ship-safe 1.0.1 → 3.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +281 -23
- package/ai-defense/cost-protection.md +292 -0
- package/ai-defense/llm-security-checklist.md +324 -0
- package/ai-defense/prompt-injection-patterns.js +283 -0
- package/cli/bin/ship-safe.js +44 -2
- package/cli/commands/fix.js +216 -0
- package/cli/commands/guard.js +297 -0
- package/cli/commands/mcp.js +303 -0
- package/cli/commands/scan.js +231 -39
- package/cli/utils/entropy.js +126 -0
- package/cli/utils/output.js +10 -1
- package/cli/utils/patterns.js +376 -24
- package/configs/firebase/firestore-rules.txt +215 -0
- package/configs/firebase/security-checklist.md +236 -0
- package/configs/firebase/storage-rules.txt +206 -0
- package/configs/ship-safeignore-template +50 -0
- package/configs/supabase/rls-templates.sql +242 -0
- package/configs/supabase/secure-client.ts +225 -0
- package/configs/supabase/security-checklist.md +278 -0
- package/package.json +11 -2
- package/snippets/README.md +89 -25
- package/snippets/api-security/api-security-checklist.md +412 -0
- package/snippets/api-security/cors-config.ts +322 -0
- package/snippets/api-security/input-validation.ts +430 -0
- package/snippets/auth/jwt-checklist.md +322 -0
- package/snippets/rate-limiting/nextjs-middleware.ts +211 -0
- package/snippets/rate-limiting/upstash-ratelimit.ts +229 -0
|
@@ -0,0 +1,303 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* MCP Server
|
|
3
|
+
* ==========
|
|
4
|
+
*
|
|
5
|
+
* Exposes ship-safe as a Model Context Protocol (MCP) server.
|
|
6
|
+
* Allows AI editors (Claude Desktop, Cursor, Windsurf, Zed) to call
|
|
7
|
+
* ship-safe's security tools directly during conversations.
|
|
8
|
+
*
|
|
9
|
+
* USAGE:
|
|
10
|
+
* npx ship-safe mcp Start the MCP server (stdio transport)
|
|
11
|
+
*
|
|
12
|
+
* SETUP (Claude Desktop):
|
|
13
|
+
* Add to ~/Library/Application Support/Claude/claude_desktop_config.json:
|
|
14
|
+
* {
|
|
15
|
+
* "mcpServers": {
|
|
16
|
+
* "ship-safe": {
|
|
17
|
+
* "command": "npx",
|
|
18
|
+
* "args": ["ship-safe", "mcp"]
|
|
19
|
+
* }
|
|
20
|
+
* }
|
|
21
|
+
* }
|
|
22
|
+
*
|
|
23
|
+
* AVAILABLE TOOLS:
|
|
24
|
+
* scan_secrets - Scan a directory for leaked secrets
|
|
25
|
+
* get_checklist - Return the launch-day security checklist
|
|
26
|
+
* analyze_file - Analyze a single file for security issues
|
|
27
|
+
*
|
|
28
|
+
* PROTOCOL:
|
|
29
|
+
* JSON-RPC 2.0 over stdio (MCP spec: https://modelcontextprotocol.io)
|
|
30
|
+
*/
|
|
31
|
+
|
|
32
|
+
import fs from 'fs';
|
|
33
|
+
import path from 'path';
|
|
34
|
+
import { glob } from 'glob';
|
|
35
|
+
import { SECRET_PATTERNS, SKIP_DIRS, SKIP_EXTENSIONS, TEST_FILE_PATTERNS, MAX_FILE_SIZE } from '../utils/patterns.js';
|
|
36
|
+
import { isHighEntropyMatch } from '../utils/entropy.js';
|
|
37
|
+
|
|
38
|
+
// =============================================================================
|
|
39
|
+
// MCP TOOL DEFINITIONS
|
|
40
|
+
// =============================================================================
|
|
41
|
+
|
|
42
|
+
const TOOLS = [
|
|
43
|
+
{
|
|
44
|
+
name: 'scan_secrets',
|
|
45
|
+
description: 'Scan a directory or file for leaked secrets, API keys, and credentials. Returns structured findings with severity, file location, and remediation advice.',
|
|
46
|
+
inputSchema: {
|
|
47
|
+
type: 'object',
|
|
48
|
+
properties: {
|
|
49
|
+
path: {
|
|
50
|
+
type: 'string',
|
|
51
|
+
description: 'The directory or file path to scan. Use "." for the current directory.',
|
|
52
|
+
},
|
|
53
|
+
includeTests: {
|
|
54
|
+
type: 'boolean',
|
|
55
|
+
description: 'Whether to include test files in the scan (default: false)',
|
|
56
|
+
},
|
|
57
|
+
},
|
|
58
|
+
required: ['path'],
|
|
59
|
+
},
|
|
60
|
+
},
|
|
61
|
+
{
|
|
62
|
+
name: 'get_checklist',
|
|
63
|
+
description: 'Return the ship-safe launch-day security checklist as structured data. Use this to guide users through pre-launch security checks.',
|
|
64
|
+
inputSchema: {
|
|
65
|
+
type: 'object',
|
|
66
|
+
properties: {},
|
|
67
|
+
},
|
|
68
|
+
},
|
|
69
|
+
{
|
|
70
|
+
name: 'analyze_file',
|
|
71
|
+
description: 'Analyze a single file for security issues including secrets, hardcoded credentials, and dangerous patterns.',
|
|
72
|
+
inputSchema: {
|
|
73
|
+
type: 'object',
|
|
74
|
+
properties: {
|
|
75
|
+
path: {
|
|
76
|
+
type: 'string',
|
|
77
|
+
description: 'The absolute or relative path to the file to analyze.',
|
|
78
|
+
},
|
|
79
|
+
},
|
|
80
|
+
required: ['path'],
|
|
81
|
+
},
|
|
82
|
+
},
|
|
83
|
+
];
|
|
84
|
+
|
|
85
|
+
// =============================================================================
|
|
86
|
+
// TOOL IMPLEMENTATIONS
|
|
87
|
+
// =============================================================================
|
|
88
|
+
|
|
89
|
+
async function scanSecrets({ path: targetPath, includeTests = false }) {
|
|
90
|
+
const absolutePath = path.resolve(targetPath);
|
|
91
|
+
|
|
92
|
+
if (!fs.existsSync(absolutePath)) {
|
|
93
|
+
return { error: `Path does not exist: ${absolutePath}` };
|
|
94
|
+
}
|
|
95
|
+
|
|
96
|
+
const stat = fs.statSync(absolutePath);
|
|
97
|
+
const files = stat.isFile()
|
|
98
|
+
? [absolutePath]
|
|
99
|
+
: await findFiles(absolutePath, includeTests);
|
|
100
|
+
|
|
101
|
+
const results = [];
|
|
102
|
+
|
|
103
|
+
for (const file of files) {
|
|
104
|
+
const findings = scanFile(file);
|
|
105
|
+
if (findings.length > 0) {
|
|
106
|
+
results.push({ file: path.relative(process.cwd(), file), findings });
|
|
107
|
+
}
|
|
108
|
+
}
|
|
109
|
+
|
|
110
|
+
return {
|
|
111
|
+
filesScanned: files.length,
|
|
112
|
+
totalFindings: results.reduce((sum, r) => sum + r.findings.length, 0),
|
|
113
|
+
clean: results.length === 0,
|
|
114
|
+
findings: results,
|
|
115
|
+
summary: results.length === 0
|
|
116
|
+
? 'No secrets detected.'
|
|
117
|
+
: `Found ${results.reduce((s, r) => s + r.findings.length, 0)} secret(s) across ${results.length} file(s).`,
|
|
118
|
+
remediation: results.length > 0
|
|
119
|
+
? 'Move secrets to environment variables. Add .env to .gitignore. Rotate any already-committed credentials.'
|
|
120
|
+
: null,
|
|
121
|
+
};
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
function getChecklist() {
|
|
125
|
+
return {
|
|
126
|
+
title: 'Ship Safe Launch-Day Security Checklist',
|
|
127
|
+
items: [
|
|
128
|
+
{ id: 1, category: 'Secrets', check: 'No API keys hardcoded in source code', command: 'npx ship-safe scan .' },
|
|
129
|
+
{ id: 2, category: 'Secrets', check: '.env file is in .gitignore', command: null },
|
|
130
|
+
{ id: 3, category: 'Secrets', check: '.env.example exists with placeholder values', command: 'npx ship-safe fix' },
|
|
131
|
+
{ id: 4, category: 'Database', check: 'Row Level Security (RLS) enabled on all Supabase tables', command: null },
|
|
132
|
+
{ id: 5, category: 'Database', check: 'Service role key is server-side only (never in frontend)', command: null },
|
|
133
|
+
{ id: 6, category: 'Auth', check: 'Authentication required on all sensitive API routes', command: null },
|
|
134
|
+
{ id: 7, category: 'Auth', check: 'JWT tokens expire within 24 hours', command: null },
|
|
135
|
+
{ id: 8, category: 'Headers', check: 'Security headers configured (CSP, X-Frame-Options, HSTS)', command: 'npx ship-safe init --headers' },
|
|
136
|
+
{ id: 9, category: 'API', check: 'Rate limiting implemented on auth and AI endpoints', command: null },
|
|
137
|
+
{ id: 10, category: 'API', check: 'Input validation on all API endpoints', command: null },
|
|
138
|
+
{ id: 11, category: 'AI', check: 'Token limits set on all LLM API calls', command: null },
|
|
139
|
+
{ id: 12, category: 'AI', check: 'Budget caps configured in AI provider dashboard', command: null },
|
|
140
|
+
{ id: 13, category: 'CI/CD', check: 'ship-safe scan runs in CI pipeline', command: null },
|
|
141
|
+
{ id: 14, category: 'CI/CD', check: 'Pre-push hook installed', command: 'npx ship-safe guard' },
|
|
142
|
+
],
|
|
143
|
+
};
|
|
144
|
+
}
|
|
145
|
+
|
|
146
|
+
async function analyzeFile({ path: filePath }) {
|
|
147
|
+
const absolutePath = path.resolve(filePath);
|
|
148
|
+
|
|
149
|
+
if (!fs.existsSync(absolutePath)) {
|
|
150
|
+
return { error: `File does not exist: ${absolutePath}` };
|
|
151
|
+
}
|
|
152
|
+
|
|
153
|
+
const findings = scanFile(absolutePath);
|
|
154
|
+
|
|
155
|
+
return {
|
|
156
|
+
file: filePath,
|
|
157
|
+
totalFindings: findings.length,
|
|
158
|
+
clean: findings.length === 0,
|
|
159
|
+
findings,
|
|
160
|
+
summary: findings.length === 0
|
|
161
|
+
? `No secrets detected in ${path.basename(filePath)}.`
|
|
162
|
+
: `Found ${findings.length} potential secret(s) in ${path.basename(filePath)}.`,
|
|
163
|
+
};
|
|
164
|
+
}
|
|
165
|
+
|
|
166
|
+
// =============================================================================
|
|
167
|
+
// SCAN UTILITIES (shared with scan command)
|
|
168
|
+
// =============================================================================
|
|
169
|
+
|
|
170
|
+
async function findFiles(rootPath, includeTests) {
|
|
171
|
+
const globIgnore = Array.from(SKIP_DIRS).map(dir => `**/${dir}/**`);
|
|
172
|
+
const files = await glob('**/*', { cwd: rootPath, absolute: true, nodir: true, ignore: globIgnore, dot: true });
|
|
173
|
+
|
|
174
|
+
return files.filter(file => {
|
|
175
|
+
const ext = path.extname(file).toLowerCase();
|
|
176
|
+
if (SKIP_EXTENSIONS.has(ext)) return false;
|
|
177
|
+
const basename = path.basename(file);
|
|
178
|
+
if (basename.endsWith('.min.js') || basename.endsWith('.min.css')) return false;
|
|
179
|
+
if (!includeTests && TEST_FILE_PATTERNS.some(p => p.test(file))) return false;
|
|
180
|
+
try {
|
|
181
|
+
return fs.statSync(file).size <= MAX_FILE_SIZE;
|
|
182
|
+
} catch { return false; }
|
|
183
|
+
});
|
|
184
|
+
}
|
|
185
|
+
|
|
186
|
+
function scanFile(filePath) {
|
|
187
|
+
const findings = [];
|
|
188
|
+
try {
|
|
189
|
+
const content = fs.readFileSync(filePath, 'utf-8');
|
|
190
|
+
const lines = content.split('\n');
|
|
191
|
+
|
|
192
|
+
for (let lineNum = 0; lineNum < lines.length; lineNum++) {
|
|
193
|
+
const line = lines[lineNum];
|
|
194
|
+
if (/ship-safe-ignore/i.test(line)) continue;
|
|
195
|
+
|
|
196
|
+
for (const pattern of SECRET_PATTERNS) {
|
|
197
|
+
pattern.pattern.lastIndex = 0;
|
|
198
|
+
let match;
|
|
199
|
+
while ((match = pattern.pattern.exec(line)) !== null) {
|
|
200
|
+
if (pattern.requiresEntropyCheck && !isHighEntropyMatch(match[0])) continue;
|
|
201
|
+
findings.push({
|
|
202
|
+
line: lineNum + 1,
|
|
203
|
+
type: pattern.name,
|
|
204
|
+
severity: pattern.severity,
|
|
205
|
+
description: pattern.description,
|
|
206
|
+
fix: 'Move to environment variable. Never commit to source control.',
|
|
207
|
+
});
|
|
208
|
+
}
|
|
209
|
+
}
|
|
210
|
+
}
|
|
211
|
+
} catch {}
|
|
212
|
+
return findings;
|
|
213
|
+
}
|
|
214
|
+
|
|
215
|
+
// =============================================================================
|
|
216
|
+
// MCP STDIO SERVER
|
|
217
|
+
// =============================================================================
|
|
218
|
+
|
|
219
|
+
export async function mcpCommand() {
|
|
220
|
+
// MCP uses JSON-RPC 2.0 over stdio
|
|
221
|
+
process.stdin.setEncoding('utf-8');
|
|
222
|
+
|
|
223
|
+
let buffer = '';
|
|
224
|
+
|
|
225
|
+
process.stdin.on('data', async (chunk) => {
|
|
226
|
+
buffer += chunk;
|
|
227
|
+
|
|
228
|
+
// MCP messages are newline-delimited JSON
|
|
229
|
+
const lines = buffer.split('\n');
|
|
230
|
+
buffer = lines.pop(); // Keep incomplete line in buffer
|
|
231
|
+
|
|
232
|
+
for (const line of lines) {
|
|
233
|
+
if (!line.trim()) continue;
|
|
234
|
+
|
|
235
|
+
try {
|
|
236
|
+
const request = JSON.parse(line);
|
|
237
|
+
const response = await handleRequest(request);
|
|
238
|
+
process.stdout.write(JSON.stringify(response) + '\n');
|
|
239
|
+
} catch (err) {
|
|
240
|
+
const errorResponse = {
|
|
241
|
+
jsonrpc: '2.0',
|
|
242
|
+
id: null,
|
|
243
|
+
error: { code: -32700, message: 'Parse error', data: err.message },
|
|
244
|
+
};
|
|
245
|
+
process.stdout.write(JSON.stringify(errorResponse) + '\n');
|
|
246
|
+
}
|
|
247
|
+
}
|
|
248
|
+
});
|
|
249
|
+
|
|
250
|
+
process.stdin.on('end', () => process.exit(0));
|
|
251
|
+
}
|
|
252
|
+
|
|
253
|
+
async function handleRequest(request) {
|
|
254
|
+
const { jsonrpc, id, method, params } = request;
|
|
255
|
+
|
|
256
|
+
const respond = (result) => ({ jsonrpc: '2.0', id, result });
|
|
257
|
+
const respondError = (code, message) => ({ jsonrpc: '2.0', id, error: { code, message } });
|
|
258
|
+
|
|
259
|
+
switch (method) {
|
|
260
|
+
case 'initialize':
|
|
261
|
+
return respond({
|
|
262
|
+
protocolVersion: '2024-11-05',
|
|
263
|
+
capabilities: { tools: {} },
|
|
264
|
+
serverInfo: { name: 'ship-safe', version: '3.0.0' },
|
|
265
|
+
});
|
|
266
|
+
|
|
267
|
+
case 'tools/list':
|
|
268
|
+
return respond({ tools: TOOLS });
|
|
269
|
+
|
|
270
|
+
case 'tools/call': {
|
|
271
|
+
const { name, arguments: args } = params;
|
|
272
|
+
|
|
273
|
+
try {
|
|
274
|
+
let result;
|
|
275
|
+
switch (name) {
|
|
276
|
+
case 'scan_secrets':
|
|
277
|
+
result = await scanSecrets(args);
|
|
278
|
+
break;
|
|
279
|
+
case 'get_checklist':
|
|
280
|
+
result = getChecklist();
|
|
281
|
+
break;
|
|
282
|
+
case 'analyze_file':
|
|
283
|
+
result = await analyzeFile(args);
|
|
284
|
+
break;
|
|
285
|
+
default:
|
|
286
|
+
return respondError(-32601, `Unknown tool: ${name}`);
|
|
287
|
+
}
|
|
288
|
+
|
|
289
|
+
return respond({
|
|
290
|
+
content: [{ type: 'text', text: JSON.stringify(result, null, 2) }],
|
|
291
|
+
});
|
|
292
|
+
} catch (err) {
|
|
293
|
+
return respondError(-32603, err.message);
|
|
294
|
+
}
|
|
295
|
+
}
|
|
296
|
+
|
|
297
|
+
case 'notifications/initialized':
|
|
298
|
+
return null; // No response needed for notifications
|
|
299
|
+
|
|
300
|
+
default:
|
|
301
|
+
return respondError(-32601, `Method not found: ${method}`);
|
|
302
|
+
}
|
|
303
|
+
}
|