A security auditor CLI for Git repositories using LLMs
Project description
snitch-stitch
A security auditor CLI for Git repositories. Scans both backend source code and running frontend UIs to find real security vulnerabilities, scores them by severity, and lets you accept or reject LLM-generated code fixes.
Installation
pip install snitch-stitch
Or install from source:
git clone https://github.com/snitch-stitch/snitch-stitch.git
cd snitch-stitch
pip install -e .
Requirements
Environment Variables
| Variable | Required | Description |
|---|---|---|
OPENAI_API_KEY |
Yes | Used for all LLM calls (code analysis, fix generation) |
RTRVR_API_KEY |
No | Used for frontend browser scanning via rtrvr.ai |
Set these before running:
export OPENAI_API_KEY="sk-..."
export RTRVR_API_KEY="..." # Optional, for frontend scanning
Usage
snitch-stitch <repo-path> [options]
Arguments
<repo-path>- Path to the local repository directory to scan (required)
Options
| Flag | Description | Default |
|---|---|---|
--frontend-url URL |
URL of a running frontend (e.g., http://localhost:3000). Enables frontend scanning. |
None |
--fix-all |
Skip the selection prompt and attempt to fix everything | False |
--dry-run |
Show diffs but never write anything to disk | False |
--verbose |
Print debug info (raw API responses, parsed JSON) | False |
Examples
Scan a repository for backend vulnerabilities:
snitch-stitch ./my-project
Scan both backend and frontend:
snitch-stitch ./my-project --frontend-url http://localhost:3000
Preview fixes without applying them:
snitch-stitch ./my-project --dry-run
Automatically fix all vulnerabilities:
snitch-stitch ./my-project --fix-all
How It Works
snitch-stitch runs through 5 stages:
Stage 1: Ingest
Converts the repository into a text format suitable for LLM analysis using gitingest.
Stage 2: Backend Scan
Sends the code to OpenAI GPT-4o with a security analysis prompt. Identifies vulnerabilities like:
- SQL injection
- Command injection
- Path traversal
- Hardcoded secrets
- Missing authentication
- Insecure deserialization
- XSS vulnerabilities
Stage 3: Frontend Scan (Optional)
If --frontend-url is provided and RTRVR_API_KEY is set, uses rtrvr.ai to control a real browser and probe the running application for:
- XSS (Cross-Site Scripting)
- Authentication bypass
- IDOR (Insecure Direct Object Reference)
- Missing input validation
- Admin panel access
Stage 4: Rank
Scores each vulnerability (0-10) based on:
- Exposure: Public-facing (5) vs local-only (1)
- Exploitability: Easy (3) / Moderate (2) / Hard (1)
- Impact: Critical (4) / High (3) / Medium (2) / Low (1)
Severity labels: Critical (9-10), High (7-8), Medium (4-6), Low (1-3)
Stage 5: Fix
For each selected vulnerability:
- Generates a minimal code fix using OpenAI
- Shows a colored diff (red for removals, green for additions)
- Prompts you to accept or reject
- Writes accepted fixes to disk
Example Output
$ snitch-stitch ./my-project --frontend-url http://localhost:3000
[1/5] Ingesting repository...
✓ Ingested 47 files (82 KB)
[2/5] Scanning backend code...
✓ Found 4 backend vulnerabilities
[3/5] Scanning frontend...
✓ Found 2 frontend vulnerabilities
[4/5] Ranking findings...
✓ Ranked 6 findings
[5/5] Review and fix
╔════╦══════════╦══════════════════════════════════════════════╦═══════╗
║ # ║ Severity ║ Title ║ Score ║
╠════╬══════════╬══════════════════════════════════════════════╬═══════╣
║ 1 ║ Critical ║ SQL injection in /api/login ║ 10 ║
║ 2 ║ Critical ║ Hardcoded AWS key in settings.py ║ 9 ║
║ 3 ║ High ║ Command injection in file converter ║ 8 ║
║ 4 ║ High ║ Missing auth on /api/admin/users ║ 7 ║
║ 5 ║ Medium ║ XSS in search input ║ 5 ║
║ 6 ║ Low ║ No input validation on age field ║ 3 ║
╚════╩══════════╩══════════════════════════════════════════════╩═══════╝
Select vulnerabilities to fix (comma-separated numbers, or 'all'):
> 1, 2
--- Generating fix for: SQL injection in /api/login ---
app/auth.py
──────────────────────────────────────────────────
def login(username, password):
- query = f"SELECT * FROM users WHERE username = '{username}'"
- cursor.execute(query)
+ query = "SELECT * FROM users WHERE username = %s"
+ cursor.execute(query, (username,))
user = cursor.fetchone()
──────────────────────────────────────────────────
Apply this fix? [y/n]: y
✓ Fixed: app/auth.py
Vulnerability Classes Detected
| Class | Description |
|---|---|
sqli |
SQL injection via string concatenation |
command_injection |
Shell command injection via os.system, subprocess |
path_traversal |
Directory traversal allowing file access |
ssrf |
Server-side request forgery |
deserialization |
Insecure deserialization (pickle, yaml) |
xss |
Cross-site scripting |
secrets_exposure |
Hardcoded API keys, passwords, tokens |
authz |
Missing or broken authorization |
idor |
Insecure direct object references |
input_validation |
Missing input validation |
License
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file snitch_stitch-0.1.1.tar.gz.
File metadata
- Download URL: snitch_stitch-0.1.1.tar.gz
- Upload date:
- Size: 31.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.8
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
76c03223e9f26bf57c4aaf103fb063e52886e5e30b6e1549932c9b2840a1b90a
|
|
| MD5 |
5df555ffee7df726601642f548153542
|
|
| BLAKE2b-256 |
f80bdaefb19a6ab33ea2257bf6b3c3106e7b0d3d935b779359d039f4dcdaa99e
|
File details
Details for the file snitch_stitch-0.1.1-py3-none-any.whl.
File metadata
- Download URL: snitch_stitch-0.1.1-py3-none-any.whl
- Upload date:
- Size: 32.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.8
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
de4102d826cb3087d2b5a049c7f65fbcee5a3d3fcc12c92516186e43959a6b70
|
|
| MD5 |
d94afe76578da433326a15143654a937
|
|
| BLAKE2b-256 |
a5220c6e8cbff4e47a68e1c394917b6cbeb40d84a2f0da86523aeac5752721e3
|