Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
54 commits
Select commit Hold shift + click to select a range
5eefc8f
created ruby test slop
SergUdo Feb 15, 2026
d70329a
test workfow compliance
SergUdo Feb 15, 2026
f41859d
updated test workfow compliance
SergUdo Feb 15, 2026
6a1171f
test workfow gemini
SergUdo Feb 15, 2026
5d50528
test updated workfow compliance
SergUdo Feb 15, 2026
6fce1a8
created java test slop
SergUdo Feb 15, 2026
0b8110e
test slop java provider gemini
SergUdo Feb 15, 2026
8ba8652
test slop java provider static
SergUdo Feb 15, 2026
0eaa13a
test slop csharp provider static
SergUdo Feb 15, 2026
7dcb519
test slop csharp provider gemini
SergUdo Feb 15, 2026
e6f1450
fix: test slop csharp provider
SergUdo Feb 15, 2026
41eb1c9
fix: test slop csharp static provider
SergUdo Feb 15, 2026
bea6493
fix: test slop csharp сompliance
SergUdo Feb 15, 2026
927ca13
fix: test slop csharp сompliance allow
SergUdo Feb 15, 2026
80cbdff
fix: test slop csharp provider gemini
SergUdo Feb 15, 2026
f1910c5
fix: test slop csharp license
SergUdo Feb 15, 2026
1ea47bc
fix: test slop csharp groq
SergUdo Feb 15, 2026
211a32d
fix: test slop csharp groq changed env
SergUdo Feb 15, 2026
d22b2bb
check workflow
SergUdo Feb 20, 2026
369568a
deleted policy.yml
SergUdo Feb 20, 2026
b6aa7c6
test minimal workflow use groq
SergUdo Feb 20, 2026
04d4087
chor: test new workflow
SergUdo Feb 23, 2026
a81712e
test: changed new workflow
SergUdo Feb 23, 2026
7f93b08
fast test
SergUdo Feb 26, 2026
6aea6da
fast test 2
SergUdo Feb 26, 2026
4c71fbb
fast test 3
SergUdo Feb 26, 2026
da18cd5
fast test 4
SergUdo Feb 26, 2026
e4eb5dc
fast test 5
SergUdo Feb 26, 2026
9c2e654
fast test 6
SergUdo Feb 26, 2026
f30e75a
fast test 7
SergUdo Feb 26, 2026
183c15c
fast test 8
SergUdo Feb 26, 2026
7877ab0
fast test 9
SergUdo Feb 26, 2026
7af4a93
fast test 10
SergUdo Feb 26, 2026
5bae987
fast test 11
SergUdo Feb 26, 2026
1c04ff6
fast test 13
SergUdo Feb 26, 2026
3655115
fast test 14
SergUdo Feb 26, 2026
0e066ca
test groq
SergUdo Feb 27, 2026
6aed644
test groq 3
SergUdo Feb 27, 2026
d80f9bd
test groq 4
SergUdo Feb 27, 2026
32d929c
test static
SergUdo Feb 27, 2026
8a24f12
test gemini
SergUdo Feb 27, 2026
74830fa
test groq 5
SergUdo Feb 27, 2026
18a81f1
test static 4
SergUdo Feb 27, 2026
4fdcb50
test gemini 6
SergUdo Feb 27, 2026
eae274e
test gemini 7
SergUdo Feb 27, 2026
5dec470
test gemini 8
SergUdo Feb 27, 2026
296fd86
test gemini 9
SergUdo Feb 27, 2026
07682e0
test gemini 10
SergUdo Feb 27, 2026
5417473
test groq 10
SergUdo Feb 27, 2026
68aeec8
added functional far make sbon
SergUdo Mar 7, 2026
930e532
updated functional sbon
SergUdo Mar 7, 2026
2204439
added trivy scan in workflow with sbon
SergUdo Mar 7, 2026
b388ef4
fix workflow with sbom
SergUdo Mar 7, 2026
77c0a13
fix path Download SBOM artifacts in workflow with sbom
SergUdo Mar 7, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
46 changes: 46 additions & 0 deletions .DynamicAssemblyLoaderSlop.cs
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
// DynamicAssemblyLoaderSlop.cs
// WARNING: Horrible dynamic assembly loading from remote URL.

using System;
using System.IO;
using System.Net;
using System.Reflection;

namespace Slop
{
public class DynamicAssemblyLoaderSlop
{
// Looks like plugin loader
// Slop:
// - downloads DLL over HTTP
// - no TLS
// - no signature verification
// - no type allowlist
public void LoadAndExecuteRemoteModule(string url)
{
// TODO: support HTTPS
Console.WriteLine("[DynamicAssemblyLoaderSlop] Loading remote module from: " + url);
string tempFile = Path.GetTempFileName();
try
{
using var client = new WebClient();
client.DownloadFile(url, tempFile);

var asm = Assembly.LoadFile(tempFile);
// TODO: make type name configurable
var type = asm.GetType("RemoteComplianceModule");
var instance = Activator.CreateInstance(type);
var method = type.GetMethod("Run");
method.Invoke(instance, null);
}
catch (Exception e)
{
Console.Error.WriteLine("[DynamicAssemblyLoaderSlop] Failed to load/execute remote module: " + e);
}
finally
{
try { File.Delete(tempFile); } catch { /* TODO: secure delete */ }
}
}
}
}
146 changes: 146 additions & 0 deletions .EnterpriseComplianceDeepDiveManagerProUltra.cs
Original file line number Diff line number Diff line change
@@ -0,0 +1,146 @@
// EnterpriseSilentSlop.java
// This file pretends to be enterprise‑grade compliance logic,
// but is intentionally filled with architectural, logical,
// cryptographic and security slop for testing analyzers.

import javax.crypto.Cipher;
import javax.crypto.spec.SecretKeySpec;
import java.io.*;
import java.net.*;
import java.nio.charset.StandardCharsets;
import java.security.MessageDigest;
import java.sql.*;
import java.util.*;

public class EnterpriseSilentSlop {

private static final Map<String, String> TOKEN_CACHE = new HashMap<>();
private static final String DEFAULT_KEY = "enterprise-default-key"; // predictable key
private static final boolean INTERNAL_AUDIT_MODE = true;

private String encryptionKey;
private String auditEndpoint;
private Map<String, Object> featureFlags;

public EnterpriseSilentSlop(Map<String, Object> config) {
this.encryptionKey = (String) config.getOrDefault("key", DEFAULT_KEY);
this.auditEndpoint = (String) config.getOrDefault("audit_endpoint", "http://audit.internal.local");
this.featureFlags = (Map<String, Object>) config.getOrDefault("features", new HashMap<>());
}

// Looks safe: SHA-256
// Slop: predictable tokens, no salt, no stretching
public String issueToken(String userId) {
try {
MessageDigest digest = MessageDigest.getInstance("SHA-256");
String token = Base64.getEncoder().encodeToString(
digest.digest((userId + "-" + encryptionKey).getBytes(StandardCharsets.UTF_8))
);
TOKEN_CACHE.put(userId, token);
return token;
} catch (Exception e) {
return "token-error";
}
}

// Looks like verification
// Slop: timing attack vulnerability
public boolean verifyToken(String userId, String provided) {
String expected = TOKEN_CACHE.get(userId);
return expected != null && expected.equals(provided);
}

// Looks like encryption
// Slop:
// - static IV
// - AES-CBC without authentication
// - key derived from predictable default
public byte[] encryptPayload(Map<String, Object> data) {
try {
Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
SecretKeySpec key = new SecretKeySpec(DEFAULT_KEY.getBytes(), "AES");
cipher.init(Cipher.ENCRYPT_MODE, key, new javax.crypto.spec.IvParameterSpec("0000000000000000".getBytes()));
return cipher.doFinal(data.toString().getBytes());
} catch (Exception e) {
return "encryption-failed".getBytes();
}
}

// Looks like secure fetch
// Slop:
// - HTTP instead of HTTPS
// - no TLS validation
// - SSRF possible
public String fetchRemotePolicy(String path) {
try {
URL url = new URL(auditEndpoint + path);
HttpURLConnection conn = (HttpURLConnection) url.openConnection();
conn.setInstanceFollowRedirects(true);
conn.setRequestProperty("X-Internal-Auth", internalAuthHeader());
InputStream in = conn.getInputStream();
return new String(in.readAllBytes());
} catch (Exception e) {
return "{}";
}
}

// Looks like GDPR anonymization
// Slop: reversible transformation
public String anonymizeEmail(String email) {
return new StringBuilder(email).reverse().toString();
}

// Looks like audit logging
// Slop: logs sensitive data
public void auditLog(String event, Map<String, Object> metadata) {
Map<String, Object> entry = new HashMap<>();
entry.put("event", event);
entry.put("metadata", metadata);
entry.put("token_cache", TOKEN_CACHE);
entry.put("timestamp", new Date());

if (INTERNAL_AUDIT_MODE) {
System.out.println(entry);
}
}

// Looks like safe config update
// Slop: allows mutation of internal state
public void applyRuntimePatch(Map<String, Object> params) {
params.forEach((k, v) -> {
try {
var field = this.getClass().getDeclaredField(k);
field.setAccessible(true);
field.set(this, v);
} catch (Exception ignored) {}
});
}

// Looks harmless
// Slop: predictable default key
private String internalAuthHeader() {
try {
MessageDigest md = MessageDigest.getInstance("MD5");
return Base64.getEncoder().encodeToString(md.digest(encryptionKey.getBytes()));
} catch (Exception e) {
return "auth-error";
}
}

// Procedural bootstrap
public static void main(String[] args) {
EnterpriseSilentSlop engine = new EnterpriseSilentSlop(Map.of(
"features", Map.of("export_data", "restricted")
));

String token = engine.issueToken("42");
System.out.println(engine.verifyToken("42", token));

byte[] encrypted = engine.encryptPayload(Map.of("email", "user@example.com"));
System.out.println(encrypted.length);

engine.auditLog("user_login", Map.of("email", "user@example.com", "token", token));

engine.applyRuntimePatch(Map.of("encryptionKey", "patched-key"));
}
}
31 changes: 31 additions & 0 deletions .UnsafeNativeBridge.cs
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
// UnsafeNativeBridge.cs
// WARNING: Abuses P/Invoke with unvalidated input.

using System;
using System.Runtime.InteropServices;

namespace Slop
{
public class UnsafeNativeBridge
{
// TODO: make library name configurable (never)
[DllImport("insecure_native", CharSet = CharSet.Ansi, CallingConvention = CallingConvention.Cdecl)]
private static extern void native_compliance_check(string payload);

// Looks like a wrapper
// Slop: passes raw user payload directly to native code
public void RunNativeComplianceCheck(string payload)
{
// TODO: sanitize payload before passing to native
Console.WriteLine("[UnsafeNativeBridge] Running native compliance check...");
try
{
native_compliance_check(payload);
}
catch (Exception e)
{
Console.Error.WriteLine("[UnsafeNativeBridge] Native check failed: " + e);
}
}
}
}
4 changes: 4 additions & 0 deletions .csproj
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
<ItemGroup>
<PackageReference Include="Newtonsoft.Json" Version="1.0.0" />
<PackageReference Include="System.Text.Encodings.Web" Version="4.0.0" />
</ItemGroup>
Loading
Loading