@vibecheckai/cli 3.2.2 → 3.2.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bin/.generated +25 -25
- package/bin/dev/run-v2-torture.js +30 -30
- package/bin/runners/ENHANCEMENT_GUIDE.md +121 -121
- package/bin/runners/lib/__tests__/entitlements-v2.test.js +295 -295
- package/bin/runners/lib/agent-firewall/ai/false-positive-analyzer.js +474 -0
- package/bin/runners/lib/agent-firewall/claims/extractor.js +117 -28
- package/bin/runners/lib/agent-firewall/evidence/env-evidence.js +23 -14
- package/bin/runners/lib/agent-firewall/evidence/route-evidence.js +72 -1
- package/bin/runners/lib/agent-firewall/interceptor/base.js +2 -2
- package/bin/runners/lib/agent-firewall/policy/default-policy.json +6 -0
- package/bin/runners/lib/agent-firewall/policy/engine.js +34 -3
- package/bin/runners/lib/agent-firewall/policy/rules/fake-success.js +29 -4
- package/bin/runners/lib/agent-firewall/policy/rules/ghost-route.js +12 -0
- package/bin/runners/lib/agent-firewall/truthpack/loader.js +21 -0
- package/bin/runners/lib/agent-firewall/utils/ignore-checker.js +118 -0
- package/bin/runners/lib/analyzers.js +606 -325
- package/bin/runners/lib/auth-truth.js +193 -193
- package/bin/runners/lib/backup.js +62 -62
- package/bin/runners/lib/billing.js +107 -107
- package/bin/runners/lib/claims.js +118 -118
- package/bin/runners/lib/cli-ui.js +540 -540
- package/bin/runners/lib/contracts/auth-contract.js +202 -202
- package/bin/runners/lib/contracts/env-contract.js +181 -181
- package/bin/runners/lib/contracts/external-contract.js +206 -206
- package/bin/runners/lib/contracts/guard.js +168 -168
- package/bin/runners/lib/contracts/index.js +89 -89
- package/bin/runners/lib/contracts/plan-validator.js +311 -311
- package/bin/runners/lib/contracts/route-contract.js +199 -199
- package/bin/runners/lib/contracts.js +804 -804
- package/bin/runners/lib/detect.js +89 -89
- package/bin/runners/lib/doctor/autofix.js +254 -254
- package/bin/runners/lib/doctor/index.js +37 -37
- package/bin/runners/lib/doctor/modules/dependencies.js +325 -325
- package/bin/runners/lib/doctor/modules/index.js +46 -46
- package/bin/runners/lib/doctor/modules/network.js +250 -250
- package/bin/runners/lib/doctor/modules/project.js +312 -312
- package/bin/runners/lib/doctor/modules/runtime.js +224 -224
- package/bin/runners/lib/doctor/modules/security.js +348 -348
- package/bin/runners/lib/doctor/modules/system.js +213 -213
- package/bin/runners/lib/doctor/modules/vibecheck.js +394 -394
- package/bin/runners/lib/doctor/reporter.js +262 -262
- package/bin/runners/lib/doctor/service.js +262 -262
- package/bin/runners/lib/doctor/types.js +113 -113
- package/bin/runners/lib/doctor/ui.js +263 -263
- package/bin/runners/lib/doctor-v2.js +608 -608
- package/bin/runners/lib/drift.js +425 -425
- package/bin/runners/lib/enforcement.js +72 -72
- package/bin/runners/lib/engines/accessibility-engine.js +190 -0
- package/bin/runners/lib/engines/api-consistency-engine.js +162 -0
- package/bin/runners/lib/engines/ast-cache.js +99 -0
- package/bin/runners/lib/engines/code-quality-engine.js +255 -0
- package/bin/runners/lib/engines/console-logs-engine.js +115 -0
- package/bin/runners/lib/engines/cross-file-analysis-engine.js +268 -0
- package/bin/runners/lib/engines/dead-code-engine.js +198 -0
- package/bin/runners/lib/engines/deprecated-api-engine.js +226 -0
- package/bin/runners/lib/engines/empty-catch-engine.js +150 -0
- package/bin/runners/lib/engines/file-filter.js +131 -0
- package/bin/runners/lib/engines/hardcoded-secrets-engine.js +251 -0
- package/bin/runners/lib/engines/mock-data-engine.js +272 -0
- package/bin/runners/lib/engines/parallel-processor.js +71 -0
- package/bin/runners/lib/engines/performance-issues-engine.js +265 -0
- package/bin/runners/lib/engines/security-vulnerabilities-engine.js +243 -0
- package/bin/runners/lib/engines/todo-fixme-engine.js +115 -0
- package/bin/runners/lib/engines/type-aware-engine.js +152 -0
- package/bin/runners/lib/engines/unsafe-regex-engine.js +225 -0
- package/bin/runners/lib/engines/vibecheck-engines/README.md +53 -0
- package/bin/runners/lib/engines/vibecheck-engines/index.js +15 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/ast-cache.js +164 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/code-quality-engine.js +291 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/console-logs-engine.js +83 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/dead-code-engine.js +198 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/deprecated-api-engine.js +275 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/empty-catch-engine.js +167 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/file-filter.js +217 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/hardcoded-secrets-engine.js +139 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/mock-data-engine.js +140 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/parallel-processor.js +164 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/performance-issues-engine.js +234 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/type-aware-engine.js +217 -0
- package/bin/runners/lib/engines/vibecheck-engines/lib/unsafe-regex-engine.js +78 -0
- package/bin/runners/lib/engines/vibecheck-engines/package.json +13 -0
- package/bin/runners/lib/enterprise-detect.js +603 -603
- package/bin/runners/lib/enterprise-init.js +942 -942
- package/bin/runners/lib/env-resolver.js +417 -417
- package/bin/runners/lib/env-template.js +66 -66
- package/bin/runners/lib/env.js +189 -189
- package/bin/runners/lib/extractors/client-calls.js +990 -990
- package/bin/runners/lib/extractors/fastify-route-dump.js +573 -573
- package/bin/runners/lib/extractors/fastify-routes.js +426 -426
- package/bin/runners/lib/extractors/index.js +363 -363
- package/bin/runners/lib/extractors/next-routes.js +524 -524
- package/bin/runners/lib/extractors/proof-graph.js +431 -431
- package/bin/runners/lib/extractors/route-matcher.js +451 -451
- package/bin/runners/lib/extractors/truthpack-v2.js +377 -377
- package/bin/runners/lib/extractors/ui-bindings.js +547 -547
- package/bin/runners/lib/findings-schema.js +281 -281
- package/bin/runners/lib/firewall-prompt.js +50 -50
- package/bin/runners/lib/global-flags.js +213 -213
- package/bin/runners/lib/graph/graph-builder.js +265 -265
- package/bin/runners/lib/graph/html-renderer.js +413 -413
- package/bin/runners/lib/graph/index.js +32 -32
- package/bin/runners/lib/graph/runtime-collector.js +215 -215
- package/bin/runners/lib/graph/static-extractor.js +518 -518
- package/bin/runners/lib/html-report.js +650 -650
- package/bin/runners/lib/interactive-menu.js +1496 -1496
- package/bin/runners/lib/llm.js +75 -75
- package/bin/runners/lib/meter.js +61 -61
- package/bin/runners/lib/missions/evidence.js +126 -126
- package/bin/runners/lib/patch.js +40 -40
- package/bin/runners/lib/permissions/auth-model.js +213 -213
- package/bin/runners/lib/permissions/idor-prover.js +205 -205
- package/bin/runners/lib/permissions/index.js +45 -45
- package/bin/runners/lib/permissions/matrix-builder.js +198 -198
- package/bin/runners/lib/pkgjson.js +28 -28
- package/bin/runners/lib/policy.js +295 -295
- package/bin/runners/lib/preflight.js +142 -142
- package/bin/runners/lib/reality/correlation-detectors.js +359 -359
- package/bin/runners/lib/reality/index.js +318 -318
- package/bin/runners/lib/reality/request-hashing.js +416 -416
- package/bin/runners/lib/reality/request-mapper.js +453 -453
- package/bin/runners/lib/reality/safety-rails.js +463 -463
- package/bin/runners/lib/reality/semantic-snapshot.js +408 -408
- package/bin/runners/lib/reality/toast-detector.js +393 -393
- package/bin/runners/lib/reality-findings.js +84 -84
- package/bin/runners/lib/receipts.js +179 -179
- package/bin/runners/lib/redact.js +29 -29
- package/bin/runners/lib/replay/capsule-manager.js +154 -154
- package/bin/runners/lib/replay/index.js +263 -263
- package/bin/runners/lib/replay/player.js +348 -348
- package/bin/runners/lib/replay/recorder.js +331 -331
- package/bin/runners/lib/report-output.js +187 -187
- package/bin/runners/lib/report.js +135 -135
- package/bin/runners/lib/route-detection.js +1140 -1140
- package/bin/runners/lib/sandbox/index.js +59 -59
- package/bin/runners/lib/sandbox/proof-chain.js +399 -399
- package/bin/runners/lib/sandbox/sandbox-runner.js +205 -205
- package/bin/runners/lib/sandbox/worktree.js +174 -174
- package/bin/runners/lib/scan-output.js +525 -190
- package/bin/runners/lib/schema-validator.js +350 -350
- package/bin/runners/lib/schemas/contracts.schema.json +160 -160
- package/bin/runners/lib/schemas/finding.schema.json +100 -100
- package/bin/runners/lib/schemas/mission-pack.schema.json +206 -206
- package/bin/runners/lib/schemas/proof-graph.schema.json +176 -176
- package/bin/runners/lib/schemas/reality-report.schema.json +162 -162
- package/bin/runners/lib/schemas/share-pack.schema.json +180 -180
- package/bin/runners/lib/schemas/ship-report.schema.json +117 -117
- package/bin/runners/lib/schemas/truthpack-v2.schema.json +303 -303
- package/bin/runners/lib/schemas/validator.js +438 -438
- package/bin/runners/lib/score-history.js +282 -282
- package/bin/runners/lib/share-pack.js +239 -239
- package/bin/runners/lib/snippets.js +67 -67
- package/bin/runners/lib/status-output.js +253 -253
- package/bin/runners/lib/terminal-ui.js +351 -271
- package/bin/runners/lib/upsell.js +510 -510
- package/bin/runners/lib/usage.js +153 -153
- package/bin/runners/lib/validate-patch.js +156 -156
- package/bin/runners/lib/verdict-engine.js +628 -628
- package/bin/runners/reality/engine.js +917 -917
- package/bin/runners/reality/flows.js +122 -122
- package/bin/runners/reality/report.js +378 -378
- package/bin/runners/reality/session.js +193 -193
- package/bin/runners/runGuard.js +168 -168
- package/bin/runners/runProof.zip +0 -0
- package/bin/runners/runProve.js +8 -0
- package/bin/runners/runReality.js +14 -0
- package/bin/runners/runScan.js +17 -1
- package/bin/runners/runTruth.js +15 -3
- package/mcp-server/tier-auth.js +4 -4
- package/mcp-server/tools/index.js +72 -72
- package/package.json +1 -1
|
@@ -1,348 +1,348 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Security Diagnostics Module
|
|
3
|
-
*
|
|
4
|
-
* Checks for exposed secrets, gitignore configuration, and security best practices
|
|
5
|
-
*/
|
|
6
|
-
|
|
7
|
-
const fs = require('fs');
|
|
8
|
-
const path = require('path');
|
|
9
|
-
const { SEVERITY, CATEGORY, FIX_TYPE } = require('../types');
|
|
10
|
-
|
|
11
|
-
const MODULE_ID = 'security';
|
|
12
|
-
|
|
13
|
-
const SECRET_PATTERNS = [
|
|
14
|
-
{ name: 'Stripe Live Key', pattern: /sk_live_[a-zA-Z0-9]{20,}/, critical: true },
|
|
15
|
-
{ name: 'Stripe Test Key', pattern: /sk_test_[a-zA-Z0-9]{20,}/, critical: false },
|
|
16
|
-
{ name: 'AWS Access Key', pattern: /AKIA[0-9A-Z]{16}/, critical: true },
|
|
17
|
-
{ name: 'GitHub Token', pattern: /ghp_[a-zA-Z0-9]{36}/, critical: true },
|
|
18
|
-
{ name: 'GitHub OAuth', pattern: /gho_[a-zA-Z0-9]{36}/, critical: true },
|
|
19
|
-
{ name: 'Private Key', pattern: /-----BEGIN (RSA |EC |DSA |OPENSSH )?PRIVATE KEY-----/, critical: true },
|
|
20
|
-
{ name: 'Generic API Key', pattern: /api[_-]?key['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
|
|
21
|
-
{ name: 'Generic Secret', pattern: /secret['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
|
|
22
|
-
{ name: 'Database URL', pattern: /postgres(ql)?:\/\/[^:]+:[^@]+@/, critical: true },
|
|
23
|
-
{ name: 'MongoDB URL', pattern: /mongodb(\+srv)?:\/\/[^:]+:[^@]+@/, critical: true },
|
|
24
|
-
];
|
|
25
|
-
|
|
26
|
-
const REQUIRED_GITIGNORE = [
|
|
27
|
-
{ pattern: '.env', name: '.env files' },
|
|
28
|
-
{ pattern: 'node_modules', name: 'node_modules' },
|
|
29
|
-
{ pattern: '.vibecheck', name: '.vibecheck output' },
|
|
30
|
-
];
|
|
31
|
-
|
|
32
|
-
function createDiagnostics(projectPath) {
|
|
33
|
-
return [
|
|
34
|
-
{
|
|
35
|
-
id: `${MODULE_ID}.env_file`,
|
|
36
|
-
name: '.env File',
|
|
37
|
-
category: CATEGORY.SECURITY,
|
|
38
|
-
parallel: true,
|
|
39
|
-
check: async () => {
|
|
40
|
-
const envPath = path.join(projectPath, '.env');
|
|
41
|
-
const envExamplePath = path.join(projectPath, '.env.example');
|
|
42
|
-
const envLocalPath = path.join(projectPath, '.env.local');
|
|
43
|
-
|
|
44
|
-
const hasEnv = fs.existsSync(envPath);
|
|
45
|
-
const hasEnvExample = fs.existsSync(envExamplePath);
|
|
46
|
-
const hasEnvLocal = fs.existsSync(envLocalPath);
|
|
47
|
-
|
|
48
|
-
const metadata = { hasEnv, hasEnvExample, hasEnvLocal };
|
|
49
|
-
|
|
50
|
-
if (!hasEnv && !hasEnvLocal) {
|
|
51
|
-
return {
|
|
52
|
-
severity: SEVERITY.INFO,
|
|
53
|
-
message: 'No .env file found',
|
|
54
|
-
detail: 'Create .env for local environment variables',
|
|
55
|
-
metadata,
|
|
56
|
-
fixes: [{
|
|
57
|
-
type: FIX_TYPE.FILE_CREATE,
|
|
58
|
-
description: 'Create .env from example',
|
|
59
|
-
path: envPath,
|
|
60
|
-
content: hasEnvExample
|
|
61
|
-
? fs.readFileSync(envExamplePath, 'utf8')
|
|
62
|
-
: '# Environment variables\n',
|
|
63
|
-
autoFixable: true,
|
|
64
|
-
}],
|
|
65
|
-
};
|
|
66
|
-
}
|
|
67
|
-
|
|
68
|
-
if (hasEnv && !hasEnvExample) {
|
|
69
|
-
return {
|
|
70
|
-
severity: SEVERITY.WARNING,
|
|
71
|
-
message: '.env exists but no .env.example',
|
|
72
|
-
detail: 'Create .env.example for team documentation',
|
|
73
|
-
metadata,
|
|
74
|
-
fixes: [{
|
|
75
|
-
type: FIX_TYPE.COMMAND,
|
|
76
|
-
description: 'Generate .env.example from .env',
|
|
77
|
-
command: 'vibecheck ctx --env-template',
|
|
78
|
-
autoFixable: false,
|
|
79
|
-
}],
|
|
80
|
-
};
|
|
81
|
-
}
|
|
82
|
-
|
|
83
|
-
return {
|
|
84
|
-
severity: SEVERITY.PASS,
|
|
85
|
-
message: hasEnvExample ? '.env + .env.example' : '.env configured',
|
|
86
|
-
metadata,
|
|
87
|
-
};
|
|
88
|
-
},
|
|
89
|
-
},
|
|
90
|
-
{
|
|
91
|
-
id: `${MODULE_ID}.gitignore`,
|
|
92
|
-
name: '.gitignore',
|
|
93
|
-
category: CATEGORY.SECURITY,
|
|
94
|
-
parallel: true,
|
|
95
|
-
check: async () => {
|
|
96
|
-
const gitignorePath = path.join(projectPath, '.gitignore');
|
|
97
|
-
|
|
98
|
-
if (!fs.existsSync(gitignorePath)) {
|
|
99
|
-
return {
|
|
100
|
-
severity: SEVERITY.WARNING,
|
|
101
|
-
message: 'No .gitignore file',
|
|
102
|
-
detail: 'Secrets and build artifacts may be committed to git',
|
|
103
|
-
fixes: [{
|
|
104
|
-
type: FIX_TYPE.FILE_CREATE,
|
|
105
|
-
description: 'Create .gitignore with common patterns',
|
|
106
|
-
path: gitignorePath,
|
|
107
|
-
content: [
|
|
108
|
-
'# Dependencies',
|
|
109
|
-
'node_modules/',
|
|
110
|
-
'',
|
|
111
|
-
'# Environment',
|
|
112
|
-
'.env',
|
|
113
|
-
'.env.local',
|
|
114
|
-
'.env.*.local',
|
|
115
|
-
'',
|
|
116
|
-
'# Build',
|
|
117
|
-
'dist/',
|
|
118
|
-
'build/',
|
|
119
|
-
'.next/',
|
|
120
|
-
'',
|
|
121
|
-
'# vibecheck',
|
|
122
|
-
'.vibecheck/',
|
|
123
|
-
'',
|
|
124
|
-
'# IDE',
|
|
125
|
-
'.idea/',
|
|
126
|
-
'.vscode/',
|
|
127
|
-
'*.swp',
|
|
128
|
-
].join('\n'),
|
|
129
|
-
autoFixable: true,
|
|
130
|
-
}],
|
|
131
|
-
};
|
|
132
|
-
}
|
|
133
|
-
|
|
134
|
-
const content = fs.readFileSync(gitignorePath, 'utf8');
|
|
135
|
-
const missing = REQUIRED_GITIGNORE.filter(r => !content.includes(r.pattern));
|
|
136
|
-
|
|
137
|
-
const metadata = {
|
|
138
|
-
missing: missing.map(m => m.pattern),
|
|
139
|
-
lines: content.split('\n').length,
|
|
140
|
-
};
|
|
141
|
-
|
|
142
|
-
if (missing.length > 0) {
|
|
143
|
-
return {
|
|
144
|
-
severity: SEVERITY.WARNING,
|
|
145
|
-
message: `Missing: ${missing.map(m => m.name).join(', ')}`,
|
|
146
|
-
metadata,
|
|
147
|
-
fixes: [{
|
|
148
|
-
type: FIX_TYPE.FILE_EDIT,
|
|
149
|
-
description: 'Add missing patterns to .gitignore',
|
|
150
|
-
path: gitignorePath,
|
|
151
|
-
content: content + '\n\n# Added by vibecheck doctor\n' +
|
|
152
|
-
missing.map(m => m.pattern).join('\n') + '\n',
|
|
153
|
-
autoFixable: true,
|
|
154
|
-
}],
|
|
155
|
-
};
|
|
156
|
-
}
|
|
157
|
-
|
|
158
|
-
return {
|
|
159
|
-
severity: SEVERITY.PASS,
|
|
160
|
-
message: 'Properly configured',
|
|
161
|
-
metadata,
|
|
162
|
-
};
|
|
163
|
-
},
|
|
164
|
-
},
|
|
165
|
-
{
|
|
166
|
-
id: `${MODULE_ID}.exposed_secrets`,
|
|
167
|
-
name: 'Exposed Secrets',
|
|
168
|
-
category: CATEGORY.SECURITY,
|
|
169
|
-
parallel: false,
|
|
170
|
-
check: async () => {
|
|
171
|
-
const filesToCheck = [
|
|
172
|
-
'package.json',
|
|
173
|
-
'src/config.ts',
|
|
174
|
-
'src/config.js',
|
|
175
|
-
'config/index.ts',
|
|
176
|
-
'config/index.js',
|
|
177
|
-
'next.config.js',
|
|
178
|
-
'next.config.mjs',
|
|
179
|
-
'.env.example',
|
|
180
|
-
'README.md',
|
|
181
|
-
];
|
|
182
|
-
|
|
183
|
-
const findings = [];
|
|
184
|
-
|
|
185
|
-
for (const file of filesToCheck) {
|
|
186
|
-
const filePath = path.join(projectPath, file);
|
|
187
|
-
if (!fs.existsSync(filePath)) continue;
|
|
188
|
-
|
|
189
|
-
try {
|
|
190
|
-
const content = fs.readFileSync(filePath, 'utf8');
|
|
191
|
-
|
|
192
|
-
for (const sp of SECRET_PATTERNS) {
|
|
193
|
-
if (sp.pattern.test(content)) {
|
|
194
|
-
findings.push({
|
|
195
|
-
file,
|
|
196
|
-
secret: sp.name,
|
|
197
|
-
critical: sp.critical,
|
|
198
|
-
});
|
|
199
|
-
}
|
|
200
|
-
}
|
|
201
|
-
} catch {
|
|
202
|
-
// Skip unreadable files
|
|
203
|
-
}
|
|
204
|
-
}
|
|
205
|
-
|
|
206
|
-
const metadata = { findings };
|
|
207
|
-
const criticalFindings = findings.filter(f => f.critical);
|
|
208
|
-
|
|
209
|
-
if (criticalFindings.length > 0) {
|
|
210
|
-
return {
|
|
211
|
-
severity: SEVERITY.CRITICAL,
|
|
212
|
-
message: `${criticalFindings.length} critical secrets exposed`,
|
|
213
|
-
detail: criticalFindings.map(f => `${f.secret} in ${f.file}`).join(', '),
|
|
214
|
-
metadata,
|
|
215
|
-
fixes: [{
|
|
216
|
-
type: FIX_TYPE.MANUAL,
|
|
217
|
-
description: 'Move secrets to .env and add to .gitignore',
|
|
218
|
-
autoFixable: false,
|
|
219
|
-
}],
|
|
220
|
-
};
|
|
221
|
-
}
|
|
222
|
-
|
|
223
|
-
if (findings.length > 0) {
|
|
224
|
-
return {
|
|
225
|
-
severity: SEVERITY.WARNING,
|
|
226
|
-
message: `${findings.length} potential secrets found`,
|
|
227
|
-
detail: findings.map(f => `${f.secret} in ${f.file}`).join(', '),
|
|
228
|
-
metadata,
|
|
229
|
-
fixes: [{
|
|
230
|
-
type: FIX_TYPE.MANUAL,
|
|
231
|
-
description: 'Review and move secrets to .env',
|
|
232
|
-
autoFixable: false,
|
|
233
|
-
}],
|
|
234
|
-
};
|
|
235
|
-
}
|
|
236
|
-
|
|
237
|
-
return {
|
|
238
|
-
severity: SEVERITY.PASS,
|
|
239
|
-
message: 'No exposed secrets detected',
|
|
240
|
-
metadata,
|
|
241
|
-
};
|
|
242
|
-
},
|
|
243
|
-
},
|
|
244
|
-
{
|
|
245
|
-
id: `${MODULE_ID}.env_in_git`,
|
|
246
|
-
name: '.env in Git History',
|
|
247
|
-
category: CATEGORY.SECURITY,
|
|
248
|
-
parallel: true,
|
|
249
|
-
check: async () => {
|
|
250
|
-
const gitDir = path.join(projectPath, '.git');
|
|
251
|
-
if (!fs.existsSync(gitDir)) {
|
|
252
|
-
return {
|
|
253
|
-
severity: SEVERITY.INFO,
|
|
254
|
-
message: 'Not a git repository',
|
|
255
|
-
};
|
|
256
|
-
}
|
|
257
|
-
|
|
258
|
-
try {
|
|
259
|
-
const { execSync } = require('child_process');
|
|
260
|
-
const result = execSync('git log --all --full-history -- .env 2>/dev/null | head -1', {
|
|
261
|
-
cwd: projectPath,
|
|
262
|
-
encoding: 'utf8',
|
|
263
|
-
timeout: 10000,
|
|
264
|
-
}).trim();
|
|
265
|
-
|
|
266
|
-
if (result) {
|
|
267
|
-
return {
|
|
268
|
-
severity: SEVERITY.ERROR,
|
|
269
|
-
message: '.env found in git history',
|
|
270
|
-
detail: 'Secrets may be exposed in git commits',
|
|
271
|
-
fixes: [
|
|
272
|
-
{
|
|
273
|
-
type: FIX_TYPE.LINK,
|
|
274
|
-
description: 'Guide: Remove secrets from git history',
|
|
275
|
-
url: 'https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/removing-sensitive-data-from-a-repository',
|
|
276
|
-
},
|
|
277
|
-
{
|
|
278
|
-
type: FIX_TYPE.COMMAND,
|
|
279
|
-
description: 'Remove .env from history (dangerous)',
|
|
280
|
-
command: 'git filter-branch --force --index-filter "git rm --cached --ignore-unmatch .env" --prune-empty --tag-name-filter cat -- --all',
|
|
281
|
-
dangerous: true,
|
|
282
|
-
autoFixable: false,
|
|
283
|
-
},
|
|
284
|
-
],
|
|
285
|
-
};
|
|
286
|
-
}
|
|
287
|
-
|
|
288
|
-
return {
|
|
289
|
-
severity: SEVERITY.PASS,
|
|
290
|
-
message: 'No .env in git history',
|
|
291
|
-
};
|
|
292
|
-
} catch {
|
|
293
|
-
return {
|
|
294
|
-
severity: SEVERITY.INFO,
|
|
295
|
-
message: 'Could not check git history',
|
|
296
|
-
};
|
|
297
|
-
}
|
|
298
|
-
},
|
|
299
|
-
},
|
|
300
|
-
{
|
|
301
|
-
id: `${MODULE_ID}.npmrc`,
|
|
302
|
-
name: '.npmrc Security',
|
|
303
|
-
category: CATEGORY.SECURITY,
|
|
304
|
-
parallel: true,
|
|
305
|
-
check: async () => {
|
|
306
|
-
const npmrcPath = path.join(projectPath, '.npmrc');
|
|
307
|
-
|
|
308
|
-
if (!fs.existsSync(npmrcPath)) {
|
|
309
|
-
return {
|
|
310
|
-
severity: SEVERITY.INFO,
|
|
311
|
-
message: 'No .npmrc file',
|
|
312
|
-
};
|
|
313
|
-
}
|
|
314
|
-
|
|
315
|
-
const content = fs.readFileSync(npmrcPath, 'utf8');
|
|
316
|
-
const hasToken = content.includes('_authToken') || content.includes('//registry');
|
|
317
|
-
|
|
318
|
-
if (hasToken) {
|
|
319
|
-
const gitignorePath = path.join(projectPath, '.gitignore');
|
|
320
|
-
const gitignoreContent = fs.existsSync(gitignorePath)
|
|
321
|
-
? fs.readFileSync(gitignorePath, 'utf8')
|
|
322
|
-
: '';
|
|
323
|
-
|
|
324
|
-
if (!gitignoreContent.includes('.npmrc')) {
|
|
325
|
-
return {
|
|
326
|
-
severity: SEVERITY.WARNING,
|
|
327
|
-
message: '.npmrc contains tokens but not in .gitignore',
|
|
328
|
-
fixes: [{
|
|
329
|
-
type: FIX_TYPE.FILE_EDIT,
|
|
330
|
-
description: 'Add .npmrc to .gitignore',
|
|
331
|
-
path: gitignorePath,
|
|
332
|
-
content: gitignoreContent + '\n.npmrc\n',
|
|
333
|
-
autoFixable: true,
|
|
334
|
-
}],
|
|
335
|
-
};
|
|
336
|
-
}
|
|
337
|
-
}
|
|
338
|
-
|
|
339
|
-
return {
|
|
340
|
-
severity: SEVERITY.PASS,
|
|
341
|
-
message: hasToken ? 'Contains tokens (gitignored)' : 'No sensitive data',
|
|
342
|
-
};
|
|
343
|
-
},
|
|
344
|
-
},
|
|
345
|
-
];
|
|
346
|
-
}
|
|
347
|
-
|
|
348
|
-
module.exports = { MODULE_ID, createDiagnostics, SECRET_PATTERNS };
|
|
1
|
+
/**
|
|
2
|
+
* Security Diagnostics Module
|
|
3
|
+
*
|
|
4
|
+
* Checks for exposed secrets, gitignore configuration, and security best practices
|
|
5
|
+
*/
|
|
6
|
+
|
|
7
|
+
const fs = require('fs');
|
|
8
|
+
const path = require('path');
|
|
9
|
+
const { SEVERITY, CATEGORY, FIX_TYPE } = require('../types');
|
|
10
|
+
|
|
11
|
+
const MODULE_ID = 'security';
|
|
12
|
+
|
|
13
|
+
const SECRET_PATTERNS = [
|
|
14
|
+
{ name: 'Stripe Live Key', pattern: /sk_live_[a-zA-Z0-9]{20,}/, critical: true },
|
|
15
|
+
{ name: 'Stripe Test Key', pattern: /sk_test_[a-zA-Z0-9]{20,}/, critical: false },
|
|
16
|
+
{ name: 'AWS Access Key', pattern: /AKIA[0-9A-Z]{16}/, critical: true },
|
|
17
|
+
{ name: 'GitHub Token', pattern: /ghp_[a-zA-Z0-9]{36}/, critical: true },
|
|
18
|
+
{ name: 'GitHub OAuth', pattern: /gho_[a-zA-Z0-9]{36}/, critical: true },
|
|
19
|
+
{ name: 'Private Key', pattern: /-----BEGIN (RSA |EC |DSA |OPENSSH )?PRIVATE KEY-----/, critical: true },
|
|
20
|
+
{ name: 'Generic API Key', pattern: /api[_-]?key['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
|
|
21
|
+
{ name: 'Generic Secret', pattern: /secret['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
|
|
22
|
+
{ name: 'Database URL', pattern: /postgres(ql)?:\/\/[^:]+:[^@]+@/, critical: true },
|
|
23
|
+
{ name: 'MongoDB URL', pattern: /mongodb(\+srv)?:\/\/[^:]+:[^@]+@/, critical: true },
|
|
24
|
+
];
|
|
25
|
+
|
|
26
|
+
const REQUIRED_GITIGNORE = [
|
|
27
|
+
{ pattern: '.env', name: '.env files' },
|
|
28
|
+
{ pattern: 'node_modules', name: 'node_modules' },
|
|
29
|
+
{ pattern: '.vibecheck', name: '.vibecheck output' },
|
|
30
|
+
];
|
|
31
|
+
|
|
32
|
+
function createDiagnostics(projectPath) {
|
|
33
|
+
return [
|
|
34
|
+
{
|
|
35
|
+
id: `${MODULE_ID}.env_file`,
|
|
36
|
+
name: '.env File',
|
|
37
|
+
category: CATEGORY.SECURITY,
|
|
38
|
+
parallel: true,
|
|
39
|
+
check: async () => {
|
|
40
|
+
const envPath = path.join(projectPath, '.env');
|
|
41
|
+
const envExamplePath = path.join(projectPath, '.env.example');
|
|
42
|
+
const envLocalPath = path.join(projectPath, '.env.local');
|
|
43
|
+
|
|
44
|
+
const hasEnv = fs.existsSync(envPath);
|
|
45
|
+
const hasEnvExample = fs.existsSync(envExamplePath);
|
|
46
|
+
const hasEnvLocal = fs.existsSync(envLocalPath);
|
|
47
|
+
|
|
48
|
+
const metadata = { hasEnv, hasEnvExample, hasEnvLocal };
|
|
49
|
+
|
|
50
|
+
if (!hasEnv && !hasEnvLocal) {
|
|
51
|
+
return {
|
|
52
|
+
severity: SEVERITY.INFO,
|
|
53
|
+
message: 'No .env file found',
|
|
54
|
+
detail: 'Create .env for local environment variables',
|
|
55
|
+
metadata,
|
|
56
|
+
fixes: [{
|
|
57
|
+
type: FIX_TYPE.FILE_CREATE,
|
|
58
|
+
description: 'Create .env from example',
|
|
59
|
+
path: envPath,
|
|
60
|
+
content: hasEnvExample
|
|
61
|
+
? fs.readFileSync(envExamplePath, 'utf8')
|
|
62
|
+
: '# Environment variables\n',
|
|
63
|
+
autoFixable: true,
|
|
64
|
+
}],
|
|
65
|
+
};
|
|
66
|
+
}
|
|
67
|
+
|
|
68
|
+
if (hasEnv && !hasEnvExample) {
|
|
69
|
+
return {
|
|
70
|
+
severity: SEVERITY.WARNING,
|
|
71
|
+
message: '.env exists but no .env.example',
|
|
72
|
+
detail: 'Create .env.example for team documentation',
|
|
73
|
+
metadata,
|
|
74
|
+
fixes: [{
|
|
75
|
+
type: FIX_TYPE.COMMAND,
|
|
76
|
+
description: 'Generate .env.example from .env',
|
|
77
|
+
command: 'vibecheck ctx --env-template',
|
|
78
|
+
autoFixable: false,
|
|
79
|
+
}],
|
|
80
|
+
};
|
|
81
|
+
}
|
|
82
|
+
|
|
83
|
+
return {
|
|
84
|
+
severity: SEVERITY.PASS,
|
|
85
|
+
message: hasEnvExample ? '.env + .env.example' : '.env configured',
|
|
86
|
+
metadata,
|
|
87
|
+
};
|
|
88
|
+
},
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
id: `${MODULE_ID}.gitignore`,
|
|
92
|
+
name: '.gitignore',
|
|
93
|
+
category: CATEGORY.SECURITY,
|
|
94
|
+
parallel: true,
|
|
95
|
+
check: async () => {
|
|
96
|
+
const gitignorePath = path.join(projectPath, '.gitignore');
|
|
97
|
+
|
|
98
|
+
if (!fs.existsSync(gitignorePath)) {
|
|
99
|
+
return {
|
|
100
|
+
severity: SEVERITY.WARNING,
|
|
101
|
+
message: 'No .gitignore file',
|
|
102
|
+
detail: 'Secrets and build artifacts may be committed to git',
|
|
103
|
+
fixes: [{
|
|
104
|
+
type: FIX_TYPE.FILE_CREATE,
|
|
105
|
+
description: 'Create .gitignore with common patterns',
|
|
106
|
+
path: gitignorePath,
|
|
107
|
+
content: [
|
|
108
|
+
'# Dependencies',
|
|
109
|
+
'node_modules/',
|
|
110
|
+
'',
|
|
111
|
+
'# Environment',
|
|
112
|
+
'.env',
|
|
113
|
+
'.env.local',
|
|
114
|
+
'.env.*.local',
|
|
115
|
+
'',
|
|
116
|
+
'# Build',
|
|
117
|
+
'dist/',
|
|
118
|
+
'build/',
|
|
119
|
+
'.next/',
|
|
120
|
+
'',
|
|
121
|
+
'# vibecheck',
|
|
122
|
+
'.vibecheck/',
|
|
123
|
+
'',
|
|
124
|
+
'# IDE',
|
|
125
|
+
'.idea/',
|
|
126
|
+
'.vscode/',
|
|
127
|
+
'*.swp',
|
|
128
|
+
].join('\n'),
|
|
129
|
+
autoFixable: true,
|
|
130
|
+
}],
|
|
131
|
+
};
|
|
132
|
+
}
|
|
133
|
+
|
|
134
|
+
const content = fs.readFileSync(gitignorePath, 'utf8');
|
|
135
|
+
const missing = REQUIRED_GITIGNORE.filter(r => !content.includes(r.pattern));
|
|
136
|
+
|
|
137
|
+
const metadata = {
|
|
138
|
+
missing: missing.map(m => m.pattern),
|
|
139
|
+
lines: content.split('\n').length,
|
|
140
|
+
};
|
|
141
|
+
|
|
142
|
+
if (missing.length > 0) {
|
|
143
|
+
return {
|
|
144
|
+
severity: SEVERITY.WARNING,
|
|
145
|
+
message: `Missing: ${missing.map(m => m.name).join(', ')}`,
|
|
146
|
+
metadata,
|
|
147
|
+
fixes: [{
|
|
148
|
+
type: FIX_TYPE.FILE_EDIT,
|
|
149
|
+
description: 'Add missing patterns to .gitignore',
|
|
150
|
+
path: gitignorePath,
|
|
151
|
+
content: content + '\n\n# Added by vibecheck doctor\n' +
|
|
152
|
+
missing.map(m => m.pattern).join('\n') + '\n',
|
|
153
|
+
autoFixable: true,
|
|
154
|
+
}],
|
|
155
|
+
};
|
|
156
|
+
}
|
|
157
|
+
|
|
158
|
+
return {
|
|
159
|
+
severity: SEVERITY.PASS,
|
|
160
|
+
message: 'Properly configured',
|
|
161
|
+
metadata,
|
|
162
|
+
};
|
|
163
|
+
},
|
|
164
|
+
},
|
|
165
|
+
{
|
|
166
|
+
id: `${MODULE_ID}.exposed_secrets`,
|
|
167
|
+
name: 'Exposed Secrets',
|
|
168
|
+
category: CATEGORY.SECURITY,
|
|
169
|
+
parallel: false,
|
|
170
|
+
check: async () => {
|
|
171
|
+
const filesToCheck = [
|
|
172
|
+
'package.json',
|
|
173
|
+
'src/config.ts',
|
|
174
|
+
'src/config.js',
|
|
175
|
+
'config/index.ts',
|
|
176
|
+
'config/index.js',
|
|
177
|
+
'next.config.js',
|
|
178
|
+
'next.config.mjs',
|
|
179
|
+
'.env.example',
|
|
180
|
+
'README.md',
|
|
181
|
+
];
|
|
182
|
+
|
|
183
|
+
const findings = [];
|
|
184
|
+
|
|
185
|
+
for (const file of filesToCheck) {
|
|
186
|
+
const filePath = path.join(projectPath, file);
|
|
187
|
+
if (!fs.existsSync(filePath)) continue;
|
|
188
|
+
|
|
189
|
+
try {
|
|
190
|
+
const content = fs.readFileSync(filePath, 'utf8');
|
|
191
|
+
|
|
192
|
+
for (const sp of SECRET_PATTERNS) {
|
|
193
|
+
if (sp.pattern.test(content)) {
|
|
194
|
+
findings.push({
|
|
195
|
+
file,
|
|
196
|
+
secret: sp.name,
|
|
197
|
+
critical: sp.critical,
|
|
198
|
+
});
|
|
199
|
+
}
|
|
200
|
+
}
|
|
201
|
+
} catch {
|
|
202
|
+
// Skip unreadable files
|
|
203
|
+
}
|
|
204
|
+
}
|
|
205
|
+
|
|
206
|
+
const metadata = { findings };
|
|
207
|
+
const criticalFindings = findings.filter(f => f.critical);
|
|
208
|
+
|
|
209
|
+
if (criticalFindings.length > 0) {
|
|
210
|
+
return {
|
|
211
|
+
severity: SEVERITY.CRITICAL,
|
|
212
|
+
message: `${criticalFindings.length} critical secrets exposed`,
|
|
213
|
+
detail: criticalFindings.map(f => `${f.secret} in ${f.file}`).join(', '),
|
|
214
|
+
metadata,
|
|
215
|
+
fixes: [{
|
|
216
|
+
type: FIX_TYPE.MANUAL,
|
|
217
|
+
description: 'Move secrets to .env and add to .gitignore',
|
|
218
|
+
autoFixable: false,
|
|
219
|
+
}],
|
|
220
|
+
};
|
|
221
|
+
}
|
|
222
|
+
|
|
223
|
+
if (findings.length > 0) {
|
|
224
|
+
return {
|
|
225
|
+
severity: SEVERITY.WARNING,
|
|
226
|
+
message: `${findings.length} potential secrets found`,
|
|
227
|
+
detail: findings.map(f => `${f.secret} in ${f.file}`).join(', '),
|
|
228
|
+
metadata,
|
|
229
|
+
fixes: [{
|
|
230
|
+
type: FIX_TYPE.MANUAL,
|
|
231
|
+
description: 'Review and move secrets to .env',
|
|
232
|
+
autoFixable: false,
|
|
233
|
+
}],
|
|
234
|
+
};
|
|
235
|
+
}
|
|
236
|
+
|
|
237
|
+
return {
|
|
238
|
+
severity: SEVERITY.PASS,
|
|
239
|
+
message: 'No exposed secrets detected',
|
|
240
|
+
metadata,
|
|
241
|
+
};
|
|
242
|
+
},
|
|
243
|
+
},
|
|
244
|
+
{
|
|
245
|
+
id: `${MODULE_ID}.env_in_git`,
|
|
246
|
+
name: '.env in Git History',
|
|
247
|
+
category: CATEGORY.SECURITY,
|
|
248
|
+
parallel: true,
|
|
249
|
+
check: async () => {
|
|
250
|
+
const gitDir = path.join(projectPath, '.git');
|
|
251
|
+
if (!fs.existsSync(gitDir)) {
|
|
252
|
+
return {
|
|
253
|
+
severity: SEVERITY.INFO,
|
|
254
|
+
message: 'Not a git repository',
|
|
255
|
+
};
|
|
256
|
+
}
|
|
257
|
+
|
|
258
|
+
try {
|
|
259
|
+
const { execSync } = require('child_process');
|
|
260
|
+
const result = execSync('git log --all --full-history -- .env 2>/dev/null | head -1', {
|
|
261
|
+
cwd: projectPath,
|
|
262
|
+
encoding: 'utf8',
|
|
263
|
+
timeout: 10000,
|
|
264
|
+
}).trim();
|
|
265
|
+
|
|
266
|
+
if (result) {
|
|
267
|
+
return {
|
|
268
|
+
severity: SEVERITY.ERROR,
|
|
269
|
+
message: '.env found in git history',
|
|
270
|
+
detail: 'Secrets may be exposed in git commits',
|
|
271
|
+
fixes: [
|
|
272
|
+
{
|
|
273
|
+
type: FIX_TYPE.LINK,
|
|
274
|
+
description: 'Guide: Remove secrets from git history',
|
|
275
|
+
url: 'https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/removing-sensitive-data-from-a-repository',
|
|
276
|
+
},
|
|
277
|
+
{
|
|
278
|
+
type: FIX_TYPE.COMMAND,
|
|
279
|
+
description: 'Remove .env from history (dangerous)',
|
|
280
|
+
command: 'git filter-branch --force --index-filter "git rm --cached --ignore-unmatch .env" --prune-empty --tag-name-filter cat -- --all',
|
|
281
|
+
dangerous: true,
|
|
282
|
+
autoFixable: false,
|
|
283
|
+
},
|
|
284
|
+
],
|
|
285
|
+
};
|
|
286
|
+
}
|
|
287
|
+
|
|
288
|
+
return {
|
|
289
|
+
severity: SEVERITY.PASS,
|
|
290
|
+
message: 'No .env in git history',
|
|
291
|
+
};
|
|
292
|
+
} catch {
|
|
293
|
+
return {
|
|
294
|
+
severity: SEVERITY.INFO,
|
|
295
|
+
message: 'Could not check git history',
|
|
296
|
+
};
|
|
297
|
+
}
|
|
298
|
+
},
|
|
299
|
+
},
|
|
300
|
+
{
|
|
301
|
+
id: `${MODULE_ID}.npmrc`,
|
|
302
|
+
name: '.npmrc Security',
|
|
303
|
+
category: CATEGORY.SECURITY,
|
|
304
|
+
parallel: true,
|
|
305
|
+
check: async () => {
|
|
306
|
+
const npmrcPath = path.join(projectPath, '.npmrc');
|
|
307
|
+
|
|
308
|
+
if (!fs.existsSync(npmrcPath)) {
|
|
309
|
+
return {
|
|
310
|
+
severity: SEVERITY.INFO,
|
|
311
|
+
message: 'No .npmrc file',
|
|
312
|
+
};
|
|
313
|
+
}
|
|
314
|
+
|
|
315
|
+
const content = fs.readFileSync(npmrcPath, 'utf8');
|
|
316
|
+
const hasToken = content.includes('_authToken') || content.includes('//registry');
|
|
317
|
+
|
|
318
|
+
if (hasToken) {
|
|
319
|
+
const gitignorePath = path.join(projectPath, '.gitignore');
|
|
320
|
+
const gitignoreContent = fs.existsSync(gitignorePath)
|
|
321
|
+
? fs.readFileSync(gitignorePath, 'utf8')
|
|
322
|
+
: '';
|
|
323
|
+
|
|
324
|
+
if (!gitignoreContent.includes('.npmrc')) {
|
|
325
|
+
return {
|
|
326
|
+
severity: SEVERITY.WARNING,
|
|
327
|
+
message: '.npmrc contains tokens but not in .gitignore',
|
|
328
|
+
fixes: [{
|
|
329
|
+
type: FIX_TYPE.FILE_EDIT,
|
|
330
|
+
description: 'Add .npmrc to .gitignore',
|
|
331
|
+
path: gitignorePath,
|
|
332
|
+
content: gitignoreContent + '\n.npmrc\n',
|
|
333
|
+
autoFixable: true,
|
|
334
|
+
}],
|
|
335
|
+
};
|
|
336
|
+
}
|
|
337
|
+
}
|
|
338
|
+
|
|
339
|
+
return {
|
|
340
|
+
severity: SEVERITY.PASS,
|
|
341
|
+
message: hasToken ? 'Contains tokens (gitignored)' : 'No sensitive data',
|
|
342
|
+
};
|
|
343
|
+
},
|
|
344
|
+
},
|
|
345
|
+
];
|
|
346
|
+
}
|
|
347
|
+
|
|
348
|
+
module.exports = { MODULE_ID, createDiagnostics, SECRET_PATTERNS };
|