zift 0.2.2

Scan codebases for embedded authorization logic and generate Policy as Code (Rego/OPA today)
Documentation
[rule]
id = "java-spring-permit-all"
languages = ["java"]
category = "middleware"
confidence = "medium"
description = "Spring Security @PermitAll or @DenyAll annotation"
query = """
(marker_annotation
  name: [
    (identifier) @anno_name
    (scoped_identifier
      scope: (_) @anno_scope
      name: (identifier) @anno_name)
  ]
) @match
"""

provenance_capture = "anno_scope"

[rule.predicates.anno_name]
match = "^(PermitAll|DenyAll)$"

[[rule.tests]]
input = """
public class PublicController {
    @PermitAll
    public void publicEndpoint() { }
}
"""
expect_match = true

[[rule.tests]]
input = """
public class AdminController {
    @DenyAll
    public void lockedEndpoint() { }
}
"""
expect_match = true

[[rule.tests]]
input = """
public class PublicController {
    @jakarta.annotation.security.PermitAll
    public void publicEndpoint() { }
}
"""
expect_match = true

[[rule.tests]]
input = """
public class AdminController {
    @javax.annotation.security.DenyAll
    public void lockedEndpoint() { }
}
"""
expect_match = true

[[rule.tests]]
input = """
public class UserController {
    @Override
    public void doSomething() { }
}
"""
expect_match = false