 -0
- package/registry/bundles/remote-supervisor.yaml +49 -0
- package/registry/bundles/robotics.yaml +45 -0
- package/registry/bundles/secure-worktree-pipeline.yaml +69 -0
- package/registry/bundles/security-check.yaml +50 -0
- package/registry/bundles/terminal-lane.yaml +61 -0
- package/registry/bundles/test-intent-lock.yaml +49 -0
- package/registry/bundles/tracebank.yaml +47 -0
- package/registry/bundles/vision.yaml +45 -0
- package/registry/omg-capability.schema.json +378 -0
- package/registry/policy-packs/airgapped.lock.json +11 -0
- package/registry/policy-packs/airgapped.signature.json +10 -0
- package/registry/policy-packs/airgapped.yaml +16 -0
- package/registry/policy-packs/fintech.lock.json +11 -0
- package/registry/policy-packs/fintech.signature.json +10 -0
- package/registry/policy-packs/fintech.yaml +15 -0
- package/registry/policy-packs/locked-prod.lock.json +11 -0
- package/registry/policy-packs/locked-prod.signature.json +10 -0
- package/registry/policy-packs/locked-prod.yaml +18 -0
- package/registry/trusted_signers.json +44 -0
- package/registry/verify_artifact.py +493 -0
- package/runtime/__init__.py +36 -0
- package/runtime/__pycache__/__init__.cpython-313.pyc +0 -0
- package/runtime/__pycache__/adoption.cpython-313.pyc +0 -0
- package/runtime/__pycache__/agent_selector.cpython-313.pyc +0 -0
- package/runtime/__pycache__/api_twin.cpython-313.pyc +0 -0
- package/runtime/__pycache__/architecture_signal.cpython-313.pyc +0 -0
- package/runtime/__pycache__/artifact_parsers.cpython-313.pyc +0 -0
- package/runtime/__pycache__/asset_loader.cpython-313.pyc +0 -0
- package/runtime/__pycache__/background_verification.cpython-313.pyc +0 -0
- package/runtime/__pycache__/budget_envelopes.cpython-313.pyc +0 -0
- package/runtime/__pycache__/business_workflow.cpython-313.pyc +0 -0
- package/runtime/__pycache__/canonical_surface.cpython-313.pyc +0 -0
- package/runtime/__pycache__/canonical_taxonomy.cpython-313.pyc +0 -0
- package/runtime/__pycache__/claim_judge.cpython-313.pyc +0 -0
- package/runtime/__pycache__/cli_provider.cpython-313.pyc +0 -0
- package/runtime/__pycache__/compat.cpython-313.pyc +0 -0
- package/runtime/__pycache__/complexity_scorer.cpython-313.pyc +0 -0
- package/runtime/__pycache__/compliance_governor.cpython-313.pyc +0 -0
- package/runtime/__pycache__/config_transaction.cpython-313.pyc +0 -0
- package/runtime/__pycache__/context_compiler.cpython-313.pyc +0 -0
- package/runtime/__pycache__/context_engine.cpython-313.pyc +0 -0
- package/runtime/__pycache__/context_limits.cpython-313.pyc +0 -0
- package/runtime/__pycache__/contract_compiler.cpython-313.pyc +0 -0
- package/runtime/__pycache__/custom_agent_loader.cpython-313.pyc +0 -0
- package/runtime/__pycache__/data_lineage.cpython-313.pyc +0 -0
- package/runtime/__pycache__/defense_state.cpython-313.pyc +0 -0
- package/runtime/__pycache__/delta_classifier.cpython-313.pyc +0 -0
- package/runtime/__pycache__/dispatcher.cpython-313.pyc +0 -0
- package/runtime/__pycache__/doc_generator.cpython-313.pyc +0 -0
- package/runtime/__pycache__/domain_packs.cpython-313.pyc +0 -0
- package/runtime/__pycache__/ecosystem.cpython-313.pyc +0 -0
- package/runtime/__pycache__/equalizer.cpython-313.pyc +0 -0
- package/runtime/__pycache__/eval_gate.cpython-313.pyc +0 -0
- package/runtime/__pycache__/evidence_narrator.cpython-313.pyc +0 -0
- package/runtime/__pycache__/evidence_query.cpython-313.pyc +0 -0
- package/runtime/__pycache__/evidence_registry.cpython-313.pyc +0 -0
- package/runtime/__pycache__/evidence_requirements.cpython-313.pyc +0 -0
- package/runtime/__pycache__/exec_kernel.cpython-313.pyc +0 -0
- package/runtime/__pycache__/explainer_formatter.cpython-313.pyc +0 -0
- package/runtime/__pycache__/feature_registry.cpython-313.pyc +0 -0
- package/runtime/__pycache__/forge_agents.cpython-313.pyc +0 -0
- package/runtime/__pycache__/forge_contracts.cpython-313.pyc +0 -0
- package/runtime/__pycache__/forge_domains.cpython-313.pyc +0 -0
- package/runtime/__pycache__/forge_run_id.cpython-313.pyc +0 -0
- package/runtime/__pycache__/github_integration.cpython-313.pyc +0 -0
- package/runtime/__pycache__/github_review_bot.cpython-313.pyc +0 -0
- package/runtime/__pycache__/github_review_contract.cpython-313.pyc +0 -0
- package/runtime/__pycache__/github_review_formatter.cpython-313.pyc +0 -0
- package/runtime/__pycache__/guide_assert.cpython-313.pyc +0 -0
- package/runtime/__pycache__/hook_governor.cpython-313.pyc +0 -0
- package/runtime/__pycache__/host_parity.cpython-313.pyc +0 -0
- package/runtime/__pycache__/incident_replay.cpython-313.pyc +0 -0
- package/runtime/__pycache__/install_planner.cpython-313.pyc +0 -0
- package/runtime/__pycache__/interaction_journal.cpython-313.pyc +0 -0
- package/runtime/__pycache__/issue_surface.cpython-313.pyc +0 -0
- package/runtime/__pycache__/legacy_compat.cpython-313.pyc +0 -0
- package/runtime/__pycache__/mcp_config_writers.cpython-313.pyc +0 -0
- package/runtime/__pycache__/mcp_lifecycle.cpython-313.pyc +0 -0
- package/runtime/__pycache__/mcp_memory_server.cpython-313.pyc +0 -0
- package/runtime/__pycache__/memory_store.cpython-313.pyc +0 -0
- package/runtime/__pycache__/merge_writer.cpython-313.pyc +0 -0
- package/runtime/__pycache__/music_omr_testbed.cpython-313.pyc +0 -0
- package/runtime/__pycache__/mutation_gate.cpython-313.pyc +0 -0
- package/runtime/__pycache__/omc_compat.cpython-313.pyc +0 -0
- package/runtime/__pycache__/omg_browser_cli.cpython-313.pyc +0 -0
- package/runtime/__pycache__/omg_mcp_server.cpython-313.pyc +0 -0
- package/runtime/__pycache__/opus_plan.cpython-313.pyc +0 -0
- package/runtime/__pycache__/playwright_adapter.cpython-313.pyc +0 -0
- package/runtime/__pycache__/playwright_pack.cpython-313.pyc +0 -0
- package/runtime/__pycache__/plugin_diagnostics.cpython-313.pyc +0 -0
- package/runtime/__pycache__/plugin_interop.cpython-313.pyc +0 -0
- package/runtime/__pycache__/policy_pack_loader.cpython-313.pyc +0 -0
- package/runtime/__pycache__/preflight.cpython-313.pyc +0 -0
- package/runtime/__pycache__/profile_io.cpython-313.pyc +0 -0
- package/runtime/__pycache__/prompt_compiler.cpython-313.pyc +0 -0
- package/runtime/__pycache__/proof_chain.cpython-313.pyc +0 -0
- package/runtime/__pycache__/proof_gate.cpython-313.pyc +0 -0
- package/runtime/__pycache__/provider_parity_eval.cpython-313.pyc +0 -0
- package/runtime/__pycache__/release_artifact_audit.cpython-313.pyc +0 -0
- package/runtime/__pycache__/release_run_coordinator.cpython-313.pyc +0 -0
- package/runtime/__pycache__/release_surface_compiler.cpython-313.pyc +0 -0
- package/runtime/__pycache__/release_surface_registry.cpython-313.pyc +0 -0
- package/runtime/__pycache__/release_surfaces.cpython-313.pyc +0 -0
- package/runtime/__pycache__/remote_supervisor.cpython-313.pyc +0 -0
- package/runtime/__pycache__/repro_pack.cpython-313.pyc +0 -0
- package/runtime/__pycache__/rollback_manifest.cpython-313.pyc +0 -0
- package/runtime/__pycache__/router_critics.cpython-313.pyc +0 -0
- package/runtime/__pycache__/router_executor.cpython-313.pyc +0 -0
- package/runtime/__pycache__/router_selector.cpython-313.pyc +0 -0
- package/runtime/__pycache__/runtime_contracts.cpython-313.pyc +0 -0
- package/runtime/__pycache__/runtime_profile.cpython-313.pyc +0 -0
- package/runtime/__pycache__/security_check.cpython-313.pyc +0 -0
- package/runtime/__pycache__/session_health.cpython-313.pyc +0 -0
- package/runtime/__pycache__/skill_evolution.cpython-313.pyc +0 -0
- package/runtime/__pycache__/skill_registry.cpython-313.pyc +0 -0
- package/runtime/__pycache__/subagent_dispatcher.cpython-313.pyc +0 -0
- package/runtime/__pycache__/subscription_tiers.cpython-313.pyc +0 -0
- package/runtime/__pycache__/team_router.cpython-313.pyc +0 -0
- package/runtime/__pycache__/test_intent_lock.cpython-313-pytest-9.0.2.pyc +0 -0
- package/runtime/__pycache__/test_intent_lock.cpython-313.pyc +0 -0
- package/runtime/__pycache__/tmux_session_manager.cpython-313.pyc +0 -0
- package/runtime/__pycache__/tool_fabric.cpython-313.pyc +0 -0
- package/runtime/__pycache__/tool_plan_gate.cpython-313.pyc +0 -0
- package/runtime/__pycache__/tool_relevance.cpython-313.pyc +0 -0
- package/runtime/__pycache__/tracebank.cpython-313.pyc +0 -0
- package/runtime/__pycache__/untrusted_content.cpython-313.pyc +0 -0
- package/runtime/__pycache__/validate.cpython-313.pyc +0 -0
- package/runtime/__pycache__/verdict_schema.cpython-313.pyc +0 -0
- package/runtime/__pycache__/verification_controller.cpython-313.pyc +0 -0
- package/runtime/__pycache__/verification_loop.cpython-313.pyc +0 -0
- package/runtime/__pycache__/vision_artifacts.cpython-313.pyc +0 -0
- package/runtime/__pycache__/vision_cache.cpython-313.pyc +0 -0
- package/runtime/__pycache__/vision_jobs.cpython-313.pyc +0 -0
- package/runtime/__pycache__/worker_watchdog.cpython-313.pyc +0 -0
- package/runtime/adapters/__init__.py +13 -0
- package/runtime/adapters/__pycache__/__init__.cpython-313.pyc +0 -0
- package/runtime/adapters/__pycache__/claude.cpython-313.pyc +0 -0
- package/runtime/adapters/__pycache__/gpt.cpython-313.pyc +0 -0
- package/runtime/adapters/__pycache__/local.cpython-313.pyc +0 -0
- package/runtime/adapters/claude.py +63 -0
- package/runtime/adapters/gpt.py +56 -0
- package/runtime/adapters/local.py +56 -0
- package/runtime/adoption.py +280 -0
- package/runtime/api_twin.py +450 -0
- package/runtime/architecture_signal.py +226 -0
- package/runtime/artifact_parsers.py +161 -0
- package/runtime/asset_loader.py +62 -0
- package/runtime/background_verification.py +178 -0
- package/runtime/budget_envelopes.py +398 -0
- package/runtime/business_workflow.py +234 -0
- package/runtime/canonical_surface.py +53 -0
- package/runtime/canonical_taxonomy.py +27 -0
- package/runtime/claim_judge.py +648 -0
- package/runtime/cli_provider.py +105 -0
- package/runtime/compat.py +2222 -0
- package/runtime/complexity_scorer.py +148 -0
- package/runtime/compliance_governor.py +505 -0
- package/runtime/config_transaction.py +304 -0
- package/runtime/context_compiler.py +131 -0
- package/runtime/context_engine.py +708 -0
- package/runtime/context_limits.py +363 -0
- package/runtime/contract_compiler.py +3664 -0
- package/runtime/custom_agent_loader.py +366 -0
- package/runtime/data_lineage.py +244 -0
- package/runtime/defense_state.py +261 -0
- package/runtime/delta_classifier.py +231 -0
- package/runtime/dispatcher.py +47 -0
- package/runtime/doc_generator.py +319 -0
- package/runtime/domain_packs.py +75 -0
- package/runtime/ecosystem.py +371 -0
- package/runtime/equalizer.py +268 -0
- package/runtime/eval_gate.py +96 -0
- package/runtime/evidence_narrator.py +147 -0
- package/runtime/evidence_query.py +303 -0
- package/runtime/evidence_registry.py +16 -0
- package/runtime/evidence_requirements.py +157 -0
- package/runtime/exec_kernel.py +267 -0
- package/runtime/explainer_formatter.py +82 -0
- package/runtime/feature_registry.py +109 -0
- package/runtime/forge_agents.py +915 -0
- package/runtime/forge_contracts.py +519 -0
- package/runtime/forge_domains.py +68 -0
- package/runtime/forge_run_id.py +86 -0
- package/runtime/guide_assert.py +135 -0
- package/runtime/hook_governor.py +156 -0
- package/runtime/host_parity.py +373 -0
- package/runtime/incident_replay.py +310 -0
- package/runtime/install_planner.py +617 -0
- package/runtime/interaction_journal.py +566 -0
- package/runtime/issue_surface.py +472 -0
- package/runtime/legacy_compat.py +7 -0
- package/runtime/mcp_config_writers.py +360 -0
- package/runtime/mcp_lifecycle.py +175 -0
- package/runtime/mcp_memory_server.py +220 -0
- package/runtime/memory_parsers/__init__.py +0 -0
- package/runtime/memory_parsers/__pycache__/__init__.cpython-313.pyc +0 -0
- package/runtime/memory_parsers/__pycache__/chatgpt_parser.cpython-313.pyc +0 -0
- package/runtime/memory_parsers/__pycache__/claude_import.cpython-313.pyc +0 -0
- package/runtime/memory_parsers/__pycache__/export.cpython-313.pyc +0 -0
- package/runtime/memory_parsers/__pycache__/gemini_import.cpython-313.pyc +0 -0
- package/runtime/memory_parsers/__pycache__/kimi_import.cpython-313.pyc +0 -0
- package/runtime/memory_parsers/chatgpt_parser.py +257 -0
- package/runtime/memory_parsers/claude_import.py +107 -0
- package/runtime/memory_parsers/export.py +97 -0
- package/runtime/memory_parsers/gemini_import.py +91 -0
- package/runtime/memory_parsers/kimi_import.py +91 -0
- package/runtime/memory_store.py +1182 -0
- package/runtime/merge_writer.py +445 -0
- package/runtime/music_omr_testbed.py +336 -0
- package/runtime/mutation_gate.py +320 -0
- package/runtime/omc_compat.py +7 -0
- package/runtime/omg_browser_cli.py +95 -0
- package/runtime/omg_compat_contract_snapshot.json +936 -0
- package/runtime/omg_contract_snapshot.json +936 -0
- package/runtime/omg_mcp_server.py +306 -0
- package/runtime/playwright_adapter.py +39 -0
- package/runtime/playwright_pack.py +253 -0
- package/runtime/plugin_diagnostics.py +308 -0
- package/runtime/plugin_interop.py +1060 -0
- package/runtime/policy_pack_loader.py +147 -0
- package/runtime/preflight.py +135 -0
- package/runtime/profile_io.py +328 -0
- package/runtime/proof_chain.py +472 -0
- package/runtime/proof_gate.py +442 -0
- package/runtime/provider_parity_eval.py +109 -0
- package/runtime/providers/__init__.py +0 -0
- package/runtime/providers/__pycache__/__init__.cpython-313.pyc +0 -0
- package/runtime/providers/__pycache__/codex_provider.cpython-313.pyc +0 -0
- package/runtime/providers/__pycache__/gemini_provider.cpython-313.pyc +0 -0
- package/runtime/providers/__pycache__/kimi_provider.cpython-313.pyc +0 -0
- package/runtime/providers/__pycache__/opencode_provider.cpython-313.pyc +0 -0
- package/runtime/providers/codex_provider.py +129 -0
- package/runtime/providers/gemini_provider.py +143 -0
- package/runtime/providers/kimi_provider.py +167 -0
- package/runtime/providers/opencode_provider.py +99 -0
- package/runtime/release_artifact_audit.py +556 -0
- package/runtime/release_run_coordinator.py +574 -0
- package/runtime/release_surface_compiler.py +643 -0
- package/runtime/release_surface_registry.py +283 -0
- package/runtime/release_surfaces.py +320 -0
- package/runtime/remote_supervisor.py +79 -0
- package/runtime/repro_pack.py +398 -0
- package/runtime/rollback_manifest.py +143 -0
- package/runtime/router_critics.py +229 -0
- package/runtime/router_executor.py +142 -0
- package/runtime/router_selector.py +99 -0
- package/runtime/runtime_contracts.py +292 -0
- package/runtime/runtime_profile.py +133 -0
- package/runtime/security_check.py +1094 -0
- package/runtime/session_health.py +546 -0
- package/runtime/skill_evolution.py +221 -0
- package/runtime/skill_registry.py +53 -0
- package/runtime/subagent_dispatcher.py +604 -0
- package/runtime/subscription_tiers.py +258 -0
- package/runtime/team_router.py +1399 -0
- package/runtime/test_intent_lock.py +543 -0
- package/runtime/tmux_session_manager.py +172 -0
- package/runtime/tool_fabric.py +570 -0
- package/runtime/tool_plan_gate.py +460 -0
- package/runtime/tracebank.py +125 -0
- package/runtime/untrusted_content.py +360 -0
- package/runtime/validate.py +293 -0
- package/runtime/verdict_schema.py +198 -0
- package/runtime/verification_controller.py +235 -0
- package/runtime/verification_loop.py +73 -0
- package/runtime/vision_artifacts.py +31 -0
- package/runtime/vision_cache.py +38 -0
- package/runtime/vision_jobs.py +92 -0
- package/runtime/worker_watchdog.py +526 -0
- package/scripts/__pycache__/audit-published-artifact.cpython-313.pyc +0 -0
- package/scripts/__pycache__/check-doc-parity.cpython-313.pyc +0 -0
- package/scripts/__pycache__/check-omg-standalone-clean.cpython-313.pyc +0 -0
- package/scripts/__pycache__/github_review_helpers.cpython-313.pyc +0 -0
- package/scripts/__pycache__/omg.cpython-313.pyc +0 -0
- package/scripts/__pycache__/prepare-release-proof-fixtures.cpython-313.pyc +0 -0
- package/scripts/__pycache__/sync-release-identity.cpython-313.pyc +0 -0
- package/scripts/__pycache__/validate-release-identity.cpython-313.pyc +0 -0
- package/scripts/audit-published-artifact.py +59 -0
- package/scripts/check-omg-compat-contract-snapshot.py +137 -0
- package/scripts/check-omg-contract-snapshot.py +12 -0
- package/scripts/check-omg-public-ready.py +273 -0
- package/scripts/check-omg-standalone-clean.py +133 -0
- package/scripts/emit_host_parity.py +72 -0
- package/scripts/legacy_to_omg_migrate.py +29 -0
- package/scripts/migrate-legacy.py +464 -0
- package/scripts/omc_to_omg_migrate.py +12 -0
- package/scripts/omg.py +2962 -0
- package/scripts/pre-release-check.sh +38 -0
- package/scripts/prepare-release-proof-fixtures.py +602 -0
- package/scripts/print-canonical-version.py +80 -0
- package/scripts/settings-merge.py +289 -0
- package/scripts/sync-release-identity.py +481 -0
- package/scripts/validate-release-identity.py +632 -0
- package/scripts/verify-no-omc.sh +5 -0
- package/scripts/verify-standalone.sh +35 -0
- package/settings.json +751 -0
- package/tools/__init__.py +2 -0
- package/tools/__pycache__/__init__.cpython-313.pyc +0 -0
- package/tools/__pycache__/browser_consent.cpython-313.pyc +0 -0
- package/tools/__pycache__/browser_stealth.cpython-313.pyc +0 -0
- package/tools/__pycache__/browser_tool.cpython-313.pyc +0 -0
- package/tools/__pycache__/changelog_generator.cpython-313.pyc +0 -0
- package/tools/__pycache__/commit_splitter.cpython-313.pyc +0 -0
- package/tools/__pycache__/config_discovery.cpython-313.pyc +0 -0
- package/tools/__pycache__/config_merger.cpython-313.pyc +0 -0
- package/tools/__pycache__/dashboard_generator.cpython-313.pyc +0 -0
- package/tools/__pycache__/git_inspector.cpython-313.pyc +0 -0
- package/tools/__pycache__/lsp_client.cpython-313.pyc +0 -0
- package/tools/__pycache__/lsp_operations.cpython-313.pyc +0 -0
- package/tools/__pycache__/pr_generator.cpython-313.pyc +0 -0
- package/tools/__pycache__/python_repl.cpython-313.pyc +0 -0
- package/tools/__pycache__/python_sandbox.cpython-313.pyc +0 -0
- package/tools/__pycache__/session_snapshot.cpython-313.pyc +0 -0
- package/tools/__pycache__/ssh_manager.cpython-313.pyc +0 -0
- package/tools/__pycache__/theme_engine.cpython-313.pyc +0 -0
- package/tools/__pycache__/theme_selector.cpython-313.pyc +0 -0
- package/tools/__pycache__/web_search.cpython-313.pyc +0 -0
- package/tools/browser_consent.py +289 -0
- package/tools/browser_stealth.py +481 -0
- package/tools/browser_tool.py +448 -0
- package/tools/changelog_generator.py +347 -0
- package/tools/commit_splitter.py +749 -0
- package/tools/config_discovery.py +151 -0
- package/tools/config_merger.py +449 -0
- package/tools/dashboard_generator.py +300 -0
- package/tools/git_inspector.py +298 -0
- package/tools/lsp_client.py +275 -0
- package/tools/lsp_discovery.py +231 -0
- package/tools/lsp_operations.py +392 -0
- package/tools/pr_generator.py +404 -0
- package/tools/python_repl.py +712 -0
- package/tools/python_sandbox.py +768 -0
- package/tools/search_providers/__init__.py +77 -0
- package/tools/search_providers/__pycache__/__init__.cpython-313.pyc +0 -0
- package/tools/search_providers/__pycache__/brave.cpython-313.pyc +0 -0
- package/tools/search_providers/__pycache__/exa.cpython-313.pyc +0 -0
- package/tools/search_providers/__pycache__/jina.cpython-313.pyc +0 -0
- package/tools/search_providers/__pycache__/perplexity.cpython-313.pyc +0 -0
- package/tools/search_providers/__pycache__/synthetic.cpython-313.pyc +0 -0
- package/tools/search_providers/brave.py +115 -0
- package/tools/search_providers/exa.py +116 -0
- package/tools/search_providers/jina.py +104 -0
- package/tools/search_providers/perplexity.py +139 -0
- package/tools/search_providers/synthetic.py +74 -0
- package/tools/session_snapshot.py +851 -0
- package/tools/ssh_manager.py +912 -0
- package/tools/theme_engine.py +296 -0
- package/tools/theme_selector.py +137 -0
- package/tools/web_search.py +675 -0
|
@@ -0,0 +1,1094 @@
|
|
|
1
|
+
"""Canonical OMG security check engine."""
|
|
2
|
+
from __future__ import annotations
|
|
3
|
+
|
|
4
|
+
import ast
|
|
5
|
+
from collections import Counter
|
|
6
|
+
from importlib import import_module
|
|
7
|
+
from datetime import datetime, timezone
|
|
8
|
+
from hashlib import sha256
|
|
9
|
+
import json
|
|
10
|
+
from pathlib import Path
|
|
11
|
+
import re
|
|
12
|
+
import shutil
|
|
13
|
+
import subprocess
|
|
14
|
+
from typing import Any
|
|
15
|
+
|
|
16
|
+
from hooks.security_validators import ensure_path_within_dir
|
|
17
|
+
from plugins.dephealth.cve_scanner import scan_for_cves
|
|
18
|
+
from plugins.dephealth.license_checker import check_license_compatibility
|
|
19
|
+
from plugins.dephealth.manifest_detector import detect_manifests
|
|
20
|
+
from plugins.dephealth.vuln_analyzer import analyze_reachability
|
|
21
|
+
from runtime.adoption import CANONICAL_VERSION
|
|
22
|
+
from runtime.delta_classifier import classify_project_changes
|
|
23
|
+
from runtime.tracebank import record_trace
|
|
24
|
+
|
|
25
|
+
|
|
26
|
+
_SCAN_EXCLUDED_DIRS: frozenset[str] = frozenset({'.git', '.omg', '.sisyphus', 'build', 'dist', 'node_modules', 'tests'})
|
|
27
|
+
|
|
28
|
+
_SANCTIONED_CALLSITES: dict[tuple[str, str], str] = {
|
|
29
|
+
("tools/python_repl.py", "B307"): "Intentional eval() in REPL backend (contract: tools/python_repl.py, tests: tests/tools/test_python_repl.py)",
|
|
30
|
+
("tools/python_repl.py", "B102"): "Intentional exec() in REPL backend (contract: tools/python_repl.py, tests: tests/tools/test_python_repl.py)",
|
|
31
|
+
("tools/python_sandbox.py", "B307"): "Intentional eval() in sandboxed executor (contract: tools/python_sandbox.py, tests: tests/tools/test_python_sandbox.py)",
|
|
32
|
+
("tools/python_sandbox.py", "B102"): "Intentional exec() in sandboxed executor (contract: tools/python_sandbox.py, tests: tests/tools/test_python_sandbox.py)",
|
|
33
|
+
("omg_natives/shell.py", "B602"): "Intentional shell execution in native shell helper (contract: omg_natives/shell.py)",
|
|
34
|
+
}
|
|
35
|
+
|
|
36
|
+
SEVERITY_ORDER = {
|
|
37
|
+
"critical": 0,
|
|
38
|
+
"high": 1,
|
|
39
|
+
"medium": 2,
|
|
40
|
+
"low": 3,
|
|
41
|
+
}
|
|
42
|
+
|
|
43
|
+
_PYTHON_AST_RULES: tuple[tuple[str, str, str, str], ...] = (
|
|
44
|
+
("B602", "subprocess-shell-true", "high", "Avoid shell=True in subprocess calls."),
|
|
45
|
+
("B307", "eval-use", "high", "Replace eval with explicit parsing."),
|
|
46
|
+
("B102", "exec-use", "high", "Replace exec with explicit control flow."),
|
|
47
|
+
("B301", "pickle-load", "high", "Avoid unsafe deserialization of pickle payloads."),
|
|
48
|
+
)
|
|
49
|
+
|
|
50
|
+
_SECRET_PATTERNS: tuple[tuple[str, re.Pattern[str], str, str], ...] = (
|
|
51
|
+
("SEC001", re.compile(r"AKIA[0-9A-Z]{16}"), "high", "AWS access key-like token detected."),
|
|
52
|
+
("SEC002", re.compile(r"-----BEGIN (?:RSA|EC|OPENSSH|DSA) PRIVATE KEY-----"), "critical", "Private key material detected."),
|
|
53
|
+
(
|
|
54
|
+
"SEC003",
|
|
55
|
+
re.compile(r"(?i)(?:secret|api[_-]?key|token|password)\s*[:=]\s*['\"][A-Za-z0-9_\-\+/=]{12,}['\"]"),
|
|
56
|
+
"high",
|
|
57
|
+
"Hard-coded secret-like credential detected.",
|
|
58
|
+
),
|
|
59
|
+
)
|
|
60
|
+
|
|
61
|
+
_CONFIG_PATTERNS: tuple[tuple[str, re.Pattern[str], str, str], ...] = (
|
|
62
|
+
("CFG001", re.compile(r"0\.0\.0\.0/0"), "high", "Wildcard ingress rule detected."),
|
|
63
|
+
("CFG002", re.compile(r"(?i)verify\s*=\s*false"), "high", "TLS verification appears disabled."),
|
|
64
|
+
("CFG003", re.compile(r"(?i)(?:ssl_verify|verify_ssl)\s*[:=]\s*false"), "high", "TLS verification appears disabled."),
|
|
65
|
+
("CFG004", re.compile(r"(?i)allow_privilege_escalation\s*[:=]\s*true"), "high", "Privilege escalation enabled in runtime policy."),
|
|
66
|
+
("CFG005", re.compile(r"(?i)publicly_accessible\s*=\s*true"), "medium", "Publicly accessible infrastructure flag enabled."),
|
|
67
|
+
)
|
|
68
|
+
|
|
69
|
+
_CONFIG_FILE_HINTS = (
|
|
70
|
+
".tf",
|
|
71
|
+
".tfvars",
|
|
72
|
+
".yaml",
|
|
73
|
+
".yml",
|
|
74
|
+
".json",
|
|
75
|
+
".env",
|
|
76
|
+
"dockerfile",
|
|
77
|
+
"kustomization",
|
|
78
|
+
"helm",
|
|
79
|
+
"policy",
|
|
80
|
+
"config",
|
|
81
|
+
)
|
|
82
|
+
|
|
83
|
+
_SBOM_ECOSYSTEM_PURL = {
|
|
84
|
+
"npm": "npm",
|
|
85
|
+
"PyPI": "pypi",
|
|
86
|
+
"crates.io": "cargo",
|
|
87
|
+
"Go": "golang",
|
|
88
|
+
"RubyGems": "gem",
|
|
89
|
+
}
|
|
90
|
+
|
|
91
|
+
|
|
92
|
+
def run_security_check(
|
|
93
|
+
*,
|
|
94
|
+
project_dir: str,
|
|
95
|
+
scope: str = ".",
|
|
96
|
+
include_live_enrichment: bool = False,
|
|
97
|
+
external_inputs: list[dict[str, Any]] | None = None,
|
|
98
|
+
waivers: list[dict[str, Any] | str] | None = None,
|
|
99
|
+
) -> dict[str, Any]:
|
|
100
|
+
scope_path = _resolve_scope(project_dir, scope)
|
|
101
|
+
findings: list[dict[str, Any]] = []
|
|
102
|
+
manifests = detect_manifests(str(scope_path))
|
|
103
|
+
waiver_map = _normalize_waivers(waivers or [])
|
|
104
|
+
|
|
105
|
+
findings.extend(_scan_python_ast(scope_path))
|
|
106
|
+
findings.extend(_scan_secret_patterns(scope_path))
|
|
107
|
+
findings.extend(_scan_config_and_iac(scope_path))
|
|
108
|
+
findings.extend(_scan_dependency_health(scope_path, include_live_enrichment))
|
|
109
|
+
findings = _finalize_findings(findings, waiver_map, project_dir=project_dir)
|
|
110
|
+
findings.sort(key=lambda finding: (SEVERITY_ORDER.get(finding["severity"], 99), finding["id"]))
|
|
111
|
+
|
|
112
|
+
severity_counts = Counter(finding["severity"] for finding in findings)
|
|
113
|
+
source_counts = Counter(finding["source"] for finding in findings)
|
|
114
|
+
relative_scope = _display_scope(project_dir, scope_path)
|
|
115
|
+
delta = classify_project_changes(project_dir, touched_files=_delta_touched_files(project_dir, scope_path), goal="security check")
|
|
116
|
+
evidence_requirements = _requirements_for_profile(delta.get("evidence_profile"))
|
|
117
|
+
unresolved_high_risk = [
|
|
118
|
+
finding
|
|
119
|
+
for finding in findings
|
|
120
|
+
if finding.get("severity") in {"critical", "high"} and not finding.get("waived", False)
|
|
121
|
+
]
|
|
122
|
+
provenance = _build_provenance(
|
|
123
|
+
scope=relative_scope,
|
|
124
|
+
manifests=manifests.manifests,
|
|
125
|
+
findings=findings,
|
|
126
|
+
include_live_enrichment=include_live_enrichment,
|
|
127
|
+
external_inputs=external_inputs or [],
|
|
128
|
+
)
|
|
129
|
+
trust_scores = _build_trust_scores(findings)
|
|
130
|
+
generated_at = datetime.now(timezone.utc).isoformat()
|
|
131
|
+
license_artifact = _build_license_artifact(
|
|
132
|
+
project_dir=project_dir,
|
|
133
|
+
scope_path=scope_path,
|
|
134
|
+
manifests=manifests,
|
|
135
|
+
generated_at=generated_at,
|
|
136
|
+
)
|
|
137
|
+
unresolved_risks = [
|
|
138
|
+
{
|
|
139
|
+
"finding_id": finding.get("finding_id"),
|
|
140
|
+
"id": finding.get("id"),
|
|
141
|
+
"severity": finding.get("severity"),
|
|
142
|
+
"exploitability": finding.get("exploitability", "unknown"),
|
|
143
|
+
"reachability": finding.get("reachability", "unknown"),
|
|
144
|
+
"kev_listed": finding.get("kev_listed", False),
|
|
145
|
+
"epss_score": finding.get("epss_score"),
|
|
146
|
+
"waived": bool(finding.get("waived")),
|
|
147
|
+
"waiver_justification": finding.get("waiver_justification", ""),
|
|
148
|
+
"message": finding.get("message", ""),
|
|
149
|
+
}
|
|
150
|
+
for finding in findings
|
|
151
|
+
if finding.get("severity") in {"critical", "high"}
|
|
152
|
+
]
|
|
153
|
+
trace = record_trace(
|
|
154
|
+
project_dir,
|
|
155
|
+
trace_type="security-check",
|
|
156
|
+
route="security-check",
|
|
157
|
+
status="error" if unresolved_high_risk else "ok",
|
|
158
|
+
plan={"scope": relative_scope, "delta_categories": delta["categories"]},
|
|
159
|
+
verify={"finding_count": len(findings), "unresolved_high_risk_count": len(unresolved_high_risk)},
|
|
160
|
+
failures=[finding["finding_id"] for finding in unresolved_high_risk],
|
|
161
|
+
rejections=[],
|
|
162
|
+
)
|
|
163
|
+
artifacts = _write_evidence_artifacts(
|
|
164
|
+
project_dir,
|
|
165
|
+
scope=relative_scope,
|
|
166
|
+
generated_at=generated_at,
|
|
167
|
+
findings=findings,
|
|
168
|
+
provenance=provenance,
|
|
169
|
+
trust_scores=trust_scores,
|
|
170
|
+
include_live_enrichment=include_live_enrichment,
|
|
171
|
+
waivers=waivers or [],
|
|
172
|
+
license_artifact=license_artifact,
|
|
173
|
+
manifests=manifests,
|
|
174
|
+
unresolved_risks=unresolved_risks,
|
|
175
|
+
)
|
|
176
|
+
return {
|
|
177
|
+
"schema": "SecurityCheckResult",
|
|
178
|
+
"status": "error" if unresolved_high_risk else "ok",
|
|
179
|
+
"scope": relative_scope,
|
|
180
|
+
"findings": findings,
|
|
181
|
+
"waivers": {
|
|
182
|
+
"requested": len(waivers or []),
|
|
183
|
+
"applied": len([finding for finding in findings if finding.get("waived")]),
|
|
184
|
+
},
|
|
185
|
+
"release_blocked": bool(unresolved_high_risk),
|
|
186
|
+
"unresolved_risks": unresolved_risks,
|
|
187
|
+
"security_scans": [
|
|
188
|
+
{
|
|
189
|
+
"tool": "security-check",
|
|
190
|
+
"path": artifacts["json_path"],
|
|
191
|
+
"sarif_path": artifacts["sarif_path"],
|
|
192
|
+
"sbom_path": artifacts["sbom_path"],
|
|
193
|
+
"license_path": artifacts["license_path"],
|
|
194
|
+
"findings": findings,
|
|
195
|
+
}
|
|
196
|
+
],
|
|
197
|
+
"summary": {
|
|
198
|
+
"finding_count": len(findings),
|
|
199
|
+
"unresolved_high_risk_count": len(unresolved_high_risk),
|
|
200
|
+
"by_severity": dict(sorted(severity_counts.items())),
|
|
201
|
+
"by_source": dict(sorted(source_counts.items())),
|
|
202
|
+
"live_enrichment": include_live_enrichment,
|
|
203
|
+
"scan_status": "completed",
|
|
204
|
+
"manifest_count": len(manifests.manifests),
|
|
205
|
+
"delta_categories": delta["categories"],
|
|
206
|
+
"delta_evidence_profile": delta.get("evidence_profile"),
|
|
207
|
+
"evidence_requirements": evidence_requirements,
|
|
208
|
+
},
|
|
209
|
+
"evidence_requirements": evidence_requirements,
|
|
210
|
+
"provenance": provenance,
|
|
211
|
+
"trust_scores": trust_scores,
|
|
212
|
+
"license": license_artifact,
|
|
213
|
+
"sbom": _build_sbom_payload(generated_at=generated_at, manifests=manifests),
|
|
214
|
+
"evidence": {
|
|
215
|
+
"path": artifacts["json_path"],
|
|
216
|
+
"json_path": artifacts["json_path"],
|
|
217
|
+
"sarif_path": artifacts["sarif_path"],
|
|
218
|
+
"sbom_path": artifacts["sbom_path"],
|
|
219
|
+
"license_path": artifacts["license_path"],
|
|
220
|
+
},
|
|
221
|
+
"trace": {"trace_id": trace["trace_id"], "path": trace["path"]},
|
|
222
|
+
}
|
|
223
|
+
|
|
224
|
+
|
|
225
|
+
def _requirements_for_profile(evidence_profile: str | None) -> list[str]:
|
|
226
|
+
module = import_module("runtime.evidence_requirements")
|
|
227
|
+
resolver = getattr(module, "requirements_for_profile", None)
|
|
228
|
+
if callable(resolver):
|
|
229
|
+
resolved = resolver(evidence_profile)
|
|
230
|
+
if isinstance(resolved, (list, tuple, set)):
|
|
231
|
+
return [str(item) for item in resolved]
|
|
232
|
+
full = getattr(module, "FULL_REQUIREMENTS", [])
|
|
233
|
+
return [str(item) for item in full]
|
|
234
|
+
|
|
235
|
+
|
|
236
|
+
def security_check(
|
|
237
|
+
*,
|
|
238
|
+
project_dir: str,
|
|
239
|
+
scope: str = ".",
|
|
240
|
+
include_live_enrichment: bool = False,
|
|
241
|
+
external_inputs: list[dict[str, Any]] | None = None,
|
|
242
|
+
waivers: list[dict[str, Any] | str] | None = None,
|
|
243
|
+
) -> dict[str, Any]:
|
|
244
|
+
return run_security_check(
|
|
245
|
+
project_dir=project_dir,
|
|
246
|
+
scope=scope,
|
|
247
|
+
include_live_enrichment=include_live_enrichment,
|
|
248
|
+
external_inputs=external_inputs,
|
|
249
|
+
waivers=waivers,
|
|
250
|
+
)
|
|
251
|
+
|
|
252
|
+
|
|
253
|
+
def _resolve_scope(project_dir: str, scope: str) -> Path:
|
|
254
|
+
if not scope:
|
|
255
|
+
return Path(project_dir).resolve()
|
|
256
|
+
candidate = Path(scope)
|
|
257
|
+
if candidate.is_absolute():
|
|
258
|
+
return candidate.resolve()
|
|
259
|
+
base = Path(project_dir).resolve()
|
|
260
|
+
resolved = Path(ensure_path_within_dir(base, base / candidate))
|
|
261
|
+
return resolved
|
|
262
|
+
|
|
263
|
+
|
|
264
|
+
def _display_scope(project_dir: str, scope_path: Path) -> str:
|
|
265
|
+
base = Path(project_dir).resolve()
|
|
266
|
+
try:
|
|
267
|
+
return scope_path.relative_to(base).as_posix() or "."
|
|
268
|
+
except ValueError:
|
|
269
|
+
return str(scope_path)
|
|
270
|
+
|
|
271
|
+
|
|
272
|
+
def _delta_touched_files(project_dir: str, scope_path: Path) -> list[str]:
|
|
273
|
+
base = Path(project_dir).resolve()
|
|
274
|
+
if scope_path.is_file():
|
|
275
|
+
return [_display_scope(project_dir, scope_path)]
|
|
276
|
+
touched: list[str] = []
|
|
277
|
+
for path in sorted(scope_path.rglob("*")):
|
|
278
|
+
if not path.is_file():
|
|
279
|
+
continue
|
|
280
|
+
try:
|
|
281
|
+
rel = path.resolve().relative_to(base).as_posix()
|
|
282
|
+
except ValueError:
|
|
283
|
+
rel = str(path.resolve())
|
|
284
|
+
touched.append(rel)
|
|
285
|
+
if len(touched) >= 64:
|
|
286
|
+
break
|
|
287
|
+
return touched or [_display_scope(project_dir, scope_path)]
|
|
288
|
+
|
|
289
|
+
|
|
290
|
+
def _scan_python_ast(scope_path: Path) -> list[dict[str, Any]]:
|
|
291
|
+
findings: list[dict[str, Any]] = []
|
|
292
|
+
for py_file in _iter_python_files(scope_path):
|
|
293
|
+
try:
|
|
294
|
+
source = py_file.read_text(encoding="utf-8")
|
|
295
|
+
except OSError:
|
|
296
|
+
continue
|
|
297
|
+
findings.extend(_scan_python_file(py_file, source))
|
|
298
|
+
findings.extend(_run_bandit_if_available(scope_path))
|
|
299
|
+
findings.extend(_scan_semgrep(scope_path))
|
|
300
|
+
return findings
|
|
301
|
+
|
|
302
|
+
|
|
303
|
+
def run_semgrep_scan(project_dir: str, rules: str = "auto") -> dict[str, Any]:
|
|
304
|
+
unavailable = {"status": "unavailable", "findings": [], "error": "semgrep not found"}
|
|
305
|
+
if shutil.which("semgrep") is None:
|
|
306
|
+
return unavailable
|
|
307
|
+
|
|
308
|
+
cmd = ["semgrep", "--json", "--config", rules, project_dir]
|
|
309
|
+
try:
|
|
310
|
+
proc = subprocess.run(cmd, capture_output=True, text=True, check=False, timeout=60)
|
|
311
|
+
except Exception:
|
|
312
|
+
return unavailable
|
|
313
|
+
|
|
314
|
+
if proc.returncode not in {0, 1}:
|
|
315
|
+
return unavailable
|
|
316
|
+
|
|
317
|
+
try:
|
|
318
|
+
payload = json.loads(proc.stdout or "{}")
|
|
319
|
+
except Exception:
|
|
320
|
+
return unavailable
|
|
321
|
+
|
|
322
|
+
findings: list[dict[str, Any]] = []
|
|
323
|
+
for item in payload.get("results", []):
|
|
324
|
+
extra = item.get("extra") if isinstance(item.get("extra"), dict) else {}
|
|
325
|
+
start = item.get("start") if isinstance(item.get("start"), dict) else {}
|
|
326
|
+
findings.append(
|
|
327
|
+
{
|
|
328
|
+
"severity": _normalize_semgrep_severity(str(extra.get("severity", "WARNING"))),
|
|
329
|
+
"rule": str(item.get("check_id", "semgrep")),
|
|
330
|
+
"path": str(item.get("path", "")),
|
|
331
|
+
"line": _safe_int(start.get("line", 1), default=1),
|
|
332
|
+
"message": str(extra.get("message", "Semgrep finding")),
|
|
333
|
+
}
|
|
334
|
+
)
|
|
335
|
+
return {"status": "ok", "findings": findings, "error": ""}
|
|
336
|
+
|
|
337
|
+
|
|
338
|
+
def _normalize_semgrep_severity(raw: str) -> str:
|
|
339
|
+
lowered = raw.lower()
|
|
340
|
+
if lowered in {"error", "critical"}:
|
|
341
|
+
return "high"
|
|
342
|
+
if lowered in {"warning", "warn"}:
|
|
343
|
+
return "medium"
|
|
344
|
+
if lowered in {"info", "note", "low"}:
|
|
345
|
+
return "low"
|
|
346
|
+
return _normalize_severity(lowered)
|
|
347
|
+
|
|
348
|
+
|
|
349
|
+
def _scan_semgrep(scope_path: Path) -> list[dict[str, Any]]:
|
|
350
|
+
result = run_semgrep_scan(str(scope_path))
|
|
351
|
+
if result.get("status") != "ok":
|
|
352
|
+
return []
|
|
353
|
+
|
|
354
|
+
findings: list[dict[str, Any]] = []
|
|
355
|
+
for item in result.get("findings", []):
|
|
356
|
+
if not isinstance(item, dict):
|
|
357
|
+
continue
|
|
358
|
+
file_path = Path(str(item.get("path", "")))
|
|
359
|
+
findings.append(
|
|
360
|
+
_finding(
|
|
361
|
+
rule_id=str(item.get("rule", "semgrep")),
|
|
362
|
+
source_name="semgrep-ce",
|
|
363
|
+
category="python_ast",
|
|
364
|
+
severity=_normalize_severity(str(item.get("severity", "medium"))),
|
|
365
|
+
path=file_path,
|
|
366
|
+
line=_safe_int(item.get("line", 1), default=1),
|
|
367
|
+
message=str(item.get("message", "Semgrep finding")),
|
|
368
|
+
recommendation="Review Semgrep finding and apply the suggested remediation.",
|
|
369
|
+
snippet="",
|
|
370
|
+
)
|
|
371
|
+
)
|
|
372
|
+
return findings
|
|
373
|
+
|
|
374
|
+
|
|
375
|
+
def _safe_int(value: Any, *, default: int) -> int:
|
|
376
|
+
try:
|
|
377
|
+
return int(value)
|
|
378
|
+
except (TypeError, ValueError):
|
|
379
|
+
return default
|
|
380
|
+
|
|
381
|
+
|
|
382
|
+
def _scan_secret_patterns(scope_path: Path) -> list[dict[str, Any]]:
|
|
383
|
+
findings: list[dict[str, Any]] = []
|
|
384
|
+
for candidate in _iter_text_candidates(scope_path):
|
|
385
|
+
try:
|
|
386
|
+
source = candidate.read_text(encoding="utf-8")
|
|
387
|
+
except (OSError, UnicodeDecodeError):
|
|
388
|
+
continue
|
|
389
|
+
for line_no, line in enumerate(source.splitlines(), start=1):
|
|
390
|
+
for rule_id, pattern, severity, message in _SECRET_PATTERNS:
|
|
391
|
+
if not pattern.search(line):
|
|
392
|
+
continue
|
|
393
|
+
findings.append(
|
|
394
|
+
_finding(
|
|
395
|
+
rule_id=rule_id,
|
|
396
|
+
source_name="secret-scan",
|
|
397
|
+
category="secret",
|
|
398
|
+
severity=severity,
|
|
399
|
+
path=candidate,
|
|
400
|
+
line=line_no,
|
|
401
|
+
message=message,
|
|
402
|
+
recommendation="Move secrets to an approved secret manager or environment injection.",
|
|
403
|
+
snippet=line.strip(),
|
|
404
|
+
)
|
|
405
|
+
)
|
|
406
|
+
return findings
|
|
407
|
+
|
|
408
|
+
|
|
409
|
+
def _scan_config_and_iac(scope_path: Path) -> list[dict[str, Any]]:
|
|
410
|
+
findings: list[dict[str, Any]] = []
|
|
411
|
+
for candidate in _iter_text_candidates(scope_path):
|
|
412
|
+
lowered = candidate.name.lower()
|
|
413
|
+
rel_lower = candidate.as_posix().lower()
|
|
414
|
+
if not any(hint in lowered or hint in rel_lower for hint in _CONFIG_FILE_HINTS):
|
|
415
|
+
continue
|
|
416
|
+
try:
|
|
417
|
+
source = candidate.read_text(encoding="utf-8")
|
|
418
|
+
except (OSError, UnicodeDecodeError):
|
|
419
|
+
continue
|
|
420
|
+
for line_no, line in enumerate(source.splitlines(), start=1):
|
|
421
|
+
for rule_id, pattern, severity, message in _CONFIG_PATTERNS:
|
|
422
|
+
if not pattern.search(line):
|
|
423
|
+
continue
|
|
424
|
+
findings.append(
|
|
425
|
+
_finding(
|
|
426
|
+
rule_id=rule_id,
|
|
427
|
+
source_name="config-scan",
|
|
428
|
+
category="config",
|
|
429
|
+
severity=severity,
|
|
430
|
+
path=candidate,
|
|
431
|
+
line=line_no,
|
|
432
|
+
message=message,
|
|
433
|
+
recommendation="Apply least-privilege defaults and tighten network/transport policy.",
|
|
434
|
+
snippet=line.strip(),
|
|
435
|
+
)
|
|
436
|
+
)
|
|
437
|
+
return findings
|
|
438
|
+
|
|
439
|
+
|
|
440
|
+
def _iter_text_candidates(scope_path: Path) -> list[Path]:
|
|
441
|
+
if scope_path.is_file():
|
|
442
|
+
return [scope_path]
|
|
443
|
+
if not scope_path.exists():
|
|
444
|
+
return []
|
|
445
|
+
candidates: list[Path] = []
|
|
446
|
+
for path in sorted(scope_path.rglob("*")):
|
|
447
|
+
if not path.is_file():
|
|
448
|
+
continue
|
|
449
|
+
try:
|
|
450
|
+
size = path.stat().st_size
|
|
451
|
+
except OSError:
|
|
452
|
+
continue
|
|
453
|
+
if size > 1_000_000:
|
|
454
|
+
continue
|
|
455
|
+
if any(part in _SCAN_EXCLUDED_DIRS for part in path.parts):
|
|
456
|
+
continue
|
|
457
|
+
candidates.append(path)
|
|
458
|
+
return candidates
|
|
459
|
+
|
|
460
|
+
|
|
461
|
+
def _iter_python_files(scope_path: Path) -> list[Path]:
|
|
462
|
+
if scope_path.is_file():
|
|
463
|
+
return [scope_path] if scope_path.suffix == ".py" else []
|
|
464
|
+
if not scope_path.exists():
|
|
465
|
+
return []
|
|
466
|
+
result = []
|
|
467
|
+
for path in sorted(scope_path.rglob("*.py")):
|
|
468
|
+
if not path.is_file():
|
|
469
|
+
continue
|
|
470
|
+
if any(part in _SCAN_EXCLUDED_DIRS for part in path.parts):
|
|
471
|
+
continue
|
|
472
|
+
result.append(path)
|
|
473
|
+
return result
|
|
474
|
+
|
|
475
|
+
|
|
476
|
+
def _scan_python_file(path: Path, source: str) -> list[dict[str, Any]]:
|
|
477
|
+
try:
|
|
478
|
+
tree = ast.parse(source)
|
|
479
|
+
except SyntaxError:
|
|
480
|
+
return []
|
|
481
|
+
|
|
482
|
+
findings: list[dict[str, Any]] = []
|
|
483
|
+
for node in ast.walk(tree):
|
|
484
|
+
if isinstance(node, ast.Call):
|
|
485
|
+
findings.extend(_call_findings(path, node, source))
|
|
486
|
+
return findings
|
|
487
|
+
|
|
488
|
+
|
|
489
|
+
def _call_findings(path: Path, node: ast.Call, source: str) -> list[dict[str, Any]]:
|
|
490
|
+
findings: list[dict[str, Any]] = []
|
|
491
|
+
callee = _call_name(node.func)
|
|
492
|
+
if callee in {"subprocess.run", "subprocess.Popen", "os.system"}:
|
|
493
|
+
if any(keyword.arg == "shell" and isinstance(keyword.value, ast.Constant) and keyword.value.value is True for keyword in node.keywords):
|
|
494
|
+
findings.append(
|
|
495
|
+
_finding(
|
|
496
|
+
rule_id="B602",
|
|
497
|
+
source_name="bandit-lite",
|
|
498
|
+
category="python_ast",
|
|
499
|
+
severity="high",
|
|
500
|
+
path=path,
|
|
501
|
+
line=getattr(node, "lineno", 1),
|
|
502
|
+
message="subprocess call uses shell=True",
|
|
503
|
+
recommendation="Avoid shell=True in subprocess calls.",
|
|
504
|
+
snippet=_source_line(source, getattr(node, "lineno", 1)),
|
|
505
|
+
)
|
|
506
|
+
)
|
|
507
|
+
if callee == "eval":
|
|
508
|
+
findings.append(
|
|
509
|
+
_finding(
|
|
510
|
+
rule_id="B307",
|
|
511
|
+
source_name="bandit-lite",
|
|
512
|
+
category="python_ast",
|
|
513
|
+
severity="high",
|
|
514
|
+
path=path,
|
|
515
|
+
line=getattr(node, "lineno", 1),
|
|
516
|
+
message="eval() detected",
|
|
517
|
+
recommendation="Replace eval with explicit parsing.",
|
|
518
|
+
snippet=_source_line(source, getattr(node, "lineno", 1)),
|
|
519
|
+
)
|
|
520
|
+
)
|
|
521
|
+
if callee == "exec":
|
|
522
|
+
findings.append(
|
|
523
|
+
_finding(
|
|
524
|
+
rule_id="B102",
|
|
525
|
+
source_name="bandit-lite",
|
|
526
|
+
category="python_ast",
|
|
527
|
+
severity="high",
|
|
528
|
+
path=path,
|
|
529
|
+
line=getattr(node, "lineno", 1),
|
|
530
|
+
message="exec() detected",
|
|
531
|
+
recommendation="Replace exec with explicit control flow.",
|
|
532
|
+
snippet=_source_line(source, getattr(node, "lineno", 1)),
|
|
533
|
+
)
|
|
534
|
+
)
|
|
535
|
+
if callee in {"pickle.load", "pickle.loads"}:
|
|
536
|
+
findings.append(
|
|
537
|
+
_finding(
|
|
538
|
+
rule_id="B301",
|
|
539
|
+
source_name="bandit-lite",
|
|
540
|
+
category="python_ast",
|
|
541
|
+
severity="high",
|
|
542
|
+
path=path,
|
|
543
|
+
line=getattr(node, "lineno", 1),
|
|
544
|
+
message="pickle deserialization detected",
|
|
545
|
+
recommendation="Avoid unsafe deserialization of pickle payloads.",
|
|
546
|
+
snippet=_source_line(source, getattr(node, "lineno", 1)),
|
|
547
|
+
)
|
|
548
|
+
)
|
|
549
|
+
return findings
|
|
550
|
+
|
|
551
|
+
|
|
552
|
+
def _call_name(func: ast.AST) -> str:
|
|
553
|
+
if isinstance(func, ast.Name):
|
|
554
|
+
return func.id
|
|
555
|
+
if isinstance(func, ast.Attribute):
|
|
556
|
+
prefix = _call_name(func.value)
|
|
557
|
+
return f"{prefix}.{func.attr}" if prefix else func.attr
|
|
558
|
+
return ""
|
|
559
|
+
|
|
560
|
+
|
|
561
|
+
def _source_line(source: str, line: int) -> str:
|
|
562
|
+
lines = source.splitlines()
|
|
563
|
+
if 1 <= line <= len(lines):
|
|
564
|
+
return lines[line - 1].strip()
|
|
565
|
+
return ""
|
|
566
|
+
|
|
567
|
+
|
|
568
|
+
def _run_bandit_if_available(scope_path: Path) -> list[dict[str, Any]]:
|
|
569
|
+
if not _command_exists("bandit"):
|
|
570
|
+
return []
|
|
571
|
+
|
|
572
|
+
cmd = ["bandit", "-r", str(scope_path), "-f", "json"]
|
|
573
|
+
proc = subprocess.run(cmd, capture_output=True, text=True, check=False, timeout=30)
|
|
574
|
+
if proc.returncode not in {0, 1}:
|
|
575
|
+
return []
|
|
576
|
+
try:
|
|
577
|
+
import json
|
|
578
|
+
|
|
579
|
+
payload = json.loads(proc.stdout or "{}")
|
|
580
|
+
except Exception:
|
|
581
|
+
return []
|
|
582
|
+
|
|
583
|
+
findings: list[dict[str, Any]] = []
|
|
584
|
+
for item in payload.get("results", []):
|
|
585
|
+
issue_severity = str(item.get("issue_severity", "LOW")).lower()
|
|
586
|
+
findings.append(
|
|
587
|
+
{
|
|
588
|
+
"id": str(item.get("test_id", "bandit")),
|
|
589
|
+
"source": "bandit",
|
|
590
|
+
"category": "python_ast",
|
|
591
|
+
"severity": "medium" if issue_severity == "medium" else ("critical" if issue_severity == "critical" else issue_severity),
|
|
592
|
+
"exploitability": "unknown",
|
|
593
|
+
"reachability": "unknown",
|
|
594
|
+
"evidence": {
|
|
595
|
+
"path": str(item.get("filename", "")),
|
|
596
|
+
"line": int(item.get("line_number", 1)),
|
|
597
|
+
"snippet": str(item.get("code", "")).strip(),
|
|
598
|
+
},
|
|
599
|
+
"recommendation": str(item.get("more_info", "")) or "Review Bandit finding and remediate.",
|
|
600
|
+
"message": str(item.get("issue_text", "Bandit finding")),
|
|
601
|
+
}
|
|
602
|
+
)
|
|
603
|
+
return findings
|
|
604
|
+
|
|
605
|
+
|
|
606
|
+
def _command_exists(command: str) -> bool:
|
|
607
|
+
return shutil.which(command) is not None
|
|
608
|
+
|
|
609
|
+
|
|
610
|
+
def _scan_dependency_health(scope_path: Path, include_live_enrichment: bool) -> list[dict[str, Any]]:
|
|
611
|
+
manifests = detect_manifests(str(scope_path))
|
|
612
|
+
dependencies = [
|
|
613
|
+
{
|
|
614
|
+
"name": package.name,
|
|
615
|
+
"version": _normalize_version(package.version),
|
|
616
|
+
"ecosystem": _ecosystem_from_manifest(package.source_manifest),
|
|
617
|
+
}
|
|
618
|
+
for package in manifests.packages
|
|
619
|
+
if package.name
|
|
620
|
+
]
|
|
621
|
+
if not dependencies or not include_live_enrichment:
|
|
622
|
+
return []
|
|
623
|
+
|
|
624
|
+
osv_result = scan_for_cves(dependencies, str(scope_path))
|
|
625
|
+
raw_results = osv_result.get("results", {})
|
|
626
|
+
findings: list[dict[str, Any]] = []
|
|
627
|
+
for dependency in dependencies:
|
|
628
|
+
package_name = dependency["name"]
|
|
629
|
+
for vuln in raw_results.get(package_name, []):
|
|
630
|
+
reachability = analyze_reachability(
|
|
631
|
+
{
|
|
632
|
+
"package": package_name,
|
|
633
|
+
"id": vuln.get("id", ""),
|
|
634
|
+
"summary": vuln.get("summary", ""),
|
|
635
|
+
"fixed_version": vuln.get("fixed_version", ""),
|
|
636
|
+
},
|
|
637
|
+
str(scope_path),
|
|
638
|
+
)
|
|
639
|
+
findings.append(
|
|
640
|
+
{
|
|
641
|
+
"id": str(vuln.get("id", "")),
|
|
642
|
+
"source": "osv",
|
|
643
|
+
"category": "dependency",
|
|
644
|
+
"severity": _normalize_severity(str(vuln.get("severity", "unknown"))),
|
|
645
|
+
"exploitability": _risk_to_exploitability(str(reachability.get("risk_level", ""))),
|
|
646
|
+
"reachability": _normalize_reachability(str(reachability.get("reachability", "unknown"))),
|
|
647
|
+
"kev_listed": reachability.get("kev_listed", False),
|
|
648
|
+
"epss_score": reachability.get("epss_score"),
|
|
649
|
+
"evidence": {
|
|
650
|
+
"package": package_name,
|
|
651
|
+
"version": dependency["version"],
|
|
652
|
+
"fixed_version": str(vuln.get("fixed_version", "")),
|
|
653
|
+
"summary": str(vuln.get("summary", "")),
|
|
654
|
+
},
|
|
655
|
+
"recommendation": reachability.get("recommendation", "Upgrade the dependency to a fixed version."),
|
|
656
|
+
"message": str(vuln.get("summary", "")) or f"Known vulnerability in {package_name}",
|
|
657
|
+
}
|
|
658
|
+
)
|
|
659
|
+
return findings
|
|
660
|
+
|
|
661
|
+
|
|
662
|
+
def _risk_to_exploitability(risk_level: str) -> str:
|
|
663
|
+
lowered = risk_level.lower()
|
|
664
|
+
if lowered in {"critical", "high"}:
|
|
665
|
+
return "high"
|
|
666
|
+
if lowered == "medium":
|
|
667
|
+
return "medium"
|
|
668
|
+
if lowered == "low":
|
|
669
|
+
return "low"
|
|
670
|
+
return "unknown"
|
|
671
|
+
|
|
672
|
+
|
|
673
|
+
def _normalize_reachability(raw: str) -> str:
|
|
674
|
+
lowered = raw.lower()
|
|
675
|
+
if lowered in {"reachable", "potentially_reachable", "potentially-reachable"}:
|
|
676
|
+
return "reachable"
|
|
677
|
+
if lowered == "unreachable":
|
|
678
|
+
return "unreachable"
|
|
679
|
+
return "unknown"
|
|
680
|
+
|
|
681
|
+
|
|
682
|
+
def _normalize_version(version: str) -> str:
|
|
683
|
+
normalized = (version or "").strip()
|
|
684
|
+
for prefix in ("==", ">=", "<=", "~=", "^", ">"):
|
|
685
|
+
if normalized.startswith(prefix):
|
|
686
|
+
return normalized[len(prefix):].strip()
|
|
687
|
+
return normalized
|
|
688
|
+
|
|
689
|
+
|
|
690
|
+
def _ecosystem_from_manifest(manifest_path: str) -> str:
|
|
691
|
+
suffix = Path(manifest_path).name
|
|
692
|
+
return {
|
|
693
|
+
"package.json": "npm",
|
|
694
|
+
"requirements.txt": "PyPI",
|
|
695
|
+
"pyproject.toml": "PyPI",
|
|
696
|
+
"Cargo.toml": "crates.io",
|
|
697
|
+
"go.mod": "Go",
|
|
698
|
+
"Gemfile": "RubyGems",
|
|
699
|
+
}.get(suffix, "npm")
|
|
700
|
+
|
|
701
|
+
|
|
702
|
+
def _normalize_severity(raw: str) -> str:
|
|
703
|
+
lowered = raw.lower()
|
|
704
|
+
if "critical" in lowered:
|
|
705
|
+
return "critical"
|
|
706
|
+
if "high" in lowered:
|
|
707
|
+
return "high"
|
|
708
|
+
if "medium" in lowered or "moderate" in lowered:
|
|
709
|
+
return "medium"
|
|
710
|
+
if "low" in lowered:
|
|
711
|
+
return "low"
|
|
712
|
+
return "medium"
|
|
713
|
+
|
|
714
|
+
|
|
715
|
+
def _finding(
|
|
716
|
+
*,
|
|
717
|
+
rule_id: str,
|
|
718
|
+
source_name: str,
|
|
719
|
+
category: str,
|
|
720
|
+
severity: str,
|
|
721
|
+
path: Path,
|
|
722
|
+
line: int,
|
|
723
|
+
message: str,
|
|
724
|
+
recommendation: str,
|
|
725
|
+
snippet: str,
|
|
726
|
+
) -> dict[str, Any]:
|
|
727
|
+
exploitability = "high" if severity in {"critical", "high"} else ("medium" if severity == "medium" else "low")
|
|
728
|
+
return {
|
|
729
|
+
"id": rule_id,
|
|
730
|
+
"source": source_name,
|
|
731
|
+
"category": category,
|
|
732
|
+
"severity": severity,
|
|
733
|
+
"exploitability": exploitability,
|
|
734
|
+
"reachability": "reachable",
|
|
735
|
+
"evidence": {
|
|
736
|
+
"path": str(path),
|
|
737
|
+
"line": line,
|
|
738
|
+
"snippet": snippet,
|
|
739
|
+
},
|
|
740
|
+
"recommendation": recommendation,
|
|
741
|
+
"message": message,
|
|
742
|
+
}
|
|
743
|
+
|
|
744
|
+
|
|
745
|
+
def _normalize_waivers(waivers: list[dict[str, Any] | str]) -> dict[str, str]:
|
|
746
|
+
normalized: dict[str, str] = {}
|
|
747
|
+
for waiver in waivers:
|
|
748
|
+
if isinstance(waiver, str):
|
|
749
|
+
key = waiver.strip()
|
|
750
|
+
if key:
|
|
751
|
+
normalized[key] = "waived"
|
|
752
|
+
continue
|
|
753
|
+
if not isinstance(waiver, dict):
|
|
754
|
+
continue
|
|
755
|
+
target = str(waiver.get("finding_id") or waiver.get("id") or "").strip()
|
|
756
|
+
if not target:
|
|
757
|
+
continue
|
|
758
|
+
justification = str(waiver.get("justification") or waiver.get("reason") or "waived").strip()
|
|
759
|
+
normalized[target] = justification
|
|
760
|
+
return normalized
|
|
761
|
+
|
|
762
|
+
|
|
763
|
+
def _finding_instance_id(finding: dict[str, Any]) -> str:
|
|
764
|
+
evidence = finding.get("evidence", {})
|
|
765
|
+
base = "|".join(
|
|
766
|
+
[
|
|
767
|
+
str(finding.get("id", "")),
|
|
768
|
+
str(evidence.get("path", "")),
|
|
769
|
+
str(evidence.get("line", "")),
|
|
770
|
+
str(finding.get("message", "")),
|
|
771
|
+
]
|
|
772
|
+
)
|
|
773
|
+
digest = sha256(base.encode("utf-8")).hexdigest()
|
|
774
|
+
return f"{finding.get('id', 'SEC')}-{digest[:12]}"
|
|
775
|
+
|
|
776
|
+
|
|
777
|
+
def _finalize_findings(findings: list[dict[str, Any]], waiver_map: dict[str, str], *, project_dir: str = "") -> list[dict[str, Any]]:
|
|
778
|
+
finalized: list[dict[str, Any]] = []
|
|
779
|
+
project_root = Path(project_dir).resolve() if project_dir else None
|
|
780
|
+
for finding in findings:
|
|
781
|
+
item = dict(finding)
|
|
782
|
+
item["severity"] = _normalize_severity(str(item.get("severity", "medium")))
|
|
783
|
+
item.setdefault("exploitability", "unknown")
|
|
784
|
+
item.setdefault("reachability", "unknown")
|
|
785
|
+
item["exploitability"] = _normalize_exploitability(str(item.get("exploitability", "unknown")), item)
|
|
786
|
+
item["reachability"] = _normalize_reachability(str(item.get("reachability", "unknown")))
|
|
787
|
+
item["finding_id"] = _finding_instance_id(item)
|
|
788
|
+
sanctioned_justification: str | None = None
|
|
789
|
+
evidence_path = str(item.get("evidence", {}).get("path", ""))
|
|
790
|
+
rule_id = str(item.get("id", ""))
|
|
791
|
+
if evidence_path and rule_id:
|
|
792
|
+
rel_path = evidence_path.replace("\\", "/")
|
|
793
|
+
if project_root is not None:
|
|
794
|
+
try:
|
|
795
|
+
rel_path = str(Path(evidence_path).resolve().relative_to(project_root))
|
|
796
|
+
except ValueError:
|
|
797
|
+
pass
|
|
798
|
+
rel_path = rel_path.replace("\\", "/")
|
|
799
|
+
sanctioned_justification = _SANCTIONED_CALLSITES.get((rel_path, rule_id))
|
|
800
|
+
justification = sanctioned_justification or waiver_map.get(item["finding_id"]) or waiver_map.get(str(item.get("id", "")))
|
|
801
|
+
if justification:
|
|
802
|
+
item["waived"] = True
|
|
803
|
+
item["waiver_justification"] = justification
|
|
804
|
+
else:
|
|
805
|
+
item["waived"] = False
|
|
806
|
+
finalized.append(item)
|
|
807
|
+
return finalized
|
|
808
|
+
|
|
809
|
+
|
|
810
|
+
def _normalize_exploitability(raw: str, finding: dict[str, Any]) -> str:
|
|
811
|
+
lowered = raw.lower()
|
|
812
|
+
if lowered in {"high", "medium", "low"}:
|
|
813
|
+
return lowered
|
|
814
|
+
category = str(finding.get("category", "")).lower()
|
|
815
|
+
severity = str(finding.get("severity", "medium")).lower()
|
|
816
|
+
if category in {"secret", "python_ast"}:
|
|
817
|
+
return "high"
|
|
818
|
+
if severity in {"critical", "high"}:
|
|
819
|
+
return "high"
|
|
820
|
+
if severity == "medium":
|
|
821
|
+
return "medium"
|
|
822
|
+
if severity == "low":
|
|
823
|
+
return "low"
|
|
824
|
+
return "unknown"
|
|
825
|
+
|
|
826
|
+
|
|
827
|
+
def _build_provenance(
|
|
828
|
+
*,
|
|
829
|
+
scope: str,
|
|
830
|
+
manifests: list[Any],
|
|
831
|
+
findings: list[dict[str, Any]],
|
|
832
|
+
include_live_enrichment: bool,
|
|
833
|
+
external_inputs: list[dict[str, Any]],
|
|
834
|
+
) -> list[dict[str, Any]]:
|
|
835
|
+
provenance = [
|
|
836
|
+
{
|
|
837
|
+
"source": "bandit-lite",
|
|
838
|
+
"scope": scope,
|
|
839
|
+
"mode": "static",
|
|
840
|
+
"finding_count": len([finding for finding in findings if finding["source"] == "bandit-lite"]),
|
|
841
|
+
},
|
|
842
|
+
{
|
|
843
|
+
"source": "manifest-detector",
|
|
844
|
+
"scope": scope,
|
|
845
|
+
"manifest_count": len(manifests),
|
|
846
|
+
"mode": "live" if include_live_enrichment else "offline",
|
|
847
|
+
},
|
|
848
|
+
]
|
|
849
|
+
if include_live_enrichment:
|
|
850
|
+
provenance.append(
|
|
851
|
+
{
|
|
852
|
+
"source": "osv",
|
|
853
|
+
"scope": scope,
|
|
854
|
+
"mode": "live-enrichment",
|
|
855
|
+
}
|
|
856
|
+
)
|
|
857
|
+
if external_inputs:
|
|
858
|
+
provenance.append(
|
|
859
|
+
{
|
|
860
|
+
"source": "external-content",
|
|
861
|
+
"scope": scope,
|
|
862
|
+
"mode": "zero-trust",
|
|
863
|
+
"count": len(external_inputs),
|
|
864
|
+
}
|
|
865
|
+
)
|
|
866
|
+
return provenance
|
|
867
|
+
|
|
868
|
+
|
|
869
|
+
def _build_trust_scores(findings: list[dict[str, Any]]) -> dict[str, float]:
|
|
870
|
+
if not findings:
|
|
871
|
+
return {"overall": 1.0}
|
|
872
|
+
weighted = 0.0
|
|
873
|
+
for finding in findings:
|
|
874
|
+
severity = finding.get("severity", "medium")
|
|
875
|
+
weighted += {"critical": 0.4, "high": 0.25, "medium": 0.1, "low": 0.05}.get(str(severity), 0.1)
|
|
876
|
+
overall = max(0.0, round(1.0 - min(weighted, 0.95), 3))
|
|
877
|
+
return {"overall": overall}
|
|
878
|
+
|
|
879
|
+
|
|
880
|
+
def _timestamp_slug() -> str:
|
|
881
|
+
return datetime.now(timezone.utc).strftime("%Y%m%dT%H%M%SZ")
|
|
882
|
+
|
|
883
|
+
|
|
884
|
+
def _build_sarif_payload(findings: list[dict[str, Any]]) -> dict[str, Any]:
|
|
885
|
+
rules_by_id: dict[str, dict[str, Any]] = {}
|
|
886
|
+
results: list[dict[str, Any]] = []
|
|
887
|
+
for finding in findings:
|
|
888
|
+
rule_id = str(finding.get("id", "OMG000"))
|
|
889
|
+
if rule_id not in rules_by_id:
|
|
890
|
+
rules_by_id[rule_id] = {
|
|
891
|
+
"id": rule_id,
|
|
892
|
+
"name": str(finding.get("category", "security")),
|
|
893
|
+
"shortDescription": {"text": str(finding.get("message", "Security finding"))},
|
|
894
|
+
"help": {"text": str(finding.get("recommendation", "Review finding and remediate."))},
|
|
895
|
+
}
|
|
896
|
+
evidence = finding.get("evidence", {})
|
|
897
|
+
level = "warning"
|
|
898
|
+
if finding.get("severity") in {"critical", "high"}:
|
|
899
|
+
level = "error"
|
|
900
|
+
elif finding.get("severity") == "low":
|
|
901
|
+
level = "note"
|
|
902
|
+
location = {
|
|
903
|
+
"physicalLocation": {
|
|
904
|
+
"artifactLocation": {"uri": str(evidence.get("path", ""))},
|
|
905
|
+
"region": {"startLine": int(evidence.get("line", 1) or 1)},
|
|
906
|
+
}
|
|
907
|
+
}
|
|
908
|
+
result_payload: dict[str, Any] = {
|
|
909
|
+
"ruleId": rule_id,
|
|
910
|
+
"level": level,
|
|
911
|
+
"message": {"text": str(finding.get("message", "Security finding"))},
|
|
912
|
+
"partialFingerprints": {
|
|
913
|
+
"findingId": str(finding.get("finding_id", "")),
|
|
914
|
+
},
|
|
915
|
+
"properties": {
|
|
916
|
+
"severity": str(finding.get("severity", "medium")),
|
|
917
|
+
"exploitability": str(finding.get("exploitability", "unknown")),
|
|
918
|
+
"reachability": str(finding.get("reachability", "unknown")),
|
|
919
|
+
"waived": bool(finding.get("waived", False)),
|
|
920
|
+
},
|
|
921
|
+
"locations": [location],
|
|
922
|
+
}
|
|
923
|
+
if finding.get("waived"):
|
|
924
|
+
result_payload["suppressions"] = [
|
|
925
|
+
{
|
|
926
|
+
"kind": "inSource",
|
|
927
|
+
"justification": str(finding.get("waiver_justification", "waived")),
|
|
928
|
+
}
|
|
929
|
+
]
|
|
930
|
+
results.append(result_payload)
|
|
931
|
+
|
|
932
|
+
return {
|
|
933
|
+
"$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json",
|
|
934
|
+
"version": "2.1.0",
|
|
935
|
+
"runs": [
|
|
936
|
+
{
|
|
937
|
+
"tool": {
|
|
938
|
+
"driver": {
|
|
939
|
+
"name": "omg-security-check",
|
|
940
|
+
"version": CANONICAL_VERSION,
|
|
941
|
+
"rules": [rules_by_id[key] for key in sorted(rules_by_id.keys())],
|
|
942
|
+
}
|
|
943
|
+
},
|
|
944
|
+
"results": results,
|
|
945
|
+
}
|
|
946
|
+
],
|
|
947
|
+
}
|
|
948
|
+
|
|
949
|
+
|
|
950
|
+
def _build_sbom_payload(*, generated_at: str, manifests: Any) -> dict[str, Any]:
|
|
951
|
+
components: list[dict[str, Any]] = []
|
|
952
|
+
for package in manifests.packages:
|
|
953
|
+
version = _normalize_version(package.version)
|
|
954
|
+
ecosystem = _ecosystem_from_manifest(package.source_manifest)
|
|
955
|
+
purl_type = _SBOM_ECOSYSTEM_PURL.get(ecosystem, "generic")
|
|
956
|
+
purl = f"pkg:{purl_type}/{package.name}"
|
|
957
|
+
if version:
|
|
958
|
+
purl = f"{purl}@{version}"
|
|
959
|
+
component = {
|
|
960
|
+
"type": "library",
|
|
961
|
+
"name": package.name,
|
|
962
|
+
"version": version,
|
|
963
|
+
"purl": purl,
|
|
964
|
+
}
|
|
965
|
+
components.append(component)
|
|
966
|
+
return {
|
|
967
|
+
"bomFormat": "CycloneDX",
|
|
968
|
+
"specVersion": "1.4",
|
|
969
|
+
"version": 1,
|
|
970
|
+
"metadata": {
|
|
971
|
+
"timestamp": generated_at,
|
|
972
|
+
"tools": [{"vendor": "OMG", "name": "omg-security-check", "version": CANONICAL_VERSION}],
|
|
973
|
+
},
|
|
974
|
+
"components": components,
|
|
975
|
+
}
|
|
976
|
+
|
|
977
|
+
|
|
978
|
+
def _build_license_artifact(*, project_dir: str, scope_path: Path, manifests: Any, generated_at: str) -> dict[str, Any]:
|
|
979
|
+
project_license = _detect_project_license(project_dir=project_dir, scope_path=scope_path)
|
|
980
|
+
dependencies = [{"name": package.name, "license": "UNKNOWN"} for package in manifests.packages]
|
|
981
|
+
compatibility = check_license_compatibility(project_license, dependencies)
|
|
982
|
+
packages_by_license: dict[str, list[str]] = {}
|
|
983
|
+
for dependency in dependencies:
|
|
984
|
+
package_name = str(dependency.get("name", "")).strip()
|
|
985
|
+
if not package_name:
|
|
986
|
+
continue
|
|
987
|
+
spdx_id = str(dependency.get("license", "UNKNOWN") or "UNKNOWN").strip() or "UNKNOWN"
|
|
988
|
+
packages_by_license.setdefault(spdx_id, []).append(package_name)
|
|
989
|
+
|
|
990
|
+
licenses = [
|
|
991
|
+
{
|
|
992
|
+
"name": spdx_id,
|
|
993
|
+
"spdx_id": spdx_id,
|
|
994
|
+
"packages": sorted(packages),
|
|
995
|
+
}
|
|
996
|
+
for spdx_id, packages in sorted(packages_by_license.items())
|
|
997
|
+
]
|
|
998
|
+
|
|
999
|
+
if not licenses:
|
|
1000
|
+
licenses = [{"name": project_license, "spdx_id": project_license, "packages": []}]
|
|
1001
|
+
|
|
1002
|
+
return {
|
|
1003
|
+
"timestamp": generated_at,
|
|
1004
|
+
"licenses": licenses,
|
|
1005
|
+
"project_license": project_license,
|
|
1006
|
+
"compatibility": compatibility,
|
|
1007
|
+
}
|
|
1008
|
+
|
|
1009
|
+
|
|
1010
|
+
def _detect_project_license(*, project_dir: str, scope_path: Path) -> str:
|
|
1011
|
+
candidates = [scope_path / "package.json", Path(project_dir).resolve() / "package.json"]
|
|
1012
|
+
for candidate in candidates:
|
|
1013
|
+
if not candidate.exists():
|
|
1014
|
+
continue
|
|
1015
|
+
try:
|
|
1016
|
+
payload = json.loads(candidate.read_text(encoding="utf-8"))
|
|
1017
|
+
except (OSError, json.JSONDecodeError):
|
|
1018
|
+
continue
|
|
1019
|
+
if isinstance(payload, dict) and isinstance(payload.get("license"), str) and payload["license"].strip():
|
|
1020
|
+
return str(payload["license"]).strip()
|
|
1021
|
+
if (Path(project_dir).resolve() / "LICENSE").exists() or (Path(project_dir).resolve() / "LICENSE.md").exists():
|
|
1022
|
+
return "MIT"
|
|
1023
|
+
return "UNKNOWN"
|
|
1024
|
+
|
|
1025
|
+
|
|
1026
|
+
def _write_json_file(path: Path, payload: dict[str, Any]) -> None:
|
|
1027
|
+
path.parent.mkdir(parents=True, exist_ok=True)
|
|
1028
|
+
path.write_text(json.dumps(payload, indent=2, ensure_ascii=True) + "\n", encoding="utf-8")
|
|
1029
|
+
|
|
1030
|
+
|
|
1031
|
+
def _write_evidence_artifacts(
|
|
1032
|
+
project_dir: str,
|
|
1033
|
+
*,
|
|
1034
|
+
scope: str,
|
|
1035
|
+
generated_at: str,
|
|
1036
|
+
findings: list[dict[str, Any]],
|
|
1037
|
+
provenance: list[dict[str, Any]],
|
|
1038
|
+
trust_scores: dict[str, float],
|
|
1039
|
+
include_live_enrichment: bool,
|
|
1040
|
+
waivers: list[dict[str, Any] | str],
|
|
1041
|
+
license_artifact: dict[str, Any],
|
|
1042
|
+
manifests: Any,
|
|
1043
|
+
unresolved_risks: list[dict[str, Any]],
|
|
1044
|
+
) -> dict[str, str]:
|
|
1045
|
+
stamp = _timestamp_slug()
|
|
1046
|
+
evidence_dir = Path(project_dir) / ".omg" / "evidence"
|
|
1047
|
+
evidence_dir.mkdir(parents=True, exist_ok=True)
|
|
1048
|
+
|
|
1049
|
+
json_rel = Path(".omg") / "evidence" / f"security-{stamp}.json"
|
|
1050
|
+
sarif_rel = Path(".omg") / "evidence" / f"security-{stamp}.sarif"
|
|
1051
|
+
sbom_rel = Path(".omg") / "evidence" / f"sbom-{stamp}.cdx.json"
|
|
1052
|
+
license_rel = Path(".omg") / "evidence" / f"license-{stamp}.json"
|
|
1053
|
+
|
|
1054
|
+
unresolved_high_risk = [
|
|
1055
|
+
finding
|
|
1056
|
+
for finding in findings
|
|
1057
|
+
if finding.get("severity") in {"critical", "high"} and not finding.get("waived", False)
|
|
1058
|
+
]
|
|
1059
|
+
|
|
1060
|
+
payload = {
|
|
1061
|
+
"schema": "SecurityCheckEvidence",
|
|
1062
|
+
"generated_at": generated_at,
|
|
1063
|
+
"scope": scope,
|
|
1064
|
+
"scan_status": "completed",
|
|
1065
|
+
"live_enrichment": include_live_enrichment,
|
|
1066
|
+
"findings": findings,
|
|
1067
|
+
"waivers": waivers,
|
|
1068
|
+
"unresolved_high_risk": [finding.get("finding_id") for finding in unresolved_high_risk],
|
|
1069
|
+
"unresolved_risks": unresolved_risks,
|
|
1070
|
+
"security_scans": [
|
|
1071
|
+
{
|
|
1072
|
+
"tool": "security-check",
|
|
1073
|
+
"path": json_rel.as_posix(),
|
|
1074
|
+
"findings": findings,
|
|
1075
|
+
}
|
|
1076
|
+
],
|
|
1077
|
+
"provenance": provenance,
|
|
1078
|
+
"trust_scores": trust_scores,
|
|
1079
|
+
"artifacts": {
|
|
1080
|
+
"sarif_path": sarif_rel.as_posix(),
|
|
1081
|
+
"sbom_path": sbom_rel.as_posix(),
|
|
1082
|
+
"license_path": license_rel.as_posix(),
|
|
1083
|
+
},
|
|
1084
|
+
}
|
|
1085
|
+
_write_json_file(Path(project_dir) / json_rel, payload)
|
|
1086
|
+
_write_json_file(Path(project_dir) / sarif_rel, _build_sarif_payload(findings))
|
|
1087
|
+
_write_json_file(Path(project_dir) / sbom_rel, _build_sbom_payload(generated_at=generated_at, manifests=manifests))
|
|
1088
|
+
_write_json_file(Path(project_dir) / license_rel, license_artifact)
|
|
1089
|
+
return {
|
|
1090
|
+
"json_path": json_rel.as_posix(),
|
|
1091
|
+
"sarif_path": sarif_rel.as_posix(),
|
|
1092
|
+
"sbom_path": sbom_rel.as_posix(),
|
|
1093
|
+
"license_path": license_rel.as_posix(),
|
|
1094
|
+
}
|