Skip to content

cachewraith/security_audit_tool

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

20 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”’ Security Audit Tool

One command to audit your website, API, or server. Built for business owners who care about security.

Python security scanner with defensive checks + active pentest mode. Find vulnerabilities, test performance, and generate professional reports for your business.

A Python-based security assessment tool that helps you identify vulnerabilities, performance issues, and security misconfigurations in your own systems. Perfect for business owners, developers, and DevOps teams who want to proactively secure their infrastructure.

⚠️ Legal Notice

For authorized security testing only. Use exclusively on:

  • Systems you own
  • Systems you have explicit written permission to test

Unauthorized scanning may violate laws. By using this tool, you confirm proper authorization.


πŸš€ What This Tool Does

This tool performs two types of security assessments:

1. Defensive/Read-Only Checks (Safe)

  • Scan file permissions, services, firewall rules
  • Detect hardcoded secrets in code
  • Check TLS certificates, container configs
  • Analyze dependencies for known vulnerabilities

2. Active/Pentest Checks (Sends Traffic)

  • Performance testing: Measure response times
  • Vulnerability scanning: Test for SQL injection, XSS
  • Load testing: Simulate traffic to test capacity

πŸ’‘ Perfect For

Use Case What You Get
Business Owner Know if your website has security holes
Developer Find secrets in code before committing
DevOps/SRE Test if your servers can handle traffic spikes
Security Team Quick first-line vulnerability assessment
Compliance Generate audit reports for security reviews

πŸ› οΈ Quick Start (5 minutes)

1. Install

pip install cache-wraith-audit-tool

2. Run Your First Scan

Interactive Mode (Easiest) - Just run with no arguments:

security-audit

The TUI will guide you through target selection, scan mode, and reporting.

Command Line Mode:

# Simple security audit
security-audit --url https://your-website.com --full-scan

# Scan local system
security-audit --local --full-scan

This creates:

  • audit_report_*.html - Professional HTML report
  • audit_report_*.json - Machine-readable JSON
  • audit_report_*.pdf - PDF report (pentest mode)

3. View Results

# Open the HTML report
firefox audit_report_*.html

πŸ“‹ Common Commands

Basic Scanning

# Authenticate the CLI with the Laravel portal
security-audit login

# Scan any website
security-audit --url https://example.com --full-scan

# Scan your local system
security-audit --local --full-scan

# Scan a project directory
security-audit --path ./my-project --full-scan

# Scan multiple websites
security-audit --url https://api1.com --url https://api2.com --full-scan

# Interactive mode (no arguments)
security-audit

Account Commands

# Sign in through the Laravel portal in your browser
security-audit login

# Show the currently authenticated account
security-audit whoami

# Revoke the CLI token and remove local auth state
security-audit logout

Token storage:

  • The CLI prefers OS keyring storage when available
  • Otherwise it stores auth state at ~/.config/security-audit/auth.json with restricted permissions
  • Tokens are never printed to the terminal

Pentest Mode (Active Testing)

# Full pentest with performance, vulnerability, and load tests
security-audit --url https://your-business.com --pentest-mode

# Just vulnerability scan (SQLi, XSS tests)
security-audit --url https://your-api.com --enable-vulnerability-scan

# Performance test only
security-audit --url https://your-api.com --enable-performance-test

# Load test (simulates traffic - use with caution!)
security-audit --url https://your-api.com --enable-load-test

⚠️ Pentest features send actual traffic to your target. Only use on your own systems.


πŸ” What Gets Checked

By Default (Safe, Read-Only)

  • βœ… File/directory permissions
  • βœ… Running services and open ports
  • βœ… Firewall configuration
  • βœ… Hardcoded secrets in code
  • βœ… Outdated dependencies with known CVEs
  • βœ… Docker/container security
  • βœ… Web application configuration

With --full-scan

  • βœ… Everything above, plus:
  • βœ… TLS/SSL certificate validation
  • βœ… Performance testing
  • βœ… Vulnerability scanning (SQLi, XSS)

With --pentest-mode

  • βœ… Everything above, plus:
  • βœ… Load testing / DDoS simulation

πŸ”¬ Security Checks Reference

Check ID Category Description Default
permissions Read-Only File/directory permissions (world-writable, SUID/SGID) βœ… Enabled
services Read-Only Running service and port enumeration βœ… Enabled
firewall Read-Only Firewall status and configuration βœ… Enabled
hardening Read-Only OS hardening indicator checks βœ… Enabled
secrets Read-Only Hardcoded secrets and credential patterns βœ… Enabled
dependencies Read-Only Outdated and vulnerable dependencies βœ… Enabled
containers Read-Only Docker/container security configuration βœ… Enabled
webapp_config Read-Only Web application configuration checks βœ… Enabled
tls Read-Only TLS/SSL certificate inspection ⚠️ --enable-tls-checks
performance Active Response time measurement ⚠️ --enable-performance-test
vulnerability Active SQL injection, XSS tests ⚠️ --enable-vulnerability-scan
load_test Active DDoS simulation (intensive) ⚠️ --pentest-mode only

Use with --skip-checks or --only-checks:

# Skip specific checks
security-audit --url example.com --skip-checks "tls,containers"

# Run only specific checks
security-audit --url example.com --only-checks "vulnerability,secrets"

# List all available checks
security-audit --list-checks

πŸ“Š Output Formats

Format File Extension Use Case
Terminal - Quick review during development
HTML .html Share with team, management, compliance
JSON .json CI/CD integration, automation, archiving
PDF .pdf Formal documentation, offline review

πŸ—οΈ For Developers (Architecture)

Want to extend the tool? Here's how it's structured:

app/
β”œβ”€β”€ cli.py              # Command-line interface
β”œβ”€β”€ main.py             # Entry point and orchestration
β”œβ”€β”€ config.py           # Configuration management
β”œβ”€β”€ scope.py            # Target validation and scoping
β”œβ”€β”€ checks/             # Security test implementations
β”‚   β”œβ”€β”€ base.py         # Base class for all checks
β”‚   β”œβ”€β”€ permissions_check.py
β”‚   β”œβ”€β”€ vulnerability_check.py  # SQLi, XSS tests
β”‚   β”œβ”€β”€ performance_check.py
β”‚   └── load_test_check.py      # DDoS simulation
β”œβ”€β”€ collectors/         # Data gathering modules
β”œβ”€β”€ report/             # Output generators (JSON, HTML, Terminal)
└── utils/              # Rate limiting, timeouts, validators

Adding a New Check

  1. Create app/checks/my_check.py
  2. Inherit from BaseCheck
  3. Implement run() method
  4. Register in app/checks/__init__.py
from .base import BaseCheck, CheckResult
from ..models import SeverityLevel

class MyCheck(BaseCheck):
    check_id = "my_check"
    check_name = "My Security Check"

    def run(self) -> CheckResult:
        result = self._create_result()
        # Your check logic here
        finding = self._create_finding(
            title="Example issue",
            severity=SeverityLevel.MEDIUM,
            target="example.com",
            evidence="Found issue X",
            remediation="Fix by doing Y"
        )
        result.findings.append(finding)
        return self._finish_result(result)

Running Tests

# Install dev dependencies
venv/bin/pip install -e ".[dev]"

# Run tests
venv/bin/pytest

# Run with coverage
venv/bin/pytest --cov=app

πŸ“š Documentation

Document What's Inside
docs/RUN.md How to install and run the tool
docs/COMMANDS.md All available commands and examples
docs/PENTEST.md Pentest mode guide for active testing
docs/FEATURES.md Feature list and what each check does
docs/ARCHITECTURE.md Code structure for developers
docs/TROUBLESHOOTING.md Common issues and solutions

πŸ” Safety Features

  1. Explicit Scope Required - Tool won't run without defined targets
  2. Authorization Prompt - Legal confirmation required
  3. Rate Limiting - Built-in request throttling
  4. Read-Only by Default - No modifications to target systems
  5. Opt-in Active Tests - Pentest features must be explicitly enabled
  6. Auditable - All actions logged

πŸ“ CI/CD Integration

# .github/workflows/security.yml
name: Security Scan
on: [push, pull_request]

jobs:
  security:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v3
      - name: Setup
        run: |
          python -m venv venv
          venv/bin/pip install -e .
      - name: Run Security Audit
        run: security-audit --url https://staging.your-app.com --full-scan
      - name: Upload Report
        uses: actions/upload-artifact@v3
        with:
          name: security-report
          path: audit_report_*.html

🎯 Roadmap

  • CIS Benchmark compliance checks
  • SBOM generation (CycloneDX, SPDX)
  • Kubernetes security scanning
  • API endpoint fuzzing
  • Compliance mapping (NIST, PCI-DSS, SOC2)

🀝 Contributing

Contributions welcome! Please ensure:

  1. All checks are defensive and non-destructive by default
  2. Code includes type hints
  3. Tests included for new functionality
  4. Documentation updated

πŸ“„ License

MIT License - See LICENSE file for details.


Built with ❀️ for business owners who take security seriously.

Got questions? Open an issue or check the docs/ folder.

About

Python security scanner for websites & APIs. Defensive checks (permissions, secrets, dependencies) + active pentest mode (SQLi, XSS, load testing). Generate HTML/JSON reports for your business security audits.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages