SkillAgentSearch skills...

Unified Security Scanner

No description available

Install / Use

/learn @GeeksikhSecurity/Unified Security Scanner
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Enhanced Security Scanner v2.0

AI-Powered Multi-Phase Security Analysis

Enterprise-grade security scanning with <5% false positive rate
Based on LLM Security Scanner Research (Joshua Hu, 2025)

License: MIT Node Version Security Scan Coverage

🛡️ Enhanced Security Scanner v2.0 - AI-Powered Analysis
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
🎯 3-Phase Scanning Strategy  │  🤖 AI-Enhanced Validation
📊 <5% False Positive Rate    │  🔍 Multi-Tool Orchestration  
🚀 1,400+ Files/Second        │  🛡️ 9 Critical CWE Classes
🌐 Multi-Language Support     │  📈 Enterprise CI/CD Ready
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

🚀 Key Features

🎯 3-Phase Scanning Strategy

  • Phase 1: Traditional SAST (Semgrep + CodeQL) as first filter
  • Phase 2: AI-enhanced analysis with multi-scan iterations
  • Phase 3: Targeted deep dives for critical findings

🤖 AI-Enhanced Analysis

  • Multi-Scan Strategy: 3 iterations to embrace non-determinism
  • AI Validation: OpenAI, Anthropic, AWS Q Developer integration
  • Intent Analysis: Compare developer comments vs implementation
  • Business Logic Detection: Complex multi-file vulnerability flows

🔍 Comprehensive Detection

  • 9 Critical CWE Classes: Command injection, SQL injection, XSS, etc.
  • Language-Specific Rules: JavaScript, TypeScript, Python, Java, Go
  • Supply Chain Security: Typosquatting, dependency confusion
  • Malicious Code Detection: Data exfiltration, backdoors, obfuscation

📊 Advanced False Positive Reduction

  • Context-Aware Filtering: Framework security controls detection
  • Package Manager Intelligence: Ignore lock file integrity hashes
  • ML-Enhanced Classification: Historical pattern learning
  • <5% False Positive Rate: Industry-leading accuracy

📦 Installation

Using npm (Recommended)

npm install -g @enhanced-scanner/cli

Using Docker

docker pull ghcr.io/enhanced-scanner/cli:latest

From Source

git clone https://github.com/yourusername/enhanced-security-scanner.git
cd enhanced-security-scanner
npm install && npm run build

🎯 Quick Start

Basic Multi-Phase Scan

# Run complete 3-phase analysis
enhanced-scanner scan --multi-phase --ai-validation

# With custom configuration
enhanced-scanner scan --config .securityrc.json --format sarif

Example Output

🛡️ Enhanced Security Scanner v2.0
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
📊 Phase 1: Traditional SAST Analysis
  🔍 Running Semgrep with permissive queries...
  🧠 Running CodeQL with high-noise queries...
  ✅ Phase 1 complete: 247 potential issues found (12.3s)

🤖 Phase 2: AI-Enhanced Analysis  
  🔄 AI Analysis iteration 1/3
  🔄 AI Analysis iteration 2/3
  🔄 AI Analysis iteration 3/3
  ✅ Phase 2 complete: 89 AI-validated issues found (45.7s)

🔍 Phase 3: Targeted Deep Dive Analysis
  🔬 Deep dive: SQL Injection in user authentication
  🔬 Deep dive: Command injection in file processor
  ✅ Phase 3 complete: 12 deep analysis issues found (23.1s)

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
✅ Scan complete: 23 findings in 81.1s

┌─────────────────────────────────────────────────────────────────┐
│  🔴 CRITICAL: 3  │  🟠 HIGH: 8  │  🟡 MEDIUM: 9  │  ⚪ LOW: 3   │
└─────────────────────────────────────────────────────────────────┘

╔═══════════╦═══════════════╦══════════════════════╦══════╦═══════════════════════════╗
║ Severity  ║ Type          ║ File                 ║ Line ║ Description              ║
╠═══════════╬═══════════════╬══════════════════════╬══════╬═══════════════════════════╣
║ 🔴 CRITICAL║ injection     ║ src/auth/login.ts   ║ 45   ║ SQL injection via concat ║
║ 🔴 CRITICAL║ secrets       ║ src/config/db.ts    ║ 12   ║ Hardcoded database creds ║
║ 🟠 HIGH    ║ xss           ║ src/components/...  ║ 78   ║ Unsafe innerHTML usage   ║
╚═══════════╩═══════════════╩══════════════════════╩══════╩═══════════════════════════╝

ℹ️  Suppressed 224 potential false positives (95.7% accuracy)
⚠️  3 critical vulnerabilities require immediate attention

🔧 Configuration

Complete Configuration Example

{
  "version": "2.0",
  "phases": {
    "traditionalSAST": {
      "enabled": true,
      "semgrep": {
        "permissive": true,
        "maxTargetBytes": "5MB"
      },
      "codeql": {
        "highNoise": true,
        "threads": 4,
        "ram": 8192
      }
    },
    "aiEnhanced": {
      "enabled": true,
      "iterations": 3,
      "aiProvider": "openai",
      "customRules": true
    },
    "deepDive": {
      "enabled": true,
      "functionLevel": true,
      "multiFileAnalysis": true,
      "intentAnalysis": true
    }
  },
  "customRules": {
    "baseSecurityPolicy": "./rules/base-security-policy.txt",
    "languageSpecific": {
      "javascript": "./rules/js-security-rules.yml",
      "python": "./rules/py-security-rules.yml"
    },
    "infiniteLoopDetection": true,
    "maliciousCodeDetection": true
  },
  "aiAnalysis": {
    "enabled": true,
    "provider": "openai",
    "model": "gpt-4",
    "apiKey": "${OPENAI_API_KEY}"
  },
  "advancedFiltering": {
    "contextAware": true,
    "businessLogicAnalysis": true,
    "intentAnalysis": true
  },
  "scan": {
    "target": ".",
    "exclude": ["**/node_modules/**", "**/dist/**"],
    "includeTests": false,
    "maxFileSize": 10485760
  },
  "output": {
    "formats": ["terminal", "sarif", "json", "html"],
    "dir": "./reports",
    "verbose": false
  },
  "severity": {
    "threshold": "LOW",
    "failOn": ["CRITICAL", "HIGH"]
  },
  "performance": {
    "parallelWorkers": 8,
    "cacheEnabled": true,
    "incrementalScan": true
  }
}

🔍 Detection Capabilities

Critical Priority (Block Deployments)

  • CWE-78: OS Command Injection - os.system, subprocess.call, exec(
  • CWE-89: SQL Injection - String concatenation in SQL queries
  • CWE-79: Cross-Site Scripting - innerHTML, dangerouslySetInnerHTML
  • CWE-502: Deserialization - pickle.loads, yaml.load, JSON.parse
  • CWE-918: SSRF - Unvalidated URL requests
  • CWE-22: Path Traversal - ../ patterns in file operations
  • CWE-506: Malicious Code - Obfuscated code, data exfiltration

High Priority (Require Review)

  • CWE-611: XXE - XML external entity vulnerabilities
  • CWE-1321: Prototype Pollution - __proto__, constructor.prototype
  • CWE-400: Resource Exhaustion - Infinite loops, memory leaks
  • CWE-1333: ReDoS - Inefficient regular expressions

Language-Specific Detection

JavaScript/TypeScript

// Prototype Pollution
obj.__proto__.isAdmin = true;  // 🔴 CRITICAL

// ReDoS Vulnerability  
/^(a+)+$/.test(userInput);     // 🟡 MEDIUM

// Client-Side Injection
element.innerHTML = userInput;  // 🔴 CRITICAL

// Insecure JWT
jwt.verify(token, null);       // 🟠 HIGH

Python

# Pickle Deserialization
pickle.loads(user_data)        # 🔴 CRITICAL

# SQL Injection
cursor.execute("SELECT * FROM users WHERE id = " + user_id)  # 🔴 CRITICAL

# Command Injection
os.system("rm " + filename)    # 🔴 CRITICAL

# YAML Deserialization
yaml.load(user_input)          # 🟠 HIGH

🤖 AI-Enhanced Features

Multi-Scan Strategy

# Embrace non-determinism with multiple iterations
enhanced-scanner scan --iterations 3 --ai-validation

AI Validation Prompts

const validationPrompt = `
Analyze this security finding:

FINDING:
- Type: ${finding.category}
- Severity: ${finding.severity}  
- File: ${finding.file}:${finding.line}
- Code: ${finding.snippet}

QUESTIONS:
1. Is this a true positive or false positive?
2. What is the exploitability (0-1 scale)?
3. What is the potential impact?
4. Provide specific remediation steps

Respond in JSON format.
`;

Intent Analysis

// Detects mismatches between comments and implementation
function authenticateUser(password) {
  // TODO: Add password validation
  return true; // 🟠 HIGH: Always returns true, ignoring password
}

🔄 CI/CD Integration

GitHub Actions

name: Enhanced Security Scan

on:
  pull_request:
    branches: [main, develop]

jobs:
  security-scan:
    runs-on: ubuntu-latest
    permissions:
      security-events: write
      contents: read

    steps:
      - uses: actions/checkout@v4
      
      - name: Run Enhanced Security Scan
        run: |
          npx @enhanced-scanner/cli scan \
            --multi-phase \
            --ai-validation \
            --format sarif \
            --output security-results.sarif
        env:
          OPENAI_API_KEY: ${{ secrets.OPENAI_API_KEY }}

      - name: Upload SARIF to GitHub Security
        uses: github/codeql-action/upload-sarif@v3
        with:
          sarif_file: security-results.sarif

Blocking Criteria

| Branch Type | Critical | High | Medium | Low | |-------------|----------|------|--------|-----| | main/production | Block | Block | Block with approval | Allow | | develop/staging | Block | Block | Allow with comment | Allow | | feature branches | Comment | Comment | Comment | Allow |

🧪 Test Reliability & Flaky Test Management

Flaky Test Detection

// Automatic flaky test detection
const flakyManager = new FlakyTestManager({
  detection: {
    enabled: true,
    intraRunThreshold: 0.1,    // 10% failure rate within build
    inter
View on GitHub
GitHub Stars2
CategoryDevelopment
Updated2mo ago
Forks0

Languages

TypeScript

Security Score

80/100

Audited on Jan 26, 2026

No findings