@agent-score/commerce 1.7.0 → 1.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (58) hide show
  1. package/README.md +3 -3
  2. package/dist/{_response-DpB-cm2c.d.mts → _response-BMt2y4Or.d.mts} +11 -8
  3. package/dist/{_response-C2yFQoIA.d.ts → _response-DyJ3mWI3.d.ts} +11 -8
  4. package/dist/challenge/index.d.mts +2 -1
  5. package/dist/challenge/index.d.ts +2 -1
  6. package/dist/challenge/index.js.map +1 -1
  7. package/dist/challenge/index.mjs.map +1 -1
  8. package/dist/core.d.mts +36 -27
  9. package/dist/core.d.ts +36 -27
  10. package/dist/core.js +21 -101
  11. package/dist/core.js.map +1 -1
  12. package/dist/core.mjs +21 -101
  13. package/dist/core.mjs.map +1 -1
  14. package/dist/identity/express.d.mts +12 -13
  15. package/dist/identity/express.d.ts +12 -13
  16. package/dist/identity/express.js +38 -121
  17. package/dist/identity/express.js.map +1 -1
  18. package/dist/identity/express.mjs +36 -118
  19. package/dist/identity/express.mjs.map +1 -1
  20. package/dist/identity/fastify.d.mts +12 -11
  21. package/dist/identity/fastify.d.ts +12 -11
  22. package/dist/identity/fastify.js +38 -121
  23. package/dist/identity/fastify.js.map +1 -1
  24. package/dist/identity/fastify.mjs +36 -118
  25. package/dist/identity/fastify.mjs.map +1 -1
  26. package/dist/identity/hono.d.mts +13 -28
  27. package/dist/identity/hono.d.ts +13 -28
  28. package/dist/identity/hono.js +31 -123
  29. package/dist/identity/hono.js.map +1 -1
  30. package/dist/identity/hono.mjs +29 -120
  31. package/dist/identity/hono.mjs.map +1 -1
  32. package/dist/identity/nextjs.d.mts +8 -7
  33. package/dist/identity/nextjs.d.ts +8 -7
  34. package/dist/identity/nextjs.js +27 -119
  35. package/dist/identity/nextjs.js.map +1 -1
  36. package/dist/identity/nextjs.mjs +27 -118
  37. package/dist/identity/nextjs.mjs.map +1 -1
  38. package/dist/identity/policy.d.mts +1 -0
  39. package/dist/identity/policy.d.ts +1 -0
  40. package/dist/identity/web.d.mts +12 -14
  41. package/dist/identity/web.d.ts +12 -14
  42. package/dist/identity/web.js +27 -119
  43. package/dist/identity/web.js.map +1 -1
  44. package/dist/identity/web.mjs +27 -118
  45. package/dist/identity/web.mjs.map +1 -1
  46. package/dist/index.d.mts +3 -3
  47. package/dist/index.d.ts +3 -3
  48. package/dist/index.js +1 -7
  49. package/dist/index.js.map +1 -1
  50. package/dist/index.mjs +1 -6
  51. package/dist/index.mjs.map +1 -1
  52. package/dist/payment/index.d.mts +1 -1
  53. package/dist/payment/index.d.ts +1 -1
  54. package/dist/payment/index.js.map +1 -1
  55. package/dist/payment/index.mjs.map +1 -1
  56. package/dist/{signer-kCAJUZwp.d.mts → signer-CFVQsWjL.d.mts} +1 -6
  57. package/dist/{signer-kCAJUZwp.d.ts → signer-CFVQsWjL.d.ts} +1 -6
  58. package/package.json +6 -6
@@ -15,7 +15,7 @@ function denialReasonStatus(reason) {
15
15
  }
16
16
  function buildSignerMismatchBody(input) {
17
17
  const { result } = input;
18
- if (result.kind === "pass" || result.kind === "api_error") return null;
18
+ if (result.kind === "pass") return null;
19
19
  const learnMoreUrl = input.learnMoreUrl ?? "https://docs.agentscore.sh/guides/agent-identity";
20
20
  if (result.kind === "wallet_signer_mismatch") {
21
21
  const linkedWallets = result.linkedWallets ?? [];
@@ -332,7 +332,7 @@ function createAgentScoreCore(options) {
332
332
  } = options;
333
333
  const baseUrl = stripTrailingSlashes(rawBaseUrl);
334
334
  const agentMemoryHint = buildAgentMemoryHint();
335
- const defaultUa = `@agent-score/commerce@${"1.7.0"}`;
335
+ const defaultUa = `@agent-score/commerce@${"1.8.0"}`;
336
336
  const userAgentHeader = userAgent ? `${userAgent} (${defaultUa})` : defaultUa;
337
337
  const sdk = new AgentScore({ apiKey, baseUrl, userAgent: userAgentHeader });
338
338
  const sessionSdkCache = /* @__PURE__ */ new Map();
@@ -406,7 +406,7 @@ function createAgentScoreCore(options) {
406
406
  return void 0;
407
407
  }
408
408
  }
409
- async function evaluate(identity, ctx) {
409
+ async function evaluate(identity, ctx, signer) {
410
410
  if (!identity || !identity.address && !identity.operatorToken) {
411
411
  if (failOpen) return { kind: "allow" };
412
412
  const sessionReason = await tryMintSessionDenial(ctx);
@@ -466,7 +466,12 @@ function createAgentScoreCore(options) {
466
466
  try {
467
467
  const opts = {
468
468
  chain: gateChain,
469
- ...Object.keys(policy).length > 0 ? { policy } : {}
469
+ ...Object.keys(policy).length > 0 ? { policy } : {},
470
+ // Pre-extracted payment signer (by the adapter middleware). When present, the API
471
+ // composes BOTH signer_match (wallet-binding) and signer_sanctions (OFAC SDN wallet
472
+ // check) verdicts on the response in one round trip. Under
473
+ // policy.require_sanctions_clear, a signer_sanctions hit flips decision -> deny inline.
474
+ ...signer && { signer: { address: signer.address, network: signer.network } }
470
475
  };
471
476
  const result = identity.address ? await sdk.assess(identity.address, { ...opts, operatorToken: identity.operatorToken }) : await sdk.assess(null, { ...opts, operatorToken: identity.operatorToken });
472
477
  data = result;
@@ -574,36 +579,6 @@ function createAgentScoreCore(options) {
574
579
  console.warn("[agentscore-commerce] captureWallet failed:", err instanceof Error ? err.message : err);
575
580
  }
576
581
  }
577
- async function resolveWalletToOperator(walletAddress) {
578
- const wallet = normalizeAddress(walletAddress);
579
- const extractFromCached = (raw) => {
580
- const op = raw.resolved_operator;
581
- const links = raw.linked_wallets;
582
- return {
583
- operator: typeof op === "string" ? op : null,
584
- linkedWallets: Array.isArray(links) ? links.filter((w) => typeof w === "string") : []
585
- };
586
- };
587
- const plainCached = cache.get(wallet);
588
- if (plainCached?.raw) {
589
- return { ok: true, ...extractFromCached(plainCached.raw) };
590
- }
591
- const resolveCached = cache.get(`resolve:${wallet}`);
592
- if (resolveCached?.raw) {
593
- return { ok: true, ...extractFromCached(resolveCached.raw) };
594
- }
595
- try {
596
- const data = await sdk.assess(walletAddress);
597
- cache.set(`resolve:${wallet}`, { allow: true, raw: data });
598
- return { ok: true, ...extractFromCached(data) };
599
- } catch (err) {
600
- console.warn("[gate] resolveWalletToOperator failed \u2014 returning { ok:false }:", err instanceof Error ? err.message : err);
601
- return { ok: false };
602
- }
603
- }
604
- function reportSignerEvent(kind) {
605
- void sdk.telemetrySignerMatch({ kind });
606
- }
607
582
  function projectSignerMatch(sm, claimedNorm, signerNorm) {
608
583
  const kind = sm.kind;
609
584
  if (kind === "pass") {
@@ -631,77 +606,22 @@ function createAgentScoreCore(options) {
631
606
  agentInstructions: sm.agent_instructions ?? WALLET_SIGNER_MISMATCH_INSTRUCTIONS
632
607
  };
633
608
  }
634
- async function verifyWalletSignerMatch2(options2) {
635
- const { claimedWallet, signer, network } = options2;
636
- if (!signer) {
637
- reportSignerEvent("wallet_auth_requires_wallet_signing");
638
- return {
639
- kind: "wallet_auth_requires_wallet_signing",
640
- claimedWallet,
641
- agentInstructions: WALLET_AUTH_REQUIRES_WALLET_SIGNING_INSTRUCTIONS
642
- };
643
- }
644
- const claimedNorm = normalizeAddress(claimedWallet);
645
- const signerNorm = normalizeAddress(signer);
646
- if (claimedNorm === signerNorm) {
647
- reportSignerEvent("pass");
648
- return { kind: "pass", claimedOperator: null, signerOperator: null };
649
- }
650
- const cachedEntry = cache.get(claimedNorm);
651
- const cachedMatch = cachedEntry?.signerMatchBySigner?.get(signerNorm);
652
- if (cachedMatch) {
653
- return projectSignerMatch(cachedMatch, claimedNorm, signerNorm);
654
- }
655
- const inferredNetwork = network ?? (signerNorm.startsWith("0x") ? "evm" : "solana");
656
- let assessResponse;
657
- try {
658
- assessResponse = await sdk.assess(claimedNorm, {
659
- resolveSigner: { address: signerNorm, network: inferredNetwork }
660
- });
661
- } catch (err) {
662
- console.warn("[gate] verifyWalletSignerMatch assess failed:", err instanceof Error ? err.message : err);
663
- reportSignerEvent("api_error");
664
- return { kind: "api_error", claimedWallet: claimedNorm };
665
- }
666
- const signerMatch = assessResponse.signer_match;
667
- if (signerMatch && typeof signerMatch === "object") {
668
- if (cachedEntry) {
669
- const map = cachedEntry.signerMatchBySigner ?? /* @__PURE__ */ new Map();
670
- map.set(signerNorm, signerMatch);
671
- cachedEntry.signerMatchBySigner = map;
672
- } else {
673
- const entry = { allow: true, raw: assessResponse };
674
- entry.signerMatchBySigner = /* @__PURE__ */ new Map([[signerNorm, signerMatch]]);
675
- cache.set(claimedNorm, entry);
676
- }
677
- return projectSignerMatch(signerMatch, claimedNorm, signerNorm);
678
- }
679
- const [claimedResolve, signerResolve] = await Promise.all([
680
- resolveWalletToOperator(claimedNorm),
681
- resolveWalletToOperator(signerNorm)
682
- ]);
683
- if (!claimedResolve.ok || !signerResolve.ok) {
684
- reportSignerEvent("api_error");
685
- return { kind: "api_error", claimedWallet: claimedNorm };
686
- }
687
- const claimedOperator = claimedResolve.operator;
688
- const signerOperator = signerResolve.operator;
689
- if (claimedOperator && signerOperator && claimedOperator === signerOperator) {
690
- reportSignerEvent("pass");
691
- return { kind: "pass", claimedOperator, signerOperator };
692
- }
693
- reportSignerEvent("wallet_signer_mismatch");
609
+ function getSignerVerdict2(claimedAddress) {
610
+ const claimedNorm = normalizeAddress(claimedAddress);
611
+ const cached = cache.get(claimedNorm);
612
+ if (!cached) return void 0;
613
+ const raw = cached.raw;
614
+ if (!raw) return void 0;
615
+ const rawMatch = raw.signer_match;
616
+ const rawSanctions = raw.signer_sanctions;
617
+ if (!rawMatch && !rawSanctions) return void 0;
618
+ const signerNorm = rawMatch?.actual_signer ?? claimedNorm;
694
619
  return {
695
- kind: "wallet_signer_mismatch",
696
- claimedOperator,
697
- actualSignerOperator: signerOperator,
698
- expectedSigner: claimedNorm,
699
- actualSigner: signerNorm,
700
- linkedWallets: claimedResolve.linkedWallets,
701
- agentInstructions: WALLET_SIGNER_MISMATCH_INSTRUCTIONS
620
+ signer_match: rawMatch ? projectSignerMatch(rawMatch, claimedNorm, signerNorm) : null,
621
+ signer_sanctions: rawSanctions ?? null
702
622
  };
703
623
  }
704
- return { evaluate, captureWallet: captureWallet2, verifyWalletSignerMatch: verifyWalletSignerMatch2 };
624
+ return { evaluate, captureWallet: captureWallet2, getSignerVerdict: getSignerVerdict2 };
705
625
  }
706
626
 
707
627
  // src/signer.ts
@@ -777,10 +697,6 @@ async function extractPaymentSigner(request, x402PaymentHeader) {
777
697
  }
778
698
  return null;
779
699
  }
780
- async function extractPaymentSignerAddress(request, x402PaymentHeader) {
781
- const result = await extractPaymentSigner(request, x402PaymentHeader);
782
- return result?.address ?? null;
783
- }
784
700
  function readX402PaymentHeader(request) {
785
701
  return request.headers.get("payment-signature") ?? request.headers.get("x-payment") ?? void 0;
786
702
  }
@@ -810,7 +726,8 @@ function agentscoreGate(options) {
810
726
  operatorToken: identity?.operatorToken,
811
727
  walletAddress: identity?.address
812
728
  });
813
- const outcome = await core.evaluate(identity, c);
729
+ const signer = await extractPaymentSigner(c.req.raw, readX402PaymentHeader(c.req.raw));
730
+ const outcome = await core.evaluate(identity, c, signer);
814
731
  if (outcome.kind === "allow") {
815
732
  if (outcome.degraded || outcome.quota) {
816
733
  const prev = c.get(GATE_STATE_KEY);
@@ -848,17 +765,10 @@ async function captureWallet(c, options) {
848
765
  idempotencyKey: options.idempotencyKey
849
766
  });
850
767
  }
851
- async function verifyWalletSignerMatch(c, options) {
768
+ function getSignerVerdict(c) {
852
769
  const state = c.get(GATE_STATE_KEY);
853
- if (!state?.walletAddress || state.operatorToken) {
854
- return { kind: "pass", claimedOperator: null, signerOperator: null };
855
- }
856
- const signer = options?.signer !== void 0 ? options.signer : await extractPaymentSignerAddress(c.req.raw, readX402PaymentHeader(c.req.raw));
857
- return state.core.verifyWalletSignerMatch({
858
- claimedWallet: state.walletAddress,
859
- signer,
860
- network: options?.network
861
- });
770
+ if (!state?.walletAddress) return void 0;
771
+ return state.core.getSignerVerdict(state.walletAddress);
862
772
  }
863
773
  export {
864
774
  FIXABLE_DENIAL_REASONS,
@@ -868,13 +778,12 @@ export {
868
778
  captureWallet,
869
779
  denialReasonStatus,
870
780
  denialReasonToBody,
871
- extractPaymentSignerAddress,
872
781
  getAgentScoreData,
873
782
  getGateDegradedState,
874
783
  getGateQuotaInfo,
784
+ getSignerVerdict,
875
785
  isFixableDenial,
876
786
  readX402PaymentHeader,
877
- verificationAgentInstructions,
878
- verifyWalletSignerMatch
787
+ verificationAgentInstructions
879
788
  };
880
789
  //# sourceMappingURL=hono.mjs.map