Skip to content

BP202302/hexforge-security-lite

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

87 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

βš”οΈ HexForge Security Lite

Passive Web Security Analysis Β· Evidence-First Reports Β· Low-Noise Defensive Review



HexForge Security Lite is a source-available defensive scanner for passive web security analysis.

It transforms visible web signals into structured findings with severity, confidence, evidence, recommendations and human-readable reports.


Built for signal. Designed for clarity. Limited for safety.


🧭 Navigation

Section Purpose
Overview What HexForge Security Lite does
Live Demo Open the hosted Render version
Screenshots Visual proof of the interface and reports
Core Philosophy Why the project exists
What It Checks Passive security review areas
How It Works Internal workflow
Report Format How findings are presented
Architecture Repository and package structure
Quick Start Run locally or with Docker
API Programmatic usage
Testing Local validation
Safety Boundaries Responsible limits
Roadmap Future direction
Support Support development

πŸ›‘οΈ Overview

HexForge Security Lite is a lightweight passive security analysis platform for reviewing visible web security signals.

It helps developers, learners, researchers and defensive teams identify configuration issues and exposed client-side surface without using destructive techniques.

The goal is not to generate fear.
The goal is to generate understanding.

HexForge Lite focuses on:

  • clear findings
  • visible evidence
  • low-noise reports
  • safe passive review
  • structured recommendations
  • readable risk context
  • beginner-friendly interpretation
  • professional-looking output

πŸš€ Live Demo

Open the hosted version:

Useful routes:

/
 /scanner
 /results
 /health
 /api/meta
 /api/scan

Recommended safe target for first testing:

https://example.com

Use HexForge Lite only on systems you own, manage, or have explicit permission to review.


πŸ–ΌοΈ Screenshots

Landing Page

HexForge Security Lite landing page

Scanner Interface

HexForge Security Lite scanner interface

Report Overview

HexForge Security Lite report overview

Evidence and Recommendations

HexForge Security Lite evidence and recommendations


🧠 Core Philosophy

HexForge Security Lite is built around one idea:

A useful security tool should explain what it sees, not just throw alerts.

Signal over noise

Many scanners produce overwhelming output.
HexForge Lite is designed to keep findings structured, readable and review-oriented.

Evidence before hype

Every meaningful finding should answer:

Question Why it matters
What was observed? Shows the exact signal
Where was it found? Gives context and location
Why does it matter? Explains the security meaning
What should be reviewed? Provides the next step
How confident is it? Avoids exaggerated claims

Passive before aggressive

Lite is intentionally conservative.
It performs safe, read-only analysis and avoids intrusive behavior.

Human-readable by design

The output is designed for people, not only machines.
Findings are written so they can be understood, reviewed and explained.


πŸ” What It Checks

HexForge Lite focuses on visible and passive web security signals.

Browser security headers

Reviews common browser-facing protections such as:

  • Content-Security-Policy
  • Strict-Transport-Security
  • Referrer-Policy
  • Permissions-Policy
  • X-Content-Type-Options
  • iframe and clickjacking-related protections

HTTP and HTTPS posture

Observes:

  • HTTP status
  • HTTPS usage
  • redirects
  • exposed response metadata
  • transport-related clues
  • visible configuration gaps

Cookies

Checks observable cookie attributes:

  • Secure
  • HttpOnly
  • SameSite
  • cookie scope
  • browser-visible session posture

CORS

Identifies permissive or review-worthy CORS behavior and presents it with context.

Client-side surface

Extracts visible client-side references:

  • routes
  • linked scripts
  • API-like paths
  • forms
  • parameters
  • same-origin references
  • exposed frontend paths

Forms and parameters

Maps visible forms and parameters without submitting exploit payloads.

Discovery and metadata

Depending on the deployed modules, Lite may observe:

  • robots.txt
  • sitemap.xml
  • security.txt
  • HTML metadata
  • visible comments
  • linked resources
  • client-exposed hints

🧬 How It Works

Target URL
   β”‚
   β–Ό
Normalize URL
   β”‚
   β–Ό
Safe HTTP Fetch
   β”‚
   β–Ό
Passive HTML / Header / Surface Review
   β”‚
   β–Ό
Detection Modules
   β”‚
   β–Ό
Validation and Deduplication
   β”‚
   β–Ό
Risk Scoring
   β”‚
   β–Ό
Human-Readable Report

HexForge Lite does not attempt to prove exploitation automatically.
It collects visible signals and presents them for defensive review.


πŸ“Š Report Format

A HexForge Lite finding can include:

Field Meaning
Severity Critical, high, medium, low or informational
Confidence How reliable the observation is
Location Where the signal appeared
Evidence What was actually observed
Recommendation What should be reviewed or improved
Precision note Why the finding should not be exaggerated
Rule ID Internal reference for the finding

Example:

Finding: Missing browser hardening headers
Severity: Medium
Confidence: High
Location: HTTP response headers
Evidence: Missing Content-Security-Policy, Referrer-Policy and Permissions-Policy
Recommendation: Add browser hardening headers based on application behavior.
Precision: Confirmed from the HTTP response, but final impact depends on application context.

🧱 Architecture

HexForge Security Lite is organized as a modular Python project.

hexforge-security-lite/
β”œβ”€β”€ api/
β”‚   β”œβ”€β”€ handlers
β”‚   └── routes
β”‚
β”œβ”€β”€ assets/
β”‚   └── branding and visual resources
β”‚
β”œβ”€β”€ benchmarks/
β”‚   └── benchmark material
β”‚
β”œβ”€β”€ cli/
β”‚   └── command line entrypoints
β”‚
β”œβ”€β”€ datasets/
β”‚   └── controlled test and reference data
β”‚
β”œβ”€β”€ docs/
β”‚   └── documentation
β”‚
β”œβ”€β”€ examples/
β”‚   └── usage examples
β”‚
β”œβ”€β”€ frontend/
β”‚   └── frontend resources
β”‚
β”œβ”€β”€ hexforge_lite/
β”‚   β”œβ”€β”€ engine/
β”‚   β”œβ”€β”€ modules/
β”‚   β”œβ”€β”€ output/
β”‚   β”œβ”€β”€ scoring/
β”‚   β”œβ”€β”€ utils/
β”‚   β”œβ”€β”€ validators/
β”‚   β”œβ”€β”€ config.py
β”‚   β”œβ”€β”€ fetcher.py
β”‚   β”œβ”€β”€ models.py
β”‚   └── plugins.py
β”‚
β”œβ”€β”€ lab/
β”‚   └── lab resources
β”‚
β”œβ”€β”€ plugins/
β”‚   └── external or experimental plugin resources
β”‚
β”œβ”€β”€ rules/
β”‚   └── rule references
β”‚
β”œβ”€β”€ screenshots/
β”‚   β”œβ”€β”€ landing.png
β”‚   β”œβ”€β”€ scanner.png
β”‚   β”œβ”€β”€ report-overview.png
β”‚   └── evidence-recommendations.png
β”‚
β”œβ”€β”€ scripts/
β”‚   └── automation and checks
β”‚
β”œβ”€β”€ tests/
β”‚   └── test suite
β”‚
β”œβ”€β”€ website/
β”‚   β”œβ”€β”€ index.html
β”‚   β”œβ”€β”€ scanner.html
β”‚   β”œβ”€β”€ results.html
β”‚   β”œβ”€β”€ static.css
β”‚   └── i18n.js
β”‚
β”œβ”€β”€ Dockerfile
β”œβ”€β”€ README.md
β”œβ”€β”€ requirements.txt
β”œβ”€β”€ run.sh
└── server.py

βš™οΈ Quick Start

Run locally

git clone https://github.com/BP202302/hexforge-security-lite.git
cd hexforge-security-lite
pip install -r requirements.txt
python3 server.py

Open:

http://127.0.0.1:10000

If your environment uses a different port, use the port shown in your terminal.


Run with shell script

chmod +x run.sh
./run.sh

Run with Docker

docker build -t hexforge-security-lite .
docker run -p 10000:10000 hexforge-security-lite

Then open:

http://127.0.0.1:10000

🌐 API

Health check

GET /health

Metadata

GET /api/meta

Scan target

POST /api/scan
Content-Type: application/json

Example request:

{
  "target": "https://example.com"
}

Example response shape:

{
  "ok": true,
  "version": "1.9.0-stable",
  "target": "https://example.com",
  "findings": [],
  "risk_score": 0
}

πŸ§ͺ Testing

Run the test suite:

python3 -B -m unittest discover tests

Run self-checks if available:

python3 -B scripts/self_check.py

Recommended before every release:

python3 -B -m unittest discover tests
python3 -B scripts/self_check.py

🧩 Lite Modules

HexForge Lite can include passive modules for:

Module Area Purpose
Headers Browser and HTTP header review
TLS / HTTPS Transport posture observations
Cookies Cookie attribute inspection
CORS Cross-origin policy review
Discovery Visible metadata and discovery files
Forms Passive form mapping
Parameters Query and client-side parameter detection
Routes Visible path extraction
API-like references Client-side endpoint discovery
Comments Passive review of visible HTML comments
Metadata HTML and response metadata review
Resources Linked resource observation
Report output Structured result rendering

🧠 Result Interpretation

HexForge Lite findings are review guidance, not automatic proof of exploitation.

A missing header may be important.
A permissive CORS policy may require more context.
A visible route may be normal or sensitive depending on the application.
A client-side endpoint may be expected, internal, deprecated or worth reviewing.

The scanner provides the signal.
The reviewer decides the final impact.


πŸ”’ Safety Boundaries

HexForge Security Lite is intentionally limited.

Lite does

  • passive fetching
  • header analysis
  • TLS and HTTP observation
  • form discovery
  • route discovery
  • parameter discovery
  • client-side reference mapping
  • conservative findings
  • readable recommendations
  • safe report generation

Lite does not

  • brute force
  • credential attacks
  • destructive exploitation
  • unauthorized bypass attempts
  • heavy fuzzing
  • exploit chaining
  • payload automation against third-party targets
  • intrusive vulnerability exploitation

Use only on systems you own, manage, or have explicit permission to review.


🧭 Use Cases

Developer review

Check whether a web app exposes visible configuration weaknesses before publishing.

Security learning

Understand common web security signals through readable evidence.

Lab analysis

Use with intentionally vulnerable or controlled targets.

Portfolio project

Show a real security tool with UI, API, reports and deployable architecture.

Blue team visibility

Perform quick passive review of visible posture and browser-facing configuration.

Pre-audit preparation

Collect visible findings before deeper authorized manual validation.


πŸ—οΈ Product Positioning

HexForge Lite is the public Lite edition of the HexForge ecosystem.

Edition Purpose
Lite Public source-available defensive scanner
Pro Future advanced individual workflow
Specter Future premium or enterprise direction

The Lite repository should remain:

Clean.
Safe.
Readable.
Public-facing.
Useful.
Non-destructive.

Advanced commercial functionality should remain separate from the Lite public repository.


πŸ—ΊοΈ Roadmap

Version Focus
v1.9.x Stabilization, cleanup, documentation and demo polish
v2.x Better reports, stronger module organization and improved CLI
v3.x Visual mapping, richer exports and deeper workflow support
Pro track Separate private or commercial direction
Specter track Premium or enterprise direction

🧾 Release Checklist

Before publishing a new version:

Run tests
Run self-check
Confirm Render deploy
Confirm /scanner works
Confirm /results works
Confirm README version
Confirm CHANGELOG
Create tag
Create release ZIP

Suggested release names:

v1.9.0-stable
v1.9.1-clean
v1.9.2-stable
v2.0.0-lite

πŸ’Ž Why This Project Matters

Security tools should not only find things.
They should explain them.

HexForge Lite exists because useful security review needs:

  • clear findings
  • visible evidence
  • safe workflows
  • practical recommendations
  • controlled scope
  • honest severity
  • readable reports
  • low-noise interpretation

The goal is not to generate fear.
The goal is to generate understanding.


🀝 Contributing

Good contribution areas:

  • passive modules
  • report readability
  • translations
  • UI polish
  • test cases
  • documentation
  • safer validation logic
  • performance improvements
  • false positive reduction

Contributions should preserve the Lite philosophy:

Safe.
Passive.
Readable.
Evidence-first.
Low-noise.

πŸ’° Support the Project

If HexForge Security Lite helps you, you can support development here:

Official site:


βš–οΈ Responsible Use

HexForge Security Lite is intended for educational, defensive and authorized security review.

Do not use this tool against systems without permission.

You are responsible for your own usage.


πŸ“„ License and Usage

HexForge Security Lite is a source-available Lite edition.

Review the repository license before using, modifying, redistributing or deploying this software.

Commercial use may require explicit permission depending on the license terms.


HexForge Security Lite

Built for signal. Designed for clarity. Limited for safety.



HexForge Security Lite Β· v1.9.0-stable

About

Open-source web security analysis tool for basic vulnerability checks.

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors