ALPHA-AUDIT — Managed security hardening as a subscription service for SMBs and solo founders
  • TypeScript 46.5%
  • HTML 38.7%
  • Shell 8.7%
  • CSS 4.6%
  • JavaScript 1.1%
  • Other 0.4%
Find a file
pookNast 007cbcbddf
Some checks failed
CI / test (push) Failing after 7s
fix: CLS, contrast, CSP, heading order, link text (Lighthouse audit)
- Gradient orbs: will-change + contain to prevent layout shift
- Carousel: min-height + rAF for height normalization
- Tabs: opacity 0.5→0.7, color fg-subtle→fg for contrast
- Analytics: plausible.io→plausible.viztekpro.com (self-hosted)
- CSP: allow plausible.viztekpro.com in script-src + connect-src
- Footer: h4→h3 for heading order
- Cookie notice: "Learn more"→"Learn more about our cookie policy"

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-04-28 14:55:01 -04:00
.forgejo/workflows fix: prod-audit critical+high remediation — 4 CRITICAL, 10 HIGH, 6 MEDIUM 2026-04-26 11:53:02 -04:00
docs feat: [C4] Deployment documentation 2026-04-25 07:10:40 -04:00
drizzle feat: alpha-audit full swarm delivery — Waves 0-3 complete (23/23 tasks) 2026-04-24 19:43:44 -04:00
legal feat: alpha-audit full swarm delivery — Waves 0-3 complete (23/23 tasks) 2026-04-24 19:43:44 -04:00
logs fix: CLS, contrast, CSP, heading order, link text (Lighthouse audit) 2026-04-28 14:55:01 -04:00
outreach feat: alpha-audit full swarm delivery — Waves 0-3 complete (23/23 tasks) 2026-04-24 19:43:44 -04:00
prompts feat: ALPHA-AUDIT Wave 0-2 swarm build (20/23 items) 2026-04-23 12:39:07 -04:00
scripts fix: prod-audit critical+high remediation — 4 CRITICAL, 10 HIGH, 6 MEDIUM 2026-04-26 11:53:02 -04:00
second-brain/wiki docs: add Obsidian wiki — full project knowledge base 2026-04-24 17:26:57 -04:00
site fix: CLS, contrast, CSP, heading order, link text (Lighthouse audit) 2026-04-28 14:55:01 -04:00
src fix(security): remove Redis localhost fallbacks — throw if REDIS_URL unset 2026-04-26 20:16:10 -04:00
swarm feat: alpha-audit full swarm delivery — Waves 0-3 complete (23/23 tasks) 2026-04-24 19:43:44 -04:00
.env.sample fix: validate POST /targets input + document Postgres env vars 2026-04-25 08:47:54 -04:00
.gitignore feat: ALPHA-AUDIT Wave 0-2 swarm build (20/23 items) 2026-04-23 12:39:07 -04:00
.sops.yaml feat: SOPS+age secrets management — deploy.sh decrypts env.enc at deploy time 2026-04-25 13:45:11 -04:00
ACTION-PLAN.md docs: add ALPHA-AUDIT action plan 2026-04-22 19:13:45 -04:00
adversarial-audit.md docs: add adversarial audit, GAP analysis, PRD, and swarm prompts 2026-04-22 20:08:22 -04:00
bun.lock fix: prod-audit + preflight remediation — 12 fixes across infra, security, design 2026-04-25 08:03:00 -04:00
CLAUDE.md feat: ALPHA-AUDIT Wave 0-2 swarm build (20/23 items) 2026-04-23 12:39:07 -04:00
COMPETITIVE-HUNTRESS-AUDIT.md feat: ALPHA-AUDIT Wave 0-2 swarm build (20/23 items) 2026-04-23 12:39:07 -04:00
deploy.sh feat: SOPS+age secrets management — deploy.sh decrypts env.enc at deploy time 2026-04-25 13:45:11 -04:00
docker-compose.db.yml feat: ALPHA-AUDIT Wave 0-2 swarm build (20/23 items) 2026-04-23 12:39:07 -04:00
docker-compose.prod.yml fix: prod-audit + preflight remediation — 12 fixes across infra, security, design 2026-04-25 08:03:00 -04:00
Dockerfile fix: prod-audit + preflight remediation — 12 fixes across infra, security, design 2026-04-25 08:03:00 -04:00
drizzle.config.ts feat: [ALPHA-AUDIT C3] - Partner channel + support infrastructure 2026-04-23 09:54:40 -04:00
gap-analysis.md docs: add adversarial audit, GAP analysis, PRD, and swarm prompts 2026-04-22 20:08:22 -04:00
index.ts feat: ALPHA-AUDIT Wave 0-2 swarm build (20/23 items) 2026-04-23 12:39:07 -04:00
package.json fix: prod-audit critical+high remediation — 4 CRITICAL, 10 HIGH, 6 MEDIUM 2026-04-26 11:53:02 -04:00
PENTEST-REPORT.md feat: [ALPHA-AUDIT C2] - Penetration test + cyber insurance 2026-04-23 10:54:29 -04:00
prd.json chore: update PRD — D0 REST API marked as PASS 2026-04-24 17:24:21 -04:00
PROGRESS.txt feat: ALPHA-AUDIT Wave 0-2 swarm build (20/23 items) 2026-04-23 12:39:07 -04:00
README.md feat: rebrand alpha-audit → Auditrediness (auditrediness.io) 2026-04-28 13:21:34 -04:00
SEO-KEYWORDS.md feat: rebrand alpha-audit → Auditrediness (auditrediness.io) 2026-04-28 13:21:34 -04:00
tsconfig.json feat: [ALPHA-AUDIT A3] - Database schema 2026-04-22 20:25:32 -04:00

Auditrediness

auditrediness.io — Managed security hardening for SMBs and solo founders.

Adversarial security audit CLI that scans SSH hosts and network targets for misconfigurations, exposed services, and missing hardening.

Install

bun install
bun run build
# Binary available at ./dist/alpha-audit

Usage

# Scan a remote host via SSH
alpha-audit scan user@host

# Scan a hostname or IP (network checks only)
alpha-audit scan example.com
alpha-audit scan 192.168.1.1

# Output as markdown
alpha-audit scan user@host --format markdown

# Generate PDF report
alpha-audit scan user@host --format pdf

# Verbose output
alpha-audit scan user@host -v

# Use a config file
alpha-audit scan user@host --config ./my-config.json

Config File

Create .alpha-audit.json in the working directory:

{
  "defaultFormat": "markdown",
  "targets": ["user@host1", "user@host2"],
  "severity": ["CRITICAL", "HIGH"]
}

Output

Each scan produces a structured result with findings. Every finding includes:

  • id — Unique finding identifier
  • severity — CRITICAL, HIGH, MEDIUM, LOW, or INFO
  • title — Short description of the issue
  • description — Detailed explanation
  • remediation — How to fix the issue

Exit Codes

Code Meaning
0 Clean scan — no findings
1 Findings detected
2 Scan error

Checks

SSH Targets

  • Root login enabled
  • Password authentication enabled
  • Non-standard SUID binaries
  • Excessive shell-enabled accounts
  • Running Docker containers
  • Firewall status
  • Shadow file permissions
  • Pending security updates

Network Targets

  • Exposed service ports (FTP, Telnet, MySQL, PostgreSQL, Redis, MongoDB)
  • Missing HSTS header
  • Missing X-Content-Type-Options header
  • Missing clickjacking protection

Development

bun run dev scan user@host     # Run without building
bun test                       # Run tests
bun run typecheck              # Type check