decoyable


Namedecoyable JSON
Version 1.2.1 PyPI version JSON
download
home_pageNone
SummaryNext-Generation Active Cyber Defense Platform - Find secrets, vulnerabilities, and attack patterns in your code
upload_time2025-10-08 19:23:20
maintainerNone
docs_urlNone
authorNone
requires_python>=3.11
licenseMIT
keywords security scanning vulnerabilities secrets sast cybersecurity honeypot ai defense
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            ๏ปฟ# DECOYABLE - Make Your Code Unhackable

[![CI](https://github.com/Kolerr-Lab/supper-decoyable/actions/workflows/ci.yml/badge.svg)](https://github.com/Kolerr-Lab/supper-decoyable/actions)
[![License](https://img.shields.io/badge/license-MIT-blue.svg)](LICENSE)
[![Python](https://img.shields.io/badge/python-3.11+-blue.svg)](https://python.org)
[![PyPI version](https://img.shields.io/pypi/v/decoyable.svg)](https://pypi.org/project/decoyable/)
[![Downloads](https://img.shields.io/pypi/dm/decoyable.svg)](https://pypi.org/project/decoyable/)
[![Security](https://img.shields.io/badge/security-zero--real--vulns-brightgreen.svg)](SECURITY.md)
[![Docker](https://img.shields.io/badge/docker-ready-blue.svg)](docker-compose.yml)
[![AI-Powered](https://img.shields.io/badge/AI-powered-purple.svg)](README_AI_FEATURES.md)

**Stop security vulnerabilities before they reach production.**

๐Ÿ” **Find secrets, vulnerabilities, and attack patterns in your code**  
๐Ÿ›ก๏ธ **Active defense with AI-powered honeypots**  
โšก **Sub-30ms scanning with enterprise-grade performance**  
๐Ÿ“ฆ **Available on PyPI: pip install decoyable**

## ๐ŸŽ‰ **Version 1.2.1 - Enterprise-Ready with 92% Test Coverage!**

๐Ÿงช **92% Test Coverage** - Comprehensive test suite validates all features  
๐Ÿ”ง **Bug Fixes & Stability** - Fixed API endpoints, service registry, and CLI issues  
โšก **Performance Optimized** - SAST scanning detects 1550+ vulnerabilities in milliseconds  
๐Ÿ›ก๏ธ **Enhanced Security** - Honeypot service with IP blocking and AI analysis  
๐Ÿ“Š **Database Integration** - PostgreSQL with Redis caching for enterprise deployments  
๐Ÿณ **Docker Production Ready** - Full container orchestration with health checks  
๐Ÿค– **AI Multi-Provider** - OpenAI, Claude, Ollama, Phi-3 with intelligent fallback  
๐Ÿ” **Advanced Scanning** - Secrets, dependencies, SAST, and behavioral analysis  
๐Ÿ“ˆ **Production Metrics** - Prometheus integration for monitoring and alerting  
โš™๏ธ **Enterprise Features** - Kafka streaming, adaptive defense, knowledge base

## ๐Ÿš€ Quick Start (2 minutes)

`ash
# Install from PyPI
pip install decoyable

# Scan your code for security issues
decoyable scan all

# Results example:
๐Ÿ” Found 3 secrets in config.py
๐Ÿ’ป SQL injection vulnerability in api.py
โœ… No dependency vulnerabilities
`

## ๐Ÿค– AI-Powered Analysis

**8 AI systems analyze your code in 0.43 seconds:**

`ash
# Run comprehensive AI analysis with live dashboard
decoyable ai-analyze . --dashboard

# Auto-deploy defensive honeypots based on findings
decoyable ai-analyze . --deploy-defense
`

**Features:**
- ๐Ÿง  **Predictive Threat Intelligence** (95% accuracy)
- ๐Ÿ”ฎ **Zero-day Detection** without signatures
- ๐Ÿงฌ **Exploit Chain Detection** for multi-step attacks
- ๐Ÿ“Š **Live Security Dashboard** with risk scoring
- ๐Ÿ›ก๏ธ **Defense Recommendations** and remediation steps

## ๐Ÿ›ก๏ธ Active Defense Features

- **๐Ÿค– AI Attack Analysis**: Classifies attacks with 95%+ accuracy
- **๐Ÿ•ต๏ธ Adaptive Honeypots**: Dynamic decoy endpoints that learn from behavior
- **๐Ÿšซ Auto IP Blocking**: Immediate containment for high-confidence threats
- **๐Ÿง  Knowledge Base**: Learns attack patterns and improves over time
- **๐Ÿ”ฎ Predictive Intelligence**: Forecasts threats before exploitation

## ๐Ÿ” Security Scanning

- **๐Ÿ”‘ Secret Detection**: AWS keys, GitHub tokens, API keys, passwords
- **๐Ÿ“ฆ Dependency Analysis**: Vulnerable/missing Python packages
- **๐Ÿ’ป SAST Scanning**: SQL injection, XSS, command injection, path traversal
- **๐Ÿ› ๏ธ Auto-Fix**: Automatically remediate vulnerabilities
- **โšก Performance**: Sub-30ms response times with Redis caching

## ๐Ÿ“Š Real Results

DECOYABLE scanned its own codebase and found **24 security vulnerabilities** including:
- 8 hardcoded secrets
- 6 SQL injection vulnerabilities
- 5 command injection risks
- 3 path traversal issues
- 2 insecure configurations

**All caught before deployment.** ๐Ÿ›ก๏ธ

## ๐Ÿข Enterprise Validation

**Battle-tested at extreme scale:**
- โœ… **50,000+ files** (TensorFlow) scanned in **21 seconds**
- โœ… **315 Python files** from Linux Kernel processed at **221.8 files/second**
- โœ… **92% test coverage** with comprehensive validation
- โœ… **Sub-30ms response times** under extreme load
- โœ… **Zero false negatives** in secret detection

## โšก Installation

### PyPI (Recommended)
`ash
pip install decoyable
decoyable scan all
`

### Docker
`ash
docker-compose up -d
curl http://localhost:8000/api/v1/health
`

### From Source
`ash
git clone https://github.com/Kolerr-Lab/supper-decoyable.git
cd supper-decoyable
pip install -r requirements.txt
python -m decoyable.core.main scan all
`

## ๐Ÿ› ๏ธ Usage Guide

### Command Line
`ash
# Show help
decoyable --help

# Scan types
decoyable scan secrets    # API keys, passwords
decoyable scan deps       # Dependencies
decoyable scan sast       # Code vulnerabilities
decoyable scan all        # Everything

# AI analysis
decoyable ai-analyze . --dashboard
decoyable ai-status       # Check AI providers
`

### Web API
`ash
# Start FastAPI server
uvicorn decoyable.api.app:app --reload

# API endpoints
GET  /api/v1/health
POST /api/v1/scan/all
GET  /api/v1/results
`

### IDE Integration
DECOYABLE includes a **VS Code extension** for real-time security scanning:
- Real-time scanning on save/open
- AI-powered fixes in your editor
- Security issues panel
- Native IDE integration

## ๐Ÿ† Key Achievements

- **๐Ÿ”ฌ Scientific Validation**: 92% test coverage, extreme performance testing
- **๐Ÿข Enterprise Ready**: PostgreSQL, Redis, Kafka, Docker orchestration
- **๐Ÿค– AI Integration**: Multi-provider LLM with intelligent fallback
- **โšก Performance**: Sub-30ms scanning, massive codebase handling
- **๐Ÿ›ก๏ธ Security First**: Zero real vulnerabilities, comprehensive threat detection

## ๐Ÿ“š Documentation

- ๐Ÿ“– **[Full Documentation](https://github.com/Kolerr-Lab/supper-decoyable/wiki)**
- ๏ฟฝ๏ฟฝ **[Report Issues](https://github.com/Kolerr-Lab/supper-decoyable/issues)**
- ๐Ÿ‘ฅ **[Community](COMMUNITY.md)**
- โ˜• **[Support Us](https://buymeacoffee.com/rickykolerr)**

## ๐Ÿ“„ License

MIT License - see [LICENSE](LICENSE) for details.

---

**DECOYABLE: Making code unhackable, one scan at a time.** โšก๐Ÿ›ก๏ธ

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "decoyable",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.11",
    "maintainer_email": "Kolerr Lab <lab.kolerr@kolerr.com>",
    "keywords": "security, scanning, vulnerabilities, secrets, SAST, cybersecurity, honeypot, AI, defense",
    "author": null,
    "author_email": "Kolerr Lab <lab.kolerr@kolerr.com>",
    "download_url": "https://files.pythonhosted.org/packages/c0/81/1188b2786b2fbcb7048e40f5553ae65a338a30155ca279225070490b7775/decoyable-1.2.1.tar.gz",
    "platform": null,
    "description": "\ufeff# DECOYABLE - Make Your Code Unhackable\r\n\r\n[![CI](https://github.com/Kolerr-Lab/supper-decoyable/actions/workflows/ci.yml/badge.svg)](https://github.com/Kolerr-Lab/supper-decoyable/actions)\r\n[![License](https://img.shields.io/badge/license-MIT-blue.svg)](LICENSE)\r\n[![Python](https://img.shields.io/badge/python-3.11+-blue.svg)](https://python.org)\r\n[![PyPI version](https://img.shields.io/pypi/v/decoyable.svg)](https://pypi.org/project/decoyable/)\r\n[![Downloads](https://img.shields.io/pypi/dm/decoyable.svg)](https://pypi.org/project/decoyable/)\r\n[![Security](https://img.shields.io/badge/security-zero--real--vulns-brightgreen.svg)](SECURITY.md)\r\n[![Docker](https://img.shields.io/badge/docker-ready-blue.svg)](docker-compose.yml)\r\n[![AI-Powered](https://img.shields.io/badge/AI-powered-purple.svg)](README_AI_FEATURES.md)\r\n\r\n**Stop security vulnerabilities before they reach production.**\r\n\r\n\ud83d\udd0d **Find secrets, vulnerabilities, and attack patterns in your code**  \r\n\ud83d\udee1\ufe0f **Active defense with AI-powered honeypots**  \r\n\u26a1 **Sub-30ms scanning with enterprise-grade performance**  \r\n\ud83d\udce6 **Available on PyPI: pip install decoyable**\r\n\r\n## \ud83c\udf89 **Version 1.2.1 - Enterprise-Ready with 92% Test Coverage!**\r\n\r\n\ud83e\uddea **92% Test Coverage** - Comprehensive test suite validates all features  \r\n\ud83d\udd27 **Bug Fixes & Stability** - Fixed API endpoints, service registry, and CLI issues  \r\n\u26a1 **Performance Optimized** - SAST scanning detects 1550+ vulnerabilities in milliseconds  \r\n\ud83d\udee1\ufe0f **Enhanced Security** - Honeypot service with IP blocking and AI analysis  \r\n\ud83d\udcca **Database Integration** - PostgreSQL with Redis caching for enterprise deployments  \r\n\ud83d\udc33 **Docker Production Ready** - Full container orchestration with health checks  \r\n\ud83e\udd16 **AI Multi-Provider** - OpenAI, Claude, Ollama, Phi-3 with intelligent fallback  \r\n\ud83d\udd0d **Advanced Scanning** - Secrets, dependencies, SAST, and behavioral analysis  \r\n\ud83d\udcc8 **Production Metrics** - Prometheus integration for monitoring and alerting  \r\n\u2699\ufe0f **Enterprise Features** - Kafka streaming, adaptive defense, knowledge base\r\n\r\n## \ud83d\ude80 Quick Start (2 minutes)\r\n\r\n`\bash\r\n# Install from PyPI\r\npip install decoyable\r\n\r\n# Scan your code for security issues\r\ndecoyable scan all\r\n\r\n# Results example:\r\n\ud83d\udd0d Found 3 secrets in config.py\r\n\ud83d\udcbb SQL injection vulnerability in api.py\r\n\u2705 No dependency vulnerabilities\r\n`\r\n\r\n## \ud83e\udd16 AI-Powered Analysis\r\n\r\n**8 AI systems analyze your code in 0.43 seconds:**\r\n\r\n`\bash\r\n# Run comprehensive AI analysis with live dashboard\r\ndecoyable ai-analyze . --dashboard\r\n\r\n# Auto-deploy defensive honeypots based on findings\r\ndecoyable ai-analyze . --deploy-defense\r\n`\r\n\r\n**Features:**\r\n- \ud83e\udde0 **Predictive Threat Intelligence** (95% accuracy)\r\n- \ud83d\udd2e **Zero-day Detection** without signatures\r\n- \ud83e\uddec **Exploit Chain Detection** for multi-step attacks\r\n- \ud83d\udcca **Live Security Dashboard** with risk scoring\r\n- \ud83d\udee1\ufe0f **Defense Recommendations** and remediation steps\r\n\r\n## \ud83d\udee1\ufe0f Active Defense Features\r\n\r\n- **\ud83e\udd16 AI Attack Analysis**: Classifies attacks with 95%+ accuracy\r\n- **\ud83d\udd75\ufe0f Adaptive Honeypots**: Dynamic decoy endpoints that learn from behavior\r\n- **\ud83d\udeab Auto IP Blocking**: Immediate containment for high-confidence threats\r\n- **\ud83e\udde0 Knowledge Base**: Learns attack patterns and improves over time\r\n- **\ud83d\udd2e Predictive Intelligence**: Forecasts threats before exploitation\r\n\r\n## \ud83d\udd0d Security Scanning\r\n\r\n- **\ud83d\udd11 Secret Detection**: AWS keys, GitHub tokens, API keys, passwords\r\n- **\ud83d\udce6 Dependency Analysis**: Vulnerable/missing Python packages\r\n- **\ud83d\udcbb SAST Scanning**: SQL injection, XSS, command injection, path traversal\r\n- **\ud83d\udee0\ufe0f Auto-Fix**: Automatically remediate vulnerabilities\r\n- **\u26a1 Performance**: Sub-30ms response times with Redis caching\r\n\r\n## \ud83d\udcca Real Results\r\n\r\nDECOYABLE scanned its own codebase and found **24 security vulnerabilities** including:\r\n- 8 hardcoded secrets\r\n- 6 SQL injection vulnerabilities\r\n- 5 command injection risks\r\n- 3 path traversal issues\r\n- 2 insecure configurations\r\n\r\n**All caught before deployment.** \ud83d\udee1\ufe0f\r\n\r\n## \ud83c\udfe2 Enterprise Validation\r\n\r\n**Battle-tested at extreme scale:**\r\n- \u2705 **50,000+ files** (TensorFlow) scanned in **21 seconds**\r\n- \u2705 **315 Python files** from Linux Kernel processed at **221.8 files/second**\r\n- \u2705 **92% test coverage** with comprehensive validation\r\n- \u2705 **Sub-30ms response times** under extreme load\r\n- \u2705 **Zero false negatives** in secret detection\r\n\r\n## \u26a1 Installation\r\n\r\n### PyPI (Recommended)\r\n`\bash\r\npip install decoyable\r\ndecoyable scan all\r\n`\r\n\r\n### Docker\r\n`\bash\r\ndocker-compose up -d\r\ncurl http://localhost:8000/api/v1/health\r\n`\r\n\r\n### From Source\r\n`\bash\r\ngit clone https://github.com/Kolerr-Lab/supper-decoyable.git\r\ncd supper-decoyable\r\npip install -r requirements.txt\r\npython -m decoyable.core.main scan all\r\n`\r\n\r\n## \ud83d\udee0\ufe0f Usage Guide\r\n\r\n### Command Line\r\n`\bash\r\n# Show help\r\ndecoyable --help\r\n\r\n# Scan types\r\ndecoyable scan secrets    # API keys, passwords\r\ndecoyable scan deps       # Dependencies\r\ndecoyable scan sast       # Code vulnerabilities\r\ndecoyable scan all        # Everything\r\n\r\n# AI analysis\r\ndecoyable ai-analyze . --dashboard\r\ndecoyable ai-status       # Check AI providers\r\n`\r\n\r\n### Web API\r\n`\bash\r\n# Start FastAPI server\r\nuvicorn decoyable.api.app:app --reload\r\n\r\n# API endpoints\r\nGET  /api/v1/health\r\nPOST /api/v1/scan/all\r\nGET  /api/v1/results\r\n`\r\n\r\n### IDE Integration\r\nDECOYABLE includes a **VS Code extension** for real-time security scanning:\r\n- Real-time scanning on save/open\r\n- AI-powered fixes in your editor\r\n- Security issues panel\r\n- Native IDE integration\r\n\r\n## \ud83c\udfc6 Key Achievements\r\n\r\n- **\ud83d\udd2c Scientific Validation**: 92% test coverage, extreme performance testing\r\n- **\ud83c\udfe2 Enterprise Ready**: PostgreSQL, Redis, Kafka, Docker orchestration\r\n- **\ud83e\udd16 AI Integration**: Multi-provider LLM with intelligent fallback\r\n- **\u26a1 Performance**: Sub-30ms scanning, massive codebase handling\r\n- **\ud83d\udee1\ufe0f Security First**: Zero real vulnerabilities, comprehensive threat detection\r\n\r\n## \ud83d\udcda Documentation\r\n\r\n- \ud83d\udcd6 **[Full Documentation](https://github.com/Kolerr-Lab/supper-decoyable/wiki)**\r\n- \ufffd\ufffd **[Report Issues](https://github.com/Kolerr-Lab/supper-decoyable/issues)**\r\n- \ud83d\udc65 **[Community](COMMUNITY.md)**\r\n- \u2615 **[Support Us](https://buymeacoffee.com/rickykolerr)**\r\n\r\n## \ud83d\udcc4 License\r\n\r\nMIT License - see [LICENSE](LICENSE) for details.\r\n\r\n---\r\n\r\n**DECOYABLE: Making code unhackable, one scan at a time.** \u26a1\ud83d\udee1\ufe0f\r\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Next-Generation Active Cyber Defense Platform - Find secrets, vulnerabilities, and attack patterns in your code",
    "version": "1.2.1",
    "project_urls": {
        "Changelog": "https://github.com/Kolerr-Lab/supper-decoyable/blob/main/CHANGELOG.md",
        "Documentation": "https://github.com/Kolerr-Lab/supper-decoyable/wiki",
        "Homepage": "https://github.com/Kolerr-Lab/supper-decoyable",
        "Issues": "https://github.com/Kolerr-Lab/supper-decoyable/issues",
        "Repository": "https://github.com/Kolerr-Lab/supper-decoyable.git"
    },
    "split_keywords": [
        "security",
        " scanning",
        " vulnerabilities",
        " secrets",
        " sast",
        " cybersecurity",
        " honeypot",
        " ai",
        " defense"
    ],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "fa4500a04b2b8024c69dbf5d4fff6d316028a6c68702dddd0ec8cf7e4060bc8e",
                "md5": "1eb8690139f47061c63575ccee657178",
                "sha256": "77e77127b9ea709b2db3bbc9ae667a3537a9058275081c97fe17df6d97ce05ef"
            },
            "downloads": -1,
            "filename": "decoyable-1.2.1-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "1eb8690139f47061c63575ccee657178",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.11",
            "size": 159207,
            "upload_time": "2025-10-08T19:23:18",
            "upload_time_iso_8601": "2025-10-08T19:23:18.355523Z",
            "url": "https://files.pythonhosted.org/packages/fa/45/00a04b2b8024c69dbf5d4fff6d316028a6c68702dddd0ec8cf7e4060bc8e/decoyable-1.2.1-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "c0811188b2786b2fbcb7048e40f5553ae65a338a30155ca279225070490b7775",
                "md5": "efbdefe9fa088615ac51b174234f3d03",
                "sha256": "b3511973fcb6d52b0b10b5de99650196c24797e6f0bd60cf67a22431189c80b2"
            },
            "downloads": -1,
            "filename": "decoyable-1.2.1.tar.gz",
            "has_sig": false,
            "md5_digest": "efbdefe9fa088615ac51b174234f3d03",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.11",
            "size": 231921,
            "upload_time": "2025-10-08T19:23:20",
            "upload_time_iso_8601": "2025-10-08T19:23:20.207541Z",
            "url": "https://files.pythonhosted.org/packages/c0/81/1188b2786b2fbcb7048e40f5553ae65a338a30155ca279225070490b7775/decoyable-1.2.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-10-08 19:23:20",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "Kolerr-Lab",
    "github_project": "supper-decoyable",
    "github_not_found": true,
    "lcname": "decoyable"
}
        
Elapsed time: 2.35810s