defense-mcp-server 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (186) hide show
  1. package/CHANGELOG.md +471 -0
  2. package/LICENSE +21 -0
  3. package/README.md +242 -0
  4. package/build/core/auto-installer.d.ts +102 -0
  5. package/build/core/auto-installer.d.ts.map +1 -0
  6. package/build/core/auto-installer.js +833 -0
  7. package/build/core/backup-manager.d.ts +63 -0
  8. package/build/core/backup-manager.d.ts.map +1 -0
  9. package/build/core/backup-manager.js +189 -0
  10. package/build/core/changelog.d.ts +75 -0
  11. package/build/core/changelog.d.ts.map +1 -0
  12. package/build/core/changelog.js +123 -0
  13. package/build/core/command-allowlist.d.ts +129 -0
  14. package/build/core/command-allowlist.d.ts.map +1 -0
  15. package/build/core/command-allowlist.js +849 -0
  16. package/build/core/config.d.ts +79 -0
  17. package/build/core/config.d.ts.map +1 -0
  18. package/build/core/config.js +193 -0
  19. package/build/core/dependency-validator.d.ts +106 -0
  20. package/build/core/dependency-validator.d.ts.map +1 -0
  21. package/build/core/dependency-validator.js +405 -0
  22. package/build/core/distro-adapter.d.ts +177 -0
  23. package/build/core/distro-adapter.d.ts.map +1 -0
  24. package/build/core/distro-adapter.js +481 -0
  25. package/build/core/distro.d.ts +68 -0
  26. package/build/core/distro.d.ts.map +1 -0
  27. package/build/core/distro.js +457 -0
  28. package/build/core/encrypted-state.d.ts +76 -0
  29. package/build/core/encrypted-state.d.ts.map +1 -0
  30. package/build/core/encrypted-state.js +209 -0
  31. package/build/core/executor.d.ts +56 -0
  32. package/build/core/executor.d.ts.map +1 -0
  33. package/build/core/executor.js +350 -0
  34. package/build/core/installer.d.ts +92 -0
  35. package/build/core/installer.d.ts.map +1 -0
  36. package/build/core/installer.js +1072 -0
  37. package/build/core/logger.d.ts +102 -0
  38. package/build/core/logger.d.ts.map +1 -0
  39. package/build/core/logger.js +132 -0
  40. package/build/core/parsers.d.ts +151 -0
  41. package/build/core/parsers.d.ts.map +1 -0
  42. package/build/core/parsers.js +479 -0
  43. package/build/core/policy-engine.d.ts +170 -0
  44. package/build/core/policy-engine.d.ts.map +1 -0
  45. package/build/core/policy-engine.js +656 -0
  46. package/build/core/preflight.d.ts +157 -0
  47. package/build/core/preflight.d.ts.map +1 -0
  48. package/build/core/preflight.js +638 -0
  49. package/build/core/privilege-manager.d.ts +108 -0
  50. package/build/core/privilege-manager.d.ts.map +1 -0
  51. package/build/core/privilege-manager.js +363 -0
  52. package/build/core/rate-limiter.d.ts +67 -0
  53. package/build/core/rate-limiter.d.ts.map +1 -0
  54. package/build/core/rate-limiter.js +129 -0
  55. package/build/core/rollback.d.ts +73 -0
  56. package/build/core/rollback.d.ts.map +1 -0
  57. package/build/core/rollback.js +278 -0
  58. package/build/core/safeguards.d.ts +58 -0
  59. package/build/core/safeguards.d.ts.map +1 -0
  60. package/build/core/safeguards.js +448 -0
  61. package/build/core/sanitizer.d.ts +118 -0
  62. package/build/core/sanitizer.d.ts.map +1 -0
  63. package/build/core/sanitizer.js +459 -0
  64. package/build/core/secure-fs.d.ts +67 -0
  65. package/build/core/secure-fs.d.ts.map +1 -0
  66. package/build/core/secure-fs.js +143 -0
  67. package/build/core/spawn-safe.d.ts +55 -0
  68. package/build/core/spawn-safe.d.ts.map +1 -0
  69. package/build/core/spawn-safe.js +146 -0
  70. package/build/core/sudo-guard.d.ts +145 -0
  71. package/build/core/sudo-guard.d.ts.map +1 -0
  72. package/build/core/sudo-guard.js +349 -0
  73. package/build/core/sudo-session.d.ts +100 -0
  74. package/build/core/sudo-session.d.ts.map +1 -0
  75. package/build/core/sudo-session.js +319 -0
  76. package/build/core/tool-dependencies.d.ts +61 -0
  77. package/build/core/tool-dependencies.d.ts.map +1 -0
  78. package/build/core/tool-dependencies.js +571 -0
  79. package/build/core/tool-registry.d.ts +111 -0
  80. package/build/core/tool-registry.d.ts.map +1 -0
  81. package/build/core/tool-registry.js +656 -0
  82. package/build/core/tool-wrapper.d.ts +73 -0
  83. package/build/core/tool-wrapper.d.ts.map +1 -0
  84. package/build/core/tool-wrapper.js +296 -0
  85. package/build/index.d.ts +3 -0
  86. package/build/index.d.ts.map +1 -0
  87. package/build/index.js +247 -0
  88. package/build/tools/access-control.d.ts +9 -0
  89. package/build/tools/access-control.d.ts.map +1 -0
  90. package/build/tools/access-control.js +1818 -0
  91. package/build/tools/api-security.d.ts +12 -0
  92. package/build/tools/api-security.d.ts.map +1 -0
  93. package/build/tools/api-security.js +901 -0
  94. package/build/tools/app-hardening.d.ts +11 -0
  95. package/build/tools/app-hardening.d.ts.map +1 -0
  96. package/build/tools/app-hardening.js +768 -0
  97. package/build/tools/backup.d.ts +8 -0
  98. package/build/tools/backup.d.ts.map +1 -0
  99. package/build/tools/backup.js +381 -0
  100. package/build/tools/cloud-security.d.ts +17 -0
  101. package/build/tools/cloud-security.d.ts.map +1 -0
  102. package/build/tools/cloud-security.js +739 -0
  103. package/build/tools/compliance.d.ts +10 -0
  104. package/build/tools/compliance.d.ts.map +1 -0
  105. package/build/tools/compliance.js +1225 -0
  106. package/build/tools/container-security.d.ts +14 -0
  107. package/build/tools/container-security.d.ts.map +1 -0
  108. package/build/tools/container-security.js +788 -0
  109. package/build/tools/deception.d.ts +13 -0
  110. package/build/tools/deception.d.ts.map +1 -0
  111. package/build/tools/deception.js +763 -0
  112. package/build/tools/dns-security.d.ts +93 -0
  113. package/build/tools/dns-security.d.ts.map +1 -0
  114. package/build/tools/dns-security.js +745 -0
  115. package/build/tools/drift-detection.d.ts +8 -0
  116. package/build/tools/drift-detection.d.ts.map +1 -0
  117. package/build/tools/drift-detection.js +326 -0
  118. package/build/tools/ebpf-security.d.ts +15 -0
  119. package/build/tools/ebpf-security.d.ts.map +1 -0
  120. package/build/tools/ebpf-security.js +294 -0
  121. package/build/tools/encryption.d.ts +9 -0
  122. package/build/tools/encryption.d.ts.map +1 -0
  123. package/build/tools/encryption.js +1667 -0
  124. package/build/tools/firewall.d.ts +9 -0
  125. package/build/tools/firewall.d.ts.map +1 -0
  126. package/build/tools/firewall.js +1398 -0
  127. package/build/tools/hardening.d.ts +10 -0
  128. package/build/tools/hardening.d.ts.map +1 -0
  129. package/build/tools/hardening.js +2654 -0
  130. package/build/tools/ids.d.ts +9 -0
  131. package/build/tools/ids.d.ts.map +1 -0
  132. package/build/tools/ids.js +624 -0
  133. package/build/tools/incident-response.d.ts +10 -0
  134. package/build/tools/incident-response.d.ts.map +1 -0
  135. package/build/tools/incident-response.js +1180 -0
  136. package/build/tools/logging.d.ts +12 -0
  137. package/build/tools/logging.d.ts.map +1 -0
  138. package/build/tools/logging.js +454 -0
  139. package/build/tools/malware.d.ts +10 -0
  140. package/build/tools/malware.d.ts.map +1 -0
  141. package/build/tools/malware.js +532 -0
  142. package/build/tools/meta.d.ts +11 -0
  143. package/build/tools/meta.d.ts.map +1 -0
  144. package/build/tools/meta.js +2278 -0
  145. package/build/tools/network-defense.d.ts +12 -0
  146. package/build/tools/network-defense.d.ts.map +1 -0
  147. package/build/tools/network-defense.js +760 -0
  148. package/build/tools/patch-management.d.ts +3 -0
  149. package/build/tools/patch-management.d.ts.map +1 -0
  150. package/build/tools/patch-management.js +708 -0
  151. package/build/tools/process-security.d.ts +12 -0
  152. package/build/tools/process-security.d.ts.map +1 -0
  153. package/build/tools/process-security.js +784 -0
  154. package/build/tools/reporting.d.ts +11 -0
  155. package/build/tools/reporting.d.ts.map +1 -0
  156. package/build/tools/reporting.js +559 -0
  157. package/build/tools/secrets.d.ts +9 -0
  158. package/build/tools/secrets.d.ts.map +1 -0
  159. package/build/tools/secrets.js +596 -0
  160. package/build/tools/siem-integration.d.ts +18 -0
  161. package/build/tools/siem-integration.d.ts.map +1 -0
  162. package/build/tools/siem-integration.js +754 -0
  163. package/build/tools/sudo-management.d.ts +18 -0
  164. package/build/tools/sudo-management.d.ts.map +1 -0
  165. package/build/tools/sudo-management.js +737 -0
  166. package/build/tools/supply-chain-security.d.ts +8 -0
  167. package/build/tools/supply-chain-security.d.ts.map +1 -0
  168. package/build/tools/supply-chain-security.js +256 -0
  169. package/build/tools/threat-intel.d.ts +22 -0
  170. package/build/tools/threat-intel.d.ts.map +1 -0
  171. package/build/tools/threat-intel.js +749 -0
  172. package/build/tools/vulnerability-management.d.ts +11 -0
  173. package/build/tools/vulnerability-management.d.ts.map +1 -0
  174. package/build/tools/vulnerability-management.js +667 -0
  175. package/build/tools/waf.d.ts +12 -0
  176. package/build/tools/waf.d.ts.map +1 -0
  177. package/build/tools/waf.js +843 -0
  178. package/build/tools/wireless-security.d.ts +19 -0
  179. package/build/tools/wireless-security.d.ts.map +1 -0
  180. package/build/tools/wireless-security.js +826 -0
  181. package/build/tools/zero-trust-network.d.ts +8 -0
  182. package/build/tools/zero-trust-network.d.ts.map +1 -0
  183. package/build/tools/zero-trust-network.js +367 -0
  184. package/docs/SAFEGUARDS.md +518 -0
  185. package/docs/TOOLS-REFERENCE.md +665 -0
  186. package/package.json +87 -0
@@ -0,0 +1,665 @@
1
+ # Tools Reference
2
+
3
+ Complete reference for all 94 tools registered in the defense-mcp-server v0.6.0. The server registers 32 tool modules providing 94 defensive security tools.
4
+
5
+ > **Action-based tools**: Each consolidated tool accepts an `action` parameter to select sub-operations, keeping MCP tool registration overhead low while preserving all functionality.
6
+
7
+ ---
8
+
9
+ ## Legend
10
+
11
+ | Column | Meaning |
12
+ |--------|---------|
13
+ | Tool Name | MCP tool name as registered (use this in `tool` calls) |
14
+ | Description | What the tool does |
15
+ | Actions | Available `action` parameter values |
16
+ | dryRun | Y = supports `dry_run` parameter; N = read-only or not applicable |
17
+ | Sudo | never / conditional / always |
18
+
19
+ ---
20
+
21
+ ## Firewall (`firewall.ts`) — 5 tools
22
+
23
+ | Tool Name | Description | Actions | dryRun | Sudo |
24
+ |-----------|-------------|---------|--------|------|
25
+ | `firewall_iptables` | Manage iptables rules and chains | `list`, `add`, `delete`, `set_policy`, `create_chain` | Y | conditional |
26
+ | `firewall_ufw` | Manage UFW (Uncomplicated Firewall) | `status`, `add`, `delete` | Y | conditional |
27
+ | `firewall_persist` | Manage firewall rule persistence | `save`, `restore`, `enable`, `status` | Y | always |
28
+ | `firewall_nftables_list` | List nftables ruleset | — | N | always |
29
+ | `firewall_policy_audit` | Audit firewall configuration for security issues | — | N | conditional |
30
+
31
+ ## Hardening (`hardening.ts`) — 8 tools
32
+
33
+ | Tool Name | Description | Actions | dryRun | Sudo |
34
+ |-----------|-------------|---------|--------|------|
35
+ | `harden_sysctl` | Manage sysctl kernel parameters | `get`, `set`, `audit` | Y | conditional |
36
+ | `harden_service` | Manage and audit systemd services | `manage`, `audit` | Y | conditional |
37
+ | `harden_permissions` | Manage file permissions | `check`, `fix`, `audit` | Y | conditional |
38
+ | `harden_systemd` | Audit or apply systemd service security hardening | `audit`, `apply` | Y | conditional |
39
+ | `harden_kernel` | Kernel security hardening | `audit`, `modules`, `coredump` | Y | conditional |
40
+ | `harden_bootloader` | Bootloader security | `audit`, `configure` | Y | conditional |
41
+ | `harden_misc` | Miscellaneous hardening (cron, umask, banners) | `cron_audit`, `umask_audit`, `umask_set`, `banner_audit`, `banner_set` | Y | conditional |
42
+ | `harden_memory` | Memory and exploit mitigations | `audit`, `enforce_aslr`, `report` | Y | conditional |
43
+
44
+ ## IDS (`ids.ts`) — 3 tools
45
+
46
+ | Tool Name | Description | Actions | dryRun | Sudo |
47
+ |-----------|-------------|---------|--------|------|
48
+ | `ids_aide_manage` | Manage AIDE file integrity database | `init`, `check`, `update`, `compare` | Y | always |
49
+ | `ids_rootkit_scan` | Rootkit detection (rkhunter, chkrootkit, or combined) | `rkhunter`, `chkrootkit`, `all` | N | always |
50
+ | `ids_file_integrity_check` | Quick SHA-256 file integrity check | — | N | conditional |
51
+
52
+ ## Logging (`logging.ts`) — 4 tools
53
+
54
+ | Tool Name | Description | Actions | dryRun | Sudo |
55
+ |-----------|-------------|---------|--------|------|
56
+ | `log_auditd` | Auditd management (rules, search, reports, CIS rules) | `rules`, `search`, `report`, `cis_rules` | Y | always |
57
+ | `log_journalctl_query` | Query systemd journal for log entries | — | N | conditional |
58
+ | `log_fail2ban` | Fail2ban management | `status`, `ban`, `unban`, `reload`, `audit` | Y | conditional |
59
+ | `log_system` | System log analysis and log rotation audit | `analyze`, `rotation_audit` | N | conditional |
60
+
61
+ ## Network Defense (`network-defense.ts`) — 3 tools
62
+
63
+ | Tool Name | Description | Actions | dryRun | Sudo |
64
+ |-----------|-------------|---------|--------|------|
65
+ | `netdef_connections` | List active connections or audit listening ports | `list`, `audit` | N | conditional |
66
+ | `netdef_capture` | Network capture (tcpdump, DNS, ARP monitoring) | `custom`, `dns`, `arp` | Y | always |
67
+ | `netdef_security_audit` | Network security audit (scan detect, IPv6, self-scan) | `scan_detect`, `ipv6`, `self_scan` | N | conditional |
68
+
69
+ ## Compliance (`compliance.ts`) — 7 tools
70
+
71
+ | Tool Name | Description | Actions | dryRun | Sudo |
72
+ |-----------|-------------|---------|--------|------|
73
+ | `compliance_lynis_audit` | Run Lynis security audit | — | N | always |
74
+ | `compliance_oscap_scan` | Run OpenSCAP compliance scan | — | N | always |
75
+ | `compliance_check` | Run compliance checks (CIS or framework) | `cis`, `framework` | N | conditional |
76
+ | `compliance_policy_evaluate` | Evaluate a compliance policy set | — | N | never |
77
+ | `compliance_report` | Generate comprehensive compliance summary report | — | N | conditional |
78
+ | `compliance_cron_restrict` | Restrict cron/at access (CIS 5.1.8/5.1.9) | `create_allow_files`, `status` | Y | always |
79
+ | `compliance_tmp_hardening` | Harden /tmp mount options (CIS 1.1.4) | `audit`, `apply` | Y | always |
80
+
81
+ ## Malware (`malware.ts`) — 4 tools
82
+
83
+ | Tool Name | Description | Actions | dryRun | Sudo |
84
+ |-----------|-------------|---------|--------|------|
85
+ | `malware_clamav` | ClamAV antivirus (scan or update definitions) | `scan`, `update` | Y | conditional |
86
+ | `malware_yara_scan` | Scan files with YARA rules | — | N | never |
87
+ | `malware_file_scan` | File scanning (suspicious files or web shells) | `suspicious`, `webshell` | N | conditional |
88
+ | `malware_quarantine_manage` | Manage quarantined files | `list`, `restore`, `delete`, `info` | Y | never |
89
+
90
+ ## Backup (`backup.ts`) — 1 tool
91
+
92
+ | Tool Name | Description | Actions | dryRun | Sudo |
93
+ |-----------|-------------|---------|--------|------|
94
+ | `backup` | Backup management (config, state, restore, verify, list) | `config`, `state`, `restore`, `verify`, `list` | Y | conditional |
95
+
96
+ ## Access Control (`access-control.ts`) — 6 tools
97
+
98
+ | Tool Name | Description | Actions | dryRun | Sudo |
99
+ |-----------|-------------|---------|--------|------|
100
+ | `access_ssh` | SSH server security (audit, harden, cipher audit) | `audit`, `harden`, `cipher_audit` | Y | conditional |
101
+ | `access_sudo_audit` | Audit sudoers configuration | — | N | conditional |
102
+ | `access_user_audit` | Audit user accounts for security issues | — | N | conditional |
103
+ | `access_password_policy` | Audit or set system password policy | `audit`, `set` | Y | conditional |
104
+ | `access_pam` | PAM configuration security | `audit`, `configure` | Y | conditional |
105
+ | `access_restrict_shell` | Restrict a user's login shell | — | Y | always |
106
+
107
+ ## Encryption (`encryption.ts`) — 4 tools
108
+
109
+ | Tool Name | Description | Actions | dryRun | Sudo |
110
+ |-----------|-------------|---------|--------|------|
111
+ | `crypto_tls` | TLS/SSL security (remote audit, cert expiry, config audit) | `remote_audit`, `cert_expiry`, `config_audit` | N | conditional |
112
+ | `crypto_gpg_keys` | Manage GPG keys | `list`, `generate`, `export`, `import`, `verify` | N | never |
113
+ | `crypto_luks_manage` | Manage LUKS encrypted volumes | `status`, `dump`, `open`, `close`, `list` | Y | always |
114
+ | `crypto_file_hash` | Calculate cryptographic hashes of files | — | N | never |
115
+
116
+ ## Container Security (`container-security.ts`) — 6 tools
117
+
118
+ | Tool Name | Description | Actions | dryRun | Sudo |
119
+ |-----------|-------------|---------|--------|------|
120
+ | `container_docker` | Docker security (audit, bench, seccomp, daemon) | `audit`, `bench`, `seccomp`, `daemon` | Y | conditional |
121
+ | `container_apparmor` | AppArmor management | `status`, `list`, `enforce`, `complain`, `disable`, `install`, `apply_container` | Y | conditional |
122
+ | `container_selinux_manage` | SELinux management | `status`, `getenforce`, `setenforce`, `booleans`, `audit` | Y | always |
123
+ | `container_namespace_check` | Check namespace isolation | — | N | conditional |
124
+ | `container_image_scan` | Scan container images for vulnerabilities | — | N | never |
125
+ | `container_security_config` | Container security configuration (seccomp, rootless) | `seccomp_profile`, `rootless` | Y | conditional |
126
+
127
+ ## Patch Management (`patch-management.ts`) — 5 tools
128
+
129
+ | Tool Name | Description | Actions | dryRun | Sudo |
130
+ |-----------|-------------|---------|--------|------|
131
+ | `patch_update_audit` | Audit pending security updates | — | N | always |
132
+ | `patch_unattended_audit` | Audit unattended-upgrades configuration | — | N | always |
133
+ | `patch_integrity_check` | Verify installed package integrity | — | N | always |
134
+ | `patch_kernel_audit` | Audit kernel version and update status | — | N | always |
135
+ | `patch_vulnerability_intel` | Vulnerability intelligence (CVE lookup, scan, urgency) | `lookup`, `scan`, `urgency` | N | never |
136
+
137
+ ## Secrets (`secrets.ts`) — 4 tools
138
+
139
+ | Tool Name | Description | Actions | dryRun | Sudo |
140
+ |-----------|-------------|---------|--------|------|
141
+ | `secrets_scan` | Scan filesystem for hardcoded secrets | — | N | never |
142
+ | `secrets_env_audit` | Audit environment variable security and .env exposure | — | N | never |
143
+ | `secrets_ssh_key_sprawl` | Detect SSH key sprawl | — | N | never |
144
+ | `secrets_git_history_scan` | Scan git repository history for leaked secrets | — | N | never |
145
+
146
+ ## Incident Response (`incident-response.ts`) — 1 tool
147
+
148
+ | Tool Name | Description | Actions | dryRun | Sudo |
149
+ |-----------|-------------|---------|--------|------|
150
+ | `incident_response` | Incident response (volatile data, IOC scan, timeline) | `collect`, `ioc_scan`, `timeline` | Y | conditional |
151
+
152
+ ## Meta (`meta.ts`) — 5 tools
153
+
154
+ | Tool Name | Description | Actions | dryRun | Sudo |
155
+ |-----------|-------------|---------|--------|------|
156
+ | `defense_check_tools` | Check availability of defensive security tools | — | N | conditional |
157
+ | `defense_workflow` | Defense workflows (suggest or run) | `suggest`, `run` | Y | conditional |
158
+ | `defense_change_history` | View audit trail of defensive changes | — | N | never |
159
+ | `defense_security_posture` | Security posture (score, trend, dashboard) | `score`, `trend`, `dashboard` | N | conditional |
160
+ | `defense_scheduled_audit` | Scheduled security audits | `create`, `list`, `remove`, `history` | Y | conditional |
161
+
162
+ ## Sudo Management (`sudo-management.ts`) — 6 tools
163
+
164
+ | Tool Name | Description | Actions | dryRun | Sudo |
165
+ |-----------|-------------|---------|--------|------|
166
+ | `sudo_elevate` | Elevate privileges by providing sudo password | — | N | never |
167
+ | `sudo_elevate_gui` | Secure GUI-based elevation (password never visible to AI) | — | N | never |
168
+ | `sudo_status` | Check current sudo session status | — | N | never |
169
+ | `sudo_drop` | Drop elevated privileges and zero password buffer | — | N | never |
170
+ | `sudo_extend` | Extend sudo session timeout | — | N | never |
171
+ | `preflight_batch_check` | Pre-check multiple tools for requirements | — | N | never |
172
+
173
+ ## Supply Chain Security (`supply-chain-security.ts`) — 1 tool
174
+
175
+ | Tool Name | Description | Actions | dryRun | Sudo |
176
+ |-----------|-------------|---------|--------|------|
177
+ | `supply_chain` | Supply chain security (SBOM, signing, SLSA verification) | `sbom`, `sign`, `verify_slsa` | Y | conditional |
178
+
179
+ ## Drift Detection (`drift-detection.ts`) — 1 tool
180
+
181
+ | Tool Name | Description | Actions | dryRun | Sudo |
182
+ |-----------|-------------|---------|--------|------|
183
+ | `drift_baseline` | Drift detection (create, compare, list baselines) | `create`, `compare`, `list` | N | never |
184
+
185
+ ## Zero-Trust Network (`zero-trust-network.ts`) — 1 tool
186
+
187
+ | Tool Name | Description | Actions | dryRun | Sudo |
188
+ |-----------|-------------|---------|--------|------|
189
+ | `zero_trust` | Zero-trust networking (WireGuard, mTLS, microsegmentation) | `wireguard`, `wg_peers`, `mtls`, `microsegment` | Y | conditional |
190
+
191
+ ## eBPF Security (`ebpf-security.ts`) — 2 tools
192
+
193
+ | Tool Name | Description | Actions | dryRun | Sudo |
194
+ |-----------|-------------|---------|--------|------|
195
+ | `ebpf_list_programs` | List loaded eBPF programs and pinned maps | — | N | always |
196
+ | `ebpf_falco` | Falco runtime security | `status`, `deploy_rules`, `events` | Y | conditional |
197
+
198
+ ## Application Hardening (`app-hardening.ts`) — 1 tool
199
+
200
+ | Tool Name | Description | Actions | dryRun | Sudo |
201
+ |-----------|-------------|---------|--------|------|
202
+ | `app_harden` | Application hardening (audit, recommend, firewall, systemd) | `audit`, `recommend`, `firewall`, `systemd` | Y | conditional |
203
+
204
+ ---
205
+
206
+ ## Reporting (`reporting.ts`) — 1 tool
207
+
208
+ | Tool Name | Description | Actions | dryRun | Sudo |
209
+ |-----------|-------------|---------|--------|------|
210
+ | `report_export` | Generate, list, or query consolidated security reports in multiple formats | `generate`, `list_reports`, `formats` | N | conditional |
211
+
212
+ ### `report_export`
213
+
214
+ **Actions:**
215
+ - `generate` — Collect system audit data (firewall, services, connections, logins, compliance) and format as a consolidated security report
216
+ - `list_reports` — List previously saved reports in the report directory
217
+ - `formats` — Show available output formats, report types, and sections
218
+
219
+ **Parameters:**
220
+ - `action` (required) — Action to perform
221
+ - `report_type` — Report type: `executive_summary`, `technical_detail`, `compliance_evidence`, `vulnerability_report`, `hardening_status` (default: `technical_detail`)
222
+ - `format` — Output format: `markdown`, `html`, `json`, `csv` (default: `markdown`)
223
+ - `output_path` — File path to save the report
224
+ - `include_sections` — Specific sections to include (default: all)
225
+ - `since` — Only include findings since this date (ISO 8601)
226
+
227
+ **Example:**
228
+ ```json
229
+ { "action": "generate", "report_type": "executive_summary", "format": "html", "output_path": "/tmp/security-report.html" }
230
+ ```
231
+
232
+ ---
233
+
234
+ ## DNS Security (`dns-security.ts`) — 1 tool
235
+
236
+ | Tool Name | Description | Actions | dryRun | Sudo |
237
+ |-----------|-------------|---------|--------|------|
238
+ | `dns_security` | DNS security auditing, DNSSEC validation, tunneling detection, domain blocking, query log analysis | `audit_resolv`, `check_dnssec`, `detect_tunneling`, `block_domains`, `query_log_audit` | N | conditional |
239
+
240
+ ### `dns_security`
241
+
242
+ **Actions:**
243
+ - `audit_resolv` — Audit /etc/resolv.conf and systemd-resolved configuration (DNS over TLS, DNSSEC)
244
+ - `check_dnssec` — Check DNSSEC validation for a domain using dig
245
+ - `detect_tunneling` — Capture and analyze DNS traffic for tunneling indicators (entropy analysis)
246
+ - `block_domains` — Add domains to /etc/hosts blocklist (0.0.0.0 sinkhole)
247
+ - `query_log_audit` — Analyze DNS query logs for suspicious activity (DGA, suspicious TLDs)
248
+
249
+ **Parameters:**
250
+ - `action` (required) — Action to perform
251
+ - `domain` — Domain to check (for `check_dnssec`)
252
+ - `interface` — Network interface for capture (for `detect_tunneling`, default: `any`)
253
+ - `duration` — Capture duration in seconds (for `detect_tunneling`, max 120)
254
+ - `blocklist_path` — Path to blocklist file (for `block_domains`)
255
+ - `domains_to_block` — Array of domains to block (for `block_domains`)
256
+ - `log_path` — Path to DNS query log (for `query_log_audit`)
257
+ - `threshold` — Entropy threshold for tunneling detection (default 3.5)
258
+
259
+ **Example:**
260
+ ```json
261
+ { "action": "check_dnssec", "domain": "example.com" }
262
+ ```
263
+
264
+ ---
265
+
266
+ ## Vulnerability Management (`vulnerability-management.ts`) — 1 tool
267
+
268
+ | Tool Name | Description | Actions | dryRun | Sudo |
269
+ |-----------|-------------|---------|--------|------|
270
+ | `vuln_manage` | Vulnerability scanning, tracking, prioritization, and remediation planning | `scan_system`, `scan_web`, `track`, `prioritize`, `remediation_plan` | N | conditional |
271
+
272
+ ### `vuln_manage`
273
+
274
+ **Actions:**
275
+ - `scan_system` — Run nmap vulnerability scan with NSE scripts and searchsploit exploit lookup
276
+ - `scan_web` — Run nikto web vulnerability scan against a target URL
277
+ - `track` — Manage vulnerability tracker (add, update status, list)
278
+ - `prioritize` — Risk-based prioritization of open vulnerabilities with scoring
279
+ - `remediation_plan` — Generate a prioritized remediation plan (immediate/short/medium/long term)
280
+
281
+ **Parameters:**
282
+ - `action` (required) — Action to perform
283
+ - `target` — IP/hostname/URL to scan
284
+ - `port_range` — Port range for scanning (default: `1-1024`)
285
+ - `scan_type` — Scan type: `quick`, `full`, `stealth` (default: `quick`)
286
+ - `vuln_id` — Vulnerability ID for tracking
287
+ - `severity` — Severity level for new vulnerability
288
+ - `description` — Vulnerability description
289
+ - `status` — Vulnerability status: `open`, `mitigated`, `accepted`, `false_positive`
290
+ - `severity_filter` — Filter for prioritization (default: `all`)
291
+ - `output_format` — Output format: `text`, `json`
292
+
293
+ **Example:**
294
+ ```json
295
+ { "action": "scan_system", "target": "192.168.1.1", "scan_type": "quick" }
296
+ ```
297
+
298
+ ---
299
+
300
+ ## Forensics (`incident-response.ts`) — 1 tool (extends incident-response module)
301
+
302
+ | Tool Name | Description | Actions | dryRun | Sudo |
303
+ |-----------|-------------|---------|--------|------|
304
+ | `ir_forensics` | Digital forensics: memory dumps, disk imaging, network capture, evidence bagging, chain of custody | `memory_dump`, `disk_image`, `network_capture_forensic`, `evidence_bag`, `chain_of_custody` | N | always |
305
+
306
+ ### `ir_forensics`
307
+
308
+ **Actions:**
309
+ - `memory_dump` — Acquire system memory using avml or /proc/kcore
310
+ - `disk_image` — Create forensic disk image with dd and SHA-256 verification
311
+ - `network_capture_forensic` — Forensic network capture with tcpdump
312
+ - `evidence_bag` — Package and hash evidence files for chain of custody
313
+ - `chain_of_custody` — View or export the chain of custody log
314
+
315
+ **Parameters:**
316
+ - `action` (required) — Action to perform
317
+ - `output_path` — Path to save forensic output
318
+ - `device` — Disk device for imaging (e.g., `/dev/sda1`)
319
+ - `interface` — Network interface for capture
320
+ - `duration` — Capture duration in seconds
321
+
322
+ **Example:**
323
+ ```json
324
+ { "action": "memory_dump", "output_path": "/evidence/memory.lime" }
325
+ ```
326
+
327
+ ---
328
+
329
+ ## Process Security (`process-security.ts`) — 1 tool
330
+
331
+ | Tool Name | Description | Actions | dryRun | Sudo |
332
+ |-----------|-------------|---------|--------|------|
333
+ | `process_security` | Process security analysis: audit running processes, check capabilities, inspect namespaces, detect anomalies, audit cgroup limits | `audit_running`, `check_capabilities`, `check_namespaces`, `detect_anomalies`, `cgroup_audit` | N | conditional |
334
+
335
+ ### `process_security`
336
+
337
+ **Actions:**
338
+ - `audit_running` — Audit running processes for security concerns (root processes, high resource, unusual paths, deleted executables)
339
+ - `check_capabilities` — Inspect Linux capabilities on processes; detect dangerous capabilities
340
+ - `check_namespaces` — Inspect namespace isolation for a specific PID or list all namespaces via lsns
341
+ - `detect_anomalies` — Comprehensive anomaly detection (deleted binaries, unexpected connections, suspicious shells, sensitive file access)
342
+ - `cgroup_audit` — Audit cgroup resource limits and hierarchy
343
+
344
+ **Parameters:**
345
+ - `action` (required) — Action to perform
346
+ - `pid` — Specific process ID to inspect
347
+ - `filter` — Filter processes by name pattern (regex)
348
+ - `show_all` — Show all processes or only suspicious ones (default: false)
349
+ - `output_format` — Output format: `text`, `json`
350
+
351
+ **Example:**
352
+ ```json
353
+ { "action": "detect_anomalies" }
354
+ ```
355
+
356
+ ---
357
+
358
+ ## WAF Management (`waf.ts`) — 1 tool
359
+
360
+ | Tool Name | Description | Actions | dryRun | Sudo |
361
+ |-----------|-------------|---------|--------|------|
362
+ | `waf_manage` | Web Application Firewall management: audit ModSecurity, manage rules, configure rate limiting, deploy OWASP CRS, analyze blocked requests | `modsec_audit`, `modsec_rules`, `rate_limit_config`, `owasp_crs_deploy`, `blocked_requests` | N | conditional |
363
+
364
+ ### `waf_manage`
365
+
366
+ **Actions:**
367
+ - `modsec_audit` — Audit ModSecurity WAF installation and configuration
368
+ - `modsec_rules` — Manage ModSecurity rules (list, enable, disable)
369
+ - `rate_limit_config` — Audit and recommend rate limiting configuration for nginx/Apache
370
+ - `owasp_crs_deploy` — Check OWASP Core Rule Set deployment status and integration
371
+ - `blocked_requests` — Analyze WAF audit logs for blocked requests, top IPs, attack categories
372
+
373
+ **Parameters:**
374
+ - `action` (required) — Action to perform
375
+ - `web_server` — Web server type: `nginx`, `apache` (default: `nginx`)
376
+ - `rule_id` — ModSecurity rule ID (for `modsec_rules`)
377
+ - `rule_action` — Rule action: `enable`, `disable`, `list` (default: `list`)
378
+ - `rate_limit` — Requests per second (for `rate_limit_config`)
379
+ - `rate_limit_zone` — Zone name for rate limiting
380
+ - `log_path` — Path to WAF log file (for `blocked_requests`)
381
+ - `output_format` — Output format: `text`, `json`
382
+
383
+ **Example:**
384
+ ```json
385
+ { "action": "modsec_audit", "web_server": "nginx" }
386
+ ```
387
+
388
+ ---
389
+
390
+ ## Network Segmentation (`network-defense.ts`) — 1 tool (extends network-defense module)
391
+
392
+ | Tool Name | Description | Actions | dryRun | Sudo |
393
+ |-----------|-------------|---------|--------|------|
394
+ | `network_segmentation_audit` | Network segmentation: map zones, verify isolation, test paths, audit VLANs | `map_zones`, `verify_isolation`, `test_paths`, `audit_vlans` | N | conditional |
395
+
396
+ ### `network_segmentation_audit`
397
+
398
+ **Actions:**
399
+ - `map_zones` — Map network zones from interface and routing table analysis
400
+ - `verify_isolation` — Verify network isolation between zones using iptables rules
401
+ - `test_paths` — Test network paths between endpoints using traceroute/nmap
402
+ - `audit_vlans` — Audit VLAN configuration and bridge interfaces
403
+
404
+ **Parameters:**
405
+ - `action` (required) — Action to perform
406
+ - `source` — Source IP/subnet for path testing
407
+ - `destination` — Destination IP/subnet for path testing
408
+ - `output_format` — Output format: `text`, `json`
409
+
410
+ **Example:**
411
+ ```json
412
+ { "action": "map_zones" }
413
+ ```
414
+
415
+ ---
416
+
417
+ ## Threat Intelligence (`threat-intel.ts`) — 1 tool
418
+
419
+ | Tool Name | Description | Actions | dryRun | Sudo |
420
+ |-----------|-------------|---------|--------|------|
421
+ | `threat_intel` | Threat intelligence: check IPs, hashes, and domains against local feeds, manage feeds, apply blocklists | `check_ip`, `check_hash`, `check_domain`, `update_feeds`, `blocklist_apply` | N | conditional |
422
+
423
+ ### `threat_intel`
424
+
425
+ **Actions:**
426
+ - `check_ip` — Check IP reputation against local feeds, fail2ban, iptables, and whois
427
+ - `check_hash` — Check file hash against local hash feeds and ClamAV databases
428
+ - `check_domain` — Check domain against local blocklists, /etc/hosts, and DNS resolution
429
+ - `update_feeds` — List available feeds or download new threat intelligence feeds
430
+ - `blocklist_apply` — Apply a blocklist file to iptables, fail2ban, or /etc/hosts
431
+
432
+ **Parameters:**
433
+ - `action` (required) — Action to perform
434
+ - `indicator` — IP address, file hash, or domain to check
435
+ - `feed_name` — Name of threat feed (for `update_feeds`)
436
+ - `feed_url` — URL of threat feed to download (for `update_feeds`)
437
+ - `blocklist_path` — Path to blocklist file (for `blocklist_apply`)
438
+ - `apply_to` — Target: `iptables`, `fail2ban`, `hosts` (default: `iptables`)
439
+ - `output_format` — Output format: `text`, `json`
440
+
441
+ **Example:**
442
+ ```json
443
+ { "action": "check_ip", "indicator": "203.0.113.50" }
444
+ ```
445
+
446
+ ---
447
+
448
+ ## Auto-Remediation (`meta.ts`) — 1 tool (extends meta module)
449
+
450
+ | Tool Name | Description | Actions | dryRun | Sudo |
451
+ |-----------|-------------|---------|--------|------|
452
+ | `auto_remediate` | Auto-remediation: plan fixes, apply remediations, rollback sessions, check status | `plan`, `apply`, `rollback_session`, `status` | Y | conditional |
453
+
454
+ ### `auto_remediate`
455
+
456
+ **Actions:**
457
+ - `plan` — Analyze system and generate a remediation plan based on findings
458
+ - `apply` — Apply planned remediations (sysctl, iptables, sed-based config fixes)
459
+ - `rollback_session` — Rollback a previously applied remediation session
460
+ - `status` — Check current remediation session status
461
+
462
+ **Parameters:**
463
+ - `action` (required) — Action to perform
464
+ - `session_id` — Remediation session ID (for `rollback_session`)
465
+ - `dry_run` — Preview changes without applying (default: true)
466
+
467
+ **Example:**
468
+ ```json
469
+ { "action": "plan" }
470
+ ```
471
+
472
+ ---
473
+
474
+ ## Cloud Security (`cloud-security.ts`) — 1 tool
475
+
476
+ | Tool Name | Description | Actions | dryRun | Sudo |
477
+ |-----------|-------------|---------|--------|------|
478
+ | `cloud_security` | Cloud security: detect environment, audit metadata services, check IAM credentials, audit storage, test IMDS security | `detect_environment`, `audit_metadata`, `check_iam_creds`, `audit_storage`, `check_imds` | N | conditional |
479
+
480
+ ### `cloud_security`
481
+
482
+ **Actions:**
483
+ - `detect_environment` — Detect cloud provider (AWS/GCP/Azure) from DMI, metadata, hypervisor UUID
484
+ - `audit_metadata` — Audit instance metadata service (IMDS) configuration and security
485
+ - `check_iam_creds` — Check for exposed cloud credentials in environment variables, files, and process environments
486
+ - `audit_storage` — Audit accessible cloud storage (S3, GCS, Azure) and mount points
487
+ - `check_imds` — Test IMDS security: v1/v2 accessibility, iptables rules, hop limit
488
+
489
+ **Parameters:**
490
+ - `action` (required) — Action to perform
491
+ - `provider` — Cloud provider: `aws`, `gcp`, `azure`, `auto` (default: `auto`)
492
+ - `output_format` — Output format: `text`, `json`
493
+
494
+ **Example:**
495
+ ```json
496
+ { "action": "detect_environment" }
497
+ ```
498
+
499
+ ---
500
+
501
+ ## API Security (`api-security.ts`) — 1 tool
502
+
503
+ | Tool Name | Description | Actions | dryRun | Sudo |
504
+ |-----------|-------------|---------|--------|------|
505
+ | `api_security` | API security: discover local APIs, audit authentication, check rate limiting, verify TLS, analyze CORS | `scan_local_apis`, `audit_auth`, `check_rate_limiting`, `tls_verify`, `cors_check` | N | conditional |
506
+
507
+ ### `api_security`
508
+
509
+ **Actions:**
510
+ - `scan_local_apis` — Discover local API services on common ports, detect frameworks, find API documentation endpoints
511
+ - `audit_auth` — Audit API authentication enforcement: test with/without credentials, detect verbose errors
512
+ - `check_rate_limiting` — Send rapid requests to detect rate limiting headers and 429 responses
513
+ - `tls_verify` — Verify TLS certificate, check deprecated protocols (TLS 1.0/1.1), HSTS header
514
+ - `cors_check` — Analyze CORS policy: test origin reflection, wildcard origins, credential allowance
515
+
516
+ **Parameters:**
517
+ - `action` (required) — Action to perform
518
+ - `target` — URL or host:port to scan (default: `http://localhost`)
519
+ - `port_range` — Comma-separated ports for API discovery (default: `80,443,3000,4000,5000,8000,8080,8443,9000`)
520
+ - `output_format` — Output format: `text`, `json`
521
+
522
+ **Example:**
523
+ ```json
524
+ { "action": "cors_check", "target": "https://api.example.com" }
525
+ ```
526
+
527
+ ---
528
+
529
+ ## Deception / Honeypots (`deception.ts`) — 1 tool
530
+
531
+ | Tool Name | Description | Actions | dryRun | Sudo |
532
+ |-----------|-------------|---------|--------|------|
533
+ | `honeypot_manage` | Honeypot/deception: deploy canary tokens, set up honeyport listeners, check triggers, remove canaries, list deployed assets | `deploy_canary`, `deploy_honeyport`, `check_triggers`, `remove`, `list` | N | conditional |
534
+
535
+ ### `honeypot_manage`
536
+
537
+ **Actions:**
538
+ - `deploy_canary` — Deploy canary token/tripwire (types: file, credential, directory, ssh_key) with inotifywait monitoring
539
+ - `deploy_honeyport` — Start a honeyport listener (ncat) with iptables LOG rules for intrusion detection
540
+ - `check_triggers` — Check all canaries for access (access time changes, inotify events, connection logs)
541
+ - `remove` — Remove a deployed canary by ID (delete files, kill listeners, remove iptables rules)
542
+ - `list` — List all canaries in the registry with status
543
+
544
+ **Parameters:**
545
+ - `action` (required) — Action to perform
546
+ - `canary_type` — Type of canary: `file`, `credential`, `directory`, `ssh_key` (for `deploy_canary`)
547
+ - `canary_path` — Path for canary deployment (for `deploy_canary`)
548
+ - `port` — Port for honeyport listener (for `deploy_honeyport`)
549
+ - `canary_id` — ID of canary to remove (for `remove`)
550
+ - `output_format` — Output format: `text`, `json`
551
+
552
+ **Example:**
553
+ ```json
554
+ { "action": "deploy_canary", "canary_type": "credential", "canary_path": "/opt/backup/.aws/credentials" }
555
+ ```
556
+
557
+ ---
558
+
559
+ ## Wireless Security (`wireless-security.ts`) — 1 tool
560
+
561
+ | Tool Name | Description | Actions | dryRun | Sudo |
562
+ |-----------|-------------|---------|--------|------|
563
+ | `wireless_security` | Wireless security: audit Bluetooth, assess WiFi, detect rogue APs with evil twin analysis, disable unused interfaces | `bt_audit`, `wifi_audit`, `rogue_ap_detect`, `disable_unused` | N | conditional |
564
+
565
+ ### `wireless_security`
566
+
567
+ **Actions:**
568
+ - `bt_audit` — Audit Bluetooth adapter status, discoverability, paired devices, service state
569
+ - `wifi_audit` — Assess WiFi configuration: interfaces, active connections, security type, saved networks
570
+ - `rogue_ap_detect` — Scan for rogue access points: unknown APs, open networks, evil twin detection (Levenshtein + substitution)
571
+ - `disable_unused` — Disable unused wireless interfaces via rfkill/ip; check loaded kernel modules for blacklisting
572
+
573
+ **Parameters:**
574
+ - `action` (required) — Action to perform
575
+ - `interface` — Specific wireless interface to audit (e.g., `wlan0`)
576
+ - `output_format` — Output format: `text`, `json`
577
+
578
+ **Example:**
579
+ ```json
580
+ { "action": "rogue_ap_detect" }
581
+ ```
582
+
583
+ ---
584
+
585
+ ## Certificate Lifecycle (`encryption.ts`) — 1 tool (extends encryption module)
586
+
587
+ | Tool Name | Description | Actions | dryRun | Sudo |
588
+ |-----------|-------------|---------|--------|------|
589
+ | `certificate_lifecycle` | Certificate lifecycle: inventory, auto-renewal check, CA audit, OCSP check, CT log monitoring | `inventory`, `auto_renew_check`, `ca_audit`, `ocsp_check`, `ct_log_monitor` | N | conditional |
590
+
591
+ ### `certificate_lifecycle`
592
+
593
+ **Actions:**
594
+ - `inventory` — Scan for certificates across the filesystem using find + openssl
595
+ - `auto_renew_check` — Check certbot auto-renewal configuration and certificate expiry
596
+ - `ca_audit` — Audit trusted CA certificates in the system trust store
597
+ - `ocsp_check` — Check OCSP responder status for a certificate
598
+ - `ct_log_monitor` — Monitor Certificate Transparency logs for a domain
599
+
600
+ **Parameters:**
601
+ - `action` (required) — Action to perform
602
+ - `domain` — Domain for CT log monitoring or OCSP check
603
+ - `cert_path` — Path to certificate file
604
+ - `output_format` — Output format: `text`, `json`
605
+
606
+ **Example:**
607
+ ```json
608
+ { "action": "inventory" }
609
+ ```
610
+
611
+ ---
612
+
613
+ ## SIEM Integration (`siem-integration.ts`) — 1 tool
614
+
615
+ | Tool Name | Description | Actions | dryRun | Sudo |
616
+ |-----------|-------------|---------|--------|------|
617
+ | `siem_export` | SIEM integration: configure syslog forwarding, audit Filebeat, comprehensive log forwarding audit, test connectivity | `configure_syslog_forward`, `configure_filebeat`, `audit_forwarding`, `test_connectivity` | N | conditional |
618
+
619
+ ### `siem_export`
620
+
621
+ **Actions:**
622
+ - `configure_syslog_forward` — Audit/configure rsyslog remote forwarding (TCP/UDP/TLS), check existing rules and TLS support
623
+ - `configure_filebeat` — Audit Filebeat installation, modules, service status, and output configuration
624
+ - `audit_forwarding` — Comprehensive log forwarding audit with CIS benchmark compliance check
625
+ - `test_connectivity` — Test SIEM endpoint connectivity: DNS resolution, TCP, TLS, firewall rules, test syslog message
626
+
627
+ **Parameters:**
628
+ - `action` (required) — Action to perform
629
+ - `siem_host` — SIEM server hostname or IP address
630
+ - `siem_port` — SIEM server port (default: 514 for syslog, 5044 for filebeat)
631
+ - `protocol` — Transport protocol: `tcp`, `udp`, `tls` (default: `tcp`)
632
+ - `log_sources` — Log sources to forward (e.g., `auth`, `syslog`, `kern`, `audit`)
633
+ - `output_format` — Output format: `text`, `json`
634
+
635
+ **Example:**
636
+ ```json
637
+ { "action": "test_connectivity", "siem_host": "siem.example.com", "siem_port": 514 }
638
+ ```
639
+
640
+ ---
641
+
642
+ ## USB Device Control (`hardening.ts`) — 1 tool (extends hardening module)
643
+
644
+ | Tool Name | Description | Actions | dryRun | Sudo |
645
+ |-----------|-------------|---------|--------|------|
646
+ | `usb_device_control` | USB device control: audit devices, block storage, whitelist, monitor | `audit_devices`, `block_storage`, `whitelist`, `monitor` | Y | conditional |
647
+
648
+ ### `usb_device_control`
649
+
650
+ **Actions:**
651
+ - `audit_devices` — Audit connected USB devices using lsusb and lsblk
652
+ - `block_storage` — Block USB mass storage via kernel module blacklisting (modprobe)
653
+ - `whitelist` — Manage USB device whitelist via udev rules
654
+ - `monitor` — Monitor USB device events via udevadm
655
+
656
+ **Parameters:**
657
+ - `action` (required) — Action to perform
658
+ - `device_id` — USB device vendor:product ID for whitelisting
659
+ - `dry_run` — Preview changes without applying (default: true)
660
+ - `output_format` — Output format: `text`, `json`
661
+
662
+ **Example:**
663
+ ```json
664
+ { "action": "audit_devices" }
665
+ ```