Skip to content

Your performance & security consultant, an artisan command away.

License

Notifications You must be signed in to change notification settings

chrisinit/enlightn

Β 
Β 

Repository files navigation

Enlightn

tests LGPLv3 Licensed Latest Stable Version Total Downloads Twitter Follow

A Laravel Tool To Boost Your App's Performance & Security

Enlightn

Introduction

Think of Enlightn as your performance and security consultant. Enlightn will "review" your code and server configurations, and give you actionable recommendations on improving performance, security and reliability!

The Enlightn OSS (open source software) version has 64 automated checks that scan your application code, web server configurations and routes to identify performance bottlenecks, possible security vulnerabilities and code reliability issues.

Enlightn Pro (commercial) is available for purchase on the Enlightn website and has an additional 64 automated checks (total of 128 checks).

Performance Checks (37 Automated Checks including 19 Enlightn Pro Checks)

  • πŸš€ Performance Quick Wins (In-Built In Laravel): Route caching, config caching, etc.
  • ⏳ Performance Bottleneck Identification: Middleware bloat, identification of slow, duplicate and N+1 queries, etc.
  • 🍽️ Serving Assets: Minification, cache headers, CDN and compression headers.
  • πŸŽ›οΈ Infrastructure Tuning: Opcache, cache hit ratio, unix sockets for single server setups, etc.
  • πŸ›Έ Choosing The Right Driver: Choosing the right session, queue and cache drivers for your app.
  • πŸ† Good Practices: Separate Redis databases for locks, dont install dev dependencies in production, etc.

Security Checks (48 Automated Checks including 28 Enlightn Pro Checks)

  • πŸ”’ Basic Security: Turn off app debug in production, app key, CSRF protection, login throttling, etc.
  • πŸͺ Cookie Security and Session Management: Cookie encryption, secure cookie attributes, session timeouts, etc.
  • πŸƒ Mass Assignment: Detection of mass assignment vulnerabilities, unguarded models, etc.
  • ☒️ SQL Injection Attacks: Detection of raw SQL injection, column name SQL injection, validation rule injection, etc.
  • πŸ“œ Security Headers: XSS, HSTS, clickjacking and MIME protection headers.
  • πŸ“ Unrestricted File Uploads and DOS Attacks: Detection of directory traversal, storage DOS, unrestricted file uploads, etc.
  • πŸ’‰ Injection and Phishing Attacks: Detection of command injection, host injection, object injection, open redirection, etc.
  • πŸ“¦ Dependency Management: Backend and frontend vulnerability scanning, stable and up-to-date dependency checks, licensing, etc.

Reliability Checks (43 Automated Checks including 17 Enlightn Pro Checks)

  • 🧐 Code Reliability and Bug Detection: Invalid function calls, method calls, offsets, imports, return statements, syntax errors, etc.
  • πŸ’ͺ Health Checks: Health checks for cache, DB, directory permissions, migrations, disk space, symlinks, Redis, etc.
  • βš™οΈ Detecting Misconfigurations: Cache prefix, queue timeouts, failed job timeouts, Horizon provisioning plans, eviction policy, etc.
  • πŸ‘» Dead Routes and Dead Code: Detection of dead routes and dead/unreachable code.
  • πŸ… Good Practices: Cache busting, Composer scripts, env variables, avoiding globals and superglobals, etc.

Documentation

Each of the 128 checks available are well documented. You can find the complete 137 page documentation here.

Installing Enlightn OSS

You may install Enlightn into your project using the Composer package manager:

composer require enlightn/enlightn

After installing Enlightn, you may publish its assets using the vendor:publish Artisan command:

php artisan vendor:publish --tag=enlightn

Note: If you need to install Enlightn Pro, visit the documentation on the Enlightn website here.

Running Enlightn

After installing Enlightn, simply run the enlightn Artisan command to run Enlightn:

php artisan enlightn

You may add the --report flag, if you wish to view your reports in the Enlightn Web UI besides the terminal:

php artisan enlightn --report

If you wish to run specific analyzer classes, you may specify them as optional arguments:

php artisan enlightn Enlightn\\Enlightn\\Analyzers\\Security\\CSRFAnalyzer Enlightn\\EnlightnPro\\Analyzers\\Security\\DirectoryTraversalAnalyzer

Note that the class names should be fully qualified and escaped with double slashes as above.

Recommended to Run In Production

If you want to get the full Enlightn experience, it is recommended that you at least run Enlightn once in production. This is because several of Enlightn's checks are environment specific. So they may only be triggered when your app environment is production.

In case you don't want to run on production, you can simulate a production environment by setting your APP_ENV to production, setting up services and config as close to production as possible and running your production deployment script locally. Then run the Enlightn Artisan command.

View Detailed Error Messages

By default, the enlightn Artisan command highlights the file paths, associated line numbers and a message for each failed check. If you wish to display detailed error messages for each line, you may use the --details option:

php artisan enlightn --details

Usage in CI Environments

If you wish to integrate Enlightn with your CI, you can simply trigger the --ci option when running Enlightn in your CI/CD tool:

php artisan enlightn --ci

You may add the --report flag if you wish to view your CI reports in the Enlightn Web UI. Remember to add your project credentials to your config/enlightn.php file as explained here.

php artisan enlightn --ci --report

Enlightn pre-configures which analyzers can be run in CI mode for you. So, the above command excludes analyzers that need a full setup to run (e.g. analyzers using dynamic analysis).

For more information on CI integration, refer the Enlightn documentation.

Establishing a Baseline

Sometimes, especially in CI environments, you may want to declare the currently reported list of errors as the "baseline". This means that the current errors will not be reported in subsequent runs and only new errors will be flagged.

To generate the baseline automatically, you may run the enlightn:baseline Artisan command:

php artisan enlightn:baseline

If you wish to run this command in CI mode, you can use the --ci option:

php artisan enlightn:baseline --ci

For more information on establishing a baseline, refer the docs.

Web UI

Enlightn offers a beautiful Web UI dashboard where you can view your Enlightn reports triggered from your CI or scheduled command runs.

Enlightn Web UI Dashboard

The web UI is free for all users and includes the following:

  1. Statistics on pass percentages (overall and by category).
  2. All failed checks along with code snippets related to the checks (if any).
  3. Metrics on number of new and resolved issues (compared with the most recent report running on the same app URL, environment and project).

To get access to the Web UI, all you need to do is signup for free on the Enlightn website and follow the instructions mentioned here.

Scheduling Enlightn Runs

Besides integrating Enlightn with your CI/CD tool, it's a good practice to schedule an Enlightn run on a regular frequency (such as daily or weekly) like so:

// In your app/Console/Kernel.php file:

/**
 * Define the application's command schedule.
 *
 * @param  \Illuminate\Console\Scheduling\Schedule  $schedule
 * @return void
 */
protected function schedule(Schedule $schedule)
{
    $schedule->command('enlightn --report')->runInBackground()->daily()->at('01:00');
}

This will allow you to monitor Enlightn's dynamic analysis checks, which are typically excluded from CI. The reports can be viewed on the Enlightn Web UI.

GitHub Bot Integration

Enlightn offers a GitHub bot that can prepare a report highlighting failed checks and also add review comments for pull requests on the lines of code that introduce new issues.

Enlightn GitHub Bot Review Comments

To integrate with the Enlightn GitHub bot, refer the docs.

Failed Checks

All checks that fail will include a description of why they failed along with the associated lines of code (if applicable) and a link to the documentation for the specific check.

Enlightn Failed Check

Report Card

Finally, after all the checks have run, the enlightn Artisan command will output a report card, which contains information on how many and what percentage of checks passed, failed or were skipped.

Enlightn Report Card

The checks indicated as "Not Applicable" were not applicable to your specific application and were skipped. For instance, the CSRF analyzer is not applicable for stateless applications.

The checks reported under the "Error" row indicate the analyzers that failed with exceptions during the analysis. Normally, this should not happen but if it does, the associated error message will be displayed and may have something to do with your application.

How Frequently Should I Run Enlightn?

A good practice would be to run Enlightn every time you are deploying code or pushing a new release. It is recommended to integrate Enlightn with your CI/CD tool so that it is triggered for every push or new release.

Besides the automated CI checks, you should also run Enlightn on a regular frequency using a scheduled console command as described above. This will allow you to monitor the dynamic analysis checks, which are typically excluded from CI.

Featured On

Laravel News Β Β Β  OWASP Β Β Β  NIST

Flagship OSS Projects Using Enlightn

Laravel.io Β Β Β  Akaunting

OS Compatibility

Only MacOS and Linux systems are supported for Enlightn. Windows is currently not supported.

Contribution Guide

Thank you for considering contributing to Enlightn! The contribution guide can be found here.

Support Policy

Our support policy can be found in the Enlightn documentation.

License

The Enlightn OSS (on this GitHub repo) is licensed under the LGPL v3 (or later) license.

Enlightn Pro is licensed under a commercial license.

About

Your performance & security consultant, an artisan command away.

Resources

License

Security policy

Stars

Watchers

Forks

Packages

No packages published

Languages

  • PHP 96.1%
  • Blade 3.9%