Metadata-Version: 2.4
Name: permi
Version: 0.2.19
Summary: The security signal filter for African fintech engineering teams — precision-first AppSec that removes false positives so developers only see findings that matter
Author-email: Nasarah Peter Dashe <dashenasarahpeter@gmail.com>
License-Expression: LicenseRef-PERMI-COMMUNITY-LICENSE
Project-URL: Homepage, https://github.com/Peternasarah/permi
Project-URL: Repository, https://github.com/Peternasarah/permi
Project-URL: Bug Tracker, https://github.com/Peternasarah/permi/issues
Project-URL: Changelog, https://github.com/Peternasarah/permi/releases
Project-URL: GitHub Action, https://github.com/marketplace/actions/permi-security-scanner
Keywords: security,vulnerability-scanner,static-analysis,SAST,AI,nigeria,africa,fintech,cybersecurity,developer-tools,CLI,SQL-injection,XSS,secrets-detection,USSD,NDPA,NDPR,false-positive-reduction,appsec,devsecops
Classifier: Development Status :: 3 - Alpha
Classifier: Intended Audience :: Developers
Classifier: Intended Audience :: Information Technology
Classifier: Topic :: Security
Classifier: Topic :: Software Development :: Quality Assurance
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.9
Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: 3.11
Classifier: Programming Language :: Python :: 3.12
Classifier: Operating System :: OS Independent
Classifier: Environment :: Console
Requires-Python: >=3.9
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: python-dotenv
Requires-Dist: colorama
Requires-Dist: click
Requires-Dist: requests
Requires-Dist: httpx
Requires-Dist: beautifulsoup4
Provides-Extra: js
Requires-Dist: playwright; extra == "js"
Requires-Dist: playwright-stealth; extra == "js"
Dynamic: license-file

<p align="center">
  <img src="logo.png" alt="Permi" width="600"/>
</p>

# Permi

**The security signal filter for African fintech engineering teams**

[![PyPI version](https://badge.fury.io/py/permi.svg)](https://badge.fury.io/py/permi)
[![Downloads](https://pepy.tech/badge/permi)](https://pepy.tech/project/permi)
[![CI](https://github.com/Peternasarah/permi/actions/workflows/ci.yml/badge.svg)](https://github.com/Peternasarah/permi/actions/workflows/ci.yml)
[![License: PERMI COMMUNITY LICENSE](https://img.shields.io/badge/License-PCL-green.svg)](LICENSE)
[![Built in Nigeria](https://img.shields.io/badge/Built%20in-Nigeria%20🇳🇬-008751)](https://github.com/Peternasarah/permi)

---

## What is Permi?

Most security scanners produce hundreds of findings. Most are noise. Developers learn to ignore them — and that is when the real vulnerabilities get missed.

Permi fixes this. It scans your code and live applications for vulnerabilities, then uses an AI filter to confirm which findings are real before you see them. Your team spends time fixing actual problems instead of chasing false alarms.

Permi also includes rules built specifically for the African development context — USSD gateway vulnerabilities, Paystack and Flutterwave credential exposure, and patterns relevant to Nigeria Data Protection Act compliance. No foreign scanner prioritises this. Permi does.

Built from Jos, Nigeria. For African fintech engineering teams. Then for the world.

---

## Quick Start

```bash
pip install permi
permi setup --community    # 50 free AI filter credits — no card needed
permi scan --path ./myapp
```

---

## ⚠️ Windows Users — If Permi Freezes on First Run

Some Windows machines freeze immediately when running `permi` — even before the banner appears. This is caused by **Windows Defender or corporate antivirus** scanning Python processes in real time.

**Fix — add Permi to your antivirus exclusions:**

1. Open **Windows Security** → **Virus & threat protection** → **Manage settings**
2. Scroll to **Exclusions** → **Add an exclusion** → **Folder**
3. Add these two folders:
   - `C:\Users\<yourname>\.permi`
   - `C:\Users\<yourname>\Permi\venv` (or wherever your venv lives)
4. Open a new terminal and run `permi` again

If you are on a **corporate machine or university network**, your IT department may have group policies that block Python subprocess calls. Run Permi from Windows Subsystem for Linux (WSL) instead:

```bash
wsl
pip install permi
permi scan --path ./myapp
```

---

## Installation

```bash
pip install permi
```

Requires Python 3.9+. Works on Windows, macOS, and Linux.

### For JavaScript/SPA scanning (React, Vue, Angular, Next.js)

```bash
pip install "permi[js]"
playwright install chromium
```

> **Cloudflare-protected sites:** Also run `pip install playwright-stealth` for better rendering success rates.

> **Low-RAM machines (4GB):** Use `--max-pages 10` with `--js`.

---

## Usage

### Scan a live website (standard HTTP)

```bash
permi scan --url https://yoursite.com
```

### Scan a JavaScript-rendered application (React / Vue / Angular / Next.js)

```bash
permi scan --url https://yoursite.com --js
```

The `--js` flag launches a headless Chromium browser that fully renders JavaScript before scanning. Required for single-page applications where links and forms are built dynamically.

Without `--js`, Permi will detect a SPA and show:

```
[Permi] ⚠️  JavaScript-rendered application detected.
[Permi]    Re-run with --js to scan the full JavaScript-rendered content:
[Permi]      permi scan --url https://yoursite.com --js
```

### Scan a local codebase

```bash
permi scan --path ./myapp
```

### Scan a GitHub repository

```bash
permi scan --path https://github.com/username/repo
```

### Include subdomains

```bash
permi scan --url https://yoursite.com --include-subdomains
```

### High severity findings only

```bash
permi scan --url https://yoursite.com --severity high
```

### Export results to a file

```bash
permi scan --url https://yoursite.com --export report.md
permi scan --path ./myapp --export results.json
permi scan --path ./myapp --export results.txt
```

### Show all raw findings (skip AI filter)

```bash
permi scan --url https://yoursite.com --offline
```

### JSON output (for CI/CD pipelines)

```bash
permi scan --url https://yoursite.com --output json
```

---

## Setting Up AI Filtering

The AI filter is what separates confirmed vulnerabilities from noise. Without it, Permi shows all raw findings. With it, each finding is reviewed before you see it.

### Option 1 — Free community credits (recommended for new users)

```bash
permi setup --community
```

50 free AI filter calls. No credit card. Starts immediately.
The community proxy may take up to 60 seconds to wake on first use — it retries automatically.

### Option 2 — Your own OpenRouter API key (unlimited)

```bash
permi setup --api-key YOUR_KEY
```

Get a free key at [openrouter.ai](https://openrouter.ai).

---

## GitHub Action — Scan Every Pull Request

Add Permi to your CI/CD pipeline. Every pull request is automatically scanned, findings are posted as PR comments, and merges are blocked if high severity issues are found.

```yaml
# .github/workflows/security.yml
name: Security Scan

on:
  push:
    branches: [main, develop]
  pull_request:
    branches: [main, develop]

jobs:
  permi-scan:
    runs-on: ubuntu-latest
    permissions:
      contents: read
      pull-requests: write

    steps:
      - uses: actions/checkout@v4

      - uses: Peternasarah/permi-action@v1
        with:
          severity: high
          openrouter_api_key: ${{ secrets.OPENROUTER_API_KEY }}
```

**What happens on every PR:**
- Permi scans the changed code
- AI filter removes false positives
- Findings posted as a PR comment
- Merge blocked if high severity issues found
- Free forever

**[→ View Permi GitHub Action on the Marketplace](https://github.com/marketplace/actions/permi-security-scanner)**

---

## How It Works

```
┌─────────────┐    ┌──────────────┐    ┌──────────────┐    ┌──────────────┐
│   Crawler   │───▶│    Scanner   │───▶│  AI Filter   │───▶│   Results    │
│ HTTP or JS  │    │ SQL · XSS    │    │ Confirms or  │    │ Only real    │
│  (--js)     │    │ Secrets · +  │    │ dismisses    │    │ findings     │
└─────────────┘    └──────────────┘    │ each finding │    └──────────────┘
                                       └──────────────┘
```

**Two crawler modes:**
- **HTTP mode** (default) — fast BeautifulSoup crawler for server-rendered sites
- **JS mode** (`--js`) — Playwright headless Chromium for React/Vue/Angular SPAs

**AI filter:**
- Reviews each finding individually before it reaches you
- CSP-aware: correctly dismisses reflected XSS when a Content-Security-Policy blocks execution
- Caches results so repeated scans do not consume extra credits
- Three-tier verdict: REAL / REVIEW / FP with confidence score 0-100
- Community proxy for users without their own API key

---

## What Permi Detects

### Web scanning (`--url`)

| Category | What is detected |
|----------|-----------------|
| SQL Injection | Error-based, Boolean-based blind, Time-based blind |
| Cross-Site Scripting | Reflected XSS — HTML-encoding aware, CSP-aware |
| Missing Security Headers | CSP, HSTS, X-Frame-Options, Permissions-Policy |
| Server Version Disclosure | Server and X-Powered-By version number leakage |

### Source code scanning (`--path`)

| Category | What is detected |
|----------|-----------------|
| SQL Injection | String concatenation, f-strings, % formatting in queries |
| Cross-Site Scripting | innerHTML, document.write, Jinja2 \|safe filter |
| Hardcoded Secrets | Passwords, API keys, AWS keys, Paystack/Flutterwave secrets |
| Insecure Practices | eval(), exec(), pickle.loads(), SSL verification disabled, debug mode |
| USSD Vulnerabilities | Unvalidated sessionId, phoneNumber, serviceCode |

---

## Nigerian and African-Specific Rules

Permi includes rules built for the African development context that no global tool will ever prioritise:

- **USSD gateway vulnerabilities** — unvalidated sessionId, phoneNumber, serviceCode
- **Paystack and Flutterwave key exposure** — detects Nigerian payment gateway live secrets
- **BVN and NIN pattern detection** — NDPA-sensitive personal data in code
- **NDPA-relevant patterns** — helps with Nigeria Data Protection Act compliance

---

## Example Output

```
[Permi] Mode     : JS scan (Playwright headless browser)
[Permi] Target   : https://yourapp.com
[Permi] Crawl    : up to 15 pages (JS-rendered)

[Permi JS] Rendering page 1/15: https://yourapp.com
[Permi JS] Rendering page 2/15: https://yourapp.com/login
[Permi JS] Crawl complete — 8 pages rendered, 24 URLs found, 12 unique signatures

[Permi] Engine found 7 raw finding(s)
[Permi] Running AI filter on 7 finding(s)...

════════════════════════════════════════════════════════════════════════
  FILTER SUMMARY
════════════════════════════════════════════════════════════════════════
  Raw findings     : 7
  Confirmed real   : 4
  False positives  : 3 removed
  Noise reduced by : 43%  [████████░░░░░░░░░░░░]
  Avg confidence   : 89%

  Severity breakdown:
    ● High   : 2
    ● Medium : 2

  Top issues to fix:
    • 2× SQL Injection — string concatenation
    • 1× Hardcoded secret — generic password
    • 1× Insecure — SSL/TLS verification disabled
════════════════════════════════════════════════════════════════════════

  [1] [HIGH] WEB_SQL001  SQL Injection — Error-based
  URL       : https://yourapp.com/login
  Parameter : username
  Fix       : Use parameterised queries: cursor.execute("SELECT * FROM users WHERE name = ?", (name,))
  AI        : REAL [94% confidence]  SQL syntax error confirms input reaches query unescaped.

  Scan completed in 2 min 14s | 12 URLs tested
```

---

## CLI Reference

```
permi scan --url URL             Scan a live website
  --js                           Use Playwright for JS-rendered SPAs
  --js-timeout N                 Per-page timeout in seconds (default: 20)
  --include-subdomains           Also scan subdomains
  --max-pages N                  Max pages to crawl (default: 30)
  --severity LEVEL               high | medium | low | all (default: all)
  --offline                      Skip AI filter, show raw findings
  --output FORMAT                human (default) | json
  --export FILE                  Export full report (.txt, .json, .md)

permi scan --path PATH           Scan local codebase or GitHub repo
  --severity LEVEL               Filter by severity
  --offline                      Skip AI filter
  --output FORMAT                human | json
  --export FILE                  Export full report

permi setup --community          Register for 50 free AI filter credits
permi setup --api-key KEY        Use your own OpenRouter API key (unlimited)
permi info                       Show config, credits, Playwright status
permi feedback                   Share feedback with the Permi team
```

---

## CI/CD Integration

Permi exits with code `1` if any HIGH severity findings are confirmed after filtering. Use this in any pipeline:

```yaml
# GitHub Actions — inline (without the Marketplace Action)
- name: Run Permi security scan
  run: |
    pip install permi
    permi setup --api-key ${{ secrets.OPENROUTER_API_KEY }}
    permi scan --path . --severity high --output json --export permi-report.json
```

```bash
# Fail the build on high severity findings
permi scan --path ./myapp --severity high || exit 1
```

---

## Changelog

### v0.2.17 — Precision improvements
- **FIX:** Windows Defender freeze — DB path now resolves lazily, not at import time
- **FIX:** XSS false positives — proper HTML entity encoding check before flagging
- **FIX:** Boolean SQLi false positives — both responses must exceed 2000 bytes
- **FIX:** Time-based SQLi — requires minimum 8s hard threshold, not just baseline + 4s
- **FIX:** Tracking parameters (utm_*, ref_*, locale) now fully skipped in all scanners
- **NEW:** Progress indicator during web scan — scan never looks frozen
- **NEW:** `pip install "permi[js]"` installs Playwright dependencies automatically
- **NEW:** `permi info` shows playwright-stealth installation status

### v0.2.13 — JS/SPA Support + GitHub Action
- **NEW:** `--js` flag for JavaScript-rendered applications (React, Vue, Angular, Next.js)
- **NEW:** Playwright headless browser integration with stealth mode
- **NEW:** Network interception — discovers XHR/fetch API endpoints automatically
- **NEW:** SPA detection warning with exact re-run command shown to user
- **NEW:** [Permi GitHub Action](https://github.com/marketplace/actions/permi-security-scanner)
- **NEW:** Windows antivirus freeze detection and guidance
- **NEW:** Scan timer — total duration shown at end of every scan

### v0.2.2 — AI Filter + Community Proxy
- Precision filter with three-tier verdict: REAL / REVIEW / FP with 0–100 confidence score
- Community proxy — 50 free credits with `permi setup --community`
- OpenRouter API key support
- Inline fix templates — exact remediation per finding
- `--export` flag — save full reports as .txt, .json, or .md
- `--include-subdomains` flag
- Feedback system — `permi feedback`

### v0.1 — Foundation
- CLI scanner (web + static analysis)
- PyPI distribution (`pip install permi`)
- 17 detection rules across SQL, XSS, secrets, USSD, insecure practices
- SQLite database at `~/.permi/permi.db`

---

## Contributing

Pull requests welcome. Please open an issue first to discuss significant changes.

If you find a vulnerability in a real application using Permi, please report it responsibly to the affected organisation before disclosing publicly. See [CONTRIBUTING.md](CONTRIBUTING.md) for the full guide, including how to write new vulnerability rules.

---

## Author

**Nasarah Peter Dashe**
Founder · Cybersecurity Student @ University of Jos, Nigeria
[github.com/Peternasarah/permi](https://github.com/Peternasarah/permi) · [@peternasarah](https://twitter.com/peternasarah)

---

## Links

- **Website:** [peternasarah.github.io/permi](https://peternasarah.github.io/permi)
- **PyPI:** [pypi.org/project/permi](https://pypi.org/project/permi)
- **GitHub Action:** [github.com/marketplace/actions/permi-security-scanner](https://github.com/marketplace/actions/permi-security-scanner)
- **Issues:** [github.com/Peternasarah/permi/issues](https://github.com/Peternasarah/permi/issues)
- **Security:** [SECURITY.md](SECURITY.md)
- **License:** [LICENSE](LICENSE)

---

## License

PERMI COMMUNITY LICENSE — see [LICENSE](LICENSE) for details.

---

<p align="center">
  <img src="logo.png" alt="Permi" width="400"/>
  <br/>
  <em>Built in Nigeria. For Nigeria. Then for the World.</em>
</p>
