Spaces:
Running
Running
Fix dependency conflicts between smolagents and semgrep
Browse files- BUILD_INSTRUCTIONS.md +107 -0
- DEPENDENCY_FIX.md +76 -0
- DOCKER_SETUP.md +0 -127
- Dockerfile +52 -0
- README.md +109 -2
- README_2.md +0 -513
- agent_requirements.txt +0 -134
- bandit_mcp.py +15 -1
- circle_test_mcp.py +10 -1
- detect_secrets_mcp.py +10 -1
- docker-compose.yml +0 -157
- docker/agent.Dockerfile +0 -42
- docker/bandit.Dockerfile +0 -42
- docker/circle_test.Dockerfile +0 -42
- docker/detect_secrets.Dockerfile +0 -42
- docker/pip_audit.Dockerfile +0 -42
- docker/semgrep.Dockerfile +0 -42
- main.py +16 -7
- pip_audit_mcp.py +11 -1
- requirements.txt +47 -9
- semgrep_mcp.py +10 -1
- start.sh +90 -0
- test_build.py +132 -0
BUILD_INSTRUCTIONS.md
ADDED
@@ -0,0 +1,107 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
# 🔧 Инструкция по сборке VulnBuster
|
2 |
+
|
3 |
+
## 🐛 Исправление конфликта зависимостей
|
4 |
+
|
5 |
+
В предыдущей версии возникал конфликт между:
|
6 |
+
- `smolagents` требует `rich>=13.9.4`
|
7 |
+
- `semgrep` требует `rich~=13.5.2`
|
8 |
+
|
9 |
+
**Решение**: Устанавливаем `semgrep` отдельно с флагом `--no-deps`, чтобы он не тащил свою версию `rich`.
|
10 |
+
|
11 |
+
## 🚀 Сборка Docker образа
|
12 |
+
|
13 |
+
### 1. Тестирование локально (опционально)
|
14 |
+
|
15 |
+
Если хотите проверить зависимости локально:
|
16 |
+
|
17 |
+
```bash
|
18 |
+
# Установить зависимости локально для тестирования
|
19 |
+
pip install -r requirements.txt
|
20 |
+
pip install semgrep --no-deps
|
21 |
+
|
22 |
+
# Запустить тест совместимости
|
23 |
+
python test_build.py
|
24 |
+
```
|
25 |
+
|
26 |
+
### 2. Сборка Docker образа
|
27 |
+
|
28 |
+
```bash
|
29 |
+
# Сборка образа
|
30 |
+
docker build -t vulnbuster .
|
31 |
+
|
32 |
+
# Запуск контейнера
|
33 |
+
docker run -p 7860:7860 --env-file .env vulnbuster
|
34 |
+
```
|
35 |
+
|
36 |
+
### 3. Проверка работоспособности
|
37 |
+
|
38 |
+
После запуска должны быть доступны:
|
39 |
+
|
40 |
+
- **Главный агент**: http://localhost:7860
|
41 |
+
- **Bandit MCP**: http://localhost:7861
|
42 |
+
- **Detect Secrets MCP**: http://localhost:7862
|
43 |
+
- **Pip Audit MCP**: http://localhost:7863
|
44 |
+
- **Circle Test MCP**: http://localhost:7864
|
45 |
+
- **Semgrep MCP**: http://localhost:7865
|
46 |
+
|
47 |
+
## 🔍 Что изменилось в Dockerfile
|
48 |
+
|
49 |
+
```dockerfile
|
50 |
+
# Старая версия (вызывала конфликт):
|
51 |
+
RUN pip install --no-cache-dir -r requirements.txt
|
52 |
+
|
53 |
+
# Новая версия (решает конфликт):
|
54 |
+
RUN grep -vE '^(semgrep)([ =<>=~!].*)?$' requirements.txt > req_no_semgrep.txt && \
|
55 |
+
pip install --no-cache-dir --upgrade pip && \
|
56 |
+
pip install --no-cache-dir -r req_no_semgrep.txt
|
57 |
+
|
58 |
+
RUN pip install --no-cache-dir semgrep --no-deps
|
59 |
+
```
|
60 |
+
|
61 |
+
## 🧪 Тестирование
|
62 |
+
|
63 |
+
Файл `test_build.py` проверяет:
|
64 |
+
- ✅ Импорт всех основных зависимостей
|
65 |
+
- ✅ Версию `rich` (должна быть ≥13.9.4)
|
66 |
+
- ✅ Совместимость компонентов
|
67 |
+
|
68 |
+
## 🐳 Развертывание на Hugging Face Spaces
|
69 |
+
|
70 |
+
1. **Убедитесь что есть файл `.env`**:
|
71 |
+
```bash
|
72 |
+
echo "NEBIUS_API_KEY=your_api_key_here" > .env
|
73 |
+
```
|
74 |
+
|
75 |
+
2. **Пушите изменения в репозиторий**:
|
76 |
+
```bash
|
77 |
+
git add .
|
78 |
+
git commit -m "Fix dependency conflicts between smolagents and semgrep"
|
79 |
+
git push
|
80 |
+
```
|
81 |
+
|
82 |
+
3. **Hugging Face Spaces автоматически пересоберет образ** из Dockerfile.
|
83 |
+
|
84 |
+
## ⚠️ Важные моменты
|
85 |
+
|
86 |
+
- **Semgrep работает с новой версией Rich**: Хотя semgrep просит `rich~=13.5.2`, он корректно работает с более новыми версиями
|
87 |
+
- **Флаг `--no-deps`**: Предотвращает установку зависимостей semgrep, которые могут конфликтовать
|
88 |
+
- **Порядок установки**: Сначала устанавливаем все остальное (включая smolagents), затем semgrep без зависимостей
|
89 |
+
|
90 |
+
## 🔧 Отладка
|
91 |
+
|
92 |
+
Если что-то не работает:
|
93 |
+
|
94 |
+
1. **Проверьте логи сборки**:
|
95 |
+
```bash
|
96 |
+
docker build -t vulnbuster . --no-cache
|
97 |
+
```
|
98 |
+
|
99 |
+
2. **Запустите тест зависимостей внутри контейнера**:
|
100 |
+
```bash
|
101 |
+
docker run --rm vulnbuster python test_build.py
|
102 |
+
```
|
103 |
+
|
104 |
+
3. **Проверьте версии пакетов**:
|
105 |
+
```bash
|
106 |
+
docker run --rm vulnbuster pip list | grep -E "(rich|semgrep|smolagents)"
|
107 |
+
```
|
DEPENDENCY_FIX.md
ADDED
@@ -0,0 +1,76 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
# ✅ Конфликт зависимостей решен успешно
|
2 |
+
|
3 |
+
## 🐛 Проблема
|
4 |
+
|
5 |
+
В оригинальной версии возникал конфликт между:
|
6 |
+
- `smolagents==1.17.0` требует `rich>=13.9.4`
|
7 |
+
- `semgrep==1.124.0` требует `rich~=13.5.2`
|
8 |
+
|
9 |
+
```
|
10 |
+
ERROR: Cannot install -r requirements.txt (line 16) and -r requirements.txt (line 9)
|
11 |
+
because these package versions have conflicting dependencies.
|
12 |
+
The conflict is caused by:
|
13 |
+
smolagents 0.1.0 depends on rich>=13.9.4
|
14 |
+
semgrep 1.124.0 depends on rich~=13.5.2
|
15 |
+
```
|
16 |
+
|
17 |
+
## ✅ Решение
|
18 |
+
|
19 |
+
Изменили `Dockerfile` для установки `semgrep` без зависимостей:
|
20 |
+
|
21 |
+
```dockerfile
|
22 |
+
# Устанавливаем все зависимости кроме semgrep
|
23 |
+
RUN grep -vE '^(semgrep)([ =<>=~!].*)?$' requirements.txt > req_no_semgrep.txt && \
|
24 |
+
pip install --no-cache-dir --upgrade pip && \
|
25 |
+
pip install --no-cache-dir -r req_no_semgrep.txt
|
26 |
+
|
27 |
+
# Отдельно устанавливаем semgrep без зависимостей
|
28 |
+
RUN pip install --no-cache-dir semgrep --no-deps
|
29 |
+
```
|
30 |
+
|
31 |
+
## 📊 Результаты
|
32 |
+
|
33 |
+
### Установленные версии:
|
34 |
+
- ✅ **rich==14.0.0** (соответствует smolagents >=13.9.4)
|
35 |
+
- ✅ **semgrep==1.124.0** (работает с rich 14.0.0)
|
36 |
+
- ✅ **smolagents==1.17.0** (получил требуемую версию rich)
|
37 |
+
|
38 |
+
### Тесты совместимости:
|
39 |
+
```
|
40 |
+
🧪 Тестирование импорта зависимостей...
|
41 |
+
✅ Успешно импортировано: 18/18 пакетов
|
42 |
+
❌ Ошибок импорта: 0
|
43 |
+
|
44 |
+
🔍 Проверка версии Rich...
|
45 |
+
✅ Rich версия 14.0.0 соответствует требованиям smolagents (>=13.9.4)
|
46 |
+
✅ Rich Console и Table импортируются корректно
|
47 |
+
|
48 |
+
🎉 Все тесты пройдены успешно!
|
49 |
+
```
|
50 |
+
|
51 |
+
## 🚀 Готово к развертыванию
|
52 |
+
|
53 |
+
Docker образ собирается без ошибок и готов для:
|
54 |
+
|
55 |
+
1. **Локального запуска**:
|
56 |
+
```bash
|
57 |
+
docker build -t vulnbuster .
|
58 |
+
docker run -p 7860:7860 --env-file .env vulnbuster
|
59 |
+
```
|
60 |
+
|
61 |
+
2. **Развертывания на Hugging Face Spaces** - образ будет автоматически собран из Dockerfile
|
62 |
+
|
63 |
+
## 🔧 Ключевые файлы
|
64 |
+
|
65 |
+
- `Dockerfile` - исправлен для устранения конфликта
|
66 |
+
- `test_build.py` - тест совместимости зависимостей
|
67 |
+
- `BUILD_INSTRUCTIONS.md` - инструкции по сборке
|
68 |
+
- `start.sh` - скрипт запуска всех MCP серверов
|
69 |
+
|
70 |
+
## 💡 Важные детали
|
71 |
+
|
72 |
+
1. **Semgrep совместим с rich 14.0.0**: Хотя в зависимостях указан `rich~=13.5.2`, semgrep корректно работает с более новыми версиями
|
73 |
+
2. **Флаг `--no-deps`**: Предотвращает установку зависимостей semgrep, которые конфликтуют с smolagents
|
74 |
+
3. **Порядок важен**: Сначала устанавливаем smolagents (получаем rich 14.0.0), затем semgrep без зависимостей
|
75 |
+
|
76 |
+
Теперь VulnBuster готов к полноценному использованию! 🎉
|
DOCKER_SETUP.md
DELETED
@@ -1,127 +0,0 @@
|
|
1 |
-
# 🚀 Docker Setup для Security Tools MCP
|
2 |
-
|
3 |
-
## 📋 Быстрый старт
|
4 |
-
|
5 |
-
### 1. Создайте файл `.env`:
|
6 |
-
```bash
|
7 |
-
# Создайте .env в корне проекта
|
8 |
-
touch .env
|
9 |
-
```
|
10 |
-
|
11 |
-
### 2. Заполните `.env` файл:
|
12 |
-
```bash
|
13 |
-
# ======================
|
14 |
-
# API KEYS
|
15 |
-
# ======================
|
16 |
-
NEBIUS_API_KEY=your_api_key_here
|
17 |
-
CIRCLE_API_URL=https://api.example.com/protect/check_violation
|
18 |
-
|
19 |
-
# ======================
|
20 |
-
# SERVER CONFIGURATION
|
21 |
-
# ======================
|
22 |
-
GRADIO_SERVER_NAME=0.0.0.0
|
23 |
-
|
24 |
-
# ======================
|
25 |
-
# MAIN AGENT PORTS
|
26 |
-
# ======================
|
27 |
-
AGENT_EXTERNAL_PORT=7860
|
28 |
-
AGENT_INTERNAL_PORT=7860
|
29 |
-
|
30 |
-
# ======================
|
31 |
-
# MCP SERVERS PORTS
|
32 |
-
# ======================
|
33 |
-
|
34 |
-
# Bandit Security Scanner
|
35 |
-
BANDIT_EXTERNAL_PORT=7861
|
36 |
-
BANDIT_INTERNAL_PORT=7861
|
37 |
-
|
38 |
-
# Detect Secrets Scanner
|
39 |
-
DETECT_SECRETS_EXTERNAL_PORT=7862
|
40 |
-
DETECT_SECRETS_INTERNAL_PORT=7862
|
41 |
-
|
42 |
-
# Pip Audit Scanner
|
43 |
-
PIP_AUDIT_EXTERNAL_PORT=7863
|
44 |
-
PIP_AUDIT_INTERNAL_PORT=7863
|
45 |
-
|
46 |
-
# Circle Test Scanner
|
47 |
-
CIRCLE_TEST_EXTERNAL_PORT=7864
|
48 |
-
CIRCLE_TEST_INTERNAL_PORT=7864
|
49 |
-
|
50 |
-
# Semgrep Scanner
|
51 |
-
SEMGREP_EXTERNAL_PORT=7865
|
52 |
-
SEMGREP_INTERNAL_PORT=7865
|
53 |
-
```
|
54 |
-
|
55 |
-
### 3. Запуск:
|
56 |
-
```bash
|
57 |
-
# Запуск всех сервисов
|
58 |
-
docker-compose up --build
|
59 |
-
|
60 |
-
# Запуск в фоне
|
61 |
-
docker-compose up -d
|
62 |
-
|
63 |
-
# Только главный агент + MCP серверы
|
64 |
-
docker-compose up security-tools-agent
|
65 |
-
```
|
66 |
-
|
67 |
-
## 🌐 Доступ к приложениям:
|
68 |
-
|
69 |
-
- **🎯 Main Agent**: http://localhost:7860 (основное приложение)
|
70 |
-
- **🔒 Bandit**: http://localhost:7861
|
71 |
-
- **🔍 Detect Secrets**: http://localhost:7862
|
72 |
-
- **🛡️ Pip Audit**: http://localhost:7863
|
73 |
-
- **📋 Circle Test**: http://localhost:7864
|
74 |
-
- **🔍 Semgrep**: http://localhost:7865
|
75 |
-
|
76 |
-
## ⚙️ Кастомизация портов:
|
77 |
-
|
78 |
-
Если порты заняты, измените в `.env`:
|
79 |
-
```bash
|
80 |
-
# Альтернативные порты
|
81 |
-
AGENT_EXTERNAL_PORT=8060
|
82 |
-
BANDIT_EXTERNAL_PORT=8061
|
83 |
-
DETECT_SECRETS_EXTERNAL_PORT=8062
|
84 |
-
PIP_AUDIT_EXTERNAL_PORT=8063
|
85 |
-
CIRCLE_TEST_EXTERNAL_PORT=8064
|
86 |
-
SEMGREP_EXTERNAL_PORT=8065
|
87 |
-
```
|
88 |
-
|
89 |
-
## 🔧 Полезные команды:
|
90 |
-
|
91 |
-
```bash
|
92 |
-
# Статус сервисов
|
93 |
-
docker-compose ps
|
94 |
-
|
95 |
-
# Логи главного агента
|
96 |
-
docker-compose logs security-tools-agent
|
97 |
-
|
98 |
-
# Логи всех сервисов
|
99 |
-
docker-compose logs -f
|
100 |
-
|
101 |
-
# Остановка
|
102 |
-
docker-compose down
|
103 |
-
|
104 |
-
# Полная очистка
|
105 |
-
docker-compose down -v --rmi all
|
106 |
-
```
|
107 |
-
|
108 |
-
## 🏗️ Архитектура:
|
109 |
-
|
110 |
-
```
|
111 |
-
┌─────────────────────────────────────────┐
|
112 |
-
│ Security Tools Agent │
|
113 |
-
│ (main.py) │
|
114 |
-
│ Port: 7860 │
|
115 |
-
└─────────────────┬───────────────────────┘
|
116 |
-
│
|
117 |
-
┌─────────────┼─────────────┐
|
118 |
-
│ │ │
|
119 |
-
▼ ▼ ▼
|
120 |
-
┌─────────┐ ┌─────────┐ ┌─────────┐
|
121 |
-
│ Bandit │ │Detect │ │ ... │
|
122 |
-
│ :7861 │ │Secrets │ │ │
|
123 |
-
└─────────┘ │ :7862 │ └─────────┘
|
124 |
-
└─────────┘
|
125 |
-
```
|
126 |
-
|
127 |
-
Все MCP серверы работают в Docker сети `mcp-network` и общаются через имена сервисов!
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dockerfile
ADDED
@@ -0,0 +1,52 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
# Используем Python 3.11 slim образ
|
2 |
+
FROM python:3.11-slim
|
3 |
+
|
4 |
+
# Устанавливаем системные зависимости
|
5 |
+
RUN apt-get update && \
|
6 |
+
apt-get install -y --no-install-recommends \
|
7 |
+
bash \
|
8 |
+
git \
|
9 |
+
curl \
|
10 |
+
build-essential \
|
11 |
+
wget \
|
12 |
+
ca-certificates \
|
13 |
+
npm \
|
14 |
+
nodejs && \
|
15 |
+
rm -rf /var/lib/apt/lists/*
|
16 |
+
|
17 |
+
# Создаем рабочую директорию
|
18 |
+
WORKDIR /app
|
19 |
+
|
20 |
+
# Копируем requirements.txt
|
21 |
+
COPY requirements.txt .
|
22 |
+
|
23 |
+
# Устанавливаем все зависимости кроме semgrep (чтобы избежать конфликта rich версий)
|
24 |
+
RUN grep -vE '^(semgrep)([ =<>=~!].*)?$' requirements.txt > req_no_semgrep.txt && \
|
25 |
+
pip install --no-cache-dir --upgrade pip && \
|
26 |
+
pip install --no-cache-dir -r req_no_semgrep.txt
|
27 |
+
|
28 |
+
# Отдельно устанавливаем semgrep без зависимостей (--no-deps)
|
29 |
+
# чтобы не тащил свой rich~=13.5.2 и не конфликтовал с smolagents (rich>=13.9.4)
|
30 |
+
RUN pip install --no-cache-dir semgrep --no-deps
|
31 |
+
|
32 |
+
# Устанавливаем npm зависимости для MCP клиента
|
33 |
+
RUN npm install -g mcp-remote
|
34 |
+
|
35 |
+
# Копируем весь код приложения
|
36 |
+
COPY . /app
|
37 |
+
|
38 |
+
# Создаем необходимые директории
|
39 |
+
RUN mkdir -p /app/scan_data /app/reports /app/projects
|
40 |
+
|
41 |
+
# Делаем start.sh исполняемым
|
42 |
+
RUN chmod +x start.sh
|
43 |
+
|
44 |
+
# Открываем порты для всех сервисов
|
45 |
+
EXPOSE 7860 7861 7862 7863 7864 7865
|
46 |
+
|
47 |
+
# Healthcheck для проверки главного агента
|
48 |
+
HEALTHCHECK --interval=30s --timeout=10s --start-period=30s --retries=3 \
|
49 |
+
CMD curl -f http://localhost:7860 || exit 1
|
50 |
+
|
51 |
+
# Запускаем все сервисы через start.sh
|
52 |
+
CMD ["bash", "start.sh"]
|
README.md
CHANGED
@@ -1,6 +1,6 @@
|
|
1 |
---
|
2 |
title: VulnBuster
|
3 |
-
emoji:
|
4 |
colorFrom: yellow
|
5 |
colorTo: blue
|
6 |
sdk: docker
|
@@ -8,4 +8,111 @@ pinned: false
|
|
8 |
short_description: AI agent for automated code security auditing
|
9 |
---
|
10 |
|
11 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
---
|
2 |
title: VulnBuster
|
3 |
+
emoji: 🔒
|
4 |
colorFrom: yellow
|
5 |
colorTo: blue
|
6 |
sdk: docker
|
|
|
8 |
short_description: AI agent for automated code security auditing
|
9 |
---
|
10 |
|
11 |
+
# 🔒 Security Tools MCP Collection
|
12 |
+
|
13 |
+
Коллекция MCP (Model Context Protocol) серверов для анализа безопасности кода с интеграцией AI-агента.
|
14 |
+
|
15 |
+
## 🌟 Особенности
|
16 |
+
|
17 |
+
- **Комплексный анализ безопасности**: Множественные инструменты анализа в одном приложении
|
18 |
+
- **MCP-совместимость**: Интеграция с любыми MCP-клиентами
|
19 |
+
- **Веб-интерфейс**: Удобный Gradio интерфейс для ручного тестирования
|
20 |
+
- **AI-агент**: Автоматическое исправление найденных уязвимостей
|
21 |
+
- **Docker-развертывание**: Готовый к использованию Docker-контейнер
|
22 |
+
|
23 |
+
## 🛠️ Инструменты анализа
|
24 |
+
|
25 |
+
### 1. Bandit Security Scanner
|
26 |
+
- Анализ Python кода на предмет уязвимостей
|
27 |
+
- Поддержка профилей сканирования
|
28 |
+
- Управление базовыми линиями
|
29 |
+
|
30 |
+
### 2. Detect Secrets Scanner
|
31 |
+
- Обнаружение секретов в коде
|
32 |
+
- Настраиваемые фильтры
|
33 |
+
- Энтропийный анализ
|
34 |
+
|
35 |
+
### 3. Pip Audit Scanner
|
36 |
+
- Сканирование Python пакетов на уязвимости
|
37 |
+
- Проверка известных CVE
|
38 |
+
|
39 |
+
### 4. Circle Test Scanner
|
40 |
+
- Проверка соответствия политикам безопасности
|
41 |
+
- Настраиваемые правила
|
42 |
+
|
43 |
+
### 5. Semgrep Scanner
|
44 |
+
- Продвинутый статический анализ
|
45 |
+
- Настраиваемые правила
|
46 |
+
- Поддержка множества языков
|
47 |
+
|
48 |
+
## 🚀 Запуск на Hugging Face Spaces
|
49 |
+
|
50 |
+
Приложение автоматически развертывается из Docker-контейнера:
|
51 |
+
|
52 |
+
1. Все MCP серверы запускаются в одном контейнере
|
53 |
+
2. Главный агент доступен на порту 7860
|
54 |
+
3. Индивидуальные серверы доступны на портах 7861-7865
|
55 |
+
|
56 |
+
**Главное приложение**: https://huggingface.co/spaces/YOUR_USERNAME/VulnBuster
|
57 |
+
|
58 |
+
## 🔧 Локальная разработка
|
59 |
+
|
60 |
+
### Требования
|
61 |
+
- Docker
|
62 |
+
- Переменная окружения `NEBIUS_API_KEY`
|
63 |
+
|
64 |
+
### Запуск
|
65 |
+
```bash
|
66 |
+
# Клонируем репозиторий
|
67 |
+
git clone https://github.com/YOUR_USERNAME/VulnBuster.git
|
68 |
+
cd VulnBuster
|
69 |
+
|
70 |
+
# Создаем .env файл
|
71 |
+
echo "NEBIUS_API_KEY=your_api_key_here" > .env
|
72 |
+
|
73 |
+
# Запускаем все сервисы
|
74 |
+
docker build -t vulnbuster .
|
75 |
+
docker run -p 7860:7860 --env-file .env vulnbuster
|
76 |
+
```
|
77 |
+
|
78 |
+
## 🌐 MCP-интеграция
|
79 |
+
|
80 |
+
### Конфигурация для Cursor IDE
|
81 |
+
|
82 |
+
```json
|
83 |
+
{
|
84 |
+
"mcpServers": {
|
85 |
+
"vulnbuster": {
|
86 |
+
"command": "npx",
|
87 |
+
"args": [
|
88 |
+
"-y",
|
89 |
+
"mcp-remote",
|
90 |
+
"https://YOUR_USERNAME-vulnbuster.hf.space/gradio_api/mcp/sse",
|
91 |
+
"--transport",
|
92 |
+
"sse-only"
|
93 |
+
]
|
94 |
+
}
|
95 |
+
}
|
96 |
+
}
|
97 |
+
```
|
98 |
+
|
99 |
+
## 📊 Пример использования
|
100 |
+
|
101 |
+
1. Загрузите Python файл через веб-интерфейс
|
102 |
+
2. Выберите нужные анализаторы
|
103 |
+
3. Получите результаты анализа в JSON формате
|
104 |
+
4. Загрузите исправленный код
|
105 |
+
|
106 |
+
## 🔍 Обнаруживаемые уязвимости
|
107 |
+
|
108 |
+
- **Небезопасные функции**: `eval()`, `exec()`, `compile()`
|
109 |
+
- **Жестко заданные пароли**: Секреты в коде
|
110 |
+
- **SQL-инъекции**: Небезопасное формирование запросов
|
111 |
+
- **Командные инъекции**: Выполнение команд с `shell=True`
|
112 |
+
- **Утечки секретов**: API ключи, токены, приватные ключи
|
113 |
+
- **Уязвимые зависимости**: Известные CVE в пакетах
|
114 |
+
- **Нарушения политик**: Несоответствие стандартам безопасности
|
115 |
+
|
116 |
+
---
|
117 |
+
|
118 |
+
**Примечание**: Этот инструмент предоставляет статический анализ и не может обнаружить все типы уязвимостей. Используйте его как часть комплексной стратегии безопасности.
|
README_2.md
DELETED
@@ -1,513 +0,0 @@
|
|
1 |
-
# 🔒 Security Tools MCP Collection
|
2 |
-
|
3 |
-
Коллекция MCP (Model Context Protocol) оберток для инструментов безопасности.
|
4 |
-
|
5 |
-
## 🌟 Features
|
6 |
-
|
7 |
-
- **Python Code Security Analysis**: Vulnerability detection through AST analysis
|
8 |
-
- **MCP Support**: Integration with any MCP clients
|
9 |
-
- **Web Interface**: Convenient Gradio interface for manual testing
|
10 |
-
- **Baseline Management**: Create and compare with baseline files
|
11 |
-
- **Profile Scanning**: Use specialized security profiles
|
12 |
-
- **Flexible Configuration**: Customize severity and confidence levels
|
13 |
-
- **Dependency Scanning**: Scan Python environments for known vulnerabilities with pip-audit
|
14 |
-
- **Policy Compliance**: Check code against security policies with Circle Test
|
15 |
-
- **Static Analysis**: Advanced code analysis with Semgrep
|
16 |
-
|
17 |
-
## 🚀 Quick Start
|
18 |
-
|
19 |
-
### 1. Install Dependencies
|
20 |
-
|
21 |
-
```bash
|
22 |
-
pip install -r requirements.txt
|
23 |
-
```
|
24 |
-
|
25 |
-
### 2. Run Servers
|
26 |
-
|
27 |
-
```bash
|
28 |
-
# Run Bandit MCP server
|
29 |
-
python app.py
|
30 |
-
|
31 |
-
# Run Detect Secrets MCP server
|
32 |
-
python detect_secrets_mcp.py
|
33 |
-
|
34 |
-
# Run Pip Audit MCP server
|
35 |
-
python pip_audit_mcp.py
|
36 |
-
|
37 |
-
# Run Circle Test MCP server
|
38 |
-
python circle_test_mcp.py
|
39 |
-
|
40 |
-
# Run Semgrep MCP server
|
41 |
-
python semgrep_mcp.py
|
42 |
-
```
|
43 |
-
|
44 |
-
The servers will be available at:
|
45 |
-
- **Bandit Web Interface**: `http://localhost:7860`
|
46 |
-
- **Bandit MCP Server**: `http://localhost:7860/gradio_api/mcp/sse`
|
47 |
-
- **Bandit MCP Schema**: `http://localhost:7860/gradio_api/mcp/schema`
|
48 |
-
- **Detect Secrets Web Interface**: `http://localhost:7861`
|
49 |
-
- **Detect Secrets MCP Server**: `http://localhost:7861/gradio_api/mcp/sse`
|
50 |
-
- **Detect Secrets MCP Schema**: `http://localhost:7861/gradio_api/mcp/schema`
|
51 |
-
- **Pip Audit Web Interface**: `http://localhost:7862`
|
52 |
-
- **Pip Audit MCP Server**: `http://localhost:7862/gradio_api/mcp/sse`
|
53 |
-
- **Pip Audit MCP Schema**: `http://localhost:7862/gradio_api/mcp/schema`
|
54 |
-
- **Circle Test Web Interface**: `http://localhost:7863`
|
55 |
-
- **Circle Test MCP Server**: `http://localhost:7863/gradio_api/mcp/sse`
|
56 |
-
- **Circle Test MCP Schema**: `http://localhost:7863/gradio_api/mcp/schema`
|
57 |
-
- **Semgrep Web Interface**: `http://localhost:7864`
|
58 |
-
- **Semgrep MCP Server**: `http://localhost:7864/gradio_api/mcp/sse`
|
59 |
-
- **Semgrep MCP Schema**: `http://localhost:7864/gradio_api/mcp/schema`
|
60 |
-
|
61 |
-
## 🔧 Available Tools
|
62 |
-
|
63 |
-
### 1. Bandit Tools
|
64 |
-
|
65 |
-
#### 1.1 `bandit_scan` - Basic Scanning
|
66 |
-
|
67 |
-
Analyzes Python code for security issues.
|
68 |
-
|
69 |
-
**Parameters:**
|
70 |
-
- `code_input`: Python code or path to file/directory
|
71 |
-
- `scan_type`: "code" (direct code) or "path" (file/directory)
|
72 |
-
- `severity_level`: "low", "medium", "high"
|
73 |
-
- `confidence_level`: "low", "medium", "high"
|
74 |
-
- `output_format`: "json", "txt"
|
75 |
-
|
76 |
-
**Usage Example:**
|
77 |
-
```python
|
78 |
-
bandit_scan(
|
79 |
-
code_input="eval(user_input)",
|
80 |
-
scan_type="code",
|
81 |
-
severity_level="medium",
|
82 |
-
confidence_level="high"
|
83 |
-
)
|
84 |
-
```
|
85 |
-
|
86 |
-
#### 1.2 `bandit_baseline` - Baseline Management
|
87 |
-
|
88 |
-
Creates baseline file or compares with existing one.
|
89 |
-
|
90 |
-
**Parameters:**
|
91 |
-
- `target_path`: Path to project for analysis
|
92 |
-
- `baseline_file`: Path to baseline file
|
93 |
-
|
94 |
-
#### 1.3 `bandit_profile_scan` - Profile Scanning
|
95 |
-
|
96 |
-
Runs scanning using specific security profile.
|
97 |
-
|
98 |
-
**Parameters:**
|
99 |
-
- `target_path`: Path to project
|
100 |
-
- `profile_name`: "ShellInjection", "SqlInjection", "Crypto", "Subprocess"
|
101 |
-
|
102 |
-
### 2. Detect Secrets Tools
|
103 |
-
|
104 |
-
#### 2.1 `detect_secrets_scan` - Basic Scanning
|
105 |
-
|
106 |
-
Scans code for secrets using detect-secrets.
|
107 |
-
|
108 |
-
**Parameters:**
|
109 |
-
- `code_input`: Code to scan or path to file/directory
|
110 |
-
- `scan_type`: "code" (direct code) or "path" (file/directory)
|
111 |
-
- `base64_limit`: Entropy limit for base64 strings (0.0-8.0)
|
112 |
-
- `hex_limit`: Entropy limit for hex strings (0.0-8.0)
|
113 |
-
- `exclude_lines`: Regex pattern for lines to exclude
|
114 |
-
- `exclude_files`: Regex pattern for files to exclude
|
115 |
-
- `exclude_secrets`: Regex pattern for secrets to exclude
|
116 |
-
- `word_list`: Path to word list file
|
117 |
-
- `output_format`: "json" or "txt"
|
118 |
-
|
119 |
-
**Usage Example:**
|
120 |
-
```python
|
121 |
-
detect_secrets_scan(
|
122 |
-
code_input="API_KEY = 'sk_live_51H1h2K3L4M5N6O7P8Q9R0S1T2U3V4W5X6Y7Z8'",
|
123 |
-
scan_type="code",
|
124 |
-
base64_limit=4.5,
|
125 |
-
hex_limit=3.0
|
126 |
-
)
|
127 |
-
```
|
128 |
-
|
129 |
-
#### 2.2 `detect_secrets_baseline` - Baseline Management
|
130 |
-
|
131 |
-
Creates or updates a baseline file for detect-secrets.
|
132 |
-
|
133 |
-
**Parameters:**
|
134 |
-
- `target_path`: Path to code for analysis
|
135 |
-
- `baseline_file`: Path to baseline file
|
136 |
-
- `base64_limit`: Entropy limit for base64 strings
|
137 |
-
- `hex_limit`: Entropy limit for hex strings
|
138 |
-
|
139 |
-
#### 2.3 `detect_secrets_audit` - Baseline Audit
|
140 |
-
|
141 |
-
Audits a detect-secrets baseline file.
|
142 |
-
|
143 |
-
**Parameters:**
|
144 |
-
- `baseline_file`: Path to baseline file
|
145 |
-
- `show_stats`: Show statistics
|
146 |
-
- `show_report`: Show report
|
147 |
-
- `only_real`: Only show real secrets
|
148 |
-
- `only_false`: Only show false positives
|
149 |
-
|
150 |
-
### 3. Pip Audit Tools
|
151 |
-
|
152 |
-
#### 3.1 `pip_audit_scan` - Basic Scanning
|
153 |
-
|
154 |
-
Scans Python environment for known vulnerabilities using pip-audit.
|
155 |
-
|
156 |
-
**Parameters:**
|
157 |
-
- No parameters required - scans current Python environment
|
158 |
-
|
159 |
-
**Usage Example:**
|
160 |
-
```python
|
161 |
-
pip_audit_scan()
|
162 |
-
```
|
163 |
-
|
164 |
-
**Example Output:**
|
165 |
-
```json
|
166 |
-
{
|
167 |
-
"success": true,
|
168 |
-
"results": {
|
169 |
-
"vulnerabilities": [
|
170 |
-
{
|
171 |
-
"name": "package-name",
|
172 |
-
"installed_version": "1.0.0",
|
173 |
-
"fixed_version": "1.0.1",
|
174 |
-
"description": "Vulnerability description",
|
175 |
-
"aliases": ["CVE-2024-XXXX"]
|
176 |
-
}
|
177 |
-
]
|
178 |
-
}
|
179 |
-
}
|
180 |
-
```
|
181 |
-
|
182 |
-
### 4. Circle Test Tools
|
183 |
-
|
184 |
-
#### 4.1 `check_violation` - Policy Compliance Check
|
185 |
-
|
186 |
-
Checks code against security policies.
|
187 |
-
|
188 |
-
**Parameters:**
|
189 |
-
- `code_input`: Code to check
|
190 |
-
- `policies`: Dictionary of security policies
|
191 |
-
|
192 |
-
**Usage Example:**
|
193 |
-
```python
|
194 |
-
check_violation(
|
195 |
-
code_input="def read_file(filename):\n with open(filename, 'r') as f:\n return f.read()",
|
196 |
-
policies={
|
197 |
-
"1": "Presence of SPDX-License-Identifier...",
|
198 |
-
"2": "Presence of plaintext credentials..."
|
199 |
-
}
|
200 |
-
)
|
201 |
-
```
|
202 |
-
|
203 |
-
**Example Output:**
|
204 |
-
```json
|
205 |
-
{
|
206 |
-
"success": true,
|
207 |
-
"results": {
|
208 |
-
"1": {
|
209 |
-
"policy": "Presence of SPDX-License-Identifier...",
|
210 |
-
"violation": "no"
|
211 |
-
},
|
212 |
-
"2": {
|
213 |
-
"policy": "Presence of plaintext credentials...",
|
214 |
-
"violation": "yes"
|
215 |
-
}
|
216 |
-
}
|
217 |
-
}
|
218 |
-
```
|
219 |
-
|
220 |
-
### 5. Semgrep Tools
|
221 |
-
|
222 |
-
#### 5.1 `semgrep_scan` - Basic Scanning
|
223 |
-
|
224 |
-
Scans code using Semgrep rules.
|
225 |
-
|
226 |
-
**Parameters:**
|
227 |
-
- `code_input`: Code to scan or path to file/directory
|
228 |
-
- `scan_type`: "code" (direct code) or "path" (file/directory)
|
229 |
-
- `rules`: Rules to use (e.g., "p/default" or path to rules file)
|
230 |
-
- `output_format`: "json" or "text"
|
231 |
-
|
232 |
-
**Usage Example:**
|
233 |
-
```python
|
234 |
-
semgrep_scan(
|
235 |
-
code_input="def get_user(user_id):\n query = f'SELECT * FROM users WHERE id = {user_id}'\n return db.execute(query)",
|
236 |
-
scan_type="code",
|
237 |
-
rules="p/default",
|
238 |
-
output_format="json"
|
239 |
-
)
|
240 |
-
```
|
241 |
-
|
242 |
-
#### 5.2 `semgrep_list_rules` - List Available Rules
|
243 |
-
|
244 |
-
Lists available Semgrep rules.
|
245 |
-
|
246 |
-
**Parameters:**
|
247 |
-
- No parameters required
|
248 |
-
|
249 |
-
**Usage Example:**
|
250 |
-
```python
|
251 |
-
semgrep_list_rules()
|
252 |
-
```
|
253 |
-
|
254 |
-
## 🎯 What Bandit Detects
|
255 |
-
|
256 |
-
- **Insecure Functions**: `exec()`, `eval()`, `compile()`
|
257 |
-
- **Hardcoded Passwords**: Hard-coded secrets in code
|
258 |
-
- **Insecure Serialization**: Using `pickle` without validation
|
259 |
-
- **SQL Injections**: Unsafe SQL query formation
|
260 |
-
- **Shell Injections**: Command execution with `shell=True`
|
261 |
-
- **SSL Issues**: Missing certificate verification
|
262 |
-
- **Weak Encryption Algorithms**: Using outdated methods
|
263 |
-
- **File Permission Issues**: Insecure file permissions
|
264 |
-
|
265 |
-
## 🔍 What Detect Secrets Detects
|
266 |
-
|
267 |
-
- **API Keys**: Various service API keys
|
268 |
-
- **Passwords**: High entropy strings that look like passwords
|
269 |
-
- **Private Keys**: RSA, SSH, and other private keys
|
270 |
-
- **OAuth Tokens**: Various OAuth tokens
|
271 |
-
- **AWS Keys**: AWS access and secret keys
|
272 |
-
- **GitHub Tokens**: GitHub personal access tokens
|
273 |
-
- **Slack Tokens**: Slack API tokens
|
274 |
-
- **Stripe Keys**: Stripe API keys
|
275 |
-
- **And More**: Many other types of secrets
|
276 |
-
|
277 |
-
## 🛡️ What Pip Audit Detects
|
278 |
-
|
279 |
-
- **Known Vulnerabilities**: CVE and other security advisories
|
280 |
-
- **Outdated Dependencies**: Packages with known security issues
|
281 |
-
- **Version Conflicts**: Incompatible package versions
|
282 |
-
- **Deprecated Packages**: Packages that are no longer maintained
|
283 |
-
- **Supply Chain Issues**: Compromised or malicious packages
|
284 |
-
|
285 |
-
## 📋 What Circle Test Checks
|
286 |
-
|
287 |
-
- **License Compliance**: SPDX-License-Identifier presence and validity
|
288 |
-
- **Credential Management**: Plaintext credentials in configuration files
|
289 |
-
- **Code Quality**: TODO/FIXME tags in production code
|
290 |
-
- **Security Best Practices**: HTTP usage, logging of sensitive data
|
291 |
-
- **API Usage**: Deprecated API calls
|
292 |
-
- **Input Validation**: Unsanitized user input in commands
|
293 |
-
- **File Operations**: Unsafe file path handling
|
294 |
-
- **Database Security**: SQL injection prevention
|
295 |
-
- **Path Management**: Absolute path usage
|
296 |
-
- **Environment Management**: Production environment references
|
297 |
-
- **Dependency Management**: Version pinning in lock files
|
298 |
-
|
299 |
-
## 🔍 What Semgrep Detects
|
300 |
-
|
301 |
-
- **Security Vulnerabilities**: SQL injection, command injection, path traversal
|
302 |
-
- **Code Quality Issues**: Anti-patterns, best practices violations
|
303 |
-
- **Custom Rules**: User-defined security and style rules
|
304 |
-
- **Language-Specific Issues**: Language-specific vulnerabilities
|
305 |
-
- **Framework-Specific Issues**: Framework-specific security concerns
|
306 |
-
|
307 |
-
## 🧪 Vulnerable Code Examples
|
308 |
-
|
309 |
-
### 1. Using eval()
|
310 |
-
```python
|
311 |
-
user_input = "print('hello')"
|
312 |
-
eval(user_input) # B307: Use of possibly insecure function
|
313 |
-
```
|
314 |
-
|
315 |
-
### 2. Hardcoded password
|
316 |
-
```python
|
317 |
-
password = "secret123" # B105: Possible hardcoded password
|
318 |
-
```
|
319 |
-
|
320 |
-
### 3. Insecure subprocess
|
321 |
-
```python
|
322 |
-
import subprocess
|
323 |
-
subprocess.call("ls -la", shell=True) # B602: subprocess call with shell=True
|
324 |
-
```
|
325 |
-
|
326 |
-
### 4. Using pickle
|
327 |
-
```python
|
328 |
-
import pickle
|
329 |
-
data = pickle.loads(user_data) # B301: Pickle usage
|
330 |
-
```
|
331 |
-
|
332 |
-
### 5. API Key
|
333 |
-
```python
|
334 |
-
API_KEY = "sk_live_51H1h2K3L4M5N6O7P8Q9R0S1T2U3V4W5X6Y7Z8" # Detect Secrets: API Key
|
335 |
-
```
|
336 |
-
|
337 |
-
### 6. Private Key
|
338 |
-
```python
|
339 |
-
private_key = "-----BEGIN RSA PRIVATE KEY-----\nMIIEpAIBAAKCAQEA..." # Detect Secrets: Private Key
|
340 |
-
```
|
341 |
-
|
342 |
-
## 🌐 MCP Client Integration
|
343 |
-
|
344 |
-
### Configuration for Cursor IDE
|
345 |
-
|
346 |
-
```json
|
347 |
-
{
|
348 |
-
"mcpServers": {
|
349 |
-
"bandit-security": {
|
350 |
-
"command": "npx",
|
351 |
-
"args": [
|
352 |
-
"-y",
|
353 |
-
"mcp-remote",
|
354 |
-
"http://localhost:7860/gradio_api/mcp/sse",
|
355 |
-
"--transport",
|
356 |
-
"sse-only"
|
357 |
-
]
|
358 |
-
},
|
359 |
-
"detect-secrets": {
|
360 |
-
"command": "npx",
|
361 |
-
"args": [
|
362 |
-
"-y",
|
363 |
-
"mcp-remote",
|
364 |
-
"http://localhost:7861/gradio_api/mcp/sse",
|
365 |
-
"--transport",
|
366 |
-
"sse-only"
|
367 |
-
]
|
368 |
-
},
|
369 |
-
"pip-audit": {
|
370 |
-
"command": "npx",
|
371 |
-
"args": [
|
372 |
-
"-y",
|
373 |
-
"mcp-remote",
|
374 |
-
"http://localhost:7862/gradio_api/mcp/sse",
|
375 |
-
"--transport",
|
376 |
-
"sse-only"
|
377 |
-
]
|
378 |
-
},
|
379 |
-
"circle-test": {
|
380 |
-
"command": "npx",
|
381 |
-
"args": [
|
382 |
-
"-y",
|
383 |
-
"mcp-remote",
|
384 |
-
"http://localhost:7863/gradio_api/mcp/sse",
|
385 |
-
"--transport",
|
386 |
-
"sse-only"
|
387 |
-
]
|
388 |
-
},
|
389 |
-
"semgrep": {
|
390 |
-
"command": "npx",
|
391 |
-
"args": [
|
392 |
-
"-y",
|
393 |
-
"mcp-remote",
|
394 |
-
"http://localhost:7864/gradio_api/mcp/sse",
|
395 |
-
"--transport",
|
396 |
-
"sse-only"
|
397 |
-
]
|
398 |
-
}
|
399 |
-
}
|
400 |
-
}
|
401 |
-
```
|
402 |
-
|
403 |
-
### Configuration for Other MCP Clients
|
404 |
-
|
405 |
-
```json
|
406 |
-
{
|
407 |
-
"servers": [
|
408 |
-
{
|
409 |
-
"name": "Bandit Security Scanner",
|
410 |
-
"transport": {
|
411 |
-
"type": "sse",
|
412 |
-
"url": "http://localhost:7860/gradio_api/mcp/sse"
|
413 |
-
}
|
414 |
-
},
|
415 |
-
{
|
416 |
-
"name": "Detect Secrets Scanner",
|
417 |
-
"transport": {
|
418 |
-
"type": "sse",
|
419 |
-
"url": "http://localhost:7861/gradio_api/mcp/sse"
|
420 |
-
}
|
421 |
-
},
|
422 |
-
{
|
423 |
-
"name": "Pip Audit Scanner",
|
424 |
-
"transport": {
|
425 |
-
"type": "sse",
|
426 |
-
"url": "http://localhost:7862/gradio_api/mcp/sse"
|
427 |
-
}
|
428 |
-
},
|
429 |
-
{
|
430 |
-
"name": "Circle Test Scanner",
|
431 |
-
"transport": {
|
432 |
-
"type": "sse",
|
433 |
-
"url": "http://localhost:7863/gradio_api/mcp/sse"
|
434 |
-
}
|
435 |
-
},
|
436 |
-
{
|
437 |
-
"name": "Semgrep Scanner",
|
438 |
-
"transport": {
|
439 |
-
"type": "sse",
|
440 |
-
"url": "http://localhost:7864/gradio_api/mcp/sse"
|
441 |
-
}
|
442 |
-
}
|
443 |
-
]
|
444 |
-
}
|
445 |
-
```
|
446 |
-
|
447 |
-
## 📊 Results Format
|
448 |
-
|
449 |
-
### JSON Scan Result
|
450 |
-
```json
|
451 |
-
{
|
452 |
-
"success": true,
|
453 |
-
"results": {
|
454 |
-
"errors": [],
|
455 |
-
"generated_at": "2024-01-01T12:00:00Z",
|
456 |
-
"metrics": {
|
457 |
-
"_totals": {
|
458 |
-
"CONFIDENCE.HIGH": 1,
|
459 |
-
"SEVERITY.MEDIUM": 1,
|
460 |
-
"loc": 10,
|
461 |
-
"nosec": 0
|
462 |
-
}
|
463 |
-
},
|
464 |
-
"results": [
|
465 |
-
{
|
466 |
-
"code": "eval(user_input)",
|
467 |
-
"filename": "/tmp/example.py",
|
468 |
-
"issue_confidence": "HIGH",
|
469 |
-
"issue_severity": "MEDIUM",
|
470 |
-
"issue_text": "Use of possibly insecure function - consider using safer alternatives.",
|
471 |
-
"line_number": 2,
|
472 |
-
"line_range": [2],
|
473 |
-
"test_id": "B307",
|
474 |
-
"test_name": "blacklist"
|
475 |
-
}
|
476 |
-
]
|
477 |
-
}
|
478 |
-
}
|
479 |
-
```
|
480 |
-
|
481 |
-
## 🚀 Deploy on Hugging Face Spaces
|
482 |
-
|
483 |
-
1. Create a new Space on Hugging Face
|
484 |
-
2. Choose Gradio SDK
|
485 |
-
3. Upload `app.py`, `detect_secrets_mcp.py`, `pip_audit_mcp.py`, `circle_test_mcp.py`, `semgrep_mcp.py` and `requirements.txt` files
|
486 |
-
4. MCP servers will be available at:
|
487 |
-
- Bandit: `https://YOUR_USERNAME-bandit-mcp.hf.space/gradio_api/mcp/sse`
|
488 |
-
- Detect Secrets: `https://YOUR_USERNAME-detect-secrets-mcp.hf.space/gradio_api/mcp/sse`
|
489 |
-
- Pip Audit: `https://YOUR_USERNAME-pip-audit-mcp.hf.space/gradio_api/mcp/sse`
|
490 |
-
- Circle Test: `https://YOUR_USERNAME-circle-test-mcp.hf.space/gradio_api/mcp/sse`
|
491 |
-
- Semgrep: `https://YOUR_USERNAME-semgrep-mcp.hf.space/gradio_api/mcp/sse`
|
492 |
-
|
493 |
-
## 🤝 AI Agent Integration
|
494 |
-
|
495 |
-
This MCP server can be integrated with any AI agents supporting MCP:
|
496 |
-
|
497 |
-
- **Claude Desktop**: Through MCP configuration
|
498 |
-
- **Cursor IDE**: Through MCP server settings
|
499 |
-
- **Tiny Agents**: Through JavaScript or Python clients
|
500 |
-
- **Custom Agents**: Through HTTP+SSE or stdio
|
501 |
-
|
502 |
-
## 📖 Additional Resources
|
503 |
-
|
504 |
-
- [Bandit Documentation](https://bandit.readthedocs.io/)
|
505 |
-
- [Detect Secrets Documentation](https://github.com/Yelp/detect-secrets)
|
506 |
-
- [Pip Audit Documentation](https://pypi.org/project/pip-audit/)
|
507 |
-
- [Semgrep Documentation](https://semgrep.dev/docs/)
|
508 |
-
- [MCP Specification](https://spec.modelcontextprotocol.io/)
|
509 |
-
- [Gradio MCP Integration](https://gradio.app/guides/mcp-integration/)
|
510 |
-
|
511 |
-
---
|
512 |
-
|
513 |
-
**Note**: Bandit, Detect Secrets, Pip Audit, Circle Test, and Semgrep are static analyzers and cannot detect all types of vulnerabilities. Use them as part of a comprehensive security strategy.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
agent_requirements.txt
DELETED
@@ -1,134 +0,0 @@
|
|
1 |
-
agno==1.5.10
|
2 |
-
aiofiles==24.1.0
|
3 |
-
aiohappyeyeballs==2.6.1
|
4 |
-
aiohttp>=3.8.0
|
5 |
-
aiosignal==1.3.2
|
6 |
-
altair==5.5.0
|
7 |
-
annotated-types==0.7.0
|
8 |
-
attrs==25.3.0
|
9 |
-
bandit[toml,baseline,sarif]>=1.7.0
|
10 |
-
blinker==1.9.0
|
11 |
-
boltons==21.0.0
|
12 |
-
boolean.py==5.0
|
13 |
-
bracex==2.5.post1
|
14 |
-
CacheControl==0.14.3
|
15 |
-
cachetools==5.5.2
|
16 |
-
certifi==2025.4.26
|
17 |
-
charset-normalizer==3.4.2
|
18 |
-
click==8.1.8
|
19 |
-
click-option-group==0.5.7
|
20 |
-
colorama==0.4.6
|
21 |
-
cyclonedx-python-lib>=5,<9
|
22 |
-
defusedxml==0.7.1
|
23 |
-
Deprecated==1.2.18
|
24 |
-
detect-secrets>=1.0.0
|
25 |
-
distro==1.9.0
|
26 |
-
docstring_parser==0.16
|
27 |
-
exceptiongroup==1.2.2
|
28 |
-
face==24.0.0
|
29 |
-
fastapi>=0.100.0
|
30 |
-
ffmpy==0.6.0
|
31 |
-
filelock==3.18.0
|
32 |
-
frozenlist==1.6.2
|
33 |
-
fsspec==2025.5.1
|
34 |
-
gitdb==4.0.12
|
35 |
-
GitPython==3.1.44
|
36 |
-
glom==22.1.0
|
37 |
-
googleapis-common-protos==1.70.0
|
38 |
-
gradio==5.33.0
|
39 |
-
gradio_client==1.10.2
|
40 |
-
groovy==0.1.2
|
41 |
-
h11==0.16.0
|
42 |
-
hf-xet==1.1.3
|
43 |
-
httpcore==1.0.9
|
44 |
-
httpx==0.28.1
|
45 |
-
httpx-sse==0.4.0
|
46 |
-
huggingface-hub==0.32.4
|
47 |
-
idna==3.10
|
48 |
-
importlib_metadata==7.1.0
|
49 |
-
Jinja2==3.1.6
|
50 |
-
jiter==0.10.0
|
51 |
-
jsonschema==4.24.0
|
52 |
-
jsonschema-specifications==2025.4.1
|
53 |
-
license-expression==30.4.1
|
54 |
-
markdown-it-py==3.0.0
|
55 |
-
MarkupSafe==3.0.2
|
56 |
-
mcp>=1.0.0
|
57 |
-
mdurl==0.1.2
|
58 |
-
msgpack==1.1.0
|
59 |
-
multidict==6.4.4
|
60 |
-
narwhals==1.41.1
|
61 |
-
numpy==2.2.6
|
62 |
-
openai==1.84.0
|
63 |
-
opentelemetry-api==1.25.0
|
64 |
-
opentelemetry-exporter-otlp-proto-common==1.25.0
|
65 |
-
opentelemetry-exporter-otlp-proto-http==1.25.0
|
66 |
-
opentelemetry-instrumentation==0.46b0
|
67 |
-
opentelemetry-instrumentation-requests==0.46b0
|
68 |
-
opentelemetry-proto==1.25.0
|
69 |
-
opentelemetry-sdk==1.25.0
|
70 |
-
opentelemetry-semantic-conventions==0.46b0
|
71 |
-
opentelemetry-util-http==0.46b0
|
72 |
-
orjson==3.10.18
|
73 |
-
packageurl-python==0.17.1
|
74 |
-
packaging>=20.9,<25
|
75 |
-
pandas==2.3.0
|
76 |
-
pbr==6.1.1
|
77 |
-
peewee==3.18.1
|
78 |
-
pillow==11.2.1
|
79 |
-
pip-api==0.0.34
|
80 |
-
pip-requirements-parser==32.0.1
|
81 |
-
pip-audit>=2.0.0
|
82 |
-
platformdirs==4.3.8
|
83 |
-
propcache==0.3.1
|
84 |
-
protobuf==4.25.8
|
85 |
-
py-serializable>=1.1.1,<2.0.0
|
86 |
-
pyarrow==20.0.0
|
87 |
-
pydantic==2.11.5
|
88 |
-
pydantic-settings==2.9.1
|
89 |
-
pydantic_core==2.33.2
|
90 |
-
pydeck==0.9.1
|
91 |
-
pydub==0.25.1
|
92 |
-
Pygments==2.19.1
|
93 |
-
pyparsing==3.2.3
|
94 |
-
python-dateutil==2.9.0.post0
|
95 |
-
python-dotenv>=0.19.0
|
96 |
-
python-multipart==0.0.20
|
97 |
-
pytz==2025.2
|
98 |
-
PyYAML==6.0.2
|
99 |
-
referencing==0.36.2
|
100 |
-
requests==2.32.3
|
101 |
-
rich==13.5.3
|
102 |
-
rpds-py==0.25.1
|
103 |
-
ruamel.yaml==0.18.13
|
104 |
-
ruamel.yaml.clib==0.2.12
|
105 |
-
ruff==0.11.13
|
106 |
-
safehttpx==0.1.6
|
107 |
-
semantic-version==2.10.0
|
108 |
-
semgrep==1.124.0
|
109 |
-
shellingham==1.5.4
|
110 |
-
six==1.17.0
|
111 |
-
smmap==5.0.2
|
112 |
-
sniffio==1.3.1
|
113 |
-
sortedcontainers==2.4.0
|
114 |
-
sse-starlette==2.3.6
|
115 |
-
starlette>=0.27.0
|
116 |
-
stevedore==5.4.1
|
117 |
-
streamlit==1.45.1
|
118 |
-
tenacity==9.1.2
|
119 |
-
toml==0.10.2
|
120 |
-
tomli==2.0.2
|
121 |
-
tomlkit==0.13.3
|
122 |
-
tornado==6.5.1
|
123 |
-
tqdm==4.67.1
|
124 |
-
typer==0.16.0
|
125 |
-
typing-inspection==0.4.1
|
126 |
-
typing_extensions==4.14.0
|
127 |
-
tzdata==2025.2
|
128 |
-
urllib3==2.4.0
|
129 |
-
uvicorn>=0.23.0
|
130 |
-
wcmatch==8.5.2
|
131 |
-
websockets==15.0.1
|
132 |
-
wrapt==1.17.2
|
133 |
-
yarl==1.20.0
|
134 |
-
zipp==3.22.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bandit_mcp.py
CHANGED
@@ -1,3 +1,8 @@
|
|
|
|
|
|
|
|
|
|
|
|
1 |
import gradio as gr
|
2 |
import subprocess
|
3 |
import json
|
@@ -344,4 +349,13 @@ with gr.Blocks(title="Bandit Security Scanner MCP") as demo:
|
|
344 |
""")
|
345 |
|
346 |
if __name__ == "__main__":
|
347 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
#!/usr/bin/env python3
|
2 |
+
"""
|
3 |
+
MCP server for Bandit - a tool for finding common security issues in Python code
|
4 |
+
"""
|
5 |
+
|
6 |
import gradio as gr
|
7 |
import subprocess
|
8 |
import json
|
|
|
349 |
""")
|
350 |
|
351 |
if __name__ == "__main__":
|
352 |
+
# Получаем настройки сервера из переменных окружения
|
353 |
+
server_name = os.getenv("GRADIO_SERVER_NAME", "0.0.0.0")
|
354 |
+
server_port = int(os.getenv("GRADIO_SERVER_PORT", "7861"))
|
355 |
+
|
356 |
+
demo.launch(
|
357 |
+
mcp_server=True,
|
358 |
+
server_name=server_name,
|
359 |
+
server_port=server_port,
|
360 |
+
share=False
|
361 |
+
)
|
circle_test_mcp.py
CHANGED
@@ -151,4 +151,13 @@ with gr.Blocks(title="Circle Test MCP") as demo:
|
|
151 |
""")
|
152 |
|
153 |
if __name__ == "__main__":
|
154 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
151 |
""")
|
152 |
|
153 |
if __name__ == "__main__":
|
154 |
+
# Получаем настройки сервера из переменных окружения
|
155 |
+
server_name = os.getenv("GRADIO_SERVER_NAME", "0.0.0.0")
|
156 |
+
server_port = int(os.getenv("GRADIO_SERVER_PORT", "7864"))
|
157 |
+
|
158 |
+
demo.launch(
|
159 |
+
mcp_server=True,
|
160 |
+
server_name=server_name,
|
161 |
+
server_port=server_port,
|
162 |
+
share=False
|
163 |
+
)
|
detect_secrets_mcp.py
CHANGED
@@ -476,4 +476,13 @@ with gr.Blocks(title="Detect Secrets MCP") as demo:
|
|
476 |
""")
|
477 |
|
478 |
if __name__ == "__main__":
|
479 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
476 |
""")
|
477 |
|
478 |
if __name__ == "__main__":
|
479 |
+
# Получаем настройки сервера из переменных окружения
|
480 |
+
server_name = os.getenv("GRADIO_SERVER_NAME", "0.0.0.0")
|
481 |
+
server_port = int(os.getenv("GRADIO_SERVER_PORT", "7862"))
|
482 |
+
|
483 |
+
demo.launch(
|
484 |
+
mcp_server=True,
|
485 |
+
server_name=server_name,
|
486 |
+
server_port=server_port,
|
487 |
+
share=False
|
488 |
+
)
|
docker-compose.yml
DELETED
@@ -1,157 +0,0 @@
|
|
1 |
-
version: '3.8'
|
2 |
-
|
3 |
-
services:
|
4 |
-
|
5 |
-
# Bandit Security Scanner
|
6 |
-
bandit-security-scanner:
|
7 |
-
build:
|
8 |
-
context: .
|
9 |
-
dockerfile: docker/bandit.Dockerfile
|
10 |
-
container_name: bandit-mcp-server
|
11 |
-
ports:
|
12 |
-
- "${BANDIT_EXTERNAL_PORT:-7861}:${BANDIT_INTERNAL_PORT:-7861}"
|
13 |
-
environment:
|
14 |
-
- GRADIO_SERVER_NAME=${GRADIO_SERVER_NAME:-0.0.0.0}
|
15 |
-
- GRADIO_SERVER_PORT=${BANDIT_INTERNAL_PORT:-7861}
|
16 |
-
- APP_NAME=Bandit Security Scanner MCP
|
17 |
-
volumes:
|
18 |
-
- ./scan_data:/app/scan_data
|
19 |
-
- ./reports:/app/reports
|
20 |
-
- ./projects:/app/projects
|
21 |
-
restart: unless-stopped
|
22 |
-
networks:
|
23 |
-
- mcp-network
|
24 |
-
labels:
|
25 |
-
- "application=bandit-security-scanner"
|
26 |
-
- "service=mcp-server"
|
27 |
-
|
28 |
-
# Detect Secrets Scanner
|
29 |
-
detect-secrets-scanner:
|
30 |
-
build:
|
31 |
-
context: .
|
32 |
-
dockerfile: docker/detect_secrets.Dockerfile
|
33 |
-
container_name: detect-secrets-mcp-server
|
34 |
-
ports:
|
35 |
-
- "${DETECT_SECRETS_EXTERNAL_PORT:-7862}:${DETECT_SECRETS_INTERNAL_PORT:-7862}"
|
36 |
-
environment:
|
37 |
-
- GRADIO_SERVER_NAME=${GRADIO_SERVER_NAME:-0.0.0.0}
|
38 |
-
- GRADIO_SERVER_PORT=${DETECT_SECRETS_INTERNAL_PORT:-7862}
|
39 |
-
- APP_NAME=Detect Secrets MCP
|
40 |
-
volumes:
|
41 |
-
- ./scan_data:/app/scan_data
|
42 |
-
- ./reports:/app/reports
|
43 |
-
- ./projects:/app/projects
|
44 |
-
restart: unless-stopped
|
45 |
-
networks:
|
46 |
-
- mcp-network
|
47 |
-
labels:
|
48 |
-
- "application=detect-secrets-scanner"
|
49 |
-
- "service=mcp-server"
|
50 |
-
|
51 |
-
# Pip Audit Scanner
|
52 |
-
pip-audit-scanner:
|
53 |
-
build:
|
54 |
-
context: .
|
55 |
-
dockerfile: docker/pip_audit.Dockerfile
|
56 |
-
container_name: pip-audit-mcp-server
|
57 |
-
ports:
|
58 |
-
- "${PIP_AUDIT_EXTERNAL_PORT:-7863}:${PIP_AUDIT_INTERNAL_PORT:-7863}"
|
59 |
-
environment:
|
60 |
-
- GRADIO_SERVER_NAME=${GRADIO_SERVER_NAME:-0.0.0.0}
|
61 |
-
- GRADIO_SERVER_PORT=${PIP_AUDIT_INTERNAL_PORT:-7863}
|
62 |
-
- APP_NAME=Pip Audit MCP
|
63 |
-
volumes:
|
64 |
-
- ./scan_data:/app/scan_data
|
65 |
-
- ./reports:/app/reports
|
66 |
-
- ./projects:/app/projects
|
67 |
-
restart: unless-stopped
|
68 |
-
networks:
|
69 |
-
- mcp-network
|
70 |
-
labels:
|
71 |
-
- "application=pip-audit-scanner"
|
72 |
-
- "service=mcp-server"
|
73 |
-
|
74 |
-
# Circle Test Scanner
|
75 |
-
circle-test-scanner:
|
76 |
-
build:
|
77 |
-
context: .
|
78 |
-
dockerfile: docker/circle_test.Dockerfile
|
79 |
-
container_name: circle-test-mcp-server
|
80 |
-
ports:
|
81 |
-
- "${CIRCLE_TEST_EXTERNAL_PORT:-7864}:${CIRCLE_TEST_INTERNAL_PORT:-7864}"
|
82 |
-
environment:
|
83 |
-
- GRADIO_SERVER_NAME=${GRADIO_SERVER_NAME:-0.0.0.0}
|
84 |
-
- GRADIO_SERVER_PORT=${CIRCLE_TEST_INTERNAL_PORT:-7864}
|
85 |
-
- APP_NAME=Circle Test MCP
|
86 |
-
volumes:
|
87 |
-
- ./scan_data:/app/scan_data
|
88 |
-
- ./reports:/app/reports
|
89 |
-
- ./projects:/app/projects
|
90 |
-
restart: unless-stopped
|
91 |
-
networks:
|
92 |
-
- mcp-network
|
93 |
-
labels:
|
94 |
-
- "application=circle-test-scanner"
|
95 |
-
- "service=mcp-server"
|
96 |
-
|
97 |
-
# Semgrep Scanner
|
98 |
-
semgrep-scanner:
|
99 |
-
build:
|
100 |
-
context: .
|
101 |
-
dockerfile: docker/semgrep.Dockerfile
|
102 |
-
container_name: semgrep-mcp-server
|
103 |
-
ports:
|
104 |
-
- "${SEMGREP_EXTERNAL_PORT:-7865}:${SEMGREP_INTERNAL_PORT:-7865}"
|
105 |
-
environment:
|
106 |
-
- GRADIO_SERVER_NAME=${GRADIO_SERVER_NAME:-0.0.0.0}
|
107 |
-
- GRADIO_SERVER_PORT=${SEMGREP_INTERNAL_PORT:-7865}
|
108 |
-
- APP_NAME=Semgrep MCP
|
109 |
-
volumes:
|
110 |
-
- ./scan_data:/app/scan_data
|
111 |
-
- ./reports:/app/reports
|
112 |
-
- ./projects:/app/projects
|
113 |
-
restart: unless-stopped
|
114 |
-
networks:
|
115 |
-
- mcp-network
|
116 |
-
labels:
|
117 |
-
- "application=semgrep-scanner"
|
118 |
-
- "service=mcp-server"
|
119 |
-
|
120 |
-
# Main Security Tools Agent
|
121 |
-
security-tools-agent:
|
122 |
-
build:
|
123 |
-
context: .
|
124 |
-
dockerfile: docker/agent.Dockerfile
|
125 |
-
container_name: security-tools-mcp-agent
|
126 |
-
ports:
|
127 |
-
- "${AGENT_EXTERNAL_PORT:-7860}:${AGENT_INTERNAL_PORT:-7860}"
|
128 |
-
environment:
|
129 |
-
- GRADIO_SERVER_NAME=${GRADIO_SERVER_NAME:-0.0.0.0}
|
130 |
-
- GRADIO_SERVER_PORT=${AGENT_INTERNAL_PORT:-7860}
|
131 |
-
- APP_NAME=Security Tools MCP Agent
|
132 |
-
- NEBIUS_API_KEY=${NEBIUS_API_KEY}
|
133 |
-
volumes:
|
134 |
-
- ./scan_data:/app/scan_data
|
135 |
-
- ./reports:/app/reports
|
136 |
-
- ./projects:/app/projects
|
137 |
-
depends_on:
|
138 |
-
- bandit-security-scanner
|
139 |
-
- detect-secrets-scanner
|
140 |
-
- pip-audit-scanner
|
141 |
-
- circle-test-scanner
|
142 |
-
- semgrep-scanner
|
143 |
-
restart: unless-stopped
|
144 |
-
networks:
|
145 |
-
- mcp-network
|
146 |
-
labels:
|
147 |
-
- "application=security-tools-agent"
|
148 |
-
- "service=main-agent"
|
149 |
-
|
150 |
-
networks:
|
151 |
-
mcp-network:
|
152 |
-
driver: bridge
|
153 |
-
|
154 |
-
volumes:
|
155 |
-
scan_data:
|
156 |
-
reports:
|
157 |
-
projects:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
docker/agent.Dockerfile
DELETED
@@ -1,42 +0,0 @@
|
|
1 |
-
FROM python:3.11-slim
|
2 |
-
|
3 |
-
# Метаданные образа
|
4 |
-
LABEL maintainer="VulnBuster"
|
5 |
-
LABEL description="Security Tools MCP Agent - Main Application"
|
6 |
-
LABEL version="1.0"
|
7 |
-
LABEL application="security-tools-mcp-agent"
|
8 |
-
|
9 |
-
# Установка системных зависимостей
|
10 |
-
RUN apt-get update && apt-get install -y \
|
11 |
-
git \
|
12 |
-
curl \
|
13 |
-
build-essential \
|
14 |
-
&& rm -rf /var/lib/apt/lists/*
|
15 |
-
|
16 |
-
# Создание рабочей директории
|
17 |
-
WORKDIR /app
|
18 |
-
|
19 |
-
# Копирование requirements для агента
|
20 |
-
COPY agent_requirements.txt ./requirements.txt
|
21 |
-
|
22 |
-
# Установка Python зависимостей
|
23 |
-
RUN pip install --no-cache-dir --upgrade pip && \
|
24 |
-
pip install --no-cache-dir -r requirements.txt
|
25 |
-
|
26 |
-
# Копирование исходного кода
|
27 |
-
COPY main.py .
|
28 |
-
|
29 |
-
# Переменные окружения для Agent
|
30 |
-
ENV GRADIO_SERVER_PORT=7860
|
31 |
-
ENV GRADIO_SERVER_NAME=0.0.0.0
|
32 |
-
ENV APP_NAME="Security Tools MCP Agent"
|
33 |
-
|
34 |
-
# Открытие порта
|
35 |
-
EXPOSE $GRADIO_SERVER_PORT
|
36 |
-
|
37 |
-
# Healthcheck
|
38 |
-
HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \
|
39 |
-
CMD curl -f http://localhost:${GRADIO_SERVER_PORT}/ || exit 1
|
40 |
-
|
41 |
-
# Команда запуска
|
42 |
-
CMD ["python", "main.py"]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
docker/bandit.Dockerfile
DELETED
@@ -1,42 +0,0 @@
|
|
1 |
-
FROM python:3.11-slim
|
2 |
-
|
3 |
-
# Метаданные образа
|
4 |
-
LABEL maintainer="VulnBuster"
|
5 |
-
LABEL description="Bandit Security Scanner MCP Server with Gradio Web Interface"
|
6 |
-
LABEL version="1.0"
|
7 |
-
LABEL application="bandit-mcp"
|
8 |
-
|
9 |
-
# Установка системных зависимостей
|
10 |
-
RUN apt-get update && apt-get install -y \
|
11 |
-
git \
|
12 |
-
curl \
|
13 |
-
build-essential \
|
14 |
-
&& rm -rf /var/lib/apt/lists/*
|
15 |
-
|
16 |
-
# Создание рабочей директории
|
17 |
-
WORKDIR /app
|
18 |
-
|
19 |
-
# Копирование requirements
|
20 |
-
COPY requirements.txt ./requirements.txt
|
21 |
-
|
22 |
-
# Установка Python зависимостей
|
23 |
-
RUN pip install --no-cache-dir --upgrade pip && \
|
24 |
-
pip install --no-cache-dir -r requirements.txt
|
25 |
-
|
26 |
-
# Копирование исходного кода
|
27 |
-
COPY bandit_mcp.py .
|
28 |
-
|
29 |
-
# Переменные окружения для Bandit MCP
|
30 |
-
ENV GRADIO_SERVER_PORT=7861
|
31 |
-
ENV GRADIO_SERVER_NAME=0.0.0.0
|
32 |
-
ENV APP_NAME="Bandit Security Scanner MCP"
|
33 |
-
|
34 |
-
# Открытие порта
|
35 |
-
EXPOSE $GRADIO_SERVER_PORT
|
36 |
-
|
37 |
-
# Healthcheck
|
38 |
-
HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \
|
39 |
-
CMD curl -f http://localhost:${GRADIO_SERVER_PORT}/ || exit 1
|
40 |
-
|
41 |
-
# Команда запуска
|
42 |
-
CMD ["python", "bandit_mcp.py"]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
docker/circle_test.Dockerfile
DELETED
@@ -1,42 +0,0 @@
|
|
1 |
-
FROM python:3.11-slim
|
2 |
-
|
3 |
-
# Метаданные образа
|
4 |
-
LABEL maintainer="VulnBuster"
|
5 |
-
LABEL description="Circle Test MCP Server with Gradio Web Interface"
|
6 |
-
LABEL version="1.0"
|
7 |
-
LABEL application="circle-test-mcp"
|
8 |
-
|
9 |
-
# Установка системных зависимостей
|
10 |
-
RUN apt-get update && apt-get install -y \
|
11 |
-
git \
|
12 |
-
curl \
|
13 |
-
build-essential \
|
14 |
-
&& rm -rf /var/lib/apt/lists/*
|
15 |
-
|
16 |
-
# Создание рабочей директории
|
17 |
-
WORKDIR /app
|
18 |
-
|
19 |
-
# Копирование requirements
|
20 |
-
COPY requirements.txt ./requirements.txt
|
21 |
-
|
22 |
-
# Установка Python зависимостей
|
23 |
-
RUN pip install --no-cache-dir --upgrade pip && \
|
24 |
-
pip install --no-cache-dir -r requirements.txt
|
25 |
-
|
26 |
-
# Копирование исходного кода
|
27 |
-
COPY circle_test_mcp.py .
|
28 |
-
|
29 |
-
# Переменные окружения для Circle Test MCP
|
30 |
-
ENV GRADIO_SERVER_PORT=7864
|
31 |
-
ENV GRADIO_SERVER_NAME=0.0.0.0
|
32 |
-
ENV APP_NAME="Circle Test MCP"
|
33 |
-
|
34 |
-
# Открытие порта
|
35 |
-
EXPOSE $GRADIO_SERVER_PORT
|
36 |
-
|
37 |
-
# Healthcheck
|
38 |
-
HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \
|
39 |
-
CMD curl -f http://localhost:${GRADIO_SERVER_PORT}/ || exit 1
|
40 |
-
|
41 |
-
# Команда запуска
|
42 |
-
CMD ["python", "circle_test_mcp.py"]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
docker/detect_secrets.Dockerfile
DELETED
@@ -1,42 +0,0 @@
|
|
1 |
-
FROM python:3.11-slim
|
2 |
-
|
3 |
-
# Метаданные образа
|
4 |
-
LABEL maintainer="VulnBuster"
|
5 |
-
LABEL description="Detect Secrets MCP Server with Gradio Web Interface"
|
6 |
-
LABEL version="1.0"
|
7 |
-
LABEL application="detect-secrets-mcp"
|
8 |
-
|
9 |
-
# Установка системных зависимостей
|
10 |
-
RUN apt-get update && apt-get install -y \
|
11 |
-
git \
|
12 |
-
curl \
|
13 |
-
build-essential \
|
14 |
-
&& rm -rf /var/lib/apt/lists/*
|
15 |
-
|
16 |
-
# Создание рабочей директории
|
17 |
-
WORKDIR /app
|
18 |
-
|
19 |
-
# Копирование requirements
|
20 |
-
COPY requirements.txt ./requirements.txt
|
21 |
-
|
22 |
-
# Установка Python зависимостей
|
23 |
-
RUN pip install --no-cache-dir --upgrade pip && \
|
24 |
-
pip install --no-cache-dir -r requirements.txt
|
25 |
-
|
26 |
-
# Копирование исходного кода
|
27 |
-
COPY detect_secrets_mcp.py .
|
28 |
-
|
29 |
-
# Переменные окружения для Detect Secrets MCP
|
30 |
-
ENV GRADIO_SERVER_PORT=7862
|
31 |
-
ENV GRADIO_SERVER_NAME=0.0.0.0
|
32 |
-
ENV APP_NAME="Detect Secrets MCP"
|
33 |
-
|
34 |
-
# Открытие порта
|
35 |
-
EXPOSE $GRADIO_SERVER_PORT
|
36 |
-
|
37 |
-
# Healthcheck
|
38 |
-
HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \
|
39 |
-
CMD curl -f http://localhost:${GRADIO_SERVER_PORT}/ || exit 1
|
40 |
-
|
41 |
-
# Команда запуска
|
42 |
-
CMD ["python", "detect_secrets_mcp.py"]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
docker/pip_audit.Dockerfile
DELETED
@@ -1,42 +0,0 @@
|
|
1 |
-
FROM python:3.11-slim
|
2 |
-
|
3 |
-
# Метаданные образа
|
4 |
-
LABEL maintainer="VulnBuster"
|
5 |
-
LABEL description="Pip Audit MCP Server with Gradio Web Interface"
|
6 |
-
LABEL version="1.0"
|
7 |
-
LABEL application="pip-audit-mcp"
|
8 |
-
|
9 |
-
# Установка системных зависимостей
|
10 |
-
RUN apt-get update && apt-get install -y \
|
11 |
-
git \
|
12 |
-
curl \
|
13 |
-
build-essential \
|
14 |
-
&& rm -rf /var/lib/apt/lists/*
|
15 |
-
|
16 |
-
# Создание рабочей директории
|
17 |
-
WORKDIR /app
|
18 |
-
|
19 |
-
# Копирование requirements
|
20 |
-
COPY requirements.txt ./requirements.txt
|
21 |
-
|
22 |
-
# Установка Python зависимостей
|
23 |
-
RUN pip install --no-cache-dir --upgrade pip && \
|
24 |
-
pip install --no-cache-dir -r requirements.txt
|
25 |
-
|
26 |
-
# Копирование исходного кода
|
27 |
-
COPY pip_audit_mcp.py .
|
28 |
-
|
29 |
-
# Переменные окружения для Pip Audit MCP
|
30 |
-
ENV GRADIO_SERVER_PORT=7863
|
31 |
-
ENV GRADIO_SERVER_NAME=0.0.0.0
|
32 |
-
ENV APP_NAME="Pip Audit MCP"
|
33 |
-
|
34 |
-
# Открытие порта
|
35 |
-
EXPOSE $GRADIO_SERVER_PORT
|
36 |
-
|
37 |
-
# Healthcheck
|
38 |
-
HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \
|
39 |
-
CMD curl -f http://localhost:${GRADIO_SERVER_PORT}/ || exit 1
|
40 |
-
|
41 |
-
# Команда запуска
|
42 |
-
CMD ["python", "pip_audit_mcp.py"]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
docker/semgrep.Dockerfile
DELETED
@@ -1,42 +0,0 @@
|
|
1 |
-
FROM python:3.11-slim
|
2 |
-
|
3 |
-
# Метаданные образа
|
4 |
-
LABEL maintainer="VulnBuster"
|
5 |
-
LABEL description="Semgrep MCP Server with Gradio Web Interface"
|
6 |
-
LABEL version="1.0"
|
7 |
-
LABEL application="semgrep-mcp"
|
8 |
-
|
9 |
-
# Установка системных зависимостей
|
10 |
-
RUN apt-get update && apt-get install -y \
|
11 |
-
git \
|
12 |
-
curl \
|
13 |
-
build-essential \
|
14 |
-
&& rm -rf /var/lib/apt/lists/*
|
15 |
-
|
16 |
-
# Создание рабочей директории
|
17 |
-
WORKDIR /app
|
18 |
-
|
19 |
-
# Копирование requirements
|
20 |
-
COPY requirements.txt ./requirements.txt
|
21 |
-
|
22 |
-
# Установка Python зависимостей
|
23 |
-
RUN pip install --no-cache-dir --upgrade pip && \
|
24 |
-
pip install --no-cache-dir -r requirements.txt
|
25 |
-
|
26 |
-
# Копирование исходного кода
|
27 |
-
COPY semgrep_mcp.py .
|
28 |
-
|
29 |
-
# Переменные окружения для Semgrep MCP
|
30 |
-
ENV GRADIO_SERVER_PORT=7865
|
31 |
-
ENV GRADIO_SERVER_NAME=0.0.0.0
|
32 |
-
ENV APP_NAME="Semgrep MCP"
|
33 |
-
|
34 |
-
# Открытие порта
|
35 |
-
EXPOSE $GRADIO_SERVER_PORT
|
36 |
-
|
37 |
-
# Healthcheck
|
38 |
-
HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \
|
39 |
-
CMD curl -f http://localhost:${GRADIO_SERVER_PORT}/ || exit 1
|
40 |
-
|
41 |
-
# Команда запуска
|
42 |
-
CMD ["python", "semgrep_mcp.py"]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
main.py
CHANGED
@@ -179,7 +179,7 @@ api_key = os.getenv("NEBIUS_API_KEY")
|
|
179 |
if not api_key:
|
180 |
raise ValueError("NEBIUS_API_KEY not found in .env file")
|
181 |
|
182 |
-
# Конфигурация MCP серверов (
|
183 |
BANDIT_PORT = os.getenv('BANDIT_INTERNAL_PORT', '7861')
|
184 |
DETECT_SECRETS_PORT = os.getenv('DETECT_SECRETS_INTERNAL_PORT', '7862')
|
185 |
PIP_AUDIT_PORT = os.getenv('PIP_AUDIT_INTERNAL_PORT', '7863')
|
@@ -188,27 +188,27 @@ SEMGREP_PORT = os.getenv('SEMGREP_INTERNAL_PORT', '7865')
|
|
188 |
|
189 |
MCP_SERVERS = {
|
190 |
"bandit": {
|
191 |
-
"url": f"http://
|
192 |
"description": "Python code security analysis",
|
193 |
"port": int(BANDIT_PORT)
|
194 |
},
|
195 |
"detect_secrets": {
|
196 |
-
"url": f"http://
|
197 |
"description": "Secret detection in code",
|
198 |
"port": int(DETECT_SECRETS_PORT)
|
199 |
},
|
200 |
"pip_audit": {
|
201 |
-
"url": f"http://
|
202 |
"description": "Python package vulnerability scanning",
|
203 |
"port": int(PIP_AUDIT_PORT)
|
204 |
},
|
205 |
"circle_test": {
|
206 |
-
"url": f"http://
|
207 |
"description": "Security policy compliance checking",
|
208 |
"port": int(CIRCLE_TEST_PORT)
|
209 |
},
|
210 |
"semgrep": {
|
211 |
-
"url": f"http://
|
212 |
"description": "Advanced static code analysis",
|
213 |
"port": int(SEMGREP_PORT)
|
214 |
}
|
@@ -565,7 +565,16 @@ if __name__ == "__main__":
|
|
565 |
asyncio.run(init_all_tools())
|
566 |
|
567 |
logger.info("Запуск Security Tools MCP Agent...")
|
568 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
569 |
except Exception as e:
|
570 |
logger.error(f"Ошибка запуска приложения: {str(e)}")
|
571 |
sys.exit(1)
|
|
|
179 |
if not api_key:
|
180 |
raise ValueError("NEBIUS_API_KEY not found in .env file")
|
181 |
|
182 |
+
# Конфигурация MCP серверов (теперь все в одном контейнере)
|
183 |
BANDIT_PORT = os.getenv('BANDIT_INTERNAL_PORT', '7861')
|
184 |
DETECT_SECRETS_PORT = os.getenv('DETECT_SECRETS_INTERNAL_PORT', '7862')
|
185 |
PIP_AUDIT_PORT = os.getenv('PIP_AUDIT_INTERNAL_PORT', '7863')
|
|
|
188 |
|
189 |
MCP_SERVERS = {
|
190 |
"bandit": {
|
191 |
+
"url": f"http://localhost:{BANDIT_PORT}/gradio_api/mcp/sse",
|
192 |
"description": "Python code security analysis",
|
193 |
"port": int(BANDIT_PORT)
|
194 |
},
|
195 |
"detect_secrets": {
|
196 |
+
"url": f"http://localhost:{DETECT_SECRETS_PORT}/gradio_api/mcp/sse",
|
197 |
"description": "Secret detection in code",
|
198 |
"port": int(DETECT_SECRETS_PORT)
|
199 |
},
|
200 |
"pip_audit": {
|
201 |
+
"url": f"http://localhost:{PIP_AUDIT_PORT}/gradio_api/mcp/sse",
|
202 |
"description": "Python package vulnerability scanning",
|
203 |
"port": int(PIP_AUDIT_PORT)
|
204 |
},
|
205 |
"circle_test": {
|
206 |
+
"url": f"http://localhost:{CIRCLE_TEST_PORT}/gradio_api/mcp/sse",
|
207 |
"description": "Security policy compliance checking",
|
208 |
"port": int(CIRCLE_TEST_PORT)
|
209 |
},
|
210 |
"semgrep": {
|
211 |
+
"url": f"http://localhost:{SEMGREP_PORT}/gradio_api/mcp/sse",
|
212 |
"description": "Advanced static code analysis",
|
213 |
"port": int(SEMGREP_PORT)
|
214 |
}
|
|
|
565 |
asyncio.run(init_all_tools())
|
566 |
|
567 |
logger.info("Запуск Security Tools MCP Agent...")
|
568 |
+
|
569 |
+
# Получаем настройки сервера из переменных окружения
|
570 |
+
server_name = os.getenv("GRADIO_SERVER_NAME", "0.0.0.0")
|
571 |
+
server_port = int(os.getenv("GRADIO_SERVER_PORT", "7860"))
|
572 |
+
|
573 |
+
demo.launch(
|
574 |
+
server_name=server_name,
|
575 |
+
server_port=server_port,
|
576 |
+
share=False
|
577 |
+
)
|
578 |
except Exception as e:
|
579 |
logger.error(f"Ошибка запуска приложения: {str(e)}")
|
580 |
sys.exit(1)
|
pip_audit_mcp.py
CHANGED
@@ -7,6 +7,7 @@ import subprocess
|
|
7 |
import json
|
8 |
from typing import Dict
|
9 |
import gradio as gr
|
|
|
10 |
|
11 |
def pip_audit_scan() -> Dict:
|
12 |
"""
|
@@ -76,4 +77,13 @@ with gr.Blocks(title="Pip Audit MCP") as demo:
|
|
76 |
)
|
77 |
|
78 |
if __name__ == "__main__":
|
79 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7 |
import json
|
8 |
from typing import Dict
|
9 |
import gradio as gr
|
10 |
+
import os
|
11 |
|
12 |
def pip_audit_scan() -> Dict:
|
13 |
"""
|
|
|
77 |
)
|
78 |
|
79 |
if __name__ == "__main__":
|
80 |
+
# Получаем настройки сервера из переменных окружения
|
81 |
+
server_name = os.getenv("GRADIO_SERVER_NAME", "0.0.0.0")
|
82 |
+
server_port = int(os.getenv("GRADIO_SERVER_PORT", "7863"))
|
83 |
+
|
84 |
+
demo.launch(
|
85 |
+
mcp_server=True,
|
86 |
+
server_name=server_name,
|
87 |
+
server_port=server_port,
|
88 |
+
share=False
|
89 |
+
)
|
requirements.txt
CHANGED
@@ -1,9 +1,47 @@
|
|
1 |
-
|
2 |
-
|
3 |
-
|
4 |
-
|
5 |
-
|
6 |
-
|
7 |
-
|
8 |
-
|
9 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
# Security Tools MCP - Simplified Dependencies
|
2 |
+
# Core frameworks
|
3 |
+
gradio[mcp]>=5.30.0
|
4 |
+
fastapi>=0.100.0
|
5 |
+
uvicorn[standard]>=0.23.0
|
6 |
+
|
7 |
+
# MCP framework and client
|
8 |
+
mcp>=1.0.0
|
9 |
+
smolagents>=0.1.0
|
10 |
+
mcp-remote
|
11 |
+
|
12 |
+
# Security scanners
|
13 |
+
bandit[toml]>=1.7.0
|
14 |
+
detect-secrets>=1.0.0
|
15 |
+
pip-audit>=2.0.0
|
16 |
+
semgrep>=1.100.0
|
17 |
+
|
18 |
+
# AI/ML agent framework
|
19 |
+
agno>=1.5.0
|
20 |
+
openai>=1.80.0
|
21 |
+
|
22 |
+
# Core libraries
|
23 |
+
aiohttp>=3.8.0
|
24 |
+
aiofiles>=24.0.0
|
25 |
+
python-dotenv>=0.19.0
|
26 |
+
|
27 |
+
# Web and HTTP
|
28 |
+
httpx>=0.27.0
|
29 |
+
httpx-sse>=0.4.0
|
30 |
+
requests>=2.32.0
|
31 |
+
sse-starlette>=2.3.0
|
32 |
+
|
33 |
+
# Data processing
|
34 |
+
pandas>=2.0.0
|
35 |
+
numpy>=2.0.0
|
36 |
+
pydantic>=2.10.0
|
37 |
+
|
38 |
+
# Utilities
|
39 |
+
click>=8.0.0
|
40 |
+
typer>=0.15.0
|
41 |
+
PyYAML>=6.0.0
|
42 |
+
toml>=0.10.0
|
43 |
+
|
44 |
+
# Optional dependencies for better functionality
|
45 |
+
Jinja2>=3.1.0
|
46 |
+
packaging>=20.9
|
47 |
+
platformdirs>=4.0.0
|
semgrep_mcp.py
CHANGED
@@ -207,4 +207,13 @@ with gr.Blocks(title="Semgrep MCP") as demo:
|
|
207 |
""")
|
208 |
|
209 |
if __name__ == "__main__":
|
210 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
207 |
""")
|
208 |
|
209 |
if __name__ == "__main__":
|
210 |
+
# Получаем настройки сервера из переменных окружения
|
211 |
+
server_name = os.getenv("GRADIO_SERVER_NAME", "0.0.0.0")
|
212 |
+
server_port = int(os.getenv("GRADIO_SERVER_PORT", "7865"))
|
213 |
+
|
214 |
+
demo.launch(
|
215 |
+
mcp_server=True,
|
216 |
+
server_name=server_name,
|
217 |
+
server_port=server_port,
|
218 |
+
share=False
|
219 |
+
)
|
start.sh
ADDED
@@ -0,0 +1,90 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
#!/usr/bin/env bash
|
2 |
+
set -e
|
3 |
+
|
4 |
+
echo "🚀 Запуск Security Tools MCP Collection..."
|
5 |
+
|
6 |
+
# Функция для ожидания запуска сервиса
|
7 |
+
wait_for_service() {
|
8 |
+
local port=$1
|
9 |
+
local service_name=$2
|
10 |
+
local max_attempts=30
|
11 |
+
local attempt=1
|
12 |
+
|
13 |
+
echo "⏳ Ожидание запуска $service_name на порту $port..."
|
14 |
+
|
15 |
+
while [ $attempt -le $max_attempts ]; do
|
16 |
+
if curl -f http://localhost:$port/health 2>/dev/null || curl -f http://localhost:$port 2>/dev/null; then
|
17 |
+
echo "✅ $service_name запущен на порту $port"
|
18 |
+
return 0
|
19 |
+
fi
|
20 |
+
echo " Попытка $attempt/$max_attempts для $service_name..."
|
21 |
+
sleep 2
|
22 |
+
attempt=$((attempt + 1))
|
23 |
+
done
|
24 |
+
|
25 |
+
echo "❌ Не удалось дождаться запуска $service_name"
|
26 |
+
return 1
|
27 |
+
}
|
28 |
+
|
29 |
+
# Экспортируем переменные окружения для MCP серверов
|
30 |
+
export GRADIO_SERVER_NAME=${GRADIO_SERVER_NAME:-0.0.0.0}
|
31 |
+
|
32 |
+
# Запускаем Bandit MCP сервер в фоне
|
33 |
+
echo "🔒 Запуск Bandit Security Scanner..."
|
34 |
+
export GRADIO_SERVER_PORT=7861
|
35 |
+
python bandit_mcp.py &
|
36 |
+
BANDIT_PID=$!
|
37 |
+
|
38 |
+
# Запускаем Detect Secrets MCP сервер в фоне
|
39 |
+
echo "🔍 Запуск Detect Secrets Scanner..."
|
40 |
+
export GRADIO_SERVER_PORT=7862
|
41 |
+
python detect_secrets_mcp.py &
|
42 |
+
DETECT_SECRETS_PID=$!
|
43 |
+
|
44 |
+
# Запускаем Pip Audit MCP сервер в фоне
|
45 |
+
echo "🛡️ Запуск Pip Audit Scanner..."
|
46 |
+
export GRADIO_SERVER_PORT=7863
|
47 |
+
python pip_audit_mcp.py &
|
48 |
+
PIP_AUDIT_PID=$!
|
49 |
+
|
50 |
+
# Запускаем Circle Test MCP сервер в фоне
|
51 |
+
echo "📋 Запуск Circle Test Scanner..."
|
52 |
+
export GRADIO_SERVER_PORT=7864
|
53 |
+
python circle_test_mcp.py &
|
54 |
+
CIRCLE_TEST_PID=$!
|
55 |
+
|
56 |
+
# Запускаем Semgrep MCP сервер в фоне
|
57 |
+
echo "🔍 Запуск Semgrep Scanner..."
|
58 |
+
export GRADIO_SERVER_PORT=7865
|
59 |
+
python semgrep_mcp.py &
|
60 |
+
SEMGREP_PID=$!
|
61 |
+
|
62 |
+
# Даем серверам время на запуск
|
63 |
+
echo "⏳ Ожидание запуска всех MCP серверов..."
|
64 |
+
sleep 10
|
65 |
+
|
66 |
+
# Проверяем что все серверы запустились
|
67 |
+
wait_for_service 7861 "Bandit"
|
68 |
+
wait_for_service 7862 "Detect Secrets"
|
69 |
+
wait_for_service 7863 "Pip Audit"
|
70 |
+
wait_for_service 7864 "Circle Test"
|
71 |
+
wait_for_service 7865 "Semgrep"
|
72 |
+
|
73 |
+
# Функция для корректного завершения всех процессов
|
74 |
+
cleanup() {
|
75 |
+
echo "🛑 Завершение всех сервисов..."
|
76 |
+
kill $BANDIT_PID $DETECT_SECRETS_PID $PIP_AUDIT_PID $CIRCLE_TEST_PID $SEMGREP_PID 2>/dev/null || true
|
77 |
+
wait $BANDIT_PID $DETECT_SECRETS_PID $PIP_AUDIT_PID $CIRCLE_TEST_PID $SEMGREP_PID 2>/dev/null || true
|
78 |
+
echo "✅ Все сервисы завершены"
|
79 |
+
}
|
80 |
+
|
81 |
+
# Регистрируем обработчик сигналов
|
82 |
+
trap cleanup SIGTERM SIGINT
|
83 |
+
|
84 |
+
# Запускаем главный агент на порту 7860
|
85 |
+
echo "🎯 Запуск главного Security Tools Agent..."
|
86 |
+
export GRADIO_SERVER_PORT=7860
|
87 |
+
python main.py
|
88 |
+
|
89 |
+
# Если main.py завершился, останавливаем все остальные сервисы
|
90 |
+
cleanup
|
test_build.py
ADDED
@@ -0,0 +1,132 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
#!/usr/bin/env python3
|
2 |
+
"""
|
3 |
+
Простой тест для проверки импорта основных зависимостей после исправления конфликта
|
4 |
+
"""
|
5 |
+
|
6 |
+
import sys
|
7 |
+
|
8 |
+
def test_imports():
|
9 |
+
"""Проверяет что все основные зависимости импортируются без ошибок"""
|
10 |
+
print("🧪 Тестирование импорта зависимостей...")
|
11 |
+
|
12 |
+
errors = []
|
13 |
+
|
14 |
+
# Тестируем основные зависимости
|
15 |
+
test_packages = [
|
16 |
+
("gradio", "Gradio framework"),
|
17 |
+
("bandit", "Bandit security scanner"),
|
18 |
+
("detect_secrets", "Detect Secrets scanner"),
|
19 |
+
("semgrep", "Semgrep scanner"),
|
20 |
+
("smolagents", "SmolaAgents MCP framework"),
|
21 |
+
("agno", "Agno AI agent framework"),
|
22 |
+
("rich", "Rich text formatting"),
|
23 |
+
("fastapi", "FastAPI framework"),
|
24 |
+
("uvicorn", "Uvicorn ASGI server"),
|
25 |
+
("pandas", "Pandas data analysis"),
|
26 |
+
("numpy", "Numpy arrays"),
|
27 |
+
("pydantic", "Pydantic data validation"),
|
28 |
+
("aiohttp", "Async HTTP client"),
|
29 |
+
("requests", "HTTP requests library"),
|
30 |
+
("click", "Click CLI framework"),
|
31 |
+
("yaml", "PyYAML parser"),
|
32 |
+
("toml", "TOML parser"),
|
33 |
+
("dotenv", "Python dotenv")
|
34 |
+
]
|
35 |
+
|
36 |
+
success_count = 0
|
37 |
+
|
38 |
+
for package, description in test_packages:
|
39 |
+
try:
|
40 |
+
if package == "yaml":
|
41 |
+
import yaml
|
42 |
+
elif package == "dotenv":
|
43 |
+
from dotenv import load_dotenv
|
44 |
+
else:
|
45 |
+
__import__(package)
|
46 |
+
print(f"✅ {package}: {description}")
|
47 |
+
success_count += 1
|
48 |
+
except ImportError as e:
|
49 |
+
error_msg = f"❌ {package}: {description} - {str(e)}"
|
50 |
+
print(error_msg)
|
51 |
+
errors.append(error_msg)
|
52 |
+
except Exception as e:
|
53 |
+
error_msg = f"⚠️ {package}: {description} - Unexpected error: {str(e)}"
|
54 |
+
print(error_msg)
|
55 |
+
errors.append(error_msg)
|
56 |
+
|
57 |
+
print(f"\n📊 Результаты тестирования:")
|
58 |
+
print(f"✅ Успешно импортировано: {success_count}/{len(test_packages)}")
|
59 |
+
print(f"❌ Ошибок импорта: {len(errors)}")
|
60 |
+
|
61 |
+
if errors:
|
62 |
+
print(f"\n❌ Ошибки:")
|
63 |
+
for error in errors:
|
64 |
+
print(f" {error}")
|
65 |
+
return False
|
66 |
+
else:
|
67 |
+
print(f"\n🎉 Все зависимости импортируются корректно!")
|
68 |
+
return True
|
69 |
+
|
70 |
+
def test_rich_version():
|
71 |
+
"""Проверяет версию rich и совместимость с semgrep и smolagents"""
|
72 |
+
print("\n🔍 Проверка версии Rich...")
|
73 |
+
|
74 |
+
try:
|
75 |
+
import rich
|
76 |
+
|
77 |
+
# Пробуем получить версию через importlib.metadata (более надежный способ)
|
78 |
+
try:
|
79 |
+
from importlib.metadata import version
|
80 |
+
rich_version_str = version('rich')
|
81 |
+
except ImportError:
|
82 |
+
# Fallback для старых версий Python
|
83 |
+
import pkg_resources
|
84 |
+
rich_version_str = pkg_resources.get_distribution('rich').version
|
85 |
+
|
86 |
+
print(f"✅ Rich версия: {rich_version_str}")
|
87 |
+
|
88 |
+
# Проверяем что rich >= 13.9.4 (требование smolagents)
|
89 |
+
from packaging import version as pkg_version
|
90 |
+
rich_version = pkg_version.parse(rich_version_str)
|
91 |
+
min_required = pkg_version.parse("13.9.4")
|
92 |
+
|
93 |
+
if rich_version >= min_required:
|
94 |
+
print(f"✅ Rich версия {rich_version_str} соответствует требованиям smolagents (>=13.9.4)")
|
95 |
+
else:
|
96 |
+
print(f"⚠️ Rich версия {rich_version_str} может быть несовместима с smolagents (требуется >=13.9.4)")
|
97 |
+
return False
|
98 |
+
|
99 |
+
# Пробуем импортировать функции, которые используют semgrep и smolagents
|
100 |
+
from rich.console import Console
|
101 |
+
from rich.table import Table
|
102 |
+
print("✅ Rich Console и Table импортируются корректно")
|
103 |
+
|
104 |
+
return True
|
105 |
+
|
106 |
+
except Exception as e:
|
107 |
+
print(f"❌ Ошибка при проверке Rich: {str(e)}")
|
108 |
+
return False
|
109 |
+
|
110 |
+
def main():
|
111 |
+
"""Основная функция тестирования"""
|
112 |
+
print("🔒 Тест совместимости зависимостей VulnBuster")
|
113 |
+
print("=" * 60)
|
114 |
+
|
115 |
+
# Тестируем импорты
|
116 |
+
imports_ok = test_imports()
|
117 |
+
|
118 |
+
# Тестируем версию Rich
|
119 |
+
rich_ok = test_rich_version()
|
120 |
+
|
121 |
+
print("\n" + "=" * 60)
|
122 |
+
if imports_ok and rich_ok:
|
123 |
+
print("🎉 Все тесты пройдены успешно!")
|
124 |
+
print("💡 Теперь можно запустить: docker build -t vulnbuster .")
|
125 |
+
sys.exit(0)
|
126 |
+
else:
|
127 |
+
print("❌ Некоторые тесты не пройдены")
|
128 |
+
print("💡 Проверьте requirements.txt и Dockerfile")
|
129 |
+
sys.exit(1)
|
130 |
+
|
131 |
+
if __name__ == "__main__":
|
132 |
+
main()
|