All Projects → enlightn → Enlightn

enlightn / Enlightn

Licence: other
Your performance & security consultant, an artisan command away.

Projects that are alternatives of or similar to Enlightn

awesome-malware-analysis
Defund the Police.
Stars: ✭ 9,181 (+2328.84%)
Mutual labels:  static-analysis, dynamic-analysis
r2frida-book
The radare2 + frida book for Mobile Application assessment
Stars: ✭ 38 (-89.95%)
Mutual labels:  static-analysis, dynamic-analysis
jitana
A graph-based static-dynamic hybrid DEX code analysis tool
Stars: ✭ 35 (-90.74%)
Mutual labels:  static-analysis, dynamic-analysis
Laravel Activitylog
Log activity inside your Laravel app
Stars: ✭ 4,123 (+990.74%)
Mutual labels:  laravel, audit
Android-Malware-Detection
Android malware detection using static and dynamic analysis
Stars: ✭ 18 (-95.24%)
Mutual labels:  static-analysis, dynamic-analysis
SDA
SDA is a rich cross-platform tool for reverse engineering that focused firstly on analysis of computer games. I'm trying to create a mix of the Ghidra, Cheat Engine and x64dbg. My tool will combine static and dynamic analysis of programs. Now SDA is being developed.
Stars: ✭ 98 (-74.07%)
Mutual labels:  static-analysis, dynamic-analysis
tiro
TIRO - A hybrid iterative deobfuscation framework for Android applications
Stars: ✭ 20 (-94.71%)
Mutual labels:  static-analysis, dynamic-analysis
R2frida Wiki
This repo aims at providing practical examples on how to use r2frida
Stars: ✭ 168 (-55.56%)
Mutual labels:  static-analysis, dynamic-analysis
ethereum-dasm
An ethereum evm bytecode disassembler and static/dynamic analysis tool
Stars: ✭ 121 (-67.99%)
Mutual labels:  static-analysis, dynamic-analysis
opem
OPEM (Open Source PEM Fuel Cell Simulation Tool)
Stars: ✭ 107 (-71.69%)
Mutual labels:  static-analysis, dynamic-analysis
Mobileapp Pentest Cheatsheet
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
Stars: ✭ 3,051 (+707.14%)
Mutual labels:  static-analysis, dynamic-analysis
Laravel Varnish
Making Varnish and Laravel play nice together
Stars: ✭ 291 (-23.02%)
Mutual labels:  laravel, performance
Larastan
⚗️ Adds code analysis to Laravel improving developer productivity and code quality.
Stars: ✭ 3,554 (+840.21%)
Mutual labels:  static-analysis, laravel
aparoid
Static and dynamic Android application security analysis
Stars: ✭ 62 (-83.6%)
Mutual labels:  static-analysis, dynamic-analysis
Vulny Code Static Analysis
Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex
Stars: ✭ 207 (-45.24%)
Mutual labels:  static-analysis, audit
intercept
INTERCEPT / Policy as Code Static Analysis Auditing / SAST
Stars: ✭ 54 (-85.71%)
Mutual labels:  static-analysis, audit
Mutant
Automated code reviews via mutation testing - semantic code coverage.
Stars: ✭ 1,794 (+374.6%)
Mutual labels:  static-analysis, dynamic-analysis
Psalm Plugin Laravel
A Psalm plugin for Laravel
Stars: ✭ 139 (-63.23%)
Mutual labels:  static-analysis, laravel
maloss
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages
Stars: ✭ 46 (-87.83%)
Mutual labels:  static-analysis, dynamic-analysis
Wallace Cli
Pretty CSS analytics on the CLI
Stars: ✭ 281 (-25.66%)
Mutual labels:  audit, performance

Enlightn

tests LGPLv3 Licensed Latest Stable Version Total Downloads

A Laravel Tool To Boost Your App's Performance & Security

Enlightn

Introduction

Think of Enlightn as your performance and security consultant. Enlightn will "review" your code and server configurations, and give you actionable recommendations on improving performance, security and reliability!

The Enlightn OSS (open source software) version has 62 automated checks that scan your application code, web server configurations and routes to identify performance bottlenecks, possible security vulnerabilities and code reliability issues.

Enlightn Pro (commercial) is available for purchase on the Enlightn website and has an additional 63 automated checks (total of 125 checks).

Performance Checks (35 Automated Checks including 18 Enlightn Pro Checks)

  • 🚀 Performance Quick Wins (In-Built In Laravel): Route caching, config caching, etc.
  • ⏳ Performance Bottleneck Identification: Middleware bloat, identification of slow, duplicate and N+1 queries, etc.
  • 🍽️ Serving Assets: Minification, cache headers, CDN and compression headers.
  • 🎛️ Infrastructure Tuning: Opcache, cache hit ratio, unix sockets for single server setups, etc.
  • 🛸 Choosing The Right Driver: Choosing the right session, queue and cache drivers for your app.
  • 🏆 Good Practices: Separate Redis databases for locks, dont install dev dependencies in production, etc.

Security Checks (48 Automated Checks including 28 Enlightn Pro Checks)

  • 🔒 Basic Security: Turn off app debug in production, app key, CSRF protection, login throttling, etc.
  • 🍪 Cookie Security and Session Management: Cookie encryption, secure cookie attributes, session timeouts, etc.
  • 🃏 Mass Assignment: Detection of mass assignment vulnerabilities, unguarded models, etc.
  • ☢️ SQL Injection Attacks: Detection of raw SQL injection, column name SQL injection, validation rule injection, etc.
  • 📜 Security Headers: XSS, HSTS, clickjacking and MIME protection headers.
  • 📁 Unrestricted File Uploads and DOS Attacks: Detection of directory traversal, storage DOS, unrestricted file uploads, etc.
  • 💉 Injection and Phishing Attacks: Detection of command injection, host injection, object injection, open redirection, etc.
  • 📦 Dependency Management: Backend and frontend vulnerability scanning, stable and up-to-date dependency checks, licensing, etc.

Reliability Checks (42 Automated Checks including 17 Enlightn Pro Checks)

  • 🧐 Code Reliability and Bug Detection: Invalid function calls, method calls, offsets, imports, return statements, syntax errors, etc.
  • 💪 Health Checks: Health checks for cache, DB, directory permissions, migrations, disk space, symlinks, Redis, etc.
  • ⚙️ Detecting Misconfigurations: Cache prefix, queue timeouts, failed job timeouts, Horizon provisioning plans, eviction policy, etc.
  • 👻 Dead Routes and Dead Code: Detection of dead routes and dead/unreachable code.
  • 🏅 Good Practices: Cache busting, Composer scripts, env variables, avoiding globals and superglobals, etc.

Documentation

Each of the 125 checks available are well documented. You can find the complete 134 page documentation here.

Installing Enlightn OSS

You may install Enlightn into your project using the Composer package manager:

composer require enlightn/enlightn

After installing Enlightn, you may publish its assets using the vendor:publish Artisan command:

php artisan vendor:publish --tag=enlightn

Note: If you need to install Enlightn Pro, visit the documentation on the Enlightn website here.

Running Enlightn

After installing Enlightn, simply run the enlightn Artisan command to run Enlightn:

php artisan enlightn

If you wish to run specific analyzer classes, you may specify them as optional arguments:

php artisan enlightn Enlightn\\Enlightn\\Analyzers\\Security\\CSRFAnalyzer Enlightn\\EnlightnPro\\Analyzers\\Security\\DirectoryTraversalAnalyzer

Note that the class names should be fully qualified and escaped with double slashes as above.

Recommended to Run In Production

If you want to get the full Enlightn experience, it is recommended that you at least run Enlightn once in production. This is because several of Enlightn's checks are environment specific. So they may only be triggered when your app environment is production.

In case you don't want to run on production, you can simulate a production environment by setting your APP_ENV to production, setting up services and config as close to production as possible and running your production deployment script locally. Then run the Enlightn Artisan command.

View Detailed Error Messages

By default, the enlightn Artisan command highlights the file paths, associated line numbers and a message for each failed check. If you wish to display detailed error messages for each line, you may use the --details option:

php artisan enlightn --details

Usage in CI Environments

If you wish to integrate Enlightn with your CI, you can simply trigger the --ci option when running Enlightn in your CI/CD tool:

php artisan enlightn --ci

Enlightn pre-configures which analyzers can be run in CI mode for you. So, the above command excludes analyzers that need a full setup to run (e.g. analyzers using dynamic analysis).

For more information on CI integration, refer the Enlightn documentation.

Establishing a Baseline

Sometimes, especially in CI environments, you may want to declare the currently reported list of errors as the "baseline". This means that the current errors will not be reported in subsequent runs and only new errors will be flagged.

To generate the baseline automatically, you may run the enlightn:baseline Artisan command:

php artisan enlightn:baseline

If you wish to run this command in CI mode, you can use the --ci option:

php artisan enlightn:baseline --ci

For more information on establishing a baseline, refer the docs.

Github Bot Integration

Enlightn offers a Github bot that can prepare a report highlighting failed checks and also add review comments for pull requests on the lines of code that introduce new issues.

Enlightn Github Bot Review Comments

To integrate with the Enlightn Github bot, refer the docs.

Failed Checks

All checks that fail will include a description of why they failed along with the associated lines of code (if applicable) and a link to the documentation for the specific check.

Enlightn Failed Check

Report Card

Finally, after all the checks have run, the enlightn Artisan command will output a report card, which contains information on how many and what percentage of checks passed, failed or were skipped.

Enlightn Report Card

The checks indicated as "Not Applicable" were not applicable to your specific application and were skipped. For instance, the CSRF analyzer is not applicable for stateless applications.

The checks reported under the "Error" row indicate the analyzers that failed with exceptions during the analysis. Normally, this should not happen but if it does, the associated error message will be displayed and may have something to do with your application.

How Frequently Should I Run Enlightn?

A good practice would be to run Enlightn every time you are deploying code or pushing a new release. It is recommended to integrate Enlightn with your CI/CD tool so that it is triggered for every push or new release.

Besides the automated CI checks, you might also want to run Enlightn on a regular frequency such as every week. This will allow you to monitor the dynamic analysis checks, which are typically excluded from CI tests.

Featured On

Laravel News     OWASP     NIST

Flagship OSS Projects Using Enlightn

Laravel.io     Akaunting

OS Compatibility

Only MacOS and Linux systems are supported for Enlightn. Windows is currently not supported.

Contribution Guide

Thank you for considering contributing to Enlightn! The contribution guide can be found here.

Support Policy

Our support policy can be found in the Enlightn documentation.

License

The Enlightn OSS (on this Github repo) is licensed under the LGPL v3 (or later) license.

Enlightn Pro is licensed under a commercial license.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].