Skip to main content

cc_audit/
lib.rs

1//! cc-audit - Security scanner for Claude Code configurations.
2//!
3//! This crate is organized into the following 7-layer architecture:
4//!
5//! - **L1 (input/)**: Input handling (CLI, stdin)
6//! - **L2 (config/)**: Configuration loading and validation
7//! - **L3 (discovery/)**: Target file discovery and filtering
8//! - **L4 (parser/)**: Content parsing for various file formats
9//! - **L5 (engine/)**: Detection engine and rule matching
10//! - **L6 (aggregator/)**: Result aggregation and scoring
11//! - **L7 (output/)**: Output formatting and reporting
12//!
13//! Cross-cutting modules:
14//! - **rules/**: Rule definitions and custom rules
15//! - **external/**: External integrations (hooks, MCP, watch)
16//! - **runtime/**: Execution control and pipeline (v1.x skeleton)
17//! - **types/**: Common type definitions
18
19// ============================================
20// 7-Layer Architecture Modules
21// ============================================
22
23// L1: Input Layer
24pub mod cli;
25pub mod client;
26pub mod input;
27
28// L2: Configuration Layer
29pub mod config;
30pub mod profile;
31
32// L3: Discovery Layer
33pub mod discovery;
34pub mod ignore;
35
36// L4: Parser Layer
37pub mod parser;
38
39// L5: Detection Engine Layer
40pub mod context;
41pub mod cve_db;
42pub mod deobfuscation;
43pub mod engine;
44pub mod malware_db;
45pub mod rules;
46pub mod suppression;
47
48// L6: Aggregation Layer
49pub mod aggregator;
50pub mod baseline;
51pub mod scoring;
52
53// L7: Output Layer
54pub mod output;
55pub mod reporter;
56
57// ============================================
58// Cross-Cutting Modules
59// ============================================
60
61pub mod error;
62pub mod external;
63pub mod runtime;
64pub mod types;
65
66// External integrations
67pub mod feedback;
68pub mod fix;
69pub mod hooks;
70pub mod mcp_server;
71pub mod pinning;
72pub mod proxy;
73pub mod remote;
74pub mod sbom;
75pub mod trusted_domains;
76pub mod watch;
77
78// Legacy modules (for backward compatibility)
79pub mod handlers;
80pub mod hook_mode;
81pub mod run;
82pub mod scanner;
83
84#[cfg(test)]
85pub mod test_utils;
86
87// ============================================
88// Re-exports for Public API
89// ============================================
90
91// L1: Input
92pub use cli::{BadgeFormat, Cli, OutputFormat, ScanType};
93pub use client::{
94    ClientType, DetectedClient, detect_client, detect_installed_clients, list_installed_clients,
95};
96
97// L2: Configuration
98pub use config::{Config, ConfigError, TextFilesConfig, WatchConfig};
99pub use profile::{Profile, profile_from_cli};
100
101// L3: Discovery
102pub use discovery::{DirectoryWalker, WalkConfig};
103pub use ignore::IgnoreFilter;
104
105// L4: Parser
106pub use parser::{
107    ContentParser, ContentType, DockerfileParser, FrontmatterParser, JsonParser, MarkdownParser,
108    ParsedContent, ParserRegistry, TomlParser, YamlParser,
109};
110
111// L5: Detection Engine
112pub use context::{ContentContext, ContextDetector};
113pub use cve_db::{CveDatabase, CveDbError, CveEntry};
114pub use deobfuscation::{DecodedContent, Deobfuscator};
115pub use engine::traits::{AnalysisMetadata, AnalysisResult, DetectionEngine, EngineConfig};
116pub use engine::{
117    CommandScanner, ContentScanner, DependencyScanner, DockerScanner, HookScanner, McpScanner,
118    PluginScanner, RulesDirScanner, ScanError, Scanner, ScannerConfig, SkillScanner,
119    SubagentScanner,
120};
121pub use malware_db::{MalwareDatabase, MalwareDbError};
122pub use rules::{
123    Confidence, CustomRuleError, CustomRuleLoader, DynamicRule, Finding, RuleEngine, RuleSeverity,
124    ScanResult, Severity, Summary,
125};
126
127// L6: Aggregation
128pub use aggregator::{FindingCollector, SummaryBuilder};
129pub use baseline::{Baseline, DriftEntry, DriftReport};
130pub use scoring::{CategoryScore, RiskLevel, RiskScore, SeverityBreakdown};
131
132// L7: Output
133pub use output::OutputFormatter;
134pub use reporter::{
135    Reporter, html::HtmlReporter, json::JsonReporter, markdown::MarkdownReporter,
136    sarif::SarifReporter, terminal::TerminalReporter,
137};
138
139// Runtime & Orchestration
140pub use run::{
141    ScanMode, WatchModeResult, format_result, is_text_file, is_text_file_with_config, run_scan,
142    scan_path_with_cve_db, scan_path_with_malware_db, setup_watch_mode, watch_iteration,
143};
144pub use runtime::{HookRunner, Pipeline, PipelineStage, ScanContext, ScanExecutor};
145
146// External Integrations
147pub use error::{AuditError, Result};
148pub use feedback::{FalsePositiveReport, ReportSubmitter, SubmitResult, SubmitTarget};
149pub use fix::{AutoFixer, Fix, FixResult};
150pub use hooks::{HookError, HookInstaller};
151pub use mcp_server::McpServer;
152pub use pinning::{PinMismatch, PinVerifyResult, PinnedTool, ToolPins};
153pub use proxy::{InterceptAction, MessageInterceptor, ProxyConfig, ProxyLogger, ProxyServer};
154pub use remote::{ClonedRepo, GitCloner, RemoteError, parse_github_url};
155pub use sbom::{
156    Component, ComponentType, CycloneDxBom, DependencyExtractor, SbomBuilder, SbomFormat,
157};
158pub use trusted_domains::{TrustedDomain, TrustedDomainMatcher};
159pub use types::{AuthToken, FileHash, GitRef, PathValidationError, RuleId, ScanTarget};
160pub use watch::FileWatcher;