aios-core 4.1.0 → 4.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (145) hide show
  1. package/.aios-core/.session/current-session.json +14 -0
  2. package/.aios-core/core/registry/registry-schema.json +166 -166
  3. package/.aios-core/core/registry/service-registry.json +6585 -6585
  4. package/.aios-core/data/entity-registry.yaml +208 -8
  5. package/.aios-core/data/registry-update-log.jsonl +165 -0
  6. package/.aios-core/development/scripts/approval-workflow.js +642 -642
  7. package/.aios-core/development/scripts/backup-manager.js +606 -606
  8. package/.aios-core/development/scripts/branch-manager.js +389 -389
  9. package/.aios-core/development/scripts/code-quality-improver.js +1311 -1311
  10. package/.aios-core/development/scripts/commit-message-generator.js +849 -849
  11. package/.aios-core/development/scripts/conflict-resolver.js +674 -674
  12. package/.aios-core/development/scripts/dependency-analyzer.js +637 -637
  13. package/.aios-core/development/scripts/diff-generator.js +351 -351
  14. package/.aios-core/development/scripts/elicitation-engine.js +384 -384
  15. package/.aios-core/development/scripts/elicitation-session-manager.js +299 -299
  16. package/.aios-core/development/scripts/git-wrapper.js +461 -461
  17. package/.aios-core/development/scripts/manifest-preview.js +244 -244
  18. package/.aios-core/development/scripts/metrics-tracker.js +775 -775
  19. package/.aios-core/development/scripts/modification-validator.js +554 -554
  20. package/.aios-core/development/scripts/pattern-learner.js +1224 -1224
  21. package/.aios-core/development/scripts/performance-analyzer.js +757 -757
  22. package/.aios-core/development/scripts/refactoring-suggester.js +1138 -1138
  23. package/.aios-core/development/scripts/rollback-handler.js +530 -530
  24. package/.aios-core/development/scripts/security-checker.js +358 -358
  25. package/.aios-core/development/scripts/template-engine.js +239 -239
  26. package/.aios-core/development/scripts/template-validator.js +278 -278
  27. package/.aios-core/development/scripts/test-generator.js +843 -843
  28. package/.aios-core/development/scripts/transaction-manager.js +589 -589
  29. package/.aios-core/development/scripts/usage-tracker.js +673 -673
  30. package/.aios-core/development/scripts/validate-filenames.js +226 -226
  31. package/.aios-core/development/scripts/version-tracker.js +526 -526
  32. package/.aios-core/development/scripts/yaml-validator.js +396 -396
  33. package/.aios-core/development/tasks/validate-next-story.md +99 -2
  34. package/.aios-core/development/templates/service-template/README.md.hbs +158 -158
  35. package/.aios-core/development/templates/service-template/__tests__/index.test.ts.hbs +237 -237
  36. package/.aios-core/development/templates/service-template/client.ts.hbs +403 -403
  37. package/.aios-core/development/templates/service-template/errors.ts.hbs +182 -182
  38. package/.aios-core/development/templates/service-template/index.ts.hbs +120 -120
  39. package/.aios-core/development/templates/service-template/package.json.hbs +87 -87
  40. package/.aios-core/development/templates/service-template/types.ts.hbs +145 -145
  41. package/.aios-core/development/templates/squad-template/LICENSE +21 -21
  42. package/.aios-core/docs/SHARD-TRANSLATION-GUIDE.md +335 -0
  43. package/.aios-core/docs/component-creation-guide.md +458 -0
  44. package/.aios-core/docs/session-update-pattern.md +307 -0
  45. package/.aios-core/docs/standards/AIOS-FRAMEWORK-MASTER.md +1963 -0
  46. package/.aios-core/docs/standards/AIOS-LIVRO-DE-OURO-V2.1-SUMMARY.md +1190 -0
  47. package/.aios-core/docs/standards/AIOS-LIVRO-DE-OURO-V2.1.md +439 -0
  48. package/.aios-core/docs/standards/AIOS-LIVRO-DE-OURO.md +5398 -0
  49. package/.aios-core/docs/standards/V3-ARCHITECTURAL-DECISIONS.md +523 -0
  50. package/.aios-core/docs/template-syntax.md +267 -0
  51. package/.aios-core/docs/troubleshooting-guide.md +625 -0
  52. package/.aios-core/infrastructure/templates/aios-sync.yaml.template +193 -193
  53. package/.aios-core/infrastructure/templates/coderabbit.yaml.template +279 -279
  54. package/.aios-core/infrastructure/templates/github-workflows/ci.yml.template +169 -169
  55. package/.aios-core/infrastructure/templates/github-workflows/pr-automation.yml.template +330 -330
  56. package/.aios-core/infrastructure/templates/github-workflows/release.yml.template +196 -196
  57. package/.aios-core/infrastructure/templates/gitignore/gitignore-aios-base.tmpl +63 -63
  58. package/.aios-core/infrastructure/templates/gitignore/gitignore-brownfield-merge.tmpl +18 -18
  59. package/.aios-core/infrastructure/templates/gitignore/gitignore-node.tmpl +85 -85
  60. package/.aios-core/infrastructure/templates/gitignore/gitignore-python.tmpl +145 -145
  61. package/.aios-core/infrastructure/tests/utilities-audit-results.json +501 -0
  62. package/.aios-core/install-manifest.yaml +101 -101
  63. package/.aios-core/local-config.yaml.template +70 -70
  64. package/.aios-core/manifests/agents.csv +29 -0
  65. package/.aios-core/manifests/schema/manifest-schema.json +190 -190
  66. package/.aios-core/manifests/tasks.csv +198 -0
  67. package/.aios-core/manifests/workers.csv +204 -0
  68. package/.aios-core/monitor/hooks/lib/__init__.py +1 -1
  69. package/.aios-core/monitor/hooks/lib/enrich.py +58 -58
  70. package/.aios-core/monitor/hooks/lib/send_event.py +47 -47
  71. package/.aios-core/monitor/hooks/notification.py +29 -29
  72. package/.aios-core/monitor/hooks/post_tool_use.py +45 -45
  73. package/.aios-core/monitor/hooks/pre_compact.py +29 -29
  74. package/.aios-core/monitor/hooks/pre_tool_use.py +40 -40
  75. package/.aios-core/monitor/hooks/stop.py +29 -29
  76. package/.aios-core/monitor/hooks/subagent_stop.py +29 -29
  77. package/.aios-core/monitor/hooks/user_prompt_submit.py +38 -38
  78. package/.aios-core/product/templates/adr.hbs +125 -125
  79. package/.aios-core/product/templates/component-react-tmpl.tsx +98 -98
  80. package/.aios-core/product/templates/dbdr.hbs +241 -241
  81. package/.aios-core/product/templates/engine/schemas/adr.schema.json +102 -102
  82. package/.aios-core/product/templates/engine/schemas/dbdr.schema.json +205 -205
  83. package/.aios-core/product/templates/engine/schemas/epic.schema.json +175 -175
  84. package/.aios-core/product/templates/engine/schemas/pmdr.schema.json +175 -175
  85. package/.aios-core/product/templates/engine/schemas/prd-v2.schema.json +300 -300
  86. package/.aios-core/product/templates/engine/schemas/prd.schema.json +152 -152
  87. package/.aios-core/product/templates/engine/schemas/story.schema.json +222 -222
  88. package/.aios-core/product/templates/engine/schemas/task.schema.json +154 -154
  89. package/.aios-core/product/templates/epic.hbs +212 -212
  90. package/.aios-core/product/templates/eslintrc-security.json +32 -32
  91. package/.aios-core/product/templates/github-actions-cd.yml +212 -212
  92. package/.aios-core/product/templates/github-actions-ci.yml +172 -172
  93. package/.aios-core/product/templates/pmdr.hbs +186 -186
  94. package/.aios-core/product/templates/prd-v2.0.hbs +216 -216
  95. package/.aios-core/product/templates/prd.hbs +201 -201
  96. package/.aios-core/product/templates/shock-report-tmpl.html +502 -502
  97. package/.aios-core/product/templates/story.hbs +263 -263
  98. package/.aios-core/product/templates/task.hbs +170 -170
  99. package/.aios-core/product/templates/tmpl-comment-on-examples.sql +158 -158
  100. package/.aios-core/product/templates/tmpl-migration-script.sql +91 -91
  101. package/.aios-core/product/templates/tmpl-rls-granular-policies.sql +104 -104
  102. package/.aios-core/product/templates/tmpl-rls-kiss-policy.sql +10 -10
  103. package/.aios-core/product/templates/tmpl-rls-roles.sql +135 -135
  104. package/.aios-core/product/templates/tmpl-rls-simple.sql +77 -77
  105. package/.aios-core/product/templates/tmpl-rls-tenant.sql +152 -152
  106. package/.aios-core/product/templates/tmpl-rollback-script.sql +77 -77
  107. package/.aios-core/product/templates/tmpl-seed-data.sql +140 -140
  108. package/.aios-core/product/templates/tmpl-smoke-test.sql +16 -16
  109. package/.aios-core/product/templates/tmpl-staging-copy-merge.sql +139 -139
  110. package/.aios-core/product/templates/tmpl-stored-proc.sql +140 -140
  111. package/.aios-core/product/templates/tmpl-trigger.sql +152 -152
  112. package/.aios-core/product/templates/tmpl-view-materialized.sql +133 -133
  113. package/.aios-core/product/templates/tmpl-view.sql +177 -177
  114. package/.aios-core/product/templates/token-exports-css-tmpl.css +240 -240
  115. package/.aios-core/quality/schemas/quality-metrics.schema.json +233 -233
  116. package/.aios-core/scripts/migrate-framework-docs.sh +300 -300
  117. package/.aios-core/scripts/pm.sh +0 -0
  118. package/.claude/hooks/enforce-architecture-first.py +196 -196
  119. package/.claude/hooks/mind-clone-governance.py +192 -192
  120. package/.claude/hooks/read-protection.py +151 -151
  121. package/.claude/hooks/slug-validation.py +176 -176
  122. package/.claude/hooks/sql-governance.py +182 -182
  123. package/.claude/hooks/write-path-validation.py +194 -194
  124. package/.claude/rules/agent-authority.md +105 -0
  125. package/.claude/rules/coderabbit-integration.md +93 -0
  126. package/.claude/rules/ids-principles.md +112 -0
  127. package/.claude/rules/story-lifecycle.md +139 -0
  128. package/.claude/rules/workflow-execution.md +150 -0
  129. package/LICENSE +48 -48
  130. package/bin/aios-minimal.js +0 -0
  131. package/bin/aios.js +0 -0
  132. package/package.json +1 -1
  133. package/packages/aios-install/bin/aios-install.js +0 -0
  134. package/packages/aios-install/bin/edmcp.js +0 -0
  135. package/packages/aios-pro-cli/bin/aios-pro.js +0 -0
  136. package/packages/installer/src/wizard/pro-setup.js +433 -49
  137. package/scripts/check-markdown-links.py +352 -352
  138. package/scripts/code-intel-health-check.js +343 -0
  139. package/scripts/dashboard-parallel-dev.sh +0 -0
  140. package/scripts/dashboard-parallel-phase3.sh +0 -0
  141. package/scripts/dashboard-parallel-phase4.sh +0 -0
  142. package/scripts/glue/README.md +355 -0
  143. package/scripts/glue/compose-agent-prompt.cjs +362 -0
  144. package/scripts/install-monitor-hooks.sh +0 -0
  145. package/.aios-core/lib/build.json +0 -1
@@ -1,359 +1,359 @@
1
- /**
2
- * Security Checker for AIOS Developer Meta-Agent
3
- * Validates generated code and configurations for security vulnerabilities
4
- */
5
-
6
- const path = require('path');
7
- const yaml = require('js-yaml');
8
-
9
- class SecurityChecker {
10
- constructor() {
11
- // Patterns that indicate potential security issues
12
- this.dangerousPatterns = [
13
- /eval\s*\(/gi,
14
- /Function\s*\(/gi,
15
- /new\s+Function/gi,
16
- /setTimeout\s*\([^,]+,/gi,
17
- /setInterval\s*\([^,]+,/gi,
18
- /require\s*\([^'"]/gi, // Dynamic require
19
- /import\s*\(/gi, // Dynamic import
20
- /child_process/gi,
21
- /exec\s*\(/gi,
22
- /spawn\s*\(/gi,
23
- /\.\.\/\.\.\//g, // Path traversal
24
- /process\.env/gi,
25
- /__dirname/gi,
26
- /__filename/gi,
27
- ];
28
-
29
- // SQL injection patterns
30
- this.sqlInjectionPatterns = [
31
- /;\s*DROP\s+TABLE/gi,
32
- /;\s*DELETE\s+FROM/gi,
33
- /UNION\s+SELECT/gi,
34
- /OR\s+1\s*=\s*1/gi,
35
- /'\s+OR\s+'/gi,
36
- ];
37
-
38
- // Command injection patterns
39
- this.commandInjectionPatterns = [
40
- /[;&|`$()]/g,
41
- /\$\{.*\}/g,
42
- />|</g,
43
- ];
44
-
45
- // Safe patterns that should be allowed
46
- this.safePatterns = {
47
- 'eval': [
48
- /\/\*.*eval.*\*\//gs, // eval in comments
49
- /\/\/.*eval/g, // eval in single-line comments
50
- /".*eval.*"/g, // eval in strings
51
- /'.*eval.*'/g,
52
- ]
53
- };
54
- }
55
-
56
- /**
57
- * Validate generated code for security vulnerabilities
58
- * @param {string} code - The code to validate
59
- * @param {string} [language='javascript'] - The programming language
60
- * @returns {Object} Validation results with valid flag, errors, warnings, and suggestions
61
- */
62
- validateCode(code, language = 'javascript') {
63
- const results = {
64
- valid: true,
65
- errors: [],
66
- warnings: [],
67
- suggestions: []
68
- };
69
-
70
- // Validate input
71
- if (!code || typeof code !== 'string') {
72
- results.valid = false;
73
- results.errors.push({
74
- type: 'invalid_input',
75
- message: 'Code must be a non-empty string'
76
- });
77
- return results;
78
- }
79
-
80
- // Check for dangerous patterns
81
- for (const pattern of this.dangerousPatterns) {
82
- const matches = code.match(pattern);
83
- if (matches) {
84
- // Check if it's in a safe context
85
- let isSafe = false;
86
- const patternName = pattern.source.split('\\')[0];
87
-
88
- if (this.safePatterns[patternName]) {
89
- for (const safePattern of this.safePatterns[patternName]) {
90
- if (code.match(safePattern)) {
91
- isSafe = true;
92
- break;
93
- }
94
- }
95
- }
96
-
97
- if (!isSafe) {
98
- results.valid = false;
99
- results.errors.push({
100
- type: 'dangerous_pattern',
101
- pattern: pattern.source,
102
- matches: matches,
103
- message: `Dangerous pattern detected: ${matches[0]}`,
104
- line: this._getLineNumber(code, matches.index)
105
- });
106
- }
107
- }
108
- }
109
-
110
- // Check for SQL injection (if applicable)
111
- if (code.includes('SELECT') || code.includes('INSERT') || code.includes('UPDATE')) {
112
- for (const pattern of this.sqlInjectionPatterns) {
113
- if (pattern.test(code)) {
114
- results.valid = false;
115
- results.errors.push({
116
- type: 'sql_injection',
117
- pattern: pattern.source,
118
- message: 'Potential SQL injection vulnerability detected'
119
- });
120
- }
121
- }
122
- }
123
-
124
- // Validate input sanitization
125
- if (code.includes('req.body') || code.includes('req.query') || code.includes('req.params')) {
126
- if (!code.includes('sanitize') && !code.includes('validate') && !code.includes('escape')) {
127
- results.warnings.push({
128
- type: 'input_validation',
129
- message: 'User input detected without explicit sanitization'
130
- });
131
- }
132
- }
133
-
134
- return results;
135
- }
136
-
137
- /**
138
- * Validate YAML configuration for security issues
139
- */
140
- validateYAML(yamlContent) {
141
- const results = {
142
- valid: true,
143
- errors: [],
144
- warnings: []
145
- };
146
-
147
- try {
148
- const parsed = yaml.load(yamlContent);
149
-
150
- // Check for dangerous YAML features
151
- if (yamlContent.includes('!!') && !yamlContent.includes('!!str')) {
152
- results.warnings.push({
153
- type: 'yaml_tags',
154
- message: 'YAML tags detected - ensure they are safe'
155
- });
156
- }
157
-
158
- // Validate structure
159
- this.validateYAMLStructure(parsed, results);
160
-
161
- } catch (error) {
162
- results.valid = false;
163
- results.errors.push({
164
- type: 'yaml_parse',
165
- message: `YAML parsing error: ${error.message}`
166
- });
167
- }
168
-
169
- return results;
170
- }
171
-
172
- /**
173
- * Validate YAML structure recursively
174
- */
175
- validateYAMLStructure(obj, results, path = '') {
176
- if (typeof obj === 'object' && obj !== null) {
177
- for (const [key, value] of Object.entries(obj)) {
178
- const currentPath = path ? `${path}.${key}` : key;
179
-
180
- // Check for command injection in string values
181
- if (typeof value === 'string') {
182
- for (const pattern of this.commandInjectionPatterns) {
183
- if (pattern.test(_value) && !this.isSafeCommandContext(key, value)) {
184
- results.warnings.push({
185
- type: 'command_injection',
186
- path: currentPath,
187
- message: `Potential command injection in ${currentPath}`
188
- });
189
- }
190
- }
191
- }
192
-
193
- // Recurse for nested objects
194
- if (typeof value === 'object') {
195
- this.validateYAMLStructure(_value, results, currentPath);
196
- }
197
- }
198
- }
199
- }
200
-
201
- /**
202
- * Check if command-like string is in safe context
203
- */
204
- isSafeCommandContext(key, value) {
205
- const safeKeys = ['description', 'comment', 'note', 'help', 'usage'];
206
- return safeKeys.some(safe => key.toLowerCase().includes(safe));
207
- }
208
-
209
- /**
210
- * Validate file paths for security issues
211
- */
212
- validatePath(filePath) {
213
- const results = {
214
- valid: true,
215
- errors: []
216
- };
217
-
218
- // Normalize the path
219
- const normalized = path.normalize(filePath);
220
-
221
- // Check for path traversal
222
- if (normalized.includes('..')) {
223
- results.valid = false;
224
- results.errors.push({
225
- type: 'path_traversal',
226
- message: 'Path traversal detected'
227
- });
228
- }
229
-
230
- // Check for absolute paths (unless allowed)
231
- if (path.isAbsolute(normalized)) {
232
- results.errors.push({
233
- type: 'absolute_path',
234
- message: 'Absolute path detected - use relative paths'
235
- });
236
- }
237
-
238
- // Check for sensitive directories
239
- const sensitivePatterns = [
240
- /node_modules/i,
241
- /\.git/i,
242
- /\.env/i,
243
- /private/i,
244
- /secret/i,
245
- /config/i,
246
- ];
247
-
248
- for (const pattern of sensitivePatterns) {
249
- if (pattern.test(normalized)) {
250
- results.warnings = results.warnings || [];
251
- results.warnings.push({
252
- type: 'sensitive_path',
253
- message: `Path contains potentially sensitive directory: ${pattern.source}`
254
- });
255
- }
256
- }
257
-
258
- return results;
259
- }
260
-
261
- /**
262
- * Validate user input for common security issues
263
- */
264
- sanitizeInput(input, type = 'general') {
265
- if (typeof input !== 'string') {
266
- return input;
267
- }
268
-
269
- let sanitized = input;
270
-
271
- // Remove null bytes
272
- sanitized = sanitized.replace(/\0/g, '');
273
-
274
- // Type-specific sanitization
275
- switch (type) {
276
- case 'filename':
277
- // Allow only alphanumeric, dash, underscore, and dot
278
- sanitized = sanitized.replace(/[^a-zA-Z0-9\-_\.]/g, '');
279
- break;
280
-
281
- case 'identifier':
282
- // Allow only alphanumeric, dash, and underscore
283
- sanitized = sanitized.replace(/[^a-zA-Z0-9\-_]/g, '');
284
- break;
285
-
286
- case 'yaml':
287
- // Escape special YAML characters
288
- sanitized = sanitized
289
- .replace(/:/g, '\\:')
290
- .replace(/\|/g, '\\|')
291
- .replace(/>/g, '\\>')
292
- .replace(/</g, '\\<');
293
- break;
294
-
295
- case 'general':
296
- default:
297
- // Basic HTML/script escaping
298
- sanitized = sanitized
299
- .replace(/&/g, '&amp;')
300
- .replace(/</g, '&lt;')
301
- .replace(/>/g, '&gt;')
302
- .replace(/"/g, '&quot;')
303
- .replace(/'/g, '&#x27;')
304
- .replace(/\//g, '&#x2F;');
305
- }
306
-
307
- return sanitized;
308
- }
309
-
310
- /**
311
- * Generate security report
312
- * @param {Array} validations - Array of validation results
313
- * @returns {Object} Comprehensive security report
314
- */
315
- generateReport(validations) {
316
- const report = {
317
- timestamp: new Date().toISOString(),
318
- summary: {
319
- totalChecks: 0,
320
- passed: 0,
321
- failed: 0,
322
- warnings: 0
323
- },
324
- details: validations
325
- };
326
-
327
- // Calculate summary
328
- for (const validation of validations) {
329
- report.summary.totalChecks++;
330
- if (validation.valid) {
331
- report.summary.passed++;
332
- } else {
333
- report.summary.failed++;
334
- }
335
- report.summary.warnings += (validation.warnings || []).length;
336
- }
337
-
338
- report.summary.securityScore = Math.round(
339
- (report.summary.passed / report.summary.totalChecks) * 100
340
- );
341
-
342
- return report;
343
- }
344
-
345
- /**
346
- * Get line number from string index
347
- * @private
348
- * @param {string} text - The text to search
349
- * @param {number} index - Character index
350
- * @returns {number} Line number (1-based)
351
- */
352
- _getLineNumber(text, index) {
353
- if (!text || index === undefined) return null;
354
- const lines = text.substring(0, index).split('\n');
355
- return lines.length;
356
- }
357
- }
358
-
1
+ /**
2
+ * Security Checker for AIOS Developer Meta-Agent
3
+ * Validates generated code and configurations for security vulnerabilities
4
+ */
5
+
6
+ const path = require('path');
7
+ const yaml = require('js-yaml');
8
+
9
+ class SecurityChecker {
10
+ constructor() {
11
+ // Patterns that indicate potential security issues
12
+ this.dangerousPatterns = [
13
+ /eval\s*\(/gi,
14
+ /Function\s*\(/gi,
15
+ /new\s+Function/gi,
16
+ /setTimeout\s*\([^,]+,/gi,
17
+ /setInterval\s*\([^,]+,/gi,
18
+ /require\s*\([^'"]/gi, // Dynamic require
19
+ /import\s*\(/gi, // Dynamic import
20
+ /child_process/gi,
21
+ /exec\s*\(/gi,
22
+ /spawn\s*\(/gi,
23
+ /\.\.\/\.\.\//g, // Path traversal
24
+ /process\.env/gi,
25
+ /__dirname/gi,
26
+ /__filename/gi,
27
+ ];
28
+
29
+ // SQL injection patterns
30
+ this.sqlInjectionPatterns = [
31
+ /;\s*DROP\s+TABLE/gi,
32
+ /;\s*DELETE\s+FROM/gi,
33
+ /UNION\s+SELECT/gi,
34
+ /OR\s+1\s*=\s*1/gi,
35
+ /'\s+OR\s+'/gi,
36
+ ];
37
+
38
+ // Command injection patterns
39
+ this.commandInjectionPatterns = [
40
+ /[;&|`$()]/g,
41
+ /\$\{.*\}/g,
42
+ />|</g,
43
+ ];
44
+
45
+ // Safe patterns that should be allowed
46
+ this.safePatterns = {
47
+ 'eval': [
48
+ /\/\*.*eval.*\*\//gs, // eval in comments
49
+ /\/\/.*eval/g, // eval in single-line comments
50
+ /".*eval.*"/g, // eval in strings
51
+ /'.*eval.*'/g,
52
+ ]
53
+ };
54
+ }
55
+
56
+ /**
57
+ * Validate generated code for security vulnerabilities
58
+ * @param {string} code - The code to validate
59
+ * @param {string} [language='javascript'] - The programming language
60
+ * @returns {Object} Validation results with valid flag, errors, warnings, and suggestions
61
+ */
62
+ validateCode(code, language = 'javascript') {
63
+ const results = {
64
+ valid: true,
65
+ errors: [],
66
+ warnings: [],
67
+ suggestions: []
68
+ };
69
+
70
+ // Validate input
71
+ if (!code || typeof code !== 'string') {
72
+ results.valid = false;
73
+ results.errors.push({
74
+ type: 'invalid_input',
75
+ message: 'Code must be a non-empty string'
76
+ });
77
+ return results;
78
+ }
79
+
80
+ // Check for dangerous patterns
81
+ for (const pattern of this.dangerousPatterns) {
82
+ const matches = code.match(pattern);
83
+ if (matches) {
84
+ // Check if it's in a safe context
85
+ let isSafe = false;
86
+ const patternName = pattern.source.split('\\')[0];
87
+
88
+ if (this.safePatterns[patternName]) {
89
+ for (const safePattern of this.safePatterns[patternName]) {
90
+ if (code.match(safePattern)) {
91
+ isSafe = true;
92
+ break;
93
+ }
94
+ }
95
+ }
96
+
97
+ if (!isSafe) {
98
+ results.valid = false;
99
+ results.errors.push({
100
+ type: 'dangerous_pattern',
101
+ pattern: pattern.source,
102
+ matches: matches,
103
+ message: `Dangerous pattern detected: ${matches[0]}`,
104
+ line: this._getLineNumber(code, matches.index)
105
+ });
106
+ }
107
+ }
108
+ }
109
+
110
+ // Check for SQL injection (if applicable)
111
+ if (code.includes('SELECT') || code.includes('INSERT') || code.includes('UPDATE')) {
112
+ for (const pattern of this.sqlInjectionPatterns) {
113
+ if (pattern.test(code)) {
114
+ results.valid = false;
115
+ results.errors.push({
116
+ type: 'sql_injection',
117
+ pattern: pattern.source,
118
+ message: 'Potential SQL injection vulnerability detected'
119
+ });
120
+ }
121
+ }
122
+ }
123
+
124
+ // Validate input sanitization
125
+ if (code.includes('req.body') || code.includes('req.query') || code.includes('req.params')) {
126
+ if (!code.includes('sanitize') && !code.includes('validate') && !code.includes('escape')) {
127
+ results.warnings.push({
128
+ type: 'input_validation',
129
+ message: 'User input detected without explicit sanitization'
130
+ });
131
+ }
132
+ }
133
+
134
+ return results;
135
+ }
136
+
137
+ /**
138
+ * Validate YAML configuration for security issues
139
+ */
140
+ validateYAML(yamlContent) {
141
+ const results = {
142
+ valid: true,
143
+ errors: [],
144
+ warnings: []
145
+ };
146
+
147
+ try {
148
+ const parsed = yaml.load(yamlContent);
149
+
150
+ // Check for dangerous YAML features
151
+ if (yamlContent.includes('!!') && !yamlContent.includes('!!str')) {
152
+ results.warnings.push({
153
+ type: 'yaml_tags',
154
+ message: 'YAML tags detected - ensure they are safe'
155
+ });
156
+ }
157
+
158
+ // Validate structure
159
+ this.validateYAMLStructure(parsed, results);
160
+
161
+ } catch (error) {
162
+ results.valid = false;
163
+ results.errors.push({
164
+ type: 'yaml_parse',
165
+ message: `YAML parsing error: ${error.message}`
166
+ });
167
+ }
168
+
169
+ return results;
170
+ }
171
+
172
+ /**
173
+ * Validate YAML structure recursively
174
+ */
175
+ validateYAMLStructure(obj, results, path = '') {
176
+ if (typeof obj === 'object' && obj !== null) {
177
+ for (const [key, value] of Object.entries(obj)) {
178
+ const currentPath = path ? `${path}.${key}` : key;
179
+
180
+ // Check for command injection in string values
181
+ if (typeof value === 'string') {
182
+ for (const pattern of this.commandInjectionPatterns) {
183
+ if (pattern.test(_value) && !this.isSafeCommandContext(key, value)) {
184
+ results.warnings.push({
185
+ type: 'command_injection',
186
+ path: currentPath,
187
+ message: `Potential command injection in ${currentPath}`
188
+ });
189
+ }
190
+ }
191
+ }
192
+
193
+ // Recurse for nested objects
194
+ if (typeof value === 'object') {
195
+ this.validateYAMLStructure(_value, results, currentPath);
196
+ }
197
+ }
198
+ }
199
+ }
200
+
201
+ /**
202
+ * Check if command-like string is in safe context
203
+ */
204
+ isSafeCommandContext(key, value) {
205
+ const safeKeys = ['description', 'comment', 'note', 'help', 'usage'];
206
+ return safeKeys.some(safe => key.toLowerCase().includes(safe));
207
+ }
208
+
209
+ /**
210
+ * Validate file paths for security issues
211
+ */
212
+ validatePath(filePath) {
213
+ const results = {
214
+ valid: true,
215
+ errors: []
216
+ };
217
+
218
+ // Normalize the path
219
+ const normalized = path.normalize(filePath);
220
+
221
+ // Check for path traversal
222
+ if (normalized.includes('..')) {
223
+ results.valid = false;
224
+ results.errors.push({
225
+ type: 'path_traversal',
226
+ message: 'Path traversal detected'
227
+ });
228
+ }
229
+
230
+ // Check for absolute paths (unless allowed)
231
+ if (path.isAbsolute(normalized)) {
232
+ results.errors.push({
233
+ type: 'absolute_path',
234
+ message: 'Absolute path detected - use relative paths'
235
+ });
236
+ }
237
+
238
+ // Check for sensitive directories
239
+ const sensitivePatterns = [
240
+ /node_modules/i,
241
+ /\.git/i,
242
+ /\.env/i,
243
+ /private/i,
244
+ /secret/i,
245
+ /config/i,
246
+ ];
247
+
248
+ for (const pattern of sensitivePatterns) {
249
+ if (pattern.test(normalized)) {
250
+ results.warnings = results.warnings || [];
251
+ results.warnings.push({
252
+ type: 'sensitive_path',
253
+ message: `Path contains potentially sensitive directory: ${pattern.source}`
254
+ });
255
+ }
256
+ }
257
+
258
+ return results;
259
+ }
260
+
261
+ /**
262
+ * Validate user input for common security issues
263
+ */
264
+ sanitizeInput(input, type = 'general') {
265
+ if (typeof input !== 'string') {
266
+ return input;
267
+ }
268
+
269
+ let sanitized = input;
270
+
271
+ // Remove null bytes
272
+ sanitized = sanitized.replace(/\0/g, '');
273
+
274
+ // Type-specific sanitization
275
+ switch (type) {
276
+ case 'filename':
277
+ // Allow only alphanumeric, dash, underscore, and dot
278
+ sanitized = sanitized.replace(/[^a-zA-Z0-9\-_\.]/g, '');
279
+ break;
280
+
281
+ case 'identifier':
282
+ // Allow only alphanumeric, dash, and underscore
283
+ sanitized = sanitized.replace(/[^a-zA-Z0-9\-_]/g, '');
284
+ break;
285
+
286
+ case 'yaml':
287
+ // Escape special YAML characters
288
+ sanitized = sanitized
289
+ .replace(/:/g, '\\:')
290
+ .replace(/\|/g, '\\|')
291
+ .replace(/>/g, '\\>')
292
+ .replace(/</g, '\\<');
293
+ break;
294
+
295
+ case 'general':
296
+ default:
297
+ // Basic HTML/script escaping
298
+ sanitized = sanitized
299
+ .replace(/&/g, '&amp;')
300
+ .replace(/</g, '&lt;')
301
+ .replace(/>/g, '&gt;')
302
+ .replace(/"/g, '&quot;')
303
+ .replace(/'/g, '&#x27;')
304
+ .replace(/\//g, '&#x2F;');
305
+ }
306
+
307
+ return sanitized;
308
+ }
309
+
310
+ /**
311
+ * Generate security report
312
+ * @param {Array} validations - Array of validation results
313
+ * @returns {Object} Comprehensive security report
314
+ */
315
+ generateReport(validations) {
316
+ const report = {
317
+ timestamp: new Date().toISOString(),
318
+ summary: {
319
+ totalChecks: 0,
320
+ passed: 0,
321
+ failed: 0,
322
+ warnings: 0
323
+ },
324
+ details: validations
325
+ };
326
+
327
+ // Calculate summary
328
+ for (const validation of validations) {
329
+ report.summary.totalChecks++;
330
+ if (validation.valid) {
331
+ report.summary.passed++;
332
+ } else {
333
+ report.summary.failed++;
334
+ }
335
+ report.summary.warnings += (validation.warnings || []).length;
336
+ }
337
+
338
+ report.summary.securityScore = Math.round(
339
+ (report.summary.passed / report.summary.totalChecks) * 100
340
+ );
341
+
342
+ return report;
343
+ }
344
+
345
+ /**
346
+ * Get line number from string index
347
+ * @private
348
+ * @param {string} text - The text to search
349
+ * @param {number} index - Character index
350
+ * @returns {number} Line number (1-based)
351
+ */
352
+ _getLineNumber(text, index) {
353
+ if (!text || index === undefined) return null;
354
+ const lines = text.substring(0, index).split('\n');
355
+ return lines.length;
356
+ }
357
+ }
358
+
359
359
  module.exports = SecurityChecker;