@build-astron-co/nimbus 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -0
- package/README.md +628 -0
- package/bin/nimbus +38 -0
- package/package.json +80 -0
- package/src/__tests__/app.test.ts +76 -0
- package/src/__tests__/audit.test.ts +877 -0
- package/src/__tests__/circuit-breaker.test.ts +116 -0
- package/src/__tests__/cli-run.test.ts +115 -0
- package/src/__tests__/context-manager.test.ts +502 -0
- package/src/__tests__/context.test.ts +242 -0
- package/src/__tests__/enterprise.test.ts +401 -0
- package/src/__tests__/generator.test.ts +433 -0
- package/src/__tests__/hooks.test.ts +582 -0
- package/src/__tests__/init.test.ts +436 -0
- package/src/__tests__/intent-parser.test.ts +229 -0
- package/src/__tests__/llm-router.test.ts +209 -0
- package/src/__tests__/lsp.test.ts +293 -0
- package/src/__tests__/modes.test.ts +336 -0
- package/src/__tests__/permissions.test.ts +338 -0
- package/src/__tests__/serve.test.ts +275 -0
- package/src/__tests__/sessions.test.ts +227 -0
- package/src/__tests__/sharing.test.ts +288 -0
- package/src/__tests__/snapshots.test.ts +581 -0
- package/src/__tests__/state-db.test.ts +334 -0
- package/src/__tests__/stream-with-tools.test.ts +732 -0
- package/src/__tests__/subagents.test.ts +176 -0
- package/src/__tests__/system-prompt.test.ts +169 -0
- package/src/__tests__/tool-converter.test.ts +256 -0
- package/src/__tests__/tool-schemas.test.ts +397 -0
- package/src/__tests__/tools.test.ts +143 -0
- package/src/__tests__/version.test.ts +49 -0
- package/src/agent/compaction-agent.ts +227 -0
- package/src/agent/context-manager.ts +435 -0
- package/src/agent/context.ts +427 -0
- package/src/agent/deploy-preview.ts +426 -0
- package/src/agent/index.ts +68 -0
- package/src/agent/loop.ts +717 -0
- package/src/agent/modes.ts +429 -0
- package/src/agent/permissions.ts +466 -0
- package/src/agent/subagents/base.ts +116 -0
- package/src/agent/subagents/cost.ts +51 -0
- package/src/agent/subagents/explore.ts +42 -0
- package/src/agent/subagents/general.ts +54 -0
- package/src/agent/subagents/index.ts +102 -0
- package/src/agent/subagents/infra.ts +59 -0
- package/src/agent/subagents/security.ts +69 -0
- package/src/agent/system-prompt.ts +436 -0
- package/src/app.ts +122 -0
- package/src/audit/activity-log.ts +290 -0
- package/src/audit/compliance-checker.ts +540 -0
- package/src/audit/cost-tracker.ts +318 -0
- package/src/audit/index.ts +23 -0
- package/src/audit/security-scanner.ts +596 -0
- package/src/auth/guard.ts +75 -0
- package/src/auth/index.ts +56 -0
- package/src/auth/oauth.ts +455 -0
- package/src/auth/providers.ts +470 -0
- package/src/auth/sso.ts +113 -0
- package/src/auth/store.ts +505 -0
- package/src/auth/types.ts +187 -0
- package/src/build.ts +141 -0
- package/src/cli/index.ts +16 -0
- package/src/cli/init.ts +854 -0
- package/src/cli/openapi-spec.ts +356 -0
- package/src/cli/run.ts +237 -0
- package/src/cli/serve-auth.ts +80 -0
- package/src/cli/serve.ts +462 -0
- package/src/cli/web.ts +67 -0
- package/src/cli.ts +1417 -0
- package/src/clients/core-engine-client.ts +227 -0
- package/src/clients/enterprise-client.ts +334 -0
- package/src/clients/generator-client.ts +351 -0
- package/src/clients/git-client.ts +627 -0
- package/src/clients/github-client.ts +410 -0
- package/src/clients/helm-client.ts +504 -0
- package/src/clients/index.ts +80 -0
- package/src/clients/k8s-client.ts +497 -0
- package/src/clients/llm-client.ts +161 -0
- package/src/clients/rest-client.ts +130 -0
- package/src/clients/service-discovery.ts +33 -0
- package/src/clients/terraform-client.ts +482 -0
- package/src/clients/tools-client.ts +1843 -0
- package/src/clients/ws-client.ts +115 -0
- package/src/commands/analyze/index.ts +352 -0
- package/src/commands/apply/helm.ts +473 -0
- package/src/commands/apply/index.ts +213 -0
- package/src/commands/apply/k8s.ts +454 -0
- package/src/commands/apply/terraform.ts +582 -0
- package/src/commands/ask.ts +167 -0
- package/src/commands/audit/index.ts +238 -0
- package/src/commands/auth-cloud.ts +294 -0
- package/src/commands/auth-list.ts +134 -0
- package/src/commands/auth-profile.ts +121 -0
- package/src/commands/auth-status.ts +141 -0
- package/src/commands/aws/ec2.ts +501 -0
- package/src/commands/aws/iam.ts +397 -0
- package/src/commands/aws/index.ts +133 -0
- package/src/commands/aws/lambda.ts +396 -0
- package/src/commands/aws/rds.ts +439 -0
- package/src/commands/aws/s3.ts +439 -0
- package/src/commands/aws/vpc.ts +393 -0
- package/src/commands/aws-discover.ts +649 -0
- package/src/commands/aws-terraform.ts +805 -0
- package/src/commands/azure/aks.ts +376 -0
- package/src/commands/azure/functions.ts +253 -0
- package/src/commands/azure/index.ts +116 -0
- package/src/commands/azure/storage.ts +478 -0
- package/src/commands/azure/vm.ts +355 -0
- package/src/commands/billing/index.ts +256 -0
- package/src/commands/chat.ts +314 -0
- package/src/commands/config.ts +346 -0
- package/src/commands/cost/cloud-cost-estimator.ts +266 -0
- package/src/commands/cost/estimator.ts +79 -0
- package/src/commands/cost/index.ts +594 -0
- package/src/commands/cost/parsers/terraform.ts +273 -0
- package/src/commands/cost/parsers/types.ts +25 -0
- package/src/commands/cost/pricing/aws.ts +544 -0
- package/src/commands/cost/pricing/azure.ts +499 -0
- package/src/commands/cost/pricing/gcp.ts +396 -0
- package/src/commands/cost/pricing/index.ts +40 -0
- package/src/commands/demo.ts +250 -0
- package/src/commands/doctor.ts +794 -0
- package/src/commands/drift/index.ts +439 -0
- package/src/commands/explain.ts +277 -0
- package/src/commands/feedback.ts +389 -0
- package/src/commands/fix.ts +324 -0
- package/src/commands/fs/index.ts +402 -0
- package/src/commands/gcp/compute.ts +325 -0
- package/src/commands/gcp/functions.ts +271 -0
- package/src/commands/gcp/gke.ts +438 -0
- package/src/commands/gcp/iam.ts +344 -0
- package/src/commands/gcp/index.ts +129 -0
- package/src/commands/gcp/storage.ts +284 -0
- package/src/commands/generate-helm.ts +1249 -0
- package/src/commands/generate-k8s.ts +1560 -0
- package/src/commands/generate-terraform.ts +1460 -0
- package/src/commands/gh/index.ts +863 -0
- package/src/commands/git/index.ts +1343 -0
- package/src/commands/helm/index.ts +1126 -0
- package/src/commands/help.ts +539 -0
- package/src/commands/history.ts +142 -0
- package/src/commands/import.ts +868 -0
- package/src/commands/index.ts +367 -0
- package/src/commands/init.ts +1046 -0
- package/src/commands/k8s/index.ts +1137 -0
- package/src/commands/login.ts +631 -0
- package/src/commands/logout.ts +83 -0
- package/src/commands/onboarding.ts +228 -0
- package/src/commands/plan/display.ts +279 -0
- package/src/commands/plan/index.ts +599 -0
- package/src/commands/preview.ts +452 -0
- package/src/commands/questionnaire.ts +1270 -0
- package/src/commands/resume.ts +55 -0
- package/src/commands/team/index.ts +346 -0
- package/src/commands/template.ts +232 -0
- package/src/commands/tf/index.ts +1034 -0
- package/src/commands/upgrade.ts +550 -0
- package/src/commands/usage/index.ts +134 -0
- package/src/commands/version.ts +170 -0
- package/src/compat/index.ts +2 -0
- package/src/compat/runtime.ts +12 -0
- package/src/compat/sqlite.ts +107 -0
- package/src/config/index.ts +17 -0
- package/src/config/manager.ts +530 -0
- package/src/config/safety-policy.ts +358 -0
- package/src/config/schema.ts +125 -0
- package/src/config/types.ts +527 -0
- package/src/context/context-db.ts +199 -0
- package/src/demo/index.ts +349 -0
- package/src/demo/scenarios/full-journey.ts +229 -0
- package/src/demo/scenarios/getting-started.ts +127 -0
- package/src/demo/scenarios/helm-release.ts +341 -0
- package/src/demo/scenarios/k8s-deployment.ts +194 -0
- package/src/demo/scenarios/terraform-vpc.ts +170 -0
- package/src/demo/types.ts +92 -0
- package/src/engine/cost-estimator.ts +438 -0
- package/src/engine/diagram-generator.ts +256 -0
- package/src/engine/drift-detector.ts +902 -0
- package/src/engine/executor.ts +1035 -0
- package/src/engine/index.ts +76 -0
- package/src/engine/orchestrator.ts +636 -0
- package/src/engine/planner.ts +720 -0
- package/src/engine/safety.ts +743 -0
- package/src/engine/verifier.ts +770 -0
- package/src/enterprise/audit.ts +348 -0
- package/src/enterprise/auth.ts +270 -0
- package/src/enterprise/billing.ts +822 -0
- package/src/enterprise/index.ts +17 -0
- package/src/enterprise/teams.ts +443 -0
- package/src/generator/best-practices.ts +1608 -0
- package/src/generator/helm.ts +630 -0
- package/src/generator/index.ts +37 -0
- package/src/generator/intent-parser.ts +514 -0
- package/src/generator/kubernetes.ts +976 -0
- package/src/generator/terraform.ts +1867 -0
- package/src/history/index.ts +8 -0
- package/src/history/manager.ts +322 -0
- package/src/history/types.ts +34 -0
- package/src/hooks/config.ts +432 -0
- package/src/hooks/engine.ts +391 -0
- package/src/hooks/index.ts +4 -0
- package/src/llm/auth-bridge.ts +198 -0
- package/src/llm/circuit-breaker.ts +140 -0
- package/src/llm/config-loader.ts +201 -0
- package/src/llm/cost-calculator.ts +171 -0
- package/src/llm/index.ts +8 -0
- package/src/llm/model-aliases.ts +115 -0
- package/src/llm/provider-registry.ts +63 -0
- package/src/llm/providers/anthropic.ts +433 -0
- package/src/llm/providers/bedrock.ts +477 -0
- package/src/llm/providers/google.ts +405 -0
- package/src/llm/providers/ollama.ts +767 -0
- package/src/llm/providers/openai-compatible.ts +340 -0
- package/src/llm/providers/openai.ts +328 -0
- package/src/llm/providers/openrouter.ts +338 -0
- package/src/llm/router.ts +1035 -0
- package/src/llm/types.ts +232 -0
- package/src/lsp/client.ts +298 -0
- package/src/lsp/languages.ts +116 -0
- package/src/lsp/manager.ts +278 -0
- package/src/mcp/client.ts +402 -0
- package/src/mcp/index.ts +5 -0
- package/src/mcp/manager.ts +133 -0
- package/src/nimbus.ts +214 -0
- package/src/plugins/index.ts +27 -0
- package/src/plugins/loader.ts +334 -0
- package/src/plugins/manager.ts +376 -0
- package/src/plugins/types.ts +284 -0
- package/src/scanners/cicd-scanner.ts +258 -0
- package/src/scanners/cloud-scanner.ts +466 -0
- package/src/scanners/framework-scanner.ts +469 -0
- package/src/scanners/iac-scanner.ts +388 -0
- package/src/scanners/index.ts +539 -0
- package/src/scanners/language-scanner.ts +276 -0
- package/src/scanners/package-manager-scanner.ts +277 -0
- package/src/scanners/types.ts +172 -0
- package/src/sessions/manager.ts +365 -0
- package/src/sessions/types.ts +44 -0
- package/src/sharing/sync.ts +296 -0
- package/src/sharing/viewer.ts +97 -0
- package/src/snapshots/index.ts +2 -0
- package/src/snapshots/manager.ts +530 -0
- package/src/state/artifacts.ts +147 -0
- package/src/state/audit.ts +137 -0
- package/src/state/billing.ts +240 -0
- package/src/state/checkpoints.ts +117 -0
- package/src/state/config.ts +67 -0
- package/src/state/conversations.ts +14 -0
- package/src/state/credentials.ts +154 -0
- package/src/state/db.ts +58 -0
- package/src/state/index.ts +26 -0
- package/src/state/messages.ts +115 -0
- package/src/state/projects.ts +123 -0
- package/src/state/schema.ts +236 -0
- package/src/state/sessions.ts +147 -0
- package/src/state/teams.ts +200 -0
- package/src/telemetry.ts +108 -0
- package/src/tools/aws-ops.ts +952 -0
- package/src/tools/azure-ops.ts +579 -0
- package/src/tools/file-ops.ts +593 -0
- package/src/tools/gcp-ops.ts +625 -0
- package/src/tools/git-ops.ts +773 -0
- package/src/tools/github-ops.ts +799 -0
- package/src/tools/helm-ops.ts +943 -0
- package/src/tools/index.ts +17 -0
- package/src/tools/k8s-ops.ts +819 -0
- package/src/tools/schemas/converter.ts +184 -0
- package/src/tools/schemas/devops.ts +612 -0
- package/src/tools/schemas/index.ts +73 -0
- package/src/tools/schemas/standard.ts +1144 -0
- package/src/tools/schemas/types.ts +705 -0
- package/src/tools/terraform-ops.ts +862 -0
- package/src/types/ambient.d.ts +193 -0
- package/src/types/config.ts +83 -0
- package/src/types/drift.ts +116 -0
- package/src/types/enterprise.ts +335 -0
- package/src/types/index.ts +20 -0
- package/src/types/plan.ts +44 -0
- package/src/types/request.ts +65 -0
- package/src/types/response.ts +54 -0
- package/src/types/service.ts +51 -0
- package/src/ui/App.tsx +997 -0
- package/src/ui/DeployPreview.tsx +169 -0
- package/src/ui/Header.tsx +68 -0
- package/src/ui/InputBox.tsx +350 -0
- package/src/ui/MessageList.tsx +585 -0
- package/src/ui/PermissionPrompt.tsx +151 -0
- package/src/ui/StatusBar.tsx +158 -0
- package/src/ui/ToolCallDisplay.tsx +409 -0
- package/src/ui/chat-ui.ts +853 -0
- package/src/ui/index.ts +33 -0
- package/src/ui/ink/index.ts +711 -0
- package/src/ui/streaming.ts +176 -0
- package/src/ui/types.ts +57 -0
- package/src/utils/analytics.ts +72 -0
- package/src/utils/cost-warning.ts +27 -0
- package/src/utils/env.ts +46 -0
- package/src/utils/errors.ts +69 -0
- package/src/utils/event-bus.ts +38 -0
- package/src/utils/index.ts +24 -0
- package/src/utils/logger.ts +171 -0
- package/src/utils/rate-limiter.ts +121 -0
- package/src/utils/service-auth.ts +49 -0
- package/src/utils/validation.ts +53 -0
- package/src/version.ts +4 -0
- package/src/watcher/index.ts +163 -0
- package/src/wizard/approval.ts +383 -0
- package/src/wizard/index.ts +25 -0
- package/src/wizard/prompts.ts +338 -0
- package/src/wizard/types.ts +171 -0
- package/src/wizard/ui.ts +556 -0
- package/src/wizard/wizard.ts +304 -0
- package/tsconfig.json +24 -0
|
@@ -0,0 +1,466 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Permission Engine
|
|
3
|
+
*
|
|
4
|
+
* 4-tier permission system that controls tool execution:
|
|
5
|
+
* - Tier 1 (auto_allow): Reads, validates — no prompt needed
|
|
6
|
+
* - Tier 2 (ask_once): Edits, non-destructive bash — ask once per session
|
|
7
|
+
* - Tier 3 (always_ask): terraform apply, kubectl delete — always prompt
|
|
8
|
+
* - Tier 4 (blocked): rm -rf /, DROP DATABASE — never allow
|
|
9
|
+
*
|
|
10
|
+
* The engine evaluates permissions in the following precedence order:
|
|
11
|
+
* 1. User config overrides (`~/.nimbus/config.yaml`)
|
|
12
|
+
* 2. Tool-specific pattern matching (bash, kubectl, terraform, helm)
|
|
13
|
+
* 3. The tool's declared {@link PermissionTier}
|
|
14
|
+
*
|
|
15
|
+
* Session-level state tracks which tools have been approved via "ask once",
|
|
16
|
+
* so users are not repeatedly prompted for the same non-destructive tool
|
|
17
|
+
* within a single session.
|
|
18
|
+
*
|
|
19
|
+
* @module agent/permissions
|
|
20
|
+
*/
|
|
21
|
+
|
|
22
|
+
import type { ToolDefinition, PermissionTier } from '../tools/schemas/types';
|
|
23
|
+
|
|
24
|
+
// ---------------------------------------------------------------------------
|
|
25
|
+
// Public Types
|
|
26
|
+
// ---------------------------------------------------------------------------
|
|
27
|
+
|
|
28
|
+
/** Result of a permission check. */
|
|
29
|
+
export type PermissionDecision = 'allow' | 'ask' | 'block';
|
|
30
|
+
|
|
31
|
+
/** Full context passed to a permission check. */
|
|
32
|
+
export interface PermissionContext {
|
|
33
|
+
/** The tool being invoked. */
|
|
34
|
+
tool: ToolDefinition;
|
|
35
|
+
/** The parsed input arguments. */
|
|
36
|
+
input: unknown;
|
|
37
|
+
/** Session-level state for ask-once tracking. */
|
|
38
|
+
sessionState: PermissionSessionState;
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
/** Tracks which tools have been approved in the current session. */
|
|
42
|
+
export interface PermissionSessionState {
|
|
43
|
+
/** Tools that have been approved for the session (ask-once). */
|
|
44
|
+
approvedTools: Set<string>;
|
|
45
|
+
/** Specific tool+action combos that have been approved. */
|
|
46
|
+
approvedActions: Set<string>;
|
|
47
|
+
}
|
|
48
|
+
|
|
49
|
+
/**
|
|
50
|
+
* User permission configuration (loaded from `~/.nimbus/config.yaml`).
|
|
51
|
+
*
|
|
52
|
+
* Allows operators to tighten or loosen defaults without modifying code.
|
|
53
|
+
*/
|
|
54
|
+
export interface PermissionConfig {
|
|
55
|
+
/** Override permission tier for specific tools. */
|
|
56
|
+
toolOverrides?: Record<string, PermissionTier>;
|
|
57
|
+
/** Bash commands that are auto-allowed (glob patterns). */
|
|
58
|
+
autoAllowBashPatterns?: string[];
|
|
59
|
+
/** Bash commands that are always blocked (glob patterns). */
|
|
60
|
+
blockedBashPatterns?: string[];
|
|
61
|
+
/** K8s namespaces that require always-ask. */
|
|
62
|
+
protectedNamespaces?: string[];
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
// ---------------------------------------------------------------------------
|
|
66
|
+
// Blocked patterns -- these are NEVER allowed (Tier 4)
|
|
67
|
+
// ---------------------------------------------------------------------------
|
|
68
|
+
|
|
69
|
+
/** @internal */
|
|
70
|
+
const BLOCKED_BASH_PATTERNS: readonly RegExp[] = [
|
|
71
|
+
/rm\s+(-[a-zA-Z]*)?r[a-zA-Z]*f[a-zA-Z]*\s+\//, // rm -rf /
|
|
72
|
+
/rm\s+(-[a-zA-Z]*)?f[a-zA-Z]*r[a-zA-Z]*\s+\//, // rm -fr /
|
|
73
|
+
/rm\s+-[a-zA-Z]*\s+\/\s*$/, // rm -* / (root)
|
|
74
|
+
/DROP\s+DATABASE/i,
|
|
75
|
+
/DROP\s+TABLE/i,
|
|
76
|
+
/TRUNCATE\s+TABLE/i,
|
|
77
|
+
/FORMAT\s+C:/i,
|
|
78
|
+
/mkfs\./,
|
|
79
|
+
/dd\s+if=.*of=\/dev\//,
|
|
80
|
+
/>\s*\/dev\/sd[a-z]/,
|
|
81
|
+
/chmod\s+-R\s+777\s+\//,
|
|
82
|
+
/chown\s+-R.*\s+\//,
|
|
83
|
+
/:(){ :\|:& };:/, // fork bomb
|
|
84
|
+
];
|
|
85
|
+
|
|
86
|
+
// ---------------------------------------------------------------------------
|
|
87
|
+
// Always-ask patterns (Tier 3)
|
|
88
|
+
// ---------------------------------------------------------------------------
|
|
89
|
+
|
|
90
|
+
/** @internal */
|
|
91
|
+
const ALWAYS_ASK_BASH_PATTERNS: readonly RegExp[] = [
|
|
92
|
+
/git\s+push\s+.*--force/,
|
|
93
|
+
/git\s+push\s+-f/,
|
|
94
|
+
/git\s+reset\s+--hard/,
|
|
95
|
+
/git\s+clean\s+-f/,
|
|
96
|
+
/npm\s+publish/,
|
|
97
|
+
/docker\s+rm/,
|
|
98
|
+
/docker\s+rmi/,
|
|
99
|
+
/docker\s+system\s+prune/,
|
|
100
|
+
/kubectl\s+delete/,
|
|
101
|
+
/terraform\s+destroy/,
|
|
102
|
+
/terraform\s+apply/,
|
|
103
|
+
/helm\s+uninstall/,
|
|
104
|
+
/curl.*\|\s*(bash|sh)/, // pipe to shell
|
|
105
|
+
/wget.*\|\s*(bash|sh)/,
|
|
106
|
+
];
|
|
107
|
+
|
|
108
|
+
// ---------------------------------------------------------------------------
|
|
109
|
+
// Auto-allow patterns (Tier 1)
|
|
110
|
+
// ---------------------------------------------------------------------------
|
|
111
|
+
|
|
112
|
+
/** @internal */
|
|
113
|
+
const AUTO_ALLOW_BASH_PATTERNS: readonly RegExp[] = [
|
|
114
|
+
/^(ls|pwd|echo|cat|head|tail|wc|which|whoami|hostname|date|uname)/,
|
|
115
|
+
/^(node|bun|deno|python|python3|ruby|go)\s+--version/,
|
|
116
|
+
/^(npm|yarn|pnpm|bun)\s+(test|lint|format|check|run\s+test)/,
|
|
117
|
+
/^(npm|yarn|pnpm|bun)\s+install/,
|
|
118
|
+
/^git\s+(status|log|diff|branch|remote|show|tag)/,
|
|
119
|
+
/^terraform\s+(validate|fmt|version|providers|show|output)/,
|
|
120
|
+
/^kubectl\s+(get|describe|logs|version|config)/,
|
|
121
|
+
/^helm\s+(list|version|status|show|template|lint)/,
|
|
122
|
+
/^grep\s/,
|
|
123
|
+
/^find\s/,
|
|
124
|
+
/^rg\s/,
|
|
125
|
+
];
|
|
126
|
+
|
|
127
|
+
// ---------------------------------------------------------------------------
|
|
128
|
+
// Protected K8s namespaces
|
|
129
|
+
// ---------------------------------------------------------------------------
|
|
130
|
+
|
|
131
|
+
/** @internal */
|
|
132
|
+
const DEFAULT_PROTECTED_NAMESPACES: ReadonlySet<string> = new Set([
|
|
133
|
+
'production',
|
|
134
|
+
'prod',
|
|
135
|
+
'kube-system',
|
|
136
|
+
'kube-public',
|
|
137
|
+
'istio-system',
|
|
138
|
+
'cert-manager',
|
|
139
|
+
'monitoring',
|
|
140
|
+
]);
|
|
141
|
+
|
|
142
|
+
// ---------------------------------------------------------------------------
|
|
143
|
+
// Factory
|
|
144
|
+
// ---------------------------------------------------------------------------
|
|
145
|
+
|
|
146
|
+
/**
|
|
147
|
+
* Create a fresh permission session state.
|
|
148
|
+
*
|
|
149
|
+
* Call this once when a new interactive session begins. The returned object
|
|
150
|
+
* is mutated in-place by {@link approveForSession} and
|
|
151
|
+
* {@link approveActionForSession}.
|
|
152
|
+
*
|
|
153
|
+
* @returns A new, empty {@link PermissionSessionState}.
|
|
154
|
+
*/
|
|
155
|
+
export function createPermissionState(): PermissionSessionState {
|
|
156
|
+
return {
|
|
157
|
+
approvedTools: new Set(),
|
|
158
|
+
approvedActions: new Set(),
|
|
159
|
+
};
|
|
160
|
+
}
|
|
161
|
+
|
|
162
|
+
// ---------------------------------------------------------------------------
|
|
163
|
+
// Core Permission Check
|
|
164
|
+
// ---------------------------------------------------------------------------
|
|
165
|
+
|
|
166
|
+
/**
|
|
167
|
+
* Check whether a tool invocation should be allowed, prompted, or blocked.
|
|
168
|
+
*
|
|
169
|
+
* Evaluation order:
|
|
170
|
+
* 1. User-level tool overrides from {@link PermissionConfig.toolOverrides}.
|
|
171
|
+
* 2. Tool-specific pattern matching for `bash`, `kubectl`, `terraform`,
|
|
172
|
+
* and `helm` tools.
|
|
173
|
+
* 3. The tool's declared {@link ToolDefinition.permissionTier}.
|
|
174
|
+
*
|
|
175
|
+
* @param tool - The tool definition.
|
|
176
|
+
* @param input - The parsed tool input.
|
|
177
|
+
* @param sessionState - Session-level tracking for ask-once decisions.
|
|
178
|
+
* @param config - Optional user permission config overrides.
|
|
179
|
+
* @returns A {@link PermissionDecision} indicating the action to take.
|
|
180
|
+
*/
|
|
181
|
+
export function checkPermission(
|
|
182
|
+
tool: ToolDefinition,
|
|
183
|
+
input: unknown,
|
|
184
|
+
sessionState: PermissionSessionState,
|
|
185
|
+
config?: PermissionConfig
|
|
186
|
+
): PermissionDecision {
|
|
187
|
+
// 1. Check user overrides first
|
|
188
|
+
if (config?.toolOverrides?.[tool.name]) {
|
|
189
|
+
const overrideTier = config.toolOverrides[tool.name];
|
|
190
|
+
return tierToDecision(overrideTier, tool, sessionState);
|
|
191
|
+
}
|
|
192
|
+
|
|
193
|
+
// 2. Special handling for bash commands
|
|
194
|
+
if (tool.name === 'bash' && input && typeof input === 'object' && 'command' in input) {
|
|
195
|
+
const command = (input as { command: string }).command;
|
|
196
|
+
return checkBashPermission(command, sessionState, config);
|
|
197
|
+
}
|
|
198
|
+
|
|
199
|
+
// 3. Special handling for kubectl with namespace awareness
|
|
200
|
+
if (tool.name === 'kubectl' && input && typeof input === 'object') {
|
|
201
|
+
const kubectlInput = input as { action?: string; namespace?: string };
|
|
202
|
+
return checkKubectlPermission(kubectlInput, sessionState, config);
|
|
203
|
+
}
|
|
204
|
+
|
|
205
|
+
// 4. Special handling for terraform actions
|
|
206
|
+
if (tool.name === 'terraform' && input && typeof input === 'object') {
|
|
207
|
+
const tfInput = input as { action?: string };
|
|
208
|
+
return checkTerraformPermission(tfInput, sessionState);
|
|
209
|
+
}
|
|
210
|
+
|
|
211
|
+
// 5. Special handling for helm actions
|
|
212
|
+
if (tool.name === 'helm' && input && typeof input === 'object') {
|
|
213
|
+
const helmInput = input as { action?: string };
|
|
214
|
+
return checkHelmPermission(helmInput, sessionState);
|
|
215
|
+
}
|
|
216
|
+
|
|
217
|
+
// 6. Default: use the tool's declared permission tier
|
|
218
|
+
return tierToDecision(tool.permissionTier, tool, sessionState);
|
|
219
|
+
}
|
|
220
|
+
|
|
221
|
+
// ---------------------------------------------------------------------------
|
|
222
|
+
// Session Approval
|
|
223
|
+
// ---------------------------------------------------------------------------
|
|
224
|
+
|
|
225
|
+
/**
|
|
226
|
+
* Record that the user approved a tool for the remainder of the session.
|
|
227
|
+
*
|
|
228
|
+
* After calling this, subsequent {@link checkPermission} calls for the
|
|
229
|
+
* same tool with an `ask_once` tier will return `'allow'` instead of
|
|
230
|
+
* `'ask'`.
|
|
231
|
+
*
|
|
232
|
+
* @param tool - The tool that was approved.
|
|
233
|
+
* @param sessionState - The session state to mutate.
|
|
234
|
+
*/
|
|
235
|
+
export function approveForSession(
|
|
236
|
+
tool: ToolDefinition,
|
|
237
|
+
sessionState: PermissionSessionState
|
|
238
|
+
): void {
|
|
239
|
+
sessionState.approvedTools.add(tool.name);
|
|
240
|
+
}
|
|
241
|
+
|
|
242
|
+
/**
|
|
243
|
+
* Record that the user approved a specific tool+action combination
|
|
244
|
+
* for the remainder of the session.
|
|
245
|
+
*
|
|
246
|
+
* This is more granular than {@link approveForSession} and is used for
|
|
247
|
+
* tools like `kubectl` and `terraform` where some actions (e.g. `get`)
|
|
248
|
+
* are safe but others (e.g. `apply`) require continued prompting.
|
|
249
|
+
*
|
|
250
|
+
* @param toolName - The tool name (e.g. `'kubectl'`).
|
|
251
|
+
* @param action - The action subcommand (e.g. `'apply'`).
|
|
252
|
+
* @param sessionState - The session state to mutate.
|
|
253
|
+
*/
|
|
254
|
+
export function approveActionForSession(
|
|
255
|
+
toolName: string,
|
|
256
|
+
action: string,
|
|
257
|
+
sessionState: PermissionSessionState
|
|
258
|
+
): void {
|
|
259
|
+
sessionState.approvedActions.add(`${toolName}:${action}`);
|
|
260
|
+
}
|
|
261
|
+
|
|
262
|
+
// ---------------------------------------------------------------------------
|
|
263
|
+
// Internal Helpers
|
|
264
|
+
// ---------------------------------------------------------------------------
|
|
265
|
+
|
|
266
|
+
/**
|
|
267
|
+
* Map a {@link PermissionTier} to a {@link PermissionDecision}, taking
|
|
268
|
+
* session state into account for the `ask_once` tier.
|
|
269
|
+
*
|
|
270
|
+
* @internal
|
|
271
|
+
*/
|
|
272
|
+
function tierToDecision(
|
|
273
|
+
tier: PermissionTier,
|
|
274
|
+
tool: ToolDefinition,
|
|
275
|
+
sessionState: PermissionSessionState
|
|
276
|
+
): PermissionDecision {
|
|
277
|
+
switch (tier) {
|
|
278
|
+
case 'auto_allow':
|
|
279
|
+
return 'allow';
|
|
280
|
+
case 'ask_once':
|
|
281
|
+
return sessionState.approvedTools.has(tool.name) ? 'allow' : 'ask';
|
|
282
|
+
case 'always_ask':
|
|
283
|
+
return 'ask';
|
|
284
|
+
case 'blocked':
|
|
285
|
+
return 'block';
|
|
286
|
+
}
|
|
287
|
+
}
|
|
288
|
+
|
|
289
|
+
/**
|
|
290
|
+
* Evaluate bash command permission against the three pattern tiers and
|
|
291
|
+
* optional user config.
|
|
292
|
+
*
|
|
293
|
+
* @internal
|
|
294
|
+
*/
|
|
295
|
+
function checkBashPermission(
|
|
296
|
+
command: string,
|
|
297
|
+
sessionState: PermissionSessionState,
|
|
298
|
+
config?: PermissionConfig
|
|
299
|
+
): PermissionDecision {
|
|
300
|
+
const trimmed = command.trim();
|
|
301
|
+
|
|
302
|
+
// --- Tier 4: blocked ---
|
|
303
|
+
for (const pattern of BLOCKED_BASH_PATTERNS) {
|
|
304
|
+
if (pattern.test(trimmed)) {
|
|
305
|
+
return 'block';
|
|
306
|
+
}
|
|
307
|
+
}
|
|
308
|
+
if (config?.blockedBashPatterns) {
|
|
309
|
+
for (const glob of config.blockedBashPatterns) {
|
|
310
|
+
if (new RegExp(globToRegex(glob)).test(trimmed)) {
|
|
311
|
+
return 'block';
|
|
312
|
+
}
|
|
313
|
+
}
|
|
314
|
+
}
|
|
315
|
+
|
|
316
|
+
// --- Tier 3: always ask ---
|
|
317
|
+
for (const pattern of ALWAYS_ASK_BASH_PATTERNS) {
|
|
318
|
+
if (pattern.test(trimmed)) {
|
|
319
|
+
return 'ask';
|
|
320
|
+
}
|
|
321
|
+
}
|
|
322
|
+
|
|
323
|
+
// --- Tier 1: auto allow ---
|
|
324
|
+
for (const pattern of AUTO_ALLOW_BASH_PATTERNS) {
|
|
325
|
+
if (pattern.test(trimmed)) {
|
|
326
|
+
return 'allow';
|
|
327
|
+
}
|
|
328
|
+
}
|
|
329
|
+
if (config?.autoAllowBashPatterns) {
|
|
330
|
+
for (const glob of config.autoAllowBashPatterns) {
|
|
331
|
+
if (new RegExp(globToRegex(glob)).test(trimmed)) {
|
|
332
|
+
return 'allow';
|
|
333
|
+
}
|
|
334
|
+
}
|
|
335
|
+
}
|
|
336
|
+
|
|
337
|
+
// --- Tier 2 (default for bash): ask once ---
|
|
338
|
+
return sessionState.approvedTools.has('bash') ? 'allow' : 'ask';
|
|
339
|
+
}
|
|
340
|
+
|
|
341
|
+
/**
|
|
342
|
+
* Evaluate kubectl permission with namespace awareness.
|
|
343
|
+
*
|
|
344
|
+
* Read-only actions (`get`, `describe`, `logs`) are always allowed.
|
|
345
|
+
* Destructive actions in protected namespaces always prompt.
|
|
346
|
+
* Destructive actions in non-protected namespaces use ask-once semantics.
|
|
347
|
+
*
|
|
348
|
+
* @internal
|
|
349
|
+
*/
|
|
350
|
+
function checkKubectlPermission(
|
|
351
|
+
input: { action?: string; namespace?: string },
|
|
352
|
+
sessionState: PermissionSessionState,
|
|
353
|
+
config?: PermissionConfig
|
|
354
|
+
): PermissionDecision {
|
|
355
|
+
const protectedNs: ReadonlySet<string> = config?.protectedNamespaces
|
|
356
|
+
? new Set(config.protectedNamespaces)
|
|
357
|
+
: DEFAULT_PROTECTED_NAMESPACES;
|
|
358
|
+
|
|
359
|
+
// Read-only actions are auto-allowed
|
|
360
|
+
const readOnlyActions: ReadonlySet<string> = new Set(['get', 'describe', 'logs']);
|
|
361
|
+
if (input.action && readOnlyActions.has(input.action)) {
|
|
362
|
+
return 'allow';
|
|
363
|
+
}
|
|
364
|
+
|
|
365
|
+
// Destructive actions in protected namespaces -> always ask
|
|
366
|
+
const destructiveActions: ReadonlySet<string> = new Set([
|
|
367
|
+
'delete',
|
|
368
|
+
'apply',
|
|
369
|
+
'scale',
|
|
370
|
+
'rollout',
|
|
371
|
+
'exec',
|
|
372
|
+
]);
|
|
373
|
+
if (input.action && destructiveActions.has(input.action)) {
|
|
374
|
+
if (input.namespace && protectedNs.has(input.namespace)) {
|
|
375
|
+
return 'ask'; // always ask for protected namespaces
|
|
376
|
+
}
|
|
377
|
+
// Non-protected namespace: ask once per action
|
|
378
|
+
const key = `kubectl:${input.action}`;
|
|
379
|
+
return sessionState.approvedActions.has(key) ? 'allow' : 'ask';
|
|
380
|
+
}
|
|
381
|
+
|
|
382
|
+
// Unknown kubectl action -> ask
|
|
383
|
+
return 'ask';
|
|
384
|
+
}
|
|
385
|
+
|
|
386
|
+
/**
|
|
387
|
+
* Evaluate terraform permission based on the subcommand.
|
|
388
|
+
*
|
|
389
|
+
* Read-only actions (`validate`, `fmt`, `show`, etc.) are auto-allowed.
|
|
390
|
+
* Planning actions (`init`, `plan`, `state`) use ask-once semantics.
|
|
391
|
+
* Mutating actions (`apply`, `destroy`, `import`) always prompt.
|
|
392
|
+
*
|
|
393
|
+
* @internal
|
|
394
|
+
*/
|
|
395
|
+
function checkTerraformPermission(
|
|
396
|
+
input: { action?: string },
|
|
397
|
+
sessionState: PermissionSessionState
|
|
398
|
+
): PermissionDecision {
|
|
399
|
+
const readOnlyActions: ReadonlySet<string> = new Set([
|
|
400
|
+
'validate',
|
|
401
|
+
'fmt',
|
|
402
|
+
'show',
|
|
403
|
+
'output',
|
|
404
|
+
'providers',
|
|
405
|
+
'version',
|
|
406
|
+
]);
|
|
407
|
+
if (input.action && readOnlyActions.has(input.action)) {
|
|
408
|
+
return 'allow';
|
|
409
|
+
}
|
|
410
|
+
|
|
411
|
+
const planLike: ReadonlySet<string> = new Set(['init', 'plan', 'state']);
|
|
412
|
+
if (input.action && planLike.has(input.action)) {
|
|
413
|
+
const key = `terraform:${input.action}`;
|
|
414
|
+
return sessionState.approvedActions.has(key) ? 'allow' : 'ask';
|
|
415
|
+
}
|
|
416
|
+
|
|
417
|
+
// apply, destroy, import -> always ask
|
|
418
|
+
return 'ask';
|
|
419
|
+
}
|
|
420
|
+
|
|
421
|
+
/**
|
|
422
|
+
* Evaluate helm permission based on the subcommand.
|
|
423
|
+
*
|
|
424
|
+
* Read-only actions (`list`, `status`, `show`, etc.) are auto-allowed.
|
|
425
|
+
* Mutating actions (`install`, `upgrade`, `uninstall`, `rollback`)
|
|
426
|
+
* always prompt.
|
|
427
|
+
*
|
|
428
|
+
* @internal
|
|
429
|
+
*/
|
|
430
|
+
function checkHelmPermission(
|
|
431
|
+
input: { action?: string },
|
|
432
|
+
_sessionState: PermissionSessionState
|
|
433
|
+
): PermissionDecision {
|
|
434
|
+
const readOnlyActions: ReadonlySet<string> = new Set([
|
|
435
|
+
'list',
|
|
436
|
+
'status',
|
|
437
|
+
'show',
|
|
438
|
+
'template',
|
|
439
|
+
'lint',
|
|
440
|
+
'version',
|
|
441
|
+
]);
|
|
442
|
+
if (input.action && readOnlyActions.has(input.action)) {
|
|
443
|
+
return 'allow';
|
|
444
|
+
}
|
|
445
|
+
|
|
446
|
+
// install, upgrade, uninstall, rollback -> always ask
|
|
447
|
+
return 'ask';
|
|
448
|
+
}
|
|
449
|
+
|
|
450
|
+
/**
|
|
451
|
+
* Convert a simple glob pattern to a regex string.
|
|
452
|
+
*
|
|
453
|
+
* Supports `*` (any sequence of characters) and `?` (single character).
|
|
454
|
+
* All other regex-significant characters are escaped.
|
|
455
|
+
*
|
|
456
|
+
* @param glob - The glob pattern to convert.
|
|
457
|
+
* @returns A regex source string (without delimiters).
|
|
458
|
+
*
|
|
459
|
+
* @internal
|
|
460
|
+
*/
|
|
461
|
+
function globToRegex(glob: string): string {
|
|
462
|
+
return glob
|
|
463
|
+
.replace(/[.+^${}()|[\]\\]/g, '\\$&') // escape regex special chars
|
|
464
|
+
.replace(/\*/g, '.*') // * -> .*
|
|
465
|
+
.replace(/\?/g, '.'); // ? -> .
|
|
466
|
+
}
|
|
@@ -0,0 +1,116 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Base Subagent
|
|
3
|
+
*
|
|
4
|
+
* Provides the foundation for specialized subagents. Each subagent runs
|
|
5
|
+
* with its own isolated conversation, restricted tool set, and permissions.
|
|
6
|
+
* Subagents cannot spawn further subagents (no nesting).
|
|
7
|
+
*
|
|
8
|
+
* @module agent/subagents/base
|
|
9
|
+
*/
|
|
10
|
+
|
|
11
|
+
import type { LLMRouter } from '../../llm/router';
|
|
12
|
+
import { ToolRegistry, type ToolDefinition } from '../../tools/schemas/types';
|
|
13
|
+
import { runAgentLoop, type AgentLoopResult } from '../loop';
|
|
14
|
+
|
|
15
|
+
// ---------------------------------------------------------------------------
|
|
16
|
+
// Public Types
|
|
17
|
+
// ---------------------------------------------------------------------------
|
|
18
|
+
|
|
19
|
+
/** Configuration for a specialized subagent. */
|
|
20
|
+
export interface SubagentConfig {
|
|
21
|
+
/** Unique name for this subagent type. */
|
|
22
|
+
name: string;
|
|
23
|
+
|
|
24
|
+
/** Description shown to the parent agent when selecting a subagent. */
|
|
25
|
+
description: string;
|
|
26
|
+
|
|
27
|
+
/** System prompt specific to this subagent. */
|
|
28
|
+
systemPrompt: string;
|
|
29
|
+
|
|
30
|
+
/** Tools available to this subagent. */
|
|
31
|
+
tools: ToolDefinition[];
|
|
32
|
+
|
|
33
|
+
/** Model to use (e.g. `'anthropic/claude-haiku-4-5'` for fast/cheap). */
|
|
34
|
+
model: string;
|
|
35
|
+
|
|
36
|
+
/** Maximum turns for subagent execution. */
|
|
37
|
+
maxTurns: number;
|
|
38
|
+
}
|
|
39
|
+
|
|
40
|
+
/** Result returned after a subagent completes execution. */
|
|
41
|
+
export interface SubagentResult {
|
|
42
|
+
/** The final text output from the subagent. */
|
|
43
|
+
output: string;
|
|
44
|
+
|
|
45
|
+
/** Number of LLM turns taken. */
|
|
46
|
+
turns: number;
|
|
47
|
+
|
|
48
|
+
/** Total tokens used across all turns. */
|
|
49
|
+
totalTokens: number;
|
|
50
|
+
|
|
51
|
+
/** Whether the subagent was interrupted before completion. */
|
|
52
|
+
interrupted: boolean;
|
|
53
|
+
}
|
|
54
|
+
|
|
55
|
+
// ---------------------------------------------------------------------------
|
|
56
|
+
// Subagent Class
|
|
57
|
+
// ---------------------------------------------------------------------------
|
|
58
|
+
|
|
59
|
+
/**
|
|
60
|
+
* Base class for all Nimbus subagents.
|
|
61
|
+
*
|
|
62
|
+
* A subagent is a lightweight, scoped agent that runs within the parent
|
|
63
|
+
* agent's process. It has its own conversation history, tool registry,
|
|
64
|
+
* and system prompt, but shares the parent's LLM router.
|
|
65
|
+
*
|
|
66
|
+
* Subagents are intentionally prevented from spawning further subagents
|
|
67
|
+
* by filtering out the `task` tool from their registry.
|
|
68
|
+
*/
|
|
69
|
+
export class Subagent {
|
|
70
|
+
readonly config: SubagentConfig;
|
|
71
|
+
|
|
72
|
+
constructor(config: SubagentConfig) {
|
|
73
|
+
this.config = config;
|
|
74
|
+
}
|
|
75
|
+
|
|
76
|
+
/**
|
|
77
|
+
* Run the subagent with a given prompt.
|
|
78
|
+
*
|
|
79
|
+
* Creates an isolated tool registry (excluding the `task` tool to
|
|
80
|
+
* prevent nesting), then delegates to {@link runAgentLoop} with the
|
|
81
|
+
* subagent's own system prompt, model, and turn limit.
|
|
82
|
+
*
|
|
83
|
+
* @param prompt - The task description for the subagent.
|
|
84
|
+
* @param router - The shared LLM router instance.
|
|
85
|
+
* @returns The subagent's final output, turn count, token usage, and
|
|
86
|
+
* whether it was interrupted.
|
|
87
|
+
*/
|
|
88
|
+
async run(prompt: string, router: LLMRouter): Promise<SubagentResult> {
|
|
89
|
+
// Create isolated tool registry (no task tool -- prevent nesting)
|
|
90
|
+
const registry = new ToolRegistry();
|
|
91
|
+
for (const tool of this.config.tools) {
|
|
92
|
+
if (tool.name !== 'task') {
|
|
93
|
+
registry.register(tool);
|
|
94
|
+
}
|
|
95
|
+
}
|
|
96
|
+
|
|
97
|
+
const result: AgentLoopResult = await runAgentLoop(prompt, [], {
|
|
98
|
+
router,
|
|
99
|
+
toolRegistry: registry,
|
|
100
|
+
mode: 'plan', // Subagents default to plan mode (read-only unless configured otherwise)
|
|
101
|
+
maxTurns: this.config.maxTurns,
|
|
102
|
+
model: this.config.model,
|
|
103
|
+
nimbusInstructions: this.config.systemPrompt,
|
|
104
|
+
});
|
|
105
|
+
|
|
106
|
+
// Extract the final assistant message
|
|
107
|
+
const lastAssistant = [...result.messages].reverse().find(m => m.role === 'assistant');
|
|
108
|
+
|
|
109
|
+
return {
|
|
110
|
+
output: (lastAssistant?.content as string) ?? '(no output)',
|
|
111
|
+
turns: result.turns,
|
|
112
|
+
totalTokens: result.usage.totalTokens,
|
|
113
|
+
interrupted: result.interrupted,
|
|
114
|
+
};
|
|
115
|
+
}
|
|
116
|
+
}
|
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Cost Analysis Subagent
|
|
3
|
+
*
|
|
4
|
+
* Analyzes infrastructure costs and identifies optimization opportunities.
|
|
5
|
+
* Uses a small/fast model since cost analysis is largely pattern-matching
|
|
6
|
+
* against resource configurations and pricing data.
|
|
7
|
+
*
|
|
8
|
+
* @module agent/subagents/cost
|
|
9
|
+
*/
|
|
10
|
+
|
|
11
|
+
import { Subagent, type SubagentConfig } from './base';
|
|
12
|
+
import { readFileTool, globTool, grepTool, listDirTool } from '../../tools/schemas/standard';
|
|
13
|
+
import { costEstimateTool, cloudDiscoverTool } from '../../tools/schemas/devops';
|
|
14
|
+
|
|
15
|
+
// ---------------------------------------------------------------------------
|
|
16
|
+
// Configuration
|
|
17
|
+
// ---------------------------------------------------------------------------
|
|
18
|
+
|
|
19
|
+
const costConfig: SubagentConfig = {
|
|
20
|
+
name: 'cost',
|
|
21
|
+
description: 'Cost optimization specialist — analyzes infrastructure costs and suggests savings.',
|
|
22
|
+
systemPrompt: `You are a cost optimization subagent. You analyze cloud infrastructure costs.
|
|
23
|
+
|
|
24
|
+
Your job:
|
|
25
|
+
- Read Terraform/K8s configs to understand resource sizing
|
|
26
|
+
- Use cost_estimate to calculate projected costs
|
|
27
|
+
- Use cloud_discover to find running resources
|
|
28
|
+
- Identify cost optimization opportunities
|
|
29
|
+
- Compare pricing across regions/instance types
|
|
30
|
+
|
|
31
|
+
Rules:
|
|
32
|
+
- Be specific with cost numbers (monthly, annual)
|
|
33
|
+
- Suggest concrete optimization actions
|
|
34
|
+
- Flag oversized or underutilized resources
|
|
35
|
+
- Do NOT modify any files
|
|
36
|
+
- Do NOT spawn further subagents`,
|
|
37
|
+
tools: [readFileTool, globTool, grepTool, listDirTool, costEstimateTool, cloudDiscoverTool],
|
|
38
|
+
model: 'anthropic/claude-haiku-4-5',
|
|
39
|
+
maxTurns: 15,
|
|
40
|
+
};
|
|
41
|
+
|
|
42
|
+
// ---------------------------------------------------------------------------
|
|
43
|
+
// Factory
|
|
44
|
+
// ---------------------------------------------------------------------------
|
|
45
|
+
|
|
46
|
+
/** Create a new cost analysis subagent instance. */
|
|
47
|
+
export function createCostSubagent(): Subagent {
|
|
48
|
+
return new Subagent(costConfig);
|
|
49
|
+
}
|
|
50
|
+
|
|
51
|
+
export { costConfig };
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Explore Subagent
|
|
3
|
+
*
|
|
4
|
+
* Fast codebase exploration and search. Uses read-only tools and a
|
|
5
|
+
* small/fast model for efficient file discovery and content inspection.
|
|
6
|
+
*
|
|
7
|
+
* @module agent/subagents/explore
|
|
8
|
+
*/
|
|
9
|
+
|
|
10
|
+
import { Subagent, type SubagentConfig } from './base';
|
|
11
|
+
import { readFileTool, globTool, grepTool, listDirTool } from '../../tools/schemas/standard';
|
|
12
|
+
|
|
13
|
+
// ---------------------------------------------------------------------------
|
|
14
|
+
// Configuration
|
|
15
|
+
// ---------------------------------------------------------------------------
|
|
16
|
+
|
|
17
|
+
const exploreConfig: SubagentConfig = {
|
|
18
|
+
name: 'explore',
|
|
19
|
+
description: 'Fast codebase exploration and search. Read-only, uses a small/fast model.',
|
|
20
|
+
systemPrompt: `You are a codebase explorer subagent. Your job is to search through code, find files, and report findings.
|
|
21
|
+
|
|
22
|
+
Rules:
|
|
23
|
+
- Search efficiently — use glob to find files, grep to search content, read_file for details
|
|
24
|
+
- Report your findings clearly and concisely
|
|
25
|
+
- Do NOT modify any files
|
|
26
|
+
- Do NOT spawn further subagents
|
|
27
|
+
- Focus on the specific question asked`,
|
|
28
|
+
tools: [readFileTool, globTool, grepTool, listDirTool],
|
|
29
|
+
model: 'anthropic/claude-haiku-4-5',
|
|
30
|
+
maxTurns: 15,
|
|
31
|
+
};
|
|
32
|
+
|
|
33
|
+
// ---------------------------------------------------------------------------
|
|
34
|
+
// Factory
|
|
35
|
+
// ---------------------------------------------------------------------------
|
|
36
|
+
|
|
37
|
+
/** Create a new explore subagent instance. */
|
|
38
|
+
export function createExploreSubagent(): Subagent {
|
|
39
|
+
return new Subagent(exploreConfig);
|
|
40
|
+
}
|
|
41
|
+
|
|
42
|
+
export { exploreConfig };
|