@trust-assurance-protocol/owaspscan 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (221) hide show
  1. package/dist/analysis/ast-analyzer.d.ts +13 -0
  2. package/dist/analysis/ast-analyzer.d.ts.map +1 -0
  3. package/dist/analysis/ast-analyzer.js +58 -0
  4. package/dist/analysis/ast-analyzer.js.map +1 -0
  5. package/dist/analysis/llm-verifier.d.ts +17 -0
  6. package/dist/analysis/llm-verifier.d.ts.map +1 -0
  7. package/dist/analysis/llm-verifier.js +152 -0
  8. package/dist/analysis/llm-verifier.js.map +1 -0
  9. package/dist/analysis/result-cache.d.ts +20 -0
  10. package/dist/analysis/result-cache.d.ts.map +1 -0
  11. package/dist/analysis/result-cache.js +70 -0
  12. package/dist/analysis/result-cache.js.map +1 -0
  13. package/dist/analysis/sinks.d.ts +12 -0
  14. package/dist/analysis/sinks.d.ts.map +1 -0
  15. package/dist/analysis/sinks.js +142 -0
  16. package/dist/analysis/sinks.js.map +1 -0
  17. package/dist/analysis/sources.d.ts +8 -0
  18. package/dist/analysis/sources.d.ts.map +1 -0
  19. package/dist/analysis/sources.js +114 -0
  20. package/dist/analysis/sources.js.map +1 -0
  21. package/dist/analysis/taint-engine.d.ts +5 -0
  22. package/dist/analysis/taint-engine.d.ts.map +1 -0
  23. package/dist/analysis/taint-engine.js +187 -0
  24. package/dist/analysis/taint-engine.js.map +1 -0
  25. package/dist/cli/index.d.ts +3 -0
  26. package/dist/cli/index.d.ts.map +1 -0
  27. package/dist/cli/index.js +227 -0
  28. package/dist/cli/index.js.map +1 -0
  29. package/dist/config/loader.d.ts +10 -0
  30. package/dist/config/loader.d.ts.map +1 -0
  31. package/dist/config/loader.js +81 -0
  32. package/dist/config/loader.js.map +1 -0
  33. package/dist/config/schema.d.ts +23 -0
  34. package/dist/config/schema.d.ts.map +1 -0
  35. package/dist/config/schema.js +17 -0
  36. package/dist/config/schema.js.map +1 -0
  37. package/dist/mcp/server.d.ts +2 -0
  38. package/dist/mcp/server.d.ts.map +1 -0
  39. package/dist/mcp/server.js +250 -0
  40. package/dist/mcp/server.js.map +1 -0
  41. package/dist/parsers/ast-parser.d.ts +38 -0
  42. package/dist/parsers/ast-parser.d.ts.map +1 -0
  43. package/dist/parsers/ast-parser.js +88 -0
  44. package/dist/parsers/ast-parser.js.map +1 -0
  45. package/dist/parsers/ast-queries.d.ts +63 -0
  46. package/dist/parsers/ast-queries.d.ts.map +1 -0
  47. package/dist/parsers/ast-queries.js +580 -0
  48. package/dist/parsers/ast-queries.js.map +1 -0
  49. package/dist/reporter/console.d.ts +8 -0
  50. package/dist/reporter/console.d.ts.map +1 -0
  51. package/dist/reporter/console.js +143 -0
  52. package/dist/reporter/console.js.map +1 -0
  53. package/dist/reporter/json.d.ts +3 -0
  54. package/dist/reporter/json.d.ts.map +1 -0
  55. package/dist/reporter/json.js +7 -0
  56. package/dist/reporter/json.js.map +1 -0
  57. package/dist/reporter/llm.d.ts +3 -0
  58. package/dist/reporter/llm.d.ts.map +1 -0
  59. package/dist/reporter/llm.js +66 -0
  60. package/dist/reporter/llm.js.map +1 -0
  61. package/dist/reporter/sarif.d.ts +3 -0
  62. package/dist/reporter/sarif.d.ts.map +1 -0
  63. package/dist/reporter/sarif.js +110 -0
  64. package/dist/reporter/sarif.js.map +1 -0
  65. package/dist/rules/owasp-a01/idor.d.ts +3 -0
  66. package/dist/rules/owasp-a01/idor.d.ts.map +1 -0
  67. package/dist/rules/owasp-a01/idor.js +48 -0
  68. package/dist/rules/owasp-a01/idor.js.map +1 -0
  69. package/dist/rules/owasp-a01/missing-auth-middleware.d.ts +3 -0
  70. package/dist/rules/owasp-a01/missing-auth-middleware.d.ts.map +1 -0
  71. package/dist/rules/owasp-a01/missing-auth-middleware.js +41 -0
  72. package/dist/rules/owasp-a01/missing-auth-middleware.js.map +1 -0
  73. package/dist/rules/owasp-a01/path-traversal.d.ts +3 -0
  74. package/dist/rules/owasp-a01/path-traversal.d.ts.map +1 -0
  75. package/dist/rules/owasp-a01/path-traversal.js +73 -0
  76. package/dist/rules/owasp-a01/path-traversal.js.map +1 -0
  77. package/dist/rules/owasp-a02/hardcoded-secrets.d.ts +3 -0
  78. package/dist/rules/owasp-a02/hardcoded-secrets.d.ts.map +1 -0
  79. package/dist/rules/owasp-a02/hardcoded-secrets.js +97 -0
  80. package/dist/rules/owasp-a02/hardcoded-secrets.js.map +1 -0
  81. package/dist/rules/owasp-a02/insecure-tls.d.ts +3 -0
  82. package/dist/rules/owasp-a02/insecure-tls.d.ts.map +1 -0
  83. package/dist/rules/owasp-a02/insecure-tls.js +75 -0
  84. package/dist/rules/owasp-a02/insecure-tls.js.map +1 -0
  85. package/dist/rules/owasp-a02/weak-hash.d.ts +3 -0
  86. package/dist/rules/owasp-a02/weak-hash.d.ts.map +1 -0
  87. package/dist/rules/owasp-a02/weak-hash.js +73 -0
  88. package/dist/rules/owasp-a02/weak-hash.js.map +1 -0
  89. package/dist/rules/owasp-a02/weak-random.d.ts +3 -0
  90. package/dist/rules/owasp-a02/weak-random.d.ts.map +1 -0
  91. package/dist/rules/owasp-a02/weak-random.js +70 -0
  92. package/dist/rules/owasp-a02/weak-random.js.map +1 -0
  93. package/dist/rules/owasp-a03/command-injection.d.ts +3 -0
  94. package/dist/rules/owasp-a03/command-injection.d.ts.map +1 -0
  95. package/dist/rules/owasp-a03/command-injection.js +79 -0
  96. package/dist/rules/owasp-a03/command-injection.js.map +1 -0
  97. package/dist/rules/owasp-a03/ldap-injection.d.ts +3 -0
  98. package/dist/rules/owasp-a03/ldap-injection.d.ts.map +1 -0
  99. package/dist/rules/owasp-a03/ldap-injection.js +56 -0
  100. package/dist/rules/owasp-a03/ldap-injection.js.map +1 -0
  101. package/dist/rules/owasp-a03/nosql-injection.d.ts +3 -0
  102. package/dist/rules/owasp-a03/nosql-injection.d.ts.map +1 -0
  103. package/dist/rules/owasp-a03/nosql-injection.js +61 -0
  104. package/dist/rules/owasp-a03/nosql-injection.js.map +1 -0
  105. package/dist/rules/owasp-a03/sql-injection.d.ts +3 -0
  106. package/dist/rules/owasp-a03/sql-injection.d.ts.map +1 -0
  107. package/dist/rules/owasp-a03/sql-injection.js +88 -0
  108. package/dist/rules/owasp-a03/sql-injection.js.map +1 -0
  109. package/dist/rules/owasp-a03/template-injection.d.ts +3 -0
  110. package/dist/rules/owasp-a03/template-injection.d.ts.map +1 -0
  111. package/dist/rules/owasp-a03/template-injection.js +64 -0
  112. package/dist/rules/owasp-a03/template-injection.js.map +1 -0
  113. package/dist/rules/owasp-a03/xss.d.ts +3 -0
  114. package/dist/rules/owasp-a03/xss.d.ts.map +1 -0
  115. package/dist/rules/owasp-a03/xss.js +74 -0
  116. package/dist/rules/owasp-a03/xss.js.map +1 -0
  117. package/dist/rules/owasp-a04/mass-assignment.d.ts +3 -0
  118. package/dist/rules/owasp-a04/mass-assignment.d.ts.map +1 -0
  119. package/dist/rules/owasp-a04/mass-assignment.js +63 -0
  120. package/dist/rules/owasp-a04/mass-assignment.js.map +1 -0
  121. package/dist/rules/owasp-a04/missing-rate-limit.d.ts +3 -0
  122. package/dist/rules/owasp-a04/missing-rate-limit.d.ts.map +1 -0
  123. package/dist/rules/owasp-a04/missing-rate-limit.js +48 -0
  124. package/dist/rules/owasp-a04/missing-rate-limit.js.map +1 -0
  125. package/dist/rules/owasp-a05/cors-wildcard.d.ts +3 -0
  126. package/dist/rules/owasp-a05/cors-wildcard.d.ts.map +1 -0
  127. package/dist/rules/owasp-a05/cors-wildcard.js +79 -0
  128. package/dist/rules/owasp-a05/cors-wildcard.js.map +1 -0
  129. package/dist/rules/owasp-a05/debug-mode.d.ts +3 -0
  130. package/dist/rules/owasp-a05/debug-mode.d.ts.map +1 -0
  131. package/dist/rules/owasp-a05/debug-mode.js +73 -0
  132. package/dist/rules/owasp-a05/debug-mode.js.map +1 -0
  133. package/dist/rules/owasp-a05/default-credentials.d.ts +3 -0
  134. package/dist/rules/owasp-a05/default-credentials.d.ts.map +1 -0
  135. package/dist/rules/owasp-a05/default-credentials.js +52 -0
  136. package/dist/rules/owasp-a05/default-credentials.js.map +1 -0
  137. package/dist/rules/owasp-a05/error-disclosure.d.ts +3 -0
  138. package/dist/rules/owasp-a05/error-disclosure.d.ts.map +1 -0
  139. package/dist/rules/owasp-a05/error-disclosure.js +70 -0
  140. package/dist/rules/owasp-a05/error-disclosure.js.map +1 -0
  141. package/dist/rules/owasp-a06/outdated-packages.d.ts +3 -0
  142. package/dist/rules/owasp-a06/outdated-packages.d.ts.map +1 -0
  143. package/dist/rules/owasp-a06/outdated-packages.js +75 -0
  144. package/dist/rules/owasp-a06/outdated-packages.js.map +1 -0
  145. package/dist/rules/owasp-a07/insecure-cookies.d.ts +3 -0
  146. package/dist/rules/owasp-a07/insecure-cookies.d.ts.map +1 -0
  147. package/dist/rules/owasp-a07/insecure-cookies.js +64 -0
  148. package/dist/rules/owasp-a07/insecure-cookies.js.map +1 -0
  149. package/dist/rules/owasp-a07/jwt-none-alg.d.ts +3 -0
  150. package/dist/rules/owasp-a07/jwt-none-alg.d.ts.map +1 -0
  151. package/dist/rules/owasp-a07/jwt-none-alg.js +81 -0
  152. package/dist/rules/owasp-a07/jwt-none-alg.js.map +1 -0
  153. package/dist/rules/owasp-a07/no-password-hashing.d.ts +3 -0
  154. package/dist/rules/owasp-a07/no-password-hashing.d.ts.map +1 -0
  155. package/dist/rules/owasp-a07/no-password-hashing.js +70 -0
  156. package/dist/rules/owasp-a07/no-password-hashing.js.map +1 -0
  157. package/dist/rules/owasp-a07/weak-session.d.ts +3 -0
  158. package/dist/rules/owasp-a07/weak-session.d.ts.map +1 -0
  159. package/dist/rules/owasp-a07/weak-session.js +64 -0
  160. package/dist/rules/owasp-a07/weak-session.js.map +1 -0
  161. package/dist/rules/owasp-a08/unsafe-deserialization.d.ts +3 -0
  162. package/dist/rules/owasp-a08/unsafe-deserialization.d.ts.map +1 -0
  163. package/dist/rules/owasp-a08/unsafe-deserialization.js +78 -0
  164. package/dist/rules/owasp-a08/unsafe-deserialization.js.map +1 -0
  165. package/dist/rules/owasp-a08/unsafe-eval.d.ts +3 -0
  166. package/dist/rules/owasp-a08/unsafe-eval.d.ts.map +1 -0
  167. package/dist/rules/owasp-a08/unsafe-eval.js +73 -0
  168. package/dist/rules/owasp-a08/unsafe-eval.js.map +1 -0
  169. package/dist/rules/owasp-a09/log-sensitive-data.d.ts +3 -0
  170. package/dist/rules/owasp-a09/log-sensitive-data.d.ts.map +1 -0
  171. package/dist/rules/owasp-a09/log-sensitive-data.js +73 -0
  172. package/dist/rules/owasp-a09/log-sensitive-data.js.map +1 -0
  173. package/dist/rules/owasp-a09/missing-error-handling.d.ts +3 -0
  174. package/dist/rules/owasp-a09/missing-error-handling.d.ts.map +1 -0
  175. package/dist/rules/owasp-a09/missing-error-handling.js +84 -0
  176. package/dist/rules/owasp-a09/missing-error-handling.js.map +1 -0
  177. package/dist/rules/owasp-a10/open-redirect.d.ts +3 -0
  178. package/dist/rules/owasp-a10/open-redirect.d.ts.map +1 -0
  179. package/dist/rules/owasp-a10/open-redirect.js +67 -0
  180. package/dist/rules/owasp-a10/open-redirect.js.map +1 -0
  181. package/dist/rules/owasp-a10/unvalidated-fetch.d.ts +3 -0
  182. package/dist/rules/owasp-a10/unvalidated-fetch.d.ts.map +1 -0
  183. package/dist/rules/owasp-a10/unvalidated-fetch.js +85 -0
  184. package/dist/rules/owasp-a10/unvalidated-fetch.js.map +1 -0
  185. package/dist/rules/registry.d.ts +20 -0
  186. package/dist/rules/registry.d.ts.map +1 -0
  187. package/dist/rules/registry.js +142 -0
  188. package/dist/rules/registry.js.map +1 -0
  189. package/dist/scanner/engine.d.ts +21 -0
  190. package/dist/scanner/engine.d.ts.map +1 -0
  191. package/dist/scanner/engine.js +260 -0
  192. package/dist/scanner/engine.js.map +1 -0
  193. package/dist/scanner/file-walker.d.ts +7 -0
  194. package/dist/scanner/file-walker.d.ts.map +1 -0
  195. package/dist/scanner/file-walker.js +81 -0
  196. package/dist/scanner/file-walker.js.map +1 -0
  197. package/dist/scanner/language-detect.d.ts +5 -0
  198. package/dist/scanner/language-detect.d.ts.map +1 -0
  199. package/dist/scanner/language-detect.js +91 -0
  200. package/dist/scanner/language-detect.js.map +1 -0
  201. package/dist/scanner/sca-scanner.d.ts +38 -0
  202. package/dist/scanner/sca-scanner.d.ts.map +1 -0
  203. package/dist/scanner/sca-scanner.js +223 -0
  204. package/dist/scanner/sca-scanner.js.map +1 -0
  205. package/dist/types/index.d.ts +114 -0
  206. package/dist/types/index.d.ts.map +1 -0
  207. package/dist/types/index.js +25 -0
  208. package/dist/types/index.js.map +1 -0
  209. package/dist/utils/pattern-matcher.d.ts +4 -0
  210. package/dist/utils/pattern-matcher.d.ts.map +1 -0
  211. package/dist/utils/pattern-matcher.js +72 -0
  212. package/dist/utils/pattern-matcher.js.map +1 -0
  213. package/dist/utils/scoring.d.ts +8 -0
  214. package/dist/utils/scoring.d.ts.map +1 -0
  215. package/dist/utils/scoring.js +76 -0
  216. package/dist/utils/scoring.js.map +1 -0
  217. package/dist/utils/suppression.d.ts +3 -0
  218. package/dist/utils/suppression.d.ts.map +1 -0
  219. package/dist/utils/suppression.js +33 -0
  220. package/dist/utils/suppression.js.map +1 -0
  221. package/package.json +94 -0
@@ -0,0 +1,143 @@
1
+ // ============================================================
2
+ // Console Reporter — colored terminal output
3
+ // ============================================================
4
+ import chalk from 'chalk';
5
+ import path from 'path';
6
+ import { sortFindings } from '../utils/scoring.js';
7
+ const SEVERITY_COLORS = {
8
+ CRITICAL: chalk.bgRed.white.bold,
9
+ HIGH: chalk.red.bold,
10
+ MEDIUM: chalk.yellow.bold,
11
+ LOW: chalk.blue,
12
+ INFO: chalk.gray,
13
+ };
14
+ const SEVERITY_ICONS = {
15
+ CRITICAL: '🔴',
16
+ HIGH: '🟠',
17
+ MEDIUM: '🟡',
18
+ LOW: '🔵',
19
+ INFO: '⚪',
20
+ };
21
+ function colorSeverity(severity) {
22
+ const color = SEVERITY_COLORS[severity];
23
+ return color(` ${severity} `);
24
+ }
25
+ function formatFinding(finding, showFix, noColor) {
26
+ const lines = [];
27
+ const relPath = path.relative(process.cwd(), finding.filePath);
28
+ const location = noColor
29
+ ? `${relPath}:${finding.line}:${finding.column}`
30
+ : chalk.cyan(`${relPath}:${finding.line}:${finding.column}`);
31
+ const severity = noColor
32
+ ? `[${finding.severity}]`
33
+ : colorSeverity(finding.severity);
34
+ const icon = SEVERITY_ICONS[finding.severity];
35
+ lines.push('');
36
+ lines.push(`${icon} ${severity} ${noColor ? finding.ruleId : chalk.dim(finding.ruleId)}`);
37
+ lines.push(` ${noColor ? finding.ruleName : chalk.bold(finding.ruleName)}`);
38
+ lines.push(` ${location}`);
39
+ lines.push(` OWASP: ${finding.owasp} | CWE: ${finding.cwe}`);
40
+ // Detection method and confidence
41
+ const methodLabel = {
42
+ ast: 'AST', taint: 'AST-Taint', regex: 'Regex', llm: 'AI-Verified',
43
+ };
44
+ const methodText = methodLabel[finding.analysisMethod] ?? finding.analysisMethod;
45
+ const confStyle = finding.confidence === 'HIGH' ? chalk.green
46
+ : finding.confidence === 'MEDIUM' ? chalk.yellow
47
+ : chalk.gray;
48
+ const detectionTag = noColor
49
+ ? `[${methodText} · ${finding.confidence}]`
50
+ : confStyle(`[${methodText} · ${finding.confidence}]`);
51
+ lines.push(` Detection: ${detectionTag}`);
52
+ if (finding.snippet) {
53
+ const snippetLines = finding.snippet.split('\n');
54
+ const codeBlock = snippetLines.map((l) => ` │ ${l}`).join('\n');
55
+ lines.push('');
56
+ lines.push(noColor ? codeBlock : chalk.gray(codeBlock));
57
+ }
58
+ if (showFix && finding.taintPath && finding.taintPath.length > 0) {
59
+ lines.push('');
60
+ lines.push(noColor ? ' Taint Path:' : chalk.cyan(' Taint Path:'));
61
+ finding.taintPath.forEach((step, i) => lines.push(` ${i + 1}. ${step}`));
62
+ }
63
+ if (showFix) {
64
+ lines.push('');
65
+ lines.push(noColor ? ' Fix:' : chalk.green(' Fix:'));
66
+ const fixLines = finding.fix.split('\n').slice(0, 8);
67
+ fixLines.forEach((l) => lines.push(` ${l}`));
68
+ lines.push('');
69
+ lines.push(noColor ? ' References:' : chalk.dim(' References:'));
70
+ finding.references.slice(0, 2).forEach((r) => lines.push(` ${r}`));
71
+ }
72
+ return lines.join('\n');
73
+ }
74
+ function printSummaryBar(result, noColor) {
75
+ const { findingsBySeverity, securityScore, totalFiles, totalFindings, scanDurationMs } = result;
76
+ const scoreColor = securityScore >= 80
77
+ ? chalk.green
78
+ : securityScore >= 50
79
+ ? chalk.yellow
80
+ : chalk.red;
81
+ const score = noColor
82
+ ? `Score: ${securityScore}/100`
83
+ : scoreColor(`Score: ${securityScore}/100`);
84
+ process.stdout.write('\n');
85
+ process.stdout.write('─'.repeat(60) + '\n');
86
+ process.stdout.write(`OWASPScan Results — ${score}\n`);
87
+ process.stdout.write('─'.repeat(60) + '\n');
88
+ process.stdout.write(`Files scanned: ${totalFiles}\n`);
89
+ process.stdout.write(`Total findings: ${totalFindings}\n`);
90
+ process.stdout.write(`Scan duration: ${scanDurationMs}ms\n`);
91
+ process.stdout.write('\n');
92
+ const severities = ['CRITICAL', 'HIGH', 'MEDIUM', 'LOW', 'INFO'];
93
+ for (const sev of severities) {
94
+ const count = findingsBySeverity[sev];
95
+ if (count > 0) {
96
+ const label = noColor ? `[${sev}]` : colorSeverity(sev);
97
+ process.stdout.write(` ${label} ${count} finding${count !== 1 ? 's' : ''}\n`);
98
+ }
99
+ }
100
+ process.stdout.write('\n');
101
+ if (result.passed) {
102
+ const msg = noColor ? 'PASSED' : chalk.green.bold('✓ PASSED');
103
+ process.stdout.write(`Status: ${msg}\n`);
104
+ }
105
+ else {
106
+ const msg = noColor ? 'FAILED' : chalk.red.bold('✗ FAILED');
107
+ process.stdout.write(`Status: ${msg} — findings at or above threshold detected\n`);
108
+ }
109
+ process.stdout.write('─'.repeat(60) + '\n');
110
+ }
111
+ export function reportConsole(result, options) {
112
+ if (options.noColor) {
113
+ // Disable chalk colors
114
+ process.env['FORCE_COLOR'] = '0';
115
+ }
116
+ const allFindings = result.files.flatMap((f) => f.findings);
117
+ const sorted = sortFindings(allFindings);
118
+ if (sorted.length === 0) {
119
+ printSummaryBar(result, options.noColor);
120
+ process.stdout.write('\nNo security issues found. Great work!\n\n');
121
+ return;
122
+ }
123
+ // Group findings by file for cleaner output
124
+ const byFile = new Map();
125
+ for (const finding of sorted) {
126
+ const existing = byFile.get(finding.filePath) ?? [];
127
+ existing.push(finding);
128
+ byFile.set(finding.filePath, existing);
129
+ }
130
+ process.stdout.write('\n');
131
+ for (const [filePath, findings] of byFile) {
132
+ const relPath = path.relative(process.cwd(), filePath);
133
+ const header = options.noColor
134
+ ? `\n=== ${relPath} (${findings.length} findings) ===`
135
+ : chalk.bold(`\n=== ${chalk.cyan(relPath)} (${findings.length} findings) ===`);
136
+ process.stdout.write(header + '\n');
137
+ for (const finding of findings) {
138
+ process.stdout.write(formatFinding(finding, options.verbose || options.showFix, options.noColor) + '\n');
139
+ }
140
+ }
141
+ printSummaryBar(result, options.noColor);
142
+ }
143
+ //# sourceMappingURL=console.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"console.js","sourceRoot":"","sources":["../../src/reporter/console.ts"],"names":[],"mappings":"AAAA,+DAA+D;AAC/D,6CAA6C;AAC7C,+DAA+D;AAE/D,OAAO,KAAK,MAAM,OAAO,CAAC;AAC1B,OAAO,IAAI,MAAM,MAAM,CAAC;AAExB,OAAO,EAAE,YAAY,EAAE,MAAM,qBAAqB,CAAC;AAInD,MAAM,eAAe,GAAoC;IACvD,QAAQ,EAAE,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC,IAAI;IAChC,IAAI,EAAE,KAAK,CAAC,GAAG,CAAC,IAAI;IACpB,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,IAAI;IACzB,GAAG,EAAE,KAAK,CAAC,IAAI;IACf,IAAI,EAAE,KAAK,CAAC,IAAI;CACjB,CAAC;AAEF,MAAM,cAAc,GAA6B;IAC/C,QAAQ,EAAE,IAAI;IACd,IAAI,EAAE,IAAI;IACV,MAAM,EAAE,IAAI;IACZ,GAAG,EAAE,IAAI;IACT,IAAI,EAAE,GAAG;CACV,CAAC;AAEF,SAAS,aAAa,CAAC,QAAkB;IACvC,MAAM,KAAK,GAAG,eAAe,CAAC,QAAQ,CAAC,CAAC;IACxC,OAAO,KAAK,CAAC,IAAI,QAAQ,GAAG,CAAC,CAAC;AAChC,CAAC;AAED,SAAS,aAAa,CAAC,OAAgB,EAAE,OAAgB,EAAE,OAAgB;IACzE,MAAM,KAAK,GAAa,EAAE,CAAC;IAC3B,MAAM,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,OAAO,CAAC,QAAQ,CAAC,CAAC;IAC/D,MAAM,QAAQ,GAAG,OAAO;QACtB,CAAC,CAAC,GAAG,OAAO,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,MAAM,EAAE;QAChD,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,OAAO,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC;IAE/D,MAAM,QAAQ,GAAG,OAAO;QACtB,CAAC,CAAC,IAAI,OAAO,CAAC,QAAQ,GAAG;QACzB,CAAC,CAAC,aAAa,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;IACpC,MAAM,IAAI,GAAG,cAAc,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;IAE9C,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IACf,KAAK,CAAC,IAAI,CAAC,GAAG,IAAI,IAAI,QAAQ,IAAI,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;IAC1F,KAAK,CAAC,IAAI,CAAC,MAAM,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;IAC9E,KAAK,CAAC,IAAI,CAAC,MAAM,QAAQ,EAAE,CAAC,CAAC;IAC7B,KAAK,CAAC,IAAI,CAAC,aAAa,OAAO,CAAC,KAAK,WAAW,OAAO,CAAC,GAAG,EAAE,CAAC,CAAC;IAE/D,kCAAkC;IAClC,MAAM,WAAW,GAA2B;QAC1C,GAAG,EAAE,KAAK,EAAE,KAAK,EAAE,WAAW,EAAE,KAAK,EAAE,OAAO,EAAE,GAAG,EAAE,aAAa;KACnE,CAAC;IACF,MAAM,UAAU,GAAG,WAAW,CAAC,OAAO,CAAC,cAAc,CAAC,IAAI,OAAO,CAAC,cAAc,CAAC;IACjF,MAAM,SAAS,GAAG,OAAO,CAAC,UAAU,KAAK,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK;QAC3D,CAAC,CAAC,OAAO,CAAC,UAAU,KAAK,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM;YAChD,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC;IACf,MAAM,YAAY,GAAG,OAAO;QAC1B,CAAC,CAAC,IAAI,UAAU,MAAM,OAAO,CAAC,UAAU,GAAG;QAC3C,CAAC,CAAC,SAAS,CAAC,IAAI,UAAU,MAAM,OAAO,CAAC,UAAU,GAAG,CAAC,CAAC;IACzD,KAAK,CAAC,IAAI,CAAC,iBAAiB,YAAY,EAAE,CAAC,CAAC;IAE5C,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;QACpB,MAAM,YAAY,GAAG,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QACjD,MAAM,SAAS,GAAG,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAClE,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACf,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IAC1D,CAAC;IAED,IAAI,OAAO,IAAI,OAAO,CAAC,SAAS,IAAI,OAAO,CAAC,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QACjE,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACf,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,gBAAgB,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC;QACtE,OAAO,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,CAAC,EAAE,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC,CAAC;IAC/E,CAAC;IAED,IAAI,OAAO,EAAE,CAAC;QACZ,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACf,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC;QACzD,MAAM,QAAQ,GAAG,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;QACrD,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,CAAC;QAC/C,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACf,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,gBAAgB,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC,CAAC;QACrE,OAAO,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,CAAC;IACvE,CAAC;IAED,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;AAC1B,CAAC;AAED,SAAS,eAAe,CAAC,MAAkB,EAAE,OAAgB;IAC3D,MAAM,EAAE,kBAAkB,EAAE,aAAa,EAAE,UAAU,EAAE,aAAa,EAAE,cAAc,EAAE,GAAG,MAAM,CAAC;IAEhG,MAAM,UAAU,GAAG,aAAa,IAAI,EAAE;QACpC,CAAC,CAAC,KAAK,CAAC,KAAK;QACb,CAAC,CAAC,aAAa,IAAI,EAAE;YACnB,CAAC,CAAC,KAAK,CAAC,MAAM;YACd,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC;IAEhB,MAAM,KAAK,GAAG,OAAO;QACnB,CAAC,CAAC,UAAU,aAAa,MAAM;QAC/B,CAAC,CAAC,UAAU,CAAC,UAAU,aAAa,MAAM,CAAC,CAAC;IAE9C,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAC3B,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,CAAC;IAC5C,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,uBAAuB,KAAK,IAAI,CAAC,CAAC;IACvD,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,CAAC;IAC5C,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,mBAAmB,UAAU,IAAI,CAAC,CAAC;IACxD,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,mBAAmB,aAAa,IAAI,CAAC,CAAC;IAC3D,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,mBAAmB,cAAc,MAAM,CAAC,CAAC;IAC9D,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAE3B,MAAM,UAAU,GAAe,CAAC,UAAU,EAAE,MAAM,EAAE,QAAQ,EAAE,KAAK,EAAE,MAAM,CAAC,CAAC;IAC7E,KAAK,MAAM,GAAG,IAAI,UAAU,EAAE,CAAC;QAC7B,MAAM,KAAK,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;QACtC,IAAI,KAAK,GAAG,CAAC,EAAE,CAAC;YACd,MAAM,KAAK,GAAG,OAAO,CAAC,CAAC,CAAC,IAAI,GAAG,GAAG,CAAC,CAAC,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC;YACxD,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,KAAK,KAAK,KAAK,KAAK,WAAW,KAAK,KAAK,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;QAClF,CAAC;IACH,CAAC;IAED,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAE3B,IAAI,MAAM,CAAC,MAAM,EAAE,CAAC;QAClB,MAAM,GAAG,GAAG,OAAO,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QAC9D,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,WAAW,GAAG,IAAI,CAAC,CAAC;IAC3C,CAAC;SAAM,CAAC;QACN,MAAM,GAAG,GAAG,OAAO,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QAC5D,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,WAAW,GAAG,8CAA8C,CAAC,CAAC;IACrF,CAAC;IAED,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,CAAC;AAC9C,CAAC;AAQD,MAAM,UAAU,aAAa,CAAC,MAAkB,EAAE,OAA+B;IAC/E,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;QACpB,uBAAuB;QACvB,OAAO,CAAC,GAAG,CAAC,aAAa,CAAC,GAAG,GAAG,CAAC;IACnC,CAAC;IAED,MAAM,WAAW,GAAc,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC;IACvE,MAAM,MAAM,GAAG,YAAY,CAAC,WAAW,CAAC,CAAC;IAEzC,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACxB,eAAe,CAAC,MAAM,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;QACzC,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,6CAA6C,CAAC,CAAC;QACpE,OAAO;IACT,CAAC;IAED,4CAA4C;IAC5C,MAAM,MAAM,GAAG,IAAI,GAAG,EAAqB,CAAC;IAC5C,KAAK,MAAM,OAAO,IAAI,MAAM,EAAE,CAAC;QAC7B,MAAM,QAAQ,GAAG,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;QACpD,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QACvB,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;IACzC,CAAC;IAED,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAC3B,KAAK,MAAM,CAAC,QAAQ,EAAE,QAAQ,CAAC,IAAI,MAAM,EAAE,CAAC;QAC1C,MAAM,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,QAAQ,CAAC,CAAC;QACvD,MAAM,MAAM,GAAG,OAAO,CAAC,OAAO;YAC5B,CAAC,CAAC,SAAS,OAAO,KAAK,QAAQ,CAAC,MAAM,gBAAgB;YACtD,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,KAAK,QAAQ,CAAC,MAAM,gBAAgB,CAAC,CAAC;QACjF,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC;QAEpC,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;YAC/B,OAAO,CAAC,MAAM,CAAC,KAAK,CAClB,aAAa,CAAC,OAAO,EAAE,OAAO,CAAC,OAAO,IAAI,OAAO,CAAC,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,GAAG,IAAI,CACnF,CAAC;QACJ,CAAC;IACH,CAAC;IAED,eAAe,CAAC,MAAM,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;AAC3C,CAAC"}
@@ -0,0 +1,3 @@
1
+ import type { ScanResult } from '../types/index.js';
2
+ export declare function reportJson(result: ScanResult): string;
3
+ //# sourceMappingURL=json.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"json.d.ts","sourceRoot":"","sources":["../../src/reporter/json.ts"],"names":[],"mappings":"AAIA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,mBAAmB,CAAC;AAEpD,wBAAgB,UAAU,CAAC,MAAM,EAAE,UAAU,GAAG,MAAM,CAErD"}
@@ -0,0 +1,7 @@
1
+ // ============================================================
2
+ // JSON Reporter — machine-readable structured output
3
+ // ============================================================
4
+ export function reportJson(result) {
5
+ return JSON.stringify(result, null, 2);
6
+ }
7
+ //# sourceMappingURL=json.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"json.js","sourceRoot":"","sources":["../../src/reporter/json.ts"],"names":[],"mappings":"AAAA,+DAA+D;AAC/D,qDAAqD;AACrD,+DAA+D;AAI/D,MAAM,UAAU,UAAU,CAAC,MAAkB;IAC3C,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;AACzC,CAAC"}
@@ -0,0 +1,3 @@
1
+ import type { ScanResult } from '../types/index.js';
2
+ export declare function reportLlm(result: ScanResult): string;
3
+ //# sourceMappingURL=llm.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"llm.d.ts","sourceRoot":"","sources":["../../src/reporter/llm.ts"],"names":[],"mappings":"AAKA,OAAO,KAAK,EAAE,UAAU,EAAqB,MAAM,mBAAmB,CAAC;AAuBvE,wBAAgB,SAAS,CAAC,MAAM,EAAE,UAAU,GAAG,MAAM,CAgDpD"}
@@ -0,0 +1,66 @@
1
+ // ============================================================
2
+ // LLM Reporter — compact format optimized for AI agent consumption
3
+ // Significantly smaller than JSON/SARIF — efficient for context windows
4
+ // ============================================================
5
+ import path from 'path';
6
+ const SEV_SHORT = {
7
+ CRITICAL: 'CRIT',
8
+ HIGH: 'HIGH',
9
+ MEDIUM: 'MED',
10
+ LOW: 'LOW',
11
+ INFO: 'INFO',
12
+ };
13
+ function formatFindingCompact(f) {
14
+ const relPath = path.relative(process.cwd(), f.filePath);
15
+ return [
16
+ `[${SEV_SHORT[f.severity]}] ${f.ruleId} @ ${relPath}:${f.line}`,
17
+ `OWASP:${f.owasp} CWE:${f.cwe}`,
18
+ `MSG: ${f.ruleName}`,
19
+ `CODE: ${f.snippet.split('\n')[0]?.trim().slice(0, 100) ?? ''}`,
20
+ `FIX: ${f.fix.split('\n')[0]?.trim().slice(0, 120) ?? ''}`,
21
+ `REF: ${f.references[0] ?? ''}`,
22
+ ].join('\n');
23
+ }
24
+ export function reportLlm(result) {
25
+ const allFindings = result.files.flatMap((f) => f.findings);
26
+ const header = [
27
+ `OWASPSCAN_RESULT score=${result.securityScore}/100 findings=${result.totalFindings} files=${result.totalFiles}`,
28
+ `severity_summary: CRIT=${result.findingsBySeverity.CRITICAL} HIGH=${result.findingsBySeverity.HIGH} MED=${result.findingsBySeverity.MEDIUM} LOW=${result.findingsBySeverity.LOW}`,
29
+ `status: ${result.passed ? 'PASSED' : 'FAILED'}`,
30
+ `scanned: ${result.timestamp}`,
31
+ '---',
32
+ ].join('\n');
33
+ if (allFindings.length === 0) {
34
+ return `${header}\nNO_FINDINGS — code passed all OWASP security checks.`;
35
+ }
36
+ // Group by severity to highlight critical first
37
+ const bySeverity = {
38
+ CRITICAL: [],
39
+ HIGH: [],
40
+ MEDIUM: [],
41
+ LOW: [],
42
+ INFO: [],
43
+ };
44
+ for (const f of allFindings) {
45
+ bySeverity[f.severity].push(f);
46
+ }
47
+ const sections = [header];
48
+ const order = ['CRITICAL', 'HIGH', 'MEDIUM', 'LOW', 'INFO'];
49
+ for (const sev of order) {
50
+ const findings = bySeverity[sev];
51
+ if (findings.length === 0)
52
+ continue;
53
+ sections.push(`\n### ${sev} FINDINGS (${findings.length})`);
54
+ for (const f of findings) {
55
+ sections.push(formatFindingCompact(f));
56
+ sections.push('---');
57
+ }
58
+ }
59
+ // Category breakdown
60
+ sections.push('\n### CATEGORY_BREAKDOWN');
61
+ for (const [category, count] of Object.entries(result.findingsByCategory)) {
62
+ sections.push(`${category}: ${count}`);
63
+ }
64
+ return sections.join('\n');
65
+ }
66
+ //# sourceMappingURL=llm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"llm.js","sourceRoot":"","sources":["../../src/reporter/llm.ts"],"names":[],"mappings":"AAAA,+DAA+D;AAC/D,mEAAmE;AACnE,wEAAwE;AACxE,+DAA+D;AAG/D,OAAO,IAAI,MAAM,MAAM,CAAC;AAExB,MAAM,SAAS,GAA6B;IAC1C,QAAQ,EAAE,MAAM;IAChB,IAAI,EAAE,MAAM;IACZ,MAAM,EAAE,KAAK;IACb,GAAG,EAAE,KAAK;IACV,IAAI,EAAE,MAAM;CACb,CAAC;AAEF,SAAS,oBAAoB,CAAC,CAAU;IACtC,MAAM,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC,QAAQ,CAAC,CAAC;IACzD,OAAO;QACL,IAAI,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,MAAM,MAAM,OAAO,IAAI,CAAC,CAAC,IAAI,EAAE;QAC/D,SAAS,CAAC,CAAC,KAAK,QAAQ,CAAC,CAAC,GAAG,EAAE;QAC/B,QAAQ,CAAC,CAAC,QAAQ,EAAE;QACpB,SAAS,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,KAAK,CAAC,CAAC,EAAE,GAAG,CAAC,IAAI,EAAE,EAAE;QAC/D,QAAQ,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,KAAK,CAAC,CAAC,EAAE,GAAG,CAAC,IAAI,EAAE,EAAE;QAC1D,QAAQ,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,IAAI,EAAE,EAAE;KAChC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;AACf,CAAC;AAED,MAAM,UAAU,SAAS,CAAC,MAAkB;IAC1C,MAAM,WAAW,GAAc,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC;IAEvE,MAAM,MAAM,GAAG;QACb,0BAA0B,MAAM,CAAC,aAAa,iBAAiB,MAAM,CAAC,aAAa,UAAU,MAAM,CAAC,UAAU,EAAE;QAChH,0BAA0B,MAAM,CAAC,kBAAkB,CAAC,QAAQ,SAAS,MAAM,CAAC,kBAAkB,CAAC,IAAI,QAAQ,MAAM,CAAC,kBAAkB,CAAC,MAAM,QAAQ,MAAM,CAAC,kBAAkB,CAAC,GAAG,EAAE;QAClL,WAAW,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,EAAE;QAChD,YAAY,MAAM,CAAC,SAAS,EAAE;QAC9B,KAAK;KACN,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAEb,IAAI,WAAW,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QAC7B,OAAO,GAAG,MAAM,wDAAwD,CAAC;IAC3E,CAAC;IAED,gDAAgD;IAChD,MAAM,UAAU,GAAgC;QAC9C,QAAQ,EAAE,EAAE;QACZ,IAAI,EAAE,EAAE;QACR,MAAM,EAAE,EAAE;QACV,GAAG,EAAE,EAAE;QACP,IAAI,EAAE,EAAE;KACT,CAAC;IAEF,KAAK,MAAM,CAAC,IAAI,WAAW,EAAE,CAAC;QAC5B,UAAU,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;IACjC,CAAC;IAED,MAAM,QAAQ,GAAa,CAAC,MAAM,CAAC,CAAC;IACpC,MAAM,KAAK,GAAe,CAAC,UAAU,EAAE,MAAM,EAAE,QAAQ,EAAE,KAAK,EAAE,MAAM,CAAC,CAAC;IAExE,KAAK,MAAM,GAAG,IAAI,KAAK,EAAE,CAAC;QACxB,MAAM,QAAQ,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC;QACjC,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC;YAAE,SAAS;QACpC,QAAQ,CAAC,IAAI,CAAC,SAAS,GAAG,cAAc,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC;QAC5D,KAAK,MAAM,CAAC,IAAI,QAAQ,EAAE,CAAC;YACzB,QAAQ,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,CAAC,CAAC;YACvC,QAAQ,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACvB,CAAC;IACH,CAAC;IAED,qBAAqB;IACrB,QAAQ,CAAC,IAAI,CAAC,0BAA0B,CAAC,CAAC;IAC1C,KAAK,MAAM,CAAC,QAAQ,EAAE,KAAK,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,kBAAkB,CAAC,EAAE,CAAC;QAC1E,QAAQ,CAAC,IAAI,CAAC,GAAG,QAAQ,KAAK,KAAe,EAAE,CAAC,CAAC;IACnD,CAAC;IAED,OAAO,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;AAC7B,CAAC"}
@@ -0,0 +1,3 @@
1
+ import type { ScanResult } from '../types/index.js';
2
+ export declare function reportSarif(result: ScanResult): string;
3
+ //# sourceMappingURL=sarif.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"sarif.d.ts","sourceRoot":"","sources":["../../src/reporter/sarif.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAE,UAAU,EAAqB,MAAM,mBAAmB,CAAC;AA8GvE,wBAAgB,WAAW,CAAC,MAAM,EAAE,UAAU,GAAG,MAAM,CAkCtD"}
@@ -0,0 +1,110 @@
1
+ // ============================================================
2
+ // SARIF Reporter — Static Analysis Results Interchange Format
3
+ // Compatible with GitHub Code Scanning and GitLab SAST
4
+ // https://docs.oasis-open.org/sarif/sarif/v2.1.0/sarif-v2.1.0.html
5
+ // ============================================================
6
+ import { registry } from '../rules/registry.js';
7
+ const SEVERITY_SARIF = {
8
+ CRITICAL: 'error',
9
+ HIGH: 'error',
10
+ MEDIUM: 'warning',
11
+ LOW: 'note',
12
+ INFO: 'none',
13
+ };
14
+ const SECURITY_SEVERITY_MAP = {
15
+ CRITICAL: '9.8',
16
+ HIGH: '7.5',
17
+ MEDIUM: '5.0',
18
+ LOW: '3.0',
19
+ INFO: '1.0',
20
+ };
21
+ function toSarifUri(filePath) {
22
+ // Convert absolute path to file:// URI
23
+ const normalized = filePath.replace(/\\/g, '/');
24
+ if (normalized.startsWith('/')) {
25
+ return `file://${normalized}`;
26
+ }
27
+ return `file:///${normalized}`;
28
+ }
29
+ function buildSarifRules() {
30
+ return registry.getAll().map((rule) => ({
31
+ id: rule.id,
32
+ name: rule.id.replace(/-/g, ''),
33
+ shortDescription: { text: rule.name },
34
+ fullDescription: { text: rule.description },
35
+ help: {
36
+ text: rule.fix,
37
+ markdown: `## ${rule.name}\n\n${rule.description}\n\n## Remediation\n\n\`\`\`\n${rule.fix}\n\`\`\``,
38
+ },
39
+ helpUri: rule.references[0] ?? 'https://owasp.org/Top10/',
40
+ properties: {
41
+ tags: [rule.owasp, rule.cwe, ...rule.tags],
42
+ security_severity: SECURITY_SEVERITY_MAP[rule.severity],
43
+ 'problem.severity': SEVERITY_SARIF[rule.severity],
44
+ precision: 'medium',
45
+ },
46
+ }));
47
+ }
48
+ function buildSarifResult(finding) {
49
+ const result = {
50
+ ruleId: finding.ruleId,
51
+ level: SEVERITY_SARIF[finding.severity],
52
+ message: {
53
+ text: `${finding.ruleName}\n\nOWASP: ${finding.owasp} | ${finding.cwe}\n\n${finding.message}`,
54
+ },
55
+ locations: [
56
+ {
57
+ physicalLocation: {
58
+ artifactLocation: {
59
+ uri: toSarifUri(finding.filePath),
60
+ },
61
+ region: {
62
+ startLine: finding.line,
63
+ startColumn: finding.column,
64
+ },
65
+ },
66
+ },
67
+ ],
68
+ fingerprints: {
69
+ 'primaryLocationLineHash/v1': `${finding.ruleId}:${finding.filePath}:${finding.line}`,
70
+ },
71
+ properties: {
72
+ confidence: finding.confidence,
73
+ analysisMethod: finding.analysisMethod,
74
+ ...(finding.taintPath ? { taintPath: finding.taintPath } : {}),
75
+ },
76
+ };
77
+ return result;
78
+ }
79
+ export function reportSarif(result) {
80
+ const allFindings = result.files.flatMap((f) => f.findings);
81
+ const sarif = {
82
+ $schema: 'https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json',
83
+ version: '2.1.0',
84
+ runs: [
85
+ {
86
+ tool: {
87
+ driver: {
88
+ name: 'OWASPScan',
89
+ version: '1.0.0',
90
+ informationUri: 'https://github.com/owaspscan/owaspscan',
91
+ rules: buildSarifRules(),
92
+ },
93
+ },
94
+ results: allFindings.map(buildSarifResult),
95
+ invocations: [
96
+ {
97
+ executionSuccessful: true,
98
+ startTimeUtc: result.timestamp,
99
+ endTimeUtc: new Date(new Date(result.timestamp).getTime() + result.scanDurationMs).toISOString(),
100
+ },
101
+ ],
102
+ automationDetails: {
103
+ id: result.scanId,
104
+ },
105
+ },
106
+ ],
107
+ };
108
+ return JSON.stringify(sarif, null, 2);
109
+ }
110
+ //# sourceMappingURL=sarif.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"sarif.js","sourceRoot":"","sources":["../../src/reporter/sarif.ts"],"names":[],"mappings":"AAAA,+DAA+D;AAC/D,8DAA8D;AAC9D,uDAAuD;AACvD,mEAAmE;AACnE,+DAA+D;AAG/D,OAAO,EAAE,QAAQ,EAAE,MAAM,sBAAsB,CAAC;AAEhD,MAAM,cAAc,GAA6B;IAC/C,QAAQ,EAAE,OAAO;IACjB,IAAI,EAAE,OAAO;IACb,MAAM,EAAE,SAAS;IACjB,GAAG,EAAE,MAAM;IACX,IAAI,EAAE,MAAM;CACb,CAAC;AAgCF,MAAM,qBAAqB,GAA6B;IACtD,QAAQ,EAAE,KAAK;IACf,IAAI,EAAE,KAAK;IACX,MAAM,EAAE,KAAK;IACb,GAAG,EAAE,KAAK;IACV,IAAI,EAAE,KAAK;CACZ,CAAC;AAEF,SAAS,UAAU,CAAC,QAAgB;IAClC,uCAAuC;IACvC,MAAM,UAAU,GAAG,QAAQ,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;IAChD,IAAI,UAAU,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,CAAC;QAC/B,OAAO,UAAU,UAAU,EAAE,CAAC;IAChC,CAAC;IACD,OAAO,WAAW,UAAU,EAAE,CAAC;AACjC,CAAC;AAED,SAAS,eAAe;IACtB,OAAO,QAAQ,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACtC,EAAE,EAAE,IAAI,CAAC,EAAE;QACX,IAAI,EAAE,IAAI,CAAC,EAAE,CAAC,OAAO,CAAC,IAAI,EAAE,EAAE,CAAC;QAC/B,gBAAgB,EAAE,EAAE,IAAI,EAAE,IAAI,CAAC,IAAI,EAAE;QACrC,eAAe,EAAE,EAAE,IAAI,EAAE,IAAI,CAAC,WAAW,EAAE;QAC3C,IAAI,EAAE;YACJ,IAAI,EAAE,IAAI,CAAC,GAAG;YACd,QAAQ,EAAE,MAAM,IAAI,CAAC,IAAI,OAAO,IAAI,CAAC,WAAW,iCAAiC,IAAI,CAAC,GAAG,UAAU;SACpG;QACD,OAAO,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,IAAI,0BAA0B;QACzD,UAAU,EAAE;YACV,IAAI,EAAE,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;YAC1C,iBAAiB,EAAE,qBAAqB,CAAC,IAAI,CAAC,QAAQ,CAAC;YACvD,kBAAkB,EAAE,cAAc,CAAC,IAAI,CAAC,QAAQ,CAAC;YACjD,SAAS,EAAE,QAAQ;SACpB;KACF,CAAC,CAAC,CAAC;AACN,CAAC;AAED,SAAS,gBAAgB,CAAC,OAAgB;IACxC,MAAM,MAAM,GAA2D;QACrE,MAAM,EAAE,OAAO,CAAC,MAAM;QACtB,KAAK,EAAE,cAAc,CAAC,OAAO,CAAC,QAAQ,CAAC;QACvC,OAAO,EAAE;YACP,IAAI,EAAE,GAAG,OAAO,CAAC,QAAQ,cAAc,OAAO,CAAC,KAAK,MAAM,OAAO,CAAC,GAAG,OAAO,OAAO,CAAC,OAAO,EAAE;SAC9F;QACD,SAAS,EAAE;YACT;gBACE,gBAAgB,EAAE;oBAChB,gBAAgB,EAAE;wBAChB,GAAG,EAAE,UAAU,CAAC,OAAO,CAAC,QAAQ,CAAC;qBAClC;oBACD,MAAM,EAAE;wBACN,SAAS,EAAE,OAAO,CAAC,IAAI;wBACvB,WAAW,EAAE,OAAO,CAAC,MAAM;qBAC5B;iBACF;aACF;SACF;QACD,YAAY,EAAE;YACZ,4BAA4B,EAAE,GAAG,OAAO,CAAC,MAAM,IAAI,OAAO,CAAC,QAAQ,IAAI,OAAO,CAAC,IAAI,EAAE;SACtF;QACD,UAAU,EAAE;YACV,UAAU,EAAE,OAAO,CAAC,UAAU;YAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;YACtC,GAAG,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;SAC/D;KACF,CAAC;IACF,OAAO,MAAM,CAAC;AAChB,CAAC;AAED,MAAM,UAAU,WAAW,CAAC,MAAkB;IAC5C,MAAM,WAAW,GAAc,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC;IAEvE,MAAM,KAAK,GAAG;QACZ,OAAO,EAAE,gGAAgG;QACzG,OAAO,EAAE,OAAO;QAChB,IAAI,EAAE;YACJ;gBACE,IAAI,EAAE;oBACJ,MAAM,EAAE;wBACN,IAAI,EAAE,WAAW;wBACjB,OAAO,EAAE,OAAO;wBAChB,cAAc,EAAE,wCAAwC;wBACxD,KAAK,EAAE,eAAe,EAAE;qBACzB;iBACF;gBACD,OAAO,EAAE,WAAW,CAAC,GAAG,CAAC,gBAAgB,CAAC;gBAC1C,WAAW,EAAE;oBACX;wBACE,mBAAmB,EAAE,IAAI;wBACzB,YAAY,EAAE,MAAM,CAAC,SAAS;wBAC9B,UAAU,EAAE,IAAI,IAAI,CAClB,IAAI,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,GAAG,MAAM,CAAC,cAAc,CAC7D,CAAC,WAAW,EAAE;qBAChB;iBACF;gBACD,iBAAiB,EAAE;oBACjB,EAAE,EAAE,MAAM,CAAC,MAAM;iBAClB;aACF;SACF;KACF,CAAC;IAEF,OAAO,IAAI,CAAC,SAAS,CAAC,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;AACxC,CAAC"}
@@ -0,0 +1,3 @@
1
+ import type { Rule } from '../../types/index.js';
2
+ export declare const InsecureDirectObjectRef: Rule;
3
+ //# sourceMappingURL=idor.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"idor.d.ts","sourceRoot":"","sources":["../../../src/rules/owasp-a01/idor.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,sBAAsB,CAAC;AAEjD,eAAO,MAAM,uBAAuB,EAAE,IAmDrC,CAAC"}
@@ -0,0 +1,48 @@
1
+ // OWASP A01:2021 — Broken Access Control
2
+ // Rule: Insecure Direct Object Reference (IDOR)
3
+ export const InsecureDirectObjectRef = {
4
+ id: 'OWASP-A01-003',
5
+ name: 'Insecure Direct Object Reference (IDOR)',
6
+ owasp: 'A01:2021',
7
+ cwe: 'CWE-639',
8
+ severity: 'HIGH',
9
+ languages: ['javascript', 'typescript', 'python', 'php', 'java', 'ruby'],
10
+ description: 'Database queries using user-supplied IDs without verifying that the requesting ' +
11
+ 'user owns or is authorized to access the resource. Attackers enumerate IDs to ' +
12
+ 'access other users\' data. AI tools commonly generate findById(req.params.id) without ownership checks.',
13
+ patterns: [
14
+ {
15
+ // DB queries using req.params.id directly — without ownership check
16
+ pattern: /(?:findById|findOne|findByPk|findByIdAndUpdate|findByIdAndDelete|findByIdAndRemove|getById|fetchById)\s*\(\s*req\s*\.\s*params\s*\.\s*(?:id|userId|orderId|accountId|fileId)/gi,
17
+ suppressIf: /(?:req\.user\.id|currentUser|session\.userId|req\.userId|user_id\s*===?\s*req|\.userId\s*!==?\s*req|ownership|authorize|hasAccess|canAccess|isOwner)/i,
18
+ snippetLines: 5,
19
+ },
20
+ {
21
+ // Python ORM: Model.objects.get(id=request.GET['id']) style
22
+ pattern: /\.objects\.(?:get|filter)\s*\(\s*(?:id|pk|user_id)\s*=\s*request\.(?:GET|POST|data)\[/gi,
23
+ suppressIf: /(?:user=request\.user|owner=request\.user|request\.user\.id|user__id=request\.user)/i,
24
+ snippetLines: 5,
25
+ },
26
+ {
27
+ // Raw SQL with user ID: "WHERE id = " + req.params.id
28
+ pattern: /WHERE\s+id\s*=\s*['"$]?\s*\+\s*(?:req\.|request\.)(?:params|body|query)/gi,
29
+ snippetLines: 3,
30
+ },
31
+ ],
32
+ fix: 'Always verify resource ownership before returning or modifying data.\n\n' +
33
+ '// Node.js / Mongoose example:\n' +
34
+ 'const document = await Model.findOne({\n' +
35
+ ' _id: req.params.id,\n' +
36
+ ' owner: req.user.id, // ownership check — the querying user MUST own it\n' +
37
+ '});\n' +
38
+ 'if (!document) return res.status(404).json({ error: "Not found" });\n\n' +
39
+ '// Django example:\n' +
40
+ 'obj = get_object_or_404(Model, pk=pk, owner=request.user)',
41
+ references: [
42
+ 'https://owasp.org/Top10/A01_2021-Broken_Access_Control/',
43
+ 'https://cwe.mitre.org/data/definitions/639.html',
44
+ 'https://portswigger.net/web-security/access-control/idor',
45
+ ],
46
+ tags: ['idor', 'access-control', 'authorization', 'database'],
47
+ };
48
+ //# sourceMappingURL=idor.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"idor.js","sourceRoot":"","sources":["../../../src/rules/owasp-a01/idor.ts"],"names":[],"mappings":"AAAA,yCAAyC;AACzC,gDAAgD;AAIhD,MAAM,CAAC,MAAM,uBAAuB,GAAS;IAC3C,EAAE,EAAE,eAAe;IACnB,IAAI,EAAE,yCAAyC;IAC/C,KAAK,EAAE,UAAU;IACjB,GAAG,EAAE,SAAS;IACd,QAAQ,EAAE,MAAM;IAChB,SAAS,EAAE,CAAC,YAAY,EAAE,YAAY,EAAE,QAAQ,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC;IACxE,WAAW,EACT,iFAAiF;QACjF,gFAAgF;QAChF,yGAAyG;IAC3G,QAAQ,EAAE;QACR;YACE,oEAAoE;YACpE,OAAO,EACL,gLAAgL;YAClL,UAAU,EACR,uJAAuJ;YACzJ,YAAY,EAAE,CAAC;SAChB;QACD;YACE,4DAA4D;YAC5D,OAAO,EACL,yFAAyF;YAC3F,UAAU,EACR,sFAAsF;YACxF,YAAY,EAAE,CAAC;SAChB;QACD;YACE,sDAAsD;YACtD,OAAO,EACL,2EAA2E;YAC7E,YAAY,EAAE,CAAC;SAChB;KACF;IACD,GAAG,EACD,0EAA0E;QAC1E,kCAAkC;QAClC,0CAA0C;QAC1C,yBAAyB;QACzB,4EAA4E;QAC5E,OAAO;QACP,yEAAyE;QACzE,sBAAsB;QACtB,2DAA2D;IAC7D,UAAU,EAAE;QACV,yDAAyD;QACzD,iDAAiD;QACjD,0DAA0D;KAC3D;IACD,IAAI,EAAE,CAAC,MAAM,EAAE,gBAAgB,EAAE,eAAe,EAAE,UAAU,CAAC;CAC9D,CAAC"}
@@ -0,0 +1,3 @@
1
+ import type { Rule } from '../../types/index.js';
2
+ export declare const MissingAuthMiddleware: Rule;
3
+ //# sourceMappingURL=missing-auth-middleware.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"missing-auth-middleware.d.ts","sourceRoot":"","sources":["../../../src/rules/owasp-a01/missing-auth-middleware.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,sBAAsB,CAAC;AAEjD,eAAO,MAAM,qBAAqB,EAAE,IA2CnC,CAAC"}
@@ -0,0 +1,41 @@
1
+ // OWASP A01:2021 — Broken Access Control
2
+ // Rule: Missing authentication/authorization middleware on routes
3
+ export const MissingAuthMiddleware = {
4
+ id: 'OWASP-A01-001',
5
+ name: 'Missing Authentication Middleware on Route',
6
+ owasp: 'A01:2021',
7
+ cwe: 'CWE-862',
8
+ severity: 'HIGH',
9
+ languages: ['javascript', 'typescript'],
10
+ description: 'Route handler defined without an authentication or authorization middleware. ' +
11
+ 'AI assistants frequently generate CRUD routes missing auth guards, leaving ' +
12
+ 'sensitive endpoints publicly accessible.',
13
+ patterns: [
14
+ {
15
+ // Express-style: app.get/post/put/delete/patch('/sensitive-path', handler)
16
+ // without an auth middleware in between
17
+ pattern: /(?:app|router)\s*\.\s*(?:get|post|put|patch|delete|all)\s*\(\s*['"`][^'"`]*(?:admin|user|profile|account|dashboard|settings|payment|order|invoice|secret|private|internal|api\/v\d)[^'"`]*['"`]\s*,\s*(?:async\s*)?\(\s*req/gi,
18
+ suppressIf: /(?:authenticate|authorize|requireAuth|isAuthenticated|verifyToken|checkAuth|passport\.authenticate|authMiddleware|protect|guard|requireLogin|isAdmin|hasRole|permit|acl|rbac)\s*(?:,|\()/i,
19
+ snippetLines: 3,
20
+ },
21
+ {
22
+ // FastAPI/Flask-style missing auth decorator on sensitive routes
23
+ pattern: /@(?:app|router)\.(?:get|post|put|patch|delete)\s*\(\s*['"`][^'"`]*(?:admin|user|profile|account|dashboard|settings|payment|order|secret|private|internal)[^'"`]*['"`]/gi,
24
+ suppressIf: /(?:Depends\s*\(|@login_required|@auth_required|@permission_required|requires_auth|get_current_user|current_user)/i,
25
+ snippetLines: 3,
26
+ },
27
+ ],
28
+ fix: 'Add authentication middleware before your route handler.\n\n' +
29
+ '// Express example:\n' +
30
+ 'app.get("/api/users", authenticate, authorize("admin"), async (req, res) => { ... });\n\n' +
31
+ '// FastAPI example:\n' +
32
+ '@router.get("/users")\n' +
33
+ 'async def get_users(current_user: User = Depends(get_current_user)):\n' +
34
+ ' ...',
35
+ references: [
36
+ 'https://owasp.org/Top10/A01_2021-Broken_Access_Control/',
37
+ 'https://cwe.mitre.org/data/definitions/862.html',
38
+ ],
39
+ tags: ['access-control', 'authorization', 'middleware', 'routing'],
40
+ };
41
+ //# sourceMappingURL=missing-auth-middleware.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"missing-auth-middleware.js","sourceRoot":"","sources":["../../../src/rules/owasp-a01/missing-auth-middleware.ts"],"names":[],"mappings":"AAAA,yCAAyC;AACzC,kEAAkE;AAIlE,MAAM,CAAC,MAAM,qBAAqB,GAAS;IACzC,EAAE,EAAE,eAAe;IACnB,IAAI,EAAE,4CAA4C;IAClD,KAAK,EAAE,UAAU;IACjB,GAAG,EAAE,SAAS;IACd,QAAQ,EAAE,MAAM;IAChB,SAAS,EAAE,CAAC,YAAY,EAAE,YAAY,CAAC;IACvC,WAAW,EACT,+EAA+E;QAC/E,6EAA6E;QAC7E,0CAA0C;IAC5C,QAAQ,EAAE;QACR;YACE,2EAA2E;YAC3E,wCAAwC;YACxC,OAAO,EACL,+NAA+N;YACjO,UAAU,EACR,2LAA2L;YAC7L,YAAY,EAAE,CAAC;SAChB;QACD;YACE,iEAAiE;YACjE,OAAO,EACL,yKAAyK;YAC3K,UAAU,EACR,mHAAmH;YACrH,YAAY,EAAE,CAAC;SAChB;KACF;IACD,GAAG,EACD,8DAA8D;QAC9D,uBAAuB;QACvB,2FAA2F;QAC3F,uBAAuB;QACvB,yBAAyB;QACzB,wEAAwE;QACxE,SAAS;IACX,UAAU,EAAE;QACV,yDAAyD;QACzD,iDAAiD;KAClD;IACD,IAAI,EAAE,CAAC,gBAAgB,EAAE,eAAe,EAAE,YAAY,EAAE,SAAS,CAAC;CACnE,CAAC"}
@@ -0,0 +1,3 @@
1
+ import type { Rule } from '../../types/index.js';
2
+ export declare const PathTraversal: Rule;
3
+ //# sourceMappingURL=path-traversal.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"path-traversal.d.ts","sourceRoot":"","sources":["../../../src/rules/owasp-a01/path-traversal.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,sBAAsB,CAAC;AAEjD,eAAO,MAAM,aAAa,EAAE,IA8E3B,CAAC"}
@@ -0,0 +1,73 @@
1
+ // OWASP A01:2021 — Broken Access Control
2
+ // Rule: Path Traversal via unsanitized user input to file operations
3
+ export const PathTraversal = {
4
+ id: 'OWASP-A01-002',
5
+ name: 'Path Traversal via Unsanitized User Input',
6
+ owasp: 'A01:2021',
7
+ cwe: 'CWE-22',
8
+ severity: 'CRITICAL',
9
+ languages: ['javascript', 'typescript', 'python', 'php', 'java', 'go', 'ruby'],
10
+ description: 'File system operations (read, write, delete) using user-controlled input without ' +
11
+ 'path sanitization allow attackers to traverse directories (e.g., ../../../../etc/passwd). ' +
12
+ 'AI tools commonly generate fs.readFile(req.params.file) style code.',
13
+ patterns: [
14
+ {
15
+ // Node.js: fs operations with req.body/params/query (direct)
16
+ pattern: /(?:fs|fsPromises|promises)\s*\.\s*(?:readFile|readFileSync|writeFile|writeFileSync|appendFile|unlink|rmdir|mkdir|stat|access|open)\s*\(\s*(?:req\.|request\.)(?:body|params|query|headers)/gi,
17
+ snippetLines: 3,
18
+ },
19
+ {
20
+ // Node.js: fs operations with string concat including user input
21
+ pattern: /(?:fs|fsPromises|promises)\s*\.\s*(?:readFile|readFileSync|writeFile|writeFileSync|appendFile|unlink|stat|access|open)\s*\([^\n]*\+\s*(?:req\.|request\.)(?:body|params|query)/gi,
22
+ snippetLines: 3,
23
+ },
24
+ {
25
+ // path.join/resolve with user input
26
+ pattern: /path\s*\.\s*(?:join|resolve)\s*\([^)]*(?:req\.|request\.)(?:body|params|query)/gi,
27
+ snippetLines: 3,
28
+ },
29
+ {
30
+ // Python: open() with user input
31
+ pattern: /open\s*\(\s*(?:request\.|req\.)(?:args|form|json|data|params|files)\[/gi,
32
+ snippetLines: 3,
33
+ },
34
+ {
35
+ // Python: os.path operations with user input
36
+ pattern: /os\.path\.(?:join|abspath|realpath)\s*\([^)]*(?:request\.|req\.)(?:args|form|json|data)/gi,
37
+ snippetLines: 3,
38
+ },
39
+ {
40
+ // PHP: file operations with $_GET/$_POST/$_REQUEST
41
+ pattern: /(?:file_get_contents|fopen|readfile|include|require|include_once|require_once)\s*\(\s*\$_(?:GET|POST|REQUEST|FILES)\s*\[/gi,
42
+ snippetLines: 3,
43
+ },
44
+ {
45
+ // Generic: string concatenation to build file paths with user input
46
+ pattern: /(?:__dirname|__filename|process\.cwd\(\)|os\.getcwd\(\))\s*\+\s*.*(?:req\.|request\.)(?:body|params|query)/gi,
47
+ snippetLines: 3,
48
+ },
49
+ ],
50
+ fix: 'Always sanitize file paths from user input. Resolve to a canonical path and verify it stays within the allowed base directory.\n\n' +
51
+ '// Node.js example:\n' +
52
+ 'import path from "path";\n' +
53
+ 'const BASE_DIR = path.resolve("./uploads");\n' +
54
+ 'const userFile = req.params.filename;\n' +
55
+ 'const resolved = path.resolve(BASE_DIR, path.basename(userFile)); // basename strips ../\n' +
56
+ 'if (!resolved.startsWith(BASE_DIR)) {\n' +
57
+ ' return res.status(400).send("Invalid file path");\n' +
58
+ '}\n' +
59
+ 'const content = await fs.readFile(resolved, "utf8");\n\n' +
60
+ '// Python example:\n' +
61
+ 'import os\n' +
62
+ 'BASE_DIR = os.path.abspath("./uploads")\n' +
63
+ 'safe_path = os.path.realpath(os.path.join(BASE_DIR, filename))\n' +
64
+ 'if not safe_path.startswith(BASE_DIR):\n' +
65
+ ' raise ValueError("Path traversal detected")',
66
+ references: [
67
+ 'https://owasp.org/Top10/A01_2021-Broken_Access_Control/',
68
+ 'https://cwe.mitre.org/data/definitions/22.html',
69
+ 'https://owasp.org/www-community/attacks/Path_Traversal',
70
+ ],
71
+ tags: ['path-traversal', 'file-system', 'injection', 'access-control'],
72
+ };
73
+ //# sourceMappingURL=path-traversal.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"path-traversal.js","sourceRoot":"","sources":["../../../src/rules/owasp-a01/path-traversal.ts"],"names":[],"mappings":"AAAA,yCAAyC;AACzC,qEAAqE;AAIrE,MAAM,CAAC,MAAM,aAAa,GAAS;IACjC,EAAE,EAAE,eAAe;IACnB,IAAI,EAAE,2CAA2C;IACjD,KAAK,EAAE,UAAU;IACjB,GAAG,EAAE,QAAQ;IACb,QAAQ,EAAE,UAAU;IACpB,SAAS,EAAE,CAAC,YAAY,EAAE,YAAY,EAAE,QAAQ,EAAE,KAAK,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,CAAC;IAC9E,WAAW,EACT,mFAAmF;QACnF,4FAA4F;QAC5F,qEAAqE;IACvE,QAAQ,EAAE;QACR;YACE,6DAA6D;YAC7D,OAAO,EACL,8LAA8L;YAChM,YAAY,EAAE,CAAC;SAChB;QACD;YACE,iEAAiE;YACjE,OAAO,EACL,kLAAkL;YACpL,YAAY,EAAE,CAAC;SAChB;QACD;YACE,oCAAoC;YACpC,OAAO,EACL,kFAAkF;YACpF,YAAY,EAAE,CAAC;SAChB;QACD;YACE,iCAAiC;YACjC,OAAO,EACL,yEAAyE;YAC3E,YAAY,EAAE,CAAC;SAChB;QACD;YACE,6CAA6C;YAC7C,OAAO,EACL,2FAA2F;YAC7F,YAAY,EAAE,CAAC;SAChB;QACD;YACE,mDAAmD;YACnD,OAAO,EACL,4HAA4H;YAC9H,YAAY,EAAE,CAAC;SAChB;QACD;YACE,oEAAoE;YACpE,OAAO,EACL,8GAA8G;YAChH,YAAY,EAAE,CAAC;SAChB;KACF;IACD,GAAG,EACD,oIAAoI;QACpI,uBAAuB;QACvB,4BAA4B;QAC5B,+CAA+C;QAC/C,yCAAyC;QACzC,4FAA4F;QAC5F,yCAAyC;QACzC,uDAAuD;QACvD,KAAK;QACL,0DAA0D;QAC1D,sBAAsB;QACtB,aAAa;QACb,2CAA2C;QAC3C,kEAAkE;QAClE,0CAA0C;QAC1C,iDAAiD;IACnD,UAAU,EAAE;QACV,yDAAyD;QACzD,gDAAgD;QAChD,wDAAwD;KACzD;IACD,IAAI,EAAE,CAAC,gBAAgB,EAAE,aAAa,EAAE,WAAW,EAAE,gBAAgB,CAAC;CACvE,CAAC"}
@@ -0,0 +1,3 @@
1
+ import type { Rule } from '../../types/index.js';
2
+ export declare const HardcodedSecrets: Rule;
3
+ //# sourceMappingURL=hardcoded-secrets.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"hardcoded-secrets.d.ts","sourceRoot":"","sources":["../../../src/rules/owasp-a02/hardcoded-secrets.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,sBAAsB,CAAC;AAEjD,eAAO,MAAM,gBAAgB,EAAE,IAwG9B,CAAC"}