omen-sec-cli 1.0.19 → 1.0.21
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.omen/context.json +565 -0
- package/README.md +2 -2
- package/bin/index.js +1 -1
- package/core/discover/stack-detector.js +56 -7
- package/core/engine-v2.js +38 -9
- package/core/remote-scanner.js +115 -85
- package/core/reporters/fix-plan-reporter.js +1 -1
- package/core/ui-server.js +12 -8
- package/omen-reports/omen-fix-plan.md +139 -0
- package/omen-reports/omen-report.json +557 -22
- package/omen-reports/omen-report.md +129 -0
- package/omen-reports/omen-report.txt +53 -7
- package/package.json +1 -1
- package/ui/banner.js +1 -1
|
@@ -0,0 +1,129 @@
|
|
|
1
|
+
# OMEN Audit Report: https://www.fnstore.com.br/
|
|
2
|
+
|
|
3
|
+
**Scan ID:** `OMEN-1774371576550`
|
|
4
|
+
**Timestamp:** 2026-03-24T16:59:36.550Z
|
|
5
|
+
**Security Score:** 71/100
|
|
6
|
+
**Risk Level:** Medium
|
|
7
|
+
|
|
8
|
+
## Executive Summary
|
|
9
|
+
The security audit identified 9 total issues. Of these, 2 are confirmed vulnerabilities that require immediate attention.
|
|
10
|
+
|
|
11
|
+
## Detailed Findings
|
|
12
|
+
|
|
13
|
+
### [HIGH] Content-Security-Policy Missing
|
|
14
|
+
- **Category:** confirmed
|
|
15
|
+
- **Confidence:** high
|
|
16
|
+
- **CWE:** CWE-1022
|
|
17
|
+
|
|
18
|
+
#### Description
|
|
19
|
+
CSP header is missing. Without a strict Content-Security-Policy, the application is highly vulnerable to Cross-Site Scripting (XSS) and data injection attacks.
|
|
20
|
+
|
|
21
|
+
#### Remediation
|
|
22
|
+
Define a strict Content-Security-Policy to restrict source domains for scripts, styles, and other resources.
|
|
23
|
+
|
|
24
|
+
---
|
|
25
|
+
|
|
26
|
+
### [LOW] X-Frame-Options Missing
|
|
27
|
+
- **Category:** hardening
|
|
28
|
+
- **Confidence:** high
|
|
29
|
+
- **CWE:** CWE-1021
|
|
30
|
+
|
|
31
|
+
#### Description
|
|
32
|
+
Missing X-Frame-Options header. This allows the application to be embedded in an iframe on other domains, increasing Clickjacking risk.
|
|
33
|
+
|
|
34
|
+
#### Remediation
|
|
35
|
+
Set the X-Frame-Options header to DENY or SAMEORIGIN.
|
|
36
|
+
|
|
37
|
+
---
|
|
38
|
+
|
|
39
|
+
### [LOW] X-Content-Type-Options Missing
|
|
40
|
+
- **Category:** hardening
|
|
41
|
+
- **Confidence:** high
|
|
42
|
+
- **CWE:** CWE-116
|
|
43
|
+
|
|
44
|
+
#### Description
|
|
45
|
+
The X-Content-Type-Options: nosniff header is missing. This could allow the browser to "sniff" the content type, potentially leading to MIME-type sniffing attacks.
|
|
46
|
+
|
|
47
|
+
#### Remediation
|
|
48
|
+
Add the "X-Content-Type-Options: nosniff" header to all responses.
|
|
49
|
+
|
|
50
|
+
---
|
|
51
|
+
|
|
52
|
+
### [HIGH] Permissive CORS Policy
|
|
53
|
+
- **Category:** confirmed
|
|
54
|
+
- **Confidence:** high
|
|
55
|
+
- **CWE:** CWE-942
|
|
56
|
+
|
|
57
|
+
#### Description
|
|
58
|
+
The application allows Cross-Origin Resource Sharing from any domain (Access-Control-Allow-Origin: *).
|
|
59
|
+
|
|
60
|
+
#### Remediation
|
|
61
|
+
Restrict Access-Control-Allow-Origin to trusted domains only.
|
|
62
|
+
|
|
63
|
+
---
|
|
64
|
+
|
|
65
|
+
### [INFO] Technology Stack Identified
|
|
66
|
+
- **Category:** informational
|
|
67
|
+
- **Confidence:** high
|
|
68
|
+
- **CWE:** CWE-200
|
|
69
|
+
|
|
70
|
+
#### Description
|
|
71
|
+
Fingerprinting identified the following technologies: Vercel
|
|
72
|
+
|
|
73
|
+
#### Remediation
|
|
74
|
+
Minimal tech disclosure is recommended to prevent targeted attacks.
|
|
75
|
+
|
|
76
|
+
---
|
|
77
|
+
|
|
78
|
+
### [MEDIUM] Potential Admin Panel Exposure
|
|
79
|
+
- **Category:** probable
|
|
80
|
+
- **Confidence:** low
|
|
81
|
+
- **CWE:** CWE-284
|
|
82
|
+
|
|
83
|
+
#### Description
|
|
84
|
+
Potential exposed admin panel or dashboard at https://www.fnstore.com.br/admin. Manual verification required.
|
|
85
|
+
|
|
86
|
+
#### Remediation
|
|
87
|
+
Restrict access to the admin panel using IP whitelisting or other access control mechanisms.
|
|
88
|
+
|
|
89
|
+
---
|
|
90
|
+
|
|
91
|
+
### [INFO] Protected Path Discovered
|
|
92
|
+
- **Category:** informational
|
|
93
|
+
- **Confidence:** medium
|
|
94
|
+
- **CWE:** CWE-204
|
|
95
|
+
|
|
96
|
+
#### Description
|
|
97
|
+
Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/wp-admin. This confirms the path exists but access is restricted.
|
|
98
|
+
|
|
99
|
+
#### Remediation
|
|
100
|
+
None required, but ensure that the 403 response does not leak information about the internal structure.
|
|
101
|
+
|
|
102
|
+
---
|
|
103
|
+
|
|
104
|
+
### [INFO] Protected Path Discovered
|
|
105
|
+
- **Category:** informational
|
|
106
|
+
- **Confidence:** medium
|
|
107
|
+
- **CWE:** CWE-204
|
|
108
|
+
|
|
109
|
+
#### Description
|
|
110
|
+
Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/config.php. This confirms the path exists but access is restricted.
|
|
111
|
+
|
|
112
|
+
#### Remediation
|
|
113
|
+
None required, but ensure that the 403 response does not leak information about the internal structure.
|
|
114
|
+
|
|
115
|
+
---
|
|
116
|
+
|
|
117
|
+
### [INFO] Protected Path Discovered
|
|
118
|
+
- **Category:** informational
|
|
119
|
+
- **Confidence:** medium
|
|
120
|
+
- **CWE:** CWE-204
|
|
121
|
+
|
|
122
|
+
#### Description
|
|
123
|
+
Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/phpinfo.php. This confirms the path exists but access is restricted.
|
|
124
|
+
|
|
125
|
+
#### Remediation
|
|
126
|
+
None required, but ensure that the 403 response does not leak information about the internal structure.
|
|
127
|
+
|
|
128
|
+
---
|
|
129
|
+
|
|
@@ -1,9 +1,55 @@
|
|
|
1
1
|
OMEN SECURITY REPORT
|
|
2
|
+
====================
|
|
3
|
+
Target: https://www.fnstore.com.br/
|
|
4
|
+
Scan ID: OMEN-1774371576550
|
|
5
|
+
Date: 2026-03-24T16:59:36.550Z
|
|
6
|
+
Score: 71/100
|
|
7
|
+
Risk Level: Medium
|
|
2
8
|
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
-
|
|
9
|
-
|
|
9
|
+
VULNERABILITIES FOUND:
|
|
10
|
+
----------------------
|
|
11
|
+
[HIGH] Content-Security-Policy Missing
|
|
12
|
+
Category: confirmed | Confidence: high
|
|
13
|
+
Description: CSP header is missing. Without a strict Content-Security-Policy, the application is highly vulnerable to Cross-Site Scripting (XSS) and data injection attacks.
|
|
14
|
+
Remediation: Define a strict Content-Security-Policy to restrict source domains for scripts, styles, and other resources.
|
|
15
|
+
----------------------
|
|
16
|
+
[LOW] X-Frame-Options Missing
|
|
17
|
+
Category: hardening | Confidence: high
|
|
18
|
+
Description: Missing X-Frame-Options header. This allows the application to be embedded in an iframe on other domains, increasing Clickjacking risk.
|
|
19
|
+
Remediation: Set the X-Frame-Options header to DENY or SAMEORIGIN.
|
|
20
|
+
----------------------
|
|
21
|
+
[LOW] X-Content-Type-Options Missing
|
|
22
|
+
Category: hardening | Confidence: high
|
|
23
|
+
Description: The X-Content-Type-Options: nosniff header is missing. This could allow the browser to "sniff" the content type, potentially leading to MIME-type sniffing attacks.
|
|
24
|
+
Remediation: Add the "X-Content-Type-Options: nosniff" header to all responses.
|
|
25
|
+
----------------------
|
|
26
|
+
[HIGH] Permissive CORS Policy
|
|
27
|
+
Category: confirmed | Confidence: high
|
|
28
|
+
Description: The application allows Cross-Origin Resource Sharing from any domain (Access-Control-Allow-Origin: *).
|
|
29
|
+
Remediation: Restrict Access-Control-Allow-Origin to trusted domains only.
|
|
30
|
+
----------------------
|
|
31
|
+
[INFO] Technology Stack Identified
|
|
32
|
+
Category: informational | Confidence: high
|
|
33
|
+
Description: Fingerprinting identified the following technologies: Vercel
|
|
34
|
+
Remediation: Minimal tech disclosure is recommended to prevent targeted attacks.
|
|
35
|
+
----------------------
|
|
36
|
+
[MEDIUM] Potential Admin Panel Exposure
|
|
37
|
+
Category: probable | Confidence: low
|
|
38
|
+
Description: Potential exposed admin panel or dashboard at https://www.fnstore.com.br/admin. Manual verification required.
|
|
39
|
+
Remediation: Restrict access to the admin panel using IP whitelisting or other access control mechanisms.
|
|
40
|
+
----------------------
|
|
41
|
+
[INFO] Protected Path Discovered
|
|
42
|
+
Category: informational | Confidence: medium
|
|
43
|
+
Description: Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/wp-admin. This confirms the path exists but access is restricted.
|
|
44
|
+
Remediation: None required, but ensure that the 403 response does not leak information about the internal structure.
|
|
45
|
+
----------------------
|
|
46
|
+
[INFO] Protected Path Discovered
|
|
47
|
+
Category: informational | Confidence: medium
|
|
48
|
+
Description: Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/config.php. This confirms the path exists but access is restricted.
|
|
49
|
+
Remediation: None required, but ensure that the 403 response does not leak information about the internal structure.
|
|
50
|
+
----------------------
|
|
51
|
+
[INFO] Protected Path Discovered
|
|
52
|
+
Category: informational | Confidence: medium
|
|
53
|
+
Description: Potential protected path discovered (403 Forbidden): https://www.fnstore.com.br/phpinfo.php. This confirms the path exists but access is restricted.
|
|
54
|
+
Remediation: None required, but ensure that the 403 response does not leak information about the internal structure.
|
|
55
|
+
----------------------
|
package/package.json
CHANGED
package/ui/banner.js
CHANGED
|
@@ -9,7 +9,7 @@ export function showBanner() {
|
|
|
9
9
|
╚██████╔╝██║ ╚═╝ ██║███████╗██║ ╚████║
|
|
10
10
|
`));
|
|
11
11
|
console.log(chalk.cyan.bold(' OMEN — AI Security Engine '));
|
|
12
|
-
console.log(chalk.gray(' Version: 1.0.
|
|
12
|
+
console.log(chalk.gray(' Version: 1.0.21 \n'));
|
|
13
13
|
}
|
|
14
14
|
|
|
15
15
|
export function showHelp() {
|