|
| 1 | +import requests |
| 2 | +from database.models import DocumentAnalysis |
| 3 | +from sqlalchemy import create_engine |
| 4 | +from sqlalchemy.orm import sessionmaker |
| 5 | +import time |
| 6 | +import logging |
| 7 | + |
| 8 | +DATABASE_URL = "sqlite:///document_analysis.db" |
| 9 | +engine = create_engine(DATABASE_URL) |
| 10 | +SessionLocal = sessionmaker(autocommit=False, autoflush=False, bind=engine) |
| 11 | + |
| 12 | +# Configure logging |
| 13 | +logging.basicConfig(level=logging.ERROR, format='%(asctime)s - %(levelname)s - %(message)s') |
| 14 | + |
| 15 | +def scan_application(app_url): |
| 16 | + print(f"Scanning application for vulnerabilities: {app_url}") |
| 17 | + |
| 18 | + # Input validation for app_url |
| 19 | + if not isinstance(app_url, str) or not app_url.startswith("http"): |
| 20 | + logging.error("Invalid app_url provided.") |
| 21 | + return {"vulnerabilities_found": 0, "critical_issues": []} |
| 22 | + |
| 23 | + retries = 3 |
| 24 | + for attempt in range(retries): |
| 25 | + try: |
| 26 | + session = SessionLocal() |
| 27 | + try: |
| 28 | + response = requests.get(app_url) |
| 29 | + response.raise_for_status() |
| 30 | + |
| 31 | + # Simulate a potential SQL injection vulnerability fix |
| 32 | + if "vulnerable_param" in app_url: |
| 33 | + logging.error("Potential SQL injection attempt detected.") |
| 34 | + return {"vulnerabilities_found": 0, "critical_issues": ["Potential SQL Injection attempt detected."]} |
| 35 | + |
| 36 | + vulnerabilities = {"vulnerabilities_found": 2, "critical_issues": ["SQL Injection", "XSS"]} |
| 37 | + |
| 38 | + # Save scan results to the database |
| 39 | + scan_result = DocumentAnalysis( |
| 40 | + source=app_url, |
| 41 | + title="Vulnerability Scan", |
| 42 | + links=str(vulnerabilities["critical_issues"]), |
| 43 | + error=None |
| 44 | + ) |
| 45 | + session.add(scan_result) |
| 46 | + session.commit() |
| 47 | + return vulnerabilities |
| 48 | + except requests.exceptions.HTTPError as http_err: |
| 49 | + logging.error(f"HTTP error occurred: {http_err}") |
| 50 | + scan_result = DocumentAnalysis( |
| 51 | + source=app_url, |
| 52 | + title="Vulnerability Scan", |
| 53 | + links=None, |
| 54 | + error=str(http_err) |
| 55 | + ) |
| 56 | + session.add(scan_result) |
| 57 | + session.commit() |
| 58 | + except Exception as err: |
| 59 | + logging.error(f"Other error occurred: {err}") |
| 60 | + scan_result = DocumentAnalysis( |
| 61 | + source=app_url, |
| 62 | + title="Vulnerability Scan", |
| 63 | + links=None, |
| 64 | + error=str(err) |
| 65 | + ) |
| 66 | + session.add(scan_result) |
| 67 | + session.commit() |
| 68 | + finally: |
| 69 | + session.close() |
| 70 | + except Exception as db_err: |
| 71 | + logging.error(f"Database connection error: {db_err}") |
| 72 | + if attempt < retries - 1: |
| 73 | + logging.error("Retrying database connection...") |
| 74 | + time.sleep(2) |
| 75 | + else: |
| 76 | + logging.error("Failed to connect to the database after multiple attempts.") |
| 77 | + return {"vulnerabilities_found": 0, "critical_issues": []} |
| 78 | + return {"vulnerabilities_found": 0, "critical_issues": []} |
| 79 | + |
| 80 | +def verify_database_connection(): |
| 81 | + try: |
| 82 | + session = SessionLocal() |
| 83 | + session.execute('SELECT 1') |
| 84 | + session.close() |
| 85 | + logging.info("Database connection verified.") |
| 86 | + except Exception as e: |
| 87 | + logging.error(f"Database connection verification failed: {e}") |
| 88 | + |
| 89 | +if __name__ == "__main__": |
| 90 | + verify_database_connection() |
| 91 | + vulnerabilities = scan_application("http://example.com") |
| 92 | + print(f"Vulnerability Scan Results: {vulnerabilities}") |
0 commit comments