Skip to main content

DORA Compliance Auditor for OpenAPI Specs

Project description

PanDoraSpec

The Open DORA Compliance Engine for OpenAPI Specs.

PanDoraSpec is a CLI tool that performs deep technical due diligence on APIs to verify compliance with DORA (Digital Operational Resilience Act) requirements. It compares OpenAPI/Swagger specifications against real-world implementation to detect schema drift, resilience gaps, and security issues.


📦 Installation

pip install pandoraspec

System Requirements

The PDF report generation requires weasyprint, which depends on Pango.

macOS:

brew install pango

Debian / Ubuntu:

sudo apt-get install libpango-1.0-0 libpangoft2-1.0-0

🛠️ Development Setup

To run the CLI locally without reinstalling after every change:

  1. Clone & CD:
git clone ...
cd pandoraspec
  1. Create & Activate Virtual Environment: It's recommended to use a virtual environment to keep dependencies isolated.
python3 -m venv venv
source venv/bin/activate  # On Windows: venv\Scripts\activate
  1. Editable Install:
pip install -e .

This links the pandoraspec command directly to your source code. Any changes you make will be reflected immediately.

🚀 Usage

Run the audit directly from your terminal.

Basic Scan

pandoraspec https://petstore.swagger.io/v2/swagger.json

With Options

pandoraspec https://api.example.com/spec.json --vendor "Stripe" --key "sk_live_..."

Local File

pandoraspec ./openapi.yaml

Override Base URL

If your OpenAPI spec uses variables (e.g. https://{env}.api.com) or you want to audit a specific target:

pandoraspec https://api.example.com/spec.json --base-url https://staging.api.example.com

🏎️ Zero-Config Testing (DORA Compliance)

For standard DORA compliance, you simply need to verify that your API implementation matches its specification. No configuration is required.

pandoraspec https://petstore.swagger.io/v2/swagger.json

This runs a fuzzing audit where random data is generated based on your schema types (e.g., sending random integers for IDs).

  • Value: This is sufficient to prove that your API correctly handles unexpected inputs and adheres to the basic contract (e.g., returning 400 Bad Request instead of 500 Server Error).
  • Limitation: Detailed business logic requiring valid IDs (e.g., GET /user/{id} where {id} must exist) may return 404 Not Found. This is acceptable for a compliance scan but may not fully exercise deeper code paths.

🧠 Advanced Testing with Seed Data

To test specific business workflows (e.g., successfully retrieving a user profile), you can provide "Seed Data". This tells PanDoraSpec to use known, valid values instead of random fuzzing data.

pandoraspec https://petstore.swagger.io/v2/swagger.json --config seed_parameters.yaml

Configuration Hierarchy

You can define seed values at three levels of specificity. The engine resolves values in this order: Endpoints > Verbs > General.

seed_data:
  # 1. General: Applies to EVERYTHING (path params, query params, headers)
  general:
    username: "test_user"
    limit: 50

  # 2. Verbs: Applies only to specific HTTP methods (Overwrites General)
  verbs:
    POST:
      username: "admin_user" # Creation requests use a different user

  # 3. Endpoints: Applies only to specific routes (Overwrites Everything)
  endpoints:
    /users/me:
      GET:
        limit: 10

🔗 Dynamic Seed Data (Chaining Requests)

You can even test dependency chains where one endpoint requires data from another (e.g., get a User ID from a search result to query their profile).

Supported Features:

  • Dynamic Resolution: Fetch a value from another API call before running the test.
  • Extraction: Extract values from JSON responses or plain text.
  • Parameter Interpolation: Use {param} in the dependency URL to chain multiple steps.
endpoints:
  /user/{username}:
    GET:
      username:
        # 1. Fetch the user list first
        # 2. Extract the 'username' field from the response
        from_endpoint: "GET /users/search?role=admin"
        extract: "data.items.0.username"

  /orders/{orderId}:
    GET:
      orderId:
        # 1. Use the {userId} from our general seeds
        # 2. Call /users/{userId}/latest-order
        # 3. Extract the ID using Regex from a message string
        from_endpoint: "GET /users/{userId}/latest-order"
        extract: "message"
        regex: "Order ID: ([0-9]+)"

🛡️ What It Checks

Module A: The Integrity Test (Drift)

Checks if your API implementation matches your documentation.

  • Why? DORA requires you to monitor if the service effectively supports your critical functions. If the API behaves differently than documented, it's a risk.

Module B: The Resilience Test

Stress tests the API to ensure it handles invalid inputs gracefully (4xx vs 5xx).

  • Why? DORA Article 25 calls for "Digital operational resilience testing".

Module C: Security Hygiene

Checks for common security headers and configurations.

Module D: The Report

Generates a PDF report: "DORA ICT Third-Party Technical Risk Assessment".


📄 License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pandoraspec-0.2.2.tar.gz (18.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

pandoraspec-0.2.2-py3-none-any.whl (16.3 kB view details)

Uploaded Python 3

File details

Details for the file pandoraspec-0.2.2.tar.gz.

File metadata

  • Download URL: pandoraspec-0.2.2.tar.gz
  • Upload date:
  • Size: 18.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.2

File hashes

Hashes for pandoraspec-0.2.2.tar.gz
Algorithm Hash digest
SHA256 c589b1b9a55e9cf5d098aa86aff8a9c017195a050f774f2b2a5a243d4ebcf9ed
MD5 37ba9c6384b4dff1b8a43215e1fd408c
BLAKE2b-256 15f1713d9ef4dddeb24de597dbe22d1053a909c322ac5b9934b220d327e2ee08

See more details on using hashes here.

File details

Details for the file pandoraspec-0.2.2-py3-none-any.whl.

File metadata

  • Download URL: pandoraspec-0.2.2-py3-none-any.whl
  • Upload date:
  • Size: 16.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.2

File hashes

Hashes for pandoraspec-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 f833d675121c0e04f21dcc2d12c9955ba0ec65ffcc2ed0c22b2f14cbae7d7384
MD5 bc8482b15f0fb8f01387f5b433c2a13d
BLAKE2b-256 13c75e3160acc88cabbe312eee058700beb2843feb649419e3ef36017e6da041

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page