codekin 0.2.1 → 0.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (75) hide show
  1. package/dist/assets/index-B4rYTSlV.css +1 -0
  2. package/dist/assets/index-CWc3yfPn.js +181 -0
  3. package/dist/index.html +2 -2
  4. package/package.json +10 -6
  5. package/server/dist/approval-manager.d.ts +71 -0
  6. package/server/dist/approval-manager.js +249 -0
  7. package/server/dist/approval-manager.js.map +1 -0
  8. package/server/dist/auth-routes.d.ts +11 -0
  9. package/server/dist/auth-routes.js +11 -0
  10. package/server/dist/auth-routes.js.map +1 -1
  11. package/server/dist/claude-process.js +2 -1
  12. package/server/dist/claude-process.js.map +1 -1
  13. package/server/dist/config.d.ts +1 -2
  14. package/server/dist/config.js +17 -5
  15. package/server/dist/config.js.map +1 -1
  16. package/server/dist/crypto-utils.d.ts +16 -1
  17. package/server/dist/crypto-utils.js +44 -1
  18. package/server/dist/crypto-utils.js.map +1 -1
  19. package/server/dist/docs-routes.d.ts +16 -0
  20. package/server/dist/docs-routes.js +141 -0
  21. package/server/dist/docs-routes.js.map +1 -0
  22. package/server/dist/session-manager.d.ts +37 -84
  23. package/server/dist/session-manager.js +89 -472
  24. package/server/dist/session-manager.js.map +1 -1
  25. package/server/dist/session-naming.d.ts +35 -0
  26. package/server/dist/session-naming.js +168 -0
  27. package/server/dist/session-naming.js.map +1 -0
  28. package/server/dist/session-persistence.d.ts +30 -0
  29. package/server/dist/session-persistence.js +93 -0
  30. package/server/dist/session-persistence.js.map +1 -0
  31. package/server/dist/session-routes.d.ts +2 -1
  32. package/server/dist/session-routes.js +13 -6
  33. package/server/dist/session-routes.js.map +1 -1
  34. package/server/dist/stepflow-handler.d.ts +3 -9
  35. package/server/dist/stepflow-handler.js +32 -50
  36. package/server/dist/stepflow-handler.js.map +1 -1
  37. package/server/dist/stepflow-types.d.ts +2 -0
  38. package/server/dist/types.d.ts +3 -0
  39. package/server/dist/upload-routes.js +9 -4
  40. package/server/dist/upload-routes.js.map +1 -1
  41. package/server/dist/webhook-github.d.ts +23 -5
  42. package/server/dist/webhook-github.js +23 -5
  43. package/server/dist/webhook-github.js.map +1 -1
  44. package/server/dist/webhook-handler-base.d.ts +45 -0
  45. package/server/dist/webhook-handler-base.js +86 -0
  46. package/server/dist/webhook-handler-base.js.map +1 -0
  47. package/server/dist/webhook-handler.d.ts +3 -10
  48. package/server/dist/webhook-handler.js +6 -46
  49. package/server/dist/webhook-handler.js.map +1 -1
  50. package/server/dist/webhook-workspace.d.ts +8 -1
  51. package/server/dist/webhook-workspace.js +73 -41
  52. package/server/dist/webhook-workspace.js.map +1 -1
  53. package/server/dist/workflow-config.d.ts +2 -0
  54. package/server/dist/workflow-config.js +1 -1
  55. package/server/dist/workflow-config.js.map +1 -1
  56. package/server/dist/workflow-engine.d.ts +1 -0
  57. package/server/dist/workflow-engine.js +3 -0
  58. package/server/dist/workflow-engine.js.map +1 -1
  59. package/server/dist/workflow-loader.d.ts +33 -6
  60. package/server/dist/workflow-loader.js +129 -14
  61. package/server/dist/workflow-loader.js.map +1 -1
  62. package/server/dist/workflow-routes.d.ts +7 -3
  63. package/server/dist/workflow-routes.js +63 -8
  64. package/server/dist/workflow-routes.js.map +1 -1
  65. package/server/dist/ws-server.js +91 -18
  66. package/server/dist/ws-server.js.map +1 -1
  67. package/server/workflows/code-review.daily.md +22 -0
  68. package/server/workflows/comment-assessment.daily.md +41 -0
  69. package/server/workflows/complexity.weekly.md +54 -0
  70. package/server/workflows/coverage.daily.md +41 -0
  71. package/server/workflows/dependency-health.daily.md +46 -0
  72. package/server/workflows/repo-health.weekly.md +111 -0
  73. package/server/workflows/security-audit.weekly.md +66 -0
  74. package/dist/assets/index-CPxHiZP2.js +0 -105
  75. package/dist/assets/index-DU_Viph_.css +0 -1
@@ -0,0 +1,66 @@
1
+ ---
2
+ kind: security-audit.weekly
3
+ name: Security Audit
4
+ sessionPrefix: security
5
+ outputDir: .codekin/reports/security
6
+ filenameSuffix: _security-audit.md
7
+ commitMessage: chore: security audit
8
+ ---
9
+ You are performing an automated security audit. Please do the following:
10
+
11
+ 1. Examine the project structure to understand the tech stack, entry points, and sensitive areas.
12
+
13
+ 2. Scan for hardcoded secrets and credentials:
14
+ - API keys, tokens, passwords, private keys embedded in source files
15
+ - Secrets in config files, .env files committed to the repo
16
+ - Base64-encoded credentials or obfuscated secrets
17
+ - Run: `git log --all --oneline | head -20` and `git grep -rn "password\|secret\|api_key\|token\|private_key" -- "*.js" "*.ts" "*.py" "*.go" "*.env" "*.json" "*.yaml" "*.yml" 2>/dev/null | grep -v "node_modules\|.git\|test\|spec\|mock" | head -100`
18
+
19
+ 3. Scan for insecure code patterns:
20
+ - Injection vulnerabilities: SQL, command, LDAP, XPath injection
21
+ - Unsafe use of eval(), exec(), subprocess with shell=True
22
+ - Unsanitized user input passed to filesystem, database, or shell operations
23
+ - Insecure deserialization (pickle.loads, YAML.load without SafeLoader, etc.)
24
+ - Path traversal vulnerabilities (../../ in user-controlled paths)
25
+ - Server-side request forgery (SSRF) risks
26
+
27
+ 4. Check authentication and authorization:
28
+ - Missing or bypassable auth checks
29
+ - Weak session management (predictable tokens, no expiry)
30
+ - Insecure direct object references (IDOR)
31
+ - JWT misconfiguration (alg:none, weak secrets)
32
+
33
+ 5. Check for common web security issues (if applicable):
34
+ - XSS: unescaped user input in HTML output
35
+ - CSRF: missing CSRF protection on state-changing endpoints
36
+ - Insecure CORS configuration (wildcard origins with credentials)
37
+ - Sensitive data in URLs, logs, or error messages
38
+
39
+ 6. Check infrastructure and configuration:
40
+ - Debug mode enabled in production config
41
+ - Overly permissive file permissions or exposed admin endpoints
42
+ - Insecure TLS/SSL configuration
43
+ - Missing security headers (CSP, HSTS, X-Frame-Options)
44
+
45
+ 7. Produce a structured Markdown report. Your entire response will be saved as the report file, so write valid Markdown only — no conversational preamble.
46
+
47
+ Report structure:
48
+ ## Summary
49
+ (Overall risk rating: Critical/High/Medium/Low, key findings count by severity)
50
+
51
+ ## Critical Findings
52
+ (Each finding: title, file:line, description, impact, remediation)
53
+
54
+ ## High Findings
55
+ (Same format as Critical, top 10)
56
+
57
+ ## Medium Findings
58
+ (Same format, top 10)
59
+
60
+ ## Secrets & Credentials Exposure
61
+ (Any hardcoded or committed secrets found, with file paths — redact actual values)
62
+
63
+ ## Recommendations
64
+ (Numbered list of 5–10 prioritised fixes, ordered by risk impact)
65
+
66
+ Important: Do NOT modify any source files. Do NOT output actual secret values — only describe their location and type.