coverme-scanner 2.0.0 → 2.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -336,6 +336,22 @@ grep -r "import.*database\|import.*db" src/controllers/ src/routes/
336
336
 
337
337
  Create `.coverme/scan.json` with this structure:
338
338
 
339
+ ### CRITICAL REQUIREMENT
340
+
341
+ **YOU MUST CREATE DETAILED FINDINGS!**
342
+
343
+ The `findings` array is **MANDATORY** and must contain:
344
+ - Full finding objects with ALL fields (not just executiveSummary.topRisks)
345
+ - businessImpact with financial/reputation/legal/operational breakdown
346
+ - proofOfConcept with actual exploit code
347
+ - attackChain with step-by-step exploitation
348
+ - quickFix vs properFix with code examples
349
+ - testing instructions (manual + automated)
350
+ - detection methods (commands + indicators)
351
+ - estimatedEffort (human vs claudeCode with ROI)
352
+
353
+ **DO NOT** create only `executiveSummary.topRisks` - you **MUST** also create full finding objects in the `findings` array!
354
+
339
355
  ### Required Fields
340
356
  - `agentCount`: Always `1` (unified agent)
341
357
  - `scanDuration`: e.g., "8m 30s" or "512s"
@@ -1258,16 +1274,27 @@ Before finishing:
1258
1274
 
1259
1275
  ## REMEMBER
1260
1276
 
1261
- 1. **Silent failures are CRITICAL** - They hide production bugs in payments, auth, data
1262
- 2. **Read actual code** - Don't guess, read the files
1263
- 3. **Check git history** - Secrets may have been removed but still exposed
1264
- 4. **Think like an attacker** - How would you exploit this?
1265
- 5. **Be specific** - File:line, code snippets, attack chains
1266
- 6. **DREAD + Attack Chain** - Required for critical/high
1267
- 7. **Quality over quantity** - 10 solid findings > 50 vague ones
1268
- 8. **Architecture matters** - Trust boundaries, data flow, scalability
1269
- 9. **Performance impacts security** - N+1 queries DoS, memory leaks → crashes
1270
- 10. **Run `coverme report`** - Not done until HTML opens!
1277
+ 1. **CREATE DETAILED FINDINGS** - DO NOT just write executiveSummary! You MUST populate the `findings` array with full finding objects!
1278
+ 2. **Silent failures are CRITICAL** - They hide production bugs in payments, auth, data
1279
+ 3. **Read actual code** - Don't guess, read the files
1280
+ 4. **Check git history** - Secrets may have been removed but still exposed
1281
+ 5. **Think like an attacker** - How would you exploit this?
1282
+ 6. **Be specific** - File:line, code snippets, attack chains
1283
+ 7. **DREAD + Attack Chain** - Required for critical/high
1284
+ 8. **Quality over quantity** - 10 solid findings > 50 vague ones
1285
+ 9. **Architecture matters** - Trust boundaries, data flow, scalability
1286
+ 10. **Performance impacts security** - N+1 queries DoS, memory leaks → crashes
1287
+ 11. **Include ROI estimates** - human vs claudeCode time for every finding
1288
+ 12. **Run `coverme report`** - Not done until HTML opens!
1289
+
1290
+ ---
1291
+
1292
+ ⚠️ **FINAL CHECK BEFORE SUBMITTING scan.json:**
1293
+
1294
+ - [ ] `findings` array contains at least 3-10 detailed finding objects (NOT empty!)
1295
+ - [ ] Each finding has businessImpact, proofOfConcept, attackChain, quickFix, properFix, testing, detection, estimatedEffort
1296
+ - [ ] executiveSummary.topRisks matches the findings in the findings array
1297
+ - [ ] summary counts (critical/high/medium/low) match the findings array length
1271
1298
 
1272
1299
  ---
1273
1300
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "coverme-scanner",
3
- "version": "2.0.0",
3
+ "version": "2.0.1",
4
4
  "description": "AI-powered code scanner with multi-agent verification for Claude Code. One command scans everything.",
5
5
  "main": "dist/index.js",
6
6
  "files": [