verifyos-cli 0.13.1

AI agent-friendly Rust CLI for scanning iOS app bundles for App Store rejection risks before submission.
Documentation
use crate::parsers::plist_reader::InfoPlist;
use crate::rules::core::{
    AppStoreRule, ArtifactContext, RuleCategory, RuleError, RuleReport, RuleStatus, Severity,
};

pub struct PrivacyManifestSdkCrossCheckRule;

impl AppStoreRule for PrivacyManifestSdkCrossCheckRule {
    fn id(&self) -> &'static str {
        "RULE_PRIVACY_SDK_CROSSCHECK"
    }

    fn name(&self) -> &'static str {
        "Privacy Manifest vs SDK Usage"
    }

    fn category(&self) -> RuleCategory {
        RuleCategory::Privacy
    }

    fn severity(&self) -> Severity {
        Severity::Error
    }

    fn recommendation(&self) -> &'static str {
        "Ensure PrivacyInfo.xcprivacy declares data collection and accessed APIs for included SDKs."
    }

    fn evaluate(&self, artifact: &ArtifactContext) -> Result<RuleReport, RuleError> {
        let Some(manifest_path) = artifact.bundle_relative_file("PrivacyInfo.xcprivacy") else {
            return Ok(RuleReport {
                status: RuleStatus::Skip,
                message: Some("PrivacyInfo.xcprivacy not found".to_string()),
                evidence: None,
            });
        };

        let manifest = match InfoPlist::from_file(&manifest_path) {
            Ok(m) => m,
            Err(_) => {
                return Ok(RuleReport {
                    status: RuleStatus::Skip,
                    message: Some(
                        "PrivacyInfo.xcprivacy is empty or invalid; skipping".to_string(),
                    ),
                    evidence: Some(manifest_path.display().to_string()),
                });
            }
        };

        let scan = match artifact.sdk_scan() {
            Ok(scan) => scan,
            Err(err) => {
                return Ok(RuleReport {
                    status: RuleStatus::Skip,
                    message: Some(format!("SDK scan skipped: {err}")),
                    evidence: None,
                });
            }
        };

        if scan.hits.is_empty() {
            return Ok(RuleReport {
                status: RuleStatus::Pass,
                message: Some("No SDK signatures detected".to_string()),
                evidence: None,
            });
        }

        let has_data_types = manifest
            .get_value("NSPrivacyCollectedDataTypes")
            .and_then(|v| v.as_array())
            .map(|arr| !arr.is_empty())
            .unwrap_or(false);
        let has_accessed_api_types = manifest
            .get_value("NSPrivacyAccessedAPITypes")
            .and_then(|v| v.as_array())
            .map(|arr| !arr.is_empty())
            .unwrap_or(false);

        if has_data_types || has_accessed_api_types {
            return Ok(RuleReport {
                status: RuleStatus::Pass,
                message: Some("Privacy manifest includes SDK data declarations".to_string()),
                evidence: None,
            });
        }

        Ok(RuleReport {
            status: RuleStatus::Fail,
            message: Some("SDKs detected but privacy manifest lacks declarations".to_string()),
            evidence: Some(format!("SDK signatures: {}", scan.hits.join(", "))),
        })
    }
}