ALPHA-AUDIT — Managed security hardening as a subscription service for SMBs and solo founders
- TypeScript 46.5%
- HTML 38.7%
- Shell 8.7%
- CSS 4.6%
- JavaScript 1.1%
- Other 0.4%
|
Some checks failed
CI / test (push) Failing after 7s
- Gradient orbs: will-change + contain to prevent layout shift - Carousel: min-height + rAF for height normalization - Tabs: opacity 0.5→0.7, color fg-subtle→fg for contrast - Analytics: plausible.io→plausible.viztekpro.com (self-hosted) - CSP: allow plausible.viztekpro.com in script-src + connect-src - Footer: h4→h3 for heading order - Cookie notice: "Learn more"→"Learn more about our cookie policy" Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> |
||
|---|---|---|
| .forgejo/workflows | ||
| docs | ||
| drizzle | ||
| legal | ||
| logs | ||
| outreach | ||
| prompts | ||
| scripts | ||
| second-brain/wiki | ||
| site | ||
| src | ||
| swarm | ||
| .env.sample | ||
| .gitignore | ||
| .sops.yaml | ||
| ACTION-PLAN.md | ||
| adversarial-audit.md | ||
| bun.lock | ||
| CLAUDE.md | ||
| COMPETITIVE-HUNTRESS-AUDIT.md | ||
| deploy.sh | ||
| docker-compose.db.yml | ||
| docker-compose.prod.yml | ||
| Dockerfile | ||
| drizzle.config.ts | ||
| gap-analysis.md | ||
| index.ts | ||
| package.json | ||
| PENTEST-REPORT.md | ||
| prd.json | ||
| PROGRESS.txt | ||
| README.md | ||
| SEO-KEYWORDS.md | ||
| tsconfig.json | ||
Auditrediness
auditrediness.io — Managed security hardening for SMBs and solo founders.
Adversarial security audit CLI that scans SSH hosts and network targets for misconfigurations, exposed services, and missing hardening.
Install
bun install
bun run build
# Binary available at ./dist/alpha-audit
Usage
# Scan a remote host via SSH
alpha-audit scan user@host
# Scan a hostname or IP (network checks only)
alpha-audit scan example.com
alpha-audit scan 192.168.1.1
# Output as markdown
alpha-audit scan user@host --format markdown
# Generate PDF report
alpha-audit scan user@host --format pdf
# Verbose output
alpha-audit scan user@host -v
# Use a config file
alpha-audit scan user@host --config ./my-config.json
Config File
Create .alpha-audit.json in the working directory:
{
"defaultFormat": "markdown",
"targets": ["user@host1", "user@host2"],
"severity": ["CRITICAL", "HIGH"]
}
Output
Each scan produces a structured result with findings. Every finding includes:
- id — Unique finding identifier
- severity — CRITICAL, HIGH, MEDIUM, LOW, or INFO
- title — Short description of the issue
- description — Detailed explanation
- remediation — How to fix the issue
Exit Codes
| Code | Meaning |
|---|---|
| 0 | Clean scan — no findings |
| 1 | Findings detected |
| 2 | Scan error |
Checks
SSH Targets
- Root login enabled
- Password authentication enabled
- Non-standard SUID binaries
- Excessive shell-enabled accounts
- Running Docker containers
- Firewall status
- Shadow file permissions
- Pending security updates
Network Targets
- Exposed service ports (FTP, Telnet, MySQL, PostgreSQL, Redis, MongoDB)
- Missing HSTS header
- Missing X-Content-Type-Options header
- Missing clickjacking protection
Development
bun run dev scan user@host # Run without building
bun test # Run tests
bun run typecheck # Type check