@vibecheckai/cli 3.2.2 → 3.2.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (170) hide show
  1. package/bin/.generated +25 -25
  2. package/bin/dev/run-v2-torture.js +30 -30
  3. package/bin/runners/ENHANCEMENT_GUIDE.md +121 -121
  4. package/bin/runners/lib/__tests__/entitlements-v2.test.js +295 -295
  5. package/bin/runners/lib/agent-firewall/ai/false-positive-analyzer.js +474 -0
  6. package/bin/runners/lib/agent-firewall/claims/extractor.js +117 -28
  7. package/bin/runners/lib/agent-firewall/evidence/env-evidence.js +23 -14
  8. package/bin/runners/lib/agent-firewall/evidence/route-evidence.js +72 -1
  9. package/bin/runners/lib/agent-firewall/interceptor/base.js +2 -2
  10. package/bin/runners/lib/agent-firewall/policy/default-policy.json +6 -0
  11. package/bin/runners/lib/agent-firewall/policy/engine.js +34 -3
  12. package/bin/runners/lib/agent-firewall/policy/rules/fake-success.js +29 -4
  13. package/bin/runners/lib/agent-firewall/policy/rules/ghost-route.js +12 -0
  14. package/bin/runners/lib/agent-firewall/truthpack/loader.js +21 -0
  15. package/bin/runners/lib/agent-firewall/utils/ignore-checker.js +118 -0
  16. package/bin/runners/lib/analyzers.js +606 -325
  17. package/bin/runners/lib/auth-truth.js +193 -193
  18. package/bin/runners/lib/backup.js +62 -62
  19. package/bin/runners/lib/billing.js +107 -107
  20. package/bin/runners/lib/claims.js +118 -118
  21. package/bin/runners/lib/cli-ui.js +540 -540
  22. package/bin/runners/lib/contracts/auth-contract.js +202 -202
  23. package/bin/runners/lib/contracts/env-contract.js +181 -181
  24. package/bin/runners/lib/contracts/external-contract.js +206 -206
  25. package/bin/runners/lib/contracts/guard.js +168 -168
  26. package/bin/runners/lib/contracts/index.js +89 -89
  27. package/bin/runners/lib/contracts/plan-validator.js +311 -311
  28. package/bin/runners/lib/contracts/route-contract.js +199 -199
  29. package/bin/runners/lib/contracts.js +804 -804
  30. package/bin/runners/lib/detect.js +89 -89
  31. package/bin/runners/lib/doctor/autofix.js +254 -254
  32. package/bin/runners/lib/doctor/index.js +37 -37
  33. package/bin/runners/lib/doctor/modules/dependencies.js +325 -325
  34. package/bin/runners/lib/doctor/modules/index.js +46 -46
  35. package/bin/runners/lib/doctor/modules/network.js +250 -250
  36. package/bin/runners/lib/doctor/modules/project.js +312 -312
  37. package/bin/runners/lib/doctor/modules/runtime.js +224 -224
  38. package/bin/runners/lib/doctor/modules/security.js +348 -348
  39. package/bin/runners/lib/doctor/modules/system.js +213 -213
  40. package/bin/runners/lib/doctor/modules/vibecheck.js +394 -394
  41. package/bin/runners/lib/doctor/reporter.js +262 -262
  42. package/bin/runners/lib/doctor/service.js +262 -262
  43. package/bin/runners/lib/doctor/types.js +113 -113
  44. package/bin/runners/lib/doctor/ui.js +263 -263
  45. package/bin/runners/lib/doctor-v2.js +608 -608
  46. package/bin/runners/lib/drift.js +425 -425
  47. package/bin/runners/lib/enforcement.js +72 -72
  48. package/bin/runners/lib/engines/accessibility-engine.js +190 -0
  49. package/bin/runners/lib/engines/api-consistency-engine.js +162 -0
  50. package/bin/runners/lib/engines/ast-cache.js +99 -0
  51. package/bin/runners/lib/engines/code-quality-engine.js +255 -0
  52. package/bin/runners/lib/engines/console-logs-engine.js +115 -0
  53. package/bin/runners/lib/engines/cross-file-analysis-engine.js +268 -0
  54. package/bin/runners/lib/engines/dead-code-engine.js +198 -0
  55. package/bin/runners/lib/engines/deprecated-api-engine.js +226 -0
  56. package/bin/runners/lib/engines/empty-catch-engine.js +150 -0
  57. package/bin/runners/lib/engines/file-filter.js +131 -0
  58. package/bin/runners/lib/engines/hardcoded-secrets-engine.js +251 -0
  59. package/bin/runners/lib/engines/mock-data-engine.js +272 -0
  60. package/bin/runners/lib/engines/parallel-processor.js +71 -0
  61. package/bin/runners/lib/engines/performance-issues-engine.js +265 -0
  62. package/bin/runners/lib/engines/security-vulnerabilities-engine.js +243 -0
  63. package/bin/runners/lib/engines/todo-fixme-engine.js +115 -0
  64. package/bin/runners/lib/engines/type-aware-engine.js +152 -0
  65. package/bin/runners/lib/engines/unsafe-regex-engine.js +225 -0
  66. package/bin/runners/lib/engines/vibecheck-engines/README.md +53 -0
  67. package/bin/runners/lib/engines/vibecheck-engines/index.js +15 -0
  68. package/bin/runners/lib/engines/vibecheck-engines/lib/ast-cache.js +164 -0
  69. package/bin/runners/lib/engines/vibecheck-engines/lib/code-quality-engine.js +291 -0
  70. package/bin/runners/lib/engines/vibecheck-engines/lib/console-logs-engine.js +83 -0
  71. package/bin/runners/lib/engines/vibecheck-engines/lib/dead-code-engine.js +198 -0
  72. package/bin/runners/lib/engines/vibecheck-engines/lib/deprecated-api-engine.js +275 -0
  73. package/bin/runners/lib/engines/vibecheck-engines/lib/empty-catch-engine.js +167 -0
  74. package/bin/runners/lib/engines/vibecheck-engines/lib/file-filter.js +217 -0
  75. package/bin/runners/lib/engines/vibecheck-engines/lib/hardcoded-secrets-engine.js +139 -0
  76. package/bin/runners/lib/engines/vibecheck-engines/lib/mock-data-engine.js +140 -0
  77. package/bin/runners/lib/engines/vibecheck-engines/lib/parallel-processor.js +164 -0
  78. package/bin/runners/lib/engines/vibecheck-engines/lib/performance-issues-engine.js +234 -0
  79. package/bin/runners/lib/engines/vibecheck-engines/lib/type-aware-engine.js +217 -0
  80. package/bin/runners/lib/engines/vibecheck-engines/lib/unsafe-regex-engine.js +78 -0
  81. package/bin/runners/lib/engines/vibecheck-engines/package.json +13 -0
  82. package/bin/runners/lib/enterprise-detect.js +603 -603
  83. package/bin/runners/lib/enterprise-init.js +942 -942
  84. package/bin/runners/lib/env-resolver.js +417 -417
  85. package/bin/runners/lib/env-template.js +66 -66
  86. package/bin/runners/lib/env.js +189 -189
  87. package/bin/runners/lib/extractors/client-calls.js +990 -990
  88. package/bin/runners/lib/extractors/fastify-route-dump.js +573 -573
  89. package/bin/runners/lib/extractors/fastify-routes.js +426 -426
  90. package/bin/runners/lib/extractors/index.js +363 -363
  91. package/bin/runners/lib/extractors/next-routes.js +524 -524
  92. package/bin/runners/lib/extractors/proof-graph.js +431 -431
  93. package/bin/runners/lib/extractors/route-matcher.js +451 -451
  94. package/bin/runners/lib/extractors/truthpack-v2.js +377 -377
  95. package/bin/runners/lib/extractors/ui-bindings.js +547 -547
  96. package/bin/runners/lib/findings-schema.js +281 -281
  97. package/bin/runners/lib/firewall-prompt.js +50 -50
  98. package/bin/runners/lib/global-flags.js +213 -213
  99. package/bin/runners/lib/graph/graph-builder.js +265 -265
  100. package/bin/runners/lib/graph/html-renderer.js +413 -413
  101. package/bin/runners/lib/graph/index.js +32 -32
  102. package/bin/runners/lib/graph/runtime-collector.js +215 -215
  103. package/bin/runners/lib/graph/static-extractor.js +518 -518
  104. package/bin/runners/lib/html-report.js +650 -650
  105. package/bin/runners/lib/interactive-menu.js +1496 -1496
  106. package/bin/runners/lib/llm.js +75 -75
  107. package/bin/runners/lib/meter.js +61 -61
  108. package/bin/runners/lib/missions/evidence.js +126 -126
  109. package/bin/runners/lib/patch.js +40 -40
  110. package/bin/runners/lib/permissions/auth-model.js +213 -213
  111. package/bin/runners/lib/permissions/idor-prover.js +205 -205
  112. package/bin/runners/lib/permissions/index.js +45 -45
  113. package/bin/runners/lib/permissions/matrix-builder.js +198 -198
  114. package/bin/runners/lib/pkgjson.js +28 -28
  115. package/bin/runners/lib/policy.js +295 -295
  116. package/bin/runners/lib/preflight.js +142 -142
  117. package/bin/runners/lib/reality/correlation-detectors.js +359 -359
  118. package/bin/runners/lib/reality/index.js +318 -318
  119. package/bin/runners/lib/reality/request-hashing.js +416 -416
  120. package/bin/runners/lib/reality/request-mapper.js +453 -453
  121. package/bin/runners/lib/reality/safety-rails.js +463 -463
  122. package/bin/runners/lib/reality/semantic-snapshot.js +408 -408
  123. package/bin/runners/lib/reality/toast-detector.js +393 -393
  124. package/bin/runners/lib/reality-findings.js +84 -84
  125. package/bin/runners/lib/receipts.js +179 -179
  126. package/bin/runners/lib/redact.js +29 -29
  127. package/bin/runners/lib/replay/capsule-manager.js +154 -154
  128. package/bin/runners/lib/replay/index.js +263 -263
  129. package/bin/runners/lib/replay/player.js +348 -348
  130. package/bin/runners/lib/replay/recorder.js +331 -331
  131. package/bin/runners/lib/report-output.js +187 -187
  132. package/bin/runners/lib/report.js +135 -135
  133. package/bin/runners/lib/route-detection.js +1140 -1140
  134. package/bin/runners/lib/sandbox/index.js +59 -59
  135. package/bin/runners/lib/sandbox/proof-chain.js +399 -399
  136. package/bin/runners/lib/sandbox/sandbox-runner.js +205 -205
  137. package/bin/runners/lib/sandbox/worktree.js +174 -174
  138. package/bin/runners/lib/scan-output.js +525 -190
  139. package/bin/runners/lib/schema-validator.js +350 -350
  140. package/bin/runners/lib/schemas/contracts.schema.json +160 -160
  141. package/bin/runners/lib/schemas/finding.schema.json +100 -100
  142. package/bin/runners/lib/schemas/mission-pack.schema.json +206 -206
  143. package/bin/runners/lib/schemas/proof-graph.schema.json +176 -176
  144. package/bin/runners/lib/schemas/reality-report.schema.json +162 -162
  145. package/bin/runners/lib/schemas/share-pack.schema.json +180 -180
  146. package/bin/runners/lib/schemas/ship-report.schema.json +117 -117
  147. package/bin/runners/lib/schemas/truthpack-v2.schema.json +303 -303
  148. package/bin/runners/lib/schemas/validator.js +438 -438
  149. package/bin/runners/lib/score-history.js +282 -282
  150. package/bin/runners/lib/share-pack.js +239 -239
  151. package/bin/runners/lib/snippets.js +67 -67
  152. package/bin/runners/lib/status-output.js +253 -253
  153. package/bin/runners/lib/terminal-ui.js +351 -271
  154. package/bin/runners/lib/upsell.js +510 -510
  155. package/bin/runners/lib/usage.js +153 -153
  156. package/bin/runners/lib/validate-patch.js +156 -156
  157. package/bin/runners/lib/verdict-engine.js +628 -628
  158. package/bin/runners/reality/engine.js +917 -917
  159. package/bin/runners/reality/flows.js +122 -122
  160. package/bin/runners/reality/report.js +378 -378
  161. package/bin/runners/reality/session.js +193 -193
  162. package/bin/runners/runGuard.js +168 -168
  163. package/bin/runners/runProof.zip +0 -0
  164. package/bin/runners/runProve.js +8 -0
  165. package/bin/runners/runReality.js +14 -0
  166. package/bin/runners/runScan.js +17 -1
  167. package/bin/runners/runTruth.js +15 -3
  168. package/mcp-server/tier-auth.js +4 -4
  169. package/mcp-server/tools/index.js +72 -72
  170. package/package.json +1 -1
@@ -1,348 +1,348 @@
1
- /**
2
- * Security Diagnostics Module
3
- *
4
- * Checks for exposed secrets, gitignore configuration, and security best practices
5
- */
6
-
7
- const fs = require('fs');
8
- const path = require('path');
9
- const { SEVERITY, CATEGORY, FIX_TYPE } = require('../types');
10
-
11
- const MODULE_ID = 'security';
12
-
13
- const SECRET_PATTERNS = [
14
- { name: 'Stripe Live Key', pattern: /sk_live_[a-zA-Z0-9]{20,}/, critical: true },
15
- { name: 'Stripe Test Key', pattern: /sk_test_[a-zA-Z0-9]{20,}/, critical: false },
16
- { name: 'AWS Access Key', pattern: /AKIA[0-9A-Z]{16}/, critical: true },
17
- { name: 'GitHub Token', pattern: /ghp_[a-zA-Z0-9]{36}/, critical: true },
18
- { name: 'GitHub OAuth', pattern: /gho_[a-zA-Z0-9]{36}/, critical: true },
19
- { name: 'Private Key', pattern: /-----BEGIN (RSA |EC |DSA |OPENSSH )?PRIVATE KEY-----/, critical: true },
20
- { name: 'Generic API Key', pattern: /api[_-]?key['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
21
- { name: 'Generic Secret', pattern: /secret['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
22
- { name: 'Database URL', pattern: /postgres(ql)?:\/\/[^:]+:[^@]+@/, critical: true },
23
- { name: 'MongoDB URL', pattern: /mongodb(\+srv)?:\/\/[^:]+:[^@]+@/, critical: true },
24
- ];
25
-
26
- const REQUIRED_GITIGNORE = [
27
- { pattern: '.env', name: '.env files' },
28
- { pattern: 'node_modules', name: 'node_modules' },
29
- { pattern: '.vibecheck', name: '.vibecheck output' },
30
- ];
31
-
32
- function createDiagnostics(projectPath) {
33
- return [
34
- {
35
- id: `${MODULE_ID}.env_file`,
36
- name: '.env File',
37
- category: CATEGORY.SECURITY,
38
- parallel: true,
39
- check: async () => {
40
- const envPath = path.join(projectPath, '.env');
41
- const envExamplePath = path.join(projectPath, '.env.example');
42
- const envLocalPath = path.join(projectPath, '.env.local');
43
-
44
- const hasEnv = fs.existsSync(envPath);
45
- const hasEnvExample = fs.existsSync(envExamplePath);
46
- const hasEnvLocal = fs.existsSync(envLocalPath);
47
-
48
- const metadata = { hasEnv, hasEnvExample, hasEnvLocal };
49
-
50
- if (!hasEnv && !hasEnvLocal) {
51
- return {
52
- severity: SEVERITY.INFO,
53
- message: 'No .env file found',
54
- detail: 'Create .env for local environment variables',
55
- metadata,
56
- fixes: [{
57
- type: FIX_TYPE.FILE_CREATE,
58
- description: 'Create .env from example',
59
- path: envPath,
60
- content: hasEnvExample
61
- ? fs.readFileSync(envExamplePath, 'utf8')
62
- : '# Environment variables\n',
63
- autoFixable: true,
64
- }],
65
- };
66
- }
67
-
68
- if (hasEnv && !hasEnvExample) {
69
- return {
70
- severity: SEVERITY.WARNING,
71
- message: '.env exists but no .env.example',
72
- detail: 'Create .env.example for team documentation',
73
- metadata,
74
- fixes: [{
75
- type: FIX_TYPE.COMMAND,
76
- description: 'Generate .env.example from .env',
77
- command: 'vibecheck ctx --env-template',
78
- autoFixable: false,
79
- }],
80
- };
81
- }
82
-
83
- return {
84
- severity: SEVERITY.PASS,
85
- message: hasEnvExample ? '.env + .env.example' : '.env configured',
86
- metadata,
87
- };
88
- },
89
- },
90
- {
91
- id: `${MODULE_ID}.gitignore`,
92
- name: '.gitignore',
93
- category: CATEGORY.SECURITY,
94
- parallel: true,
95
- check: async () => {
96
- const gitignorePath = path.join(projectPath, '.gitignore');
97
-
98
- if (!fs.existsSync(gitignorePath)) {
99
- return {
100
- severity: SEVERITY.WARNING,
101
- message: 'No .gitignore file',
102
- detail: 'Secrets and build artifacts may be committed to git',
103
- fixes: [{
104
- type: FIX_TYPE.FILE_CREATE,
105
- description: 'Create .gitignore with common patterns',
106
- path: gitignorePath,
107
- content: [
108
- '# Dependencies',
109
- 'node_modules/',
110
- '',
111
- '# Environment',
112
- '.env',
113
- '.env.local',
114
- '.env.*.local',
115
- '',
116
- '# Build',
117
- 'dist/',
118
- 'build/',
119
- '.next/',
120
- '',
121
- '# vibecheck',
122
- '.vibecheck/',
123
- '',
124
- '# IDE',
125
- '.idea/',
126
- '.vscode/',
127
- '*.swp',
128
- ].join('\n'),
129
- autoFixable: true,
130
- }],
131
- };
132
- }
133
-
134
- const content = fs.readFileSync(gitignorePath, 'utf8');
135
- const missing = REQUIRED_GITIGNORE.filter(r => !content.includes(r.pattern));
136
-
137
- const metadata = {
138
- missing: missing.map(m => m.pattern),
139
- lines: content.split('\n').length,
140
- };
141
-
142
- if (missing.length > 0) {
143
- return {
144
- severity: SEVERITY.WARNING,
145
- message: `Missing: ${missing.map(m => m.name).join(', ')}`,
146
- metadata,
147
- fixes: [{
148
- type: FIX_TYPE.FILE_EDIT,
149
- description: 'Add missing patterns to .gitignore',
150
- path: gitignorePath,
151
- content: content + '\n\n# Added by vibecheck doctor\n' +
152
- missing.map(m => m.pattern).join('\n') + '\n',
153
- autoFixable: true,
154
- }],
155
- };
156
- }
157
-
158
- return {
159
- severity: SEVERITY.PASS,
160
- message: 'Properly configured',
161
- metadata,
162
- };
163
- },
164
- },
165
- {
166
- id: `${MODULE_ID}.exposed_secrets`,
167
- name: 'Exposed Secrets',
168
- category: CATEGORY.SECURITY,
169
- parallel: false,
170
- check: async () => {
171
- const filesToCheck = [
172
- 'package.json',
173
- 'src/config.ts',
174
- 'src/config.js',
175
- 'config/index.ts',
176
- 'config/index.js',
177
- 'next.config.js',
178
- 'next.config.mjs',
179
- '.env.example',
180
- 'README.md',
181
- ];
182
-
183
- const findings = [];
184
-
185
- for (const file of filesToCheck) {
186
- const filePath = path.join(projectPath, file);
187
- if (!fs.existsSync(filePath)) continue;
188
-
189
- try {
190
- const content = fs.readFileSync(filePath, 'utf8');
191
-
192
- for (const sp of SECRET_PATTERNS) {
193
- if (sp.pattern.test(content)) {
194
- findings.push({
195
- file,
196
- secret: sp.name,
197
- critical: sp.critical,
198
- });
199
- }
200
- }
201
- } catch {
202
- // Skip unreadable files
203
- }
204
- }
205
-
206
- const metadata = { findings };
207
- const criticalFindings = findings.filter(f => f.critical);
208
-
209
- if (criticalFindings.length > 0) {
210
- return {
211
- severity: SEVERITY.CRITICAL,
212
- message: `${criticalFindings.length} critical secrets exposed`,
213
- detail: criticalFindings.map(f => `${f.secret} in ${f.file}`).join(', '),
214
- metadata,
215
- fixes: [{
216
- type: FIX_TYPE.MANUAL,
217
- description: 'Move secrets to .env and add to .gitignore',
218
- autoFixable: false,
219
- }],
220
- };
221
- }
222
-
223
- if (findings.length > 0) {
224
- return {
225
- severity: SEVERITY.WARNING,
226
- message: `${findings.length} potential secrets found`,
227
- detail: findings.map(f => `${f.secret} in ${f.file}`).join(', '),
228
- metadata,
229
- fixes: [{
230
- type: FIX_TYPE.MANUAL,
231
- description: 'Review and move secrets to .env',
232
- autoFixable: false,
233
- }],
234
- };
235
- }
236
-
237
- return {
238
- severity: SEVERITY.PASS,
239
- message: 'No exposed secrets detected',
240
- metadata,
241
- };
242
- },
243
- },
244
- {
245
- id: `${MODULE_ID}.env_in_git`,
246
- name: '.env in Git History',
247
- category: CATEGORY.SECURITY,
248
- parallel: true,
249
- check: async () => {
250
- const gitDir = path.join(projectPath, '.git');
251
- if (!fs.existsSync(gitDir)) {
252
- return {
253
- severity: SEVERITY.INFO,
254
- message: 'Not a git repository',
255
- };
256
- }
257
-
258
- try {
259
- const { execSync } = require('child_process');
260
- const result = execSync('git log --all --full-history -- .env 2>/dev/null | head -1', {
261
- cwd: projectPath,
262
- encoding: 'utf8',
263
- timeout: 10000,
264
- }).trim();
265
-
266
- if (result) {
267
- return {
268
- severity: SEVERITY.ERROR,
269
- message: '.env found in git history',
270
- detail: 'Secrets may be exposed in git commits',
271
- fixes: [
272
- {
273
- type: FIX_TYPE.LINK,
274
- description: 'Guide: Remove secrets from git history',
275
- url: 'https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/removing-sensitive-data-from-a-repository',
276
- },
277
- {
278
- type: FIX_TYPE.COMMAND,
279
- description: 'Remove .env from history (dangerous)',
280
- command: 'git filter-branch --force --index-filter "git rm --cached --ignore-unmatch .env" --prune-empty --tag-name-filter cat -- --all',
281
- dangerous: true,
282
- autoFixable: false,
283
- },
284
- ],
285
- };
286
- }
287
-
288
- return {
289
- severity: SEVERITY.PASS,
290
- message: 'No .env in git history',
291
- };
292
- } catch {
293
- return {
294
- severity: SEVERITY.INFO,
295
- message: 'Could not check git history',
296
- };
297
- }
298
- },
299
- },
300
- {
301
- id: `${MODULE_ID}.npmrc`,
302
- name: '.npmrc Security',
303
- category: CATEGORY.SECURITY,
304
- parallel: true,
305
- check: async () => {
306
- const npmrcPath = path.join(projectPath, '.npmrc');
307
-
308
- if (!fs.existsSync(npmrcPath)) {
309
- return {
310
- severity: SEVERITY.INFO,
311
- message: 'No .npmrc file',
312
- };
313
- }
314
-
315
- const content = fs.readFileSync(npmrcPath, 'utf8');
316
- const hasToken = content.includes('_authToken') || content.includes('//registry');
317
-
318
- if (hasToken) {
319
- const gitignorePath = path.join(projectPath, '.gitignore');
320
- const gitignoreContent = fs.existsSync(gitignorePath)
321
- ? fs.readFileSync(gitignorePath, 'utf8')
322
- : '';
323
-
324
- if (!gitignoreContent.includes('.npmrc')) {
325
- return {
326
- severity: SEVERITY.WARNING,
327
- message: '.npmrc contains tokens but not in .gitignore',
328
- fixes: [{
329
- type: FIX_TYPE.FILE_EDIT,
330
- description: 'Add .npmrc to .gitignore',
331
- path: gitignorePath,
332
- content: gitignoreContent + '\n.npmrc\n',
333
- autoFixable: true,
334
- }],
335
- };
336
- }
337
- }
338
-
339
- return {
340
- severity: SEVERITY.PASS,
341
- message: hasToken ? 'Contains tokens (gitignored)' : 'No sensitive data',
342
- };
343
- },
344
- },
345
- ];
346
- }
347
-
348
- module.exports = { MODULE_ID, createDiagnostics, SECRET_PATTERNS };
1
+ /**
2
+ * Security Diagnostics Module
3
+ *
4
+ * Checks for exposed secrets, gitignore configuration, and security best practices
5
+ */
6
+
7
+ const fs = require('fs');
8
+ const path = require('path');
9
+ const { SEVERITY, CATEGORY, FIX_TYPE } = require('../types');
10
+
11
+ const MODULE_ID = 'security';
12
+
13
+ const SECRET_PATTERNS = [
14
+ { name: 'Stripe Live Key', pattern: /sk_live_[a-zA-Z0-9]{20,}/, critical: true },
15
+ { name: 'Stripe Test Key', pattern: /sk_test_[a-zA-Z0-9]{20,}/, critical: false },
16
+ { name: 'AWS Access Key', pattern: /AKIA[0-9A-Z]{16}/, critical: true },
17
+ { name: 'GitHub Token', pattern: /ghp_[a-zA-Z0-9]{36}/, critical: true },
18
+ { name: 'GitHub OAuth', pattern: /gho_[a-zA-Z0-9]{36}/, critical: true },
19
+ { name: 'Private Key', pattern: /-----BEGIN (RSA |EC |DSA |OPENSSH )?PRIVATE KEY-----/, critical: true },
20
+ { name: 'Generic API Key', pattern: /api[_-]?key['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
21
+ { name: 'Generic Secret', pattern: /secret['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
22
+ { name: 'Database URL', pattern: /postgres(ql)?:\/\/[^:]+:[^@]+@/, critical: true },
23
+ { name: 'MongoDB URL', pattern: /mongodb(\+srv)?:\/\/[^:]+:[^@]+@/, critical: true },
24
+ ];
25
+
26
+ const REQUIRED_GITIGNORE = [
27
+ { pattern: '.env', name: '.env files' },
28
+ { pattern: 'node_modules', name: 'node_modules' },
29
+ { pattern: '.vibecheck', name: '.vibecheck output' },
30
+ ];
31
+
32
+ function createDiagnostics(projectPath) {
33
+ return [
34
+ {
35
+ id: `${MODULE_ID}.env_file`,
36
+ name: '.env File',
37
+ category: CATEGORY.SECURITY,
38
+ parallel: true,
39
+ check: async () => {
40
+ const envPath = path.join(projectPath, '.env');
41
+ const envExamplePath = path.join(projectPath, '.env.example');
42
+ const envLocalPath = path.join(projectPath, '.env.local');
43
+
44
+ const hasEnv = fs.existsSync(envPath);
45
+ const hasEnvExample = fs.existsSync(envExamplePath);
46
+ const hasEnvLocal = fs.existsSync(envLocalPath);
47
+
48
+ const metadata = { hasEnv, hasEnvExample, hasEnvLocal };
49
+
50
+ if (!hasEnv && !hasEnvLocal) {
51
+ return {
52
+ severity: SEVERITY.INFO,
53
+ message: 'No .env file found',
54
+ detail: 'Create .env for local environment variables',
55
+ metadata,
56
+ fixes: [{
57
+ type: FIX_TYPE.FILE_CREATE,
58
+ description: 'Create .env from example',
59
+ path: envPath,
60
+ content: hasEnvExample
61
+ ? fs.readFileSync(envExamplePath, 'utf8')
62
+ : '# Environment variables\n',
63
+ autoFixable: true,
64
+ }],
65
+ };
66
+ }
67
+
68
+ if (hasEnv && !hasEnvExample) {
69
+ return {
70
+ severity: SEVERITY.WARNING,
71
+ message: '.env exists but no .env.example',
72
+ detail: 'Create .env.example for team documentation',
73
+ metadata,
74
+ fixes: [{
75
+ type: FIX_TYPE.COMMAND,
76
+ description: 'Generate .env.example from .env',
77
+ command: 'vibecheck ctx --env-template',
78
+ autoFixable: false,
79
+ }],
80
+ };
81
+ }
82
+
83
+ return {
84
+ severity: SEVERITY.PASS,
85
+ message: hasEnvExample ? '.env + .env.example' : '.env configured',
86
+ metadata,
87
+ };
88
+ },
89
+ },
90
+ {
91
+ id: `${MODULE_ID}.gitignore`,
92
+ name: '.gitignore',
93
+ category: CATEGORY.SECURITY,
94
+ parallel: true,
95
+ check: async () => {
96
+ const gitignorePath = path.join(projectPath, '.gitignore');
97
+
98
+ if (!fs.existsSync(gitignorePath)) {
99
+ return {
100
+ severity: SEVERITY.WARNING,
101
+ message: 'No .gitignore file',
102
+ detail: 'Secrets and build artifacts may be committed to git',
103
+ fixes: [{
104
+ type: FIX_TYPE.FILE_CREATE,
105
+ description: 'Create .gitignore with common patterns',
106
+ path: gitignorePath,
107
+ content: [
108
+ '# Dependencies',
109
+ 'node_modules/',
110
+ '',
111
+ '# Environment',
112
+ '.env',
113
+ '.env.local',
114
+ '.env.*.local',
115
+ '',
116
+ '# Build',
117
+ 'dist/',
118
+ 'build/',
119
+ '.next/',
120
+ '',
121
+ '# vibecheck',
122
+ '.vibecheck/',
123
+ '',
124
+ '# IDE',
125
+ '.idea/',
126
+ '.vscode/',
127
+ '*.swp',
128
+ ].join('\n'),
129
+ autoFixable: true,
130
+ }],
131
+ };
132
+ }
133
+
134
+ const content = fs.readFileSync(gitignorePath, 'utf8');
135
+ const missing = REQUIRED_GITIGNORE.filter(r => !content.includes(r.pattern));
136
+
137
+ const metadata = {
138
+ missing: missing.map(m => m.pattern),
139
+ lines: content.split('\n').length,
140
+ };
141
+
142
+ if (missing.length > 0) {
143
+ return {
144
+ severity: SEVERITY.WARNING,
145
+ message: `Missing: ${missing.map(m => m.name).join(', ')}`,
146
+ metadata,
147
+ fixes: [{
148
+ type: FIX_TYPE.FILE_EDIT,
149
+ description: 'Add missing patterns to .gitignore',
150
+ path: gitignorePath,
151
+ content: content + '\n\n# Added by vibecheck doctor\n' +
152
+ missing.map(m => m.pattern).join('\n') + '\n',
153
+ autoFixable: true,
154
+ }],
155
+ };
156
+ }
157
+
158
+ return {
159
+ severity: SEVERITY.PASS,
160
+ message: 'Properly configured',
161
+ metadata,
162
+ };
163
+ },
164
+ },
165
+ {
166
+ id: `${MODULE_ID}.exposed_secrets`,
167
+ name: 'Exposed Secrets',
168
+ category: CATEGORY.SECURITY,
169
+ parallel: false,
170
+ check: async () => {
171
+ const filesToCheck = [
172
+ 'package.json',
173
+ 'src/config.ts',
174
+ 'src/config.js',
175
+ 'config/index.ts',
176
+ 'config/index.js',
177
+ 'next.config.js',
178
+ 'next.config.mjs',
179
+ '.env.example',
180
+ 'README.md',
181
+ ];
182
+
183
+ const findings = [];
184
+
185
+ for (const file of filesToCheck) {
186
+ const filePath = path.join(projectPath, file);
187
+ if (!fs.existsSync(filePath)) continue;
188
+
189
+ try {
190
+ const content = fs.readFileSync(filePath, 'utf8');
191
+
192
+ for (const sp of SECRET_PATTERNS) {
193
+ if (sp.pattern.test(content)) {
194
+ findings.push({
195
+ file,
196
+ secret: sp.name,
197
+ critical: sp.critical,
198
+ });
199
+ }
200
+ }
201
+ } catch {
202
+ // Skip unreadable files
203
+ }
204
+ }
205
+
206
+ const metadata = { findings };
207
+ const criticalFindings = findings.filter(f => f.critical);
208
+
209
+ if (criticalFindings.length > 0) {
210
+ return {
211
+ severity: SEVERITY.CRITICAL,
212
+ message: `${criticalFindings.length} critical secrets exposed`,
213
+ detail: criticalFindings.map(f => `${f.secret} in ${f.file}`).join(', '),
214
+ metadata,
215
+ fixes: [{
216
+ type: FIX_TYPE.MANUAL,
217
+ description: 'Move secrets to .env and add to .gitignore',
218
+ autoFixable: false,
219
+ }],
220
+ };
221
+ }
222
+
223
+ if (findings.length > 0) {
224
+ return {
225
+ severity: SEVERITY.WARNING,
226
+ message: `${findings.length} potential secrets found`,
227
+ detail: findings.map(f => `${f.secret} in ${f.file}`).join(', '),
228
+ metadata,
229
+ fixes: [{
230
+ type: FIX_TYPE.MANUAL,
231
+ description: 'Review and move secrets to .env',
232
+ autoFixable: false,
233
+ }],
234
+ };
235
+ }
236
+
237
+ return {
238
+ severity: SEVERITY.PASS,
239
+ message: 'No exposed secrets detected',
240
+ metadata,
241
+ };
242
+ },
243
+ },
244
+ {
245
+ id: `${MODULE_ID}.env_in_git`,
246
+ name: '.env in Git History',
247
+ category: CATEGORY.SECURITY,
248
+ parallel: true,
249
+ check: async () => {
250
+ const gitDir = path.join(projectPath, '.git');
251
+ if (!fs.existsSync(gitDir)) {
252
+ return {
253
+ severity: SEVERITY.INFO,
254
+ message: 'Not a git repository',
255
+ };
256
+ }
257
+
258
+ try {
259
+ const { execSync } = require('child_process');
260
+ const result = execSync('git log --all --full-history -- .env 2>/dev/null | head -1', {
261
+ cwd: projectPath,
262
+ encoding: 'utf8',
263
+ timeout: 10000,
264
+ }).trim();
265
+
266
+ if (result) {
267
+ return {
268
+ severity: SEVERITY.ERROR,
269
+ message: '.env found in git history',
270
+ detail: 'Secrets may be exposed in git commits',
271
+ fixes: [
272
+ {
273
+ type: FIX_TYPE.LINK,
274
+ description: 'Guide: Remove secrets from git history',
275
+ url: 'https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/removing-sensitive-data-from-a-repository',
276
+ },
277
+ {
278
+ type: FIX_TYPE.COMMAND,
279
+ description: 'Remove .env from history (dangerous)',
280
+ command: 'git filter-branch --force --index-filter "git rm --cached --ignore-unmatch .env" --prune-empty --tag-name-filter cat -- --all',
281
+ dangerous: true,
282
+ autoFixable: false,
283
+ },
284
+ ],
285
+ };
286
+ }
287
+
288
+ return {
289
+ severity: SEVERITY.PASS,
290
+ message: 'No .env in git history',
291
+ };
292
+ } catch {
293
+ return {
294
+ severity: SEVERITY.INFO,
295
+ message: 'Could not check git history',
296
+ };
297
+ }
298
+ },
299
+ },
300
+ {
301
+ id: `${MODULE_ID}.npmrc`,
302
+ name: '.npmrc Security',
303
+ category: CATEGORY.SECURITY,
304
+ parallel: true,
305
+ check: async () => {
306
+ const npmrcPath = path.join(projectPath, '.npmrc');
307
+
308
+ if (!fs.existsSync(npmrcPath)) {
309
+ return {
310
+ severity: SEVERITY.INFO,
311
+ message: 'No .npmrc file',
312
+ };
313
+ }
314
+
315
+ const content = fs.readFileSync(npmrcPath, 'utf8');
316
+ const hasToken = content.includes('_authToken') || content.includes('//registry');
317
+
318
+ if (hasToken) {
319
+ const gitignorePath = path.join(projectPath, '.gitignore');
320
+ const gitignoreContent = fs.existsSync(gitignorePath)
321
+ ? fs.readFileSync(gitignorePath, 'utf8')
322
+ : '';
323
+
324
+ if (!gitignoreContent.includes('.npmrc')) {
325
+ return {
326
+ severity: SEVERITY.WARNING,
327
+ message: '.npmrc contains tokens but not in .gitignore',
328
+ fixes: [{
329
+ type: FIX_TYPE.FILE_EDIT,
330
+ description: 'Add .npmrc to .gitignore',
331
+ path: gitignorePath,
332
+ content: gitignoreContent + '\n.npmrc\n',
333
+ autoFixable: true,
334
+ }],
335
+ };
336
+ }
337
+ }
338
+
339
+ return {
340
+ severity: SEVERITY.PASS,
341
+ message: hasToken ? 'Contains tokens (gitignored)' : 'No sensitive data',
342
+ };
343
+ },
344
+ },
345
+ ];
346
+ }
347
+
348
+ module.exports = { MODULE_ID, createDiagnostics, SECRET_PATTERNS };