defense-mcp-server 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +471 -0
- package/LICENSE +21 -0
- package/README.md +242 -0
- package/build/core/auto-installer.d.ts +102 -0
- package/build/core/auto-installer.d.ts.map +1 -0
- package/build/core/auto-installer.js +833 -0
- package/build/core/backup-manager.d.ts +63 -0
- package/build/core/backup-manager.d.ts.map +1 -0
- package/build/core/backup-manager.js +189 -0
- package/build/core/changelog.d.ts +75 -0
- package/build/core/changelog.d.ts.map +1 -0
- package/build/core/changelog.js +123 -0
- package/build/core/command-allowlist.d.ts +129 -0
- package/build/core/command-allowlist.d.ts.map +1 -0
- package/build/core/command-allowlist.js +849 -0
- package/build/core/config.d.ts +79 -0
- package/build/core/config.d.ts.map +1 -0
- package/build/core/config.js +193 -0
- package/build/core/dependency-validator.d.ts +106 -0
- package/build/core/dependency-validator.d.ts.map +1 -0
- package/build/core/dependency-validator.js +405 -0
- package/build/core/distro-adapter.d.ts +177 -0
- package/build/core/distro-adapter.d.ts.map +1 -0
- package/build/core/distro-adapter.js +481 -0
- package/build/core/distro.d.ts +68 -0
- package/build/core/distro.d.ts.map +1 -0
- package/build/core/distro.js +457 -0
- package/build/core/encrypted-state.d.ts +76 -0
- package/build/core/encrypted-state.d.ts.map +1 -0
- package/build/core/encrypted-state.js +209 -0
- package/build/core/executor.d.ts +56 -0
- package/build/core/executor.d.ts.map +1 -0
- package/build/core/executor.js +350 -0
- package/build/core/installer.d.ts +92 -0
- package/build/core/installer.d.ts.map +1 -0
- package/build/core/installer.js +1072 -0
- package/build/core/logger.d.ts +102 -0
- package/build/core/logger.d.ts.map +1 -0
- package/build/core/logger.js +132 -0
- package/build/core/parsers.d.ts +151 -0
- package/build/core/parsers.d.ts.map +1 -0
- package/build/core/parsers.js +479 -0
- package/build/core/policy-engine.d.ts +170 -0
- package/build/core/policy-engine.d.ts.map +1 -0
- package/build/core/policy-engine.js +656 -0
- package/build/core/preflight.d.ts +157 -0
- package/build/core/preflight.d.ts.map +1 -0
- package/build/core/preflight.js +638 -0
- package/build/core/privilege-manager.d.ts +108 -0
- package/build/core/privilege-manager.d.ts.map +1 -0
- package/build/core/privilege-manager.js +363 -0
- package/build/core/rate-limiter.d.ts +67 -0
- package/build/core/rate-limiter.d.ts.map +1 -0
- package/build/core/rate-limiter.js +129 -0
- package/build/core/rollback.d.ts +73 -0
- package/build/core/rollback.d.ts.map +1 -0
- package/build/core/rollback.js +278 -0
- package/build/core/safeguards.d.ts +58 -0
- package/build/core/safeguards.d.ts.map +1 -0
- package/build/core/safeguards.js +448 -0
- package/build/core/sanitizer.d.ts +118 -0
- package/build/core/sanitizer.d.ts.map +1 -0
- package/build/core/sanitizer.js +459 -0
- package/build/core/secure-fs.d.ts +67 -0
- package/build/core/secure-fs.d.ts.map +1 -0
- package/build/core/secure-fs.js +143 -0
- package/build/core/spawn-safe.d.ts +55 -0
- package/build/core/spawn-safe.d.ts.map +1 -0
- package/build/core/spawn-safe.js +146 -0
- package/build/core/sudo-guard.d.ts +145 -0
- package/build/core/sudo-guard.d.ts.map +1 -0
- package/build/core/sudo-guard.js +349 -0
- package/build/core/sudo-session.d.ts +100 -0
- package/build/core/sudo-session.d.ts.map +1 -0
- package/build/core/sudo-session.js +319 -0
- package/build/core/tool-dependencies.d.ts +61 -0
- package/build/core/tool-dependencies.d.ts.map +1 -0
- package/build/core/tool-dependencies.js +571 -0
- package/build/core/tool-registry.d.ts +111 -0
- package/build/core/tool-registry.d.ts.map +1 -0
- package/build/core/tool-registry.js +656 -0
- package/build/core/tool-wrapper.d.ts +73 -0
- package/build/core/tool-wrapper.d.ts.map +1 -0
- package/build/core/tool-wrapper.js +296 -0
- package/build/index.d.ts +3 -0
- package/build/index.d.ts.map +1 -0
- package/build/index.js +247 -0
- package/build/tools/access-control.d.ts +9 -0
- package/build/tools/access-control.d.ts.map +1 -0
- package/build/tools/access-control.js +1818 -0
- package/build/tools/api-security.d.ts +12 -0
- package/build/tools/api-security.d.ts.map +1 -0
- package/build/tools/api-security.js +901 -0
- package/build/tools/app-hardening.d.ts +11 -0
- package/build/tools/app-hardening.d.ts.map +1 -0
- package/build/tools/app-hardening.js +768 -0
- package/build/tools/backup.d.ts +8 -0
- package/build/tools/backup.d.ts.map +1 -0
- package/build/tools/backup.js +381 -0
- package/build/tools/cloud-security.d.ts +17 -0
- package/build/tools/cloud-security.d.ts.map +1 -0
- package/build/tools/cloud-security.js +739 -0
- package/build/tools/compliance.d.ts +10 -0
- package/build/tools/compliance.d.ts.map +1 -0
- package/build/tools/compliance.js +1225 -0
- package/build/tools/container-security.d.ts +14 -0
- package/build/tools/container-security.d.ts.map +1 -0
- package/build/tools/container-security.js +788 -0
- package/build/tools/deception.d.ts +13 -0
- package/build/tools/deception.d.ts.map +1 -0
- package/build/tools/deception.js +763 -0
- package/build/tools/dns-security.d.ts +93 -0
- package/build/tools/dns-security.d.ts.map +1 -0
- package/build/tools/dns-security.js +745 -0
- package/build/tools/drift-detection.d.ts +8 -0
- package/build/tools/drift-detection.d.ts.map +1 -0
- package/build/tools/drift-detection.js +326 -0
- package/build/tools/ebpf-security.d.ts +15 -0
- package/build/tools/ebpf-security.d.ts.map +1 -0
- package/build/tools/ebpf-security.js +294 -0
- package/build/tools/encryption.d.ts +9 -0
- package/build/tools/encryption.d.ts.map +1 -0
- package/build/tools/encryption.js +1667 -0
- package/build/tools/firewall.d.ts +9 -0
- package/build/tools/firewall.d.ts.map +1 -0
- package/build/tools/firewall.js +1398 -0
- package/build/tools/hardening.d.ts +10 -0
- package/build/tools/hardening.d.ts.map +1 -0
- package/build/tools/hardening.js +2654 -0
- package/build/tools/ids.d.ts +9 -0
- package/build/tools/ids.d.ts.map +1 -0
- package/build/tools/ids.js +624 -0
- package/build/tools/incident-response.d.ts +10 -0
- package/build/tools/incident-response.d.ts.map +1 -0
- package/build/tools/incident-response.js +1180 -0
- package/build/tools/logging.d.ts +12 -0
- package/build/tools/logging.d.ts.map +1 -0
- package/build/tools/logging.js +454 -0
- package/build/tools/malware.d.ts +10 -0
- package/build/tools/malware.d.ts.map +1 -0
- package/build/tools/malware.js +532 -0
- package/build/tools/meta.d.ts +11 -0
- package/build/tools/meta.d.ts.map +1 -0
- package/build/tools/meta.js +2278 -0
- package/build/tools/network-defense.d.ts +12 -0
- package/build/tools/network-defense.d.ts.map +1 -0
- package/build/tools/network-defense.js +760 -0
- package/build/tools/patch-management.d.ts +3 -0
- package/build/tools/patch-management.d.ts.map +1 -0
- package/build/tools/patch-management.js +708 -0
- package/build/tools/process-security.d.ts +12 -0
- package/build/tools/process-security.d.ts.map +1 -0
- package/build/tools/process-security.js +784 -0
- package/build/tools/reporting.d.ts +11 -0
- package/build/tools/reporting.d.ts.map +1 -0
- package/build/tools/reporting.js +559 -0
- package/build/tools/secrets.d.ts +9 -0
- package/build/tools/secrets.d.ts.map +1 -0
- package/build/tools/secrets.js +596 -0
- package/build/tools/siem-integration.d.ts +18 -0
- package/build/tools/siem-integration.d.ts.map +1 -0
- package/build/tools/siem-integration.js +754 -0
- package/build/tools/sudo-management.d.ts +18 -0
- package/build/tools/sudo-management.d.ts.map +1 -0
- package/build/tools/sudo-management.js +737 -0
- package/build/tools/supply-chain-security.d.ts +8 -0
- package/build/tools/supply-chain-security.d.ts.map +1 -0
- package/build/tools/supply-chain-security.js +256 -0
- package/build/tools/threat-intel.d.ts +22 -0
- package/build/tools/threat-intel.d.ts.map +1 -0
- package/build/tools/threat-intel.js +749 -0
- package/build/tools/vulnerability-management.d.ts +11 -0
- package/build/tools/vulnerability-management.d.ts.map +1 -0
- package/build/tools/vulnerability-management.js +667 -0
- package/build/tools/waf.d.ts +12 -0
- package/build/tools/waf.d.ts.map +1 -0
- package/build/tools/waf.js +843 -0
- package/build/tools/wireless-security.d.ts +19 -0
- package/build/tools/wireless-security.d.ts.map +1 -0
- package/build/tools/wireless-security.js +826 -0
- package/build/tools/zero-trust-network.d.ts +8 -0
- package/build/tools/zero-trust-network.d.ts.map +1 -0
- package/build/tools/zero-trust-network.js +367 -0
- package/docs/SAFEGUARDS.md +518 -0
- package/docs/TOOLS-REFERENCE.md +665 -0
- package/package.json +87 -0
|
@@ -0,0 +1,665 @@
|
|
|
1
|
+
# Tools Reference
|
|
2
|
+
|
|
3
|
+
Complete reference for all 94 tools registered in the defense-mcp-server v0.6.0. The server registers 32 tool modules providing 94 defensive security tools.
|
|
4
|
+
|
|
5
|
+
> **Action-based tools**: Each consolidated tool accepts an `action` parameter to select sub-operations, keeping MCP tool registration overhead low while preserving all functionality.
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## Legend
|
|
10
|
+
|
|
11
|
+
| Column | Meaning |
|
|
12
|
+
|--------|---------|
|
|
13
|
+
| Tool Name | MCP tool name as registered (use this in `tool` calls) |
|
|
14
|
+
| Description | What the tool does |
|
|
15
|
+
| Actions | Available `action` parameter values |
|
|
16
|
+
| dryRun | Y = supports `dry_run` parameter; N = read-only or not applicable |
|
|
17
|
+
| Sudo | never / conditional / always |
|
|
18
|
+
|
|
19
|
+
---
|
|
20
|
+
|
|
21
|
+
## Firewall (`firewall.ts`) — 5 tools
|
|
22
|
+
|
|
23
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
24
|
+
|-----------|-------------|---------|--------|------|
|
|
25
|
+
| `firewall_iptables` | Manage iptables rules and chains | `list`, `add`, `delete`, `set_policy`, `create_chain` | Y | conditional |
|
|
26
|
+
| `firewall_ufw` | Manage UFW (Uncomplicated Firewall) | `status`, `add`, `delete` | Y | conditional |
|
|
27
|
+
| `firewall_persist` | Manage firewall rule persistence | `save`, `restore`, `enable`, `status` | Y | always |
|
|
28
|
+
| `firewall_nftables_list` | List nftables ruleset | — | N | always |
|
|
29
|
+
| `firewall_policy_audit` | Audit firewall configuration for security issues | — | N | conditional |
|
|
30
|
+
|
|
31
|
+
## Hardening (`hardening.ts`) — 8 tools
|
|
32
|
+
|
|
33
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
34
|
+
|-----------|-------------|---------|--------|------|
|
|
35
|
+
| `harden_sysctl` | Manage sysctl kernel parameters | `get`, `set`, `audit` | Y | conditional |
|
|
36
|
+
| `harden_service` | Manage and audit systemd services | `manage`, `audit` | Y | conditional |
|
|
37
|
+
| `harden_permissions` | Manage file permissions | `check`, `fix`, `audit` | Y | conditional |
|
|
38
|
+
| `harden_systemd` | Audit or apply systemd service security hardening | `audit`, `apply` | Y | conditional |
|
|
39
|
+
| `harden_kernel` | Kernel security hardening | `audit`, `modules`, `coredump` | Y | conditional |
|
|
40
|
+
| `harden_bootloader` | Bootloader security | `audit`, `configure` | Y | conditional |
|
|
41
|
+
| `harden_misc` | Miscellaneous hardening (cron, umask, banners) | `cron_audit`, `umask_audit`, `umask_set`, `banner_audit`, `banner_set` | Y | conditional |
|
|
42
|
+
| `harden_memory` | Memory and exploit mitigations | `audit`, `enforce_aslr`, `report` | Y | conditional |
|
|
43
|
+
|
|
44
|
+
## IDS (`ids.ts`) — 3 tools
|
|
45
|
+
|
|
46
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
47
|
+
|-----------|-------------|---------|--------|------|
|
|
48
|
+
| `ids_aide_manage` | Manage AIDE file integrity database | `init`, `check`, `update`, `compare` | Y | always |
|
|
49
|
+
| `ids_rootkit_scan` | Rootkit detection (rkhunter, chkrootkit, or combined) | `rkhunter`, `chkrootkit`, `all` | N | always |
|
|
50
|
+
| `ids_file_integrity_check` | Quick SHA-256 file integrity check | — | N | conditional |
|
|
51
|
+
|
|
52
|
+
## Logging (`logging.ts`) — 4 tools
|
|
53
|
+
|
|
54
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
55
|
+
|-----------|-------------|---------|--------|------|
|
|
56
|
+
| `log_auditd` | Auditd management (rules, search, reports, CIS rules) | `rules`, `search`, `report`, `cis_rules` | Y | always |
|
|
57
|
+
| `log_journalctl_query` | Query systemd journal for log entries | — | N | conditional |
|
|
58
|
+
| `log_fail2ban` | Fail2ban management | `status`, `ban`, `unban`, `reload`, `audit` | Y | conditional |
|
|
59
|
+
| `log_system` | System log analysis and log rotation audit | `analyze`, `rotation_audit` | N | conditional |
|
|
60
|
+
|
|
61
|
+
## Network Defense (`network-defense.ts`) — 3 tools
|
|
62
|
+
|
|
63
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
64
|
+
|-----------|-------------|---------|--------|------|
|
|
65
|
+
| `netdef_connections` | List active connections or audit listening ports | `list`, `audit` | N | conditional |
|
|
66
|
+
| `netdef_capture` | Network capture (tcpdump, DNS, ARP monitoring) | `custom`, `dns`, `arp` | Y | always |
|
|
67
|
+
| `netdef_security_audit` | Network security audit (scan detect, IPv6, self-scan) | `scan_detect`, `ipv6`, `self_scan` | N | conditional |
|
|
68
|
+
|
|
69
|
+
## Compliance (`compliance.ts`) — 7 tools
|
|
70
|
+
|
|
71
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
72
|
+
|-----------|-------------|---------|--------|------|
|
|
73
|
+
| `compliance_lynis_audit` | Run Lynis security audit | — | N | always |
|
|
74
|
+
| `compliance_oscap_scan` | Run OpenSCAP compliance scan | — | N | always |
|
|
75
|
+
| `compliance_check` | Run compliance checks (CIS or framework) | `cis`, `framework` | N | conditional |
|
|
76
|
+
| `compliance_policy_evaluate` | Evaluate a compliance policy set | — | N | never |
|
|
77
|
+
| `compliance_report` | Generate comprehensive compliance summary report | — | N | conditional |
|
|
78
|
+
| `compliance_cron_restrict` | Restrict cron/at access (CIS 5.1.8/5.1.9) | `create_allow_files`, `status` | Y | always |
|
|
79
|
+
| `compliance_tmp_hardening` | Harden /tmp mount options (CIS 1.1.4) | `audit`, `apply` | Y | always |
|
|
80
|
+
|
|
81
|
+
## Malware (`malware.ts`) — 4 tools
|
|
82
|
+
|
|
83
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
84
|
+
|-----------|-------------|---------|--------|------|
|
|
85
|
+
| `malware_clamav` | ClamAV antivirus (scan or update definitions) | `scan`, `update` | Y | conditional |
|
|
86
|
+
| `malware_yara_scan` | Scan files with YARA rules | — | N | never |
|
|
87
|
+
| `malware_file_scan` | File scanning (suspicious files or web shells) | `suspicious`, `webshell` | N | conditional |
|
|
88
|
+
| `malware_quarantine_manage` | Manage quarantined files | `list`, `restore`, `delete`, `info` | Y | never |
|
|
89
|
+
|
|
90
|
+
## Backup (`backup.ts`) — 1 tool
|
|
91
|
+
|
|
92
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
93
|
+
|-----------|-------------|---------|--------|------|
|
|
94
|
+
| `backup` | Backup management (config, state, restore, verify, list) | `config`, `state`, `restore`, `verify`, `list` | Y | conditional |
|
|
95
|
+
|
|
96
|
+
## Access Control (`access-control.ts`) — 6 tools
|
|
97
|
+
|
|
98
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
99
|
+
|-----------|-------------|---------|--------|------|
|
|
100
|
+
| `access_ssh` | SSH server security (audit, harden, cipher audit) | `audit`, `harden`, `cipher_audit` | Y | conditional |
|
|
101
|
+
| `access_sudo_audit` | Audit sudoers configuration | — | N | conditional |
|
|
102
|
+
| `access_user_audit` | Audit user accounts for security issues | — | N | conditional |
|
|
103
|
+
| `access_password_policy` | Audit or set system password policy | `audit`, `set` | Y | conditional |
|
|
104
|
+
| `access_pam` | PAM configuration security | `audit`, `configure` | Y | conditional |
|
|
105
|
+
| `access_restrict_shell` | Restrict a user's login shell | — | Y | always |
|
|
106
|
+
|
|
107
|
+
## Encryption (`encryption.ts`) — 4 tools
|
|
108
|
+
|
|
109
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
110
|
+
|-----------|-------------|---------|--------|------|
|
|
111
|
+
| `crypto_tls` | TLS/SSL security (remote audit, cert expiry, config audit) | `remote_audit`, `cert_expiry`, `config_audit` | N | conditional |
|
|
112
|
+
| `crypto_gpg_keys` | Manage GPG keys | `list`, `generate`, `export`, `import`, `verify` | N | never |
|
|
113
|
+
| `crypto_luks_manage` | Manage LUKS encrypted volumes | `status`, `dump`, `open`, `close`, `list` | Y | always |
|
|
114
|
+
| `crypto_file_hash` | Calculate cryptographic hashes of files | — | N | never |
|
|
115
|
+
|
|
116
|
+
## Container Security (`container-security.ts`) — 6 tools
|
|
117
|
+
|
|
118
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
119
|
+
|-----------|-------------|---------|--------|------|
|
|
120
|
+
| `container_docker` | Docker security (audit, bench, seccomp, daemon) | `audit`, `bench`, `seccomp`, `daemon` | Y | conditional |
|
|
121
|
+
| `container_apparmor` | AppArmor management | `status`, `list`, `enforce`, `complain`, `disable`, `install`, `apply_container` | Y | conditional |
|
|
122
|
+
| `container_selinux_manage` | SELinux management | `status`, `getenforce`, `setenforce`, `booleans`, `audit` | Y | always |
|
|
123
|
+
| `container_namespace_check` | Check namespace isolation | — | N | conditional |
|
|
124
|
+
| `container_image_scan` | Scan container images for vulnerabilities | — | N | never |
|
|
125
|
+
| `container_security_config` | Container security configuration (seccomp, rootless) | `seccomp_profile`, `rootless` | Y | conditional |
|
|
126
|
+
|
|
127
|
+
## Patch Management (`patch-management.ts`) — 5 tools
|
|
128
|
+
|
|
129
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
130
|
+
|-----------|-------------|---------|--------|------|
|
|
131
|
+
| `patch_update_audit` | Audit pending security updates | — | N | always |
|
|
132
|
+
| `patch_unattended_audit` | Audit unattended-upgrades configuration | — | N | always |
|
|
133
|
+
| `patch_integrity_check` | Verify installed package integrity | — | N | always |
|
|
134
|
+
| `patch_kernel_audit` | Audit kernel version and update status | — | N | always |
|
|
135
|
+
| `patch_vulnerability_intel` | Vulnerability intelligence (CVE lookup, scan, urgency) | `lookup`, `scan`, `urgency` | N | never |
|
|
136
|
+
|
|
137
|
+
## Secrets (`secrets.ts`) — 4 tools
|
|
138
|
+
|
|
139
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
140
|
+
|-----------|-------------|---------|--------|------|
|
|
141
|
+
| `secrets_scan` | Scan filesystem for hardcoded secrets | — | N | never |
|
|
142
|
+
| `secrets_env_audit` | Audit environment variable security and .env exposure | — | N | never |
|
|
143
|
+
| `secrets_ssh_key_sprawl` | Detect SSH key sprawl | — | N | never |
|
|
144
|
+
| `secrets_git_history_scan` | Scan git repository history for leaked secrets | — | N | never |
|
|
145
|
+
|
|
146
|
+
## Incident Response (`incident-response.ts`) — 1 tool
|
|
147
|
+
|
|
148
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
149
|
+
|-----------|-------------|---------|--------|------|
|
|
150
|
+
| `incident_response` | Incident response (volatile data, IOC scan, timeline) | `collect`, `ioc_scan`, `timeline` | Y | conditional |
|
|
151
|
+
|
|
152
|
+
## Meta (`meta.ts`) — 5 tools
|
|
153
|
+
|
|
154
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
155
|
+
|-----------|-------------|---------|--------|------|
|
|
156
|
+
| `defense_check_tools` | Check availability of defensive security tools | — | N | conditional |
|
|
157
|
+
| `defense_workflow` | Defense workflows (suggest or run) | `suggest`, `run` | Y | conditional |
|
|
158
|
+
| `defense_change_history` | View audit trail of defensive changes | — | N | never |
|
|
159
|
+
| `defense_security_posture` | Security posture (score, trend, dashboard) | `score`, `trend`, `dashboard` | N | conditional |
|
|
160
|
+
| `defense_scheduled_audit` | Scheduled security audits | `create`, `list`, `remove`, `history` | Y | conditional |
|
|
161
|
+
|
|
162
|
+
## Sudo Management (`sudo-management.ts`) — 6 tools
|
|
163
|
+
|
|
164
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
165
|
+
|-----------|-------------|---------|--------|------|
|
|
166
|
+
| `sudo_elevate` | Elevate privileges by providing sudo password | — | N | never |
|
|
167
|
+
| `sudo_elevate_gui` | Secure GUI-based elevation (password never visible to AI) | — | N | never |
|
|
168
|
+
| `sudo_status` | Check current sudo session status | — | N | never |
|
|
169
|
+
| `sudo_drop` | Drop elevated privileges and zero password buffer | — | N | never |
|
|
170
|
+
| `sudo_extend` | Extend sudo session timeout | — | N | never |
|
|
171
|
+
| `preflight_batch_check` | Pre-check multiple tools for requirements | — | N | never |
|
|
172
|
+
|
|
173
|
+
## Supply Chain Security (`supply-chain-security.ts`) — 1 tool
|
|
174
|
+
|
|
175
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
176
|
+
|-----------|-------------|---------|--------|------|
|
|
177
|
+
| `supply_chain` | Supply chain security (SBOM, signing, SLSA verification) | `sbom`, `sign`, `verify_slsa` | Y | conditional |
|
|
178
|
+
|
|
179
|
+
## Drift Detection (`drift-detection.ts`) — 1 tool
|
|
180
|
+
|
|
181
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
182
|
+
|-----------|-------------|---------|--------|------|
|
|
183
|
+
| `drift_baseline` | Drift detection (create, compare, list baselines) | `create`, `compare`, `list` | N | never |
|
|
184
|
+
|
|
185
|
+
## Zero-Trust Network (`zero-trust-network.ts`) — 1 tool
|
|
186
|
+
|
|
187
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
188
|
+
|-----------|-------------|---------|--------|------|
|
|
189
|
+
| `zero_trust` | Zero-trust networking (WireGuard, mTLS, microsegmentation) | `wireguard`, `wg_peers`, `mtls`, `microsegment` | Y | conditional |
|
|
190
|
+
|
|
191
|
+
## eBPF Security (`ebpf-security.ts`) — 2 tools
|
|
192
|
+
|
|
193
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
194
|
+
|-----------|-------------|---------|--------|------|
|
|
195
|
+
| `ebpf_list_programs` | List loaded eBPF programs and pinned maps | — | N | always |
|
|
196
|
+
| `ebpf_falco` | Falco runtime security | `status`, `deploy_rules`, `events` | Y | conditional |
|
|
197
|
+
|
|
198
|
+
## Application Hardening (`app-hardening.ts`) — 1 tool
|
|
199
|
+
|
|
200
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
201
|
+
|-----------|-------------|---------|--------|------|
|
|
202
|
+
| `app_harden` | Application hardening (audit, recommend, firewall, systemd) | `audit`, `recommend`, `firewall`, `systemd` | Y | conditional |
|
|
203
|
+
|
|
204
|
+
---
|
|
205
|
+
|
|
206
|
+
## Reporting (`reporting.ts`) — 1 tool
|
|
207
|
+
|
|
208
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
209
|
+
|-----------|-------------|---------|--------|------|
|
|
210
|
+
| `report_export` | Generate, list, or query consolidated security reports in multiple formats | `generate`, `list_reports`, `formats` | N | conditional |
|
|
211
|
+
|
|
212
|
+
### `report_export`
|
|
213
|
+
|
|
214
|
+
**Actions:**
|
|
215
|
+
- `generate` — Collect system audit data (firewall, services, connections, logins, compliance) and format as a consolidated security report
|
|
216
|
+
- `list_reports` — List previously saved reports in the report directory
|
|
217
|
+
- `formats` — Show available output formats, report types, and sections
|
|
218
|
+
|
|
219
|
+
**Parameters:**
|
|
220
|
+
- `action` (required) — Action to perform
|
|
221
|
+
- `report_type` — Report type: `executive_summary`, `technical_detail`, `compliance_evidence`, `vulnerability_report`, `hardening_status` (default: `technical_detail`)
|
|
222
|
+
- `format` — Output format: `markdown`, `html`, `json`, `csv` (default: `markdown`)
|
|
223
|
+
- `output_path` — File path to save the report
|
|
224
|
+
- `include_sections` — Specific sections to include (default: all)
|
|
225
|
+
- `since` — Only include findings since this date (ISO 8601)
|
|
226
|
+
|
|
227
|
+
**Example:**
|
|
228
|
+
```json
|
|
229
|
+
{ "action": "generate", "report_type": "executive_summary", "format": "html", "output_path": "/tmp/security-report.html" }
|
|
230
|
+
```
|
|
231
|
+
|
|
232
|
+
---
|
|
233
|
+
|
|
234
|
+
## DNS Security (`dns-security.ts`) — 1 tool
|
|
235
|
+
|
|
236
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
237
|
+
|-----------|-------------|---------|--------|------|
|
|
238
|
+
| `dns_security` | DNS security auditing, DNSSEC validation, tunneling detection, domain blocking, query log analysis | `audit_resolv`, `check_dnssec`, `detect_tunneling`, `block_domains`, `query_log_audit` | N | conditional |
|
|
239
|
+
|
|
240
|
+
### `dns_security`
|
|
241
|
+
|
|
242
|
+
**Actions:**
|
|
243
|
+
- `audit_resolv` — Audit /etc/resolv.conf and systemd-resolved configuration (DNS over TLS, DNSSEC)
|
|
244
|
+
- `check_dnssec` — Check DNSSEC validation for a domain using dig
|
|
245
|
+
- `detect_tunneling` — Capture and analyze DNS traffic for tunneling indicators (entropy analysis)
|
|
246
|
+
- `block_domains` — Add domains to /etc/hosts blocklist (0.0.0.0 sinkhole)
|
|
247
|
+
- `query_log_audit` — Analyze DNS query logs for suspicious activity (DGA, suspicious TLDs)
|
|
248
|
+
|
|
249
|
+
**Parameters:**
|
|
250
|
+
- `action` (required) — Action to perform
|
|
251
|
+
- `domain` — Domain to check (for `check_dnssec`)
|
|
252
|
+
- `interface` — Network interface for capture (for `detect_tunneling`, default: `any`)
|
|
253
|
+
- `duration` — Capture duration in seconds (for `detect_tunneling`, max 120)
|
|
254
|
+
- `blocklist_path` — Path to blocklist file (for `block_domains`)
|
|
255
|
+
- `domains_to_block` — Array of domains to block (for `block_domains`)
|
|
256
|
+
- `log_path` — Path to DNS query log (for `query_log_audit`)
|
|
257
|
+
- `threshold` — Entropy threshold for tunneling detection (default 3.5)
|
|
258
|
+
|
|
259
|
+
**Example:**
|
|
260
|
+
```json
|
|
261
|
+
{ "action": "check_dnssec", "domain": "example.com" }
|
|
262
|
+
```
|
|
263
|
+
|
|
264
|
+
---
|
|
265
|
+
|
|
266
|
+
## Vulnerability Management (`vulnerability-management.ts`) — 1 tool
|
|
267
|
+
|
|
268
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
269
|
+
|-----------|-------------|---------|--------|------|
|
|
270
|
+
| `vuln_manage` | Vulnerability scanning, tracking, prioritization, and remediation planning | `scan_system`, `scan_web`, `track`, `prioritize`, `remediation_plan` | N | conditional |
|
|
271
|
+
|
|
272
|
+
### `vuln_manage`
|
|
273
|
+
|
|
274
|
+
**Actions:**
|
|
275
|
+
- `scan_system` — Run nmap vulnerability scan with NSE scripts and searchsploit exploit lookup
|
|
276
|
+
- `scan_web` — Run nikto web vulnerability scan against a target URL
|
|
277
|
+
- `track` — Manage vulnerability tracker (add, update status, list)
|
|
278
|
+
- `prioritize` — Risk-based prioritization of open vulnerabilities with scoring
|
|
279
|
+
- `remediation_plan` — Generate a prioritized remediation plan (immediate/short/medium/long term)
|
|
280
|
+
|
|
281
|
+
**Parameters:**
|
|
282
|
+
- `action` (required) — Action to perform
|
|
283
|
+
- `target` — IP/hostname/URL to scan
|
|
284
|
+
- `port_range` — Port range for scanning (default: `1-1024`)
|
|
285
|
+
- `scan_type` — Scan type: `quick`, `full`, `stealth` (default: `quick`)
|
|
286
|
+
- `vuln_id` — Vulnerability ID for tracking
|
|
287
|
+
- `severity` — Severity level for new vulnerability
|
|
288
|
+
- `description` — Vulnerability description
|
|
289
|
+
- `status` — Vulnerability status: `open`, `mitigated`, `accepted`, `false_positive`
|
|
290
|
+
- `severity_filter` — Filter for prioritization (default: `all`)
|
|
291
|
+
- `output_format` — Output format: `text`, `json`
|
|
292
|
+
|
|
293
|
+
**Example:**
|
|
294
|
+
```json
|
|
295
|
+
{ "action": "scan_system", "target": "192.168.1.1", "scan_type": "quick" }
|
|
296
|
+
```
|
|
297
|
+
|
|
298
|
+
---
|
|
299
|
+
|
|
300
|
+
## Forensics (`incident-response.ts`) — 1 tool (extends incident-response module)
|
|
301
|
+
|
|
302
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
303
|
+
|-----------|-------------|---------|--------|------|
|
|
304
|
+
| `ir_forensics` | Digital forensics: memory dumps, disk imaging, network capture, evidence bagging, chain of custody | `memory_dump`, `disk_image`, `network_capture_forensic`, `evidence_bag`, `chain_of_custody` | N | always |
|
|
305
|
+
|
|
306
|
+
### `ir_forensics`
|
|
307
|
+
|
|
308
|
+
**Actions:**
|
|
309
|
+
- `memory_dump` — Acquire system memory using avml or /proc/kcore
|
|
310
|
+
- `disk_image` — Create forensic disk image with dd and SHA-256 verification
|
|
311
|
+
- `network_capture_forensic` — Forensic network capture with tcpdump
|
|
312
|
+
- `evidence_bag` — Package and hash evidence files for chain of custody
|
|
313
|
+
- `chain_of_custody` — View or export the chain of custody log
|
|
314
|
+
|
|
315
|
+
**Parameters:**
|
|
316
|
+
- `action` (required) — Action to perform
|
|
317
|
+
- `output_path` — Path to save forensic output
|
|
318
|
+
- `device` — Disk device for imaging (e.g., `/dev/sda1`)
|
|
319
|
+
- `interface` — Network interface for capture
|
|
320
|
+
- `duration` — Capture duration in seconds
|
|
321
|
+
|
|
322
|
+
**Example:**
|
|
323
|
+
```json
|
|
324
|
+
{ "action": "memory_dump", "output_path": "/evidence/memory.lime" }
|
|
325
|
+
```
|
|
326
|
+
|
|
327
|
+
---
|
|
328
|
+
|
|
329
|
+
## Process Security (`process-security.ts`) — 1 tool
|
|
330
|
+
|
|
331
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
332
|
+
|-----------|-------------|---------|--------|------|
|
|
333
|
+
| `process_security` | Process security analysis: audit running processes, check capabilities, inspect namespaces, detect anomalies, audit cgroup limits | `audit_running`, `check_capabilities`, `check_namespaces`, `detect_anomalies`, `cgroup_audit` | N | conditional |
|
|
334
|
+
|
|
335
|
+
### `process_security`
|
|
336
|
+
|
|
337
|
+
**Actions:**
|
|
338
|
+
- `audit_running` — Audit running processes for security concerns (root processes, high resource, unusual paths, deleted executables)
|
|
339
|
+
- `check_capabilities` — Inspect Linux capabilities on processes; detect dangerous capabilities
|
|
340
|
+
- `check_namespaces` — Inspect namespace isolation for a specific PID or list all namespaces via lsns
|
|
341
|
+
- `detect_anomalies` — Comprehensive anomaly detection (deleted binaries, unexpected connections, suspicious shells, sensitive file access)
|
|
342
|
+
- `cgroup_audit` — Audit cgroup resource limits and hierarchy
|
|
343
|
+
|
|
344
|
+
**Parameters:**
|
|
345
|
+
- `action` (required) — Action to perform
|
|
346
|
+
- `pid` — Specific process ID to inspect
|
|
347
|
+
- `filter` — Filter processes by name pattern (regex)
|
|
348
|
+
- `show_all` — Show all processes or only suspicious ones (default: false)
|
|
349
|
+
- `output_format` — Output format: `text`, `json`
|
|
350
|
+
|
|
351
|
+
**Example:**
|
|
352
|
+
```json
|
|
353
|
+
{ "action": "detect_anomalies" }
|
|
354
|
+
```
|
|
355
|
+
|
|
356
|
+
---
|
|
357
|
+
|
|
358
|
+
## WAF Management (`waf.ts`) — 1 tool
|
|
359
|
+
|
|
360
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
361
|
+
|-----------|-------------|---------|--------|------|
|
|
362
|
+
| `waf_manage` | Web Application Firewall management: audit ModSecurity, manage rules, configure rate limiting, deploy OWASP CRS, analyze blocked requests | `modsec_audit`, `modsec_rules`, `rate_limit_config`, `owasp_crs_deploy`, `blocked_requests` | N | conditional |
|
|
363
|
+
|
|
364
|
+
### `waf_manage`
|
|
365
|
+
|
|
366
|
+
**Actions:**
|
|
367
|
+
- `modsec_audit` — Audit ModSecurity WAF installation and configuration
|
|
368
|
+
- `modsec_rules` — Manage ModSecurity rules (list, enable, disable)
|
|
369
|
+
- `rate_limit_config` — Audit and recommend rate limiting configuration for nginx/Apache
|
|
370
|
+
- `owasp_crs_deploy` — Check OWASP Core Rule Set deployment status and integration
|
|
371
|
+
- `blocked_requests` — Analyze WAF audit logs for blocked requests, top IPs, attack categories
|
|
372
|
+
|
|
373
|
+
**Parameters:**
|
|
374
|
+
- `action` (required) — Action to perform
|
|
375
|
+
- `web_server` — Web server type: `nginx`, `apache` (default: `nginx`)
|
|
376
|
+
- `rule_id` — ModSecurity rule ID (for `modsec_rules`)
|
|
377
|
+
- `rule_action` — Rule action: `enable`, `disable`, `list` (default: `list`)
|
|
378
|
+
- `rate_limit` — Requests per second (for `rate_limit_config`)
|
|
379
|
+
- `rate_limit_zone` — Zone name for rate limiting
|
|
380
|
+
- `log_path` — Path to WAF log file (for `blocked_requests`)
|
|
381
|
+
- `output_format` — Output format: `text`, `json`
|
|
382
|
+
|
|
383
|
+
**Example:**
|
|
384
|
+
```json
|
|
385
|
+
{ "action": "modsec_audit", "web_server": "nginx" }
|
|
386
|
+
```
|
|
387
|
+
|
|
388
|
+
---
|
|
389
|
+
|
|
390
|
+
## Network Segmentation (`network-defense.ts`) — 1 tool (extends network-defense module)
|
|
391
|
+
|
|
392
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
393
|
+
|-----------|-------------|---------|--------|------|
|
|
394
|
+
| `network_segmentation_audit` | Network segmentation: map zones, verify isolation, test paths, audit VLANs | `map_zones`, `verify_isolation`, `test_paths`, `audit_vlans` | N | conditional |
|
|
395
|
+
|
|
396
|
+
### `network_segmentation_audit`
|
|
397
|
+
|
|
398
|
+
**Actions:**
|
|
399
|
+
- `map_zones` — Map network zones from interface and routing table analysis
|
|
400
|
+
- `verify_isolation` — Verify network isolation between zones using iptables rules
|
|
401
|
+
- `test_paths` — Test network paths between endpoints using traceroute/nmap
|
|
402
|
+
- `audit_vlans` — Audit VLAN configuration and bridge interfaces
|
|
403
|
+
|
|
404
|
+
**Parameters:**
|
|
405
|
+
- `action` (required) — Action to perform
|
|
406
|
+
- `source` — Source IP/subnet for path testing
|
|
407
|
+
- `destination` — Destination IP/subnet for path testing
|
|
408
|
+
- `output_format` — Output format: `text`, `json`
|
|
409
|
+
|
|
410
|
+
**Example:**
|
|
411
|
+
```json
|
|
412
|
+
{ "action": "map_zones" }
|
|
413
|
+
```
|
|
414
|
+
|
|
415
|
+
---
|
|
416
|
+
|
|
417
|
+
## Threat Intelligence (`threat-intel.ts`) — 1 tool
|
|
418
|
+
|
|
419
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
420
|
+
|-----------|-------------|---------|--------|------|
|
|
421
|
+
| `threat_intel` | Threat intelligence: check IPs, hashes, and domains against local feeds, manage feeds, apply blocklists | `check_ip`, `check_hash`, `check_domain`, `update_feeds`, `blocklist_apply` | N | conditional |
|
|
422
|
+
|
|
423
|
+
### `threat_intel`
|
|
424
|
+
|
|
425
|
+
**Actions:**
|
|
426
|
+
- `check_ip` — Check IP reputation against local feeds, fail2ban, iptables, and whois
|
|
427
|
+
- `check_hash` — Check file hash against local hash feeds and ClamAV databases
|
|
428
|
+
- `check_domain` — Check domain against local blocklists, /etc/hosts, and DNS resolution
|
|
429
|
+
- `update_feeds` — List available feeds or download new threat intelligence feeds
|
|
430
|
+
- `blocklist_apply` — Apply a blocklist file to iptables, fail2ban, or /etc/hosts
|
|
431
|
+
|
|
432
|
+
**Parameters:**
|
|
433
|
+
- `action` (required) — Action to perform
|
|
434
|
+
- `indicator` — IP address, file hash, or domain to check
|
|
435
|
+
- `feed_name` — Name of threat feed (for `update_feeds`)
|
|
436
|
+
- `feed_url` — URL of threat feed to download (for `update_feeds`)
|
|
437
|
+
- `blocklist_path` — Path to blocklist file (for `blocklist_apply`)
|
|
438
|
+
- `apply_to` — Target: `iptables`, `fail2ban`, `hosts` (default: `iptables`)
|
|
439
|
+
- `output_format` — Output format: `text`, `json`
|
|
440
|
+
|
|
441
|
+
**Example:**
|
|
442
|
+
```json
|
|
443
|
+
{ "action": "check_ip", "indicator": "203.0.113.50" }
|
|
444
|
+
```
|
|
445
|
+
|
|
446
|
+
---
|
|
447
|
+
|
|
448
|
+
## Auto-Remediation (`meta.ts`) — 1 tool (extends meta module)
|
|
449
|
+
|
|
450
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
451
|
+
|-----------|-------------|---------|--------|------|
|
|
452
|
+
| `auto_remediate` | Auto-remediation: plan fixes, apply remediations, rollback sessions, check status | `plan`, `apply`, `rollback_session`, `status` | Y | conditional |
|
|
453
|
+
|
|
454
|
+
### `auto_remediate`
|
|
455
|
+
|
|
456
|
+
**Actions:**
|
|
457
|
+
- `plan` — Analyze system and generate a remediation plan based on findings
|
|
458
|
+
- `apply` — Apply planned remediations (sysctl, iptables, sed-based config fixes)
|
|
459
|
+
- `rollback_session` — Rollback a previously applied remediation session
|
|
460
|
+
- `status` — Check current remediation session status
|
|
461
|
+
|
|
462
|
+
**Parameters:**
|
|
463
|
+
- `action` (required) — Action to perform
|
|
464
|
+
- `session_id` — Remediation session ID (for `rollback_session`)
|
|
465
|
+
- `dry_run` — Preview changes without applying (default: true)
|
|
466
|
+
|
|
467
|
+
**Example:**
|
|
468
|
+
```json
|
|
469
|
+
{ "action": "plan" }
|
|
470
|
+
```
|
|
471
|
+
|
|
472
|
+
---
|
|
473
|
+
|
|
474
|
+
## Cloud Security (`cloud-security.ts`) — 1 tool
|
|
475
|
+
|
|
476
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
477
|
+
|-----------|-------------|---------|--------|------|
|
|
478
|
+
| `cloud_security` | Cloud security: detect environment, audit metadata services, check IAM credentials, audit storage, test IMDS security | `detect_environment`, `audit_metadata`, `check_iam_creds`, `audit_storage`, `check_imds` | N | conditional |
|
|
479
|
+
|
|
480
|
+
### `cloud_security`
|
|
481
|
+
|
|
482
|
+
**Actions:**
|
|
483
|
+
- `detect_environment` — Detect cloud provider (AWS/GCP/Azure) from DMI, metadata, hypervisor UUID
|
|
484
|
+
- `audit_metadata` — Audit instance metadata service (IMDS) configuration and security
|
|
485
|
+
- `check_iam_creds` — Check for exposed cloud credentials in environment variables, files, and process environments
|
|
486
|
+
- `audit_storage` — Audit accessible cloud storage (S3, GCS, Azure) and mount points
|
|
487
|
+
- `check_imds` — Test IMDS security: v1/v2 accessibility, iptables rules, hop limit
|
|
488
|
+
|
|
489
|
+
**Parameters:**
|
|
490
|
+
- `action` (required) — Action to perform
|
|
491
|
+
- `provider` — Cloud provider: `aws`, `gcp`, `azure`, `auto` (default: `auto`)
|
|
492
|
+
- `output_format` — Output format: `text`, `json`
|
|
493
|
+
|
|
494
|
+
**Example:**
|
|
495
|
+
```json
|
|
496
|
+
{ "action": "detect_environment" }
|
|
497
|
+
```
|
|
498
|
+
|
|
499
|
+
---
|
|
500
|
+
|
|
501
|
+
## API Security (`api-security.ts`) — 1 tool
|
|
502
|
+
|
|
503
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
504
|
+
|-----------|-------------|---------|--------|------|
|
|
505
|
+
| `api_security` | API security: discover local APIs, audit authentication, check rate limiting, verify TLS, analyze CORS | `scan_local_apis`, `audit_auth`, `check_rate_limiting`, `tls_verify`, `cors_check` | N | conditional |
|
|
506
|
+
|
|
507
|
+
### `api_security`
|
|
508
|
+
|
|
509
|
+
**Actions:**
|
|
510
|
+
- `scan_local_apis` — Discover local API services on common ports, detect frameworks, find API documentation endpoints
|
|
511
|
+
- `audit_auth` — Audit API authentication enforcement: test with/without credentials, detect verbose errors
|
|
512
|
+
- `check_rate_limiting` — Send rapid requests to detect rate limiting headers and 429 responses
|
|
513
|
+
- `tls_verify` — Verify TLS certificate, check deprecated protocols (TLS 1.0/1.1), HSTS header
|
|
514
|
+
- `cors_check` — Analyze CORS policy: test origin reflection, wildcard origins, credential allowance
|
|
515
|
+
|
|
516
|
+
**Parameters:**
|
|
517
|
+
- `action` (required) — Action to perform
|
|
518
|
+
- `target` — URL or host:port to scan (default: `http://localhost`)
|
|
519
|
+
- `port_range` — Comma-separated ports for API discovery (default: `80,443,3000,4000,5000,8000,8080,8443,9000`)
|
|
520
|
+
- `output_format` — Output format: `text`, `json`
|
|
521
|
+
|
|
522
|
+
**Example:**
|
|
523
|
+
```json
|
|
524
|
+
{ "action": "cors_check", "target": "https://api.example.com" }
|
|
525
|
+
```
|
|
526
|
+
|
|
527
|
+
---
|
|
528
|
+
|
|
529
|
+
## Deception / Honeypots (`deception.ts`) — 1 tool
|
|
530
|
+
|
|
531
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
532
|
+
|-----------|-------------|---------|--------|------|
|
|
533
|
+
| `honeypot_manage` | Honeypot/deception: deploy canary tokens, set up honeyport listeners, check triggers, remove canaries, list deployed assets | `deploy_canary`, `deploy_honeyport`, `check_triggers`, `remove`, `list` | N | conditional |
|
|
534
|
+
|
|
535
|
+
### `honeypot_manage`
|
|
536
|
+
|
|
537
|
+
**Actions:**
|
|
538
|
+
- `deploy_canary` — Deploy canary token/tripwire (types: file, credential, directory, ssh_key) with inotifywait monitoring
|
|
539
|
+
- `deploy_honeyport` — Start a honeyport listener (ncat) with iptables LOG rules for intrusion detection
|
|
540
|
+
- `check_triggers` — Check all canaries for access (access time changes, inotify events, connection logs)
|
|
541
|
+
- `remove` — Remove a deployed canary by ID (delete files, kill listeners, remove iptables rules)
|
|
542
|
+
- `list` — List all canaries in the registry with status
|
|
543
|
+
|
|
544
|
+
**Parameters:**
|
|
545
|
+
- `action` (required) — Action to perform
|
|
546
|
+
- `canary_type` — Type of canary: `file`, `credential`, `directory`, `ssh_key` (for `deploy_canary`)
|
|
547
|
+
- `canary_path` — Path for canary deployment (for `deploy_canary`)
|
|
548
|
+
- `port` — Port for honeyport listener (for `deploy_honeyport`)
|
|
549
|
+
- `canary_id` — ID of canary to remove (for `remove`)
|
|
550
|
+
- `output_format` — Output format: `text`, `json`
|
|
551
|
+
|
|
552
|
+
**Example:**
|
|
553
|
+
```json
|
|
554
|
+
{ "action": "deploy_canary", "canary_type": "credential", "canary_path": "/opt/backup/.aws/credentials" }
|
|
555
|
+
```
|
|
556
|
+
|
|
557
|
+
---
|
|
558
|
+
|
|
559
|
+
## Wireless Security (`wireless-security.ts`) — 1 tool
|
|
560
|
+
|
|
561
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
562
|
+
|-----------|-------------|---------|--------|------|
|
|
563
|
+
| `wireless_security` | Wireless security: audit Bluetooth, assess WiFi, detect rogue APs with evil twin analysis, disable unused interfaces | `bt_audit`, `wifi_audit`, `rogue_ap_detect`, `disable_unused` | N | conditional |
|
|
564
|
+
|
|
565
|
+
### `wireless_security`
|
|
566
|
+
|
|
567
|
+
**Actions:**
|
|
568
|
+
- `bt_audit` — Audit Bluetooth adapter status, discoverability, paired devices, service state
|
|
569
|
+
- `wifi_audit` — Assess WiFi configuration: interfaces, active connections, security type, saved networks
|
|
570
|
+
- `rogue_ap_detect` — Scan for rogue access points: unknown APs, open networks, evil twin detection (Levenshtein + substitution)
|
|
571
|
+
- `disable_unused` — Disable unused wireless interfaces via rfkill/ip; check loaded kernel modules for blacklisting
|
|
572
|
+
|
|
573
|
+
**Parameters:**
|
|
574
|
+
- `action` (required) — Action to perform
|
|
575
|
+
- `interface` — Specific wireless interface to audit (e.g., `wlan0`)
|
|
576
|
+
- `output_format` — Output format: `text`, `json`
|
|
577
|
+
|
|
578
|
+
**Example:**
|
|
579
|
+
```json
|
|
580
|
+
{ "action": "rogue_ap_detect" }
|
|
581
|
+
```
|
|
582
|
+
|
|
583
|
+
---
|
|
584
|
+
|
|
585
|
+
## Certificate Lifecycle (`encryption.ts`) — 1 tool (extends encryption module)
|
|
586
|
+
|
|
587
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
588
|
+
|-----------|-------------|---------|--------|------|
|
|
589
|
+
| `certificate_lifecycle` | Certificate lifecycle: inventory, auto-renewal check, CA audit, OCSP check, CT log monitoring | `inventory`, `auto_renew_check`, `ca_audit`, `ocsp_check`, `ct_log_monitor` | N | conditional |
|
|
590
|
+
|
|
591
|
+
### `certificate_lifecycle`
|
|
592
|
+
|
|
593
|
+
**Actions:**
|
|
594
|
+
- `inventory` — Scan for certificates across the filesystem using find + openssl
|
|
595
|
+
- `auto_renew_check` — Check certbot auto-renewal configuration and certificate expiry
|
|
596
|
+
- `ca_audit` — Audit trusted CA certificates in the system trust store
|
|
597
|
+
- `ocsp_check` — Check OCSP responder status for a certificate
|
|
598
|
+
- `ct_log_monitor` — Monitor Certificate Transparency logs for a domain
|
|
599
|
+
|
|
600
|
+
**Parameters:**
|
|
601
|
+
- `action` (required) — Action to perform
|
|
602
|
+
- `domain` — Domain for CT log monitoring or OCSP check
|
|
603
|
+
- `cert_path` — Path to certificate file
|
|
604
|
+
- `output_format` — Output format: `text`, `json`
|
|
605
|
+
|
|
606
|
+
**Example:**
|
|
607
|
+
```json
|
|
608
|
+
{ "action": "inventory" }
|
|
609
|
+
```
|
|
610
|
+
|
|
611
|
+
---
|
|
612
|
+
|
|
613
|
+
## SIEM Integration (`siem-integration.ts`) — 1 tool
|
|
614
|
+
|
|
615
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
616
|
+
|-----------|-------------|---------|--------|------|
|
|
617
|
+
| `siem_export` | SIEM integration: configure syslog forwarding, audit Filebeat, comprehensive log forwarding audit, test connectivity | `configure_syslog_forward`, `configure_filebeat`, `audit_forwarding`, `test_connectivity` | N | conditional |
|
|
618
|
+
|
|
619
|
+
### `siem_export`
|
|
620
|
+
|
|
621
|
+
**Actions:**
|
|
622
|
+
- `configure_syslog_forward` — Audit/configure rsyslog remote forwarding (TCP/UDP/TLS), check existing rules and TLS support
|
|
623
|
+
- `configure_filebeat` — Audit Filebeat installation, modules, service status, and output configuration
|
|
624
|
+
- `audit_forwarding` — Comprehensive log forwarding audit with CIS benchmark compliance check
|
|
625
|
+
- `test_connectivity` — Test SIEM endpoint connectivity: DNS resolution, TCP, TLS, firewall rules, test syslog message
|
|
626
|
+
|
|
627
|
+
**Parameters:**
|
|
628
|
+
- `action` (required) — Action to perform
|
|
629
|
+
- `siem_host` — SIEM server hostname or IP address
|
|
630
|
+
- `siem_port` — SIEM server port (default: 514 for syslog, 5044 for filebeat)
|
|
631
|
+
- `protocol` — Transport protocol: `tcp`, `udp`, `tls` (default: `tcp`)
|
|
632
|
+
- `log_sources` — Log sources to forward (e.g., `auth`, `syslog`, `kern`, `audit`)
|
|
633
|
+
- `output_format` — Output format: `text`, `json`
|
|
634
|
+
|
|
635
|
+
**Example:**
|
|
636
|
+
```json
|
|
637
|
+
{ "action": "test_connectivity", "siem_host": "siem.example.com", "siem_port": 514 }
|
|
638
|
+
```
|
|
639
|
+
|
|
640
|
+
---
|
|
641
|
+
|
|
642
|
+
## USB Device Control (`hardening.ts`) — 1 tool (extends hardening module)
|
|
643
|
+
|
|
644
|
+
| Tool Name | Description | Actions | dryRun | Sudo |
|
|
645
|
+
|-----------|-------------|---------|--------|------|
|
|
646
|
+
| `usb_device_control` | USB device control: audit devices, block storage, whitelist, monitor | `audit_devices`, `block_storage`, `whitelist`, `monitor` | Y | conditional |
|
|
647
|
+
|
|
648
|
+
### `usb_device_control`
|
|
649
|
+
|
|
650
|
+
**Actions:**
|
|
651
|
+
- `audit_devices` — Audit connected USB devices using lsusb and lsblk
|
|
652
|
+
- `block_storage` — Block USB mass storage via kernel module blacklisting (modprobe)
|
|
653
|
+
- `whitelist` — Manage USB device whitelist via udev rules
|
|
654
|
+
- `monitor` — Monitor USB device events via udevadm
|
|
655
|
+
|
|
656
|
+
**Parameters:**
|
|
657
|
+
- `action` (required) — Action to perform
|
|
658
|
+
- `device_id` — USB device vendor:product ID for whitelisting
|
|
659
|
+
- `dry_run` — Preview changes without applying (default: true)
|
|
660
|
+
- `output_format` — Output format: `text`, `json`
|
|
661
|
+
|
|
662
|
+
**Example:**
|
|
663
|
+
```json
|
|
664
|
+
{ "action": "audit_devices" }
|
|
665
|
+
```
|