@trust-assurance-protocol/owaspscan 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/analysis/ast-analyzer.d.ts +13 -0
- package/dist/analysis/ast-analyzer.d.ts.map +1 -0
- package/dist/analysis/ast-analyzer.js +58 -0
- package/dist/analysis/ast-analyzer.js.map +1 -0
- package/dist/analysis/llm-verifier.d.ts +17 -0
- package/dist/analysis/llm-verifier.d.ts.map +1 -0
- package/dist/analysis/llm-verifier.js +152 -0
- package/dist/analysis/llm-verifier.js.map +1 -0
- package/dist/analysis/result-cache.d.ts +20 -0
- package/dist/analysis/result-cache.d.ts.map +1 -0
- package/dist/analysis/result-cache.js +70 -0
- package/dist/analysis/result-cache.js.map +1 -0
- package/dist/analysis/sinks.d.ts +12 -0
- package/dist/analysis/sinks.d.ts.map +1 -0
- package/dist/analysis/sinks.js +142 -0
- package/dist/analysis/sinks.js.map +1 -0
- package/dist/analysis/sources.d.ts +8 -0
- package/dist/analysis/sources.d.ts.map +1 -0
- package/dist/analysis/sources.js +114 -0
- package/dist/analysis/sources.js.map +1 -0
- package/dist/analysis/taint-engine.d.ts +5 -0
- package/dist/analysis/taint-engine.d.ts.map +1 -0
- package/dist/analysis/taint-engine.js +187 -0
- package/dist/analysis/taint-engine.js.map +1 -0
- package/dist/cli/index.d.ts +3 -0
- package/dist/cli/index.d.ts.map +1 -0
- package/dist/cli/index.js +227 -0
- package/dist/cli/index.js.map +1 -0
- package/dist/config/loader.d.ts +10 -0
- package/dist/config/loader.d.ts.map +1 -0
- package/dist/config/loader.js +81 -0
- package/dist/config/loader.js.map +1 -0
- package/dist/config/schema.d.ts +23 -0
- package/dist/config/schema.d.ts.map +1 -0
- package/dist/config/schema.js +17 -0
- package/dist/config/schema.js.map +1 -0
- package/dist/mcp/server.d.ts +2 -0
- package/dist/mcp/server.d.ts.map +1 -0
- package/dist/mcp/server.js +250 -0
- package/dist/mcp/server.js.map +1 -0
- package/dist/parsers/ast-parser.d.ts +38 -0
- package/dist/parsers/ast-parser.d.ts.map +1 -0
- package/dist/parsers/ast-parser.js +88 -0
- package/dist/parsers/ast-parser.js.map +1 -0
- package/dist/parsers/ast-queries.d.ts +63 -0
- package/dist/parsers/ast-queries.d.ts.map +1 -0
- package/dist/parsers/ast-queries.js +580 -0
- package/dist/parsers/ast-queries.js.map +1 -0
- package/dist/reporter/console.d.ts +8 -0
- package/dist/reporter/console.d.ts.map +1 -0
- package/dist/reporter/console.js +143 -0
- package/dist/reporter/console.js.map +1 -0
- package/dist/reporter/json.d.ts +3 -0
- package/dist/reporter/json.d.ts.map +1 -0
- package/dist/reporter/json.js +7 -0
- package/dist/reporter/json.js.map +1 -0
- package/dist/reporter/llm.d.ts +3 -0
- package/dist/reporter/llm.d.ts.map +1 -0
- package/dist/reporter/llm.js +66 -0
- package/dist/reporter/llm.js.map +1 -0
- package/dist/reporter/sarif.d.ts +3 -0
- package/dist/reporter/sarif.d.ts.map +1 -0
- package/dist/reporter/sarif.js +110 -0
- package/dist/reporter/sarif.js.map +1 -0
- package/dist/rules/owasp-a01/idor.d.ts +3 -0
- package/dist/rules/owasp-a01/idor.d.ts.map +1 -0
- package/dist/rules/owasp-a01/idor.js +48 -0
- package/dist/rules/owasp-a01/idor.js.map +1 -0
- package/dist/rules/owasp-a01/missing-auth-middleware.d.ts +3 -0
- package/dist/rules/owasp-a01/missing-auth-middleware.d.ts.map +1 -0
- package/dist/rules/owasp-a01/missing-auth-middleware.js +41 -0
- package/dist/rules/owasp-a01/missing-auth-middleware.js.map +1 -0
- package/dist/rules/owasp-a01/path-traversal.d.ts +3 -0
- package/dist/rules/owasp-a01/path-traversal.d.ts.map +1 -0
- package/dist/rules/owasp-a01/path-traversal.js +73 -0
- package/dist/rules/owasp-a01/path-traversal.js.map +1 -0
- package/dist/rules/owasp-a02/hardcoded-secrets.d.ts +3 -0
- package/dist/rules/owasp-a02/hardcoded-secrets.d.ts.map +1 -0
- package/dist/rules/owasp-a02/hardcoded-secrets.js +97 -0
- package/dist/rules/owasp-a02/hardcoded-secrets.js.map +1 -0
- package/dist/rules/owasp-a02/insecure-tls.d.ts +3 -0
- package/dist/rules/owasp-a02/insecure-tls.d.ts.map +1 -0
- package/dist/rules/owasp-a02/insecure-tls.js +75 -0
- package/dist/rules/owasp-a02/insecure-tls.js.map +1 -0
- package/dist/rules/owasp-a02/weak-hash.d.ts +3 -0
- package/dist/rules/owasp-a02/weak-hash.d.ts.map +1 -0
- package/dist/rules/owasp-a02/weak-hash.js +73 -0
- package/dist/rules/owasp-a02/weak-hash.js.map +1 -0
- package/dist/rules/owasp-a02/weak-random.d.ts +3 -0
- package/dist/rules/owasp-a02/weak-random.d.ts.map +1 -0
- package/dist/rules/owasp-a02/weak-random.js +70 -0
- package/dist/rules/owasp-a02/weak-random.js.map +1 -0
- package/dist/rules/owasp-a03/command-injection.d.ts +3 -0
- package/dist/rules/owasp-a03/command-injection.d.ts.map +1 -0
- package/dist/rules/owasp-a03/command-injection.js +79 -0
- package/dist/rules/owasp-a03/command-injection.js.map +1 -0
- package/dist/rules/owasp-a03/ldap-injection.d.ts +3 -0
- package/dist/rules/owasp-a03/ldap-injection.d.ts.map +1 -0
- package/dist/rules/owasp-a03/ldap-injection.js +56 -0
- package/dist/rules/owasp-a03/ldap-injection.js.map +1 -0
- package/dist/rules/owasp-a03/nosql-injection.d.ts +3 -0
- package/dist/rules/owasp-a03/nosql-injection.d.ts.map +1 -0
- package/dist/rules/owasp-a03/nosql-injection.js +61 -0
- package/dist/rules/owasp-a03/nosql-injection.js.map +1 -0
- package/dist/rules/owasp-a03/sql-injection.d.ts +3 -0
- package/dist/rules/owasp-a03/sql-injection.d.ts.map +1 -0
- package/dist/rules/owasp-a03/sql-injection.js +88 -0
- package/dist/rules/owasp-a03/sql-injection.js.map +1 -0
- package/dist/rules/owasp-a03/template-injection.d.ts +3 -0
- package/dist/rules/owasp-a03/template-injection.d.ts.map +1 -0
- package/dist/rules/owasp-a03/template-injection.js +64 -0
- package/dist/rules/owasp-a03/template-injection.js.map +1 -0
- package/dist/rules/owasp-a03/xss.d.ts +3 -0
- package/dist/rules/owasp-a03/xss.d.ts.map +1 -0
- package/dist/rules/owasp-a03/xss.js +74 -0
- package/dist/rules/owasp-a03/xss.js.map +1 -0
- package/dist/rules/owasp-a04/mass-assignment.d.ts +3 -0
- package/dist/rules/owasp-a04/mass-assignment.d.ts.map +1 -0
- package/dist/rules/owasp-a04/mass-assignment.js +63 -0
- package/dist/rules/owasp-a04/mass-assignment.js.map +1 -0
- package/dist/rules/owasp-a04/missing-rate-limit.d.ts +3 -0
- package/dist/rules/owasp-a04/missing-rate-limit.d.ts.map +1 -0
- package/dist/rules/owasp-a04/missing-rate-limit.js +48 -0
- package/dist/rules/owasp-a04/missing-rate-limit.js.map +1 -0
- package/dist/rules/owasp-a05/cors-wildcard.d.ts +3 -0
- package/dist/rules/owasp-a05/cors-wildcard.d.ts.map +1 -0
- package/dist/rules/owasp-a05/cors-wildcard.js +79 -0
- package/dist/rules/owasp-a05/cors-wildcard.js.map +1 -0
- package/dist/rules/owasp-a05/debug-mode.d.ts +3 -0
- package/dist/rules/owasp-a05/debug-mode.d.ts.map +1 -0
- package/dist/rules/owasp-a05/debug-mode.js +73 -0
- package/dist/rules/owasp-a05/debug-mode.js.map +1 -0
- package/dist/rules/owasp-a05/default-credentials.d.ts +3 -0
- package/dist/rules/owasp-a05/default-credentials.d.ts.map +1 -0
- package/dist/rules/owasp-a05/default-credentials.js +52 -0
- package/dist/rules/owasp-a05/default-credentials.js.map +1 -0
- package/dist/rules/owasp-a05/error-disclosure.d.ts +3 -0
- package/dist/rules/owasp-a05/error-disclosure.d.ts.map +1 -0
- package/dist/rules/owasp-a05/error-disclosure.js +70 -0
- package/dist/rules/owasp-a05/error-disclosure.js.map +1 -0
- package/dist/rules/owasp-a06/outdated-packages.d.ts +3 -0
- package/dist/rules/owasp-a06/outdated-packages.d.ts.map +1 -0
- package/dist/rules/owasp-a06/outdated-packages.js +75 -0
- package/dist/rules/owasp-a06/outdated-packages.js.map +1 -0
- package/dist/rules/owasp-a07/insecure-cookies.d.ts +3 -0
- package/dist/rules/owasp-a07/insecure-cookies.d.ts.map +1 -0
- package/dist/rules/owasp-a07/insecure-cookies.js +64 -0
- package/dist/rules/owasp-a07/insecure-cookies.js.map +1 -0
- package/dist/rules/owasp-a07/jwt-none-alg.d.ts +3 -0
- package/dist/rules/owasp-a07/jwt-none-alg.d.ts.map +1 -0
- package/dist/rules/owasp-a07/jwt-none-alg.js +81 -0
- package/dist/rules/owasp-a07/jwt-none-alg.js.map +1 -0
- package/dist/rules/owasp-a07/no-password-hashing.d.ts +3 -0
- package/dist/rules/owasp-a07/no-password-hashing.d.ts.map +1 -0
- package/dist/rules/owasp-a07/no-password-hashing.js +70 -0
- package/dist/rules/owasp-a07/no-password-hashing.js.map +1 -0
- package/dist/rules/owasp-a07/weak-session.d.ts +3 -0
- package/dist/rules/owasp-a07/weak-session.d.ts.map +1 -0
- package/dist/rules/owasp-a07/weak-session.js +64 -0
- package/dist/rules/owasp-a07/weak-session.js.map +1 -0
- package/dist/rules/owasp-a08/unsafe-deserialization.d.ts +3 -0
- package/dist/rules/owasp-a08/unsafe-deserialization.d.ts.map +1 -0
- package/dist/rules/owasp-a08/unsafe-deserialization.js +78 -0
- package/dist/rules/owasp-a08/unsafe-deserialization.js.map +1 -0
- package/dist/rules/owasp-a08/unsafe-eval.d.ts +3 -0
- package/dist/rules/owasp-a08/unsafe-eval.d.ts.map +1 -0
- package/dist/rules/owasp-a08/unsafe-eval.js +73 -0
- package/dist/rules/owasp-a08/unsafe-eval.js.map +1 -0
- package/dist/rules/owasp-a09/log-sensitive-data.d.ts +3 -0
- package/dist/rules/owasp-a09/log-sensitive-data.d.ts.map +1 -0
- package/dist/rules/owasp-a09/log-sensitive-data.js +73 -0
- package/dist/rules/owasp-a09/log-sensitive-data.js.map +1 -0
- package/dist/rules/owasp-a09/missing-error-handling.d.ts +3 -0
- package/dist/rules/owasp-a09/missing-error-handling.d.ts.map +1 -0
- package/dist/rules/owasp-a09/missing-error-handling.js +84 -0
- package/dist/rules/owasp-a09/missing-error-handling.js.map +1 -0
- package/dist/rules/owasp-a10/open-redirect.d.ts +3 -0
- package/dist/rules/owasp-a10/open-redirect.d.ts.map +1 -0
- package/dist/rules/owasp-a10/open-redirect.js +67 -0
- package/dist/rules/owasp-a10/open-redirect.js.map +1 -0
- package/dist/rules/owasp-a10/unvalidated-fetch.d.ts +3 -0
- package/dist/rules/owasp-a10/unvalidated-fetch.d.ts.map +1 -0
- package/dist/rules/owasp-a10/unvalidated-fetch.js +85 -0
- package/dist/rules/owasp-a10/unvalidated-fetch.js.map +1 -0
- package/dist/rules/registry.d.ts +20 -0
- package/dist/rules/registry.d.ts.map +1 -0
- package/dist/rules/registry.js +142 -0
- package/dist/rules/registry.js.map +1 -0
- package/dist/scanner/engine.d.ts +21 -0
- package/dist/scanner/engine.d.ts.map +1 -0
- package/dist/scanner/engine.js +260 -0
- package/dist/scanner/engine.js.map +1 -0
- package/dist/scanner/file-walker.d.ts +7 -0
- package/dist/scanner/file-walker.d.ts.map +1 -0
- package/dist/scanner/file-walker.js +81 -0
- package/dist/scanner/file-walker.js.map +1 -0
- package/dist/scanner/language-detect.d.ts +5 -0
- package/dist/scanner/language-detect.d.ts.map +1 -0
- package/dist/scanner/language-detect.js +91 -0
- package/dist/scanner/language-detect.js.map +1 -0
- package/dist/scanner/sca-scanner.d.ts +38 -0
- package/dist/scanner/sca-scanner.d.ts.map +1 -0
- package/dist/scanner/sca-scanner.js +223 -0
- package/dist/scanner/sca-scanner.js.map +1 -0
- package/dist/types/index.d.ts +114 -0
- package/dist/types/index.d.ts.map +1 -0
- package/dist/types/index.js +25 -0
- package/dist/types/index.js.map +1 -0
- package/dist/utils/pattern-matcher.d.ts +4 -0
- package/dist/utils/pattern-matcher.d.ts.map +1 -0
- package/dist/utils/pattern-matcher.js +72 -0
- package/dist/utils/pattern-matcher.js.map +1 -0
- package/dist/utils/scoring.d.ts +8 -0
- package/dist/utils/scoring.d.ts.map +1 -0
- package/dist/utils/scoring.js +76 -0
- package/dist/utils/scoring.js.map +1 -0
- package/dist/utils/suppression.d.ts +3 -0
- package/dist/utils/suppression.d.ts.map +1 -0
- package/dist/utils/suppression.js +33 -0
- package/dist/utils/suppression.js.map +1 -0
- package/package.json +94 -0
|
@@ -0,0 +1,143 @@
|
|
|
1
|
+
// ============================================================
|
|
2
|
+
// Console Reporter — colored terminal output
|
|
3
|
+
// ============================================================
|
|
4
|
+
import chalk from 'chalk';
|
|
5
|
+
import path from 'path';
|
|
6
|
+
import { sortFindings } from '../utils/scoring.js';
|
|
7
|
+
const SEVERITY_COLORS = {
|
|
8
|
+
CRITICAL: chalk.bgRed.white.bold,
|
|
9
|
+
HIGH: chalk.red.bold,
|
|
10
|
+
MEDIUM: chalk.yellow.bold,
|
|
11
|
+
LOW: chalk.blue,
|
|
12
|
+
INFO: chalk.gray,
|
|
13
|
+
};
|
|
14
|
+
const SEVERITY_ICONS = {
|
|
15
|
+
CRITICAL: '🔴',
|
|
16
|
+
HIGH: '🟠',
|
|
17
|
+
MEDIUM: '🟡',
|
|
18
|
+
LOW: '🔵',
|
|
19
|
+
INFO: '⚪',
|
|
20
|
+
};
|
|
21
|
+
function colorSeverity(severity) {
|
|
22
|
+
const color = SEVERITY_COLORS[severity];
|
|
23
|
+
return color(` ${severity} `);
|
|
24
|
+
}
|
|
25
|
+
function formatFinding(finding, showFix, noColor) {
|
|
26
|
+
const lines = [];
|
|
27
|
+
const relPath = path.relative(process.cwd(), finding.filePath);
|
|
28
|
+
const location = noColor
|
|
29
|
+
? `${relPath}:${finding.line}:${finding.column}`
|
|
30
|
+
: chalk.cyan(`${relPath}:${finding.line}:${finding.column}`);
|
|
31
|
+
const severity = noColor
|
|
32
|
+
? `[${finding.severity}]`
|
|
33
|
+
: colorSeverity(finding.severity);
|
|
34
|
+
const icon = SEVERITY_ICONS[finding.severity];
|
|
35
|
+
lines.push('');
|
|
36
|
+
lines.push(`${icon} ${severity} ${noColor ? finding.ruleId : chalk.dim(finding.ruleId)}`);
|
|
37
|
+
lines.push(` ${noColor ? finding.ruleName : chalk.bold(finding.ruleName)}`);
|
|
38
|
+
lines.push(` ${location}`);
|
|
39
|
+
lines.push(` OWASP: ${finding.owasp} | CWE: ${finding.cwe}`);
|
|
40
|
+
// Detection method and confidence
|
|
41
|
+
const methodLabel = {
|
|
42
|
+
ast: 'AST', taint: 'AST-Taint', regex: 'Regex', llm: 'AI-Verified',
|
|
43
|
+
};
|
|
44
|
+
const methodText = methodLabel[finding.analysisMethod] ?? finding.analysisMethod;
|
|
45
|
+
const confStyle = finding.confidence === 'HIGH' ? chalk.green
|
|
46
|
+
: finding.confidence === 'MEDIUM' ? chalk.yellow
|
|
47
|
+
: chalk.gray;
|
|
48
|
+
const detectionTag = noColor
|
|
49
|
+
? `[${methodText} · ${finding.confidence}]`
|
|
50
|
+
: confStyle(`[${methodText} · ${finding.confidence}]`);
|
|
51
|
+
lines.push(` Detection: ${detectionTag}`);
|
|
52
|
+
if (finding.snippet) {
|
|
53
|
+
const snippetLines = finding.snippet.split('\n');
|
|
54
|
+
const codeBlock = snippetLines.map((l) => ` │ ${l}`).join('\n');
|
|
55
|
+
lines.push('');
|
|
56
|
+
lines.push(noColor ? codeBlock : chalk.gray(codeBlock));
|
|
57
|
+
}
|
|
58
|
+
if (showFix && finding.taintPath && finding.taintPath.length > 0) {
|
|
59
|
+
lines.push('');
|
|
60
|
+
lines.push(noColor ? ' Taint Path:' : chalk.cyan(' Taint Path:'));
|
|
61
|
+
finding.taintPath.forEach((step, i) => lines.push(` ${i + 1}. ${step}`));
|
|
62
|
+
}
|
|
63
|
+
if (showFix) {
|
|
64
|
+
lines.push('');
|
|
65
|
+
lines.push(noColor ? ' Fix:' : chalk.green(' Fix:'));
|
|
66
|
+
const fixLines = finding.fix.split('\n').slice(0, 8);
|
|
67
|
+
fixLines.forEach((l) => lines.push(` ${l}`));
|
|
68
|
+
lines.push('');
|
|
69
|
+
lines.push(noColor ? ' References:' : chalk.dim(' References:'));
|
|
70
|
+
finding.references.slice(0, 2).forEach((r) => lines.push(` ${r}`));
|
|
71
|
+
}
|
|
72
|
+
return lines.join('\n');
|
|
73
|
+
}
|
|
74
|
+
function printSummaryBar(result, noColor) {
|
|
75
|
+
const { findingsBySeverity, securityScore, totalFiles, totalFindings, scanDurationMs } = result;
|
|
76
|
+
const scoreColor = securityScore >= 80
|
|
77
|
+
? chalk.green
|
|
78
|
+
: securityScore >= 50
|
|
79
|
+
? chalk.yellow
|
|
80
|
+
: chalk.red;
|
|
81
|
+
const score = noColor
|
|
82
|
+
? `Score: ${securityScore}/100`
|
|
83
|
+
: scoreColor(`Score: ${securityScore}/100`);
|
|
84
|
+
process.stdout.write('\n');
|
|
85
|
+
process.stdout.write('─'.repeat(60) + '\n');
|
|
86
|
+
process.stdout.write(`OWASPScan Results — ${score}\n`);
|
|
87
|
+
process.stdout.write('─'.repeat(60) + '\n');
|
|
88
|
+
process.stdout.write(`Files scanned: ${totalFiles}\n`);
|
|
89
|
+
process.stdout.write(`Total findings: ${totalFindings}\n`);
|
|
90
|
+
process.stdout.write(`Scan duration: ${scanDurationMs}ms\n`);
|
|
91
|
+
process.stdout.write('\n');
|
|
92
|
+
const severities = ['CRITICAL', 'HIGH', 'MEDIUM', 'LOW', 'INFO'];
|
|
93
|
+
for (const sev of severities) {
|
|
94
|
+
const count = findingsBySeverity[sev];
|
|
95
|
+
if (count > 0) {
|
|
96
|
+
const label = noColor ? `[${sev}]` : colorSeverity(sev);
|
|
97
|
+
process.stdout.write(` ${label} ${count} finding${count !== 1 ? 's' : ''}\n`);
|
|
98
|
+
}
|
|
99
|
+
}
|
|
100
|
+
process.stdout.write('\n');
|
|
101
|
+
if (result.passed) {
|
|
102
|
+
const msg = noColor ? 'PASSED' : chalk.green.bold('✓ PASSED');
|
|
103
|
+
process.stdout.write(`Status: ${msg}\n`);
|
|
104
|
+
}
|
|
105
|
+
else {
|
|
106
|
+
const msg = noColor ? 'FAILED' : chalk.red.bold('✗ FAILED');
|
|
107
|
+
process.stdout.write(`Status: ${msg} — findings at or above threshold detected\n`);
|
|
108
|
+
}
|
|
109
|
+
process.stdout.write('─'.repeat(60) + '\n');
|
|
110
|
+
}
|
|
111
|
+
export function reportConsole(result, options) {
|
|
112
|
+
if (options.noColor) {
|
|
113
|
+
// Disable chalk colors
|
|
114
|
+
process.env['FORCE_COLOR'] = '0';
|
|
115
|
+
}
|
|
116
|
+
const allFindings = result.files.flatMap((f) => f.findings);
|
|
117
|
+
const sorted = sortFindings(allFindings);
|
|
118
|
+
if (sorted.length === 0) {
|
|
119
|
+
printSummaryBar(result, options.noColor);
|
|
120
|
+
process.stdout.write('\nNo security issues found. Great work!\n\n');
|
|
121
|
+
return;
|
|
122
|
+
}
|
|
123
|
+
// Group findings by file for cleaner output
|
|
124
|
+
const byFile = new Map();
|
|
125
|
+
for (const finding of sorted) {
|
|
126
|
+
const existing = byFile.get(finding.filePath) ?? [];
|
|
127
|
+
existing.push(finding);
|
|
128
|
+
byFile.set(finding.filePath, existing);
|
|
129
|
+
}
|
|
130
|
+
process.stdout.write('\n');
|
|
131
|
+
for (const [filePath, findings] of byFile) {
|
|
132
|
+
const relPath = path.relative(process.cwd(), filePath);
|
|
133
|
+
const header = options.noColor
|
|
134
|
+
? `\n=== ${relPath} (${findings.length} findings) ===`
|
|
135
|
+
: chalk.bold(`\n=== ${chalk.cyan(relPath)} (${findings.length} findings) ===`);
|
|
136
|
+
process.stdout.write(header + '\n');
|
|
137
|
+
for (const finding of findings) {
|
|
138
|
+
process.stdout.write(formatFinding(finding, options.verbose || options.showFix, options.noColor) + '\n');
|
|
139
|
+
}
|
|
140
|
+
}
|
|
141
|
+
printSummaryBar(result, options.noColor);
|
|
142
|
+
}
|
|
143
|
+
//# sourceMappingURL=console.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"console.js","sourceRoot":"","sources":["../../src/reporter/console.ts"],"names":[],"mappings":"AAAA,+DAA+D;AAC/D,6CAA6C;AAC7C,+DAA+D;AAE/D,OAAO,KAAK,MAAM,OAAO,CAAC;AAC1B,OAAO,IAAI,MAAM,MAAM,CAAC;AAExB,OAAO,EAAE,YAAY,EAAE,MAAM,qBAAqB,CAAC;AAInD,MAAM,eAAe,GAAoC;IACvD,QAAQ,EAAE,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC,IAAI;IAChC,IAAI,EAAE,KAAK,CAAC,GAAG,CAAC,IAAI;IACpB,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,IAAI;IACzB,GAAG,EAAE,KAAK,CAAC,IAAI;IACf,IAAI,EAAE,KAAK,CAAC,IAAI;CACjB,CAAC;AAEF,MAAM,cAAc,GAA6B;IAC/C,QAAQ,EAAE,IAAI;IACd,IAAI,EAAE,IAAI;IACV,MAAM,EAAE,IAAI;IACZ,GAAG,EAAE,IAAI;IACT,IAAI,EAAE,GAAG;CACV,CAAC;AAEF,SAAS,aAAa,CAAC,QAAkB;IACvC,MAAM,KAAK,GAAG,eAAe,CAAC,QAAQ,CAAC,CAAC;IACxC,OAAO,KAAK,CAAC,IAAI,QAAQ,GAAG,CAAC,CAAC;AAChC,CAAC;AAED,SAAS,aAAa,CAAC,OAAgB,EAAE,OAAgB,EAAE,OAAgB;IACzE,MAAM,KAAK,GAAa,EAAE,CAAC;IAC3B,MAAM,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,OAAO,CAAC,QAAQ,CAAC,CAAC;IAC/D,MAAM,QAAQ,GAAG,OAAO;QACtB,CAAC,CAAC,GAAG,OAAO,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,MAAM,EAAE;QAChD,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,OAAO,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC;IAE/D,MAAM,QAAQ,GAAG,OAAO;QACtB,CAAC,CAAC,IAAI,OAAO,CAAC,QAAQ,GAAG;QACzB,CAAC,CAAC,aAAa,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;IACpC,MAAM,IAAI,GAAG,cAAc,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;IAE9C,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IACf,KAAK,CAAC,IAAI,CAAC,GAAG,IAAI,IAAI,QAAQ,IAAI,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;IAC1F,KAAK,CAAC,IAAI,CAAC,MAAM,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;IAC9E,KAAK,CAAC,IAAI,CAAC,MAAM,QAAQ,EAAE,CAAC,CAAC;IAC7B,KAAK,CAAC,IAAI,CAAC,aAAa,OAAO,CAAC,KAAK,WAAW,OAAO,CAAC,GAAG,EAAE,CAAC,CAAC;IAE/D,kCAAkC;IAClC,MAAM,WAAW,GAA2B;QAC1C,GAAG,EAAE,KAAK,EAAE,KAAK,EAAE,WAAW,EAAE,KAAK,EAAE,OAAO,EAAE,GAAG,EAAE,aAAa;KACnE,CAAC;IACF,MAAM,UAAU,GAAG,WAAW,CAAC,OAAO,CAAC,cAAc,CAAC,IAAI,OAAO,CAAC,cAAc,CAAC;IACjF,MAAM,SAAS,GAAG,OAAO,CAAC,UAAU,KAAK,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK;QAC3D,CAAC,CAAC,OAAO,CAAC,UAAU,KAAK,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM;YAChD,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC;IACf,MAAM,YAAY,GAAG,OAAO;QAC1B,CAAC,CAAC,IAAI,UAAU,MAAM,OAAO,CAAC,UAAU,GAAG;QAC3C,CAAC,CAAC,SAAS,CAAC,IAAI,UAAU,MAAM,OAAO,CAAC,UAAU,GAAG,CAAC,CAAC;IACzD,KAAK,CAAC,IAAI,CAAC,iBAAiB,YAAY,EAAE,CAAC,CAAC;IAE5C,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;QACpB,MAAM,YAAY,GAAG,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QACjD,MAAM,SAAS,GAAG,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAClE,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACf,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IAC1D,CAAC;IAED,IAAI,OAAO,IAAI,OAAO,CAAC,SAAS,IAAI,OAAO,CAAC,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QACjE,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACf,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,gBAAgB,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC;QACtE,OAAO,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,CAAC,EAAE,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC,CAAC;IAC/E,CAAC;IAED,IAAI,OAAO,EAAE,CAAC;QACZ,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACf,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC;QACzD,MAAM,QAAQ,GAAG,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;QACrD,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,CAAC;QAC/C,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACf,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,gBAAgB,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC,CAAC;QACrE,OAAO,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,CAAC;IACvE,CAAC;IAED,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;AAC1B,CAAC;AAED,SAAS,eAAe,CAAC,MAAkB,EAAE,OAAgB;IAC3D,MAAM,EAAE,kBAAkB,EAAE,aAAa,EAAE,UAAU,EAAE,aAAa,EAAE,cAAc,EAAE,GAAG,MAAM,CAAC;IAEhG,MAAM,UAAU,GAAG,aAAa,IAAI,EAAE;QACpC,CAAC,CAAC,KAAK,CAAC,KAAK;QACb,CAAC,CAAC,aAAa,IAAI,EAAE;YACnB,CAAC,CAAC,KAAK,CAAC,MAAM;YACd,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC;IAEhB,MAAM,KAAK,GAAG,OAAO;QACnB,CAAC,CAAC,UAAU,aAAa,MAAM;QAC/B,CAAC,CAAC,UAAU,CAAC,UAAU,aAAa,MAAM,CAAC,CAAC;IAE9C,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAC3B,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,CAAC;IAC5C,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,uBAAuB,KAAK,IAAI,CAAC,CAAC;IACvD,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,CAAC;IAC5C,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,mBAAmB,UAAU,IAAI,CAAC,CAAC;IACxD,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,mBAAmB,aAAa,IAAI,CAAC,CAAC;IAC3D,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,mBAAmB,cAAc,MAAM,CAAC,CAAC;IAC9D,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAE3B,MAAM,UAAU,GAAe,CAAC,UAAU,EAAE,MAAM,EAAE,QAAQ,EAAE,KAAK,EAAE,MAAM,CAAC,CAAC;IAC7E,KAAK,MAAM,GAAG,IAAI,UAAU,EAAE,CAAC;QAC7B,MAAM,KAAK,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;QACtC,IAAI,KAAK,GAAG,CAAC,EAAE,CAAC;YACd,MAAM,KAAK,GAAG,OAAO,CAAC,CAAC,CAAC,IAAI,GAAG,GAAG,CAAC,CAAC,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC;YACxD,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,KAAK,KAAK,KAAK,KAAK,WAAW,KAAK,KAAK,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;QAClF,CAAC;IACH,CAAC;IAED,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAE3B,IAAI,MAAM,CAAC,MAAM,EAAE,CAAC;QAClB,MAAM,GAAG,GAAG,OAAO,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QAC9D,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,WAAW,GAAG,IAAI,CAAC,CAAC;IAC3C,CAAC;SAAM,CAAC;QACN,MAAM,GAAG,GAAG,OAAO,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QAC5D,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,WAAW,GAAG,8CAA8C,CAAC,CAAC;IACrF,CAAC;IAED,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,CAAC;AAC9C,CAAC;AAQD,MAAM,UAAU,aAAa,CAAC,MAAkB,EAAE,OAA+B;IAC/E,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;QACpB,uBAAuB;QACvB,OAAO,CAAC,GAAG,CAAC,aAAa,CAAC,GAAG,GAAG,CAAC;IACnC,CAAC;IAED,MAAM,WAAW,GAAc,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC;IACvE,MAAM,MAAM,GAAG,YAAY,CAAC,WAAW,CAAC,CAAC;IAEzC,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACxB,eAAe,CAAC,MAAM,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;QACzC,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,6CAA6C,CAAC,CAAC;QACpE,OAAO;IACT,CAAC;IAED,4CAA4C;IAC5C,MAAM,MAAM,GAAG,IAAI,GAAG,EAAqB,CAAC;IAC5C,KAAK,MAAM,OAAO,IAAI,MAAM,EAAE,CAAC;QAC7B,MAAM,QAAQ,GAAG,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;QACpD,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QACvB,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;IACzC,CAAC;IAED,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAC3B,KAAK,MAAM,CAAC,QAAQ,EAAE,QAAQ,CAAC,IAAI,MAAM,EAAE,CAAC;QAC1C,MAAM,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,QAAQ,CAAC,CAAC;QACvD,MAAM,MAAM,GAAG,OAAO,CAAC,OAAO;YAC5B,CAAC,CAAC,SAAS,OAAO,KAAK,QAAQ,CAAC,MAAM,gBAAgB;YACtD,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,KAAK,QAAQ,CAAC,MAAM,gBAAgB,CAAC,CAAC;QACjF,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC;QAEpC,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;YAC/B,OAAO,CAAC,MAAM,CAAC,KAAK,CAClB,aAAa,CAAC,OAAO,EAAE,OAAO,CAAC,OAAO,IAAI,OAAO,CAAC,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,GAAG,IAAI,CACnF,CAAC;QACJ,CAAC;IACH,CAAC;IAED,eAAe,CAAC,MAAM,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;AAC3C,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"json.d.ts","sourceRoot":"","sources":["../../src/reporter/json.ts"],"names":[],"mappings":"AAIA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,mBAAmB,CAAC;AAEpD,wBAAgB,UAAU,CAAC,MAAM,EAAE,UAAU,GAAG,MAAM,CAErD"}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
// ============================================================
|
|
2
|
+
// JSON Reporter — machine-readable structured output
|
|
3
|
+
// ============================================================
|
|
4
|
+
export function reportJson(result) {
|
|
5
|
+
return JSON.stringify(result, null, 2);
|
|
6
|
+
}
|
|
7
|
+
//# sourceMappingURL=json.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"json.js","sourceRoot":"","sources":["../../src/reporter/json.ts"],"names":[],"mappings":"AAAA,+DAA+D;AAC/D,qDAAqD;AACrD,+DAA+D;AAI/D,MAAM,UAAU,UAAU,CAAC,MAAkB;IAC3C,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;AACzC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"llm.d.ts","sourceRoot":"","sources":["../../src/reporter/llm.ts"],"names":[],"mappings":"AAKA,OAAO,KAAK,EAAE,UAAU,EAAqB,MAAM,mBAAmB,CAAC;AAuBvE,wBAAgB,SAAS,CAAC,MAAM,EAAE,UAAU,GAAG,MAAM,CAgDpD"}
|
|
@@ -0,0 +1,66 @@
|
|
|
1
|
+
// ============================================================
|
|
2
|
+
// LLM Reporter — compact format optimized for AI agent consumption
|
|
3
|
+
// Significantly smaller than JSON/SARIF — efficient for context windows
|
|
4
|
+
// ============================================================
|
|
5
|
+
import path from 'path';
|
|
6
|
+
const SEV_SHORT = {
|
|
7
|
+
CRITICAL: 'CRIT',
|
|
8
|
+
HIGH: 'HIGH',
|
|
9
|
+
MEDIUM: 'MED',
|
|
10
|
+
LOW: 'LOW',
|
|
11
|
+
INFO: 'INFO',
|
|
12
|
+
};
|
|
13
|
+
function formatFindingCompact(f) {
|
|
14
|
+
const relPath = path.relative(process.cwd(), f.filePath);
|
|
15
|
+
return [
|
|
16
|
+
`[${SEV_SHORT[f.severity]}] ${f.ruleId} @ ${relPath}:${f.line}`,
|
|
17
|
+
`OWASP:${f.owasp} CWE:${f.cwe}`,
|
|
18
|
+
`MSG: ${f.ruleName}`,
|
|
19
|
+
`CODE: ${f.snippet.split('\n')[0]?.trim().slice(0, 100) ?? ''}`,
|
|
20
|
+
`FIX: ${f.fix.split('\n')[0]?.trim().slice(0, 120) ?? ''}`,
|
|
21
|
+
`REF: ${f.references[0] ?? ''}`,
|
|
22
|
+
].join('\n');
|
|
23
|
+
}
|
|
24
|
+
export function reportLlm(result) {
|
|
25
|
+
const allFindings = result.files.flatMap((f) => f.findings);
|
|
26
|
+
const header = [
|
|
27
|
+
`OWASPSCAN_RESULT score=${result.securityScore}/100 findings=${result.totalFindings} files=${result.totalFiles}`,
|
|
28
|
+
`severity_summary: CRIT=${result.findingsBySeverity.CRITICAL} HIGH=${result.findingsBySeverity.HIGH} MED=${result.findingsBySeverity.MEDIUM} LOW=${result.findingsBySeverity.LOW}`,
|
|
29
|
+
`status: ${result.passed ? 'PASSED' : 'FAILED'}`,
|
|
30
|
+
`scanned: ${result.timestamp}`,
|
|
31
|
+
'---',
|
|
32
|
+
].join('\n');
|
|
33
|
+
if (allFindings.length === 0) {
|
|
34
|
+
return `${header}\nNO_FINDINGS — code passed all OWASP security checks.`;
|
|
35
|
+
}
|
|
36
|
+
// Group by severity to highlight critical first
|
|
37
|
+
const bySeverity = {
|
|
38
|
+
CRITICAL: [],
|
|
39
|
+
HIGH: [],
|
|
40
|
+
MEDIUM: [],
|
|
41
|
+
LOW: [],
|
|
42
|
+
INFO: [],
|
|
43
|
+
};
|
|
44
|
+
for (const f of allFindings) {
|
|
45
|
+
bySeverity[f.severity].push(f);
|
|
46
|
+
}
|
|
47
|
+
const sections = [header];
|
|
48
|
+
const order = ['CRITICAL', 'HIGH', 'MEDIUM', 'LOW', 'INFO'];
|
|
49
|
+
for (const sev of order) {
|
|
50
|
+
const findings = bySeverity[sev];
|
|
51
|
+
if (findings.length === 0)
|
|
52
|
+
continue;
|
|
53
|
+
sections.push(`\n### ${sev} FINDINGS (${findings.length})`);
|
|
54
|
+
for (const f of findings) {
|
|
55
|
+
sections.push(formatFindingCompact(f));
|
|
56
|
+
sections.push('---');
|
|
57
|
+
}
|
|
58
|
+
}
|
|
59
|
+
// Category breakdown
|
|
60
|
+
sections.push('\n### CATEGORY_BREAKDOWN');
|
|
61
|
+
for (const [category, count] of Object.entries(result.findingsByCategory)) {
|
|
62
|
+
sections.push(`${category}: ${count}`);
|
|
63
|
+
}
|
|
64
|
+
return sections.join('\n');
|
|
65
|
+
}
|
|
66
|
+
//# sourceMappingURL=llm.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"llm.js","sourceRoot":"","sources":["../../src/reporter/llm.ts"],"names":[],"mappings":"AAAA,+DAA+D;AAC/D,mEAAmE;AACnE,wEAAwE;AACxE,+DAA+D;AAG/D,OAAO,IAAI,MAAM,MAAM,CAAC;AAExB,MAAM,SAAS,GAA6B;IAC1C,QAAQ,EAAE,MAAM;IAChB,IAAI,EAAE,MAAM;IACZ,MAAM,EAAE,KAAK;IACb,GAAG,EAAE,KAAK;IACV,IAAI,EAAE,MAAM;CACb,CAAC;AAEF,SAAS,oBAAoB,CAAC,CAAU;IACtC,MAAM,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC,QAAQ,CAAC,CAAC;IACzD,OAAO;QACL,IAAI,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,MAAM,MAAM,OAAO,IAAI,CAAC,CAAC,IAAI,EAAE;QAC/D,SAAS,CAAC,CAAC,KAAK,QAAQ,CAAC,CAAC,GAAG,EAAE;QAC/B,QAAQ,CAAC,CAAC,QAAQ,EAAE;QACpB,SAAS,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,KAAK,CAAC,CAAC,EAAE,GAAG,CAAC,IAAI,EAAE,EAAE;QAC/D,QAAQ,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,KAAK,CAAC,CAAC,EAAE,GAAG,CAAC,IAAI,EAAE,EAAE;QAC1D,QAAQ,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,IAAI,EAAE,EAAE;KAChC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;AACf,CAAC;AAED,MAAM,UAAU,SAAS,CAAC,MAAkB;IAC1C,MAAM,WAAW,GAAc,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC;IAEvE,MAAM,MAAM,GAAG;QACb,0BAA0B,MAAM,CAAC,aAAa,iBAAiB,MAAM,CAAC,aAAa,UAAU,MAAM,CAAC,UAAU,EAAE;QAChH,0BAA0B,MAAM,CAAC,kBAAkB,CAAC,QAAQ,SAAS,MAAM,CAAC,kBAAkB,CAAC,IAAI,QAAQ,MAAM,CAAC,kBAAkB,CAAC,MAAM,QAAQ,MAAM,CAAC,kBAAkB,CAAC,GAAG,EAAE;QAClL,WAAW,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,EAAE;QAChD,YAAY,MAAM,CAAC,SAAS,EAAE;QAC9B,KAAK;KACN,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAEb,IAAI,WAAW,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QAC7B,OAAO,GAAG,MAAM,wDAAwD,CAAC;IAC3E,CAAC;IAED,gDAAgD;IAChD,MAAM,UAAU,GAAgC;QAC9C,QAAQ,EAAE,EAAE;QACZ,IAAI,EAAE,EAAE;QACR,MAAM,EAAE,EAAE;QACV,GAAG,EAAE,EAAE;QACP,IAAI,EAAE,EAAE;KACT,CAAC;IAEF,KAAK,MAAM,CAAC,IAAI,WAAW,EAAE,CAAC;QAC5B,UAAU,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;IACjC,CAAC;IAED,MAAM,QAAQ,GAAa,CAAC,MAAM,CAAC,CAAC;IACpC,MAAM,KAAK,GAAe,CAAC,UAAU,EAAE,MAAM,EAAE,QAAQ,EAAE,KAAK,EAAE,MAAM,CAAC,CAAC;IAExE,KAAK,MAAM,GAAG,IAAI,KAAK,EAAE,CAAC;QACxB,MAAM,QAAQ,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC;QACjC,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC;YAAE,SAAS;QACpC,QAAQ,CAAC,IAAI,CAAC,SAAS,GAAG,cAAc,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC;QAC5D,KAAK,MAAM,CAAC,IAAI,QAAQ,EAAE,CAAC;YACzB,QAAQ,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,CAAC,CAAC;YACvC,QAAQ,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACvB,CAAC;IACH,CAAC;IAED,qBAAqB;IACrB,QAAQ,CAAC,IAAI,CAAC,0BAA0B,CAAC,CAAC;IAC1C,KAAK,MAAM,CAAC,QAAQ,EAAE,KAAK,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,kBAAkB,CAAC,EAAE,CAAC;QAC1E,QAAQ,CAAC,IAAI,CAAC,GAAG,QAAQ,KAAK,KAAe,EAAE,CAAC,CAAC;IACnD,CAAC;IAED,OAAO,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;AAC7B,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"sarif.d.ts","sourceRoot":"","sources":["../../src/reporter/sarif.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAE,UAAU,EAAqB,MAAM,mBAAmB,CAAC;AA8GvE,wBAAgB,WAAW,CAAC,MAAM,EAAE,UAAU,GAAG,MAAM,CAkCtD"}
|
|
@@ -0,0 +1,110 @@
|
|
|
1
|
+
// ============================================================
|
|
2
|
+
// SARIF Reporter — Static Analysis Results Interchange Format
|
|
3
|
+
// Compatible with GitHub Code Scanning and GitLab SAST
|
|
4
|
+
// https://docs.oasis-open.org/sarif/sarif/v2.1.0/sarif-v2.1.0.html
|
|
5
|
+
// ============================================================
|
|
6
|
+
import { registry } from '../rules/registry.js';
|
|
7
|
+
const SEVERITY_SARIF = {
|
|
8
|
+
CRITICAL: 'error',
|
|
9
|
+
HIGH: 'error',
|
|
10
|
+
MEDIUM: 'warning',
|
|
11
|
+
LOW: 'note',
|
|
12
|
+
INFO: 'none',
|
|
13
|
+
};
|
|
14
|
+
const SECURITY_SEVERITY_MAP = {
|
|
15
|
+
CRITICAL: '9.8',
|
|
16
|
+
HIGH: '7.5',
|
|
17
|
+
MEDIUM: '5.0',
|
|
18
|
+
LOW: '3.0',
|
|
19
|
+
INFO: '1.0',
|
|
20
|
+
};
|
|
21
|
+
function toSarifUri(filePath) {
|
|
22
|
+
// Convert absolute path to file:// URI
|
|
23
|
+
const normalized = filePath.replace(/\\/g, '/');
|
|
24
|
+
if (normalized.startsWith('/')) {
|
|
25
|
+
return `file://${normalized}`;
|
|
26
|
+
}
|
|
27
|
+
return `file:///${normalized}`;
|
|
28
|
+
}
|
|
29
|
+
function buildSarifRules() {
|
|
30
|
+
return registry.getAll().map((rule) => ({
|
|
31
|
+
id: rule.id,
|
|
32
|
+
name: rule.id.replace(/-/g, ''),
|
|
33
|
+
shortDescription: { text: rule.name },
|
|
34
|
+
fullDescription: { text: rule.description },
|
|
35
|
+
help: {
|
|
36
|
+
text: rule.fix,
|
|
37
|
+
markdown: `## ${rule.name}\n\n${rule.description}\n\n## Remediation\n\n\`\`\`\n${rule.fix}\n\`\`\``,
|
|
38
|
+
},
|
|
39
|
+
helpUri: rule.references[0] ?? 'https://owasp.org/Top10/',
|
|
40
|
+
properties: {
|
|
41
|
+
tags: [rule.owasp, rule.cwe, ...rule.tags],
|
|
42
|
+
security_severity: SECURITY_SEVERITY_MAP[rule.severity],
|
|
43
|
+
'problem.severity': SEVERITY_SARIF[rule.severity],
|
|
44
|
+
precision: 'medium',
|
|
45
|
+
},
|
|
46
|
+
}));
|
|
47
|
+
}
|
|
48
|
+
function buildSarifResult(finding) {
|
|
49
|
+
const result = {
|
|
50
|
+
ruleId: finding.ruleId,
|
|
51
|
+
level: SEVERITY_SARIF[finding.severity],
|
|
52
|
+
message: {
|
|
53
|
+
text: `${finding.ruleName}\n\nOWASP: ${finding.owasp} | ${finding.cwe}\n\n${finding.message}`,
|
|
54
|
+
},
|
|
55
|
+
locations: [
|
|
56
|
+
{
|
|
57
|
+
physicalLocation: {
|
|
58
|
+
artifactLocation: {
|
|
59
|
+
uri: toSarifUri(finding.filePath),
|
|
60
|
+
},
|
|
61
|
+
region: {
|
|
62
|
+
startLine: finding.line,
|
|
63
|
+
startColumn: finding.column,
|
|
64
|
+
},
|
|
65
|
+
},
|
|
66
|
+
},
|
|
67
|
+
],
|
|
68
|
+
fingerprints: {
|
|
69
|
+
'primaryLocationLineHash/v1': `${finding.ruleId}:${finding.filePath}:${finding.line}`,
|
|
70
|
+
},
|
|
71
|
+
properties: {
|
|
72
|
+
confidence: finding.confidence,
|
|
73
|
+
analysisMethod: finding.analysisMethod,
|
|
74
|
+
...(finding.taintPath ? { taintPath: finding.taintPath } : {}),
|
|
75
|
+
},
|
|
76
|
+
};
|
|
77
|
+
return result;
|
|
78
|
+
}
|
|
79
|
+
export function reportSarif(result) {
|
|
80
|
+
const allFindings = result.files.flatMap((f) => f.findings);
|
|
81
|
+
const sarif = {
|
|
82
|
+
$schema: 'https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json',
|
|
83
|
+
version: '2.1.0',
|
|
84
|
+
runs: [
|
|
85
|
+
{
|
|
86
|
+
tool: {
|
|
87
|
+
driver: {
|
|
88
|
+
name: 'OWASPScan',
|
|
89
|
+
version: '1.0.0',
|
|
90
|
+
informationUri: 'https://github.com/owaspscan/owaspscan',
|
|
91
|
+
rules: buildSarifRules(),
|
|
92
|
+
},
|
|
93
|
+
},
|
|
94
|
+
results: allFindings.map(buildSarifResult),
|
|
95
|
+
invocations: [
|
|
96
|
+
{
|
|
97
|
+
executionSuccessful: true,
|
|
98
|
+
startTimeUtc: result.timestamp,
|
|
99
|
+
endTimeUtc: new Date(new Date(result.timestamp).getTime() + result.scanDurationMs).toISOString(),
|
|
100
|
+
},
|
|
101
|
+
],
|
|
102
|
+
automationDetails: {
|
|
103
|
+
id: result.scanId,
|
|
104
|
+
},
|
|
105
|
+
},
|
|
106
|
+
],
|
|
107
|
+
};
|
|
108
|
+
return JSON.stringify(sarif, null, 2);
|
|
109
|
+
}
|
|
110
|
+
//# sourceMappingURL=sarif.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"sarif.js","sourceRoot":"","sources":["../../src/reporter/sarif.ts"],"names":[],"mappings":"AAAA,+DAA+D;AAC/D,8DAA8D;AAC9D,uDAAuD;AACvD,mEAAmE;AACnE,+DAA+D;AAG/D,OAAO,EAAE,QAAQ,EAAE,MAAM,sBAAsB,CAAC;AAEhD,MAAM,cAAc,GAA6B;IAC/C,QAAQ,EAAE,OAAO;IACjB,IAAI,EAAE,OAAO;IACb,MAAM,EAAE,SAAS;IACjB,GAAG,EAAE,MAAM;IACX,IAAI,EAAE,MAAM;CACb,CAAC;AAgCF,MAAM,qBAAqB,GAA6B;IACtD,QAAQ,EAAE,KAAK;IACf,IAAI,EAAE,KAAK;IACX,MAAM,EAAE,KAAK;IACb,GAAG,EAAE,KAAK;IACV,IAAI,EAAE,KAAK;CACZ,CAAC;AAEF,SAAS,UAAU,CAAC,QAAgB;IAClC,uCAAuC;IACvC,MAAM,UAAU,GAAG,QAAQ,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;IAChD,IAAI,UAAU,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,CAAC;QAC/B,OAAO,UAAU,UAAU,EAAE,CAAC;IAChC,CAAC;IACD,OAAO,WAAW,UAAU,EAAE,CAAC;AACjC,CAAC;AAED,SAAS,eAAe;IACtB,OAAO,QAAQ,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACtC,EAAE,EAAE,IAAI,CAAC,EAAE;QACX,IAAI,EAAE,IAAI,CAAC,EAAE,CAAC,OAAO,CAAC,IAAI,EAAE,EAAE,CAAC;QAC/B,gBAAgB,EAAE,EAAE,IAAI,EAAE,IAAI,CAAC,IAAI,EAAE;QACrC,eAAe,EAAE,EAAE,IAAI,EAAE,IAAI,CAAC,WAAW,EAAE;QAC3C,IAAI,EAAE;YACJ,IAAI,EAAE,IAAI,CAAC,GAAG;YACd,QAAQ,EAAE,MAAM,IAAI,CAAC,IAAI,OAAO,IAAI,CAAC,WAAW,iCAAiC,IAAI,CAAC,GAAG,UAAU;SACpG;QACD,OAAO,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,IAAI,0BAA0B;QACzD,UAAU,EAAE;YACV,IAAI,EAAE,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;YAC1C,iBAAiB,EAAE,qBAAqB,CAAC,IAAI,CAAC,QAAQ,CAAC;YACvD,kBAAkB,EAAE,cAAc,CAAC,IAAI,CAAC,QAAQ,CAAC;YACjD,SAAS,EAAE,QAAQ;SACpB;KACF,CAAC,CAAC,CAAC;AACN,CAAC;AAED,SAAS,gBAAgB,CAAC,OAAgB;IACxC,MAAM,MAAM,GAA2D;QACrE,MAAM,EAAE,OAAO,CAAC,MAAM;QACtB,KAAK,EAAE,cAAc,CAAC,OAAO,CAAC,QAAQ,CAAC;QACvC,OAAO,EAAE;YACP,IAAI,EAAE,GAAG,OAAO,CAAC,QAAQ,cAAc,OAAO,CAAC,KAAK,MAAM,OAAO,CAAC,GAAG,OAAO,OAAO,CAAC,OAAO,EAAE;SAC9F;QACD,SAAS,EAAE;YACT;gBACE,gBAAgB,EAAE;oBAChB,gBAAgB,EAAE;wBAChB,GAAG,EAAE,UAAU,CAAC,OAAO,CAAC,QAAQ,CAAC;qBAClC;oBACD,MAAM,EAAE;wBACN,SAAS,EAAE,OAAO,CAAC,IAAI;wBACvB,WAAW,EAAE,OAAO,CAAC,MAAM;qBAC5B;iBACF;aACF;SACF;QACD,YAAY,EAAE;YACZ,4BAA4B,EAAE,GAAG,OAAO,CAAC,MAAM,IAAI,OAAO,CAAC,QAAQ,IAAI,OAAO,CAAC,IAAI,EAAE;SACtF;QACD,UAAU,EAAE;YACV,UAAU,EAAE,OAAO,CAAC,UAAU;YAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;YACtC,GAAG,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,OAAO,CAAC,SAAS,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;SAC/D;KACF,CAAC;IACF,OAAO,MAAM,CAAC;AAChB,CAAC;AAED,MAAM,UAAU,WAAW,CAAC,MAAkB;IAC5C,MAAM,WAAW,GAAc,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC;IAEvE,MAAM,KAAK,GAAG;QACZ,OAAO,EAAE,gGAAgG;QACzG,OAAO,EAAE,OAAO;QAChB,IAAI,EAAE;YACJ;gBACE,IAAI,EAAE;oBACJ,MAAM,EAAE;wBACN,IAAI,EAAE,WAAW;wBACjB,OAAO,EAAE,OAAO;wBAChB,cAAc,EAAE,wCAAwC;wBACxD,KAAK,EAAE,eAAe,EAAE;qBACzB;iBACF;gBACD,OAAO,EAAE,WAAW,CAAC,GAAG,CAAC,gBAAgB,CAAC;gBAC1C,WAAW,EAAE;oBACX;wBACE,mBAAmB,EAAE,IAAI;wBACzB,YAAY,EAAE,MAAM,CAAC,SAAS;wBAC9B,UAAU,EAAE,IAAI,IAAI,CAClB,IAAI,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,GAAG,MAAM,CAAC,cAAc,CAC7D,CAAC,WAAW,EAAE;qBAChB;iBACF;gBACD,iBAAiB,EAAE;oBACjB,EAAE,EAAE,MAAM,CAAC,MAAM;iBAClB;aACF;SACF;KACF,CAAC;IAEF,OAAO,IAAI,CAAC,SAAS,CAAC,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;AACxC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"idor.d.ts","sourceRoot":"","sources":["../../../src/rules/owasp-a01/idor.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,sBAAsB,CAAC;AAEjD,eAAO,MAAM,uBAAuB,EAAE,IAmDrC,CAAC"}
|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
// OWASP A01:2021 — Broken Access Control
|
|
2
|
+
// Rule: Insecure Direct Object Reference (IDOR)
|
|
3
|
+
export const InsecureDirectObjectRef = {
|
|
4
|
+
id: 'OWASP-A01-003',
|
|
5
|
+
name: 'Insecure Direct Object Reference (IDOR)',
|
|
6
|
+
owasp: 'A01:2021',
|
|
7
|
+
cwe: 'CWE-639',
|
|
8
|
+
severity: 'HIGH',
|
|
9
|
+
languages: ['javascript', 'typescript', 'python', 'php', 'java', 'ruby'],
|
|
10
|
+
description: 'Database queries using user-supplied IDs without verifying that the requesting ' +
|
|
11
|
+
'user owns or is authorized to access the resource. Attackers enumerate IDs to ' +
|
|
12
|
+
'access other users\' data. AI tools commonly generate findById(req.params.id) without ownership checks.',
|
|
13
|
+
patterns: [
|
|
14
|
+
{
|
|
15
|
+
// DB queries using req.params.id directly — without ownership check
|
|
16
|
+
pattern: /(?:findById|findOne|findByPk|findByIdAndUpdate|findByIdAndDelete|findByIdAndRemove|getById|fetchById)\s*\(\s*req\s*\.\s*params\s*\.\s*(?:id|userId|orderId|accountId|fileId)/gi,
|
|
17
|
+
suppressIf: /(?:req\.user\.id|currentUser|session\.userId|req\.userId|user_id\s*===?\s*req|\.userId\s*!==?\s*req|ownership|authorize|hasAccess|canAccess|isOwner)/i,
|
|
18
|
+
snippetLines: 5,
|
|
19
|
+
},
|
|
20
|
+
{
|
|
21
|
+
// Python ORM: Model.objects.get(id=request.GET['id']) style
|
|
22
|
+
pattern: /\.objects\.(?:get|filter)\s*\(\s*(?:id|pk|user_id)\s*=\s*request\.(?:GET|POST|data)\[/gi,
|
|
23
|
+
suppressIf: /(?:user=request\.user|owner=request\.user|request\.user\.id|user__id=request\.user)/i,
|
|
24
|
+
snippetLines: 5,
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
// Raw SQL with user ID: "WHERE id = " + req.params.id
|
|
28
|
+
pattern: /WHERE\s+id\s*=\s*['"$]?\s*\+\s*(?:req\.|request\.)(?:params|body|query)/gi,
|
|
29
|
+
snippetLines: 3,
|
|
30
|
+
},
|
|
31
|
+
],
|
|
32
|
+
fix: 'Always verify resource ownership before returning or modifying data.\n\n' +
|
|
33
|
+
'// Node.js / Mongoose example:\n' +
|
|
34
|
+
'const document = await Model.findOne({\n' +
|
|
35
|
+
' _id: req.params.id,\n' +
|
|
36
|
+
' owner: req.user.id, // ownership check — the querying user MUST own it\n' +
|
|
37
|
+
'});\n' +
|
|
38
|
+
'if (!document) return res.status(404).json({ error: "Not found" });\n\n' +
|
|
39
|
+
'// Django example:\n' +
|
|
40
|
+
'obj = get_object_or_404(Model, pk=pk, owner=request.user)',
|
|
41
|
+
references: [
|
|
42
|
+
'https://owasp.org/Top10/A01_2021-Broken_Access_Control/',
|
|
43
|
+
'https://cwe.mitre.org/data/definitions/639.html',
|
|
44
|
+
'https://portswigger.net/web-security/access-control/idor',
|
|
45
|
+
],
|
|
46
|
+
tags: ['idor', 'access-control', 'authorization', 'database'],
|
|
47
|
+
};
|
|
48
|
+
//# sourceMappingURL=idor.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"idor.js","sourceRoot":"","sources":["../../../src/rules/owasp-a01/idor.ts"],"names":[],"mappings":"AAAA,yCAAyC;AACzC,gDAAgD;AAIhD,MAAM,CAAC,MAAM,uBAAuB,GAAS;IAC3C,EAAE,EAAE,eAAe;IACnB,IAAI,EAAE,yCAAyC;IAC/C,KAAK,EAAE,UAAU;IACjB,GAAG,EAAE,SAAS;IACd,QAAQ,EAAE,MAAM;IAChB,SAAS,EAAE,CAAC,YAAY,EAAE,YAAY,EAAE,QAAQ,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC;IACxE,WAAW,EACT,iFAAiF;QACjF,gFAAgF;QAChF,yGAAyG;IAC3G,QAAQ,EAAE;QACR;YACE,oEAAoE;YACpE,OAAO,EACL,gLAAgL;YAClL,UAAU,EACR,uJAAuJ;YACzJ,YAAY,EAAE,CAAC;SAChB;QACD;YACE,4DAA4D;YAC5D,OAAO,EACL,yFAAyF;YAC3F,UAAU,EACR,sFAAsF;YACxF,YAAY,EAAE,CAAC;SAChB;QACD;YACE,sDAAsD;YACtD,OAAO,EACL,2EAA2E;YAC7E,YAAY,EAAE,CAAC;SAChB;KACF;IACD,GAAG,EACD,0EAA0E;QAC1E,kCAAkC;QAClC,0CAA0C;QAC1C,yBAAyB;QACzB,4EAA4E;QAC5E,OAAO;QACP,yEAAyE;QACzE,sBAAsB;QACtB,2DAA2D;IAC7D,UAAU,EAAE;QACV,yDAAyD;QACzD,iDAAiD;QACjD,0DAA0D;KAC3D;IACD,IAAI,EAAE,CAAC,MAAM,EAAE,gBAAgB,EAAE,eAAe,EAAE,UAAU,CAAC;CAC9D,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"missing-auth-middleware.d.ts","sourceRoot":"","sources":["../../../src/rules/owasp-a01/missing-auth-middleware.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,sBAAsB,CAAC;AAEjD,eAAO,MAAM,qBAAqB,EAAE,IA2CnC,CAAC"}
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
// OWASP A01:2021 — Broken Access Control
|
|
2
|
+
// Rule: Missing authentication/authorization middleware on routes
|
|
3
|
+
export const MissingAuthMiddleware = {
|
|
4
|
+
id: 'OWASP-A01-001',
|
|
5
|
+
name: 'Missing Authentication Middleware on Route',
|
|
6
|
+
owasp: 'A01:2021',
|
|
7
|
+
cwe: 'CWE-862',
|
|
8
|
+
severity: 'HIGH',
|
|
9
|
+
languages: ['javascript', 'typescript'],
|
|
10
|
+
description: 'Route handler defined without an authentication or authorization middleware. ' +
|
|
11
|
+
'AI assistants frequently generate CRUD routes missing auth guards, leaving ' +
|
|
12
|
+
'sensitive endpoints publicly accessible.',
|
|
13
|
+
patterns: [
|
|
14
|
+
{
|
|
15
|
+
// Express-style: app.get/post/put/delete/patch('/sensitive-path', handler)
|
|
16
|
+
// without an auth middleware in between
|
|
17
|
+
pattern: /(?:app|router)\s*\.\s*(?:get|post|put|patch|delete|all)\s*\(\s*['"`][^'"`]*(?:admin|user|profile|account|dashboard|settings|payment|order|invoice|secret|private|internal|api\/v\d)[^'"`]*['"`]\s*,\s*(?:async\s*)?\(\s*req/gi,
|
|
18
|
+
suppressIf: /(?:authenticate|authorize|requireAuth|isAuthenticated|verifyToken|checkAuth|passport\.authenticate|authMiddleware|protect|guard|requireLogin|isAdmin|hasRole|permit|acl|rbac)\s*(?:,|\()/i,
|
|
19
|
+
snippetLines: 3,
|
|
20
|
+
},
|
|
21
|
+
{
|
|
22
|
+
// FastAPI/Flask-style missing auth decorator on sensitive routes
|
|
23
|
+
pattern: /@(?:app|router)\.(?:get|post|put|patch|delete)\s*\(\s*['"`][^'"`]*(?:admin|user|profile|account|dashboard|settings|payment|order|secret|private|internal)[^'"`]*['"`]/gi,
|
|
24
|
+
suppressIf: /(?:Depends\s*\(|@login_required|@auth_required|@permission_required|requires_auth|get_current_user|current_user)/i,
|
|
25
|
+
snippetLines: 3,
|
|
26
|
+
},
|
|
27
|
+
],
|
|
28
|
+
fix: 'Add authentication middleware before your route handler.\n\n' +
|
|
29
|
+
'// Express example:\n' +
|
|
30
|
+
'app.get("/api/users", authenticate, authorize("admin"), async (req, res) => { ... });\n\n' +
|
|
31
|
+
'// FastAPI example:\n' +
|
|
32
|
+
'@router.get("/users")\n' +
|
|
33
|
+
'async def get_users(current_user: User = Depends(get_current_user)):\n' +
|
|
34
|
+
' ...',
|
|
35
|
+
references: [
|
|
36
|
+
'https://owasp.org/Top10/A01_2021-Broken_Access_Control/',
|
|
37
|
+
'https://cwe.mitre.org/data/definitions/862.html',
|
|
38
|
+
],
|
|
39
|
+
tags: ['access-control', 'authorization', 'middleware', 'routing'],
|
|
40
|
+
};
|
|
41
|
+
//# sourceMappingURL=missing-auth-middleware.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"missing-auth-middleware.js","sourceRoot":"","sources":["../../../src/rules/owasp-a01/missing-auth-middleware.ts"],"names":[],"mappings":"AAAA,yCAAyC;AACzC,kEAAkE;AAIlE,MAAM,CAAC,MAAM,qBAAqB,GAAS;IACzC,EAAE,EAAE,eAAe;IACnB,IAAI,EAAE,4CAA4C;IAClD,KAAK,EAAE,UAAU;IACjB,GAAG,EAAE,SAAS;IACd,QAAQ,EAAE,MAAM;IAChB,SAAS,EAAE,CAAC,YAAY,EAAE,YAAY,CAAC;IACvC,WAAW,EACT,+EAA+E;QAC/E,6EAA6E;QAC7E,0CAA0C;IAC5C,QAAQ,EAAE;QACR;YACE,2EAA2E;YAC3E,wCAAwC;YACxC,OAAO,EACL,+NAA+N;YACjO,UAAU,EACR,2LAA2L;YAC7L,YAAY,EAAE,CAAC;SAChB;QACD;YACE,iEAAiE;YACjE,OAAO,EACL,yKAAyK;YAC3K,UAAU,EACR,mHAAmH;YACrH,YAAY,EAAE,CAAC;SAChB;KACF;IACD,GAAG,EACD,8DAA8D;QAC9D,uBAAuB;QACvB,2FAA2F;QAC3F,uBAAuB;QACvB,yBAAyB;QACzB,wEAAwE;QACxE,SAAS;IACX,UAAU,EAAE;QACV,yDAAyD;QACzD,iDAAiD;KAClD;IACD,IAAI,EAAE,CAAC,gBAAgB,EAAE,eAAe,EAAE,YAAY,EAAE,SAAS,CAAC;CACnE,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"path-traversal.d.ts","sourceRoot":"","sources":["../../../src/rules/owasp-a01/path-traversal.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,sBAAsB,CAAC;AAEjD,eAAO,MAAM,aAAa,EAAE,IA8E3B,CAAC"}
|
|
@@ -0,0 +1,73 @@
|
|
|
1
|
+
// OWASP A01:2021 — Broken Access Control
|
|
2
|
+
// Rule: Path Traversal via unsanitized user input to file operations
|
|
3
|
+
export const PathTraversal = {
|
|
4
|
+
id: 'OWASP-A01-002',
|
|
5
|
+
name: 'Path Traversal via Unsanitized User Input',
|
|
6
|
+
owasp: 'A01:2021',
|
|
7
|
+
cwe: 'CWE-22',
|
|
8
|
+
severity: 'CRITICAL',
|
|
9
|
+
languages: ['javascript', 'typescript', 'python', 'php', 'java', 'go', 'ruby'],
|
|
10
|
+
description: 'File system operations (read, write, delete) using user-controlled input without ' +
|
|
11
|
+
'path sanitization allow attackers to traverse directories (e.g., ../../../../etc/passwd). ' +
|
|
12
|
+
'AI tools commonly generate fs.readFile(req.params.file) style code.',
|
|
13
|
+
patterns: [
|
|
14
|
+
{
|
|
15
|
+
// Node.js: fs operations with req.body/params/query (direct)
|
|
16
|
+
pattern: /(?:fs|fsPromises|promises)\s*\.\s*(?:readFile|readFileSync|writeFile|writeFileSync|appendFile|unlink|rmdir|mkdir|stat|access|open)\s*\(\s*(?:req\.|request\.)(?:body|params|query|headers)/gi,
|
|
17
|
+
snippetLines: 3,
|
|
18
|
+
},
|
|
19
|
+
{
|
|
20
|
+
// Node.js: fs operations with string concat including user input
|
|
21
|
+
pattern: /(?:fs|fsPromises|promises)\s*\.\s*(?:readFile|readFileSync|writeFile|writeFileSync|appendFile|unlink|stat|access|open)\s*\([^\n]*\+\s*(?:req\.|request\.)(?:body|params|query)/gi,
|
|
22
|
+
snippetLines: 3,
|
|
23
|
+
},
|
|
24
|
+
{
|
|
25
|
+
// path.join/resolve with user input
|
|
26
|
+
pattern: /path\s*\.\s*(?:join|resolve)\s*\([^)]*(?:req\.|request\.)(?:body|params|query)/gi,
|
|
27
|
+
snippetLines: 3,
|
|
28
|
+
},
|
|
29
|
+
{
|
|
30
|
+
// Python: open() with user input
|
|
31
|
+
pattern: /open\s*\(\s*(?:request\.|req\.)(?:args|form|json|data|params|files)\[/gi,
|
|
32
|
+
snippetLines: 3,
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
// Python: os.path operations with user input
|
|
36
|
+
pattern: /os\.path\.(?:join|abspath|realpath)\s*\([^)]*(?:request\.|req\.)(?:args|form|json|data)/gi,
|
|
37
|
+
snippetLines: 3,
|
|
38
|
+
},
|
|
39
|
+
{
|
|
40
|
+
// PHP: file operations with $_GET/$_POST/$_REQUEST
|
|
41
|
+
pattern: /(?:file_get_contents|fopen|readfile|include|require|include_once|require_once)\s*\(\s*\$_(?:GET|POST|REQUEST|FILES)\s*\[/gi,
|
|
42
|
+
snippetLines: 3,
|
|
43
|
+
},
|
|
44
|
+
{
|
|
45
|
+
// Generic: string concatenation to build file paths with user input
|
|
46
|
+
pattern: /(?:__dirname|__filename|process\.cwd\(\)|os\.getcwd\(\))\s*\+\s*.*(?:req\.|request\.)(?:body|params|query)/gi,
|
|
47
|
+
snippetLines: 3,
|
|
48
|
+
},
|
|
49
|
+
],
|
|
50
|
+
fix: 'Always sanitize file paths from user input. Resolve to a canonical path and verify it stays within the allowed base directory.\n\n' +
|
|
51
|
+
'// Node.js example:\n' +
|
|
52
|
+
'import path from "path";\n' +
|
|
53
|
+
'const BASE_DIR = path.resolve("./uploads");\n' +
|
|
54
|
+
'const userFile = req.params.filename;\n' +
|
|
55
|
+
'const resolved = path.resolve(BASE_DIR, path.basename(userFile)); // basename strips ../\n' +
|
|
56
|
+
'if (!resolved.startsWith(BASE_DIR)) {\n' +
|
|
57
|
+
' return res.status(400).send("Invalid file path");\n' +
|
|
58
|
+
'}\n' +
|
|
59
|
+
'const content = await fs.readFile(resolved, "utf8");\n\n' +
|
|
60
|
+
'// Python example:\n' +
|
|
61
|
+
'import os\n' +
|
|
62
|
+
'BASE_DIR = os.path.abspath("./uploads")\n' +
|
|
63
|
+
'safe_path = os.path.realpath(os.path.join(BASE_DIR, filename))\n' +
|
|
64
|
+
'if not safe_path.startswith(BASE_DIR):\n' +
|
|
65
|
+
' raise ValueError("Path traversal detected")',
|
|
66
|
+
references: [
|
|
67
|
+
'https://owasp.org/Top10/A01_2021-Broken_Access_Control/',
|
|
68
|
+
'https://cwe.mitre.org/data/definitions/22.html',
|
|
69
|
+
'https://owasp.org/www-community/attacks/Path_Traversal',
|
|
70
|
+
],
|
|
71
|
+
tags: ['path-traversal', 'file-system', 'injection', 'access-control'],
|
|
72
|
+
};
|
|
73
|
+
//# sourceMappingURL=path-traversal.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"path-traversal.js","sourceRoot":"","sources":["../../../src/rules/owasp-a01/path-traversal.ts"],"names":[],"mappings":"AAAA,yCAAyC;AACzC,qEAAqE;AAIrE,MAAM,CAAC,MAAM,aAAa,GAAS;IACjC,EAAE,EAAE,eAAe;IACnB,IAAI,EAAE,2CAA2C;IACjD,KAAK,EAAE,UAAU;IACjB,GAAG,EAAE,QAAQ;IACb,QAAQ,EAAE,UAAU;IACpB,SAAS,EAAE,CAAC,YAAY,EAAE,YAAY,EAAE,QAAQ,EAAE,KAAK,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,CAAC;IAC9E,WAAW,EACT,mFAAmF;QACnF,4FAA4F;QAC5F,qEAAqE;IACvE,QAAQ,EAAE;QACR;YACE,6DAA6D;YAC7D,OAAO,EACL,8LAA8L;YAChM,YAAY,EAAE,CAAC;SAChB;QACD;YACE,iEAAiE;YACjE,OAAO,EACL,kLAAkL;YACpL,YAAY,EAAE,CAAC;SAChB;QACD;YACE,oCAAoC;YACpC,OAAO,EACL,kFAAkF;YACpF,YAAY,EAAE,CAAC;SAChB;QACD;YACE,iCAAiC;YACjC,OAAO,EACL,yEAAyE;YAC3E,YAAY,EAAE,CAAC;SAChB;QACD;YACE,6CAA6C;YAC7C,OAAO,EACL,2FAA2F;YAC7F,YAAY,EAAE,CAAC;SAChB;QACD;YACE,mDAAmD;YACnD,OAAO,EACL,4HAA4H;YAC9H,YAAY,EAAE,CAAC;SAChB;QACD;YACE,oEAAoE;YACpE,OAAO,EACL,8GAA8G;YAChH,YAAY,EAAE,CAAC;SAChB;KACF;IACD,GAAG,EACD,oIAAoI;QACpI,uBAAuB;QACvB,4BAA4B;QAC5B,+CAA+C;QAC/C,yCAAyC;QACzC,4FAA4F;QAC5F,yCAAyC;QACzC,uDAAuD;QACvD,KAAK;QACL,0DAA0D;QAC1D,sBAAsB;QACtB,aAAa;QACb,2CAA2C;QAC3C,kEAAkE;QAClE,0CAA0C;QAC1C,iDAAiD;IACnD,UAAU,EAAE;QACV,yDAAyD;QACzD,gDAAgD;QAChD,wDAAwD;KACzD;IACD,IAAI,EAAE,CAAC,gBAAgB,EAAE,aAAa,EAAE,WAAW,EAAE,gBAAgB,CAAC;CACvE,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"hardcoded-secrets.d.ts","sourceRoot":"","sources":["../../../src/rules/owasp-a02/hardcoded-secrets.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,sBAAsB,CAAC;AAEjD,eAAO,MAAM,gBAAgB,EAAE,IAwG9B,CAAC"}
|