npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, πŸ‘‹, I’m Ryan HefnerΒ  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you πŸ™

Β© 2025 – Pkg Stats / Ryan Hefner

cyber-walker

v2.1.0

Published

πŸ›‘οΈ AI-Powered Cybersecurity Vulnerability Scanner - Professional CLI tool for security analysis with awesome animations and developer experience

Readme

πŸ›‘οΈ Cyber-Walker

AI-Powered Cybersecurity Vulnerability Scanner

A professional-grade CLI tool that combines static code analysis with AI-powered security insights to detect vulnerabilities in your codebase.

License: MIT Node Version


✨ Features

  • πŸ” Smart Scanning: Advanced pattern matching based on OWASP Top 10 vulnerabilities
  • πŸ€– AI Assistant: Interactive chat powered by Google's Gemini AI
  • πŸ“Š Rich Reports: Export findings in JSON or Markdown format
  • ⚑ Fast & Efficient: Asynchronous scanning with progress tracking
  • 🎨 Beautiful CLI: Professional terminal UI with color-coded severity levels
  • βš™οΈ Configurable: Persistent configuration with sensible defaults
  • 🎯 Targeted Scans: Filter vulnerabilities by keyword or category
  • πŸ“ˆ Detailed Analysis: Line-by-line code analysis with context

πŸš€ Quick Start

Installation

npm install -g cyber-walker

Or run locally:

npm install
npm link

Setup

  1. Get your Gemini API key from Google AI Studio

  2. Initialize Cyber-Walker:

cyber-walker init
  1. Configure your API key:
cyber-walker config set apiKey YOUR_API_KEY

First Scan

Scan your current project:

cyber-walker scan

πŸ“š Usage

Commands

scan - Scan for Vulnerabilities

Scan your project for security issues:

# Scan current directory
cyber-walker scan

# Scan specific path
cyber-walker scan ./src

# Filter by keyword
cyber-walker scan --keyword password

# Export results
cyber-walker scan --output report.json
cyber-walker scan --output report.md

# JSON output for CI/CD
cyber-walker scan --format json

Options:

  • -k, --keyword <keyword> - Filter vulnerabilities by keyword
  • -o, --output <file> - Export report (.json or .md)
  • -f, --format <format> - Output format: table or json (default: table)

chat - AI Security Assistant

Start an interactive AI-powered security assistant:

cyber-walker chat

Commands in chat mode:

  • scan [keyword] - Run a vulnerability scan
  • analyze - Get AI analysis of last scan results
  • help - Show help message
  • clear - Clear conversation history
  • exit - Exit the assistant

Example conversation:

cyber-walker> scan password
[Scanning project...]

cyber-walker> analyze
[AI provides detailed security analysis...]

cyber-walker> How do I fix SQL injection vulnerabilities?
[AI provides remediation guidance...]

config - Manage Configuration

# Show all configuration
cyber-walker config show

# Get specific value
cyber-walker config get apiKey

# Set configuration value
cyber-walker config set model gemini-2.0-flash-exp
cyber-walker config set temperature 0.5

# Reset to defaults
cyber-walker config reset

# Show config file path
cyber-walker config path

Configuration Options:

  • apiKey - Your Gemini API key
  • model - AI model to use (default: gemini-2.0-flash-exp)
  • temperature - AI creativity (0.0-1.0, default: 0.7)
  • maxTokens - Max response length (default: 8192)
  • scanPatterns - File patterns to scan
  • ignorePatterns - Patterns to ignore
  • outputFormat - Default output format
  • verbose - Enable verbose logging

rules - List Security Rules

View available security rules:

# List all rules
cyber-walker rules

# Filter by severity
cyber-walker rules --severity critical
cyber-walker rules --severity high

# Filter by category
cyber-walker rules --category injection

info - System Information

Display system information and configuration status:

cyber-walker info

πŸ”’ Security Rules

Cyber-Walker detects vulnerabilities based on OWASP Top 10 2021:

A01:2021 - Broken Access Control

  • Hardcoded credentials
  • Hardcoded API keys
  • Weak RBAC implementation

A02:2021 - Cryptographic Failures

  • Weak hashing algorithms (MD5, SHA1)
  • Weak encryption (DES, RC4)
  • Insecure random number generation

A03:2021 - Injection

  • SQL injection
  • Command injection
  • XSS vulnerabilities
  • eval() usage
  • Unsafe innerHTML

A05:2021 - Security Misconfiguration

  • Debug mode enabled
  • CORS wildcard origins
  • Disabled TLS validation

A07:2021 - Authentication Failures

  • Weak bcrypt rounds
  • Long session timeouts

A08:2021 - Integrity Failures

  • Missing SRI for external scripts

A09:2021 - Logging Failures

  • Sensitive data in logs
  • Empty catch blocks

A10:2021 - SSRF

  • Unvalidated user-supplied URLs

πŸ“– Examples

CI/CD Integration

# GitHub Actions
name: Security Scan
on: [push]
jobs:
  security:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v2
      - name: Install Cyber-Walker
        run: npm install -g cyber-walker
      - name: Run Security Scan
        env:
          GEMINI_API_KEY: ${{ secrets.GEMINI_API_KEY }}
        run: cyber-walker scan --format json --output security-report.json
      - name: Upload Report
        uses: actions/upload-artifact@v2
        with:
          name: security-report
          path: security-report.json

Programmatic Usage

import SecurityScanner from 'cyber-walker/src/lib/scanner.js';

const scanner = new SecurityScanner({
  keyword: 'password',
  verbose: true
});

const results = await scanner.scan('./src');
const stats = scanner.getStats();

console.log(`Found ${stats.vulnerabilitiesFound} vulnerabilities`);

// Export reports
await scanner.exportJSON('./report.json');
await scanner.exportMarkdown('./report.md');

Pre-commit Hook

#!/bin/bash
# .git/hooks/pre-commit

echo "Running security scan..."
cyber-walker scan --format json > /dev/null

if [ $? -ne 0 ]; then
  echo "❌ Security scan found critical/high vulnerabilities"
  echo "Run 'cyber-walker scan' to see details"
  exit 1
fi

echo "βœ… Security scan passed"

🎨 Output Examples

Table Format

File: src/auth/login.js
β”Œβ”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ Line β”‚ Severity   β”‚ ID                   β”‚ Description                β”‚
β”œβ”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ 42   β”‚ CRITICAL   β”‚ A01:2021-001         β”‚ Hardcoded password detectedβ”‚
β”‚ 67   β”‚ HIGH       β”‚ A03:2021-001         β”‚ Potential SQL injection    β”‚
β””β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

════════════════════════════════════════════════════════
β–Ά Scan Summary
────────────────────────────────────────────────────────
  Files Scanned             25
  Total Vulnerabilities     12

  Critical                  2
  High                      5
  Medium                    3
  Low                       2
════════════════════════════════════════════════════════

πŸ› οΈ Development

Project Structure

cyber-walker/
β”œβ”€β”€ bin/
β”‚   └── cyber-walker.js       # CLI entry point
β”œβ”€β”€ src/
β”‚   β”œβ”€β”€ commands/             # Command implementations
β”‚   β”‚   β”œβ”€β”€ chat.js
β”‚   β”‚   β”œβ”€β”€ config.js
β”‚   β”‚   └── scan-new.js
β”‚   β”œβ”€β”€ core/                 # Core utilities
β”‚   β”‚   β”œβ”€β”€ config.js         # Configuration manager
β”‚   β”‚   └── logger.js         # Logging system
β”‚   β”œβ”€β”€ lib/                  # Libraries
β”‚   β”‚   β”œβ”€β”€ gemini.js         # AI client
β”‚   β”‚   └── scanner.js        # Security scanner
β”‚   └── utils/
β”‚       β”œβ”€β”€ rules.js          # Security rules
β”‚       └── osv.js            # OSV API client
β”œβ”€β”€ package.json
└── README.md

Running Locally

# Install dependencies
npm install

# Run without installing
node bin/cyber-walker.js scan

# Run in development mode
npm run scan
npm run chat

🀝 Contributing

Contributions are welcome! Here's how you can help:

  1. Add Security Rules: Enhance src/utils/rules.js with new patterns
  2. Improve AI Prompts: Better prompts = better analysis
  3. Bug Reports: Open an issue with details
  4. Feature Requests: Share your ideas

πŸ“ License

MIT License - see LICENSE file for details


πŸ™ Acknowledgments

  • OWASP Top 10 for security guidance
  • Google Gemini for AI capabilities
  • Open Source Community for excellent npm packages

πŸ“ž Support


πŸ—ΊοΈ Roadmap

  • [ ] Support for more languages (Python, Go, Rust, etc.)
  • [ ] Integration with more AI models (Claude, GPT-4)
  • [ ] Web dashboard for results visualization
  • [ ] VSCode extension
  • [ ] Custom rule definitions via YAML
  • [ ] Automated fix suggestions
  • [ ] Historical trend analysis

Made with ❀️ by the Cyber-Walker Team

Stay secure! πŸ›‘οΈ