@vibecheckai/cli 3.2.5 → 3.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (197) hide show
  1. package/bin/.generated +25 -25
  2. package/bin/dev/run-v2-torture.js +30 -30
  3. package/bin/registry.js +192 -5
  4. package/bin/runners/lib/__tests__/entitlements-v2.test.js +295 -295
  5. package/bin/runners/lib/agent-firewall/change-packet/builder.js +280 -6
  6. package/bin/runners/lib/agent-firewall/critic/index.js +151 -0
  7. package/bin/runners/lib/agent-firewall/critic/judge.js +432 -0
  8. package/bin/runners/lib/agent-firewall/critic/prompts.js +305 -0
  9. package/bin/runners/lib/agent-firewall/lawbook/distributor.js +465 -0
  10. package/bin/runners/lib/agent-firewall/lawbook/evaluator.js +604 -0
  11. package/bin/runners/lib/agent-firewall/lawbook/index.js +304 -0
  12. package/bin/runners/lib/agent-firewall/lawbook/registry.js +514 -0
  13. package/bin/runners/lib/agent-firewall/lawbook/schema.js +420 -0
  14. package/bin/runners/lib/agent-firewall/logger.js +141 -0
  15. package/bin/runners/lib/agent-firewall/policy/loader.js +312 -4
  16. package/bin/runners/lib/agent-firewall/policy/rules/ghost-env.js +113 -1
  17. package/bin/runners/lib/agent-firewall/policy/rules/ghost-route.js +133 -6
  18. package/bin/runners/lib/agent-firewall/proposal/extractor.js +394 -0
  19. package/bin/runners/lib/agent-firewall/proposal/index.js +212 -0
  20. package/bin/runners/lib/agent-firewall/proposal/schema.js +251 -0
  21. package/bin/runners/lib/agent-firewall/proposal/validator.js +386 -0
  22. package/bin/runners/lib/agent-firewall/reality/index.js +332 -0
  23. package/bin/runners/lib/agent-firewall/reality/state.js +625 -0
  24. package/bin/runners/lib/agent-firewall/reality/watcher.js +322 -0
  25. package/bin/runners/lib/agent-firewall/risk/index.js +173 -0
  26. package/bin/runners/lib/agent-firewall/risk/scorer.js +328 -0
  27. package/bin/runners/lib/agent-firewall/risk/thresholds.js +321 -0
  28. package/bin/runners/lib/agent-firewall/risk/vectors.js +421 -0
  29. package/bin/runners/lib/agent-firewall/simulator/diff-simulator.js +472 -0
  30. package/bin/runners/lib/agent-firewall/simulator/import-resolver.js +346 -0
  31. package/bin/runners/lib/agent-firewall/simulator/index.js +181 -0
  32. package/bin/runners/lib/agent-firewall/simulator/route-validator.js +380 -0
  33. package/bin/runners/lib/agent-firewall/time-machine/incident-correlator.js +661 -0
  34. package/bin/runners/lib/agent-firewall/time-machine/index.js +267 -0
  35. package/bin/runners/lib/agent-firewall/time-machine/replay-engine.js +436 -0
  36. package/bin/runners/lib/agent-firewall/time-machine/state-reconstructor.js +490 -0
  37. package/bin/runners/lib/agent-firewall/time-machine/timeline-builder.js +530 -0
  38. package/bin/runners/lib/analyzers.js +81 -18
  39. package/bin/runners/lib/api-client.js +269 -0
  40. package/bin/runners/lib/auth-truth.js +193 -193
  41. package/bin/runners/lib/authority-badge.js +425 -0
  42. package/bin/runners/lib/backup.js +62 -62
  43. package/bin/runners/lib/billing.js +107 -107
  44. package/bin/runners/lib/claims.js +118 -118
  45. package/bin/runners/lib/cli-output.js +7 -1
  46. package/bin/runners/lib/cli-ui.js +540 -540
  47. package/bin/runners/lib/contracts/auth-contract.js +202 -202
  48. package/bin/runners/lib/contracts/env-contract.js +181 -181
  49. package/bin/runners/lib/contracts/external-contract.js +206 -206
  50. package/bin/runners/lib/contracts/guard.js +168 -168
  51. package/bin/runners/lib/contracts/index.js +89 -89
  52. package/bin/runners/lib/contracts/plan-validator.js +311 -311
  53. package/bin/runners/lib/contracts/route-contract.js +199 -199
  54. package/bin/runners/lib/contracts.js +804 -804
  55. package/bin/runners/lib/detect.js +89 -89
  56. package/bin/runners/lib/doctor/autofix.js +254 -254
  57. package/bin/runners/lib/doctor/index.js +37 -37
  58. package/bin/runners/lib/doctor/modules/dependencies.js +325 -325
  59. package/bin/runners/lib/doctor/modules/index.js +46 -46
  60. package/bin/runners/lib/doctor/modules/network.js +250 -250
  61. package/bin/runners/lib/doctor/modules/project.js +312 -312
  62. package/bin/runners/lib/doctor/modules/runtime.js +224 -224
  63. package/bin/runners/lib/doctor/modules/security.js +348 -348
  64. package/bin/runners/lib/doctor/modules/system.js +213 -213
  65. package/bin/runners/lib/doctor/modules/vibecheck.js +394 -394
  66. package/bin/runners/lib/doctor/reporter.js +262 -262
  67. package/bin/runners/lib/doctor/service.js +262 -262
  68. package/bin/runners/lib/doctor/types.js +113 -113
  69. package/bin/runners/lib/doctor/ui.js +263 -263
  70. package/bin/runners/lib/doctor-v2.js +608 -608
  71. package/bin/runners/lib/drift.js +425 -425
  72. package/bin/runners/lib/enforcement.js +72 -72
  73. package/bin/runners/lib/enterprise-detect.js +603 -603
  74. package/bin/runners/lib/enterprise-init.js +942 -942
  75. package/bin/runners/lib/env-resolver.js +417 -417
  76. package/bin/runners/lib/env-template.js +66 -66
  77. package/bin/runners/lib/env.js +189 -189
  78. package/bin/runners/lib/error-handler.js +16 -9
  79. package/bin/runners/lib/exit-codes.js +275 -0
  80. package/bin/runners/lib/extractors/client-calls.js +990 -990
  81. package/bin/runners/lib/extractors/fastify-route-dump.js +573 -573
  82. package/bin/runners/lib/extractors/fastify-routes.js +426 -426
  83. package/bin/runners/lib/extractors/index.js +363 -363
  84. package/bin/runners/lib/extractors/next-routes.js +524 -524
  85. package/bin/runners/lib/extractors/proof-graph.js +431 -431
  86. package/bin/runners/lib/extractors/route-matcher.js +451 -451
  87. package/bin/runners/lib/extractors/truthpack-v2.js +377 -377
  88. package/bin/runners/lib/extractors/ui-bindings.js +547 -547
  89. package/bin/runners/lib/findings-schema.js +281 -281
  90. package/bin/runners/lib/firewall-prompt.js +50 -50
  91. package/bin/runners/lib/global-flags.js +37 -0
  92. package/bin/runners/lib/graph/graph-builder.js +265 -265
  93. package/bin/runners/lib/graph/html-renderer.js +413 -413
  94. package/bin/runners/lib/graph/index.js +32 -32
  95. package/bin/runners/lib/graph/runtime-collector.js +215 -215
  96. package/bin/runners/lib/graph/static-extractor.js +518 -518
  97. package/bin/runners/lib/help-formatter.js +413 -0
  98. package/bin/runners/lib/html-report.js +650 -650
  99. package/bin/runners/lib/llm.js +75 -75
  100. package/bin/runners/lib/logger.js +38 -0
  101. package/bin/runners/lib/meter.js +61 -61
  102. package/bin/runners/lib/missions/evidence.js +126 -126
  103. package/bin/runners/lib/patch.js +40 -40
  104. package/bin/runners/lib/permissions/auth-model.js +213 -213
  105. package/bin/runners/lib/permissions/idor-prover.js +205 -205
  106. package/bin/runners/lib/permissions/index.js +45 -45
  107. package/bin/runners/lib/permissions/matrix-builder.js +198 -198
  108. package/bin/runners/lib/pkgjson.js +28 -28
  109. package/bin/runners/lib/policy.js +295 -295
  110. package/bin/runners/lib/preflight.js +142 -142
  111. package/bin/runners/lib/reality/correlation-detectors.js +359 -359
  112. package/bin/runners/lib/reality/index.js +318 -318
  113. package/bin/runners/lib/reality/request-hashing.js +416 -416
  114. package/bin/runners/lib/reality/request-mapper.js +453 -453
  115. package/bin/runners/lib/reality/safety-rails.js +463 -463
  116. package/bin/runners/lib/reality/semantic-snapshot.js +408 -408
  117. package/bin/runners/lib/reality/toast-detector.js +393 -393
  118. package/bin/runners/lib/reality-findings.js +84 -84
  119. package/bin/runners/lib/receipts.js +179 -179
  120. package/bin/runners/lib/redact.js +29 -29
  121. package/bin/runners/lib/replay/capsule-manager.js +154 -154
  122. package/bin/runners/lib/replay/index.js +263 -263
  123. package/bin/runners/lib/replay/player.js +348 -348
  124. package/bin/runners/lib/replay/recorder.js +331 -331
  125. package/bin/runners/lib/report.js +135 -135
  126. package/bin/runners/lib/route-detection.js +1140 -1140
  127. package/bin/runners/lib/sandbox/index.js +59 -59
  128. package/bin/runners/lib/sandbox/proof-chain.js +399 -399
  129. package/bin/runners/lib/sandbox/sandbox-runner.js +205 -205
  130. package/bin/runners/lib/sandbox/worktree.js +174 -174
  131. package/bin/runners/lib/schema-validator.js +350 -350
  132. package/bin/runners/lib/schemas/contracts.schema.json +160 -160
  133. package/bin/runners/lib/schemas/finding.schema.json +100 -100
  134. package/bin/runners/lib/schemas/mission-pack.schema.json +206 -206
  135. package/bin/runners/lib/schemas/proof-graph.schema.json +176 -176
  136. package/bin/runners/lib/schemas/reality-report.schema.json +162 -162
  137. package/bin/runners/lib/schemas/share-pack.schema.json +180 -180
  138. package/bin/runners/lib/schemas/ship-report.schema.json +117 -117
  139. package/bin/runners/lib/schemas/truthpack-v2.schema.json +303 -303
  140. package/bin/runners/lib/schemas/validator.js +438 -438
  141. package/bin/runners/lib/score-history.js +282 -282
  142. package/bin/runners/lib/share-pack.js +239 -239
  143. package/bin/runners/lib/snippets.js +67 -67
  144. package/bin/runners/lib/unified-cli-output.js +604 -0
  145. package/bin/runners/lib/upsell.js +658 -510
  146. package/bin/runners/lib/usage.js +153 -153
  147. package/bin/runners/lib/validate-patch.js +156 -156
  148. package/bin/runners/lib/verdict-engine.js +628 -628
  149. package/bin/runners/reality/engine.js +917 -917
  150. package/bin/runners/reality/flows.js +122 -122
  151. package/bin/runners/reality/report.js +378 -378
  152. package/bin/runners/reality/session.js +193 -193
  153. package/bin/runners/runAgent.d.ts +5 -0
  154. package/bin/runners/runApprove.js +1200 -0
  155. package/bin/runners/runAuth.js +324 -95
  156. package/bin/runners/runCheckpoint.js +39 -21
  157. package/bin/runners/runClassify.js +859 -0
  158. package/bin/runners/runContext.js +136 -24
  159. package/bin/runners/runDoctor.js +108 -68
  160. package/bin/runners/runFirewall.d.ts +5 -0
  161. package/bin/runners/runFirewallHook.d.ts +5 -0
  162. package/bin/runners/runFix.js +6 -5
  163. package/bin/runners/runGuard.js +262 -168
  164. package/bin/runners/runInit.js +3 -2
  165. package/bin/runners/runMcp.js +130 -52
  166. package/bin/runners/runPolish.js +43 -20
  167. package/bin/runners/runProve.js +1 -2
  168. package/bin/runners/runReport.js +3 -2
  169. package/bin/runners/runScan.js +145 -44
  170. package/bin/runners/runShip.js +3 -4
  171. package/bin/runners/runTruth.d.ts +5 -0
  172. package/bin/runners/runValidate.js +19 -2
  173. package/bin/runners/runWatch.js +104 -53
  174. package/bin/vibecheck.js +106 -19
  175. package/mcp-server/HARDENING_SUMMARY.md +299 -0
  176. package/mcp-server/agent-firewall-interceptor.js +367 -31
  177. package/mcp-server/authority-tools.js +569 -0
  178. package/mcp-server/conductor/conflict-resolver.js +588 -0
  179. package/mcp-server/conductor/execution-planner.js +544 -0
  180. package/mcp-server/conductor/index.js +377 -0
  181. package/mcp-server/conductor/lock-manager.js +615 -0
  182. package/mcp-server/conductor/request-queue.js +550 -0
  183. package/mcp-server/conductor/session-manager.js +500 -0
  184. package/mcp-server/conductor/tools.js +510 -0
  185. package/mcp-server/index.js +1199 -208
  186. package/mcp-server/lib/api-client.cjs +305 -0
  187. package/mcp-server/lib/logger.cjs +30 -0
  188. package/mcp-server/logger.js +173 -0
  189. package/mcp-server/package.json +2 -2
  190. package/mcp-server/premium-tools.js +2 -2
  191. package/mcp-server/tier-auth.js +351 -136
  192. package/mcp-server/tools/index.js +72 -72
  193. package/mcp-server/truth-firewall-tools.js +145 -15
  194. package/mcp-server/vibecheck-tools.js +2 -2
  195. package/package.json +2 -3
  196. package/mcp-server/index.old.js +0 -4137
  197. package/mcp-server/package-lock.json +0 -165
@@ -1,348 +1,348 @@
1
- /**
2
- * Security Diagnostics Module
3
- *
4
- * Checks for exposed secrets, gitignore configuration, and security best practices
5
- */
6
-
7
- const fs = require('fs');
8
- const path = require('path');
9
- const { SEVERITY, CATEGORY, FIX_TYPE } = require('../types');
10
-
11
- const MODULE_ID = 'security';
12
-
13
- const SECRET_PATTERNS = [
14
- { name: 'Stripe Live Key', pattern: /sk_live_[a-zA-Z0-9]{20,}/, critical: true },
15
- { name: 'Stripe Test Key', pattern: /sk_test_[a-zA-Z0-9]{20,}/, critical: false },
16
- { name: 'AWS Access Key', pattern: /AKIA[0-9A-Z]{16}/, critical: true },
17
- { name: 'GitHub Token', pattern: /ghp_[a-zA-Z0-9]{36}/, critical: true },
18
- { name: 'GitHub OAuth', pattern: /gho_[a-zA-Z0-9]{36}/, critical: true },
19
- { name: 'Private Key', pattern: /-----BEGIN (RSA |EC |DSA |OPENSSH )?PRIVATE KEY-----/, critical: true },
20
- { name: 'Generic API Key', pattern: /api[_-]?key['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
21
- { name: 'Generic Secret', pattern: /secret['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
22
- { name: 'Database URL', pattern: /postgres(ql)?:\/\/[^:]+:[^@]+@/, critical: true },
23
- { name: 'MongoDB URL', pattern: /mongodb(\+srv)?:\/\/[^:]+:[^@]+@/, critical: true },
24
- ];
25
-
26
- const REQUIRED_GITIGNORE = [
27
- { pattern: '.env', name: '.env files' },
28
- { pattern: 'node_modules', name: 'node_modules' },
29
- { pattern: '.vibecheck', name: '.vibecheck output' },
30
- ];
31
-
32
- function createDiagnostics(projectPath) {
33
- return [
34
- {
35
- id: `${MODULE_ID}.env_file`,
36
- name: '.env File',
37
- category: CATEGORY.SECURITY,
38
- parallel: true,
39
- check: async () => {
40
- const envPath = path.join(projectPath, '.env');
41
- const envExamplePath = path.join(projectPath, '.env.example');
42
- const envLocalPath = path.join(projectPath, '.env.local');
43
-
44
- const hasEnv = fs.existsSync(envPath);
45
- const hasEnvExample = fs.existsSync(envExamplePath);
46
- const hasEnvLocal = fs.existsSync(envLocalPath);
47
-
48
- const metadata = { hasEnv, hasEnvExample, hasEnvLocal };
49
-
50
- if (!hasEnv && !hasEnvLocal) {
51
- return {
52
- severity: SEVERITY.INFO,
53
- message: 'No .env file found',
54
- detail: 'Create .env for local environment variables',
55
- metadata,
56
- fixes: [{
57
- type: FIX_TYPE.FILE_CREATE,
58
- description: 'Create .env from example',
59
- path: envPath,
60
- content: hasEnvExample
61
- ? fs.readFileSync(envExamplePath, 'utf8')
62
- : '# Environment variables\n',
63
- autoFixable: true,
64
- }],
65
- };
66
- }
67
-
68
- if (hasEnv && !hasEnvExample) {
69
- return {
70
- severity: SEVERITY.WARNING,
71
- message: '.env exists but no .env.example',
72
- detail: 'Create .env.example for team documentation',
73
- metadata,
74
- fixes: [{
75
- type: FIX_TYPE.COMMAND,
76
- description: 'Generate .env.example from .env',
77
- command: 'vibecheck ctx --env-template',
78
- autoFixable: false,
79
- }],
80
- };
81
- }
82
-
83
- return {
84
- severity: SEVERITY.PASS,
85
- message: hasEnvExample ? '.env + .env.example' : '.env configured',
86
- metadata,
87
- };
88
- },
89
- },
90
- {
91
- id: `${MODULE_ID}.gitignore`,
92
- name: '.gitignore',
93
- category: CATEGORY.SECURITY,
94
- parallel: true,
95
- check: async () => {
96
- const gitignorePath = path.join(projectPath, '.gitignore');
97
-
98
- if (!fs.existsSync(gitignorePath)) {
99
- return {
100
- severity: SEVERITY.WARNING,
101
- message: 'No .gitignore file',
102
- detail: 'Secrets and build artifacts may be committed to git',
103
- fixes: [{
104
- type: FIX_TYPE.FILE_CREATE,
105
- description: 'Create .gitignore with common patterns',
106
- path: gitignorePath,
107
- content: [
108
- '# Dependencies',
109
- 'node_modules/',
110
- '',
111
- '# Environment',
112
- '.env',
113
- '.env.local',
114
- '.env.*.local',
115
- '',
116
- '# Build',
117
- 'dist/',
118
- 'build/',
119
- '.next/',
120
- '',
121
- '# vibecheck',
122
- '.vibecheck/',
123
- '',
124
- '# IDE',
125
- '.idea/',
126
- '.vscode/',
127
- '*.swp',
128
- ].join('\n'),
129
- autoFixable: true,
130
- }],
131
- };
132
- }
133
-
134
- const content = fs.readFileSync(gitignorePath, 'utf8');
135
- const missing = REQUIRED_GITIGNORE.filter(r => !content.includes(r.pattern));
136
-
137
- const metadata = {
138
- missing: missing.map(m => m.pattern),
139
- lines: content.split('\n').length,
140
- };
141
-
142
- if (missing.length > 0) {
143
- return {
144
- severity: SEVERITY.WARNING,
145
- message: `Missing: ${missing.map(m => m.name).join(', ')}`,
146
- metadata,
147
- fixes: [{
148
- type: FIX_TYPE.FILE_EDIT,
149
- description: 'Add missing patterns to .gitignore',
150
- path: gitignorePath,
151
- content: content + '\n\n# Added by vibecheck doctor\n' +
152
- missing.map(m => m.pattern).join('\n') + '\n',
153
- autoFixable: true,
154
- }],
155
- };
156
- }
157
-
158
- return {
159
- severity: SEVERITY.PASS,
160
- message: 'Properly configured',
161
- metadata,
162
- };
163
- },
164
- },
165
- {
166
- id: `${MODULE_ID}.exposed_secrets`,
167
- name: 'Exposed Secrets',
168
- category: CATEGORY.SECURITY,
169
- parallel: false,
170
- check: async () => {
171
- const filesToCheck = [
172
- 'package.json',
173
- 'src/config.ts',
174
- 'src/config.js',
175
- 'config/index.ts',
176
- 'config/index.js',
177
- 'next.config.js',
178
- 'next.config.mjs',
179
- '.env.example',
180
- 'README.md',
181
- ];
182
-
183
- const findings = [];
184
-
185
- for (const file of filesToCheck) {
186
- const filePath = path.join(projectPath, file);
187
- if (!fs.existsSync(filePath)) continue;
188
-
189
- try {
190
- const content = fs.readFileSync(filePath, 'utf8');
191
-
192
- for (const sp of SECRET_PATTERNS) {
193
- if (sp.pattern.test(content)) {
194
- findings.push({
195
- file,
196
- secret: sp.name,
197
- critical: sp.critical,
198
- });
199
- }
200
- }
201
- } catch {
202
- // Skip unreadable files
203
- }
204
- }
205
-
206
- const metadata = { findings };
207
- const criticalFindings = findings.filter(f => f.critical);
208
-
209
- if (criticalFindings.length > 0) {
210
- return {
211
- severity: SEVERITY.CRITICAL,
212
- message: `${criticalFindings.length} critical secrets exposed`,
213
- detail: criticalFindings.map(f => `${f.secret} in ${f.file}`).join(', '),
214
- metadata,
215
- fixes: [{
216
- type: FIX_TYPE.MANUAL,
217
- description: 'Move secrets to .env and add to .gitignore',
218
- autoFixable: false,
219
- }],
220
- };
221
- }
222
-
223
- if (findings.length > 0) {
224
- return {
225
- severity: SEVERITY.WARNING,
226
- message: `${findings.length} potential secrets found`,
227
- detail: findings.map(f => `${f.secret} in ${f.file}`).join(', '),
228
- metadata,
229
- fixes: [{
230
- type: FIX_TYPE.MANUAL,
231
- description: 'Review and move secrets to .env',
232
- autoFixable: false,
233
- }],
234
- };
235
- }
236
-
237
- return {
238
- severity: SEVERITY.PASS,
239
- message: 'No exposed secrets detected',
240
- metadata,
241
- };
242
- },
243
- },
244
- {
245
- id: `${MODULE_ID}.env_in_git`,
246
- name: '.env in Git History',
247
- category: CATEGORY.SECURITY,
248
- parallel: true,
249
- check: async () => {
250
- const gitDir = path.join(projectPath, '.git');
251
- if (!fs.existsSync(gitDir)) {
252
- return {
253
- severity: SEVERITY.INFO,
254
- message: 'Not a git repository',
255
- };
256
- }
257
-
258
- try {
259
- const { execSync } = require('child_process');
260
- const result = execSync('git log --all --full-history -- .env 2>/dev/null | head -1', {
261
- cwd: projectPath,
262
- encoding: 'utf8',
263
- timeout: 10000,
264
- }).trim();
265
-
266
- if (result) {
267
- return {
268
- severity: SEVERITY.ERROR,
269
- message: '.env found in git history',
270
- detail: 'Secrets may be exposed in git commits',
271
- fixes: [
272
- {
273
- type: FIX_TYPE.LINK,
274
- description: 'Guide: Remove secrets from git history',
275
- url: 'https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/removing-sensitive-data-from-a-repository',
276
- },
277
- {
278
- type: FIX_TYPE.COMMAND,
279
- description: 'Remove .env from history (dangerous)',
280
- command: 'git filter-branch --force --index-filter "git rm --cached --ignore-unmatch .env" --prune-empty --tag-name-filter cat -- --all',
281
- dangerous: true,
282
- autoFixable: false,
283
- },
284
- ],
285
- };
286
- }
287
-
288
- return {
289
- severity: SEVERITY.PASS,
290
- message: 'No .env in git history',
291
- };
292
- } catch {
293
- return {
294
- severity: SEVERITY.INFO,
295
- message: 'Could not check git history',
296
- };
297
- }
298
- },
299
- },
300
- {
301
- id: `${MODULE_ID}.npmrc`,
302
- name: '.npmrc Security',
303
- category: CATEGORY.SECURITY,
304
- parallel: true,
305
- check: async () => {
306
- const npmrcPath = path.join(projectPath, '.npmrc');
307
-
308
- if (!fs.existsSync(npmrcPath)) {
309
- return {
310
- severity: SEVERITY.INFO,
311
- message: 'No .npmrc file',
312
- };
313
- }
314
-
315
- const content = fs.readFileSync(npmrcPath, 'utf8');
316
- const hasToken = content.includes('_authToken') || content.includes('//registry');
317
-
318
- if (hasToken) {
319
- const gitignorePath = path.join(projectPath, '.gitignore');
320
- const gitignoreContent = fs.existsSync(gitignorePath)
321
- ? fs.readFileSync(gitignorePath, 'utf8')
322
- : '';
323
-
324
- if (!gitignoreContent.includes('.npmrc')) {
325
- return {
326
- severity: SEVERITY.WARNING,
327
- message: '.npmrc contains tokens but not in .gitignore',
328
- fixes: [{
329
- type: FIX_TYPE.FILE_EDIT,
330
- description: 'Add .npmrc to .gitignore',
331
- path: gitignorePath,
332
- content: gitignoreContent + '\n.npmrc\n',
333
- autoFixable: true,
334
- }],
335
- };
336
- }
337
- }
338
-
339
- return {
340
- severity: SEVERITY.PASS,
341
- message: hasToken ? 'Contains tokens (gitignored)' : 'No sensitive data',
342
- };
343
- },
344
- },
345
- ];
346
- }
347
-
348
- module.exports = { MODULE_ID, createDiagnostics, SECRET_PATTERNS };
1
+ /**
2
+ * Security Diagnostics Module
3
+ *
4
+ * Checks for exposed secrets, gitignore configuration, and security best practices
5
+ */
6
+
7
+ const fs = require('fs');
8
+ const path = require('path');
9
+ const { SEVERITY, CATEGORY, FIX_TYPE } = require('../types');
10
+
11
+ const MODULE_ID = 'security';
12
+
13
+ const SECRET_PATTERNS = [
14
+ { name: 'Stripe Live Key', pattern: /sk_live_[a-zA-Z0-9]{20,}/, critical: true },
15
+ { name: 'Stripe Test Key', pattern: /sk_test_[a-zA-Z0-9]{20,}/, critical: false },
16
+ { name: 'AWS Access Key', pattern: /AKIA[0-9A-Z]{16}/, critical: true },
17
+ { name: 'GitHub Token', pattern: /ghp_[a-zA-Z0-9]{36}/, critical: true },
18
+ { name: 'GitHub OAuth', pattern: /gho_[a-zA-Z0-9]{36}/, critical: true },
19
+ { name: 'Private Key', pattern: /-----BEGIN (RSA |EC |DSA |OPENSSH )?PRIVATE KEY-----/, critical: true },
20
+ { name: 'Generic API Key', pattern: /api[_-]?key['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
21
+ { name: 'Generic Secret', pattern: /secret['"]?\s*[:=]\s*['"][a-zA-Z0-9]{20,}['"]/, critical: false },
22
+ { name: 'Database URL', pattern: /postgres(ql)?:\/\/[^:]+:[^@]+@/, critical: true },
23
+ { name: 'MongoDB URL', pattern: /mongodb(\+srv)?:\/\/[^:]+:[^@]+@/, critical: true },
24
+ ];
25
+
26
+ const REQUIRED_GITIGNORE = [
27
+ { pattern: '.env', name: '.env files' },
28
+ { pattern: 'node_modules', name: 'node_modules' },
29
+ { pattern: '.vibecheck', name: '.vibecheck output' },
30
+ ];
31
+
32
+ function createDiagnostics(projectPath) {
33
+ return [
34
+ {
35
+ id: `${MODULE_ID}.env_file`,
36
+ name: '.env File',
37
+ category: CATEGORY.SECURITY,
38
+ parallel: true,
39
+ check: async () => {
40
+ const envPath = path.join(projectPath, '.env');
41
+ const envExamplePath = path.join(projectPath, '.env.example');
42
+ const envLocalPath = path.join(projectPath, '.env.local');
43
+
44
+ const hasEnv = fs.existsSync(envPath);
45
+ const hasEnvExample = fs.existsSync(envExamplePath);
46
+ const hasEnvLocal = fs.existsSync(envLocalPath);
47
+
48
+ const metadata = { hasEnv, hasEnvExample, hasEnvLocal };
49
+
50
+ if (!hasEnv && !hasEnvLocal) {
51
+ return {
52
+ severity: SEVERITY.INFO,
53
+ message: 'No .env file found',
54
+ detail: 'Create .env for local environment variables',
55
+ metadata,
56
+ fixes: [{
57
+ type: FIX_TYPE.FILE_CREATE,
58
+ description: 'Create .env from example',
59
+ path: envPath,
60
+ content: hasEnvExample
61
+ ? fs.readFileSync(envExamplePath, 'utf8')
62
+ : '# Environment variables\n',
63
+ autoFixable: true,
64
+ }],
65
+ };
66
+ }
67
+
68
+ if (hasEnv && !hasEnvExample) {
69
+ return {
70
+ severity: SEVERITY.WARNING,
71
+ message: '.env exists but no .env.example',
72
+ detail: 'Create .env.example for team documentation',
73
+ metadata,
74
+ fixes: [{
75
+ type: FIX_TYPE.COMMAND,
76
+ description: 'Generate .env.example from .env',
77
+ command: 'vibecheck ctx --env-template',
78
+ autoFixable: false,
79
+ }],
80
+ };
81
+ }
82
+
83
+ return {
84
+ severity: SEVERITY.PASS,
85
+ message: hasEnvExample ? '.env + .env.example' : '.env configured',
86
+ metadata,
87
+ };
88
+ },
89
+ },
90
+ {
91
+ id: `${MODULE_ID}.gitignore`,
92
+ name: '.gitignore',
93
+ category: CATEGORY.SECURITY,
94
+ parallel: true,
95
+ check: async () => {
96
+ const gitignorePath = path.join(projectPath, '.gitignore');
97
+
98
+ if (!fs.existsSync(gitignorePath)) {
99
+ return {
100
+ severity: SEVERITY.WARNING,
101
+ message: 'No .gitignore file',
102
+ detail: 'Secrets and build artifacts may be committed to git',
103
+ fixes: [{
104
+ type: FIX_TYPE.FILE_CREATE,
105
+ description: 'Create .gitignore with common patterns',
106
+ path: gitignorePath,
107
+ content: [
108
+ '# Dependencies',
109
+ 'node_modules/',
110
+ '',
111
+ '# Environment',
112
+ '.env',
113
+ '.env.local',
114
+ '.env.*.local',
115
+ '',
116
+ '# Build',
117
+ 'dist/',
118
+ 'build/',
119
+ '.next/',
120
+ '',
121
+ '# vibecheck',
122
+ '.vibecheck/',
123
+ '',
124
+ '# IDE',
125
+ '.idea/',
126
+ '.vscode/',
127
+ '*.swp',
128
+ ].join('\n'),
129
+ autoFixable: true,
130
+ }],
131
+ };
132
+ }
133
+
134
+ const content = fs.readFileSync(gitignorePath, 'utf8');
135
+ const missing = REQUIRED_GITIGNORE.filter(r => !content.includes(r.pattern));
136
+
137
+ const metadata = {
138
+ missing: missing.map(m => m.pattern),
139
+ lines: content.split('\n').length,
140
+ };
141
+
142
+ if (missing.length > 0) {
143
+ return {
144
+ severity: SEVERITY.WARNING,
145
+ message: `Missing: ${missing.map(m => m.name).join(', ')}`,
146
+ metadata,
147
+ fixes: [{
148
+ type: FIX_TYPE.FILE_EDIT,
149
+ description: 'Add missing patterns to .gitignore',
150
+ path: gitignorePath,
151
+ content: content + '\n\n# Added by vibecheck doctor\n' +
152
+ missing.map(m => m.pattern).join('\n') + '\n',
153
+ autoFixable: true,
154
+ }],
155
+ };
156
+ }
157
+
158
+ return {
159
+ severity: SEVERITY.PASS,
160
+ message: 'Properly configured',
161
+ metadata,
162
+ };
163
+ },
164
+ },
165
+ {
166
+ id: `${MODULE_ID}.exposed_secrets`,
167
+ name: 'Exposed Secrets',
168
+ category: CATEGORY.SECURITY,
169
+ parallel: false,
170
+ check: async () => {
171
+ const filesToCheck = [
172
+ 'package.json',
173
+ 'src/config.ts',
174
+ 'src/config.js',
175
+ 'config/index.ts',
176
+ 'config/index.js',
177
+ 'next.config.js',
178
+ 'next.config.mjs',
179
+ '.env.example',
180
+ 'README.md',
181
+ ];
182
+
183
+ const findings = [];
184
+
185
+ for (const file of filesToCheck) {
186
+ const filePath = path.join(projectPath, file);
187
+ if (!fs.existsSync(filePath)) continue;
188
+
189
+ try {
190
+ const content = fs.readFileSync(filePath, 'utf8');
191
+
192
+ for (const sp of SECRET_PATTERNS) {
193
+ if (sp.pattern.test(content)) {
194
+ findings.push({
195
+ file,
196
+ secret: sp.name,
197
+ critical: sp.critical,
198
+ });
199
+ }
200
+ }
201
+ } catch {
202
+ // Skip unreadable files
203
+ }
204
+ }
205
+
206
+ const metadata = { findings };
207
+ const criticalFindings = findings.filter(f => f.critical);
208
+
209
+ if (criticalFindings.length > 0) {
210
+ return {
211
+ severity: SEVERITY.CRITICAL,
212
+ message: `${criticalFindings.length} critical secrets exposed`,
213
+ detail: criticalFindings.map(f => `${f.secret} in ${f.file}`).join(', '),
214
+ metadata,
215
+ fixes: [{
216
+ type: FIX_TYPE.MANUAL,
217
+ description: 'Move secrets to .env and add to .gitignore',
218
+ autoFixable: false,
219
+ }],
220
+ };
221
+ }
222
+
223
+ if (findings.length > 0) {
224
+ return {
225
+ severity: SEVERITY.WARNING,
226
+ message: `${findings.length} potential secrets found`,
227
+ detail: findings.map(f => `${f.secret} in ${f.file}`).join(', '),
228
+ metadata,
229
+ fixes: [{
230
+ type: FIX_TYPE.MANUAL,
231
+ description: 'Review and move secrets to .env',
232
+ autoFixable: false,
233
+ }],
234
+ };
235
+ }
236
+
237
+ return {
238
+ severity: SEVERITY.PASS,
239
+ message: 'No exposed secrets detected',
240
+ metadata,
241
+ };
242
+ },
243
+ },
244
+ {
245
+ id: `${MODULE_ID}.env_in_git`,
246
+ name: '.env in Git History',
247
+ category: CATEGORY.SECURITY,
248
+ parallel: true,
249
+ check: async () => {
250
+ const gitDir = path.join(projectPath, '.git');
251
+ if (!fs.existsSync(gitDir)) {
252
+ return {
253
+ severity: SEVERITY.INFO,
254
+ message: 'Not a git repository',
255
+ };
256
+ }
257
+
258
+ try {
259
+ const { execSync } = require('child_process');
260
+ const result = execSync('git log --all --full-history -- .env 2>/dev/null | head -1', {
261
+ cwd: projectPath,
262
+ encoding: 'utf8',
263
+ timeout: 10000,
264
+ }).trim();
265
+
266
+ if (result) {
267
+ return {
268
+ severity: SEVERITY.ERROR,
269
+ message: '.env found in git history',
270
+ detail: 'Secrets may be exposed in git commits',
271
+ fixes: [
272
+ {
273
+ type: FIX_TYPE.LINK,
274
+ description: 'Guide: Remove secrets from git history',
275
+ url: 'https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/removing-sensitive-data-from-a-repository',
276
+ },
277
+ {
278
+ type: FIX_TYPE.COMMAND,
279
+ description: 'Remove .env from history (dangerous)',
280
+ command: 'git filter-branch --force --index-filter "git rm --cached --ignore-unmatch .env" --prune-empty --tag-name-filter cat -- --all',
281
+ dangerous: true,
282
+ autoFixable: false,
283
+ },
284
+ ],
285
+ };
286
+ }
287
+
288
+ return {
289
+ severity: SEVERITY.PASS,
290
+ message: 'No .env in git history',
291
+ };
292
+ } catch {
293
+ return {
294
+ severity: SEVERITY.INFO,
295
+ message: 'Could not check git history',
296
+ };
297
+ }
298
+ },
299
+ },
300
+ {
301
+ id: `${MODULE_ID}.npmrc`,
302
+ name: '.npmrc Security',
303
+ category: CATEGORY.SECURITY,
304
+ parallel: true,
305
+ check: async () => {
306
+ const npmrcPath = path.join(projectPath, '.npmrc');
307
+
308
+ if (!fs.existsSync(npmrcPath)) {
309
+ return {
310
+ severity: SEVERITY.INFO,
311
+ message: 'No .npmrc file',
312
+ };
313
+ }
314
+
315
+ const content = fs.readFileSync(npmrcPath, 'utf8');
316
+ const hasToken = content.includes('_authToken') || content.includes('//registry');
317
+
318
+ if (hasToken) {
319
+ const gitignorePath = path.join(projectPath, '.gitignore');
320
+ const gitignoreContent = fs.existsSync(gitignorePath)
321
+ ? fs.readFileSync(gitignorePath, 'utf8')
322
+ : '';
323
+
324
+ if (!gitignoreContent.includes('.npmrc')) {
325
+ return {
326
+ severity: SEVERITY.WARNING,
327
+ message: '.npmrc contains tokens but not in .gitignore',
328
+ fixes: [{
329
+ type: FIX_TYPE.FILE_EDIT,
330
+ description: 'Add .npmrc to .gitignore',
331
+ path: gitignorePath,
332
+ content: gitignoreContent + '\n.npmrc\n',
333
+ autoFixable: true,
334
+ }],
335
+ };
336
+ }
337
+ }
338
+
339
+ return {
340
+ severity: SEVERITY.PASS,
341
+ message: hasToken ? 'Contains tokens (gitignored)' : 'No sensitive data',
342
+ };
343
+ },
344
+ },
345
+ ];
346
+ }
347
+
348
+ module.exports = { MODULE_ID, createDiagnostics, SECRET_PATTERNS };