The security signal filter for African fintech engineering teams — precision-first AppSec that removes false positives so developers only see findings that matter
Project description
Permi
The security signal filter for African fintech engineering teams
What is Permi?
Most security scanners produce hundreds of findings. Most are noise. Developers learn to ignore them — and that is when the real vulnerabilities get missed.
Permi fixes this. It scans your code and live applications for vulnerabilities, then uses an AI filter to confirm which findings are real before you see them. Your team spends time fixing actual problems instead of chasing false alarms.
Permi also includes rules built specifically for the African development context — USSD gateway vulnerabilities, Paystack and Flutterwave credential exposure, and patterns relevant to Nigeria Data Protection Act compliance. No foreign scanner prioritises this. Permi does.
Built from Jos, Nigeria. For African fintech engineering teams. Then for the world.
Quick Start
pip install permi
permi setup --community # 50 free AI filter credits — no card needed
permi scan --path ./myapp
⚠️ Windows Users — If Permi Freezes on First Run
Some Windows machines freeze immediately when running permi — even before the banner appears. This is caused by Windows Defender or corporate antivirus scanning Python processes in real time.
Fix — add Permi to your antivirus exclusions:
- Open Windows Security → Virus & threat protection → Manage settings
- Scroll to Exclusions → Add an exclusion → Folder
- Add these two folders:
C:\Users\<yourname>\.permiC:\Users\<yourname>\Permi\venv(or wherever your venv lives)
- Open a new terminal and run
permiagain
If you are on a corporate machine or university network, your IT department may have group policies that block Python subprocess calls. Run Permi from Windows Subsystem for Linux (WSL) instead:
wsl
pip install permi
permi scan --path ./myapp
Installation
pip install permi
Requires Python 3.9+. Works on Windows, macOS, and Linux.
For JavaScript/SPA scanning (React, Vue, Angular, Next.js)
pip install "permi[js]"
playwright install chromium
Cloudflare-protected sites: Also run
pip install playwright-stealthfor better rendering success rates.
Low-RAM machines (4GB): Use
--max-pages 10with--js.
Usage
Scan a live website (standard HTTP)
permi scan --url https://yoursite.com
Scan a JavaScript-rendered application (React / Vue / Angular / Next.js)
permi scan --url https://yoursite.com --js
The --js flag launches a headless Chromium browser that fully renders JavaScript before scanning. Required for single-page applications where links and forms are built dynamically.
Without --js, Permi will detect a SPA and show:
[Permi] ⚠️ JavaScript-rendered application detected.
[Permi] Re-run with --js to scan the full JavaScript-rendered content:
[Permi] permi scan --url https://yoursite.com --js
Scan a local codebase
permi scan --path ./myapp
Scan a GitHub repository
permi scan --path https://github.com/username/repo
Include subdomains
permi scan --url https://yoursite.com --include-subdomains
High severity findings only
permi scan --url https://yoursite.com --severity high
Export results to a file
permi scan --url https://yoursite.com --export report.md
permi scan --path ./myapp --export results.json
permi scan --path ./myapp --export results.txt
Show all raw findings (skip AI filter)
permi scan --url https://yoursite.com --offline
JSON output (for CI/CD pipelines)
permi scan --url https://yoursite.com --output json
Setting Up AI Filtering
The AI filter is what separates confirmed vulnerabilities from noise. Without it, Permi shows all raw findings. With it, each finding is reviewed before you see it.
Option 1 — Free community credits (recommended for new users)
permi setup --community
50 free AI filter calls. No credit card. Starts immediately. The community proxy may take up to 60 seconds to wake on first use — it retries automatically.
Option 2 — Your own OpenRouter API key (unlimited)
permi setup --api-key YOUR_KEY
Get a free key at openrouter.ai.
GitHub Action — Scan Every Pull Request
Add Permi to your CI/CD pipeline. Every pull request is automatically scanned, findings are posted as PR comments, and merges are blocked if high severity issues are found.
# .github/workflows/security.yml
name: Security Scan
on:
push:
branches: [main, develop]
pull_request:
branches: [main, develop]
jobs:
permi-scan:
runs-on: ubuntu-latest
permissions:
contents: read
pull-requests: write
steps:
- uses: actions/checkout@v4
- uses: Peternasarah/permi-action@v1
with:
severity: high
openrouter_api_key: ${{ secrets.OPENROUTER_API_KEY }}
What happens on every PR:
- Permi scans the changed code
- AI filter removes false positives
- Findings posted as a PR comment
- Merge blocked if high severity issues found
- Free forever
→ View Permi GitHub Action on the Marketplace
How It Works
┌─────────────┐ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐
│ Crawler │───▶│ Scanner │───▶│ AI Filter │───▶│ Results │
│ HTTP or JS │ │ SQL · XSS │ │ Confirms or │ │ Only real │
│ (--js) │ │ Secrets · + │ │ dismisses │ │ findings │
└─────────────┘ └──────────────┘ │ each finding │ └──────────────┘
└──────────────┘
Two crawler modes:
- HTTP mode (default) — fast BeautifulSoup crawler for server-rendered sites
- JS mode (
--js) — Playwright headless Chromium for React/Vue/Angular SPAs
AI filter:
- Reviews each finding individually before it reaches you
- CSP-aware: correctly dismisses reflected XSS when a Content-Security-Policy blocks execution
- Caches results so repeated scans do not consume extra credits
- Three-tier verdict: REAL / REVIEW / FP with confidence score 0-100
- Community proxy for users without their own API key
What Permi Detects
Web scanning (--url)
| Category | What is detected |
|---|---|
| SQL Injection | Error-based, Boolean-based blind, Time-based blind |
| Cross-Site Scripting | Reflected XSS — HTML-encoding aware, CSP-aware |
| Missing Security Headers | CSP, HSTS, X-Frame-Options, Permissions-Policy |
| Server Version Disclosure | Server and X-Powered-By version number leakage |
Source code scanning (--path)
| Category | What is detected |
|---|---|
| SQL Injection | String concatenation, f-strings, % formatting in queries |
| Cross-Site Scripting | innerHTML, document.write, Jinja2 |safe filter |
| Hardcoded Secrets | Passwords, API keys, AWS keys, Paystack/Flutterwave secrets |
| Insecure Practices | eval(), exec(), pickle.loads(), SSL verification disabled, debug mode |
| USSD Vulnerabilities | Unvalidated sessionId, phoneNumber, serviceCode |
Nigerian and African-Specific Rules
Permi includes rules built for the African development context that no global tool will ever prioritise:
- USSD gateway vulnerabilities — unvalidated sessionId, phoneNumber, serviceCode
- Paystack and Flutterwave key exposure — detects Nigerian payment gateway live secrets
- BVN and NIN pattern detection — NDPA-sensitive personal data in code
- NDPA-relevant patterns — helps with Nigeria Data Protection Act compliance
Example Output
[Permi] Mode : JS scan (Playwright headless browser)
[Permi] Target : https://yourapp.com
[Permi] Crawl : up to 15 pages (JS-rendered)
[Permi JS] Rendering page 1/15: https://yourapp.com
[Permi JS] Rendering page 2/15: https://yourapp.com/login
[Permi JS] Crawl complete — 8 pages rendered, 24 URLs found, 12 unique signatures
[Permi] Engine found 7 raw finding(s)
[Permi] Running AI filter on 7 finding(s)...
════════════════════════════════════════════════════════════════════════
FILTER SUMMARY
════════════════════════════════════════════════════════════════════════
Raw findings : 7
Confirmed real : 4
False positives : 3 removed
Noise reduced by : 43% [████████░░░░░░░░░░░░]
Avg confidence : 89%
Severity breakdown:
● High : 2
● Medium : 2
Top issues to fix:
• 2× SQL Injection — string concatenation
• 1× Hardcoded secret — generic password
• 1× Insecure — SSL/TLS verification disabled
════════════════════════════════════════════════════════════════════════
[1] [HIGH] WEB_SQL001 SQL Injection — Error-based
URL : https://yourapp.com/login
Parameter : username
Fix : Use parameterised queries: cursor.execute("SELECT * FROM users WHERE name = ?", (name,))
AI : REAL [94% confidence] SQL syntax error confirms input reaches query unescaped.
Scan completed in 2 min 14s | 12 URLs tested
CLI Reference
permi scan --url URL Scan a live website
--js Use Playwright for JS-rendered SPAs
--js-timeout N Per-page timeout in seconds (default: 20)
--include-subdomains Also scan subdomains
--max-pages N Max pages to crawl (default: 30)
--severity LEVEL high | medium | low | all (default: all)
--offline Skip AI filter, show raw findings
--output FORMAT human (default) | json
--export FILE Export full report (.txt, .json, .md)
permi scan --path PATH Scan local codebase or GitHub repo
--severity LEVEL Filter by severity
--offline Skip AI filter
--output FORMAT human | json
--export FILE Export full report
permi setup --community Register for 50 free AI filter credits
permi setup --api-key KEY Use your own OpenRouter API key (unlimited)
permi info Show config, credits, Playwright status
permi feedback Share feedback with the Permi team
CI/CD Integration
Permi exits with code 1 if any HIGH severity findings are confirmed after filtering. Use this in any pipeline:
# GitHub Actions — inline (without the Marketplace Action)
- name: Run Permi security scan
run: |
pip install permi
permi setup --api-key ${{ secrets.OPENROUTER_API_KEY }}
permi scan --path . --severity high --output json --export permi-report.json
# Fail the build on high severity findings
permi scan --path ./myapp --severity high || exit 1
Changelog
v0.2.17 — Precision improvements
- FIX: Windows Defender freeze — DB path now resolves lazily, not at import time
- FIX: XSS false positives — proper HTML entity encoding check before flagging
- FIX: Boolean SQLi false positives — both responses must exceed 2000 bytes
- FIX: Time-based SQLi — requires minimum 8s hard threshold, not just baseline + 4s
- FIX: Tracking parameters (utm_, ref_, locale) now fully skipped in all scanners
- NEW: Progress indicator during web scan — scan never looks frozen
- NEW:
pip install "permi[js]"installs Playwright dependencies automatically - NEW:
permi infoshows playwright-stealth installation status
v0.2.13 — JS/SPA Support + GitHub Action
- NEW:
--jsflag for JavaScript-rendered applications (React, Vue, Angular, Next.js) - NEW: Playwright headless browser integration with stealth mode
- NEW: Network interception — discovers XHR/fetch API endpoints automatically
- NEW: SPA detection warning with exact re-run command shown to user
- NEW: Permi GitHub Action
- NEW: Windows antivirus freeze detection and guidance
- NEW: Scan timer — total duration shown at end of every scan
v0.2.2 — AI Filter + Community Proxy
- Precision filter with three-tier verdict: REAL / REVIEW / FP with 0–100 confidence score
- Community proxy — 50 free credits with
permi setup --community - OpenRouter API key support
- Inline fix templates — exact remediation per finding
--exportflag — save full reports as .txt, .json, or .md--include-subdomainsflag- Feedback system —
permi feedback
v0.1 — Foundation
- CLI scanner (web + static analysis)
- PyPI distribution (
pip install permi) - 17 detection rules across SQL, XSS, secrets, USSD, insecure practices
- SQLite database at
~/.permi/permi.db
Contributing
Pull requests welcome. Please open an issue first to discuss significant changes.
If you find a vulnerability in a real application using Permi, please report it responsibly to the affected organisation before disclosing publicly. See CONTRIBUTING.md for the full guide, including how to write new vulnerability rules.
Author
Nasarah Peter Dashe Founder · Cybersecurity Student @ University of Jos, Nigeria github.com/Peternasarah/permi · @peternasarah
Links
- Website: peternasarah.github.io/permi
- PyPI: pypi.org/project/permi
- GitHub Action: github.com/marketplace/actions/permi-security-scanner
- Issues: github.com/Peternasarah/permi/issues
- Security: SECURITY.md
- License: LICENSE
License
PERMI COMMUNITY LICENSE — see LICENSE for details.
Built in Nigeria. For Nigeria. Then for the World.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file permi-0.2.18.tar.gz.
File metadata
- Download URL: permi-0.2.18.tar.gz
- Upload date:
- Size: 65.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
de404c36de8cbbbb7db8e1c6ccfa8a7af466647537b79912e6e4d4fded3d405b
|
|
| MD5 |
6ae99a4ada40b8561549723f6b77c9ad
|
|
| BLAKE2b-256 |
d12a719f7add1c4da974ee5ce636748f5146bb0f230aa88e3b2f8fa440e612aa
|
File details
Details for the file permi-0.2.18-py3-none-any.whl.
File metadata
- Download URL: permi-0.2.18-py3-none-any.whl
- Upload date:
- Size: 64.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
829fa2e755af84932f892d5447977959cf3ecd4b7142d21b7cba962709b2339a
|
|
| MD5 |
21fa4c64a642d91cab9c0ba58021a8f3
|
|
| BLAKE2b-256 |
8b50e06dad23a33b2cfac7c2f49d1bce182932af41566181b9fb9697b880feff
|