Skip to content

Commit 41e3b9b

Browse files
Sahilb315Copilot
andauthored
Deprecate malysis active scanner (#155)
* deprecate malysis active scanner * Update config/config.go Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Signed-off-by: Sahil Bansal <bansalsahil315@gmail.com> * copilot fixes --------- Signed-off-by: Sahil Bansal <bansalsahil315@gmail.com> Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
1 parent b161d34 commit 41e3b9b

File tree

6 files changed

+7
-157
lines changed

6 files changed

+7
-157
lines changed

README.md

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -171,17 +171,6 @@ This will:
171171
172172
## Usage
173173

174-
<details>
175-
<summary>Active Scanning</summary>
176-
177-
Use the `--paranoid` flag to perform active malware scanning on unknown packages (requires [SafeDep Cloud credentials](https://docs.safedep.io/cloud/authentication#api-key-authentication)):
178-
179-
```bash
180-
pmg --paranoid npm install <package-name>
181-
```
182-
183-
</details>
184-
185174
<details>
186175
<summary>Silent Mode</summary>
187176

analyzer/malysis_active_scan.go

Lines changed: 0 additions & 122 deletions
This file was deleted.

config/cobra.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ func ApplyCobraFlags(cmd *cobra.Command) {
1616
cmd.PersistentFlags().BoolVar(&globalConfig.DryRun, "dry-run",
1717
globalConfig.DryRun, "Dry run skips execution of package manager")
1818
cmd.PersistentFlags().BoolVar(&globalConfig.Config.Paranoid, "paranoid",
19-
globalConfig.Config.Paranoid, "Perform active scanning of unknown packages (slow)")
19+
globalConfig.Config.Paranoid, "Enable high-security defaults (treat suspicious as malicious)")
2020
cmd.PersistentFlags().BoolVar(&globalConfig.Config.SkipEventLogging, "skip-event-log",
2121
globalConfig.Config.SkipEventLogging, "Skip event logging")
2222
cmd.PersistentFlags().BoolVar(&globalConfig.Config.ExperimentalProxyMode, "experimental-proxy-mode",

config/config.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ type Config struct {
4444
TransitiveDepth int `mapstructure:"transitive_depth"`
4545
IncludeDevDependencies bool `mapstructure:"include_dev_dependencies"`
4646

47-
// Paranoid mode enables active scanning of unknown packages for malware.
47+
// Paranoid enables high-security defaults (e.g., treating suspicious behavior as malicious).
4848
Paranoid bool `mapstructure:"paranoid"`
4949

5050
// TrustedPackages allows for trusting a suspicious package and ignoring the suspicious behaviour for the package in future installations

internal/flows/common_flow.go

Lines changed: 5 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -57,22 +57,13 @@ func (f *commonFlow) Run(ctx context.Context, args []string, parsedCmd *packagem
5757

5858
startTime := time.Now()
5959

60-
if cfg.Config.Paranoid {
61-
malysisActiveScanAnalyzer, err := analyzer.NewMalysisActiveScanAnalyzer(analyzer.DefaultMalysisActiveScanAnalyzerConfig())
62-
if err != nil {
63-
return fmt.Errorf("failed to create malware analyzer: %s", err)
64-
}
65-
66-
analyzers = append(analyzers, malysisActiveScanAnalyzer)
67-
} else {
68-
malysisQueryAnalyzer, err := analyzer.NewMalysisQueryAnalyzer(analyzer.MalysisQueryAnalyzerConfig{})
69-
if err != nil {
70-
return fmt.Errorf("failed to create malware analyzer: %s", err)
71-
}
72-
73-
analyzers = append(analyzers, malysisQueryAnalyzer)
60+
malysisQueryAnalyzer, err := analyzer.NewMalysisQueryAnalyzer(analyzer.MalysisQueryAnalyzerConfig{})
61+
if err != nil {
62+
return fmt.Errorf("failed to create malware analyzer: %w", err)
7463
}
7564

65+
analyzers = append(analyzers, malysisQueryAnalyzer)
66+
7667
interaction := guard.PackageManagerGuardInteraction{
7768
SetStatus: ui.SetStatus,
7869
ClearStatus: ui.ClearStatus,

internal/flows/proxy_flow.go

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -242,14 +242,6 @@ func (f *proxyFlow) createCertificateManager(caCert *certmanager.Certificate) (c
242242

243243
// createAnalyzer creates the malysis query analyzer
244244
func (f *proxyFlow) createAnalyzer() (analyzer.PackageVersionAnalyzer, error) {
245-
cfg := config.Get()
246-
247-
// Use paranoid mode (active scan) if enabled, otherwise use query mode
248-
if cfg.Config.Paranoid {
249-
log.Debugf("Creating malysis active scan analyzer (paranoid mode)")
250-
return analyzer.NewMalysisActiveScanAnalyzer(analyzer.DefaultMalysisActiveScanAnalyzerConfig())
251-
}
252-
253245
log.Debugf("Creating malysis query analyzer")
254246
return analyzer.NewMalysisQueryAnalyzer(analyzer.MalysisQueryAnalyzerConfig{})
255247
}

0 commit comments

Comments
 (0)