Public scan — anyone with this URL can view this analysis. Sign up to track your own repos privately, run scheduled re-scans, and get AI fix prompts via your dashboard.

t8y2/dbx

https://github.com/t8y2/dbx · scanned 2026-05-16 22:31 UTC (20 hours, 52 minutes ago) · 10 languages

157 findings (37 legacy + 120 scanner) 51st percentile · Typescript · medium (20-100K LoC) Scanner says 66 (higher by 7)

UNIFIED Repobility · multi-layer engine · AI coders

Complete repo analysis

Last scanned 20 hours, 52 minutes ago · v1 · 157 findings from 2 sources. Findings combine the legacy security pipeline AND the multi-layer engine (atlas, wiring, flows, ranked) AND verified AI agent contributions.

JSON
Severity distribution — click a segment to filter
Active filters: layer: security × excluding tests × Reset all
Scan summary Repository scanned at 65.5/100 with 100.0% coverage. It contains 1973 nodes across 5 cross-layer flows, written primarily in mixed languages. Engine surfaced 120 findings — concentrated in software (50), cicd (34), security (24). Risk profile is high: 22 critical, 0 high, 28 medium. Recommended next step: open the software layer findings first — that's where the highest-impact wins live.

Showing 28 of 157 findings. Click TP / FP to vote on a finding's accuracy — votes adjust the confidence weighting and improve detection across the platform.

critical Legacy security credential_exposure conf 1.00 [SEC022] Database URL With Embedded Credential: A database connection URL contains an embedded username and password. These URLs are often copied into defaults, docs, and scripts, then leak working credentials.
Remove the embedded password, require the URL from a secret store or environment variable, and rotate the database credential.
crates/dbx-core/src/models/connection.rs:298 credential_exposurelegacy
critical Legacy security credential_exposure conf 1.00 [SEC022] Database URL With Embedded Credential: A database connection URL contains an embedded username and password. These URLs are often copied into defaults, docs, and scripts, then leak working credentials.
Remove the embedded password, require the URL from a secret store or environment variable, and rotate the database credential.
crates/dbx-core/src/connection_secrets.rs:393 credential_exposurelegacy
critical 9-layer security secrets conf 1.00 Possible secret in crates/dbx-core/src/connection.rs
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
crates/dbx-core/src/connection.rs:487 secrets
critical 9-layer security secrets conf 1.00 Possible secret in crates/dbx-core/src/connection.rs
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
crates/dbx-core/src/connection.rs:519 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/en.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/en.ts:9 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/en.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/en.ts:10 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/en.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/en.ts:11 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/en.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/en.ts:13 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/en.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/en.ts:18 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/en.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/en.ts:19 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/en.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/en.ts:101 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/en.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/en.ts:153 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/en.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/en.ts:167 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/es.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/es.ts:9 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/es.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/es.ts:10 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/es.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/es.ts:11 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/es.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/es.ts:13 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/es.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/es.ts:18 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/es.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/es.ts:19 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/es.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/es.ts:101 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/es.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/es.ts:153 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/es.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/es.ts:167 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/zh-CN.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/zh-CN.ts:11 secrets
critical 9-layer security secrets conf 1.00 Possible secret in src/i18n/locales/zh-CN.ts
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
src/i18n/locales/zh-CN.ts:151 secrets
high Legacy security path_traversal conf 0.80 [SEC013] Path Traversal — User Input in File Path: User-controlled input used in file path without sanitization. Allows reading arbitrary files.
Use os.path.realpath() and verify the path starts with your expected base directory. Use secure_filename() for uploads.
src-tauri/src/commands/sql_file.rs:109 path_traversallegacy
medium Legacy security auth conf 0.92 [AUC001] No Repobility access matrix policy found: The repository uses web/API frameworks but does not define .repobility/access.yml or equivalent authorization documentation.
The repository uses web/API frameworks but does not define .repobility/access.yml or equivalent authorization documentation.
authlegacy
medium 9-layer security owasp conf 1.00 Insecure pattern 'weak_hash' in src/lib/sqlCompletion.ts:254
Found a known-risky pattern (weak_hash). Review and replace if possible.
src/lib/sqlCompletion.ts:254 owaspweak_hash
medium 9-layer security coverage conf 1.00 No auth library detected
The scanner did not find any standard auth library (JWT, OAuth, NextAuth, Auth0, etc.). Either auth lives in custom code, in a separate service, or is missing.
coverageauth
{# ── 2026-05-17 Round 14: AI-agent bridge footer ────────────────────── Discoverability: the /agents/voting/ guide + MCP manifest exist but aren't linked from anywhere users actually land. Small, opt-in footer. #}
For AI agents: Voting guide (TP/FP) MCP manifest Stdio wrapper SARIF Integrate Findings queue Vote TP/FP on findings to calibrate the engine.
For AI agents + API integrations
Email me when this repo regresses
Free. We re-scan periodically; new criticals → your inbox. No signup required for the scan itself.
API access

This page is publicly accessible at: https://repobility.com/scan/446a5605-265f-4dce-86ba-d4c30af53d8e/

To check status programmatically (no auth required):

curl -s https://repobility.com/api/v1/public/scan/446a5605-265f-4dce-86ba-d4c30af53d8e/

Important — please don't re-submit the same URL repeatedly. The submission endpoint is idempotent: re-submitting the same git URL returns this same scan_token, not a new one. To re-scan this repo, sign up free and use the dashboard.