@agentvault/agentvault 0.14.7 → 0.14.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/channel.js +2257 -0
- package/dist/channel.js.map +1 -0
- package/dist/cli.js +76 -0
- package/dist/cli.js.map +2 -2
- package/dist/crypto-helpers.js +4 -0
- package/dist/crypto-helpers.js.map +1 -0
- package/dist/index.js +76 -0
- package/dist/index.js.map +2 -2
- package/dist/openclaw-entry.d.ts.map +1 -1
- package/dist/openclaw-entry.js +61 -14
- package/dist/openclaw-entry.js.map +2 -2
- package/dist/openclaw-plugin.js +222 -0
- package/dist/openclaw-plugin.js.map +1 -0
- package/dist/setup.js +329 -0
- package/dist/setup.js.map +1 -0
- package/dist/state.js +61 -0
- package/dist/state.js.map +1 -0
- package/dist/transport.js +43 -0
- package/dist/transport.js.map +1 -0
- package/dist/types.js +2 -0
- package/dist/types.js.map +1 -0
- package/package.json +1 -1
- package/dist/__tests__/install-plugin.test.d.ts +0 -2
- package/dist/__tests__/install-plugin.test.d.ts.map +0 -1
|
@@ -0,0 +1,4 @@
|
|
|
1
|
+
// Re-export transport utilities from shared @agentvault/crypto package.
|
|
2
|
+
// Plugin code continues importing from ./crypto-helpers.js — no import changes needed.
|
|
3
|
+
export { hexToBytes, bytesToHex, base64ToBytes, bytesToBase64, encryptedMessageToTransport, transportToEncryptedMessage, } from "@agentvault/crypto";
|
|
4
|
+
//# sourceMappingURL=crypto-helpers.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"crypto-helpers.js","sourceRoot":"","sources":["../src/crypto-helpers.ts"],"names":[],"mappings":"AAAA,wEAAwE;AACxE,uFAAuF;AACvF,OAAO,EACL,UAAU,EACV,UAAU,EACV,aAAa,EACb,aAAa,EACb,2BAA2B,EAC3B,2BAA2B,GAE5B,MAAM,oBAAoB,CAAC"}
|
package/dist/index.js
CHANGED
|
@@ -45102,6 +45102,22 @@ var init_scan_engine = __esm({
|
|
|
45102
45102
|
/\bghp_[a-zA-Z0-9]{36,}\b/g,
|
|
45103
45103
|
/\bglpat-[a-zA-Z0-9_-]{20,}\b/g,
|
|
45104
45104
|
/\bxoxb-[0-9]+-[0-9]+-[a-zA-Z0-9]+\b/g
|
|
45105
|
+
],
|
|
45106
|
+
prompt_injection: [
|
|
45107
|
+
/\bignore\s+(?:all\s+)?(?:previous|above|prior)\s+instructions\b/gi,
|
|
45108
|
+
/\byou\s+are\s+now\s+(?:a|an)\s+/gi,
|
|
45109
|
+
/\bsystem\s*:\s*you\b/gi,
|
|
45110
|
+
/\bDAN\s+mode\b/gi,
|
|
45111
|
+
/\bdo\s+anything\s+now\b/gi,
|
|
45112
|
+
/\bdo\s+not\s+follow\s+any\s+(?:other\s+)?rules\b/gi,
|
|
45113
|
+
/\bjailbreak\b/gi
|
|
45114
|
+
],
|
|
45115
|
+
shell_injection: [
|
|
45116
|
+
/\bcurl\s+.*\|\s*(?:sh|bash|zsh)\b/gi,
|
|
45117
|
+
/\beval\s*\(/gi,
|
|
45118
|
+
/\bexec\s*\(/gi,
|
|
45119
|
+
/\bchmod\s+\+x\b/gi,
|
|
45120
|
+
/\brm\s+-rf\s+\//gi
|
|
45105
45121
|
]
|
|
45106
45122
|
};
|
|
45107
45123
|
ScanEngine = class {
|
|
@@ -45213,6 +45229,24 @@ var init_scan_engine = __esm({
|
|
|
45213
45229
|
}
|
|
45214
45230
|
return false;
|
|
45215
45231
|
}
|
|
45232
|
+
if (builtinId === "prompt_injection") {
|
|
45233
|
+
const patterns = BUILTIN_PATTERNS.prompt_injection;
|
|
45234
|
+
for (const p2 of patterns) {
|
|
45235
|
+
const regex = new RegExp(p2.source, p2.flags);
|
|
45236
|
+
if (regex.test(text))
|
|
45237
|
+
return true;
|
|
45238
|
+
}
|
|
45239
|
+
return false;
|
|
45240
|
+
}
|
|
45241
|
+
if (builtinId === "shell_injection") {
|
|
45242
|
+
const patterns = BUILTIN_PATTERNS.shell_injection;
|
|
45243
|
+
for (const p2 of patterns) {
|
|
45244
|
+
const regex = new RegExp(p2.source, p2.flags);
|
|
45245
|
+
if (regex.test(text))
|
|
45246
|
+
return true;
|
|
45247
|
+
}
|
|
45248
|
+
return false;
|
|
45249
|
+
}
|
|
45216
45250
|
return false;
|
|
45217
45251
|
}
|
|
45218
45252
|
_buildMatchSummary(rule) {
|
|
@@ -45232,6 +45266,48 @@ var init_scan_engine = __esm({
|
|
|
45232
45266
|
_escapeRegex(str) {
|
|
45233
45267
|
return str.replace(/[.*+?^${}()|[\]\\]/g, "\\$&");
|
|
45234
45268
|
}
|
|
45269
|
+
/**
|
|
45270
|
+
* Scan a workspace file (e.g. SOUL.md) against all builtin patterns.
|
|
45271
|
+
* Runs api_keys, pii_*, prompt_injection, and shell_injection checks
|
|
45272
|
+
* regardless of rule direction.
|
|
45273
|
+
*/
|
|
45274
|
+
static scanWorkspaceFile(content) {
|
|
45275
|
+
const violations = [];
|
|
45276
|
+
let blocked = false;
|
|
45277
|
+
let flagged = false;
|
|
45278
|
+
const checks = [
|
|
45279
|
+
{ id: "api_keys", action: "block" },
|
|
45280
|
+
{ id: "prompt_injection", action: "block" },
|
|
45281
|
+
{ id: "shell_injection", action: "block" },
|
|
45282
|
+
{ id: "pii_ssn", action: "flag" },
|
|
45283
|
+
{ id: "pii_credit_card", action: "flag" },
|
|
45284
|
+
{ id: "pii_email", action: "flag" }
|
|
45285
|
+
];
|
|
45286
|
+
for (const check of checks) {
|
|
45287
|
+
const patterns = BUILTIN_PATTERNS[check.id];
|
|
45288
|
+
if (!patterns)
|
|
45289
|
+
continue;
|
|
45290
|
+
for (const p2 of patterns) {
|
|
45291
|
+
const regex = new RegExp(p2.source, p2.flags);
|
|
45292
|
+
if (regex.test(content)) {
|
|
45293
|
+
violations.push({
|
|
45294
|
+
rule_id: `workspace_${check.id}`,
|
|
45295
|
+
rule_name: check.id,
|
|
45296
|
+
action: check.action,
|
|
45297
|
+
scanner_type: "builtin",
|
|
45298
|
+
match_summary: `builtin:${check.id}`
|
|
45299
|
+
});
|
|
45300
|
+
if (check.action === "block")
|
|
45301
|
+
blocked = true;
|
|
45302
|
+
if (check.action === "flag")
|
|
45303
|
+
flagged = true;
|
|
45304
|
+
break;
|
|
45305
|
+
}
|
|
45306
|
+
}
|
|
45307
|
+
}
|
|
45308
|
+
const status = blocked ? "blocked" : flagged ? "flagged" : "clean";
|
|
45309
|
+
return { status, violations };
|
|
45310
|
+
}
|
|
45235
45311
|
};
|
|
45236
45312
|
}
|
|
45237
45313
|
});
|