@vibecheckai/cli 3.2.4 → 3.2.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (123) hide show
  1. package/bin/.generated +25 -25
  2. package/bin/dev/run-v2-torture.js +30 -30
  3. package/bin/runners/lib/__tests__/entitlements-v2.test.js +295 -295
  4. package/bin/runners/lib/api-client.js +269 -0
  5. package/bin/runners/lib/auth-truth.js +193 -193
  6. package/bin/runners/lib/backup.js +62 -62
  7. package/bin/runners/lib/billing.js +107 -107
  8. package/bin/runners/lib/claims.js +118 -118
  9. package/bin/runners/lib/cli-ui.js +540 -540
  10. package/bin/runners/lib/contracts/auth-contract.js +202 -202
  11. package/bin/runners/lib/contracts/env-contract.js +181 -181
  12. package/bin/runners/lib/contracts/external-contract.js +206 -206
  13. package/bin/runners/lib/contracts/guard.js +168 -168
  14. package/bin/runners/lib/contracts/index.js +89 -89
  15. package/bin/runners/lib/contracts/plan-validator.js +311 -311
  16. package/bin/runners/lib/contracts/route-contract.js +199 -199
  17. package/bin/runners/lib/contracts.js +804 -804
  18. package/bin/runners/lib/detect.js +89 -89
  19. package/bin/runners/lib/doctor/autofix.js +254 -254
  20. package/bin/runners/lib/doctor/index.js +37 -37
  21. package/bin/runners/lib/doctor/modules/dependencies.js +325 -325
  22. package/bin/runners/lib/doctor/modules/index.js +46 -46
  23. package/bin/runners/lib/doctor/modules/network.js +250 -250
  24. package/bin/runners/lib/doctor/modules/project.js +312 -312
  25. package/bin/runners/lib/doctor/modules/runtime.js +224 -224
  26. package/bin/runners/lib/doctor/modules/security.js +348 -348
  27. package/bin/runners/lib/doctor/modules/system.js +213 -213
  28. package/bin/runners/lib/doctor/modules/vibecheck.js +394 -394
  29. package/bin/runners/lib/doctor/reporter.js +262 -262
  30. package/bin/runners/lib/doctor/service.js +262 -262
  31. package/bin/runners/lib/doctor/types.js +113 -113
  32. package/bin/runners/lib/doctor/ui.js +263 -263
  33. package/bin/runners/lib/doctor-v2.js +608 -608
  34. package/bin/runners/lib/drift.js +425 -425
  35. package/bin/runners/lib/enforcement.js +72 -72
  36. package/bin/runners/lib/enterprise-detect.js +603 -603
  37. package/bin/runners/lib/enterprise-init.js +942 -942
  38. package/bin/runners/lib/env-resolver.js +417 -417
  39. package/bin/runners/lib/env-template.js +66 -66
  40. package/bin/runners/lib/env.js +189 -189
  41. package/bin/runners/lib/extractors/client-calls.js +990 -990
  42. package/bin/runners/lib/extractors/fastify-route-dump.js +573 -573
  43. package/bin/runners/lib/extractors/fastify-routes.js +426 -426
  44. package/bin/runners/lib/extractors/index.js +363 -363
  45. package/bin/runners/lib/extractors/next-routes.js +524 -524
  46. package/bin/runners/lib/extractors/proof-graph.js +431 -431
  47. package/bin/runners/lib/extractors/route-matcher.js +451 -451
  48. package/bin/runners/lib/extractors/truthpack-v2.js +377 -377
  49. package/bin/runners/lib/extractors/ui-bindings.js +547 -547
  50. package/bin/runners/lib/findings-schema.js +281 -281
  51. package/bin/runners/lib/firewall-prompt.js +50 -50
  52. package/bin/runners/lib/graph/graph-builder.js +265 -265
  53. package/bin/runners/lib/graph/html-renderer.js +413 -413
  54. package/bin/runners/lib/graph/index.js +32 -32
  55. package/bin/runners/lib/graph/runtime-collector.js +215 -215
  56. package/bin/runners/lib/graph/static-extractor.js +518 -518
  57. package/bin/runners/lib/html-report.js +650 -650
  58. package/bin/runners/lib/llm.js +75 -75
  59. package/bin/runners/lib/meter.js +61 -61
  60. package/bin/runners/lib/missions/evidence.js +126 -126
  61. package/bin/runners/lib/patch.js +40 -40
  62. package/bin/runners/lib/permissions/auth-model.js +213 -213
  63. package/bin/runners/lib/permissions/idor-prover.js +205 -205
  64. package/bin/runners/lib/permissions/index.js +45 -45
  65. package/bin/runners/lib/permissions/matrix-builder.js +198 -198
  66. package/bin/runners/lib/pkgjson.js +28 -28
  67. package/bin/runners/lib/policy.js +295 -295
  68. package/bin/runners/lib/preflight.js +142 -142
  69. package/bin/runners/lib/reality/correlation-detectors.js +359 -359
  70. package/bin/runners/lib/reality/index.js +318 -318
  71. package/bin/runners/lib/reality/request-hashing.js +416 -416
  72. package/bin/runners/lib/reality/request-mapper.js +453 -453
  73. package/bin/runners/lib/reality/safety-rails.js +463 -463
  74. package/bin/runners/lib/reality/semantic-snapshot.js +408 -408
  75. package/bin/runners/lib/reality/toast-detector.js +393 -393
  76. package/bin/runners/lib/reality-findings.js +84 -84
  77. package/bin/runners/lib/receipts.js +179 -179
  78. package/bin/runners/lib/redact.js +29 -29
  79. package/bin/runners/lib/replay/capsule-manager.js +154 -154
  80. package/bin/runners/lib/replay/index.js +263 -263
  81. package/bin/runners/lib/replay/player.js +348 -348
  82. package/bin/runners/lib/replay/recorder.js +331 -331
  83. package/bin/runners/lib/report.js +135 -135
  84. package/bin/runners/lib/route-detection.js +1140 -1140
  85. package/bin/runners/lib/sandbox/index.js +59 -59
  86. package/bin/runners/lib/sandbox/proof-chain.js +399 -399
  87. package/bin/runners/lib/sandbox/sandbox-runner.js +205 -205
  88. package/bin/runners/lib/sandbox/worktree.js +174 -174
  89. package/bin/runners/lib/schema-validator.js +350 -350
  90. package/bin/runners/lib/schemas/contracts.schema.json +160 -160
  91. package/bin/runners/lib/schemas/finding.schema.json +100 -100
  92. package/bin/runners/lib/schemas/mission-pack.schema.json +206 -206
  93. package/bin/runners/lib/schemas/proof-graph.schema.json +176 -176
  94. package/bin/runners/lib/schemas/reality-report.schema.json +162 -162
  95. package/bin/runners/lib/schemas/share-pack.schema.json +180 -180
  96. package/bin/runners/lib/schemas/ship-report.schema.json +117 -117
  97. package/bin/runners/lib/schemas/truthpack-v2.schema.json +303 -303
  98. package/bin/runners/lib/schemas/validator.js +438 -438
  99. package/bin/runners/lib/score-history.js +282 -282
  100. package/bin/runners/lib/share-pack.js +239 -239
  101. package/bin/runners/lib/snippets.js +67 -67
  102. package/bin/runners/lib/upsell.js +510 -510
  103. package/bin/runners/lib/usage.js +153 -153
  104. package/bin/runners/lib/validate-patch.js +156 -156
  105. package/bin/runners/lib/verdict-engine.js +628 -628
  106. package/bin/runners/reality/engine.js +917 -917
  107. package/bin/runners/reality/flows.js +122 -122
  108. package/bin/runners/reality/report.js +378 -378
  109. package/bin/runners/reality/session.js +193 -193
  110. package/bin/runners/runAgent.d.ts +5 -0
  111. package/bin/runners/runFirewall.d.ts +5 -0
  112. package/bin/runners/runFirewallHook.d.ts +5 -0
  113. package/bin/runners/runGuard.js +168 -168
  114. package/bin/runners/runScan.js +82 -0
  115. package/bin/runners/runTruth.d.ts +5 -0
  116. package/bin/vibecheck.js +45 -20
  117. package/mcp-server/index.js +85 -0
  118. package/mcp-server/lib/api-client.js +269 -0
  119. package/mcp-server/package.json +1 -1
  120. package/mcp-server/tier-auth.js +173 -113
  121. package/mcp-server/tools/index.js +72 -72
  122. package/mcp-server/vibecheck-mcp-server-3.2.0.tgz +0 -0
  123. package/package.json +1 -1
@@ -1,348 +1,348 @@
1
- /**
2
- * Security Diagnostics Module
3
- *
4
- * Checks for exposed secrets, gitignore configuration, and security best practices
5
- */
6
-
7
- const fs = require('fs');
8
- const path = require('path');
9
- const { SEVERITY, CATEGORY, FIX_TYPE } = require('../types');
10
-
11
- const MODULE_ID = 'security';
12
-
13
- const SECRET_PATTERNS = [
14
- { name: 'Stripe Live Key', pattern: /sk_live_[a-zA-Z0-9]{20,}/, critical: true },
15
- { name: 'Stripe Test Key', pattern: /sk_test_[a-zA-Z0-9]{20,}/, critical: false },
16
- { name: 'AWS Access Key', pattern: /AKIA[0-9A-Z]{16}/, critical: true },
17
- { name: 'GitHub Token', pattern: /ghp_[a-zA-Z0-9]{36}/, critical: true },
18
- { name: 'GitHub OAuth', pattern: /gho_[a-zA-Z0-9]{36}/, critical: true },
19
- { name: 'Private Key', pattern: /-----BEGIN (RSA |EC |DSA |OPENSSH )?PRIVATE KEY-----/, critical: true },
20
- { name: 'Generic API Key', pattern: /api[_-]?key['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
21
- { name: 'Generic Secret', pattern: /secret['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
22
- { name: 'Database URL', pattern: /postgres(ql)?:\/\/[^:]+:[^@]+@/, critical: true },
23
- { name: 'MongoDB URL', pattern: /mongodb(\+srv)?:\/\/[^:]+:[^@]+@/, critical: true },
24
- ];
25
-
26
- const REQUIRED_GITIGNORE = [
27
- { pattern: '.env', name: '.env files' },
28
- { pattern: 'node_modules', name: 'node_modules' },
29
- { pattern: '.vibecheck', name: '.vibecheck output' },
30
- ];
31
-
32
- function createDiagnostics(projectPath) {
33
- return [
34
- {
35
- id: `${MODULE_ID}.env_file`,
36
- name: '.env File',
37
- category: CATEGORY.SECURITY,
38
- parallel: true,
39
- check: async () => {
40
- const envPath = path.join(projectPath, '.env');
41
- const envExamplePath = path.join(projectPath, '.env.example');
42
- const envLocalPath = path.join(projectPath, '.env.local');
43
-
44
- const hasEnv = fs.existsSync(envPath);
45
- const hasEnvExample = fs.existsSync(envExamplePath);
46
- const hasEnvLocal = fs.existsSync(envLocalPath);
47
-
48
- const metadata = { hasEnv, hasEnvExample, hasEnvLocal };
49
-
50
- if (!hasEnv && !hasEnvLocal) {
51
- return {
52
- severity: SEVERITY.INFO,
53
- message: 'No .env file found',
54
- detail: 'Create .env for local environment variables',
55
- metadata,
56
- fixes: [{
57
- type: FIX_TYPE.FILE_CREATE,
58
- description: 'Create .env from example',
59
- path: envPath,
60
- content: hasEnvExample
61
- ? fs.readFileSync(envExamplePath, 'utf8')
62
- : '# Environment variables\n',
63
- autoFixable: true,
64
- }],
65
- };
66
- }
67
-
68
- if (hasEnv && !hasEnvExample) {
69
- return {
70
- severity: SEVERITY.WARNING,
71
- message: '.env exists but no .env.example',
72
- detail: 'Create .env.example for team documentation',
73
- metadata,
74
- fixes: [{
75
- type: FIX_TYPE.COMMAND,
76
- description: 'Generate .env.example from .env',
77
- command: 'vibecheck ctx --env-template',
78
- autoFixable: false,
79
- }],
80
- };
81
- }
82
-
83
- return {
84
- severity: SEVERITY.PASS,
85
- message: hasEnvExample ? '.env + .env.example' : '.env configured',
86
- metadata,
87
- };
88
- },
89
- },
90
- {
91
- id: `${MODULE_ID}.gitignore`,
92
- name: '.gitignore',
93
- category: CATEGORY.SECURITY,
94
- parallel: true,
95
- check: async () => {
96
- const gitignorePath = path.join(projectPath, '.gitignore');
97
-
98
- if (!fs.existsSync(gitignorePath)) {
99
- return {
100
- severity: SEVERITY.WARNING,
101
- message: 'No .gitignore file',
102
- detail: 'Secrets and build artifacts may be committed to git',
103
- fixes: [{
104
- type: FIX_TYPE.FILE_CREATE,
105
- description: 'Create .gitignore with common patterns',
106
- path: gitignorePath,
107
- content: [
108
- '# Dependencies',
109
- 'node_modules/',
110
- '',
111
- '# Environment',
112
- '.env',
113
- '.env.local',
114
- '.env.*.local',
115
- '',
116
- '# Build',
117
- 'dist/',
118
- 'build/',
119
- '.next/',
120
- '',
121
- '# vibecheck',
122
- '.vibecheck/',
123
- '',
124
- '# IDE',
125
- '.idea/',
126
- '.vscode/',
127
- '*.swp',
128
- ].join('\n'),
129
- autoFixable: true,
130
- }],
131
- };
132
- }
133
-
134
- const content = fs.readFileSync(gitignorePath, 'utf8');
135
- const missing = REQUIRED_GITIGNORE.filter(r => !content.includes(r.pattern));
136
-
137
- const metadata = {
138
- missing: missing.map(m => m.pattern),
139
- lines: content.split('\n').length,
140
- };
141
-
142
- if (missing.length > 0) {
143
- return {
144
- severity: SEVERITY.WARNING,
145
- message: `Missing: ${missing.map(m => m.name).join(', ')}`,
146
- metadata,
147
- fixes: [{
148
- type: FIX_TYPE.FILE_EDIT,
149
- description: 'Add missing patterns to .gitignore',
150
- path: gitignorePath,
151
- content: content + '\n\n# Added by vibecheck doctor\n' +
152
- missing.map(m => m.pattern).join('\n') + '\n',
153
- autoFixable: true,
154
- }],
155
- };
156
- }
157
-
158
- return {
159
- severity: SEVERITY.PASS,
160
- message: 'Properly configured',
161
- metadata,
162
- };
163
- },
164
- },
165
- {
166
- id: `${MODULE_ID}.exposed_secrets`,
167
- name: 'Exposed Secrets',
168
- category: CATEGORY.SECURITY,
169
- parallel: false,
170
- check: async () => {
171
- const filesToCheck = [
172
- 'package.json',
173
- 'src/config.ts',
174
- 'src/config.js',
175
- 'config/index.ts',
176
- 'config/index.js',
177
- 'next.config.js',
178
- 'next.config.mjs',
179
- '.env.example',
180
- 'README.md',
181
- ];
182
-
183
- const findings = [];
184
-
185
- for (const file of filesToCheck) {
186
- const filePath = path.join(projectPath, file);
187
- if (!fs.existsSync(filePath)) continue;
188
-
189
- try {
190
- const content = fs.readFileSync(filePath, 'utf8');
191
-
192
- for (const sp of SECRET_PATTERNS) {
193
- if (sp.pattern.test(content)) {
194
- findings.push({
195
- file,
196
- secret: sp.name,
197
- critical: sp.critical,
198
- });
199
- }
200
- }
201
- } catch {
202
- // Skip unreadable files
203
- }
204
- }
205
-
206
- const metadata = { findings };
207
- const criticalFindings = findings.filter(f => f.critical);
208
-
209
- if (criticalFindings.length > 0) {
210
- return {
211
- severity: SEVERITY.CRITICAL,
212
- message: `${criticalFindings.length} critical secrets exposed`,
213
- detail: criticalFindings.map(f => `${f.secret} in ${f.file}`).join(', '),
214
- metadata,
215
- fixes: [{
216
- type: FIX_TYPE.MANUAL,
217
- description: 'Move secrets to .env and add to .gitignore',
218
- autoFixable: false,
219
- }],
220
- };
221
- }
222
-
223
- if (findings.length > 0) {
224
- return {
225
- severity: SEVERITY.WARNING,
226
- message: `${findings.length} potential secrets found`,
227
- detail: findings.map(f => `${f.secret} in ${f.file}`).join(', '),
228
- metadata,
229
- fixes: [{
230
- type: FIX_TYPE.MANUAL,
231
- description: 'Review and move secrets to .env',
232
- autoFixable: false,
233
- }],
234
- };
235
- }
236
-
237
- return {
238
- severity: SEVERITY.PASS,
239
- message: 'No exposed secrets detected',
240
- metadata,
241
- };
242
- },
243
- },
244
- {
245
- id: `${MODULE_ID}.env_in_git`,
246
- name: '.env in Git History',
247
- category: CATEGORY.SECURITY,
248
- parallel: true,
249
- check: async () => {
250
- const gitDir = path.join(projectPath, '.git');
251
- if (!fs.existsSync(gitDir)) {
252
- return {
253
- severity: SEVERITY.INFO,
254
- message: 'Not a git repository',
255
- };
256
- }
257
-
258
- try {
259
- const { execSync } = require('child_process');
260
- const result = execSync('git log --all --full-history -- .env 2>/dev/null | head -1', {
261
- cwd: projectPath,
262
- encoding: 'utf8',
263
- timeout: 10000,
264
- }).trim();
265
-
266
- if (result) {
267
- return {
268
- severity: SEVERITY.ERROR,
269
- message: '.env found in git history',
270
- detail: 'Secrets may be exposed in git commits',
271
- fixes: [
272
- {
273
- type: FIX_TYPE.LINK,
274
- description: 'Guide: Remove secrets from git history',
275
- url: 'https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/removing-sensitive-data-from-a-repository',
276
- },
277
- {
278
- type: FIX_TYPE.COMMAND,
279
- description: 'Remove .env from history (dangerous)',
280
- command: 'git filter-branch --force --index-filter "git rm --cached --ignore-unmatch .env" --prune-empty --tag-name-filter cat -- --all',
281
- dangerous: true,
282
- autoFixable: false,
283
- },
284
- ],
285
- };
286
- }
287
-
288
- return {
289
- severity: SEVERITY.PASS,
290
- message: 'No .env in git history',
291
- };
292
- } catch {
293
- return {
294
- severity: SEVERITY.INFO,
295
- message: 'Could not check git history',
296
- };
297
- }
298
- },
299
- },
300
- {
301
- id: `${MODULE_ID}.npmrc`,
302
- name: '.npmrc Security',
303
- category: CATEGORY.SECURITY,
304
- parallel: true,
305
- check: async () => {
306
- const npmrcPath = path.join(projectPath, '.npmrc');
307
-
308
- if (!fs.existsSync(npmrcPath)) {
309
- return {
310
- severity: SEVERITY.INFO,
311
- message: 'No .npmrc file',
312
- };
313
- }
314
-
315
- const content = fs.readFileSync(npmrcPath, 'utf8');
316
- const hasToken = content.includes('_authToken') || content.includes('//registry');
317
-
318
- if (hasToken) {
319
- const gitignorePath = path.join(projectPath, '.gitignore');
320
- const gitignoreContent = fs.existsSync(gitignorePath)
321
- ? fs.readFileSync(gitignorePath, 'utf8')
322
- : '';
323
-
324
- if (!gitignoreContent.includes('.npmrc')) {
325
- return {
326
- severity: SEVERITY.WARNING,
327
- message: '.npmrc contains tokens but not in .gitignore',
328
- fixes: [{
329
- type: FIX_TYPE.FILE_EDIT,
330
- description: 'Add .npmrc to .gitignore',
331
- path: gitignorePath,
332
- content: gitignoreContent + '\n.npmrc\n',
333
- autoFixable: true,
334
- }],
335
- };
336
- }
337
- }
338
-
339
- return {
340
- severity: SEVERITY.PASS,
341
- message: hasToken ? 'Contains tokens (gitignored)' : 'No sensitive data',
342
- };
343
- },
344
- },
345
- ];
346
- }
347
-
348
- module.exports = { MODULE_ID, createDiagnostics, SECRET_PATTERNS };
1
+ /**
2
+ * Security Diagnostics Module
3
+ *
4
+ * Checks for exposed secrets, gitignore configuration, and security best practices
5
+ */
6
+
7
+ const fs = require('fs');
8
+ const path = require('path');
9
+ const { SEVERITY, CATEGORY, FIX_TYPE } = require('../types');
10
+
11
+ const MODULE_ID = 'security';
12
+
13
+ const SECRET_PATTERNS = [
14
+ { name: 'Stripe Live Key', pattern: /sk_live_[a-zA-Z0-9]{20,}/, critical: true },
15
+ { name: 'Stripe Test Key', pattern: /sk_test_[a-zA-Z0-9]{20,}/, critical: false },
16
+ { name: 'AWS Access Key', pattern: /AKIA[0-9A-Z]{16}/, critical: true },
17
+ { name: 'GitHub Token', pattern: /ghp_[a-zA-Z0-9]{36}/, critical: true },
18
+ { name: 'GitHub OAuth', pattern: /gho_[a-zA-Z0-9]{36}/, critical: true },
19
+ { name: 'Private Key', pattern: /-----BEGIN (RSA |EC |DSA |OPENSSH )?PRIVATE KEY-----/, critical: true },
20
+ { name: 'Generic API Key', pattern: /api[_-]?key['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
21
+ { name: 'Generic Secret', pattern: /secret['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
22
+ { name: 'Database URL', pattern: /postgres(ql)?:\/\/[^:]+:[^@]+@/, critical: true },
23
+ { name: 'MongoDB URL', pattern: /mongodb(\+srv)?:\/\/[^:]+:[^@]+@/, critical: true },
24
+ ];
25
+
26
+ const REQUIRED_GITIGNORE = [
27
+ { pattern: '.env', name: '.env files' },
28
+ { pattern: 'node_modules', name: 'node_modules' },
29
+ { pattern: '.vibecheck', name: '.vibecheck output' },
30
+ ];
31
+
32
+ function createDiagnostics(projectPath) {
33
+ return [
34
+ {
35
+ id: `${MODULE_ID}.env_file`,
36
+ name: '.env File',
37
+ category: CATEGORY.SECURITY,
38
+ parallel: true,
39
+ check: async () => {
40
+ const envPath = path.join(projectPath, '.env');
41
+ const envExamplePath = path.join(projectPath, '.env.example');
42
+ const envLocalPath = path.join(projectPath, '.env.local');
43
+
44
+ const hasEnv = fs.existsSync(envPath);
45
+ const hasEnvExample = fs.existsSync(envExamplePath);
46
+ const hasEnvLocal = fs.existsSync(envLocalPath);
47
+
48
+ const metadata = { hasEnv, hasEnvExample, hasEnvLocal };
49
+
50
+ if (!hasEnv && !hasEnvLocal) {
51
+ return {
52
+ severity: SEVERITY.INFO,
53
+ message: 'No .env file found',
54
+ detail: 'Create .env for local environment variables',
55
+ metadata,
56
+ fixes: [{
57
+ type: FIX_TYPE.FILE_CREATE,
58
+ description: 'Create .env from example',
59
+ path: envPath,
60
+ content: hasEnvExample
61
+ ? fs.readFileSync(envExamplePath, 'utf8')
62
+ : '# Environment variables\n',
63
+ autoFixable: true,
64
+ }],
65
+ };
66
+ }
67
+
68
+ if (hasEnv && !hasEnvExample) {
69
+ return {
70
+ severity: SEVERITY.WARNING,
71
+ message: '.env exists but no .env.example',
72
+ detail: 'Create .env.example for team documentation',
73
+ metadata,
74
+ fixes: [{
75
+ type: FIX_TYPE.COMMAND,
76
+ description: 'Generate .env.example from .env',
77
+ command: 'vibecheck ctx --env-template',
78
+ autoFixable: false,
79
+ }],
80
+ };
81
+ }
82
+
83
+ return {
84
+ severity: SEVERITY.PASS,
85
+ message: hasEnvExample ? '.env + .env.example' : '.env configured',
86
+ metadata,
87
+ };
88
+ },
89
+ },
90
+ {
91
+ id: `${MODULE_ID}.gitignore`,
92
+ name: '.gitignore',
93
+ category: CATEGORY.SECURITY,
94
+ parallel: true,
95
+ check: async () => {
96
+ const gitignorePath = path.join(projectPath, '.gitignore');
97
+
98
+ if (!fs.existsSync(gitignorePath)) {
99
+ return {
100
+ severity: SEVERITY.WARNING,
101
+ message: 'No .gitignore file',
102
+ detail: 'Secrets and build artifacts may be committed to git',
103
+ fixes: [{
104
+ type: FIX_TYPE.FILE_CREATE,
105
+ description: 'Create .gitignore with common patterns',
106
+ path: gitignorePath,
107
+ content: [
108
+ '# Dependencies',
109
+ 'node_modules/',
110
+ '',
111
+ '# Environment',
112
+ '.env',
113
+ '.env.local',
114
+ '.env.*.local',
115
+ '',
116
+ '# Build',
117
+ 'dist/',
118
+ 'build/',
119
+ '.next/',
120
+ '',
121
+ '# vibecheck',
122
+ '.vibecheck/',
123
+ '',
124
+ '# IDE',
125
+ '.idea/',
126
+ '.vscode/',
127
+ '*.swp',
128
+ ].join('\n'),
129
+ autoFixable: true,
130
+ }],
131
+ };
132
+ }
133
+
134
+ const content = fs.readFileSync(gitignorePath, 'utf8');
135
+ const missing = REQUIRED_GITIGNORE.filter(r => !content.includes(r.pattern));
136
+
137
+ const metadata = {
138
+ missing: missing.map(m => m.pattern),
139
+ lines: content.split('\n').length,
140
+ };
141
+
142
+ if (missing.length > 0) {
143
+ return {
144
+ severity: SEVERITY.WARNING,
145
+ message: `Missing: ${missing.map(m => m.name).join(', ')}`,
146
+ metadata,
147
+ fixes: [{
148
+ type: FIX_TYPE.FILE_EDIT,
149
+ description: 'Add missing patterns to .gitignore',
150
+ path: gitignorePath,
151
+ content: content + '\n\n# Added by vibecheck doctor\n' +
152
+ missing.map(m => m.pattern).join('\n') + '\n',
153
+ autoFixable: true,
154
+ }],
155
+ };
156
+ }
157
+
158
+ return {
159
+ severity: SEVERITY.PASS,
160
+ message: 'Properly configured',
161
+ metadata,
162
+ };
163
+ },
164
+ },
165
+ {
166
+ id: `${MODULE_ID}.exposed_secrets`,
167
+ name: 'Exposed Secrets',
168
+ category: CATEGORY.SECURITY,
169
+ parallel: false,
170
+ check: async () => {
171
+ const filesToCheck = [
172
+ 'package.json',
173
+ 'src/config.ts',
174
+ 'src/config.js',
175
+ 'config/index.ts',
176
+ 'config/index.js',
177
+ 'next.config.js',
178
+ 'next.config.mjs',
179
+ '.env.example',
180
+ 'README.md',
181
+ ];
182
+
183
+ const findings = [];
184
+
185
+ for (const file of filesToCheck) {
186
+ const filePath = path.join(projectPath, file);
187
+ if (!fs.existsSync(filePath)) continue;
188
+
189
+ try {
190
+ const content = fs.readFileSync(filePath, 'utf8');
191
+
192
+ for (const sp of SECRET_PATTERNS) {
193
+ if (sp.pattern.test(content)) {
194
+ findings.push({
195
+ file,
196
+ secret: sp.name,
197
+ critical: sp.critical,
198
+ });
199
+ }
200
+ }
201
+ } catch {
202
+ // Skip unreadable files
203
+ }
204
+ }
205
+
206
+ const metadata = { findings };
207
+ const criticalFindings = findings.filter(f => f.critical);
208
+
209
+ if (criticalFindings.length > 0) {
210
+ return {
211
+ severity: SEVERITY.CRITICAL,
212
+ message: `${criticalFindings.length} critical secrets exposed`,
213
+ detail: criticalFindings.map(f => `${f.secret} in ${f.file}`).join(', '),
214
+ metadata,
215
+ fixes: [{
216
+ type: FIX_TYPE.MANUAL,
217
+ description: 'Move secrets to .env and add to .gitignore',
218
+ autoFixable: false,
219
+ }],
220
+ };
221
+ }
222
+
223
+ if (findings.length > 0) {
224
+ return {
225
+ severity: SEVERITY.WARNING,
226
+ message: `${findings.length} potential secrets found`,
227
+ detail: findings.map(f => `${f.secret} in ${f.file}`).join(', '),
228
+ metadata,
229
+ fixes: [{
230
+ type: FIX_TYPE.MANUAL,
231
+ description: 'Review and move secrets to .env',
232
+ autoFixable: false,
233
+ }],
234
+ };
235
+ }
236
+
237
+ return {
238
+ severity: SEVERITY.PASS,
239
+ message: 'No exposed secrets detected',
240
+ metadata,
241
+ };
242
+ },
243
+ },
244
+ {
245
+ id: `${MODULE_ID}.env_in_git`,
246
+ name: '.env in Git History',
247
+ category: CATEGORY.SECURITY,
248
+ parallel: true,
249
+ check: async () => {
250
+ const gitDir = path.join(projectPath, '.git');
251
+ if (!fs.existsSync(gitDir)) {
252
+ return {
253
+ severity: SEVERITY.INFO,
254
+ message: 'Not a git repository',
255
+ };
256
+ }
257
+
258
+ try {
259
+ const { execSync } = require('child_process');
260
+ const result = execSync('git log --all --full-history -- .env 2>/dev/null | head -1', {
261
+ cwd: projectPath,
262
+ encoding: 'utf8',
263
+ timeout: 10000,
264
+ }).trim();
265
+
266
+ if (result) {
267
+ return {
268
+ severity: SEVERITY.ERROR,
269
+ message: '.env found in git history',
270
+ detail: 'Secrets may be exposed in git commits',
271
+ fixes: [
272
+ {
273
+ type: FIX_TYPE.LINK,
274
+ description: 'Guide: Remove secrets from git history',
275
+ url: 'https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/removing-sensitive-data-from-a-repository',
276
+ },
277
+ {
278
+ type: FIX_TYPE.COMMAND,
279
+ description: 'Remove .env from history (dangerous)',
280
+ command: 'git filter-branch --force --index-filter "git rm --cached --ignore-unmatch .env" --prune-empty --tag-name-filter cat -- --all',
281
+ dangerous: true,
282
+ autoFixable: false,
283
+ },
284
+ ],
285
+ };
286
+ }
287
+
288
+ return {
289
+ severity: SEVERITY.PASS,
290
+ message: 'No .env in git history',
291
+ };
292
+ } catch {
293
+ return {
294
+ severity: SEVERITY.INFO,
295
+ message: 'Could not check git history',
296
+ };
297
+ }
298
+ },
299
+ },
300
+ {
301
+ id: `${MODULE_ID}.npmrc`,
302
+ name: '.npmrc Security',
303
+ category: CATEGORY.SECURITY,
304
+ parallel: true,
305
+ check: async () => {
306
+ const npmrcPath = path.join(projectPath, '.npmrc');
307
+
308
+ if (!fs.existsSync(npmrcPath)) {
309
+ return {
310
+ severity: SEVERITY.INFO,
311
+ message: 'No .npmrc file',
312
+ };
313
+ }
314
+
315
+ const content = fs.readFileSync(npmrcPath, 'utf8');
316
+ const hasToken = content.includes('_authToken') || content.includes('//registry');
317
+
318
+ if (hasToken) {
319
+ const gitignorePath = path.join(projectPath, '.gitignore');
320
+ const gitignoreContent = fs.existsSync(gitignorePath)
321
+ ? fs.readFileSync(gitignorePath, 'utf8')
322
+ : '';
323
+
324
+ if (!gitignoreContent.includes('.npmrc')) {
325
+ return {
326
+ severity: SEVERITY.WARNING,
327
+ message: '.npmrc contains tokens but not in .gitignore',
328
+ fixes: [{
329
+ type: FIX_TYPE.FILE_EDIT,
330
+ description: 'Add .npmrc to .gitignore',
331
+ path: gitignorePath,
332
+ content: gitignoreContent + '\n.npmrc\n',
333
+ autoFixable: true,
334
+ }],
335
+ };
336
+ }
337
+ }
338
+
339
+ return {
340
+ severity: SEVERITY.PASS,
341
+ message: hasToken ? 'Contains tokens (gitignored)' : 'No sensitive data',
342
+ };
343
+ },
344
+ },
345
+ ];
346
+ }
347
+
348
+ module.exports = { MODULE_ID, createDiagnostics, SECRET_PATTERNS };