omen-sec-cli 1.0.19 → 1.0.21

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,129 @@
1
+ # OMEN Audit Report: https://www.fnstore.com.br/
2
+
3
+ **Scan ID:** `OMEN-1774371576550`
4
+ **Timestamp:** 2026-03-24T16:59:36.550Z
5
+ **Security Score:** 71/100
6
+ **Risk Level:** Medium
7
+
8
+ ## Executive Summary
9
+ The security audit identified 9 total issues. Of these, 2 are confirmed vulnerabilities that require immediate attention.
10
+
11
+ ## Detailed Findings
12
+
13
+ ### [HIGH] Content-Security-Policy Missing
14
+ - **Category:** confirmed
15
+ - **Confidence:** high
16
+ - **CWE:** CWE-1022
17
+
18
+ #### Description
19
+ CSP header is missing. Without a strict Content-Security-Policy, the application is highly vulnerable to Cross-Site Scripting (XSS) and data injection attacks.
20
+
21
+ #### Remediation
22
+ Define a strict Content-Security-Policy to restrict source domains for scripts, styles, and other resources.
23
+
24
+ ---
25
+
26
+ ### [LOW] X-Frame-Options Missing
27
+ - **Category:** hardening
28
+ - **Confidence:** high
29
+ - **CWE:** CWE-1021
30
+
31
+ #### Description
32
+ Missing X-Frame-Options header. This allows the application to be embedded in an iframe on other domains, increasing Clickjacking risk.
33
+
34
+ #### Remediation
35
+ Set the X-Frame-Options header to DENY or SAMEORIGIN.
36
+
37
+ ---
38
+
39
+ ### [LOW] X-Content-Type-Options Missing
40
+ - **Category:** hardening
41
+ - **Confidence:** high
42
+ - **CWE:** CWE-116
43
+
44
+ #### Description
45
+ The X-Content-Type-Options: nosniff header is missing. This could allow the browser to "sniff" the content type, potentially leading to MIME-type sniffing attacks.
46
+
47
+ #### Remediation
48
+ Add the "X-Content-Type-Options: nosniff" header to all responses.
49
+
50
+ ---
51
+
52
+ ### [HIGH] Permissive CORS Policy
53
+ - **Category:** confirmed
54
+ - **Confidence:** high
55
+ - **CWE:** CWE-942
56
+
57
+ #### Description
58
+ The application allows Cross-Origin Resource Sharing from any domain (Access-Control-Allow-Origin: *).
59
+
60
+ #### Remediation
61
+ Restrict Access-Control-Allow-Origin to trusted domains only.
62
+
63
+ ---
64
+
65
+ ### [INFO] Technology Stack Identified
66
+ - **Category:** informational
67
+ - **Confidence:** high
68
+ - **CWE:** CWE-200
69
+
70
+ #### Description
71
+ Fingerprinting identified the following technologies: Vercel
72
+
73
+ #### Remediation
74
+ Minimal tech disclosure is recommended to prevent targeted attacks.
75
+
76
+ ---
77
+
78
+ ### [MEDIUM] Potential Admin Panel Exposure
79
+ - **Category:** probable
80
+ - **Confidence:** low
81
+ - **CWE:** CWE-284
82
+
83
+ #### Description
84
+ Potential exposed admin panel or dashboard at https://www.fnstore.com.br/admin. Manual verification required.
85
+
86
+ #### Remediation
87
+ Restrict access to the admin panel using IP whitelisting or other access control mechanisms.
88
+
89
+ ---
90
+
91
+ ### [INFO] Protected Path Discovered
92
+ - **Category:** informational
93
+ - **Confidence:** medium
94
+ - **CWE:** CWE-204
95
+
96
+ #### Description
97
+ Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/wp-admin. This confirms the path exists but access is restricted.
98
+
99
+ #### Remediation
100
+ None required, but ensure that the 403 response does not leak information about the internal structure.
101
+
102
+ ---
103
+
104
+ ### [INFO] Protected Path Discovered
105
+ - **Category:** informational
106
+ - **Confidence:** medium
107
+ - **CWE:** CWE-204
108
+
109
+ #### Description
110
+ Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/config.php. This confirms the path exists but access is restricted.
111
+
112
+ #### Remediation
113
+ None required, but ensure that the 403 response does not leak information about the internal structure.
114
+
115
+ ---
116
+
117
+ ### [INFO] Protected Path Discovered
118
+ - **Category:** informational
119
+ - **Confidence:** medium
120
+ - **CWE:** CWE-204
121
+
122
+ #### Description
123
+ Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/phpinfo.php. This confirms the path exists but access is restricted.
124
+
125
+ #### Remediation
126
+ None required, but ensure that the 403 response does not leak information about the internal structure.
127
+
128
+ ---
129
+
@@ -1,9 +1,55 @@
1
1
  OMEN SECURITY REPORT
2
+ ====================
3
+ Target: https://www.fnstore.com.br/
4
+ Scan ID: OMEN-1774371576550
5
+ Date: 2026-03-24T16:59:36.550Z
6
+ Score: 71/100
7
+ Risk Level: Medium
2
8
 
3
- Target: Local Project
4
- Score: 60
5
- Risk: High
6
-
7
- Vulnerabilities:
8
- - Dangerous use of eval() detected in local-scanner.js at line 73
9
- - Potential SQL Injection (raw string concatenation) in local-scanner.js at line 79
9
+ VULNERABILITIES FOUND:
10
+ ----------------------
11
+ [HIGH] Content-Security-Policy Missing
12
+ Category: confirmed | Confidence: high
13
+ Description: CSP header is missing. Without a strict Content-Security-Policy, the application is highly vulnerable to Cross-Site Scripting (XSS) and data injection attacks.
14
+ Remediation: Define a strict Content-Security-Policy to restrict source domains for scripts, styles, and other resources.
15
+ ----------------------
16
+ [LOW] X-Frame-Options Missing
17
+ Category: hardening | Confidence: high
18
+ Description: Missing X-Frame-Options header. This allows the application to be embedded in an iframe on other domains, increasing Clickjacking risk.
19
+ Remediation: Set the X-Frame-Options header to DENY or SAMEORIGIN.
20
+ ----------------------
21
+ [LOW] X-Content-Type-Options Missing
22
+ Category: hardening | Confidence: high
23
+ Description: The X-Content-Type-Options: nosniff header is missing. This could allow the browser to "sniff" the content type, potentially leading to MIME-type sniffing attacks.
24
+ Remediation: Add the "X-Content-Type-Options: nosniff" header to all responses.
25
+ ----------------------
26
+ [HIGH] Permissive CORS Policy
27
+ Category: confirmed | Confidence: high
28
+ Description: The application allows Cross-Origin Resource Sharing from any domain (Access-Control-Allow-Origin: *).
29
+ Remediation: Restrict Access-Control-Allow-Origin to trusted domains only.
30
+ ----------------------
31
+ [INFO] Technology Stack Identified
32
+ Category: informational | Confidence: high
33
+ Description: Fingerprinting identified the following technologies: Vercel
34
+ Remediation: Minimal tech disclosure is recommended to prevent targeted attacks.
35
+ ----------------------
36
+ [MEDIUM] Potential Admin Panel Exposure
37
+ Category: probable | Confidence: low
38
+ Description: Potential exposed admin panel or dashboard at https://www.fnstore.com.br/admin. Manual verification required.
39
+ Remediation: Restrict access to the admin panel using IP whitelisting or other access control mechanisms.
40
+ ----------------------
41
+ [INFO] Protected Path Discovered
42
+ Category: informational | Confidence: medium
43
+ Description: Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/wp-admin. This confirms the path exists but access is restricted.
44
+ Remediation: None required, but ensure that the 403 response does not leak information about the internal structure.
45
+ ----------------------
46
+ [INFO] Protected Path Discovered
47
+ Category: informational | Confidence: medium
48
+ Description: Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/config.php. This confirms the path exists but access is restricted.
49
+ Remediation: None required, but ensure that the 403 response does not leak information about the internal structure.
50
+ ----------------------
51
+ [INFO] Protected Path Discovered
52
+ Category: informational | Confidence: medium
53
+ Description: Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/phpinfo.php. This confirms the path exists but access is restricted.
54
+ Remediation: None required, but ensure that the 403 response does not leak information about the internal structure.
55
+ ----------------------
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "omen-sec-cli",
3
- "version": "1.0.19",
3
+ "version": "1.0.21",
4
4
  "description": "OMEN — AI Security Engine",
5
5
  "engines": {
6
6
  "node": ">=20.0.0"
package/ui/banner.js CHANGED
@@ -9,7 +9,7 @@ export function showBanner() {
9
9
  ╚██████╔╝██║ ╚═╝ ██║███████╗██║ ╚████║
10
10
  `));
11
11
  console.log(chalk.cyan.bold(' OMEN — AI Security Engine '));
12
- console.log(chalk.gray(' Version: 1.0.19 \n'));
12
+ console.log(chalk.gray(' Version: 1.0.21 \n'));
13
13
  }
14
14
 
15
15
  export function showHelp() {