mirror of
https://github.com/KeygraphHQ/shannon.git
synced 2026-05-21 16:26:56 +02:00
3ac07a4718
* chore: initialize TypeScript configuration and build setup - Add tsconfig.json for root and mcp-server with strict type checking - Install typescript and @types/node as devDependencies - Add npm build script for TypeScript compilation - Update main entrypoint to compiled dist/shannon.js - Update Dockerfile to build TypeScript before running - Configure output directory and module resolution for Node.js * refactor: migrate codebase from JavaScript to TypeScript - Convert all 37 JavaScript files to TypeScript (.js -> .ts) - Add type definitions in src/types/ for agents, config, errors, session - Update mcp-server with proper TypeScript types - Move entry point from shannon.mjs to src/shannon.ts - Update tsconfig.json with rootDir: "./src" for cleaner dist output - Update Dockerfile to build TypeScript before runtime - Update package.json paths to use compiled dist/shannon.js No runtime behavior changes - pure type safety migration. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * docs: update CLI references from ./shannon.mjs to shannon - Update help text in src/cli/ui.ts - Update usage examples in src/cli/command-handler.ts - Update setup message in src/shannon.ts - Update CLAUDE.md documentation with TypeScript file structure - Replace all ./shannon.mjs references with shannon command 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * chore: remove unnecessary eslint-disable comments ESLint is not configured in this project, making these comments redundant. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>
111 lines
4.3 KiB
TypeScript
111 lines
4.3 KiB
TypeScript
// Copyright (C) 2025 Keygraph, Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License version 3
|
|
// as published by the Free Software Foundation.
|
|
|
|
import { path, fs } from 'zx';
|
|
import chalk from 'chalk';
|
|
import { validateQueueAndDeliverable, type VulnType } from './queue-validation.js';
|
|
import type { AgentName, PromptName, PlaywrightAgent, AgentValidator } from './types/agents.js';
|
|
|
|
// Factory function for vulnerability queue validators
|
|
function createVulnValidator(vulnType: VulnType): AgentValidator {
|
|
return async (sourceDir: string): Promise<boolean> => {
|
|
try {
|
|
await validateQueueAndDeliverable(vulnType, sourceDir);
|
|
return true;
|
|
} catch (error) {
|
|
const errMsg = error instanceof Error ? error.message : String(error);
|
|
console.log(chalk.yellow(` Queue validation failed for ${vulnType}: ${errMsg}`));
|
|
return false;
|
|
}
|
|
};
|
|
}
|
|
|
|
// Factory function for exploit deliverable validators
|
|
function createExploitValidator(vulnType: VulnType): AgentValidator {
|
|
return async (sourceDir: string): Promise<boolean> => {
|
|
const evidenceFile = path.join(sourceDir, 'deliverables', `${vulnType}_exploitation_evidence.md`);
|
|
return await fs.pathExists(evidenceFile);
|
|
};
|
|
}
|
|
|
|
// MCP agent mapping - assigns each agent to a specific Playwright instance to prevent conflicts
|
|
export const MCP_AGENT_MAPPING: Record<PromptName, PlaywrightAgent> = Object.freeze({
|
|
// Phase 1: Pre-reconnaissance (actual prompt name is 'pre-recon-code')
|
|
// NOTE: Pre-recon is pure code analysis and doesn't use browser automation,
|
|
// but assigning MCP server anyway for consistency and future extensibility
|
|
'pre-recon-code': 'playwright-agent1',
|
|
|
|
// Phase 2: Reconnaissance (actual prompt name is 'recon')
|
|
recon: 'playwright-agent2',
|
|
|
|
// Phase 3: Vulnerability Analysis (5 parallel agents)
|
|
'vuln-injection': 'playwright-agent1',
|
|
'vuln-xss': 'playwright-agent2',
|
|
'vuln-auth': 'playwright-agent3',
|
|
'vuln-ssrf': 'playwright-agent4',
|
|
'vuln-authz': 'playwright-agent5',
|
|
|
|
// Phase 4: Exploitation (5 parallel agents - same as vuln counterparts)
|
|
'exploit-injection': 'playwright-agent1',
|
|
'exploit-xss': 'playwright-agent2',
|
|
'exploit-auth': 'playwright-agent3',
|
|
'exploit-ssrf': 'playwright-agent4',
|
|
'exploit-authz': 'playwright-agent5',
|
|
|
|
// Phase 5: Reporting (actual prompt name is 'report-executive')
|
|
// NOTE: Report generation is typically text-based and doesn't use browser automation,
|
|
// but assigning MCP server anyway for potential screenshot inclusion or future needs
|
|
'report-executive': 'playwright-agent3',
|
|
});
|
|
|
|
// Direct agent-to-validator mapping - much simpler than pattern matching
|
|
export const AGENT_VALIDATORS: Record<AgentName, AgentValidator> = Object.freeze({
|
|
// Pre-reconnaissance agent - validates the code analysis deliverable created by the agent
|
|
'pre-recon': async (sourceDir: string): Promise<boolean> => {
|
|
const codeAnalysisFile = path.join(sourceDir, 'deliverables', 'code_analysis_deliverable.md');
|
|
return await fs.pathExists(codeAnalysisFile);
|
|
},
|
|
|
|
// Reconnaissance agent
|
|
recon: async (sourceDir: string): Promise<boolean> => {
|
|
const reconFile = path.join(sourceDir, 'deliverables', 'recon_deliverable.md');
|
|
return await fs.pathExists(reconFile);
|
|
},
|
|
|
|
// Vulnerability analysis agents
|
|
'injection-vuln': createVulnValidator('injection'),
|
|
'xss-vuln': createVulnValidator('xss'),
|
|
'auth-vuln': createVulnValidator('auth'),
|
|
'ssrf-vuln': createVulnValidator('ssrf'),
|
|
'authz-vuln': createVulnValidator('authz'),
|
|
|
|
// Exploitation agents
|
|
'injection-exploit': createExploitValidator('injection'),
|
|
'xss-exploit': createExploitValidator('xss'),
|
|
'auth-exploit': createExploitValidator('auth'),
|
|
'ssrf-exploit': createExploitValidator('ssrf'),
|
|
'authz-exploit': createExploitValidator('authz'),
|
|
|
|
// Executive report agent
|
|
report: async (sourceDir: string): Promise<boolean> => {
|
|
const reportFile = path.join(
|
|
sourceDir,
|
|
'deliverables',
|
|
'comprehensive_security_assessment_report.md'
|
|
);
|
|
|
|
const reportExists = await fs.pathExists(reportFile);
|
|
|
|
if (!reportExists) {
|
|
console.log(
|
|
chalk.red(` ❌ Missing required deliverable: comprehensive_security_assessment_report.md`)
|
|
);
|
|
}
|
|
|
|
return reportExists;
|
|
},
|
|
});
|