create-mushi-mushi 0.5.2 → 0.5.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -40,7 +40,7 @@ Examples of unacceptable behavior:
40
40
  ## Enforcement
41
41
 
42
42
  Instances of abusive, harassing, or otherwise unacceptable behavior may be
43
- reported to the project team at **security@mushimushi.dev**.
43
+ reported to the project team at **kensaurus@gmail.com**.
44
44
 
45
45
  All complaints will be reviewed and investigated promptly and fairly.
46
46
 
package/CONTRIBUTING.md CHANGED
@@ -33,6 +33,10 @@ pnpm lint # ESLint
33
33
  pnpm format # Prettier
34
34
  ```
35
35
 
36
+ Ad-hoc screenshots captured during UI reviews can live temporarily at the repo
37
+ root, but root-level `*.png` files are intentionally ignored. Canonical
38
+ screenshots that should be versioned belong under `docs/screenshots/`.
39
+
36
40
  ### Working on a single package
37
41
 
38
42
  ```bash
package/SECURITY.md CHANGED
@@ -19,7 +19,7 @@ If you discover a security vulnerability, please report it responsibly.
19
19
 
20
20
  **Do NOT open a public GitHub issue.**
21
21
 
22
- Instead, email: **security@mushimushi.dev**
22
+ Instead, email: **kensaurus@gmail.com**
23
23
 
24
24
  Include:
25
25
  - Description of the vulnerability
@@ -48,3 +48,77 @@ We will acknowledge receipt within 48 hours and aim to release a patch within 7
48
48
  - **Rotate API keys** regularly via the admin console
49
49
  - **Enable SSO** for team projects (Enterprise tier)
50
50
  - **Review audit logs** periodically for suspicious activity
51
+
52
+ ## Supply-chain hardening (how this package is protected)
53
+
54
+ Mushi Mushi is built and published with the controls below. Consumers can
55
+ verify each control independently — the goal is to make tampering both
56
+ difficult and detectable.
57
+
58
+ ### Publish-time controls
59
+
60
+ | Control | What it does | How to verify |
61
+ |---|---|---|
62
+ | **npm Trusted Publisher (OIDC)** | Every release is published from `.github/workflows/release.yml` on `master` using a short-lived OIDC token. Long-lived `NPM_TOKEN` is not used for publishing. | `npm view @mushi-mushi/<pkg> --json` shows `"trustedPublisher"` populated for recent versions. |
63
+ | **npm provenance attestations** | Every published tarball ships a [Sigstore provenance attestation](https://docs.npmjs.com/generating-provenance-statements) cryptographically linking the tarball to the exact GitHub Actions run that built it. | `npm audit signatures` (run inside any project that depends on `@mushi-mushi/*`) reports `verified registry signatures` and `verified attestations`. The npm web UI shows a "Built and signed on GitHub Actions" badge on each version. |
64
+ | **Pre-publish workspace-protocol guard** | Aborts the publish if `workspace:*` ranges leaked into the tarball (the bug class behind the v0.1.0 incident). | `scripts/check-workspace-protocol.mjs` runs before `changeset publish` in `pnpm release`. |
65
+ | **Post-publish tarball verification** | Re-downloads each just-published tarball and asserts it doesn't contain `workspace:*`. | See the "Verify published tarballs do not contain workspace:*" step in `release.yml`. |
66
+ | **Post-publish `npm audit signatures`** | Re-installs each published version and validates registry signatures + provenance against npm's transparency log. | See the "Audit signatures of installed dependencies" step in `release.yml`. |
67
+
68
+ ### Build-time controls
69
+
70
+ | Control | What it does |
71
+ |---|---|
72
+ | **All third-party GitHub Actions pinned to commit SHAs** | Every `uses:` in every workflow under `.github/workflows/` is pinned to a 40-character commit SHA with a version comment. Floating tags (`@v4`, `@main`) are mutable and were the entry point for the [tj-actions/changed-files compromise (CVE-2025-30066)](https://github.com/step-security/harden-runner#detected-attacks). |
73
+ | **Harden-Runner egress audit on every job** | [step-security/harden-runner](https://github.com/step-security/harden-runner) records every outbound network call, file write, and process spawn on every CI runner. Detects exfiltration attempts in real time — caught the tj-actions, NX, Shai-Hulud, and Axios attacks for other projects. |
74
+ | **OpenSSF Scorecard** | Weekly + on-push score of the repo's security posture (Pinned-Dependencies, Token-Permissions, Branch-Protection, Code-Review, Dangerous-Workflow, Maintained, SAST, Security-Policy, Signed-Releases, Vulnerabilities). Public results at [scorecard.dev](https://scorecard.dev/viewer/?uri=github.com/kensaurus/mushi-mushi). |
75
+ | **Server-side secret scan (Gitleaks)** | Every PR and every push to `master` runs Gitleaks across the diff / full tree. Belt-and-suspenders to the local pre-commit hook (`scripts/check-no-secrets.mjs`) which can be bypassed with `--no-verify`. |
76
+ | **Local pre-commit secret scanner** | `scripts/check-no-secrets.mjs` runs as a git hook installed by `pnpm install`, blocking commits that look like AWS / Stripe / GitHub / Anthropic / OpenAI / Slack / Supabase keys. |
77
+ | **CodeQL `security-extended`** | Semantic analysis of every TypeScript / JavaScript change finds injection sinks, taint flows, prototype pollution, etc. Runs on every PR, push, and weekly cron. |
78
+ | **Dependency review on PRs** | `actions/dependency-review-action` blocks the PR if it adds or upgrades a dep with a high-severity advisory. |
79
+ | **`pnpm audit --prod --audit-level=high`** | Weekly cron + every push to `master` fails on any high/critical advisory in production deps. |
80
+
81
+ ### Install-time controls (protect the project's own dependency graph)
82
+
83
+ | Control | What it does |
84
+ |---|---|
85
+ | **`min-release-age` (npm) / `minimumReleaseAge` (pnpm)** | Refuses to resolve any dep version published less than 7 days ago. The Axios 1.14.1 / 0.30.4 compromise (Mar 2026) was detected and removed within ~5 hours; Shai-Hulud (Sep 2025) within <12 hours — a 7-day cooldown blocks every publicly-disclosed 2025–2026 npm supply-chain attack outright. |
86
+ | **`strictDepBuilds: true`** | Fails the install if any transitive dep tries to run a `postinstall` hook the workspace hasn't pre-approved (`onlyBuiltDependencies` allow-list). |
87
+ | **`blockExoticSubdeps: true`** | Refuses to resolve transitive deps from git URLs, tarball URLs, or filesystem paths — anything that didn't go through the npm registry's signing pipeline. |
88
+ | **Dependabot with cooldown** | Routine dep upgrades wait 7 days; security advisories bypass the cooldown automatically. |
89
+ | **`pnpm audit signatures`-style verification** | The release pipeline re-runs `npm audit signatures` against each published version after the publish, with `--audit-level=high`. |
90
+
91
+ ### Verifying a Mushi Mushi tarball before installing
92
+
93
+ ```bash
94
+ # 1. Check provenance attestation matches the public GitHub Actions run
95
+ npm view @mushi-mushi/core --json | jq '.signatures, .dist'
96
+
97
+ # 2. Inside your own project after install
98
+ npm audit signatures
99
+
100
+ # Expected: every @mushi-mushi/* package reports
101
+ # "verified registry signature"
102
+ # "verified attestation"
103
+ ```
104
+
105
+ If `npm audit signatures` reports any `@mushi-mushi/*` package as unsigned
106
+ or with an invalid attestation, **stop the install and email
107
+ kensaurus@gmail.com immediately** — that's the symptom of either a
108
+ registry compromise or a tampered tarball, and we want to know within
109
+ hours, not days.
110
+
111
+ ### What this hardening does NOT cover
112
+
113
+ - **Self-hosted deployments.** Once the package is on your machine, the
114
+ security of your `node_modules`, build pipeline, and runtime is your
115
+ responsibility. The hardening above protects the path from source to
116
+ registry; it cannot protect a tarball after it has been downloaded.
117
+ - **Compromise of `kensaurus@gmail.com`.** A trusted-publisher rule still
118
+ lets the legitimate maintainer publish from any branch they push. If
119
+ you find yourself with admin access to this repo, treat
120
+ `.github/workflows/release.yml` as a tier-0 secret.
121
+ - **First-party bugs.** Provenance proves *who* built the tarball and
122
+ *when*; it does not prove the code is bug-free. CodeQL + tests cover
123
+ that surface, but no automation catches everything — please continue
124
+ to report issues to the address above.
package/dist/index.js CHANGED
@@ -3,7 +3,7 @@
3
3
  // src/index.ts
4
4
  import { runInit } from "@mushi-mushi/cli/init";
5
5
  import { FRAMEWORK_IDS, isFrameworkId } from "@mushi-mushi/cli/detect";
6
- var VERSION = true ? "0.5.2" : "0.0.0-dev";
6
+ var VERSION = true ? "0.5.3" : "0.0.0-dev";
7
7
  var MIN_NODE_MAJOR = 18;
8
8
  var ISSUES_URL = "https://github.com/kensaurus/mushi-mushi/issues";
9
9
  var HELP = `create-mushi-mushi \u2014 add Mushi Mushi to your existing project
package/package.json CHANGED
@@ -1,13 +1,13 @@
1
1
  {
2
2
  "name": "create-mushi-mushi",
3
- "version": "0.5.2",
3
+ "version": "0.5.3",
4
4
  "license": "MIT",
5
5
  "description": "Run `npm create mushi-mushi` to add the Mushi Mushi bug-reporting SDK to your existing project — the wizard auto-detects your framework (React, Vue, Svelte, Angular, React Native, Expo, Capacitor) and installs the right package.",
6
6
  "bin": {
7
7
  "create-mushi-mushi": "./dist/index.js"
8
8
  },
9
9
  "dependencies": {
10
- "@mushi-mushi/cli": "^0.5.2"
10
+ "@mushi-mushi/cli": "^0.6.1"
11
11
  },
12
12
  "devDependencies": {
13
13
  "@types/node": "^22.15.3",