Audit CouchDB will perform the following actions:
- Learn every possible fact about the couch, for example:
- What is the server configuration?
- What user accounts exist?
- What user roles exist?
- What databases exist?
- In each database, what is the security setting?
- In each design document, what are the validation functions?
- Given the facts, compare them against each other and warn if they imply a security concern, for example:
- You obviously didn't bother to click the "Security" link in the database page in Futon
- Published CVE alerts apply to your version of CouchDB
- A design document is missing a
- Helpful summaries of how many admins, normal users, and anonymous users can access each database
Currently, Audit CouchDB is a Node application distributed via NPM. Install it (globally) via
Next, run the tool with your CouchDB URL as a parameter. You should connect as an admin user, so Audit CouchDB can fetch all possible information (such as the configuration).
npm install -g audit_couchdb
The tool will output everything it knows about your couch's security.
To see how
audit_couchdbis working, set its log level to debug. It will show you each query it makes as it learns facts about your couch.
audit_couchdb --level=debug https://admin:secret@localhost:5984
Running from the Browser
Audit CouchDB is implemented as a library, depending on a back-end request library, and a front-end to display the output (simple console text output, or log4j if it is installed).
I recently re-implemented
requestin the browser as jQuery Request . Thus I am excited to see Audit CouchDB run on the browser, however I have not begun this work.