Compare commits
1 Commits
feat/help-
...
fix/cascad
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
f8eb4ea84d |
120
README.md
120
README.md
@@ -28,9 +28,9 @@
|
|||||||
|
|
||||||
## About
|
## About
|
||||||
|
|
||||||
Compliance Scanner is an autonomous agent that continuously monitors git repositories for security vulnerabilities, GDPR/OAuth compliance patterns, and dependency risks. It creates issues in external trackers (GitHub/GitLab/Jira/Gitea) with evidence and remediation suggestions, reviews pull requests with multi-pass LLM analysis, runs autonomous penetration tests, and exposes a Dioxus-based dashboard for visualization.
|
Compliance Scanner is an autonomous agent that continuously monitors git repositories for security vulnerabilities, GDPR/OAuth compliance patterns, and dependency risks. It creates issues in external trackers (GitHub/GitLab/Jira) with evidence and remediation suggestions, reviews pull requests, and exposes a Dioxus-based dashboard for visualization.
|
||||||
|
|
||||||
> **How it works:** The agent runs as a lazy daemon -- it only scans when new commits are detected, triggered by cron schedules or webhooks. LLM-powered triage filters out false positives and generates actionable remediation with multi-language awareness.
|
> **How it works:** The agent runs as a lazy daemon -- it only scans when new commits are detected, triggered by cron schedules or webhooks. LLM-powered triage filters out false positives and generates actionable remediation.
|
||||||
|
|
||||||
## Features
|
## Features
|
||||||
|
|
||||||
@@ -41,38 +41,31 @@ Compliance Scanner is an autonomous agent that continuously monitors git reposit
|
|||||||
| **CVE Monitoring** | OSV.dev batch queries, NVD CVSS enrichment, SearXNG context |
|
| **CVE Monitoring** | OSV.dev batch queries, NVD CVSS enrichment, SearXNG context |
|
||||||
| **GDPR Patterns** | Detect PII logging, missing consent, hardcoded retention, missing deletion |
|
| **GDPR Patterns** | Detect PII logging, missing consent, hardcoded retention, missing deletion |
|
||||||
| **OAuth Patterns** | Detect implicit grant, missing PKCE, token in localStorage, token in URLs |
|
| **OAuth Patterns** | Detect implicit grant, missing PKCE, token in localStorage, token in URLs |
|
||||||
| **LLM Triage** | Multi-language-aware confidence scoring (Rust, Python, Go, Java, Ruby, PHP, C++) |
|
| **LLM Triage** | Confidence scoring via LiteLLM to filter false positives |
|
||||||
| **Issue Creation** | Auto-create issues in GitHub, GitLab, Jira, or Gitea with dedup via fingerprints |
|
| **Issue Creation** | Auto-create issues in GitHub, GitLab, or Jira with code evidence |
|
||||||
| **PR Reviews** | Multi-pass security review (logic, security, convention, complexity) with dedup |
|
| **PR Reviews** | Post security review comments on pull requests |
|
||||||
| **DAST Scanning** | Black-box security testing with endpoint discovery and parameter fuzzing |
|
| **Dashboard** | Fullstack Dioxus UI with findings, SBOM, issues, and statistics |
|
||||||
| **AI Pentesting** | Autonomous LLM-orchestrated penetration testing with encrypted reports |
|
| **Webhooks** | GitHub (HMAC-SHA256) and GitLab webhook receivers for push/PR events |
|
||||||
| **Code Graph** | Interactive code knowledge graph with impact analysis |
|
|
||||||
| **AI Chat (RAG)** | Natural language Q&A grounded in repository source code |
|
|
||||||
| **Help Assistant** | Documentation-grounded help chat accessible from every dashboard page |
|
|
||||||
| **MCP Server** | Expose live security data to Claude, Cursor, and other AI tools |
|
|
||||||
| **Dashboard** | Fullstack Dioxus UI with findings, SBOM, issues, DAST, pentest, and graph |
|
|
||||||
| **Webhooks** | GitHub, GitLab, and Gitea webhook receivers for push/PR events |
|
|
||||||
| **Finding Dedup** | SHA-256 fingerprint dedup for SAST, CWE-based dedup for DAST findings |
|
|
||||||
|
|
||||||
## Architecture
|
## Architecture
|
||||||
|
|
||||||
```
|
```
|
||||||
┌──────────────────────────────────────────────────────────────────────────┐
|
┌─────────────────────────────────────────────────────────────┐
|
||||||
│ Cargo Workspace │
|
│ Cargo Workspace │
|
||||||
├──────────────┬──────────────────┬──────────────┬──────────┬─────────────┤
|
├──────────────┬──────────────────┬───────────────────────────┤
|
||||||
│ compliance- │ compliance- │ compliance- │ complian-│ compliance- │
|
│ compliance- │ compliance- │ compliance- │
|
||||||
│ core (lib) │ agent (bin) │ dashboard │ ce-graph │ mcp (bin) │
|
│ core │ agent │ dashboard │
|
||||||
│ │ │ (bin) │ (lib) │ │
|
│ (lib) │ (bin) │ (bin, Dioxus 0.7.3) │
|
||||||
│ Models │ Scan Pipeline │ Dioxus 0.7 │ Tree- │ MCP Server │
|
│ │ │ │
|
||||||
│ Traits │ LLM Client │ Fullstack UI │ sitter │ Live data │
|
│ Models │ Scan Pipeline │ Fullstack Web UI │
|
||||||
│ Config │ Issue Trackers │ Help Chat │ Graph │ for AI │
|
│ Traits │ LLM Client │ Server Functions │
|
||||||
│ Errors │ Pentest Engine │ Server Fns │ Embedds │ tools │
|
│ Config │ Issue Trackers │ Charts + Tables │
|
||||||
│ │ DAST Tools │ │ RAG │ │
|
│ Errors │ Scheduler │ Settings Page │
|
||||||
│ │ REST API │ │ │ │
|
│ │ REST API │ │
|
||||||
│ │ Webhooks │ │ │ │
|
│ │ Webhooks │ │
|
||||||
└──────────────┴──────────────────┴──────────────┴──────────┴─────────────┘
|
└──────────────┴──────────────────┴───────────────────────────┘
|
||||||
│
|
│
|
||||||
MongoDB (shared)
|
MongoDB (shared)
|
||||||
```
|
```
|
||||||
|
|
||||||
## Scan Pipeline (7 Stages)
|
## Scan Pipeline (7 Stages)
|
||||||
@@ -91,16 +84,11 @@ Compliance Scanner is an autonomous agent that continuously monitors git reposit
|
|||||||
|-------|-----------|
|
|-------|-----------|
|
||||||
| Shared Library | `compliance-core` -- models, traits, config |
|
| Shared Library | `compliance-core` -- models, traits, config |
|
||||||
| Agent | Axum REST API, git2, tokio-cron-scheduler, Semgrep, Syft |
|
| Agent | Axum REST API, git2, tokio-cron-scheduler, Semgrep, Syft |
|
||||||
| Dashboard | Dioxus 0.7.3 fullstack, Tailwind CSS 4 |
|
| Dashboard | Dioxus 0.7.3 fullstack, Tailwind CSS |
|
||||||
| Code Graph | `compliance-graph` -- tree-sitter parsing, embeddings, RAG |
|
|
||||||
| MCP Server | `compliance-mcp` -- Model Context Protocol for AI tools |
|
|
||||||
| DAST | `compliance-dast` -- dynamic application security testing |
|
|
||||||
| Database | MongoDB with typed collections |
|
| Database | MongoDB with typed collections |
|
||||||
| LLM | LiteLLM (OpenAI-compatible API for chat, triage, embeddings) |
|
| LLM | LiteLLM (OpenAI-compatible API) |
|
||||||
| Issue Trackers | GitHub (octocrab), GitLab (REST v4), Jira (REST v3), Gitea |
|
| Issue Trackers | GitHub (octocrab), GitLab (REST v4), Jira (REST v3) |
|
||||||
| CVE Sources | OSV.dev, NVD, SearXNG |
|
| CVE Sources | OSV.dev, NVD, SearXNG |
|
||||||
| Auth | Keycloak (OAuth2/PKCE, SSO) |
|
|
||||||
| Browser Automation | Chromium (headless, for pentesting and PDF generation) |
|
|
||||||
|
|
||||||
## Getting Started
|
## Getting Started
|
||||||
|
|
||||||
@@ -163,35 +151,20 @@ The agent exposes a REST API on port 3001:
|
|||||||
| `GET` | `/api/v1/sbom` | List dependencies |
|
| `GET` | `/api/v1/sbom` | List dependencies |
|
||||||
| `GET` | `/api/v1/issues` | List cross-tracker issues |
|
| `GET` | `/api/v1/issues` | List cross-tracker issues |
|
||||||
| `GET` | `/api/v1/scan-runs` | Scan execution history |
|
| `GET` | `/api/v1/scan-runs` | Scan execution history |
|
||||||
| `GET` | `/api/v1/graph/:repo_id` | Code knowledge graph |
|
|
||||||
| `POST` | `/api/v1/graph/:repo_id/build` | Trigger graph build |
|
|
||||||
| `GET` | `/api/v1/dast/targets` | List DAST targets |
|
|
||||||
| `POST` | `/api/v1/dast/targets` | Add DAST target |
|
|
||||||
| `GET` | `/api/v1/dast/findings` | List DAST findings |
|
|
||||||
| `POST` | `/api/v1/chat/:repo_id` | RAG-powered code chat |
|
|
||||||
| `POST` | `/api/v1/help/chat` | Documentation-grounded help chat |
|
|
||||||
| `POST` | `/api/v1/pentest/sessions` | Create pentest session |
|
|
||||||
| `POST` | `/api/v1/pentest/sessions/:id/export` | Export encrypted pentest report |
|
|
||||||
| `POST` | `/webhook/github` | GitHub webhook (HMAC-SHA256) |
|
| `POST` | `/webhook/github` | GitHub webhook (HMAC-SHA256) |
|
||||||
| `POST` | `/webhook/gitlab` | GitLab webhook (token verify) |
|
| `POST` | `/webhook/gitlab` | GitLab webhook (token verify) |
|
||||||
| `POST` | `/webhook/gitea` | Gitea webhook |
|
|
||||||
|
|
||||||
## Dashboard Pages
|
## Dashboard Pages
|
||||||
|
|
||||||
| Page | Description |
|
| Page | Description |
|
||||||
|------|-------------|
|
|------|-------------|
|
||||||
| **Overview** | Stat cards, severity distribution, AI chat cards, MCP status |
|
| **Overview** | Stat cards, severity distribution chart |
|
||||||
| **Repositories** | Add/manage tracked repos, trigger scans, webhook config |
|
| **Repositories** | Add/manage tracked repos, trigger scans |
|
||||||
| **Findings** | Filterable table by severity, type, status, scanner |
|
| **Findings** | Filterable table by severity, type, status |
|
||||||
| **Finding Detail** | Code evidence, remediation, suggested fix, linked issue |
|
| **Finding Detail** | Code evidence, remediation, suggested fix, linked issue |
|
||||||
| **SBOM** | Dependency inventory with vulnerability badges, license summary |
|
| **SBOM** | Dependency inventory with vulnerability badges |
|
||||||
| **Issues** | Cross-tracker view (GitHub + GitLab + Jira + Gitea) |
|
| **Issues** | Cross-tracker view (GitHub + GitLab + Jira) |
|
||||||
| **Code Graph** | Interactive architecture visualization, impact analysis |
|
| **Settings** | Configure LiteLLM, tracker tokens, SearXNG URL |
|
||||||
| **AI Chat** | RAG-powered Q&A about repository code |
|
|
||||||
| **DAST** | Dynamic scanning targets, findings, and scan history |
|
|
||||||
| **Pentest** | AI-driven pentest sessions, attack chain visualization |
|
|
||||||
| **MCP Servers** | Model Context Protocol server management |
|
|
||||||
| **Help Chat** | Floating assistant (available on every page) for product Q&A |
|
|
||||||
|
|
||||||
## Project Structure
|
## Project Structure
|
||||||
|
|
||||||
@@ -200,24 +173,19 @@ compliance-scanner/
|
|||||||
├── compliance-core/ Shared library (models, traits, config, errors)
|
├── compliance-core/ Shared library (models, traits, config, errors)
|
||||||
├── compliance-agent/ Agent daemon (pipeline, LLM, trackers, API, webhooks)
|
├── compliance-agent/ Agent daemon (pipeline, LLM, trackers, API, webhooks)
|
||||||
│ └── src/
|
│ └── src/
|
||||||
│ ├── pipeline/ 7-stage scan pipeline, dedup, PR reviews, code review
|
│ ├── pipeline/ 7-stage scan pipeline
|
||||||
│ ├── llm/ LiteLLM client, triage, descriptions, fixes, review prompts
|
│ ├── llm/ LiteLLM client, triage, descriptions, fixes, PR review
|
||||||
│ ├── trackers/ GitHub, GitLab, Jira, Gitea integrations
|
│ ├── trackers/ GitHub, GitLab, Jira integrations
|
||||||
│ ├── pentest/ AI-driven pentest orchestrator, tools, reports
|
│ ├── api/ REST API (Axum)
|
||||||
│ ├── rag/ RAG pipeline, chunking, embedding
|
│ └── webhooks/ GitHub + GitLab webhook receivers
|
||||||
│ ├── api/ REST API (Axum), help chat
|
|
||||||
│ └── webhooks/ GitHub, GitLab, Gitea webhook receivers
|
|
||||||
├── compliance-dashboard/ Dioxus fullstack dashboard
|
├── compliance-dashboard/ Dioxus fullstack dashboard
|
||||||
│ └── src/
|
│ └── src/
|
||||||
│ ├── components/ Reusable UI (sidebar, help chat, attack chain, etc.)
|
│ ├── components/ Reusable UI components
|
||||||
│ ├── infrastructure/ Server functions, DB, config, auth
|
│ ├── infrastructure/ Server functions, DB, config
|
||||||
│ └── pages/ Full page views (overview, DAST, pentest, graph, etc.)
|
│ └── pages/ Full page views
|
||||||
├── compliance-graph/ Code knowledge graph (tree-sitter, embeddings, RAG)
|
|
||||||
├── compliance-dast/ Dynamic application security testing
|
|
||||||
├── compliance-mcp/ Model Context Protocol server
|
|
||||||
├── docs/ VitePress documentation site
|
|
||||||
├── assets/ Static assets (CSS, icons)
|
├── assets/ Static assets (CSS, icons)
|
||||||
└── styles/ Tailwind input stylesheet
|
├── styles/ Tailwind input stylesheet
|
||||||
|
└── bin/ Dashboard binary entrypoint
|
||||||
```
|
```
|
||||||
|
|
||||||
## External Services
|
## External Services
|
||||||
@@ -225,12 +193,10 @@ compliance-scanner/
|
|||||||
| Service | Purpose | Default URL |
|
| Service | Purpose | Default URL |
|
||||||
|---------|---------|-------------|
|
|---------|---------|-------------|
|
||||||
| MongoDB | Persistence | `mongodb://localhost:27017` |
|
| MongoDB | Persistence | `mongodb://localhost:27017` |
|
||||||
| LiteLLM | LLM proxy (chat, triage, embeddings) | `http://localhost:4000` |
|
| LiteLLM | LLM proxy for triage and generation | `http://localhost:4000` |
|
||||||
| SearXNG | CVE context search | `http://localhost:8888` |
|
| SearXNG | CVE context search | `http://localhost:8888` |
|
||||||
| Keycloak | Authentication (OAuth2/PKCE, SSO) | `http://localhost:8080` |
|
|
||||||
| Semgrep | SAST scanning | CLI tool |
|
| Semgrep | SAST scanning | CLI tool |
|
||||||
| Syft | SBOM generation | CLI tool |
|
| Syft | SBOM generation | CLI tool |
|
||||||
| Chromium | Headless browser (pentesting, PDF) | Managed via Docker |
|
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -90,13 +90,10 @@ pub async fn chat(
|
|||||||
};
|
};
|
||||||
|
|
||||||
let system_prompt = format!(
|
let system_prompt = format!(
|
||||||
"You are a code assistant for this repository. Answer questions using the code context below.\n\n\
|
"You are an expert code assistant for a software repository. \
|
||||||
Rules:\n\
|
Answer the user's question based on the code context below. \
|
||||||
- Reference specific files, functions, and line numbers\n\
|
Reference specific files and functions when relevant. \
|
||||||
- Show code snippets when they help explain the answer\n\
|
If the context doesn't contain enough information, say so.\n\n\
|
||||||
- If the context is insufficient, say what's missing rather than guessing\n\
|
|
||||||
- Be concise — lead with the answer, then explain if needed\n\
|
|
||||||
- For security questions, note relevant CWEs and link to the finding if one exists\n\n\
|
|
||||||
## Code Context\n\n{code_context}"
|
## Code Context\n\n{code_context}"
|
||||||
);
|
);
|
||||||
|
|
||||||
|
|||||||
@@ -1,187 +0,0 @@
|
|||||||
use std::path::{Path, PathBuf};
|
|
||||||
use std::sync::OnceLock;
|
|
||||||
|
|
||||||
use axum::extract::Extension;
|
|
||||||
use axum::http::StatusCode;
|
|
||||||
use axum::Json;
|
|
||||||
use serde::{Deserialize, Serialize};
|
|
||||||
use walkdir::WalkDir;
|
|
||||||
|
|
||||||
use super::dto::{AgentExt, ApiResponse};
|
|
||||||
|
|
||||||
// ── DTOs ─────────────────────────────────────────────────────────────────────
|
|
||||||
|
|
||||||
#[derive(Debug, Deserialize)]
|
|
||||||
pub struct HelpChatMessage {
|
|
||||||
pub role: String,
|
|
||||||
pub content: String,
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug, Deserialize)]
|
|
||||||
pub struct HelpChatRequest {
|
|
||||||
pub message: String,
|
|
||||||
#[serde(default)]
|
|
||||||
pub history: Vec<HelpChatMessage>,
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug, Serialize)]
|
|
||||||
pub struct HelpChatResponse {
|
|
||||||
pub message: String,
|
|
||||||
}
|
|
||||||
|
|
||||||
// ── Doc cache ────────────────────────────────────────────────────────────────
|
|
||||||
|
|
||||||
static DOC_CONTEXT: OnceLock<String> = OnceLock::new();
|
|
||||||
|
|
||||||
/// Walk upward from `start` until we find a directory containing both
|
|
||||||
/// `README.md` and a `docs/` subdirectory.
|
|
||||||
fn find_project_root(start: &Path) -> Option<PathBuf> {
|
|
||||||
let mut current = start.to_path_buf();
|
|
||||||
loop {
|
|
||||||
if current.join("README.md").is_file() && current.join("docs").is_dir() {
|
|
||||||
return Some(current);
|
|
||||||
}
|
|
||||||
if !current.pop() {
|
|
||||||
return None;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Read README.md + all docs/**/*.md (excluding node_modules).
|
|
||||||
fn load_docs(root: &Path) -> String {
|
|
||||||
let mut parts: Vec<String> = Vec::new();
|
|
||||||
|
|
||||||
// Root README first
|
|
||||||
if let Ok(content) = std::fs::read_to_string(root.join("README.md")) {
|
|
||||||
parts.push(format!("<!-- file: README.md -->\n{content}"));
|
|
||||||
}
|
|
||||||
|
|
||||||
// docs/**/*.md, skipping node_modules
|
|
||||||
for entry in WalkDir::new(root.join("docs"))
|
|
||||||
.follow_links(false)
|
|
||||||
.into_iter()
|
|
||||||
.filter_entry(|e| {
|
|
||||||
!e.path()
|
|
||||||
.components()
|
|
||||||
.any(|c| c.as_os_str() == "node_modules")
|
|
||||||
})
|
|
||||||
.filter_map(|e| e.ok())
|
|
||||||
{
|
|
||||||
let path = entry.path();
|
|
||||||
if !path.is_file() {
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
if path
|
|
||||||
.extension()
|
|
||||||
.and_then(|s| s.to_str())
|
|
||||||
.map(|s| !s.eq_ignore_ascii_case("md"))
|
|
||||||
.unwrap_or(true)
|
|
||||||
{
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
let rel = path.strip_prefix(root).unwrap_or(path);
|
|
||||||
if let Ok(content) = std::fs::read_to_string(path) {
|
|
||||||
parts.push(format!("<!-- file: {} -->\n{content}", rel.display()));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if parts.is_empty() {
|
|
||||||
tracing::warn!(
|
|
||||||
"help_chat: no documentation files found under {}",
|
|
||||||
root.display()
|
|
||||||
);
|
|
||||||
} else {
|
|
||||||
tracing::info!(
|
|
||||||
"help_chat: loaded {} documentation file(s) from {}",
|
|
||||||
parts.len(),
|
|
||||||
root.display()
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
parts.join("\n\n---\n\n")
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Returns a reference to the cached doc context string, initialised on
|
|
||||||
/// first call via `OnceLock`.
|
|
||||||
fn doc_context() -> &'static str {
|
|
||||||
DOC_CONTEXT.get_or_init(|| {
|
|
||||||
let start = std::env::current_exe()
|
|
||||||
.ok()
|
|
||||||
.and_then(|p| p.parent().map(Path::to_path_buf))
|
|
||||||
.unwrap_or_else(|| PathBuf::from("."));
|
|
||||||
|
|
||||||
match find_project_root(&start) {
|
|
||||||
Some(root) => load_docs(&root),
|
|
||||||
None => {
|
|
||||||
// Fallback: try current working directory
|
|
||||||
let cwd = std::env::current_dir().unwrap_or_else(|_| PathBuf::from("."));
|
|
||||||
if cwd.join("README.md").is_file() {
|
|
||||||
return load_docs(&cwd);
|
|
||||||
}
|
|
||||||
tracing::error!(
|
|
||||||
"help_chat: could not locate project root from {}; doc context will be empty",
|
|
||||||
start.display()
|
|
||||||
);
|
|
||||||
String::new()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
// ── Handler ──────────────────────────────────────────────────────────────────
|
|
||||||
|
|
||||||
/// POST /api/v1/help/chat — Answer questions about the compliance-scanner
|
|
||||||
/// using the project documentation as grounding context.
|
|
||||||
#[tracing::instrument(skip_all)]
|
|
||||||
pub async fn help_chat(
|
|
||||||
Extension(agent): AgentExt,
|
|
||||||
Json(req): Json<HelpChatRequest>,
|
|
||||||
) -> Result<Json<ApiResponse<HelpChatResponse>>, StatusCode> {
|
|
||||||
let context = doc_context();
|
|
||||||
|
|
||||||
let system_prompt = if context.is_empty() {
|
|
||||||
"You are a helpful assistant for the Compliance Scanner project. \
|
|
||||||
Answer questions about how to use and configure it. \
|
|
||||||
No documentation was loaded at startup, so rely on your general knowledge."
|
|
||||||
.to_string()
|
|
||||||
} else {
|
|
||||||
format!(
|
|
||||||
"You are a helpful assistant for the Compliance Scanner project. \
|
|
||||||
Answer questions about how to use, configure, and understand it \
|
|
||||||
using the documentation below as your primary source of truth.\n\n\
|
|
||||||
Rules:\n\
|
|
||||||
- Prefer information from the provided docs over general knowledge\n\
|
|
||||||
- Quote or reference the relevant doc section when it helps\n\
|
|
||||||
- If the docs do not cover the topic, say so clearly\n\
|
|
||||||
- Be concise — lead with the answer, then explain if needed\n\
|
|
||||||
- Use markdown formatting for readability\n\n\
|
|
||||||
## Project Documentation\n\n{context}"
|
|
||||||
)
|
|
||||||
};
|
|
||||||
|
|
||||||
let mut messages: Vec<(String, String)> = Vec::with_capacity(req.history.len() + 2);
|
|
||||||
messages.push(("system".to_string(), system_prompt));
|
|
||||||
|
|
||||||
for msg in &req.history {
|
|
||||||
messages.push((msg.role.clone(), msg.content.clone()));
|
|
||||||
}
|
|
||||||
messages.push(("user".to_string(), req.message));
|
|
||||||
|
|
||||||
let response_text = agent
|
|
||||||
.llm
|
|
||||||
.chat_with_messages(messages, Some(0.3))
|
|
||||||
.await
|
|
||||||
.map_err(|e| {
|
|
||||||
tracing::error!("LLM help chat failed: {e}");
|
|
||||||
StatusCode::INTERNAL_SERVER_ERROR
|
|
||||||
})?;
|
|
||||||
|
|
||||||
Ok(Json(ApiResponse {
|
|
||||||
data: HelpChatResponse {
|
|
||||||
message: response_text,
|
|
||||||
},
|
|
||||||
total: None,
|
|
||||||
page: None,
|
|
||||||
}))
|
|
||||||
}
|
|
||||||
@@ -4,7 +4,6 @@ pub mod dto;
|
|||||||
pub mod findings;
|
pub mod findings;
|
||||||
pub mod graph;
|
pub mod graph;
|
||||||
pub mod health;
|
pub mod health;
|
||||||
pub mod help_chat;
|
|
||||||
pub mod issues;
|
pub mod issues;
|
||||||
pub mod pentest_handlers;
|
pub mod pentest_handlers;
|
||||||
pub use pentest_handlers as pentest;
|
pub use pentest_handlers as pentest;
|
||||||
|
|||||||
@@ -99,8 +99,6 @@ pub fn build_router() -> Router {
|
|||||||
"/api/v1/chat/{repo_id}/status",
|
"/api/v1/chat/{repo_id}/status",
|
||||||
get(handlers::chat::embedding_status),
|
get(handlers::chat::embedding_status),
|
||||||
)
|
)
|
||||||
// Help chat (documentation-grounded Q&A)
|
|
||||||
.route("/api/v1/help/chat", post(handlers::help_chat::help_chat))
|
|
||||||
// Pentest API endpoints
|
// Pentest API endpoints
|
||||||
.route(
|
.route(
|
||||||
"/api/v1/pentest/lookup-repo",
|
"/api/v1/pentest/lookup-repo",
|
||||||
|
|||||||
@@ -5,20 +5,15 @@ use compliance_core::models::Finding;
|
|||||||
use crate::error::AgentError;
|
use crate::error::AgentError;
|
||||||
use crate::llm::LlmClient;
|
use crate::llm::LlmClient;
|
||||||
|
|
||||||
const DESCRIPTION_SYSTEM_PROMPT: &str = r#"You are a security engineer writing a bug tracker issue for a developer to fix. Be direct and actionable — developers skim issue descriptions, so lead with what matters.
|
const DESCRIPTION_SYSTEM_PROMPT: &str = r#"You are a security engineer writing issue descriptions for a bug tracker. Generate a clear, actionable issue body in Markdown format that includes:
|
||||||
|
|
||||||
Format in Markdown:
|
1. **Summary**: 1-2 sentence overview
|
||||||
|
2. **Evidence**: Code location, snippet, and what was detected
|
||||||
|
3. **Impact**: What could happen if not fixed
|
||||||
|
4. **Remediation**: Step-by-step fix instructions
|
||||||
|
5. **References**: Relevant CWE/CVE links if applicable
|
||||||
|
|
||||||
1. **What**: 1 sentence — what's wrong and where (file:line)
|
Keep it concise and professional. Use code blocks for code snippets."#;
|
||||||
2. **Why it matters**: 1-2 sentences — concrete impact if not fixed. Avoid generic "could lead to" phrasing; describe the specific attack or failure scenario.
|
|
||||||
3. **Fix**: The specific code change needed. Use a code block with the corrected code if possible. If the fix is configuration-based, show the exact config change.
|
|
||||||
4. **References**: CWE/CVE link if applicable (one line, not a section)
|
|
||||||
|
|
||||||
Rules:
|
|
||||||
- No filler paragraphs or background explanations
|
|
||||||
- No restating the finding title in the body
|
|
||||||
- Code blocks should show the FIX, not the vulnerable code (the developer can see that in the diff)
|
|
||||||
- If the remediation is a one-liner, just say it — don't wrap it in a section header"#;
|
|
||||||
|
|
||||||
pub async fn generate_issue_description(
|
pub async fn generate_issue_description(
|
||||||
llm: &Arc<LlmClient>,
|
llm: &Arc<LlmClient>,
|
||||||
|
|||||||
@@ -5,24 +5,7 @@ use compliance_core::models::Finding;
|
|||||||
use crate::error::AgentError;
|
use crate::error::AgentError;
|
||||||
use crate::llm::LlmClient;
|
use crate::llm::LlmClient;
|
||||||
|
|
||||||
const FIX_SYSTEM_PROMPT: &str = r#"You are a security engineer suggesting a code fix. Return ONLY the corrected code that replaces the vulnerable snippet — no explanations, no markdown fences, no before/after comparison.
|
const FIX_SYSTEM_PROMPT: &str = r#"You are a security engineer. Given a security finding with code context, suggest a concrete code fix. Return ONLY the fixed code snippet that can directly replace the vulnerable code. Include brief inline comments explaining the fix."#;
|
||||||
|
|
||||||
Rules:
|
|
||||||
- The fix must be a drop-in replacement for the vulnerable code
|
|
||||||
- Preserve the original code's style, indentation, and naming conventions
|
|
||||||
- Add at most one brief inline comment on the changed line explaining the security fix
|
|
||||||
- If the fix requires importing a new module, include the import on a separate line prefixed with the language's comment syntax + "Add import: "
|
|
||||||
- Do not refactor, rename variables, or "improve" unrelated code
|
|
||||||
- If the vulnerability is a false positive and the code is actually safe, return the original code unchanged with a comment explaining why no fix is needed
|
|
||||||
|
|
||||||
Language-specific fix guidance:
|
|
||||||
- Rust: use `?` for error propagation, prefer `SecretString` for secrets, use parameterized queries with `sqlx`/`diesel`
|
|
||||||
- Python: use parameterized queries (never f-strings in SQL), use `secrets` module not `random`, use `subprocess.run([...])` list form, use `markupsafe.escape()` for HTML
|
|
||||||
- Go: use `sql.Query` with `$1`/`?` placeholders, use `crypto/rand` not `math/rand`, use `html/template` not `text/template`, return errors don't panic
|
|
||||||
- Java/Kotlin: use `PreparedStatement` with `?` params, use `SecureRandom`, use `Jsoup.clean()` for HTML sanitization, use `@Valid` for input validation
|
|
||||||
- Ruby: use ActiveRecord parameterized finders, use `SecureRandom`, use `ERB::Util.html_escape`, use `strong_parameters`
|
|
||||||
- PHP: use PDO prepared statements with `:param` or `?`, use `random_bytes()`/`random_int()`, use `htmlspecialchars()` with `ENT_QUOTES`, use `password_hash(PASSWORD_BCRYPT)`
|
|
||||||
- C/C++: use `snprintf` not `sprintf`, use bounds-checked APIs, free resources in reverse allocation order, use `memset_s` for secret cleanup"#;
|
|
||||||
|
|
||||||
pub async fn suggest_fix(llm: &Arc<LlmClient>, finding: &Finding) -> Result<String, AgentError> {
|
pub async fn suggest_fix(llm: &Arc<LlmClient>, finding: &Finding) -> Result<String, AgentError> {
|
||||||
let user_prompt = format!(
|
let user_prompt = format!(
|
||||||
|
|||||||
@@ -1,138 +1,69 @@
|
|||||||
// System prompts for multi-pass LLM code review.
|
// System prompts for multi-pass LLM code review.
|
||||||
// Each pass focuses on a different aspect to avoid overloading a single prompt.
|
// Each pass focuses on a different aspect to avoid overloading a single prompt.
|
||||||
|
|
||||||
pub const LOGIC_REVIEW_PROMPT: &str = r#"You are a senior software engineer reviewing a code diff. Report ONLY genuine logic bugs that would cause incorrect behavior at runtime.
|
pub const LOGIC_REVIEW_PROMPT: &str = r#"You are a senior software engineer reviewing code changes. Focus ONLY on logic and correctness issues.
|
||||||
|
|
||||||
Report:
|
Look for:
|
||||||
- Off-by-one errors, wrong comparisons, missing edge cases that cause wrong results
|
- Off-by-one errors, wrong comparisons, missing edge cases
|
||||||
- Incorrect control flow that produces wrong output (not style preferences)
|
- Incorrect control flow (unreachable code, missing returns, wrong loop conditions)
|
||||||
- Actual race conditions with concrete shared-state mutation (not theoretical ones)
|
- Race conditions or concurrency bugs
|
||||||
- Resource leaks where cleanup is truly missing (not just "could be improved")
|
- Resource leaks (unclosed handles, missing cleanup)
|
||||||
- Wrong variable used (copy-paste errors) — must be provably wrong, not just suspicious
|
- Wrong variable used (copy-paste errors)
|
||||||
- Swallowed errors that silently hide failures in a way that matters
|
- Incorrect error handling (swallowed errors, wrong error type)
|
||||||
|
|
||||||
Do NOT report:
|
Ignore: style, naming, formatting, documentation, minor improvements.
|
||||||
- Style, naming, formatting, documentation, or code organization preferences
|
|
||||||
- Theoretical issues without a concrete triggering scenario
|
|
||||||
- "Potential" problems that require assumptions not supported by the visible code
|
|
||||||
- Complexity or function length — that's a separate review pass
|
|
||||||
|
|
||||||
Language-idiomatic patterns that are NOT bugs (do not flag these):
|
For each issue found, respond with a JSON array:
|
||||||
- Rust: `||`/`&&` short-circuit evaluation, variable shadowing, `let` rebinding, `clone()`, `impl` blocks, `match` arms with guards, `?` operator chaining, `unsafe` blocks with safety comments
|
|
||||||
- Python: duck typing, EAFP pattern (try/except vs check-first), `*args`/`**kwargs`, walrus operator `:=`, truthiness checks on containers, bare `except:` in top-level handlers
|
|
||||||
- Go: multiple return values for errors, `if err != nil` patterns, goroutine + channel patterns, blank identifier `_`, named returns, `defer` for cleanup, `init()` functions
|
|
||||||
- Java/Kotlin: checked exception patterns, method overloading, `Optional` vs null checks, Kotlin `?.` safe calls, `!!` non-null assertions in tests, `when` exhaustive matching, companion objects, `lateinit`
|
|
||||||
- Ruby: monkey patching in libraries, method_missing, blocks/procs/lambdas, `rescue => e` patterns, `send`/`respond_to?` metaprogramming, `nil` checks via `&.` safe navigation
|
|
||||||
- PHP: loose comparisons with `==` (only flag if `===` was clearly intended), `@` error suppression in legacy code, `isset()`/`empty()` patterns, magic methods (`__get`, `__call`), array functions as callbacks
|
|
||||||
- C/C++: RAII patterns, move semantics, `const_cast`/`static_cast` in appropriate contexts, macro usage for platform compat, pointer arithmetic in low-level code, `goto` for cleanup in C
|
|
||||||
|
|
||||||
Severity guide:
|
|
||||||
- high: Will cause incorrect behavior in normal usage
|
|
||||||
- medium: Will cause incorrect behavior in edge cases
|
|
||||||
- low: Minor correctness concern with limited blast radius
|
|
||||||
|
|
||||||
Prefer returning [] over reporting low-confidence guesses. A false positive wastes more developer time than a missed low-severity issue.
|
|
||||||
|
|
||||||
Respond with a JSON array (no markdown fences):
|
|
||||||
[{"title": "...", "description": "...", "severity": "high|medium|low", "file": "...", "line": N, "suggestion": "..."}]
|
[{"title": "...", "description": "...", "severity": "high|medium|low", "file": "...", "line": N, "suggestion": "..."}]
|
||||||
|
|
||||||
If no issues found, respond with: []"#;
|
If no issues found, respond with: []"#;
|
||||||
|
|
||||||
pub const SECURITY_REVIEW_PROMPT: &str = r#"You are a security engineer reviewing a code diff. Report ONLY exploitable security vulnerabilities with a realistic attack scenario.
|
pub const SECURITY_REVIEW_PROMPT: &str = r#"You are a security engineer reviewing code changes. Focus ONLY on security vulnerabilities.
|
||||||
|
|
||||||
Report:
|
Look for:
|
||||||
- Injection vulnerabilities (SQL, command, XSS, template) where untrusted input reaches a sink
|
- Injection vulnerabilities (SQL, command, XSS, template injection)
|
||||||
- Authentication/authorization bypasses with a concrete exploit path
|
- Authentication/authorization bypasses
|
||||||
- Sensitive data exposure: secrets in code, credentials in logs, PII leaks
|
- Sensitive data exposure (logging secrets, hardcoded credentials)
|
||||||
- Insecure cryptography: weak algorithms, predictable randomness, hardcoded keys
|
- Insecure cryptography (weak algorithms, predictable randomness)
|
||||||
- Path traversal, SSRF, open redirects — only where user input reaches the vulnerable API
|
- Path traversal, SSRF, open redirects
|
||||||
- Unsafe deserialization of untrusted data
|
- Unsafe deserialization
|
||||||
- Missing input validation at EXTERNAL trust boundaries (user input, API responses)
|
- Missing input validation at trust boundaries
|
||||||
|
|
||||||
Do NOT report:
|
Ignore: code style, performance, general quality.
|
||||||
- Internal code that only handles trusted/validated data
|
|
||||||
- Hash functions used for non-security purposes (dedup fingerprints, cache keys, content addressing)
|
|
||||||
- Logging of non-sensitive operational data (finding titles, counts, performance metrics)
|
|
||||||
- "Information disclosure" for data that is already public or user-facing
|
|
||||||
- Code style, performance, or general quality issues
|
|
||||||
- Missing validation on internal function parameters (trust the caller within the same module/crate/package)
|
|
||||||
- Theoretical attacks that require preconditions not present in the code
|
|
||||||
|
|
||||||
Language-specific patterns that are NOT vulnerabilities (do not flag these):
|
For each issue found, respond with a JSON array:
|
||||||
- Python: `pickle` used on trusted internal data, `eval()`/`exec()` on hardcoded strings, `subprocess` with hardcoded commands, Django `mark_safe()` on static content, `assert` in non-security contexts
|
|
||||||
- Go: `crypto/rand` is secure (don't confuse with `math/rand`), `sql.DB` with parameterized queries is safe, `http.ListenAndServe` without TLS in dev/internal, error strings in responses (Go convention)
|
|
||||||
- Java/Kotlin: Spring Security annotations are sufficient auth checks, `@Transactional` provides atomicity, JPA parameterized queries are safe, Kotlin `require()`/`check()` are assertion patterns not vulnerabilities
|
|
||||||
- Ruby: Rails `params.permit()` is input validation, `render html:` with `html_safe` on generated content, ActiveRecord parameterized finders are safe, Devise/Warden patterns for auth
|
|
||||||
- PHP: PDO prepared statements are safe, Laravel Eloquent is parameterized, `htmlspecialchars()` is XSS mitigation, Symfony security voters are auth checks, `password_hash()`/`password_verify()` are correct bcrypt usage
|
|
||||||
- C/C++: `strncpy`/`snprintf` are bounds-checked (vs `strcpy`/`sprintf`), smart pointers manage memory, RAII handles cleanup, `static_assert` is compile-time only, OpenSSL with proper context setup
|
|
||||||
- Rust: `sha2`/`blake3` for fingerprinting is not "weak crypto", `unsafe` with documented invariants, `secrecy::SecretString` properly handles secrets
|
|
||||||
|
|
||||||
Severity guide:
|
|
||||||
- critical: Remote code execution, auth bypass, or data breach with no preconditions
|
|
||||||
- high: Exploitable vulnerability requiring minimal preconditions
|
|
||||||
- medium: Vulnerability requiring specific conditions or limited impact
|
|
||||||
|
|
||||||
Prefer returning [] over reporting speculative vulnerabilities. Every false positive erodes trust in the scanner.
|
|
||||||
|
|
||||||
Respond with a JSON array (no markdown fences):
|
|
||||||
[{"title": "...", "description": "...", "severity": "critical|high|medium", "file": "...", "line": N, "cwe": "CWE-XXX", "suggestion": "..."}]
|
[{"title": "...", "description": "...", "severity": "critical|high|medium", "file": "...", "line": N, "cwe": "CWE-XXX", "suggestion": "..."}]
|
||||||
|
|
||||||
If no issues found, respond with: []"#;
|
If no issues found, respond with: []"#;
|
||||||
|
|
||||||
pub const CONVENTION_REVIEW_PROMPT: &str = r#"You are a code reviewer checking for convention violations that indicate likely bugs. Report ONLY deviations from the project's visible patterns that could cause real problems.
|
pub const CONVENTION_REVIEW_PROMPT: &str = r#"You are a code reviewer checking adherence to project conventions. Focus ONLY on patterns that indicate likely bugs or maintenance problems.
|
||||||
|
|
||||||
Report:
|
Look for:
|
||||||
- Inconsistent error handling within the same module where the inconsistency could hide failures
|
- Inconsistent error handling patterns within the same module
|
||||||
- Public API that breaks the module's established contract (not just different style)
|
- Public API that doesn't follow the project's established patterns
|
||||||
- Anti-patterns that are bugs in this language: e.g. `unwrap()` in Rust library code where the CI enforces `clippy::unwrap_used`, `any` defeating TypeScript's type system
|
- Missing or incorrect type annotations that could cause runtime issues
|
||||||
|
- Anti-patterns specific to the language (e.g. unwrap in Rust library code, any in TypeScript)
|
||||||
|
|
||||||
Do NOT report:
|
Do NOT report: minor style preferences, documentation gaps, formatting.
|
||||||
- Style preferences, formatting, naming conventions, or documentation
|
Only report issues with HIGH confidence that they deviate from the visible codebase conventions.
|
||||||
- Code organization suggestions ("this function should be split")
|
|
||||||
- Patterns that are valid in the language even if you'd write them differently
|
|
||||||
- "Missing type annotations" unless the code literally won't compile or causes a type inference bug
|
|
||||||
|
|
||||||
Language-specific patterns that are conventional (do not flag these):
|
For each issue found, respond with a JSON array:
|
||||||
- Rust: variable shadowing, `||`/`&&` short-circuit, `let` rebinding, builder patterns, `clone()`, `From`/`Into` impl chains, `#[allow(...)]` attributes
|
|
||||||
- Python: `**kwargs` forwarding, `@property` setters, `__dunder__` methods, list comprehensions with conditions, `if TYPE_CHECKING` imports, `noqa` comments
|
|
||||||
- Go: stuttering names (`http.HTTPClient`) discouraged but not a bug, `context.Context` as first param, init() functions, `//nolint` directives, returning concrete types vs interfaces in internal code
|
|
||||||
- Java/Kotlin: builder pattern boilerplate, Lombok annotations (`@Data`, `@Builder`), Kotlin data classes, `companion object` factories, `@Suppress` annotations, checked exception wrapping
|
|
||||||
- Ruby: `attr_accessor` usage, `Enumerable` mixin patterns, `module_function`, `class << self` syntax, DSL blocks (Rake, RSpec, Sinatra routes)
|
|
||||||
- PHP: `__construct` with property promotion, Laravel facades, static factory methods, nullable types with `?`, attribute syntax `#[...]`
|
|
||||||
- C/C++: header guards vs `#pragma once`, forward declarations, `const` correctness patterns, template specialization, `auto` type deduction
|
|
||||||
|
|
||||||
Severity guide:
|
|
||||||
- medium: Convention violation that will likely cause a bug or maintenance problem
|
|
||||||
- low: Convention violation that is a minor concern
|
|
||||||
|
|
||||||
Return at most 3 findings. Prefer [] over marginal findings.
|
|
||||||
|
|
||||||
Respond with a JSON array (no markdown fences):
|
|
||||||
[{"title": "...", "description": "...", "severity": "medium|low", "file": "...", "line": N, "suggestion": "..."}]
|
[{"title": "...", "description": "...", "severity": "medium|low", "file": "...", "line": N, "suggestion": "..."}]
|
||||||
|
|
||||||
If no issues found, respond with: []"#;
|
If no issues found, respond with: []"#;
|
||||||
|
|
||||||
pub const COMPLEXITY_REVIEW_PROMPT: &str = r#"You are reviewing code changes for complexity that is likely to cause bugs. Report ONLY complexity that makes the code demonstrably harder to reason about.
|
pub const COMPLEXITY_REVIEW_PROMPT: &str = r#"You are reviewing code changes for excessive complexity that could lead to bugs.
|
||||||
|
|
||||||
Report:
|
Look for:
|
||||||
- Functions over 80 lines with multiple interleaved responsibilities (not just long)
|
- Functions over 50 lines that should be decomposed
|
||||||
- Deeply nested control flow (5+ levels) where flattening would prevent bugs
|
- Deeply nested control flow (4+ levels)
|
||||||
- Complex boolean expressions that a reader would likely misinterpret
|
- Complex boolean expressions that are hard to reason about
|
||||||
|
- Functions with 5+ parameters
|
||||||
|
- Code duplication within the changed files
|
||||||
|
|
||||||
Do NOT report:
|
Only report complexity issues that are HIGH risk for future bugs. Ignore acceptable complexity in configuration, CLI argument parsing, or generated code.
|
||||||
- Functions that are long but linear and easy to follow
|
|
||||||
- Acceptable complexity: configuration setup, CLI parsing, test helpers, builder patterns
|
|
||||||
- Code that is complex because the problem is complex — only report if restructuring would reduce bug risk
|
|
||||||
- "This function does multiple things" unless you can identify a specific bug risk from the coupling
|
|
||||||
- Suggestions that would just move complexity elsewhere without reducing it
|
|
||||||
|
|
||||||
Severity guide:
|
For each issue found, respond with a JSON array:
|
||||||
- medium: Complexity that has a concrete risk of causing bugs during future changes
|
|
||||||
- low: Complexity that makes review harder but is unlikely to cause bugs
|
|
||||||
|
|
||||||
Return at most 2 findings. Prefer [] over reporting complexity that is justified.
|
|
||||||
|
|
||||||
Respond with a JSON array (no markdown fences):
|
|
||||||
[{"title": "...", "description": "...", "severity": "medium|low", "file": "...", "line": N, "suggestion": "..."}]
|
[{"title": "...", "description": "...", "severity": "medium|low", "file": "...", "line": N, "suggestion": "..."}]
|
||||||
|
|
||||||
If no issues found, respond with: []"#;
|
If no issues found, respond with: []"#;
|
||||||
|
|||||||
@@ -8,46 +8,22 @@ use crate::pipeline::orchestrator::GraphContext;
|
|||||||
/// Maximum number of findings to include in a single LLM triage call.
|
/// Maximum number of findings to include in a single LLM triage call.
|
||||||
const TRIAGE_CHUNK_SIZE: usize = 30;
|
const TRIAGE_CHUNK_SIZE: usize = 30;
|
||||||
|
|
||||||
const TRIAGE_SYSTEM_PROMPT: &str = r#"You are a pragmatic security triage expert. Your job is to filter out noise and keep only findings that a developer should actually fix. Be aggressive about dismissing false positives — a clean, high-signal list is more valuable than a comprehensive one.
|
const TRIAGE_SYSTEM_PROMPT: &str = r#"You are a security finding triage expert. Analyze each of the following security findings with its code context and determine the appropriate action.
|
||||||
|
|
||||||
Actions:
|
Actions:
|
||||||
- "confirm": True positive with real impact. Keep severity as-is.
|
- "confirm": The finding is a true positive at the reported severity. Keep as-is.
|
||||||
- "downgrade": Real issue but over-reported severity. Lower it.
|
- "downgrade": The finding is real but over-reported. Lower severity recommended.
|
||||||
- "upgrade": Under-reported — higher severity warranted.
|
- "upgrade": The finding is under-reported. Higher severity recommended.
|
||||||
- "dismiss": False positive, not exploitable, or not actionable. Remove it.
|
- "dismiss": The finding is a false positive. Should be removed.
|
||||||
|
|
||||||
Dismiss when:
|
Consider:
|
||||||
- The scanner flagged a language idiom as a bug (see examples below)
|
- Is the code in a test, example, or generated file? (lower confidence for test code)
|
||||||
- The finding is in test/example/generated/vendored code
|
- Does the surrounding code context confirm or refute the finding?
|
||||||
- The "vulnerability" requires preconditions that don't exist in the code
|
- Is the finding actionable by a developer?
|
||||||
- The finding is about code style, complexity, or theoretical concerns rather than actual bugs
|
- Would a real attacker be able to exploit this?
|
||||||
- A hash function is used for non-security purposes (dedup, caching, content addressing)
|
|
||||||
- Internal logging of non-sensitive operational data is flagged as "information disclosure"
|
|
||||||
- The finding duplicates another finding already in the list
|
|
||||||
- Framework-provided security is already in place (e.g. ORM parameterized queries, CSRF middleware, auth decorators)
|
|
||||||
|
|
||||||
Common false positive patterns by language (dismiss these):
|
Respond with a JSON array, one entry per finding in the same order they were presented:
|
||||||
- Rust: short-circuit `||`/`&&`, variable shadowing, `clone()`, `unsafe` with safety docs, `sha2` for fingerprinting
|
[{"id": "<fingerprint>", "action": "confirm|downgrade|upgrade|dismiss", "confidence": 0-10, "rationale": "brief explanation", "remediation": "optional fix suggestion"}, ...]"#;
|
||||||
- Python: EAFP try/except, `subprocess` with hardcoded args, `pickle` on trusted data, Django `mark_safe` on static content
|
|
||||||
- Go: `if err != nil` is not "swallowed error", `crypto/rand` is secure, returning errors is not "information disclosure"
|
|
||||||
- Java/Kotlin: Spring Security annotations are valid auth, JPA parameterized queries are safe, Kotlin `!!` in tests is fine
|
|
||||||
- Ruby: Rails `params.permit` is validation, ActiveRecord finders are parameterized, `html_safe` on generated content
|
|
||||||
- PHP: PDO prepared statements are safe, Laravel Eloquent is parameterized, `htmlspecialchars` is XSS mitigation
|
|
||||||
- C/C++: `strncpy`/`snprintf` are bounds-checked, smart pointers manage memory, RAII handles cleanup
|
|
||||||
|
|
||||||
Confirm only when:
|
|
||||||
- You can describe a concrete scenario where the bug manifests or the vulnerability is exploitable
|
|
||||||
- The fix is actionable (developer can change specific code to resolve it)
|
|
||||||
- The finding is in production code that handles external input or sensitive data
|
|
||||||
|
|
||||||
Confidence scoring (0-10):
|
|
||||||
- 8-10: Certain true positive with clear exploit/bug scenario
|
|
||||||
- 5-7: Likely true positive, some assumptions required
|
|
||||||
- 3-4: Uncertain, needs manual review
|
|
||||||
- 0-2: Almost certainly a false positive
|
|
||||||
|
|
||||||
Respond with a JSON array, one entry per finding in the same order presented (no markdown fences):
|
|
||||||
[{"id": "<fingerprint>", "action": "confirm|downgrade|upgrade|dismiss", "confidence": 0-10, "rationale": "1-2 sentences", "remediation": "optional fix"}, ...]"#;
|
|
||||||
|
|
||||||
pub async fn triage_findings(
|
pub async fn triage_findings(
|
||||||
llm: &Arc<LlmClient>,
|
llm: &Arc<LlmClient>,
|
||||||
|
|||||||
@@ -314,21 +314,6 @@ impl PentestOrchestrator {
|
|||||||
- For SPA apps: a 200 HTTP status does NOT mean the page is accessible — check the actual
|
- For SPA apps: a 200 HTTP status does NOT mean the page is accessible — check the actual
|
||||||
page content with the browser tool to verify if it shows real data or a login redirect.
|
page content with the browser tool to verify if it shows real data or a login redirect.
|
||||||
|
|
||||||
## Finding Quality Rules
|
|
||||||
- **Do not report the same issue twice.** If multiple tools detect the same missing header or
|
|
||||||
vulnerability on the same endpoint, report it ONCE with the most specific tool's output.
|
|
||||||
For example, if the recon tool and the header scanner both find missing HSTS, report it only
|
|
||||||
from the header scanner (more specific).
|
|
||||||
- **Group related findings.** Missing security headers on the same endpoint are ONE finding
|
|
||||||
("Missing security headers") listing all missing headers, not separate findings per header.
|
|
||||||
- **Severity must match real impact:**
|
|
||||||
- critical/high: Exploitable vulnerability (you can demonstrate the exploit)
|
|
||||||
- medium: Real misconfiguration with security implications but not directly exploitable
|
|
||||||
- low: Best-practice recommendation, defense-in-depth, or informational
|
|
||||||
- **Missing headers are medium at most** unless you can demonstrate a concrete exploit enabled
|
|
||||||
by the missing header (e.g., missing CSP + confirmed XSS = high for CSP finding).
|
|
||||||
- Console.log in third-party/vendored JS (node_modules, minified libraries) is informational only.
|
|
||||||
|
|
||||||
## Important
|
## Important
|
||||||
- This is an authorized penetration test. All testing is permitted within the target scope.
|
- This is an authorized penetration test. All testing is permitted within the target scope.
|
||||||
- Respect the rate limit of {rate_limit} requests per second.
|
- Respect the rate limit of {rate_limit} requests per second.
|
||||||
|
|||||||
@@ -3645,205 +3645,3 @@ tbody tr:last-child td {
|
|||||||
.wizard-toggle.active .wizard-toggle-knob {
|
.wizard-toggle.active .wizard-toggle-knob {
|
||||||
transform: translateX(16px);
|
transform: translateX(16px);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ═══════════════════════════════════════════════════════════════
|
|
||||||
HELP CHAT WIDGET
|
|
||||||
Floating assistant for documentation Q&A
|
|
||||||
═══════════════════════════════════════════════════════════════ */
|
|
||||||
|
|
||||||
.help-chat-toggle {
|
|
||||||
position: fixed;
|
|
||||||
bottom: 24px;
|
|
||||||
right: 28px;
|
|
||||||
z-index: 50;
|
|
||||||
width: 48px;
|
|
||||||
height: 48px;
|
|
||||||
border-radius: 50%;
|
|
||||||
background: var(--accent);
|
|
||||||
color: var(--bg-primary);
|
|
||||||
border: none;
|
|
||||||
cursor: pointer;
|
|
||||||
display: flex;
|
|
||||||
align-items: center;
|
|
||||||
justify-content: center;
|
|
||||||
box-shadow: 0 4px 20px rgba(0, 200, 255, 0.3);
|
|
||||||
transition: transform 0.15s, box-shadow 0.15s;
|
|
||||||
}
|
|
||||||
.help-chat-toggle:hover {
|
|
||||||
transform: scale(1.08);
|
|
||||||
box-shadow: 0 6px 28px rgba(0, 200, 255, 0.4);
|
|
||||||
}
|
|
||||||
|
|
||||||
.help-chat-panel {
|
|
||||||
position: fixed;
|
|
||||||
bottom: 24px;
|
|
||||||
right: 28px;
|
|
||||||
z-index: 51;
|
|
||||||
width: 400px;
|
|
||||||
height: 520px;
|
|
||||||
background: var(--bg-secondary);
|
|
||||||
border: 1px solid var(--border-bright);
|
|
||||||
border-radius: 16px;
|
|
||||||
display: flex;
|
|
||||||
flex-direction: column;
|
|
||||||
overflow: hidden;
|
|
||||||
box-shadow: 0 12px 48px rgba(0, 0, 0, 0.5), var(--accent-glow);
|
|
||||||
}
|
|
||||||
|
|
||||||
.help-chat-header {
|
|
||||||
display: flex;
|
|
||||||
align-items: center;
|
|
||||||
justify-content: space-between;
|
|
||||||
padding: 14px 18px;
|
|
||||||
border-bottom: 1px solid var(--border);
|
|
||||||
background: var(--bg-primary);
|
|
||||||
}
|
|
||||||
.help-chat-title {
|
|
||||||
display: flex;
|
|
||||||
align-items: center;
|
|
||||||
gap: 8px;
|
|
||||||
font-family: 'Outfit', sans-serif;
|
|
||||||
font-weight: 600;
|
|
||||||
font-size: 14px;
|
|
||||||
color: var(--text-primary);
|
|
||||||
}
|
|
||||||
.help-chat-close {
|
|
||||||
background: none;
|
|
||||||
border: none;
|
|
||||||
color: var(--text-secondary);
|
|
||||||
cursor: pointer;
|
|
||||||
padding: 4px;
|
|
||||||
border-radius: 6px;
|
|
||||||
display: flex;
|
|
||||||
}
|
|
||||||
.help-chat-close:hover {
|
|
||||||
color: var(--text-primary);
|
|
||||||
background: var(--bg-elevated);
|
|
||||||
}
|
|
||||||
|
|
||||||
.help-chat-messages {
|
|
||||||
flex: 1;
|
|
||||||
overflow-y: auto;
|
|
||||||
padding: 16px;
|
|
||||||
display: flex;
|
|
||||||
flex-direction: column;
|
|
||||||
gap: 12px;
|
|
||||||
}
|
|
||||||
|
|
||||||
.help-chat-empty {
|
|
||||||
display: flex;
|
|
||||||
flex-direction: column;
|
|
||||||
align-items: center;
|
|
||||||
justify-content: center;
|
|
||||||
height: 100%;
|
|
||||||
text-align: center;
|
|
||||||
color: var(--text-secondary);
|
|
||||||
font-size: 13px;
|
|
||||||
gap: 8px;
|
|
||||||
}
|
|
||||||
.help-chat-hint {
|
|
||||||
font-size: 12px;
|
|
||||||
color: var(--text-tertiary);
|
|
||||||
font-style: italic;
|
|
||||||
}
|
|
||||||
|
|
||||||
.help-msg {
|
|
||||||
max-width: 88%;
|
|
||||||
animation: helpMsgIn 0.15s ease-out;
|
|
||||||
}
|
|
||||||
@keyframes helpMsgIn {
|
|
||||||
from { opacity: 0; transform: translateY(6px); }
|
|
||||||
to { opacity: 1; transform: translateY(0); }
|
|
||||||
}
|
|
||||||
.help-msg-user {
|
|
||||||
align-self: flex-end;
|
|
||||||
}
|
|
||||||
.help-msg-assistant {
|
|
||||||
align-self: flex-start;
|
|
||||||
}
|
|
||||||
.help-msg-content {
|
|
||||||
padding: 10px 14px;
|
|
||||||
border-radius: 12px;
|
|
||||||
font-size: 13px;
|
|
||||||
line-height: 1.55;
|
|
||||||
word-wrap: break-word;
|
|
||||||
}
|
|
||||||
.help-msg-user .help-msg-content {
|
|
||||||
background: var(--accent);
|
|
||||||
color: var(--bg-primary);
|
|
||||||
border-bottom-right-radius: 4px;
|
|
||||||
}
|
|
||||||
.help-msg-assistant .help-msg-content {
|
|
||||||
background: var(--bg-elevated);
|
|
||||||
color: var(--text-primary);
|
|
||||||
border: 1px solid var(--border);
|
|
||||||
border-bottom-left-radius: 4px;
|
|
||||||
}
|
|
||||||
.help-msg-assistant .help-msg-content code {
|
|
||||||
background: rgba(0, 200, 255, 0.1);
|
|
||||||
padding: 1px 5px;
|
|
||||||
border-radius: 3px;
|
|
||||||
font-family: 'JetBrains Mono', monospace;
|
|
||||||
font-size: 12px;
|
|
||||||
}
|
|
||||||
.help-msg-loading {
|
|
||||||
padding: 10px 14px;
|
|
||||||
border-radius: 12px;
|
|
||||||
background: var(--bg-elevated);
|
|
||||||
border: 1px solid var(--border);
|
|
||||||
border-bottom-left-radius: 4px;
|
|
||||||
color: var(--text-secondary);
|
|
||||||
font-size: 13px;
|
|
||||||
animation: helpPulse 1.2s ease-in-out infinite;
|
|
||||||
}
|
|
||||||
@keyframes helpPulse {
|
|
||||||
0%, 100% { opacity: 0.6; }
|
|
||||||
50% { opacity: 1; }
|
|
||||||
}
|
|
||||||
|
|
||||||
.help-chat-input {
|
|
||||||
display: flex;
|
|
||||||
align-items: center;
|
|
||||||
gap: 8px;
|
|
||||||
padding: 12px 14px;
|
|
||||||
border-top: 1px solid var(--border);
|
|
||||||
background: var(--bg-primary);
|
|
||||||
}
|
|
||||||
.help-chat-input input {
|
|
||||||
flex: 1;
|
|
||||||
background: var(--bg-elevated);
|
|
||||||
border: 1px solid var(--border);
|
|
||||||
border-radius: 8px;
|
|
||||||
padding: 10px 14px;
|
|
||||||
color: var(--text-primary);
|
|
||||||
font-size: 13px;
|
|
||||||
font-family: 'DM Sans', sans-serif;
|
|
||||||
outline: none;
|
|
||||||
transition: border-color 0.15s;
|
|
||||||
}
|
|
||||||
.help-chat-input input:focus {
|
|
||||||
border-color: var(--accent);
|
|
||||||
}
|
|
||||||
.help-chat-input input::placeholder {
|
|
||||||
color: var(--text-tertiary);
|
|
||||||
}
|
|
||||||
.help-chat-send {
|
|
||||||
width: 36px;
|
|
||||||
height: 36px;
|
|
||||||
border-radius: 8px;
|
|
||||||
background: var(--accent);
|
|
||||||
color: var(--bg-primary);
|
|
||||||
border: none;
|
|
||||||
cursor: pointer;
|
|
||||||
display: flex;
|
|
||||||
align-items: center;
|
|
||||||
justify-content: center;
|
|
||||||
transition: opacity 0.15s;
|
|
||||||
}
|
|
||||||
.help-chat-send:disabled {
|
|
||||||
opacity: 0.4;
|
|
||||||
cursor: not-allowed;
|
|
||||||
}
|
|
||||||
.help-chat-send:not(:disabled):hover {
|
|
||||||
background: var(--accent-hover);
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -44,6 +44,8 @@ pub enum Route {
|
|||||||
PentestSessionPage { session_id: String },
|
PentestSessionPage { session_id: String },
|
||||||
#[route("/mcp-servers")]
|
#[route("/mcp-servers")]
|
||||||
McpServersPage {},
|
McpServersPage {},
|
||||||
|
#[route("/settings")]
|
||||||
|
SettingsPage {},
|
||||||
}
|
}
|
||||||
|
|
||||||
const FAVICON: Asset = asset!("/assets/favicon.svg");
|
const FAVICON: Asset = asset!("/assets/favicon.svg");
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
use dioxus::prelude::*;
|
use dioxus::prelude::*;
|
||||||
|
|
||||||
use crate::app::Route;
|
use crate::app::Route;
|
||||||
use crate::components::help_chat::HelpChat;
|
|
||||||
use crate::components::sidebar::Sidebar;
|
use crate::components::sidebar::Sidebar;
|
||||||
use crate::components::toast::{ToastContainer, Toasts};
|
use crate::components::toast::{ToastContainer, Toasts};
|
||||||
use crate::infrastructure::auth_check::check_auth;
|
use crate::infrastructure::auth_check::check_auth;
|
||||||
@@ -22,7 +21,6 @@ pub fn AppShell() -> Element {
|
|||||||
Outlet::<Route> {}
|
Outlet::<Route> {}
|
||||||
}
|
}
|
||||||
ToastContainer {}
|
ToastContainer {}
|
||||||
HelpChat {}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,198 +0,0 @@
|
|||||||
use dioxus::prelude::*;
|
|
||||||
use dioxus_free_icons::icons::bs_icons::*;
|
|
||||||
use dioxus_free_icons::Icon;
|
|
||||||
|
|
||||||
use crate::infrastructure::help_chat::{send_help_chat_message, HelpChatHistoryMessage};
|
|
||||||
|
|
||||||
// ── Message model ────────────────────────────────────────────────────────────
|
|
||||||
|
|
||||||
#[derive(Clone, Debug)]
|
|
||||||
struct ChatMsg {
|
|
||||||
role: String,
|
|
||||||
content: String,
|
|
||||||
}
|
|
||||||
|
|
||||||
// ── Component ────────────────────────────────────────────────────────────────
|
|
||||||
|
|
||||||
#[component]
|
|
||||||
pub fn HelpChat() -> Element {
|
|
||||||
let mut is_open = use_signal(|| false);
|
|
||||||
let mut messages = use_signal(Vec::<ChatMsg>::new);
|
|
||||||
let mut input_text = use_signal(String::new);
|
|
||||||
let mut is_loading = use_signal(|| false);
|
|
||||||
|
|
||||||
// Send message handler
|
|
||||||
let on_send = move |_| {
|
|
||||||
let text = input_text().trim().to_string();
|
|
||||||
if text.is_empty() || is_loading() {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Push user message
|
|
||||||
messages.write().push(ChatMsg {
|
|
||||||
role: "user".into(),
|
|
||||||
content: text.clone(),
|
|
||||||
});
|
|
||||||
input_text.set(String::new());
|
|
||||||
is_loading.set(true);
|
|
||||||
|
|
||||||
// Build history for API call (exclude last user message, it goes as `message`)
|
|
||||||
let history: Vec<HelpChatHistoryMessage> = messages()
|
|
||||||
.iter()
|
|
||||||
.rev()
|
|
||||||
.skip(1) // skip the user message we just added
|
|
||||||
.rev()
|
|
||||||
.map(|m| HelpChatHistoryMessage {
|
|
||||||
role: m.role.clone(),
|
|
||||||
content: m.content.clone(),
|
|
||||||
})
|
|
||||||
.collect();
|
|
||||||
|
|
||||||
spawn(async move {
|
|
||||||
match send_help_chat_message(text, history).await {
|
|
||||||
Ok(resp) => {
|
|
||||||
messages.write().push(ChatMsg {
|
|
||||||
role: "assistant".into(),
|
|
||||||
content: resp.data.message,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
Err(e) => {
|
|
||||||
messages.write().push(ChatMsg {
|
|
||||||
role: "assistant".into(),
|
|
||||||
content: format!("Error: {e}"),
|
|
||||||
});
|
|
||||||
}
|
|
||||||
}
|
|
||||||
is_loading.set(false);
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
// Key handler for Enter to send
|
|
||||||
let on_keydown = move |e: KeyboardEvent| {
|
|
||||||
if e.key() == Key::Enter && !e.modifiers().shift() {
|
|
||||||
e.prevent_default();
|
|
||||||
let text = input_text().trim().to_string();
|
|
||||||
if text.is_empty() || is_loading() {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
messages.write().push(ChatMsg {
|
|
||||||
role: "user".into(),
|
|
||||||
content: text.clone(),
|
|
||||||
});
|
|
||||||
input_text.set(String::new());
|
|
||||||
is_loading.set(true);
|
|
||||||
|
|
||||||
let history: Vec<HelpChatHistoryMessage> = messages()
|
|
||||||
.iter()
|
|
||||||
.rev()
|
|
||||||
.skip(1)
|
|
||||||
.rev()
|
|
||||||
.map(|m| HelpChatHistoryMessage {
|
|
||||||
role: m.role.clone(),
|
|
||||||
content: m.content.clone(),
|
|
||||||
})
|
|
||||||
.collect();
|
|
||||||
|
|
||||||
spawn(async move {
|
|
||||||
match send_help_chat_message(text, history).await {
|
|
||||||
Ok(resp) => {
|
|
||||||
messages.write().push(ChatMsg {
|
|
||||||
role: "assistant".into(),
|
|
||||||
content: resp.data.message,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
Err(e) => {
|
|
||||||
messages.write().push(ChatMsg {
|
|
||||||
role: "assistant".into(),
|
|
||||||
content: format!("Error: {e}"),
|
|
||||||
});
|
|
||||||
}
|
|
||||||
}
|
|
||||||
is_loading.set(false);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
rsx! {
|
|
||||||
// Floating toggle button
|
|
||||||
if !is_open() {
|
|
||||||
button {
|
|
||||||
class: "help-chat-toggle",
|
|
||||||
onclick: move |_| is_open.set(true),
|
|
||||||
title: "Help",
|
|
||||||
Icon { icon: BsQuestionCircle, width: 22, height: 22 }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Chat panel
|
|
||||||
if is_open() {
|
|
||||||
div { class: "help-chat-panel",
|
|
||||||
// Header
|
|
||||||
div { class: "help-chat-header",
|
|
||||||
span { class: "help-chat-title",
|
|
||||||
Icon { icon: BsRobot, width: 16, height: 16 }
|
|
||||||
"Help Assistant"
|
|
||||||
}
|
|
||||||
button {
|
|
||||||
class: "help-chat-close",
|
|
||||||
onclick: move |_| is_open.set(false),
|
|
||||||
Icon { icon: BsX, width: 18, height: 18 }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Messages area
|
|
||||||
div { class: "help-chat-messages",
|
|
||||||
if messages().is_empty() {
|
|
||||||
div { class: "help-chat-empty",
|
|
||||||
p { "Ask me anything about the Compliance Scanner." }
|
|
||||||
p { class: "help-chat-hint",
|
|
||||||
"e.g. \"How do I add a repository?\" or \"What is SBOM?\""
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for (i, msg) in messages().iter().enumerate() {
|
|
||||||
div {
|
|
||||||
key: "{i}",
|
|
||||||
class: if msg.role == "user" { "help-msg help-msg-user" } else { "help-msg help-msg-assistant" },
|
|
||||||
div { class: "help-msg-content",
|
|
||||||
dangerous_inner_html: if msg.role == "assistant" {
|
|
||||||
// Basic markdown rendering: bold, code, newlines
|
|
||||||
msg.content
|
|
||||||
.replace("**", "<strong>")
|
|
||||||
.replace("\n\n", "<br><br>")
|
|
||||||
.replace("\n- ", "<br>- ")
|
|
||||||
.replace("`", "<code>")
|
|
||||||
} else {
|
|
||||||
msg.content.clone()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if is_loading() {
|
|
||||||
div { class: "help-msg help-msg-assistant",
|
|
||||||
div { class: "help-msg-loading", "Thinking..." }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Input area
|
|
||||||
div { class: "help-chat-input",
|
|
||||||
input {
|
|
||||||
r#type: "text",
|
|
||||||
placeholder: "Ask a question...",
|
|
||||||
value: "{input_text}",
|
|
||||||
disabled: is_loading(),
|
|
||||||
oninput: move |e| input_text.set(e.value()),
|
|
||||||
onkeydown: on_keydown,
|
|
||||||
}
|
|
||||||
button {
|
|
||||||
class: "help-chat-send",
|
|
||||||
disabled: is_loading() || input_text().trim().is_empty(),
|
|
||||||
onclick: on_send,
|
|
||||||
Icon { icon: BsSend, width: 14, height: 14 }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -3,7 +3,6 @@ pub mod attack_chain;
|
|||||||
pub mod code_inspector;
|
pub mod code_inspector;
|
||||||
pub mod code_snippet;
|
pub mod code_snippet;
|
||||||
pub mod file_tree;
|
pub mod file_tree;
|
||||||
pub mod help_chat;
|
|
||||||
pub mod page_header;
|
pub mod page_header;
|
||||||
pub mod pagination;
|
pub mod pagination;
|
||||||
pub mod pentest_wizard;
|
pub mod pentest_wizard;
|
||||||
|
|||||||
@@ -52,6 +52,11 @@ pub fn Sidebar() -> Element {
|
|||||||
route: Route::PentestDashboardPage {},
|
route: Route::PentestDashboardPage {},
|
||||||
icon: rsx! { Icon { icon: BsLightningCharge, width: 18, height: 18 } },
|
icon: rsx! { Icon { icon: BsLightningCharge, width: 18, height: 18 } },
|
||||||
},
|
},
|
||||||
|
NavItem {
|
||||||
|
label: "Settings",
|
||||||
|
route: Route::SettingsPage {},
|
||||||
|
icon: rsx! { Icon { icon: BsGear, width: 18, height: 18 } },
|
||||||
|
},
|
||||||
];
|
];
|
||||||
|
|
||||||
let docs_url = option_env!("DOCS_URL").unwrap_or("/docs");
|
let docs_url = option_env!("DOCS_URL").unwrap_or("/docs");
|
||||||
|
|||||||
@@ -1,59 +0,0 @@
|
|||||||
use dioxus::prelude::*;
|
|
||||||
use serde::{Deserialize, Serialize};
|
|
||||||
|
|
||||||
// ── Response types ──
|
|
||||||
|
|
||||||
#[derive(Debug, Clone, Serialize, Deserialize, Default)]
|
|
||||||
pub struct HelpChatApiResponse {
|
|
||||||
pub data: HelpChatResponseData,
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug, Clone, Serialize, Deserialize, Default)]
|
|
||||||
pub struct HelpChatResponseData {
|
|
||||||
pub message: String,
|
|
||||||
}
|
|
||||||
|
|
||||||
// ── History message type ──
|
|
||||||
|
|
||||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
|
||||||
pub struct HelpChatHistoryMessage {
|
|
||||||
pub role: String,
|
|
||||||
pub content: String,
|
|
||||||
}
|
|
||||||
|
|
||||||
// ── Server function ──
|
|
||||||
|
|
||||||
#[server]
|
|
||||||
pub async fn send_help_chat_message(
|
|
||||||
message: String,
|
|
||||||
history: Vec<HelpChatHistoryMessage>,
|
|
||||||
) -> Result<HelpChatApiResponse, ServerFnError> {
|
|
||||||
let state: super::server_state::ServerState =
|
|
||||||
dioxus_fullstack::FullstackContext::extract().await?;
|
|
||||||
|
|
||||||
let url = format!("{}/api/v1/help/chat", state.agent_api_url);
|
|
||||||
let client = reqwest::Client::builder()
|
|
||||||
.timeout(std::time::Duration::from_secs(120))
|
|
||||||
.build()
|
|
||||||
.map_err(|e| ServerFnError::new(e.to_string()))?;
|
|
||||||
|
|
||||||
let resp = client
|
|
||||||
.post(&url)
|
|
||||||
.json(&serde_json::json!({
|
|
||||||
"message": message,
|
|
||||||
"history": history,
|
|
||||||
}))
|
|
||||||
.send()
|
|
||||||
.await
|
|
||||||
.map_err(|e| ServerFnError::new(format!("Help chat request failed: {e}")))?;
|
|
||||||
|
|
||||||
let text = resp
|
|
||||||
.text()
|
|
||||||
.await
|
|
||||||
.map_err(|e| ServerFnError::new(format!("Failed to read response: {e}")))?;
|
|
||||||
|
|
||||||
let body: HelpChatApiResponse = serde_json::from_str(&text)
|
|
||||||
.map_err(|e| ServerFnError::new(format!("Failed to parse response: {e}")))?;
|
|
||||||
|
|
||||||
Ok(body)
|
|
||||||
}
|
|
||||||
@@ -5,7 +5,6 @@ pub mod chat;
|
|||||||
pub mod dast;
|
pub mod dast;
|
||||||
pub mod findings;
|
pub mod findings;
|
||||||
pub mod graph;
|
pub mod graph;
|
||||||
pub mod help_chat;
|
|
||||||
pub mod issues;
|
pub mod issues;
|
||||||
pub mod mcp;
|
pub mod mcp;
|
||||||
pub mod pentest;
|
pub mod pentest;
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ pub mod pentest_dashboard;
|
|||||||
pub mod pentest_session;
|
pub mod pentest_session;
|
||||||
pub mod repositories;
|
pub mod repositories;
|
||||||
pub mod sbom;
|
pub mod sbom;
|
||||||
|
pub mod settings;
|
||||||
|
|
||||||
pub use chat::ChatPage;
|
pub use chat::ChatPage;
|
||||||
pub use chat_index::ChatIndexPage;
|
pub use chat_index::ChatIndexPage;
|
||||||
@@ -35,3 +36,4 @@ pub use pentest_dashboard::PentestDashboardPage;
|
|||||||
pub use pentest_session::PentestSessionPage;
|
pub use pentest_session::PentestSessionPage;
|
||||||
pub use repositories::RepositoriesPage;
|
pub use repositories::RepositoriesPage;
|
||||||
pub use sbom::SbomPage;
|
pub use sbom::SbomPage;
|
||||||
|
pub use settings::SettingsPage;
|
||||||
|
|||||||
142
compliance-dashboard/src/pages/settings.rs
Normal file
142
compliance-dashboard/src/pages/settings.rs
Normal file
@@ -0,0 +1,142 @@
|
|||||||
|
use dioxus::prelude::*;
|
||||||
|
|
||||||
|
use crate::components::page_header::PageHeader;
|
||||||
|
|
||||||
|
#[component]
|
||||||
|
pub fn SettingsPage() -> Element {
|
||||||
|
let mut litellm_url = use_signal(|| "http://localhost:4000".to_string());
|
||||||
|
let mut litellm_model = use_signal(|| "gpt-4o".to_string());
|
||||||
|
let mut github_token = use_signal(String::new);
|
||||||
|
let mut gitlab_url = use_signal(|| "https://gitlab.com".to_string());
|
||||||
|
let mut gitlab_token = use_signal(String::new);
|
||||||
|
let mut jira_url = use_signal(String::new);
|
||||||
|
let mut jira_email = use_signal(String::new);
|
||||||
|
let mut jira_token = use_signal(String::new);
|
||||||
|
let mut jira_project = use_signal(String::new);
|
||||||
|
let mut searxng_url = use_signal(|| "http://localhost:8888".to_string());
|
||||||
|
|
||||||
|
rsx! {
|
||||||
|
PageHeader {
|
||||||
|
title: "Settings",
|
||||||
|
description: "Configure integrations and scanning parameters",
|
||||||
|
}
|
||||||
|
|
||||||
|
div { class: "card",
|
||||||
|
div { class: "card-header", "LiteLLM Configuration" }
|
||||||
|
div { class: "form-group",
|
||||||
|
label { "LiteLLM URL" }
|
||||||
|
input {
|
||||||
|
r#type: "text",
|
||||||
|
value: "{litellm_url}",
|
||||||
|
oninput: move |e| litellm_url.set(e.value()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
div { class: "form-group",
|
||||||
|
label { "Model" }
|
||||||
|
input {
|
||||||
|
r#type: "text",
|
||||||
|
value: "{litellm_model}",
|
||||||
|
oninput: move |e| litellm_model.set(e.value()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
div { class: "card",
|
||||||
|
div { class: "card-header", "GitHub Integration" }
|
||||||
|
div { class: "form-group",
|
||||||
|
label { "Personal Access Token" }
|
||||||
|
input {
|
||||||
|
r#type: "password",
|
||||||
|
placeholder: "ghp_...",
|
||||||
|
value: "{github_token}",
|
||||||
|
oninput: move |e| github_token.set(e.value()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
div { class: "card",
|
||||||
|
div { class: "card-header", "GitLab Integration" }
|
||||||
|
div { class: "form-group",
|
||||||
|
label { "GitLab URL" }
|
||||||
|
input {
|
||||||
|
r#type: "text",
|
||||||
|
value: "{gitlab_url}",
|
||||||
|
oninput: move |e| gitlab_url.set(e.value()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
div { class: "form-group",
|
||||||
|
label { "Access Token" }
|
||||||
|
input {
|
||||||
|
r#type: "password",
|
||||||
|
placeholder: "glpat-...",
|
||||||
|
value: "{gitlab_token}",
|
||||||
|
oninput: move |e| gitlab_token.set(e.value()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
div { class: "card",
|
||||||
|
div { class: "card-header", "Jira Integration" }
|
||||||
|
div { class: "form-group",
|
||||||
|
label { "Jira URL" }
|
||||||
|
input {
|
||||||
|
r#type: "text",
|
||||||
|
placeholder: "https://your-org.atlassian.net",
|
||||||
|
value: "{jira_url}",
|
||||||
|
oninput: move |e| jira_url.set(e.value()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
div { class: "form-group",
|
||||||
|
label { "Email" }
|
||||||
|
input {
|
||||||
|
r#type: "email",
|
||||||
|
value: "{jira_email}",
|
||||||
|
oninput: move |e| jira_email.set(e.value()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
div { class: "form-group",
|
||||||
|
label { "API Token" }
|
||||||
|
input {
|
||||||
|
r#type: "password",
|
||||||
|
value: "{jira_token}",
|
||||||
|
oninput: move |e| jira_token.set(e.value()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
div { class: "form-group",
|
||||||
|
label { "Project Key" }
|
||||||
|
input {
|
||||||
|
r#type: "text",
|
||||||
|
placeholder: "SEC",
|
||||||
|
value: "{jira_project}",
|
||||||
|
oninput: move |e| jira_project.set(e.value()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
div { class: "card",
|
||||||
|
div { class: "card-header", "SearXNG" }
|
||||||
|
div { class: "form-group",
|
||||||
|
label { "SearXNG URL" }
|
||||||
|
input {
|
||||||
|
r#type: "text",
|
||||||
|
value: "{searxng_url}",
|
||||||
|
oninput: move |e| searxng_url.set(e.value()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
div { style: "margin-top: 16px;",
|
||||||
|
button {
|
||||||
|
class: "btn btn-primary",
|
||||||
|
onclick: move |_| {
|
||||||
|
tracing::info!("Settings save not yet implemented - settings are managed via .env");
|
||||||
|
},
|
||||||
|
"Save Settings"
|
||||||
|
}
|
||||||
|
p {
|
||||||
|
style: "margin-top: 8px; font-size: 12px; color: var(--text-secondary);",
|
||||||
|
"Note: Settings are currently configured via environment variables (.env file). Dashboard-based settings persistence coming soon."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -1,61 +0,0 @@
|
|||||||
# Finding Deduplication
|
|
||||||
|
|
||||||
The Compliance Scanner automatically deduplicates findings across all scanning surfaces to prevent noise and duplicate issues.
|
|
||||||
|
|
||||||
## SAST Finding Dedup
|
|
||||||
|
|
||||||
Static analysis findings are deduplicated using SHA-256 fingerprints computed from:
|
|
||||||
|
|
||||||
- Repository ID
|
|
||||||
- Scanner rule ID (e.g., Semgrep check ID)
|
|
||||||
- File path
|
|
||||||
- Line number
|
|
||||||
|
|
||||||
Before inserting a new finding, the pipeline checks if a finding with the same fingerprint already exists. If it does, the finding is skipped.
|
|
||||||
|
|
||||||
## DAST / Pentest Finding Dedup
|
|
||||||
|
|
||||||
Dynamic testing findings go through two-phase deduplication:
|
|
||||||
|
|
||||||
### Phase 1: Exact Dedup
|
|
||||||
|
|
||||||
Findings with the same canonicalized title, endpoint, and HTTP method are merged. Evidence from duplicate findings is combined into a single finding, keeping the highest severity.
|
|
||||||
|
|
||||||
**Title canonicalization** handles common variations:
|
|
||||||
- Domain names and URLs are stripped from titles (e.g., "Missing HSTS header for example.com" becomes "Missing HSTS header")
|
|
||||||
- Known synonyms are resolved (e.g., "HSTS" maps to "strict-transport-security", "CSP" maps to "content-security-policy")
|
|
||||||
|
|
||||||
### Phase 2: CWE-Based Dedup
|
|
||||||
|
|
||||||
After exact dedup, findings with the same CWE and endpoint are merged. This catches cases where different tools report the same underlying issue with different titles or vulnerability types (e.g., a missing HSTS header reported as both `security_header_missing` and `tls_misconfiguration`).
|
|
||||||
|
|
||||||
The primary finding is selected by highest severity, then most evidence, then longest description. Evidence from merged findings is preserved.
|
|
||||||
|
|
||||||
### When Dedup Applies
|
|
||||||
|
|
||||||
- **At insertion time**: During a pentest session, before each finding is stored in MongoDB
|
|
||||||
- **At report export**: When generating a pentest report, all session findings are deduplicated before rendering
|
|
||||||
|
|
||||||
## PR Review Comment Dedup
|
|
||||||
|
|
||||||
PR review comments are deduplicated to prevent posting the same finding multiple times:
|
|
||||||
|
|
||||||
- Each comment includes a fingerprint computed from the repository, PR number, file path, line, and finding title
|
|
||||||
- Within a single review run, duplicate findings are skipped
|
|
||||||
- The fingerprint is embedded as an HTML comment in the review body for future cross-run dedup
|
|
||||||
|
|
||||||
## Issue Tracker Dedup
|
|
||||||
|
|
||||||
Before creating an issue in GitHub, GitLab, Jira, or Gitea, the scanner:
|
|
||||||
|
|
||||||
1. Searches for an existing issue matching the finding's fingerprint
|
|
||||||
2. Falls back to searching by issue title
|
|
||||||
3. Skips creation if a match is found
|
|
||||||
|
|
||||||
## Code Review Dedup
|
|
||||||
|
|
||||||
Multi-pass LLM code reviews (logic, security, convention, complexity) are deduplicated across passes using proximity-aware keys:
|
|
||||||
|
|
||||||
- Findings within 3 lines of each other on the same file with similar normalized titles are considered duplicates
|
|
||||||
- The finding with the highest severity is kept
|
|
||||||
- CWE information is merged from duplicates
|
|
||||||
@@ -1,60 +0,0 @@
|
|||||||
# Help Chat Assistant
|
|
||||||
|
|
||||||
The Help Chat is a floating assistant available on every page of the dashboard. It answers questions about the Compliance Scanner using the project documentation as its knowledge base.
|
|
||||||
|
|
||||||
## How It Works
|
|
||||||
|
|
||||||
1. Click the **?** button in the bottom-right corner of any page
|
|
||||||
2. Type your question and press Enter
|
|
||||||
3. The assistant responds with answers grounded in the project documentation
|
|
||||||
|
|
||||||
The chat supports multi-turn conversations -- you can ask follow-up questions and the assistant will remember the context of your conversation.
|
|
||||||
|
|
||||||
## What You Can Ask
|
|
||||||
|
|
||||||
- **Getting started**: "How do I add a repository?" / "How do I trigger a scan?"
|
|
||||||
- **Features**: "What is SBOM?" / "How does the code knowledge graph work?"
|
|
||||||
- **Configuration**: "How do I set up webhooks?" / "What environment variables are needed?"
|
|
||||||
- **Scanning**: "What does the scan pipeline do?" / "How does LLM triage work?"
|
|
||||||
- **DAST & Pentesting**: "How do I run a pentest?" / "What DAST tools are available?"
|
|
||||||
- **Integrations**: "How do I connect to GitHub?" / "What is MCP?"
|
|
||||||
|
|
||||||
## Technical Details
|
|
||||||
|
|
||||||
The help chat loads all project documentation (README, guides, feature docs, reference) at startup and caches them in memory. When you ask a question, it sends your message along with the full documentation context to the LLM via LiteLLM, which generates a grounded response.
|
|
||||||
|
|
||||||
### API Endpoint
|
|
||||||
|
|
||||||
```
|
|
||||||
POST /api/v1/help/chat
|
|
||||||
Content-Type: application/json
|
|
||||||
|
|
||||||
{
|
|
||||||
"message": "How do I add a repository?",
|
|
||||||
"history": [
|
|
||||||
{ "role": "user", "content": "previous question" },
|
|
||||||
{ "role": "assistant", "content": "previous answer" }
|
|
||||||
]
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
### Configuration
|
|
||||||
|
|
||||||
The help chat uses the same LiteLLM configuration as other LLM features:
|
|
||||||
|
|
||||||
| Environment Variable | Description | Default |
|
|
||||||
|---------------------|-------------|---------|
|
|
||||||
| `LITELLM_URL` | LiteLLM API base URL | `http://localhost:4000` |
|
|
||||||
| `LITELLM_MODEL` | Model for chat responses | `gpt-4o` |
|
|
||||||
| `LITELLM_API_KEY` | API key (optional) | -- |
|
|
||||||
|
|
||||||
### Documentation Sources
|
|
||||||
|
|
||||||
The assistant indexes the following documentation at startup:
|
|
||||||
|
|
||||||
- `README.md` -- Project overview and quick start
|
|
||||||
- `docs/guide/` -- Getting started, repositories, findings, SBOM, scanning, issues, webhooks
|
|
||||||
- `docs/features/` -- AI Chat, DAST, Code Graph, MCP Server, Pentesting, Help Chat
|
|
||||||
- `docs/reference/` -- Glossary, tools reference
|
|
||||||
|
|
||||||
If documentation files are not found at startup (e.g., in a minimal Docker deployment), the assistant falls back to general knowledge about the project.
|
|
||||||
@@ -1,6 +1,8 @@
|
|||||||
# Dashboard Overview
|
# Dashboard Overview
|
||||||
|
|
||||||
The Overview page is the landing page of the Compliance Scanner. It gives you a high-level view of your security posture across all tracked repositories.
|
The Overview page is the landing page of Certifai. It gives you a high-level view of your security posture across all tracked repositories.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
## Stats Cards
|
## Stats Cards
|
||||||
|
|
||||||
@@ -32,10 +34,6 @@ The overview includes quick-access cards for the AI Chat feature. Each card repr
|
|||||||
|
|
||||||
If you have MCP servers registered, they appear on the overview page with their status and connection details. This lets you quickly check that your MCP integrations are running. See [MCP Integration](/features/mcp-server) for details.
|
If you have MCP servers registered, they appear on the overview page with their status and connection details. This lets you quickly check that your MCP integrations are running. See [MCP Integration](/features/mcp-server) for details.
|
||||||
|
|
||||||
## Help Chat Assistant
|
|
||||||
|
|
||||||
A floating help chat button is available in the bottom-right corner of every page. Click it to ask questions about the Compliance Scanner -- how to configure repositories, understand findings, set up webhooks, or use any feature. The assistant is grounded in the project documentation and uses LiteLLM for responses.
|
|
||||||
|
|
||||||
## Recent Scan Runs
|
## Recent Scan Runs
|
||||||
|
|
||||||
The bottom section lists the most recent scan runs across all repositories, showing:
|
The bottom section lists the most recent scan runs across all repositories, showing:
|
||||||
|
|||||||
Reference in New Issue
Block a user