ship-safe 6.3.0 → 7.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,304 @@
1
+ /**
2
+ * Memory Poisoning Detection Agent
3
+ * ==================================
4
+ *
5
+ * Detects instruction injection in AI agent memory and context files.
6
+ *
7
+ * Memory poisoning occurs when an adversary implants false or malicious
8
+ * instructions into an agent's persistent storage — the agent "learns"
9
+ * the instruction and recalls it in future sessions.
10
+ *
11
+ * Targets:
12
+ * - Claude Code memory files (.claude/memory/*.md, CLAUDE.md)
13
+ * - Cursor rules (.cursorrules, .cursor/rules/*.mdc)
14
+ * - Continue config (.continue/config.json, .continue/rules/*.md)
15
+ * - Windsurf rules (.windsurfrules)
16
+ * - Cody config (.cody/)
17
+ * - Gemini CLI (.gemini/)
18
+ * - Project docs that agents ingest (README, CONTRIBUTING, docs/)
19
+ *
20
+ * Attack vectors detected:
21
+ * 1. Direct instruction injection — "ignore previous instructions"
22
+ * 2. Hidden directives in markdown — invisible chars, HTML comments
23
+ * 3. Exfiltration instructions — "send", "upload", "POST to"
24
+ * 4. Tool abuse instructions — "run bash", "write to", "delete"
25
+ * 5. Persona hijacking — "you are now", "your new role"
26
+ * 6. Memory persistence — instructions designed to survive context resets
27
+ *
28
+ * Maps to: OWASP Agentic ASI01 (Agent Goal Hijacking),
29
+ * ASI05 (Memory/Context Poisoning)
30
+ */
31
+
32
+ import path from 'path';
33
+ import fg from 'fast-glob';
34
+ import { BaseAgent, createFinding } from './base-agent.js';
35
+
36
+ // =============================================================================
37
+ // MEMORY / CONTEXT FILES TO SCAN
38
+ // =============================================================================
39
+
40
+ const MEMORY_GLOBS = [
41
+ // Claude Code
42
+ '.claude/memory/*.md',
43
+ '.claude/commands/*.md',
44
+ 'CLAUDE.md',
45
+ // Cursor
46
+ '.cursorrules',
47
+ '.cursor/rules/*.mdc',
48
+ '.cursor/rules/*.md',
49
+ // Windsurf
50
+ '.windsurfrules',
51
+ // Continue
52
+ '.continue/config.json',
53
+ '.continue/rules/*.md',
54
+ // Cody
55
+ '.cody/*.md',
56
+ '.cody/config.json',
57
+ // Gemini CLI
58
+ '.gemini/*.md',
59
+ '.gemini/settings.json',
60
+ // Copilot
61
+ '.github/copilot-instructions.md',
62
+ // Aider
63
+ '.aider.conf.yml',
64
+ ];
65
+
66
+ // Project docs that agents commonly ingest as context
67
+ const DOC_GLOBS = [
68
+ 'README.md',
69
+ 'CONTRIBUTING.md',
70
+ 'docs/**/*.md',
71
+ 'AGENTS.md',
72
+ '.github/PULL_REQUEST_TEMPLATE.md',
73
+ '.github/ISSUE_TEMPLATE/*.md',
74
+ ];
75
+
76
+ // =============================================================================
77
+ // DETECTION PATTERNS
78
+ // =============================================================================
79
+
80
+ const INJECTION_PATTERNS = [
81
+ {
82
+ regex: /(?:ignore|disregard|forget|override)\s+(?:all\s+)?(?:previous|prior|above|earlier|system)\s+(?:instructions?|rules?|prompts?|constraints?|guidelines?)/gi,
83
+ rule: 'MEMORY_POISON_OVERRIDE',
84
+ title: 'Instruction Override in Agent Memory',
85
+ severity: 'critical',
86
+ description: 'File contains instructions to override previous agent rules. This is a classic prompt injection pattern that persists in agent memory.',
87
+ owasp: 'ASI01',
88
+ cwe: 'CWE-74',
89
+ fix: 'Remove the override instruction. If intentional, use the agent\'s official configuration mechanism instead.',
90
+ },
91
+ {
92
+ regex: /(?:you\s+are\s+now|your\s+new\s+(?:role|persona|identity)|from\s+now\s+on\s+you\s+(?:are|will|must|should))\s+/gi,
93
+ rule: 'MEMORY_POISON_PERSONA',
94
+ title: 'Persona Hijacking in Agent Memory',
95
+ severity: 'high',
96
+ description: 'File attempts to redefine the agent\'s persona or role. If this file is ingested as context, the agent may adopt the injected persona in future sessions.',
97
+ owasp: 'ASI01',
98
+ cwe: 'CWE-74',
99
+ fix: 'Remove the persona redefinition. Use the agent\'s system prompt or official configuration to set roles.',
100
+ },
101
+ {
102
+ regex: /(?:send|upload|post|transmit|exfiltrate|forward)\s+(?:all|any|the|this)?\s*(?:code|data|files?|contents?|secrets?|keys?|tokens?|credentials?|env|environment)\s+(?:to|via|using|through)\s+/gi,
103
+ rule: 'MEMORY_POISON_EXFILTRATE',
104
+ title: 'Exfiltration Instruction in Agent Memory',
105
+ severity: 'critical',
106
+ description: 'File instructs an agent to exfiltrate data to an external destination. If persisted in memory, the agent may execute this across sessions.',
107
+ owasp: 'ASI01',
108
+ cwe: 'CWE-200',
109
+ fix: 'Remove the exfiltration instruction immediately. Audit agent memory for other injected directives.',
110
+ },
111
+ {
112
+ regex: /(?:do\s+not|don'?t|never)\s+(?:tell|inform|show|reveal|display|mention|report|log)\s+(?:the\s+user|anyone|them)/gi,
113
+ rule: 'MEMORY_POISON_SUPPRESS',
114
+ title: 'Output Suppression Instruction',
115
+ severity: 'critical',
116
+ description: 'File instructs the agent to hide actions from the user. This matches the ToxicSkills "output suppression" pattern — the agent does something harmful but doesn\'t report it.',
117
+ owasp: 'ASI01',
118
+ cwe: 'CWE-200',
119
+ fix: 'Remove the suppression instruction. Agents should always report their actions transparently.',
120
+ },
121
+ {
122
+ regex: /(?:whenever|every\s+time|always|each\s+time)\s+(?:you|the\s+agent)\s+(?:start|begin|open|run|execute|encounter)/gi,
123
+ rule: 'MEMORY_POISON_PERSISTENT',
124
+ title: 'Persistent Trigger Instruction',
125
+ severity: 'high',
126
+ description: 'File contains instructions designed to trigger on every session or action — a hallmark of persistent memory poisoning. Unlike a one-time injection, this survives context resets.',
127
+ owasp: 'ASI05',
128
+ cwe: 'CWE-74',
129
+ fix: 'Remove the persistent trigger. If you need recurring behavior, configure it through the agent\'s official hook or startup mechanism.',
130
+ },
131
+ {
132
+ regex: /(?:run|execute|invoke|call|use)\s+(?:bash|shell|terminal|cmd|system|exec|subprocess|os\.system|child_process)/gi,
133
+ rule: 'MEMORY_POISON_TOOL_ABUSE',
134
+ title: 'Shell Execution Instruction in Memory',
135
+ severity: 'high',
136
+ description: 'File instructs the agent to execute shell commands. If persisted in memory, this enables remote code execution via prompt injection.',
137
+ owasp: 'ASI02',
138
+ cwe: 'CWE-78',
139
+ fix: 'Remove direct shell execution instructions. Use the agent\'s sandboxed tool API instead.',
140
+ },
141
+ {
142
+ regex: /(?:fetch|curl|wget|http\.get|axios\.get|request)\s*\(\s*['"`]https?:\/\//gi,
143
+ rule: 'MEMORY_POISON_NETWORK',
144
+ title: 'Network Request Instruction in Memory',
145
+ severity: 'high',
146
+ description: 'File instructs the agent to make network requests to hardcoded URLs. A poisoned memory file can use this to phone home or exfiltrate context.',
147
+ owasp: 'ASI01',
148
+ cwe: 'CWE-918',
149
+ fix: 'Remove the hardcoded network request. If the agent needs to fetch data, configure it through approved MCP servers or tools.',
150
+ },
151
+ ];
152
+
153
+ // Hidden content patterns (invisible chars, encoded payloads)
154
+ const HIDDEN_CONTENT_PATTERNS = [
155
+ {
156
+ // Unicode zero-width chars used to hide instructions
157
+ regex: /[\u200B\u200C\u200D\u2060\uFEFF]{3,}/g,
158
+ rule: 'MEMORY_HIDDEN_UNICODE',
159
+ title: 'Hidden Unicode Content in Agent File',
160
+ severity: 'critical',
161
+ description: 'File contains clusters of zero-width Unicode characters. These are invisible to humans but may encode hidden instructions that the agent processes.',
162
+ owasp: 'ASI01',
163
+ cwe: 'CWE-116',
164
+ fix: 'Strip all zero-width characters from this file. Use a hex editor to inspect for hidden content.',
165
+ },
166
+ {
167
+ // HTML comments in markdown that could contain injected instructions
168
+ regex: /<!--[\s\S]*?(?:ignore|override|system|role|always|execute|send\s+to|curl|bash)[\s\S]*?-->/gi,
169
+ rule: 'MEMORY_HIDDEN_COMMENT',
170
+ title: 'Suspicious HTML Comment in Agent File',
171
+ severity: 'high',
172
+ description: 'An HTML comment contains what appears to be an injected instruction. Some agents process HTML comments as context, making this a viable injection vector.',
173
+ owasp: 'ASI05',
174
+ cwe: 'CWE-74',
175
+ fix: 'Remove the suspicious HTML comment or move the content to a visible location.',
176
+ },
177
+ {
178
+ // Base64 encoded content in markdown/config files
179
+ regex: /(?:^|[\s"':=])([A-Za-z0-9+/]{60,}={0,2})(?:[\s"',]|$)/gm,
180
+ rule: 'MEMORY_HIDDEN_BASE64',
181
+ title: 'Base64-Encoded Content in Agent File',
182
+ severity: 'medium',
183
+ description: 'File contains a long base64-encoded string. This could hide instructions or payloads that the agent decodes and executes.',
184
+ owasp: 'ASI05',
185
+ cwe: 'CWE-116',
186
+ confidence: 'medium',
187
+ fix: 'Decode the base64 content and verify it is benign. Remove if it contains instructions or executable content.',
188
+ },
189
+ ];
190
+
191
+ // =============================================================================
192
+ // AGENT
193
+ // =============================================================================
194
+
195
+ export class MemoryPoisoningAgent extends BaseAgent {
196
+ constructor() {
197
+ super(
198
+ 'MemoryPoisoningAgent',
199
+ 'Detects instruction injection in AI agent memory and context files',
200
+ 'agentic'
201
+ );
202
+ }
203
+
204
+ shouldRun() {
205
+ return true; // Always run — memory poisoning applies to any project
206
+ }
207
+
208
+ async analyze(context) {
209
+ const { rootPath } = context;
210
+ const findings = [];
211
+
212
+ // Discover all memory/context files
213
+ const memoryFiles = await fg(MEMORY_GLOBS, {
214
+ cwd: rootPath,
215
+ absolute: true,
216
+ dot: true,
217
+ });
218
+
219
+ const docFiles = await fg(DOC_GLOBS, {
220
+ cwd: rootPath,
221
+ absolute: true,
222
+ dot: true,
223
+ });
224
+
225
+ // Scan memory files with higher severity (direct agent context)
226
+ for (const file of memoryFiles) {
227
+ findings.push(...this._scanFile(file, true));
228
+ }
229
+
230
+ // Scan doc files with slightly lower confidence (indirect context)
231
+ for (const file of docFiles) {
232
+ findings.push(...this._scanFile(file, false));
233
+ }
234
+
235
+ return findings;
236
+ }
237
+
238
+ _scanFile(filePath, isDirectMemory) {
239
+ const content = this.readFile(filePath);
240
+ if (!content) return [];
241
+
242
+ const findings = [];
243
+ const lines = content.split('\n');
244
+
245
+ // Check injection patterns
246
+ for (const pattern of INJECTION_PATTERNS) {
247
+ for (let i = 0; i < lines.length; i++) {
248
+ const line = lines[i];
249
+ if (this.isSuppressed(line)) continue;
250
+
251
+ pattern.regex.lastIndex = 0;
252
+ const match = pattern.regex.exec(line);
253
+ if (match) {
254
+ findings.push(createFinding({
255
+ file: filePath,
256
+ line: i + 1,
257
+ severity: pattern.severity,
258
+ category: 'agentic',
259
+ rule: pattern.rule,
260
+ title: pattern.title,
261
+ description: pattern.description + (isDirectMemory
262
+ ? ' This file is directly loaded into agent context.'
263
+ : ' This file may be ingested by agents as project context.'),
264
+ matched: match[0],
265
+ confidence: isDirectMemory ? 'high' : 'medium',
266
+ cwe: pattern.cwe,
267
+ owasp: pattern.owasp,
268
+ fix: pattern.fix,
269
+ }));
270
+ }
271
+ }
272
+ }
273
+
274
+ // Check hidden content patterns (full content, not per-line)
275
+ for (const pattern of HIDDEN_CONTENT_PATTERNS) {
276
+ pattern.regex.lastIndex = 0;
277
+ const match = pattern.regex.exec(content);
278
+ if (match) {
279
+ // Find approximate line number
280
+ const beforeMatch = content.slice(0, match.index);
281
+ const lineNum = (beforeMatch.match(/\n/g) || []).length + 1;
282
+
283
+ findings.push(createFinding({
284
+ file: filePath,
285
+ line: lineNum,
286
+ severity: pattern.severity,
287
+ category: 'agentic',
288
+ rule: pattern.rule,
289
+ title: pattern.title,
290
+ description: pattern.description,
291
+ matched: match[0].slice(0, 100),
292
+ confidence: pattern.confidence || (isDirectMemory ? 'high' : 'medium'),
293
+ cwe: pattern.cwe,
294
+ owasp: pattern.owasp,
295
+ fix: pattern.fix,
296
+ }));
297
+ }
298
+ }
299
+
300
+ return findings;
301
+ }
302
+ }
303
+
304
+ export default MemoryPoisoningAgent;
@@ -11,7 +11,7 @@
11
11
 
12
12
  import fs from 'fs';
13
13
  import path from 'path';
14
- import { getComplianceSummary } from '../utils/compliance-map.js';
14
+ import { getComplianceSummary, getAgenticSummary, enrichAgenticRisk } from '../utils/compliance-map.js';
15
15
 
16
16
  // =============================================================================
17
17
  // SCORING CONFIGURATION
@@ -49,6 +49,7 @@ const FALLBACK_CATEGORY_MAP = {
49
49
  'vibe': 'injection', // Vibe coding findings → Code Vulnerabilities
50
50
  'exception': 'injection', // OWASP A10:2025 — Mishandling of Exceptional Conditions
51
51
  'agent-config': 'llm', // Agent config security → AI/LLM category
52
+ 'memory-poisoning': 'llm', // Memory poisoning → AI/LLM category
52
53
  'recon': null, // skip recon findings
53
54
  };
54
55
 
@@ -87,6 +88,11 @@ export class ScoringEngine {
87
88
  };
88
89
  }
89
90
 
91
+ // ── Enrich findings with OWASP Agentic AI Top 10 metadata ──────────────
92
+ for (const finding of findings) {
93
+ enrichAgenticRisk(finding);
94
+ }
95
+
90
96
  // ── Classify findings into categories ─────────────────────────────────────
91
97
  for (const finding of findings) {
92
98
  const cat = this.resolveCategory(finding.category);
@@ -146,6 +152,14 @@ export class ScoringEngine {
146
152
  compliance = null;
147
153
  }
148
154
 
155
+ // ── OWASP Agentic AI Top 10 summary ──────────────────────────────────
156
+ let agenticSummary;
157
+ try {
158
+ agenticSummary = getAgenticSummary(findings);
159
+ } catch {
160
+ agenticSummary = null;
161
+ }
162
+
149
163
  return {
150
164
  score,
151
165
  grade,
@@ -153,6 +167,7 @@ export class ScoringEngine {
153
167
  totalFindings: findings.length,
154
168
  totalDepVulns: depVulns.length,
155
169
  compliance,
170
+ agenticSummary,
156
171
  };
157
172
  }
158
173
 
@@ -582,7 +582,8 @@ export class SupplyChainAudit extends BaseAgent {
582
582
  }));
583
583
  }
584
584
 
585
- // ── 9. Blockchain C2 indicators (CanisterWorm / ICP) ──────────────────────
585
+ // ── 9. Trojanized package behavioral signatures ───────────────────────────
586
+ // Patterns from Axios 1.8.2, LiteLLM 1.82.7, TeamPCP campaign (Mar 2026)
586
587
  if (fs.existsSync(path.join(rootPath, 'node_modules'))) {
587
588
  try {
588
589
  const pkg = JSON.parse(fs.readFileSync(pkgPath, 'utf-8'));
@@ -590,7 +591,132 @@ export class SupplyChainAudit extends BaseAgent {
590
591
  ...(pkg.dependencies || {}),
591
592
  ...(pkg.devDependencies || {}),
592
593
  };
593
- for (const depName of Object.keys(allDeps)) {
594
+
595
+ for (const depName of Object.keys(allDeps).slice(0, 80)) {
596
+ const depDir = path.join(rootPath, 'node_modules', depName);
597
+ const depPkgPath = path.join(depDir, 'package.json');
598
+ if (!fs.existsSync(depPkgPath)) continue;
599
+
600
+ try {
601
+ const depPkg = JSON.parse(fs.readFileSync(depPkgPath, 'utf-8'));
602
+
603
+ // 9a. Hidden dependencies added by attacker
604
+ // Axios 1.8.2 injected a hidden malicious dep that wasn't in the legitimate version.
605
+ // Check for deps that only exist in certain version ranges.
606
+ const depDeps = depPkg.dependencies || {};
607
+ for (const [subDep, subVer] of Object.entries(depDeps)) {
608
+ // Packages with very high download counts that suddenly gain unknown subdependencies
609
+ if (/^[a-z]+-[a-z0-9]+-[a-z0-9]+$/.test(subDep) && typeof subVer === 'string' && subVer.startsWith('git+')) {
610
+ findings.push(createFinding({
611
+ file: depPkgPath,
612
+ line: 0,
613
+ severity: 'critical',
614
+ category: 'supply-chain',
615
+ rule: 'TROJAN_HIDDEN_DEP',
616
+ title: `Suspicious Hidden Dependency in ${depName}: ${subDep}`,
617
+ description: `"${depName}" depends on "${subDep}" via a git URL. This matches the Axios/TeamPCP trojanization pattern where attackers inject a malicious dependency into a popular package.`,
618
+ matched: `${subDep}: ${subVer}`,
619
+ fix: `Compare this version's dependencies against the official release. If "${subDep}" was not in the previous version, this package may be trojanized.`,
620
+ }));
621
+ }
622
+ }
623
+
624
+ // 9b. Install scripts that read and exfiltrate env vars
625
+ // LiteLLM 1.82.7 harvested AWS/GCP/Azure tokens + SSH keys
626
+ const scripts = depPkg.scripts || {};
627
+ for (const hook of ['preinstall', 'install', 'postinstall']) {
628
+ const cmd = scripts[hook];
629
+ if (!cmd) continue;
630
+
631
+ // Environment variable harvesting
632
+ if (/process\.env|os\.environ|ENV\[|getenv/i.test(cmd) &&
633
+ /https?:|fetch|request|axios|curl|wget|net\./i.test(cmd)) {
634
+ findings.push(createFinding({
635
+ file: depPkgPath,
636
+ line: 0,
637
+ severity: 'critical',
638
+ category: 'supply-chain',
639
+ rule: 'TROJAN_ENV_EXFIL',
640
+ title: `Credential Harvesting in ${hook}: ${depName}`,
641
+ description: `"${depName}" reads environment variables and makes network requests during ${hook}. This is the exact pattern used in the LiteLLM/TeamPCP attack to steal cloud credentials.`,
642
+ matched: cmd.slice(0, 200),
643
+ fix: 'Remove this package immediately. Rotate any credentials (AWS, GCP, Azure tokens, SSH keys) that may have been exfiltrated.',
644
+ }));
645
+ }
646
+
647
+ // SSH key / credential file access in install scripts
648
+ if (/\.ssh|\.aws|\.azure|\.gcp|\.kube|\.docker|credentials|\.npmrc|\.pypirc/i.test(cmd)) {
649
+ findings.push(createFinding({
650
+ file: depPkgPath,
651
+ line: 0,
652
+ severity: 'critical',
653
+ category: 'supply-chain',
654
+ rule: 'TROJAN_CREDENTIAL_ACCESS',
655
+ title: `Credential File Access in ${hook}: ${depName}`,
656
+ description: `"${depName}" accesses credential files (.ssh, .aws, .kube, etc.) during ${hook}. This matches the TeamPCP credential theft pattern.`,
657
+ matched: cmd.slice(0, 200),
658
+ fix: 'Remove this package immediately and rotate all credentials in the accessed directories.',
659
+ }));
660
+ }
661
+ }
662
+
663
+ // 9c. Scan actual JS entry files for runtime exfiltration patterns
664
+ const main = depPkg.main || 'index.js';
665
+ const entryPath = path.join(depDir, main);
666
+ if (fs.existsSync(entryPath)) {
667
+ try {
668
+ const entryContent = fs.readFileSync(entryPath, 'utf-8');
669
+ if (entryContent.length < 500_000) {
670
+ // DNS-based exfiltration (encode data in subdomain)
671
+ if (/dns\.resolve|dns\.lookup/i.test(entryContent) &&
672
+ /process\.env|os\.hostname/i.test(entryContent)) {
673
+ findings.push(createFinding({
674
+ file: entryPath,
675
+ line: 1,
676
+ severity: 'high',
677
+ category: 'supply-chain',
678
+ rule: 'TROJAN_DNS_EXFIL',
679
+ title: `DNS Exfiltration Pattern: ${depName}`,
680
+ description: `"${depName}" combines DNS lookups with system/env data reads — a known technique for exfiltrating data via DNS subdomains to bypass firewalls.`,
681
+ matched: 'dns.resolve + process.env',
682
+ confidence: 'medium',
683
+ fix: 'Inspect the DNS usage. Legitimate packages rarely combine DNS with environment variable reading.',
684
+ }));
685
+ }
686
+
687
+ // WebSocket-based C2
688
+ if (/new\s+WebSocket/i.test(entryContent) &&
689
+ /process\.env|child_process|exec/i.test(entryContent)) {
690
+ findings.push(createFinding({
691
+ file: entryPath,
692
+ line: 1,
693
+ severity: 'critical',
694
+ category: 'supply-chain',
695
+ rule: 'TROJAN_WEBSOCKET_C2',
696
+ title: `WebSocket C2 Pattern: ${depName}`,
697
+ description: `"${depName}" opens WebSocket connections combined with system command execution — consistent with a Remote Access Trojan.`,
698
+ matched: 'WebSocket + child_process',
699
+ fix: 'Remove this package immediately. Scan for persistence mechanisms (cron jobs, startup scripts).',
700
+ }));
701
+ }
702
+ }
703
+ } catch { /* skip */ }
704
+ }
705
+
706
+ } catch { /* skip */ }
707
+ }
708
+ } catch { /* skip */ }
709
+ }
710
+
711
+ // ── 10. Blockchain C2 indicators (CanisterWorm / ICP) ────────────────────
712
+ if (fs.existsSync(path.join(rootPath, 'node_modules'))) {
713
+ try {
714
+ const pkg2 = JSON.parse(fs.readFileSync(pkgPath, 'utf-8'));
715
+ const allDeps2 = {
716
+ ...(pkg2.dependencies || {}),
717
+ ...(pkg2.devDependencies || {}),
718
+ };
719
+ for (const depName of Object.keys(allDeps2)) {
594
720
  const depPkgPath = path.join(rootPath, 'node_modules', depName, 'package.json');
595
721
  if (!fs.existsSync(depPkgPath)) continue;
596
722
  try {
@@ -42,10 +42,12 @@ import { vibeCheckCommand } from '../commands/vibe-check.js';
42
42
  import { benchmarkCommand } from '../commands/benchmark.js';
43
43
  import { openclawCommand } from '../commands/openclaw.js';
44
44
  import { scanSkillCommand } from '../commands/scan-skill.js';
45
+ import { scanMcpCommand } from '../commands/scan-mcp.js';
45
46
  import { abomCommand } from '../commands/abom.js';
46
47
  import { updateIntelCommand } from '../commands/update-intel.js';
47
48
  import { hooksCommand } from '../commands/hooks.js';
48
49
  import { legalCommand } from '../commands/legal.js';
50
+ import { runLiveAdvisories } from '../commands/live-advisories.js';
49
51
  import { ABOMGenerator } from '../agents/abom-generator.js';
50
52
  import { PolicyEngine } from '../agents/policy-engine.js';
51
53
  import { SBOMGenerator } from '../agents/sbom-generator.js';
@@ -267,8 +269,60 @@ program
267
269
  .description('Continuous monitoring: watch files for security issues in real-time')
268
270
  .option('--poll', 'Use polling mode (for network drives)')
269
271
  .option('--configs', 'Watch only agent config files (openclaw.json, .cursorrules, mcp.json, etc.)')
272
+ .option('--deep', 'Run full agent scanning on changes (not just pattern matching)')
273
+ .option('--status', 'Show current watch status and exit')
274
+ .option('--threshold <score>', 'Alert when score drops below threshold', parseInt)
275
+ .option('--debounce <ms>', 'Debounce interval in ms (default: 1500)', parseInt)
270
276
  .action(watchCommand);
271
277
 
278
+ // -----------------------------------------------------------------------------
279
+ // ADVISORIES COMMAND
280
+ // -----------------------------------------------------------------------------
281
+ program
282
+ .command('advisories [path]')
283
+ .description('Check dependencies against live advisory feeds (OSV.dev, GitHub Advisories)')
284
+ .option('--ecosystem <type>', 'Filter by ecosystem (npm, PyPI)')
285
+ .option('--json', 'Output as JSON')
286
+ .action(async (targetPath = '.', options) => {
287
+ const { resolve } = await import('path');
288
+ const absolutePath = resolve(targetPath);
289
+ try {
290
+ const result = await runLiveAdvisories(absolutePath, options);
291
+ if (options.json) {
292
+ console.log(JSON.stringify(result, null, 2));
293
+ return;
294
+ }
295
+ console.log();
296
+ console.log(chalk.cyan.bold(' Ship Safe — Live Advisories'));
297
+ console.log(chalk.gray(` Checked ${result.checked} dependencies against OSV.dev`));
298
+ console.log();
299
+ if (result.advisories.length === 0) {
300
+ console.log(chalk.green(' ✔ No known advisories for your current dependency versions.\n'));
301
+ } else {
302
+ const malware = result.advisories.filter(a => a.isMalware);
303
+ const vulns = result.advisories.filter(a => !a.isMalware);
304
+ if (malware.length > 0) {
305
+ console.log(chalk.red.bold(` !! ${malware.length} MALWARE ADVISORY(S) FOUND`));
306
+ for (const a of malware) {
307
+ console.log(chalk.red(` ${a.package}@${a.version} — ${a.id}: ${a.summary.slice(0, 80)}`));
308
+ }
309
+ console.log();
310
+ }
311
+ if (vulns.length > 0) {
312
+ console.log(chalk.yellow(` ${vulns.length} vulnerability advisory(s):`));
313
+ for (const a of vulns) {
314
+ const sev = a.severity === 'critical' ? chalk.red.bold(a.severity) : a.severity === 'high' ? chalk.yellow(a.severity) : chalk.blue(a.severity);
315
+ console.log(` ${sev} ${a.package}@${a.version} — ${a.id}`);
316
+ }
317
+ console.log();
318
+ }
319
+ }
320
+ } catch (err) {
321
+ console.error(chalk.red(` Error: ${err.message}\n`));
322
+ process.exit(1);
323
+ }
324
+ });
325
+
272
326
  // -----------------------------------------------------------------------------
273
327
  // SBOM COMMAND
274
328
  // -----------------------------------------------------------------------------
@@ -364,6 +418,15 @@ program
364
418
  .option('--json', 'Output results as JSON')
365
419
  .action(scanSkillCommand);
366
420
 
421
+ // -----------------------------------------------------------------------------
422
+ // SCAN-MCP COMMAND
423
+ // -----------------------------------------------------------------------------
424
+ program
425
+ .command('scan-mcp [target]')
426
+ .description('Analyze an MCP server\'s tool manifest for security issues before connecting')
427
+ .option('--json', 'Output results as JSON')
428
+ .action(scanMcpCommand);
429
+
367
430
  // -----------------------------------------------------------------------------
368
431
  // ABOM COMMAND
369
432
  // -----------------------------------------------------------------------------
@@ -439,6 +502,7 @@ if (process.argv.length === 2) {
439
502
  console.log(chalk.white(' npx ship-safe watch . ') + chalk.gray('# Continuous monitoring mode'));
440
503
  console.log(chalk.white(' npx ship-safe openclaw . ') + chalk.gray('# OpenClaw & agent config security scan'));
441
504
  console.log(chalk.white(' npx ship-safe scan-skill <u>') + chalk.gray('# Vet a skill before installing'));
505
+ console.log(chalk.white(' npx ship-safe scan-mcp <url> ') + chalk.gray('# Vet an MCP server before connecting'));
442
506
  console.log(chalk.white(' npx ship-safe abom . ') + chalk.gray('# Agent Bill of Materials (CycloneDX)'));
443
507
  console.log(chalk.white(' npx ship-safe sbom . ') + chalk.gray('# Generate CycloneDX SBOM (CRA-ready)'));
444
508
  console.log(chalk.white(' npx ship-safe legal . ') + chalk.gray('# Legal risk audit: DMCA, leaked source, IP disputes'));