Commandsecurity
/security-audit Command
Please perform a comprehensive security audit of this codebase:
Security Audit
Please perform a comprehensive security audit of this codebase:
1. Secrets and Credentials Scan
Search for exposed sensitive information:
# Common patterns for secrets
chs find-code "password\s*=\s*['\"]|api_key\s*=\s*['\"]|secret\s*=\s*['\"]"
chs find-code "token\s*=\s*['\"]|private.*key\s*=|aws_.*=\s*['\"]"
# Environment files
chs find-file "\.env*"
# Check if .env files are in .gitignore!
# Common secret file names
chs find-file "*secret*\|*credential*\|*private*"
2. Injection Vulnerabilities
SQL Injection
# String concatenation in queries
chs find-code "query.*\+.*\|\".*SELECT.*\+\|\".*INSERT.*\+\|\".*UPDATE.*\+"
# Direct variable interpolation
chs find-code "query.*\$\{.*\}|query.*\${.*}"
Command Injection
# Dangerous functions
chs find-code "exec\(|spawn\(|system\(|eval\("
# Shell command building
chs find-code "shell.*\+\|cmd.*\+\|exec.*\$"
Path Traversal
# Path manipulation
chs find-code "\.\./\|\.\.\\\\|\.\./\.\."
chs find-code "path\.join.*req\.|path\.join.*user"
3. Authentication & Authorization
Find Auth Code
chs find-code "auth\|login\|session\|jwt\|token"
chs find-file "*auth*\|*login*\|*session*"
Check for Issues
- Hardcoded credentials
- Weak password requirements
- Missing authorization checks
- Session fixation risks
- Insecure token storage
4. Data Validation & Sanitization
# Find user input handling
chs find-code "req\.body\|req\.query\|req\.params"
# Check for validation
chs find-code "validate\|sanitize\|escape"
# Dangerous operations without validation
chs find-code "innerHTML\|dangerouslySetInnerHTML"
5. Dependencies Security
# Run security audits
ch ts audit # For npm projects
# Check for known vulnerable packages
chs find-code "require\(|import.*from" | grep -E "(lodash|moment|axios|express)"
# Then check versions against known vulnerabilities
6. HTTPS & Security Headers
# Check for HTTP usage
chs find-code "http://|createServer\(|\.listen\("
# Security headers
chs find-code "helmet\|cors\|csp\|x-frame-options"
7. Error Handling & Information Disclosure
# Stack traces in production
chs find-code "stack\|stackTrace|error\.stack"
# Detailed error messages
chs find-code "catch.*console\.|catch.*res\.send"
8. Generate Security Report
Critical Issues (Fix Immediately)
- Exposed secrets or credentials
- SQL/Command injection vulnerabilities
- Missing authentication
High Priority (Fix Soon)
- Outdated dependencies with known vulnerabilities
- Weak authentication mechanisms
- Missing input validation
Medium Priority (Plan to Fix)
- Missing security headers
- Verbose error messages
- Insecure defaults
Recommendations
- Specific fixes for each issue
- Security best practices to implement
- Tools and libraries to adopt
Focus on exploitable vulnerabilities that could lead to data breaches!