use crate::detectors::base::{Detector, DetectorConfig};
use crate::graph::GraphStore;
use crate::models::{deterministic_finding_id, Finding, Severity};
use anyhow::Result;
use regex::Regex;
use std::path::PathBuf;
use std::sync::OnceLock;
static WEAK_HASH: OnceLock<Regex> = OnceLock::new();
static WEAK_CIPHER: OnceLock<Regex> = OnceLock::new();
fn weak_hash() -> &'static Regex {
WEAK_HASH.get_or_init(|| Regex::new(r#"(?i)(md5|sha1|sha-1)\s*\(|hashlib\.(md5|sha1)|Digest::(MD5|SHA1)|MessageDigest\.getInstance"#).expect("valid regex"))
}
fn is_hash_mention_not_usage(line: &str) -> bool {
if line.contains("is_hash_mention")
|| line.contains("is_cipher_mention")
|| line.contains("weak_hash")
|| line.contains("weak_cipher")
|| line.contains("usage_patterns")
|| line.contains("WEAK_")
{
return true;
}
let lower = line.to_lowercase();
let trimmed = line.trim();
if trimmed.starts_with("//")
|| trimmed.starts_with("#")
|| trimmed.starts_with("*")
|| trimmed.starts_with("/*")
{
return true;
}
if line.contains("Regex::new")
|| line.contains("regex::Regex")
|| line.contains("r\"")
|| line.contains("r#\"")
{
return true;
}
if crate::detectors::base::is_test_path(&lower)
&& (lower.contains("fn ") || lower.contains("def ") || lower.contains("function "))
{
return true;
}
if lower.contains("deprecated")
|| lower.contains("insecure")
|| lower.contains("weak")
|| lower.contains("broken")
|| lower.contains("unsafe")
|| lower.contains("vulnerable")
|| lower.contains("warning")
|| lower.contains("error")
{
return true;
}
if line.contains("==")
|| line.contains("!=")
|| line.contains("match")
|| line.contains("case ")
{
return true;
}
if lower.contains("print")
|| lower.contains("log")
|| lower.contains("console.")
|| lower.contains("logger")
{
return true;
}
if line.contains("const ") || line.contains("static ") {
let parts: Vec<&str> = line.split('=').collect();
if parts.len() >= 2 {
let before_eq = parts[0];
if before_eq.split_whitespace().any(|word| {
word.chars()
.all(|c| c.is_uppercase() || c == '_' || c == ':')
&& word.contains('_')
&& word.len() > 2
}) {
return true;
}
}
}
false
}
fn weak_cipher() -> &'static Regex {
WEAK_CIPHER.get_or_init(|| Regex::new(r"(?i)\b(DES|RC4|RC2|Blowfish|ECB)\b").expect("valid regex"))
}
fn is_cipher_mention_not_usage(line: &str) -> bool {
if line.contains("is_hash_mention")
|| line.contains("is_cipher_mention")
|| line.contains("weak_hash")
|| line.contains("weak_cipher")
|| line.contains("usage_patterns")
|| line.contains("WEAK_")
|| line.contains("des.new")
|| line.contains("arc4.new")
|| line.contains("blowfish.new")
|| line.contains("cipher.newecb")
{
return true;
}
let lower = line.to_lowercase();
if line.contains(".contains(")
&& (lower.contains("\"des")
|| lower.contains("'des")
|| lower.contains("\"rc4")
|| lower.contains("'rc4")
|| lower.contains("\"rc2")
|| lower.contains("'rc2")
|| lower.contains("\"ecb")
|| lower.contains("'ecb")
|| lower.contains("\"blowfish")
|| lower.contains("'blowfish"))
{
return true;
}
if line.contains("Regex::new") || line.contains("regex::Regex") {
return true;
}
if line.contains("r\"") || line.contains("r#\"") || line.contains("r##\"") {
return true;
}
if line.contains("const ") || line.contains("static ") || line.contains("let ") {
let parts: Vec<&str> = line.split('=').collect();
if parts.len() >= 2 {
let before_eq = parts[0];
if before_eq.split_whitespace().any(|word| {
word.chars()
.all(|c| c.is_uppercase() || c == '_' || c == ':')
&& word.contains('_')
&& word.len() > 2
}) {
return true;
}
}
}
let rejection_patterns = [
"reject",
"deny",
"error",
"warn",
"throw",
"panic",
"not allowed",
"not supported",
"forbidden",
"invalid",
"disallow",
"prohibit",
"refuse",
"fail",
];
for pattern in rejection_patterns {
if lower.contains(pattern) {
return true;
}
}
if line.contains("!=")
&& (line.contains("\"DES\"")
|| line.contains("'DES'")
|| line.contains("\"RC4\"")
|| line.contains("'RC4'")
|| line.contains("\"RC2\"")
|| line.contains("'RC2'")
|| line.contains("\"Blowfish\"")
|| line.contains("'Blowfish'")
|| line.contains("\"ECB\"")
|| line.contains("'ECB'"))
{
return true;
}
if lower.contains("assert") || lower.contains("expect") || lower.contains("should") {
return true;
}
if lower.contains("deprecated")
|| lower.contains("insecure")
|| lower.contains("vulnerable")
|| lower.contains("weak")
|| lower.contains("broken")
|| lower.contains("unsafe")
{
return true;
}
let usage_patterns = [
"cipher.getinstance",
"secretkeyspec",
"keygenerator.getinstance",
"createcipher",
"createcipheriv",
"createdecipheriv",
"crypto.cipher",
"cipher.new",
"des.new",
"arc4.new",
"blowfish.new",
"cipher.newecb",
"des.newcipher",
"openssl::cipher",
"openssl_encrypt",
"mcrypt_encrypt",
"descryptoserviceprovider",
"rc2cryptoserviceprovider",
"rijndaelmanaged", ];
for pattern in usage_patterns {
if lower.contains(pattern) {
return false; }
}
if (line.contains("\"DES")
|| line.contains("'DES")
|| line.contains("\"RC4")
|| line.contains("'RC4")
|| line.contains("\"ECB")
|| line.contains("'ECB")
|| line.contains("\"des")
|| line.contains("'des")
|| line.contains("\"rc4")
|| line.contains("'rc4")
|| line.contains("\"ecb")
|| line.contains("'ecb"))
&& (line.contains("(")
|| line.contains("getInstance")
|| line.contains("cipher")
|| line.contains("Cipher"))
{
return false; }
true
}
pub struct InsecureCryptoDetector {
repository_path: PathBuf,
max_findings: usize,
}
impl InsecureCryptoDetector {
pub fn new(repository_path: impl Into<PathBuf>) -> Self {
Self {
repository_path: repository_path.into(),
max_findings: 50,
}
}
fn relative_path(&self, path: &std::path::Path) -> PathBuf {
path.strip_prefix(&self.repository_path)
.unwrap_or(path)
.to_path_buf()
}
}
impl Detector for InsecureCryptoDetector {
fn name(&self) -> &'static str {
"insecure-crypto"
}
fn description(&self) -> &'static str {
"Detects weak cryptographic algorithms"
}
fn detect(&self, _graph: &dyn crate::graph::GraphQuery) -> Result<Vec<Finding>> {
let mut findings = vec![];
let walker = ignore::WalkBuilder::new(&self.repository_path)
.hidden(false)
.git_ignore(true)
.build();
for entry in walker.filter_map(|e| e.ok()) {
if findings.len() >= self.max_findings {
break;
}
let path = entry.path();
if !path.is_file() {
continue;
}
let ext = path.extension().and_then(|e| e.to_str()).unwrap_or("");
if !matches!(
ext,
"py" | "js" | "ts" | "java" | "go" | "rs" | "rb" | "php" | "cs"
) {
continue;
}
let path_str = path.to_string_lossy().to_lowercase();
if path_str.contains("/lang/")
|| path_str.contains("/locale")
|| path_str.contains("/i18n/")
|| path_str.contains("/translations/")
|| path_str.contains("_lang")
|| path_str.contains(".lang.")
{
continue;
}
if let Some(content) = crate::cache::global_cache().get_content(path) {
for (i, line) in content.lines().enumerate() {
let trimmed = line.trim();
if trimmed.starts_with("//")
|| trimmed.starts_with("#")
|| trimmed.starts_with("*")
{
continue;
}
if trimmed.starts_with("interface ")
|| trimmed.starts_with("type ")
|| trimmed.starts_with("export interface ")
|| trimmed.starts_with("export type ")
|| trimmed.contains(": ") && !trimmed.contains("(")
{
continue;
}
if trimmed.starts_with("enum ") || trimmed.starts_with("export enum ") {
continue;
}
if weak_hash().is_match(line) && !is_hash_mention_not_usage(line) {
findings.push(Finding {
id: String::new(),
detector: "InsecureCryptoDetector".to_string(),
severity: Severity::High,
title: "Weak hash algorithm (MD5/SHA1)".to_string(),
description: "MD5 and SHA1 are cryptographically broken.".to_string(),
affected_files: vec![self.relative_path(path)],
line_start: Some((i + 1) as u32),
line_end: Some((i + 1) as u32),
suggested_fix: Some(
"Use SHA-256 or better (SHA-3, BLAKE3).".to_string(),
),
estimated_effort: Some("15 minutes".to_string()),
category: Some("security".to_string()),
cwe_id: Some("CWE-328".to_string()),
why_it_matters: Some(
"Weak hashes can be cracked or collided.".to_string(),
),
..Default::default()
});
}
if weak_cipher().is_match(line) && !is_cipher_mention_not_usage(line) {
findings.push(Finding {
id: String::new(),
detector: "InsecureCryptoDetector".to_string(),
severity: Severity::High,
title: "Weak cipher algorithm".to_string(),
description: "DES, RC4, and ECB mode are insecure.".to_string(),
affected_files: vec![self.relative_path(path)],
line_start: Some((i + 1) as u32),
line_end: Some((i + 1) as u32),
suggested_fix: Some("Use AES-GCM or ChaCha20-Poly1305.".to_string()),
estimated_effort: Some("30 minutes".to_string()),
category: Some("security".to_string()),
cwe_id: Some("CWE-327".to_string()),
why_it_matters: Some("Weak ciphers can be broken.".to_string()),
..Default::default()
});
}
}
}
}
Ok(findings)
}
}
#[test]
fn test_self_flagging_protection() {
let lines = vec![
r#" line.contains("\"RC4\"") || line.contains("'RC4'") ||"#,
r#" line.contains("blowfish.new") || line.contains("cipher.newecb") {"#,
r#" lower.contains("\"ecb") || lower.contains("'ecb") ||"#,
];
for line in lines {
if weak_cipher().is_match(line) {
assert!(
is_cipher_mention_not_usage(line),
"Should skip detector source line: {}",
line
);
}
}
}
#[test]
fn test_self_flagging_line_106() {
let line = r#"lower.contains("\"ecb") || lower.contains("'ecb") ||"#;
println!("Line: {}", line);
println!("Contains .contains(: {}", line.contains(".contains("));
let lower = line.to_lowercase();
println!("Lower contains \"ecb: {}", lower.contains("\"ecb"));
assert!(
is_cipher_mention_not_usage(line),
"Line 106 should be skipped"
);
}
#[test]
fn test_self_flagging_line_215() {
let line = r#" line.contains("\"rc4") || line.contains("'rc4") ||"#;
println!("Line: {}", line);
println!("Contains .contains(: {}", line.contains(".contains("));
let lower = line.to_lowercase();
println!("Lower contains \"rc4: {}", lower.contains("\"rc4"));
println!("Weak cipher matches: {}", weak_cipher().is_match(line));
assert!(
is_cipher_mention_not_usage(line),
"Line 215 should be skipped"
);
}