Skip to main content

cc_audit/
lib.rs

1//! cc-audit - Security scanner for Claude Code configurations.
2//!
3//! This crate is organized into the following 7-layer architecture:
4//!
5//! - **L1 (input/)**: Input handling (CLI, stdin)
6//! - **L2 (config/)**: Configuration loading and validation
7//! - **L3 (discovery/)**: Target file discovery and filtering
8//! - **L4 (parser/)**: Content parsing for various file formats
9//! - **L5 (engine/)**: Detection engine and rule matching
10//! - **L6 (aggregator/)**: Result aggregation and scoring
11//! - **L7 (output/)**: Output formatting and reporting
12//!
13//! Cross-cutting modules:
14//! - **rules/**: Rule definitions and custom rules
15//! - **external/**: External integrations (hooks, MCP, watch)
16//! - **runtime/**: Execution control and pipeline (v1.x skeleton)
17//! - **types/**: Common type definitions
18
19// ============================================
20// 7-Layer Architecture Modules
21// ============================================
22
23// L1: Input Layer
24pub mod cli;
25pub mod client;
26pub mod input;
27
28// L2: Configuration Layer
29pub mod config;
30pub mod profile;
31
32// L3: Discovery Layer
33pub mod discovery;
34pub mod ignore;
35
36// L4: Parser Layer
37pub mod parser;
38
39// L5: Detection Engine Layer
40pub mod context;
41pub mod cve_db;
42pub mod deobfuscation;
43pub mod engine;
44pub mod malware_db;
45pub mod rules;
46pub mod suppression;
47
48// L6: Aggregation Layer
49pub mod aggregator;
50pub mod baseline;
51pub mod scoring;
52
53// L7: Output Layer
54pub mod output;
55pub mod reporter;
56
57// ============================================
58// Cross-Cutting Modules
59// ============================================
60
61pub mod error;
62pub mod external;
63pub mod runtime;
64pub mod types;
65
66// External integrations
67pub mod feedback;
68pub mod fix;
69pub mod hooks;
70pub mod mcp_server;
71pub mod pinning;
72pub mod proxy;
73pub mod remote;
74pub mod sbom;
75pub mod trusted_domains;
76pub mod watch;
77
78// Legacy modules (for backward compatibility)
79pub mod handlers;
80pub mod hook_mode;
81pub mod run;
82pub mod scanner;
83
84#[cfg(test)]
85pub mod test_utils;
86
87// ============================================
88// Re-exports for Public API
89// ============================================
90
91// L1: Input
92pub use cli::{
93    BadgeFormat, CheckArgs, Cli, Commands, HookAction, OutputFormat, ProxyArgs, ScanType,
94};
95pub use client::{
96    ClientType, DetectedClient, detect_client, detect_installed_clients, list_installed_clients,
97};
98
99// L2: Configuration
100pub use config::{Config, ConfigError, ConfigLoadResult, TextFilesConfig, WatchConfig};
101pub use profile::{Profile, profile_from_check_args};
102
103// L3: Discovery
104pub use discovery::{DirectoryWalker, WalkConfig};
105pub use ignore::IgnoreFilter;
106
107// L4: Parser
108pub use parser::{
109    ContentParser, ContentType, DockerfileParser, FrontmatterParser, JsonParser, MarkdownParser,
110    ParsedContent, ParserRegistry, TomlParser, YamlParser,
111};
112
113// L5: Detection Engine
114pub use context::{ContentContext, ContextDetector};
115pub use cve_db::{CveDatabase, CveDbError, CveEntry};
116pub use deobfuscation::{DecodedContent, Deobfuscator};
117pub use engine::traits::{AnalysisMetadata, AnalysisResult, DetectionEngine, EngineConfig};
118pub use engine::{
119    CommandScanner, ContentScanner, DependencyScanner, DockerScanner, HookScanner, McpScanner,
120    PluginScanner, RulesDirScanner, ScanError, Scanner, ScannerConfig, SkillScanner,
121    SubagentScanner,
122};
123pub use malware_db::{MalwareDatabase, MalwareDbError};
124pub use rules::{
125    Confidence, CustomRuleError, CustomRuleLoader, DynamicRule, Finding, RuleEngine, RuleSeverity,
126    ScanResult, Severity, Summary,
127};
128
129// L6: Aggregation
130pub use aggregator::{FindingCollector, SummaryBuilder};
131pub use baseline::{Baseline, DriftEntry, DriftReport};
132pub use scoring::{CategoryScore, RiskLevel, RiskScore, SeverityBreakdown};
133
134// L7: Output
135pub use output::OutputFormatter;
136pub use reporter::{
137    Reporter, html::HtmlReporter, json::JsonReporter, markdown::MarkdownReporter,
138    sarif::SarifReporter, terminal::TerminalReporter,
139};
140
141// Runtime & Orchestration
142pub use run::{
143    ScanMode, WatchModeResult, format_result_check_args, format_result_with_config, is_text_file,
144    is_text_file_with_config, run_scan_with_check_args, run_scan_with_check_args_config,
145    scan_path_with_cve_db, scan_path_with_malware_db, setup_watch_mode, watch_iteration,
146};
147pub use runtime::{HookRunner, Pipeline, PipelineStage, ScanContext, ScanExecutor};
148
149// External Integrations
150pub use error::{AuditError, Result};
151pub use feedback::{FalsePositiveReport, ReportSubmitter, SubmitResult, SubmitTarget};
152pub use fix::{AutoFixer, Fix, FixResult};
153pub use hooks::{HookError, HookInstaller};
154pub use mcp_server::McpServer;
155pub use pinning::{PinMismatch, PinVerifyResult, PinnedTool, ToolPins};
156pub use proxy::{InterceptAction, MessageInterceptor, ProxyConfig, ProxyLogger, ProxyServer};
157pub use remote::{ClonedRepo, GitCloner, RemoteError, parse_github_url};
158pub use sbom::{
159    Component, ComponentType, CycloneDxBom, DependencyExtractor, SbomBuilder, SbomFormat,
160};
161pub use trusted_domains::{TrustedDomain, TrustedDomainMatcher};
162pub use types::{AuthToken, FileHash, GitRef, PathValidationError, RuleId, ScanTarget};
163pub use watch::FileWatcher;