oh-my-claude-sisyphus 3.4.0 → 3.4.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +71 -5
- package/commands/cancel-ecomode.md +71 -0
- package/commands/cancel.md +75 -0
- package/commands/pipeline.md +231 -0
- package/commands/planner.md +174 -0
- package/commands/swarm.md +280 -0
- package/dist/analytics/cost-estimator.d.ts +14 -0
- package/dist/analytics/cost-estimator.d.ts.map +1 -0
- package/dist/analytics/cost-estimator.js +70 -0
- package/dist/analytics/cost-estimator.js.map +1 -0
- package/dist/analytics/export.d.ts +7 -0
- package/dist/analytics/export.d.ts.map +1 -0
- package/dist/analytics/export.js +93 -0
- package/dist/analytics/export.js.map +1 -0
- package/dist/analytics/index.d.ts +14 -0
- package/dist/analytics/index.d.ts.map +1 -0
- package/dist/analytics/index.js +14 -0
- package/dist/analytics/index.js.map +1 -0
- package/dist/analytics/metrics-collector.d.ts +30 -0
- package/dist/analytics/metrics-collector.d.ts.map +1 -0
- package/dist/analytics/metrics-collector.js +96 -0
- package/dist/analytics/metrics-collector.js.map +1 -0
- package/dist/analytics/query-engine.d.ts +32 -0
- package/dist/analytics/query-engine.d.ts.map +1 -0
- package/dist/analytics/query-engine.js +151 -0
- package/dist/analytics/query-engine.js.map +1 -0
- package/dist/analytics/session-manager.d.ts +26 -0
- package/dist/analytics/session-manager.d.ts.map +1 -0
- package/dist/analytics/session-manager.js +201 -0
- package/dist/analytics/session-manager.js.map +1 -0
- package/dist/analytics/session-types.d.ts +37 -0
- package/dist/analytics/session-types.d.ts.map +1 -0
- package/dist/analytics/session-types.js +2 -0
- package/dist/analytics/session-types.js.map +1 -0
- package/dist/analytics/token-tracker.d.ts +24 -0
- package/dist/analytics/token-tracker.d.ts.map +1 -0
- package/dist/analytics/token-tracker.js +161 -0
- package/dist/analytics/token-tracker.js.map +1 -0
- package/dist/analytics/types.d.ts +37 -0
- package/dist/analytics/types.d.ts.map +1 -0
- package/dist/analytics/types.js +21 -0
- package/dist/analytics/types.js.map +1 -0
- package/dist/cli/analytics.d.ts +3 -0
- package/dist/cli/analytics.d.ts.map +1 -0
- package/dist/cli/analytics.js +74 -0
- package/dist/cli/analytics.js.map +1 -0
- package/dist/cli/commands/agents.d.ts +5 -0
- package/dist/cli/commands/agents.d.ts.map +1 -0
- package/dist/cli/commands/agents.js +29 -0
- package/dist/cli/commands/agents.js.map +1 -0
- package/dist/cli/commands/cleanup.d.ts +4 -0
- package/dist/cli/commands/cleanup.d.ts.map +1 -0
- package/dist/cli/commands/cleanup.js +17 -0
- package/dist/cli/commands/cleanup.js.map +1 -0
- package/dist/cli/commands/cost.d.ts +4 -0
- package/dist/cli/commands/cost.d.ts.map +1 -0
- package/dist/cli/commands/cost.js +53 -0
- package/dist/cli/commands/cost.js.map +1 -0
- package/dist/cli/commands/export.d.ts +5 -0
- package/dist/cli/commands/export.d.ts.map +1 -0
- package/dist/cli/commands/export.js +30 -0
- package/dist/cli/commands/export.js.map +1 -0
- package/dist/cli/commands/sessions.d.ts +5 -0
- package/dist/cli/commands/sessions.d.ts.map +1 -0
- package/dist/cli/commands/sessions.js +37 -0
- package/dist/cli/commands/sessions.js.map +1 -0
- package/dist/cli/commands/stats.d.ts +4 -0
- package/dist/cli/commands/stats.d.ts.map +1 -0
- package/dist/cli/commands/stats.js +43 -0
- package/dist/cli/commands/stats.js.map +1 -0
- package/dist/cli/utils/formatting.d.ts +22 -0
- package/dist/cli/utils/formatting.d.ts.map +1 -0
- package/dist/cli/utils/formatting.js +70 -0
- package/dist/cli/utils/formatting.js.map +1 -0
- package/dist/hud/analytics-display.d.ts +28 -0
- package/dist/hud/analytics-display.d.ts.map +1 -0
- package/dist/hud/analytics-display.js +105 -0
- package/dist/hud/analytics-display.js.map +1 -0
- package/dist/hud/background-cleanup.d.ts +28 -0
- package/dist/hud/background-cleanup.d.ts.map +1 -0
- package/dist/hud/background-cleanup.js +92 -0
- package/dist/hud/background-cleanup.js.map +1 -0
- package/dist/hud/index.js +4 -2
- package/dist/hud/index.js.map +1 -1
- package/dist/hud/render.d.ts +1 -1
- package/dist/hud/render.d.ts.map +1 -1
- package/dist/hud/render.js +32 -1
- package/dist/hud/render.js.map +1 -1
- package/dist/hud/state.d.ts +5 -0
- package/dist/hud/state.d.ts.map +1 -1
- package/dist/hud/state.js +13 -0
- package/dist/hud/state.js.map +1 -1
- package/dist/hud/types.d.ts +11 -1
- package/dist/hud/types.d.ts.map +1 -1
- package/dist/hud/types.js +19 -0
- package/dist/hud/types.js.map +1 -1
- package/docs/FULL-README.md +130 -16
- package/docs/MIGRATION.md +222 -1
- package/docs/SYNC-SYSTEM.md +528 -0
- package/package.json +8 -2
- package/scripts/sync-metadata.ts +363 -0
- package/skills/build-fix/SKILL.md +123 -0
- package/skills/code-review/SKILL.md +179 -0
- package/skills/security-review/SKILL.md +254 -0
|
@@ -0,0 +1,254 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: security-review
|
|
3
|
+
description: Run a comprehensive security review on code
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
# Security Review Skill
|
|
7
|
+
|
|
8
|
+
Conduct a thorough security audit checking for OWASP Top 10 vulnerabilities, hardcoded secrets, and unsafe patterns.
|
|
9
|
+
|
|
10
|
+
## When to Use
|
|
11
|
+
|
|
12
|
+
This skill activates when:
|
|
13
|
+
- User requests "security review", "security audit"
|
|
14
|
+
- After writing code that handles user input
|
|
15
|
+
- After adding new API endpoints
|
|
16
|
+
- After modifying authentication/authorization logic
|
|
17
|
+
- Before deploying to production
|
|
18
|
+
- After adding external dependencies
|
|
19
|
+
|
|
20
|
+
## What It Does
|
|
21
|
+
|
|
22
|
+
Delegates to the `security-reviewer` agent (Opus model) for deep security analysis:
|
|
23
|
+
|
|
24
|
+
1. **OWASP Top 10 Scan**
|
|
25
|
+
- A01: Broken Access Control
|
|
26
|
+
- A02: Cryptographic Failures
|
|
27
|
+
- A03: Injection (SQL, NoSQL, Command, XSS)
|
|
28
|
+
- A04: Insecure Design
|
|
29
|
+
- A05: Security Misconfiguration
|
|
30
|
+
- A06: Vulnerable and Outdated Components
|
|
31
|
+
- A07: Identification and Authentication Failures
|
|
32
|
+
- A08: Software and Data Integrity Failures
|
|
33
|
+
- A09: Security Logging and Monitoring Failures
|
|
34
|
+
- A10: Server-Side Request Forgery (SSRF)
|
|
35
|
+
|
|
36
|
+
2. **Secrets Detection**
|
|
37
|
+
- Hardcoded API keys
|
|
38
|
+
- Passwords in source code
|
|
39
|
+
- Private keys in repo
|
|
40
|
+
- Tokens and credentials
|
|
41
|
+
- Connection strings with secrets
|
|
42
|
+
|
|
43
|
+
3. **Input Validation**
|
|
44
|
+
- All user inputs sanitized
|
|
45
|
+
- SQL/NoSQL injection prevention
|
|
46
|
+
- Command injection prevention
|
|
47
|
+
- XSS prevention (output escaping)
|
|
48
|
+
- Path traversal prevention
|
|
49
|
+
|
|
50
|
+
4. **Authentication/Authorization**
|
|
51
|
+
- Proper password hashing (bcrypt, argon2)
|
|
52
|
+
- Session management security
|
|
53
|
+
- Access control enforcement
|
|
54
|
+
- JWT implementation security
|
|
55
|
+
|
|
56
|
+
5. **Dependency Security**
|
|
57
|
+
- Run `npm audit` for known vulnerabilities
|
|
58
|
+
- Check for outdated dependencies
|
|
59
|
+
- Identify high-severity CVEs
|
|
60
|
+
|
|
61
|
+
## Agent Delegation
|
|
62
|
+
|
|
63
|
+
```
|
|
64
|
+
Task(
|
|
65
|
+
subagent_type="oh-my-claudecode:security-reviewer",
|
|
66
|
+
model="opus",
|
|
67
|
+
prompt="SECURITY REVIEW TASK
|
|
68
|
+
|
|
69
|
+
Conduct comprehensive security audit of codebase.
|
|
70
|
+
|
|
71
|
+
Scope: [specific files or entire codebase]
|
|
72
|
+
|
|
73
|
+
Security Checklist:
|
|
74
|
+
1. OWASP Top 10 scan
|
|
75
|
+
2. Hardcoded secrets detection
|
|
76
|
+
3. Input validation review
|
|
77
|
+
4. Authentication/authorization review
|
|
78
|
+
5. Dependency vulnerability scan (npm audit)
|
|
79
|
+
|
|
80
|
+
Output: Security review report with:
|
|
81
|
+
- Summary of findings by severity (CRITICAL, HIGH, MEDIUM, LOW)
|
|
82
|
+
- Specific file:line locations
|
|
83
|
+
- CVE references where applicable
|
|
84
|
+
- Remediation guidance for each issue
|
|
85
|
+
- Overall security posture assessment"
|
|
86
|
+
)
|
|
87
|
+
```
|
|
88
|
+
|
|
89
|
+
## Output Format
|
|
90
|
+
|
|
91
|
+
```
|
|
92
|
+
SECURITY REVIEW REPORT
|
|
93
|
+
======================
|
|
94
|
+
|
|
95
|
+
Scope: Entire codebase (42 files scanned)
|
|
96
|
+
Scan Date: 2026-01-24T14:30:00Z
|
|
97
|
+
|
|
98
|
+
CRITICAL (2)
|
|
99
|
+
------------
|
|
100
|
+
1. src/api/auth.ts:89 - Hardcoded API Key
|
|
101
|
+
Finding: AWS API key hardcoded in source code
|
|
102
|
+
Impact: Credential exposure if code is public or leaked
|
|
103
|
+
Remediation: Move to environment variables, rotate key immediately
|
|
104
|
+
Reference: OWASP A02:2021 – Cryptographic Failures
|
|
105
|
+
|
|
106
|
+
2. src/db/query.ts:45 - SQL Injection Vulnerability
|
|
107
|
+
Finding: User input concatenated directly into SQL query
|
|
108
|
+
Impact: Attacker can execute arbitrary SQL commands
|
|
109
|
+
Remediation: Use parameterized queries or ORM
|
|
110
|
+
Reference: OWASP A03:2021 – Injection
|
|
111
|
+
|
|
112
|
+
HIGH (5)
|
|
113
|
+
--------
|
|
114
|
+
3. src/auth/password.ts:22 - Weak Password Hashing
|
|
115
|
+
Finding: Passwords hashed with MD5 (cryptographically broken)
|
|
116
|
+
Impact: Passwords can be reversed via rainbow tables
|
|
117
|
+
Remediation: Use bcrypt or argon2 with appropriate work factor
|
|
118
|
+
Reference: OWASP A02:2021 – Cryptographic Failures
|
|
119
|
+
|
|
120
|
+
4. src/components/UserInput.tsx:67 - XSS Vulnerability
|
|
121
|
+
Finding: User input rendered with dangerouslySetInnerHTML
|
|
122
|
+
Impact: Cross-site scripting attack vector
|
|
123
|
+
Remediation: Sanitize HTML or use safe rendering
|
|
124
|
+
Reference: OWASP A03:2021 – Injection (XSS)
|
|
125
|
+
|
|
126
|
+
5. src/api/upload.ts:34 - Path Traversal Vulnerability
|
|
127
|
+
Finding: User-controlled filename used without validation
|
|
128
|
+
Impact: Attacker can read/write arbitrary files
|
|
129
|
+
Remediation: Validate and sanitize filenames, use allowlist
|
|
130
|
+
Reference: OWASP A01:2021 – Broken Access Control
|
|
131
|
+
|
|
132
|
+
...
|
|
133
|
+
|
|
134
|
+
MEDIUM (8)
|
|
135
|
+
----------
|
|
136
|
+
...
|
|
137
|
+
|
|
138
|
+
LOW (12)
|
|
139
|
+
--------
|
|
140
|
+
...
|
|
141
|
+
|
|
142
|
+
DEPENDENCY VULNERABILITIES
|
|
143
|
+
--------------------------
|
|
144
|
+
Found 3 vulnerabilities via npm audit:
|
|
145
|
+
|
|
146
|
+
CRITICAL: axios@0.21.0 - Server-Side Request Forgery (CVE-2021-3749)
|
|
147
|
+
Installed: axios@0.21.0
|
|
148
|
+
Fix: npm install axios@0.21.2
|
|
149
|
+
|
|
150
|
+
HIGH: lodash@4.17.19 - Prototype Pollution (CVE-2020-8203)
|
|
151
|
+
Installed: lodash@4.17.19
|
|
152
|
+
Fix: npm install lodash@4.17.21
|
|
153
|
+
|
|
154
|
+
...
|
|
155
|
+
|
|
156
|
+
OVERALL ASSESSMENT
|
|
157
|
+
------------------
|
|
158
|
+
Security Posture: POOR (2 CRITICAL, 5 HIGH issues)
|
|
159
|
+
|
|
160
|
+
Immediate Actions Required:
|
|
161
|
+
1. Rotate exposed AWS API key
|
|
162
|
+
2. Fix SQL injection in db/query.ts
|
|
163
|
+
3. Upgrade password hashing to bcrypt
|
|
164
|
+
4. Update vulnerable dependencies
|
|
165
|
+
|
|
166
|
+
Recommendation: DO NOT DEPLOY until CRITICAL and HIGH issues resolved.
|
|
167
|
+
```
|
|
168
|
+
|
|
169
|
+
## Security Checklist
|
|
170
|
+
|
|
171
|
+
The security-reviewer agent verifies:
|
|
172
|
+
|
|
173
|
+
### Authentication & Authorization
|
|
174
|
+
- [ ] Passwords hashed with strong algorithm (bcrypt/argon2)
|
|
175
|
+
- [ ] Session tokens cryptographically random
|
|
176
|
+
- [ ] JWT tokens properly signed and validated
|
|
177
|
+
- [ ] Access control enforced on all protected resources
|
|
178
|
+
- [ ] No authentication bypass vulnerabilities
|
|
179
|
+
|
|
180
|
+
### Input Validation
|
|
181
|
+
- [ ] All user inputs validated and sanitized
|
|
182
|
+
- [ ] SQL queries use parameterization (no string concatenation)
|
|
183
|
+
- [ ] NoSQL queries prevent injection
|
|
184
|
+
- [ ] File uploads validated (type, size, content)
|
|
185
|
+
- [ ] URLs validated to prevent SSRF
|
|
186
|
+
|
|
187
|
+
### Output Encoding
|
|
188
|
+
- [ ] HTML output escaped to prevent XSS
|
|
189
|
+
- [ ] JSON responses properly encoded
|
|
190
|
+
- [ ] No user data in error messages
|
|
191
|
+
- [ ] Content-Security-Policy headers set
|
|
192
|
+
|
|
193
|
+
### Secrets Management
|
|
194
|
+
- [ ] No hardcoded API keys
|
|
195
|
+
- [ ] No passwords in source code
|
|
196
|
+
- [ ] No private keys in repo
|
|
197
|
+
- [ ] Environment variables used for secrets
|
|
198
|
+
- [ ] Secrets not logged or exposed in errors
|
|
199
|
+
|
|
200
|
+
### Cryptography
|
|
201
|
+
- [ ] Strong algorithms used (AES-256, RSA-2048+)
|
|
202
|
+
- [ ] Proper key management
|
|
203
|
+
- [ ] Random number generation cryptographically secure
|
|
204
|
+
- [ ] TLS/HTTPS enforced for sensitive data
|
|
205
|
+
|
|
206
|
+
### Dependencies
|
|
207
|
+
- [ ] No known vulnerabilities in dependencies
|
|
208
|
+
- [ ] Dependencies up to date
|
|
209
|
+
- [ ] No CRITICAL or HIGH CVEs
|
|
210
|
+
- [ ] Dependency sources verified
|
|
211
|
+
|
|
212
|
+
## Severity Definitions
|
|
213
|
+
|
|
214
|
+
**CRITICAL** - Exploitable vulnerability with severe impact (data breach, RCE, credential theft)
|
|
215
|
+
**HIGH** - Vulnerability requiring specific conditions but serious impact
|
|
216
|
+
**MEDIUM** - Security weakness with limited impact or difficult exploitation
|
|
217
|
+
**LOW** - Best practice violation or minor security concern
|
|
218
|
+
|
|
219
|
+
## Remediation Priority
|
|
220
|
+
|
|
221
|
+
1. **Rotate exposed secrets** - Immediate (within 1 hour)
|
|
222
|
+
2. **Fix CRITICAL** - Urgent (within 24 hours)
|
|
223
|
+
3. **Fix HIGH** - Important (within 1 week)
|
|
224
|
+
4. **Fix MEDIUM** - Planned (within 1 month)
|
|
225
|
+
5. **Fix LOW** - Backlog (when convenient)
|
|
226
|
+
|
|
227
|
+
## Use with Other Skills
|
|
228
|
+
|
|
229
|
+
**With Pipeline:**
|
|
230
|
+
```
|
|
231
|
+
/pipeline security "review authentication module"
|
|
232
|
+
```
|
|
233
|
+
Uses: explore → security-reviewer → executor → security-reviewer-low (re-verify)
|
|
234
|
+
|
|
235
|
+
**With Swarm:**
|
|
236
|
+
```
|
|
237
|
+
/swarm 4:security-reviewer "audit all API endpoints"
|
|
238
|
+
```
|
|
239
|
+
Parallel security review across multiple endpoints.
|
|
240
|
+
|
|
241
|
+
**With Ralph:**
|
|
242
|
+
```
|
|
243
|
+
/ralph security-review then fix all issues
|
|
244
|
+
```
|
|
245
|
+
Review, fix, re-review until all issues resolved.
|
|
246
|
+
|
|
247
|
+
## Best Practices
|
|
248
|
+
|
|
249
|
+
- **Review early** - Security by design, not afterthought
|
|
250
|
+
- **Review often** - Every major feature or API change
|
|
251
|
+
- **Automate** - Run security scans in CI/CD pipeline
|
|
252
|
+
- **Fix immediately** - Don't accumulate security debt
|
|
253
|
+
- **Educate** - Learn from findings to prevent future issues
|
|
254
|
+
- **Verify fixes** - Re-run security review after remediation
|