@execra/core 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (52) hide show
  1. package/dist/cli/commands.d.ts +21 -0
  2. package/dist/cli/commands.js +686 -0
  3. package/dist/cli/commands.js.map +1 -0
  4. package/dist/cli/index.d.ts +8 -0
  5. package/dist/cli/index.js +1162 -0
  6. package/dist/cli/index.js.map +1 -0
  7. package/dist/cli/prompts.d.ts +12 -0
  8. package/dist/cli/prompts.js +98 -0
  9. package/dist/cli/prompts.js.map +1 -0
  10. package/dist/cli/ui.d.ts +38 -0
  11. package/dist/cli/ui.js +990 -0
  12. package/dist/cli/ui.js.map +1 -0
  13. package/dist/handler/index.d.ts +93 -0
  14. package/dist/handler/index.js +628 -0
  15. package/dist/handler/index.js.map +1 -0
  16. package/dist/handler/walletConnect.d.ts +6 -0
  17. package/dist/handler/walletConnect.js +623 -0
  18. package/dist/handler/walletConnect.js.map +1 -0
  19. package/dist/index.d.ts +14 -0
  20. package/dist/index.js +2046 -0
  21. package/dist/index.js.map +1 -0
  22. package/dist/session/index.d.ts +20 -0
  23. package/dist/session/index.js +79 -0
  24. package/dist/session/index.js.map +1 -0
  25. package/dist/solana/index.d.ts +5 -0
  26. package/dist/solana/index.js +302 -0
  27. package/dist/solana/index.js.map +1 -0
  28. package/dist/solana/rpc.d.ts +45 -0
  29. package/dist/solana/rpc.js +120 -0
  30. package/dist/solana/rpc.js.map +1 -0
  31. package/dist/solana/simulate.d.ts +41 -0
  32. package/dist/solana/simulate.js +173 -0
  33. package/dist/solana/simulate.js.map +1 -0
  34. package/dist/solana/tx.d.ts +54 -0
  35. package/dist/solana/tx.js +141 -0
  36. package/dist/solana/tx.js.map +1 -0
  37. package/dist/vault/accounts.d.ts +88 -0
  38. package/dist/vault/accounts.js +126 -0
  39. package/dist/vault/accounts.js.map +1 -0
  40. package/dist/vault/config.d.ts +40 -0
  41. package/dist/vault/config.js +131 -0
  42. package/dist/vault/config.js.map +1 -0
  43. package/dist/vault/index.d.ts +122 -0
  44. package/dist/vault/index.js +580 -0
  45. package/dist/vault/index.js.map +1 -0
  46. package/dist/vault/keystore.d.ts +44 -0
  47. package/dist/vault/keystore.js +118 -0
  48. package/dist/vault/keystore.js.map +1 -0
  49. package/dist/vault/mnemonic.d.ts +43 -0
  50. package/dist/vault/mnemonic.js +37 -0
  51. package/dist/vault/mnemonic.js.map +1 -0
  52. package/package.json +49 -0
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../src/handler/walletConnect.ts","../../src/solana/simulate.ts","../../src/solana/rpc.ts","../../src/vault/config.ts","../../src/vault/keystore.ts","../../src/vault/accounts.ts","../../src/vault/mnemonic.ts","../../src/solana/tx.ts","../../src/handler/index.ts","../../src/session/index.ts"],"sourcesContent":["import SignClientPkg from \"@walletconnect/sign-client\";\nconst SignClient = (SignClientPkg as any).default ?? SignClientPkg;\nimport { getSdkError } from \"@walletconnect/utils\";\n\nimport chalk from \"chalk\";\nimport { handleRequest, WalletRequest, HandlerOptions } from \".\";\nimport { markInactive, saveSession, removeSession } from \"../session\";\n\nconst CHAIN_ID = \"solana:devnet\"; // switch to solana:mainnet for production\n\nexport interface WalletConnectOptions {\n projectId: string;\n handlerOptions: HandlerOptions;\n // Callback to display session proposal to user in terminal\n onSessionProposal?: (metadata: any) => Promise<boolean>;\n}\n\nlet signClient: InstanceType<typeof SignClient> | null = null;\n\nexport async function initWalletConnect(opts: WalletConnectOptions) {\n signClient = await SignClient.init({\n projectId: opts.projectId,\n metadata: {\n name: \"Agentic Wallet\",\n description: \"Autonomous AI agent wallet for Solana\",\n url: \"https://github.com/your-repo/agentic-wallet\",\n icons: [],\n },\n });\n\n console.log(chalk.green(\"[WC] WalletConnect initialized\"));\n\n // ── Inbound session proposal (dApp wants to connect) ──────────────────────\n signClient.on(\"session_proposal\", async ({ id, params }: any) => {\n const meta = params.proposer.metadata;\n console.log(\n chalk.cyan(`\\n[WC] Session proposal from: ${meta.name} (${meta.url})`),\n );\n\n // Ask for approval\n let approved = true;\n if (opts.onSessionProposal) {\n approved = await opts.onSessionProposal(meta);\n }\n\n if (!approved) {\n await signClient!.reject({ id, reason: getSdkError(\"USER_REJECTED\") });\n console.log(chalk.red(\"[WC] Session rejected\"));\n return;\n }\n\n const account = opts.handlerOptions.vault.getActiveKeypair();\n\n const { topic, acknowledged } = await signClient!.approve({\n id,\n namespaces: {\n solana: {\n accounts: [`${CHAIN_ID}:${account.publicKey}`],\n methods: [\n \"solana_signTransaction\",\n \"solana_signAndSendTransaction\",\n \"solana_signAllTransactions\",\n \"solana_signMessage\",\n ],\n events: [],\n },\n },\n });\n\n await acknowledged();\n\n saveSession({\n topic,\n dappName: meta.name,\n dappUrl: meta.url,\n dappIcon: meta.icons?.[0],\n connectedAccount: account.publicKey,\n connectedAt: new Date().toISOString(),\n lastActivity: new Date().toISOString(),\n permissions: [\n \"solana_signTransaction\",\n \"solana_signAndSendTransaction\",\n \"solana_signAllTransactions\",\n \"solana_signMessage\",\n ],\n chainId: CHAIN_ID,\n active: true,\n });\n\n console.log(chalk.green(`[WC] Connected to ${meta.name}`));\n console.log(chalk.dim(` Address: ${account.publicKey}`));\n });\n\n // ── Inbound sign request ──────────────────────────────────────────────────\n signClient.on(\"session_request\", async ({ id, topic, params }: any) => {\n const session = signClient!.session.get(topic);\n const dapp = {\n name: session.peer.metadata.name,\n url: session.peer.metadata.url,\n };\n\n console.log(\n chalk.yellow(\n `\\n[WC] Request: ${params.request.method} from ${dapp.name}`,\n ),\n );\n\n const request: WalletRequest = {\n id,\n method: params.request.method as any,\n params: params.request.params,\n dapp,\n topic,\n };\n\n const response = await handleRequest(request, opts.handlerOptions);\n\n // WalletConnect requires either { result } or { error } — never both optional\n const jsonRpcResponse = response.error\n ? {\n id,\n jsonrpc: \"2.0\" as const,\n error: { code: response.error.code, message: response.error.message },\n }\n : { id, jsonrpc: \"2.0\" as const, result: response.result ?? null };\n\n await signClient!.respond({ topic, response: jsonRpcResponse });\n\n if (response.error) {\n console.log(chalk.red(`[WC] Rejected: ${response.error.message}`));\n } else {\n console.log(chalk.green(`[WC] Request fulfilled`));\n }\n });\n\n // ── dApp disconnects ──────────────────────────────────────────────────────\n signClient.on(\"session_delete\", ({ topic }: any) => {\n markInactive(topic);\n console.log(\n chalk.dim(`[WC] dApp disconnected (topic: ${topic.slice(0, 8)}...)`),\n );\n });\n\n return signClient;\n}\n\n// User pastes wc: URI from the dApp.\n// Waits for session_proposal to fire before returning so the\n// caller knows the dApp has received the wallet's address.\nexport async function pairWithDapp(uri: string): Promise<void> {\n if (!signClient) throw new Error(\"WalletConnect not initialised\");\n\n console.log(chalk.dim(\"[WC] Connecting to dApp...\"));\n\n await new Promise<void>((resolve, reject) => {\n const timeout = setTimeout(() => {\n signClient!.off(\"session_proposal\", onProposal);\n reject(new Error(\"WalletConnect pairing timed out after 30s\"));\n }, 30_000);\n\n // Listen for the session_proposal — fired when dApp receives our pairing\n // The main session_proposal handler in initWalletConnect does approve()\n // and saveSession(). We just wait here to print the result.\n const onProposal = ({ params }: any) => {\n clearTimeout(timeout);\n signClient!.off(\"session_proposal\", onProposal);\n const meta = params.proposer.metadata;\n console.log(\n chalk.cyan(\n `[WC] Request from: ${chalk.bold(meta.name)} (${meta.url})`,\n params,\n ),\n );\n resolve();\n };\n\n signClient!.on(\"session_proposal\", onProposal);\n\n signClient!.core.pairing.pair({ uri }).catch((err: Error) => {\n clearTimeout(timeout);\n signClient!.off(\"session_proposal\", onProposal);\n reject(err);\n });\n });\n}\n\n// Disconnect from a dApp by topic\nexport async function disconnectDapp(topic: string): Promise<void> {\n if (!signClient) throw new Error(\"WalletConnect not initialised\");\n await signClient.disconnect({\n topic,\n reason: getSdkError(\"USER_DISCONNECTED\"),\n });\n removeSession(topic);\n console.log(\n chalk.dim(`[WC] Disconnected from topic ${topic.slice(0, 8)}...`),\n );\n}\n\nexport function getSignClient() {\n return signClient;\n}\n","import {\n Connection,\n Transaction,\n VersionedTransaction,\n LAMPORTS_PER_SOL,\n} from \"@solana/web3.js\";\nimport { getConnection } from \"./rpc\";\n\n// Types\nexport interface TokenChange {\n mint: string; // token mint address\n account: string; // token account address\n owner: string; // owner of the token account\n preAmount: number; // balance before tx\n postAmount: number; // balance after tx\n delta: number; // change (positive = received, negative = sent)\n decimals: number;\n}\n\nexport interface AccountChange {\n address: string;\n preBalance: number; // in lamports\n postBalance: number; // in lamports\n solDelta: number; // in SOL (human readable)\n isWritable: boolean;\n isSigner: boolean;\n}\n\nexport interface SimulationResult {\n success: boolean;\n error: string | null;\n logs: string[];\n\n // Account changes\n accountChanges: AccountChange[];\n tokenChanges: TokenChange[];\n\n // Transaction metadata\n computeUnitsConsumed: number;\n programIds: string[]; // all programs invoked\n fee: number; // estimated fee in lamports\n\n // Raw simulation data (passed to Claude)\n rawLogs: string[];\n}\n\n// Simulate\n/**\n * Simulate a transaction and return a parsed result.\n * Accepts both legacy and versioned transactions (base64 encoded).\n *\n * @param serializedTx - base64 encoded serialized transaction\n * @param signerPublicKey - the wallet's public key (used to identify balance changes)\n */\nexport async function simulateTransaction(\n serializedTx: string,\n signerPublicKey: string,\n conn?: Connection,\n): Promise<SimulationResult> {\n const connection = conn ?? getConnection();\n\n try {\n const txBuffer = Buffer.from(serializedTx, \"base64\");\n\n // Try versioned transaction first, fall back to legacy\n let simulation: Awaited<ReturnType<Connection[\"simulateTransaction\"]>>;\n\n try {\n const versionedTx = VersionedTransaction.deserialize(txBuffer);\n simulation = await connection.simulateTransaction(versionedTx, {\n sigVerify: false, // skip sig verification — wallet hasn't signed yet\n replaceRecentBlockhash: true,\n });\n } catch {\n // Fall back to legacy transaction\n const legacyTx = Transaction.from(txBuffer);\n simulation = await connection.simulateTransaction(legacyTx, []);\n }\n\n const { value } = simulation;\n\n return parseSimulationResult(value, signerPublicKey, txBuffer);\n } catch (err) {\n // Simulation itself failed (network error, malformed tx, etc.)\n return {\n success: false,\n error: err instanceof Error ? err.message : \"Simulation failed\",\n logs: [],\n accountChanges: [],\n tokenChanges: [],\n computeUnitsConsumed: 0,\n programIds: [],\n fee: 0,\n rawLogs: [],\n };\n }\n}\n\n// Parsing\nfunction parseSimulationResult(\n value: any,\n signerPublicKey: string,\n txBuffer: Buffer,\n): SimulationResult {\n const success = !value.err;\n const logs: string[] = value.logs ?? [];\n\n // Parse account balance changes\n const accountChanges: AccountChange[] = (value.accounts ?? [])\n .map((account: any, i: number) => {\n if (!account) return null;\n const preBalance = account.lamports ?? 0;\n const postBalance = account.lamports ?? 0;\n return {\n address: signerPublicKey, // simplified — full impl maps account indices\n preBalance,\n postBalance,\n solDelta: (postBalance - preBalance) / LAMPORTS_PER_SOL,\n isWritable: true,\n isSigner: i === 0,\n };\n })\n .filter(Boolean);\n\n // Extract program IDs from logs\n const programIds = extractProgramIds(logs);\n\n // Compute units from logs\n const computeUnitsConsumed = extractComputeUnits(logs);\n\n // Estimate fee (5000 lamports base + 5000 per signature)\n const fee = 5000;\n\n return {\n success,\n error: value.err ? JSON.stringify(value.err) : null,\n logs: formatLogs(logs),\n accountChanges,\n tokenChanges: [], // full SPL parsing requires additional RPC calls\n computeUnitsConsumed,\n programIds,\n fee,\n rawLogs: logs,\n };\n}\n\nfunction extractProgramIds(logs: string[]): string[] {\n const ids = new Set<string>();\n const invokePattern = /Program (\\w+) invoke/;\n for (const log of logs) {\n const match = log.match(invokePattern);\n if (match) ids.add(match[1]);\n }\n return Array.from(ids);\n}\n\nfunction extractComputeUnits(logs: string[]): number {\n for (const log of logs) {\n const match = log.match(/consumed (\\d+) of/);\n if (match) return parseInt(match[1], 10);\n }\n return 0;\n}\n\nfunction formatLogs(logs: string[]): string[] {\n return logs.map((log) => {\n // Shorten program addresses for readability\n return log.replace(/\\b([1-9A-HJ-NP-Za-km-z]{32,44})\\b/g, (addr) => {\n const known = KNOWN_PROGRAMS[addr];\n return known ? known : `${addr.slice(0, 4)}..${addr.slice(-4)}`;\n });\n });\n}\n\n// Known Programs\nconst KNOWN_PROGRAMS: Record<string, string> = {\n \"11111111111111111111111111111111\": \"System Program\",\n TokenkegQfeZyiNwAJbNbGKPFXCWuBvf9Ss623VQ5DA: \"SPL Token\",\n JUP6LkbZbjS1jKKwapdHNy74zcZ3tLUZoi5QNyVTaV4: \"Jupiter V6\",\n \"9xQeWvG816bUx9EPjHmaT23yvVM2ZWbrrpZb9PusVFin\": \"Serum DEX\",\n ATokenGPvbdGVxr1b2hvZbsiqW5xWH25efTNsLJe1bv: \"Associated Token\",\n SysvarRent111111111111111111111111111111111: \"Sysvar Rent\",\n SysvarC1ock11111111111111111111111111111111: \"Sysvar Clock\",\n};\n\nexport { KNOWN_PROGRAMS };\n","/**\n *\n * Solana RPC connection manager.\n * Single shared connection instance for the daemon session.\n *\n * Dependencies: @solana/web3.js\n */\n\nimport { Connection, PublicKey, LAMPORTS_PER_SOL } from '@solana/web3.js';\nimport { getRpcUrl, getCluster } from '../vault/config';\n\n// Singleton connection\n\nlet _connection: Connection | null = null;\n\nexport function getConnection(forceNew: boolean = false): Connection {\n if (!_connection || forceNew) {\n const rpcUrl = getRpcUrl();\n _connection = new Connection(rpcUrl, 'confirmed');\n }\n return _connection;\n}\n\n/**\n * Reset connection — used when RPC URL or cluster changes.\n */\nexport function resetConnection(): void {\n _connection = null;\n}\n\n// Balance─\n\n/**\n * Get SOL balance for an address in lamports and SOL.\n */\nexport async function getBalance(\n publicKeyStr: string,\n): Promise<{ lamports: number; sol: number }> {\n const connection = getConnection();\n const pubkey = new PublicKey(publicKeyStr);\n const lamports = await connection.getBalance(pubkey);\n return {\n lamports,\n sol: lamports / LAMPORTS_PER_SOL,\n };\n}\n\n/**\n * Request a devnet airdrop (only works on devnet/testnet).\n * Returns the transaction signature.\n */\nexport async function requestAirdrop(\n publicKeyStr: string,\n solAmount: number = 1,\n): Promise<string> {\n const cluster = getCluster();\n if (cluster === 'mainnet-beta') {\n throw new Error('Airdrops are not available on mainnet.');\n }\n\n const connection = getConnection();\n const pubkey = new PublicKey(publicKeyStr);\n const lamports = solAmount * LAMPORTS_PER_SOL;\n\n const signature = await connection.requestAirdrop(pubkey, lamports);\n await connection.confirmTransaction(signature, 'confirmed');\n\n return signature;\n}\n\n/**\n * Get recent blockhash — required for building transactions.\n */\nexport async function getLatestBlockhash(): Promise<{\n blockhash: string;\n lastValidBlockHeight: number;\n}> {\n const connection = getConnection();\n return connection.getLatestBlockhash('confirmed');\n}\n\n/**\n * Confirm a transaction by signature.\n * Polls until confirmed or timeout.\n */\nexport async function confirmTransaction(\n signature: string,\n timeoutMs: number = 30_000,\n): Promise<boolean> {\n const connection = getConnection();\n const { blockhash, lastValidBlockHeight } = await getLatestBlockhash();\n\n const result = await connection.confirmTransaction(\n { signature, blockhash, lastValidBlockHeight },\n 'confirmed',\n );\n\n return !result.value.err;\n}\n\n/**\n * Check if the RPC endpoint is reachable.\n */\nexport async function healthCheck(): Promise<boolean> {\n try {\n const connection = getConnection();\n await connection.getVersion();\n return true;\n } catch {\n return false;\n }\n}\n","/**\n *\n * Reads and writes ~/.wallet/config.json\n * Stores non-sensitive wallet preferences:\n * - Active account index\n * - RPC endpoint (mainnet / devnet)\n * - Account metadata (names, indices — no keys)\n * - WalletConnect project ID\n *\n * Dependencies: Node.js built-in `fs`, `os`, `path`\n */\n\nimport fs from \"fs\";\nimport { getConfigPath, ensureWalletDir } from \"./keystore\";\nimport { AccountStore, createAccountStore } from \"./accounts\";\n\n// ── Types ─────────────────────────────────────────────────────────────────────\n\nexport type ClusterType = \"mainnet-beta\" | \"devnet\" | \"testnet\" | \"localnet\" | \"custom\";\n\nexport interface WalletConfig {\n version: number;\n cluster: ClusterType;\n rpcUrl: string;\n walletConnectProjectId: string;\n accountStore: AccountStore;\n createdAt: string;\n updatedAt: string;\n}\n\n// ── Defaults ──────────────────────────────────────────────────────────────────\n\nconst HELIUS_API_KEY = process.env.HELIUS_API_KEY;\nexport const RPC_URLS: Record<Exclude<ClusterType, \"custom\">, string> = {\n \"mainnet-beta\": HELIUS_API_KEY\n ? `https://mainnet.helius-rpc.com/?api-key=${HELIUS_API_KEY}`\n : \"https://api.mainnet-beta.solana.com\",\n devnet: HELIUS_API_KEY\n ? `https://devnet.helius-rpc.com/?api-key=${HELIUS_API_KEY}`\n : \"https://api.devnet.solana.com\",\n testnet: \"https://api.testnet.solana.com\",\n localnet: \"http://localhost:8899\",\n};\n\nconst CONFIG_VERSION = 1;\n\n// ── Read / Write ──────────────────────────────────────────────────────────────\n\nexport function configExists(): boolean {\n return fs.existsSync(getConfigPath());\n}\n\nexport function loadConfig(): WalletConfig {\n if (!configExists()) {\n throw new Error(\"No config found. Run `wallet init` first.\");\n }\n const raw = fs.readFileSync(getConfigPath(), \"utf8\");\n return JSON.parse(raw) as WalletConfig;\n}\n\nexport function saveConfig(config: WalletConfig): void {\n ensureWalletDir();\n const updated = { ...config, updatedAt: new Date().toISOString() };\n fs.writeFileSync(getConfigPath(), JSON.stringify(updated, null, 2), {\n mode: 0o600,\n });\n}\n\n/**\n * Create a fresh config on `wallet init`.\n */\nexport function createConfig(\n walletConnectProjectId: string = \"\",\n cluster: Exclude<ClusterType, \"custom\"> = \"devnet\",\n): WalletConfig {\n const now = new Date().toISOString();\n return {\n version: CONFIG_VERSION,\n cluster,\n rpcUrl: RPC_URLS[cluster],\n walletConnectProjectId,\n accountStore: createAccountStore(\"Account 1\"),\n createdAt: now,\n updatedAt: now,\n };\n}\n\n// ── Helpers ───────────────────────────────────────────────────────────────────\n\nexport function updateCluster(cluster: Exclude<ClusterType, \"custom\">): void {\n const config = loadConfig();\n config.cluster = cluster;\n config.rpcUrl = RPC_URLS[cluster];\n saveConfig(config);\n}\n\nexport function updateRpcUrl(url: string): void {\n const config = loadConfig();\n config.rpcUrl = url;\n saveConfig(config);\n}\n\nexport function updateAccountStore(accountStore: AccountStore): void {\n const config = loadConfig();\n config.accountStore = accountStore;\n saveConfig(config);\n}\n\nexport function getRpcUrl(): string {\n return loadConfig().rpcUrl;\n}\n\nexport function getCluster(): ClusterType {\n return loadConfig().cluster;\n}\n\nexport function getAccountStore(): AccountStore {\n return loadConfig().accountStore;\n}\n","/**\n *\n * AES-256-GCM encrypted keystore.\n * The mnemonic (seed phrase) is encrypted at rest in ~/.wallet/vault.enc\n * Private keys NEVER touch disk — they are derived in memory at runtime.\n *\n * Encryption scheme:\n * - Key derivation: PBKDF2 (SHA-512, 210,000 iterations) — OWASP recommended\n * - Cipher: AES-256-GCM (authenticated encryption — detects tampering)\n * - Salt: 32 random bytes (unique per vault)\n * - IV: 16 random bytes (unique per encryption)\n *\n * Dependencies: Node.js built-in `crypto`, `fs`, `os`, `path`\n */\n\nimport crypto from \"crypto\";\nimport fs from \"fs\";\nimport os from \"os\";\nimport path from \"path\";\n\n// ── Types ─────────────────────────────────────────────────────────────────────\n\nexport interface VaultData {\n mnemonic: string;\n createdAt: string;\n version: number;\n}\n\ninterface EncryptedVault {\n version: number; // format version for future migrations\n salt: string; // hex — used for PBKDF2 key derivation\n iv: string; // hex — AES-GCM initialisation vector\n authTag: string; // hex — GCM authentication tag (detects tampering)\n ciphertext: string; // hex — encrypted vault data\n}\n\n// ── Constants ─────────────────────────────────────────────────────────────────\n\nconst VAULT_VERSION = 1;\nconst PBKDF2_ITERATIONS = 210_000; // OWASP 2024 recommendation for PBKDF2-SHA512\nconst PBKDF2_DIGEST = \"sha512\";\nconst KEY_LENGTH = 32; // 256 bits for AES-256\nconst SALT_LENGTH = 32; // 256 bits\nconst IV_LENGTH = 16; // 128 bits for AES-GCM\nconst CIPHER = \"aes-256-gcm\";\n\n// ── Vault Path ────────────────────────────────────────────────────────────────\n\nexport function getWalletDir(): string {\n // return path.join(__dirname, \".wallet\");\n return path.join(os.homedir(), \".wallet\");\n}\n\nexport function getVaultPath(): string {\n return path.join(getWalletDir(), \"vault.enc\");\n}\n\nexport function getConfigPath(): string {\n return path.join(getWalletDir(), \"config.json\");\n}\n\nexport function getSessionsPath(): string {\n return path.join(getWalletDir(), \"sessions.json\");\n}\n\nexport const SESSIONS_FILE = getSessionsPath();\n\nexport function ensureWalletDir(): void {\n const dir = getWalletDir();\n if (!fs.existsSync(dir)) {\n fs.mkdirSync(dir, { recursive: true, mode: 0o700 }); // owner-only access\n }\n}\n\nexport function vaultExists(): boolean {\n return fs.existsSync(getVaultPath());\n}\n\n// ── Encryption ────────────────────────────────────────────────────────────────\n\n/**\n * Encrypt and save the vault to disk.\n * @param data - vault contents (mnemonic + metadata)\n * @param password - user's wallet password\n */\nexport async function saveVault(\n data: VaultData,\n password: string,\n): Promise<void> {\n ensureWalletDir();\n\n const salt = crypto.randomBytes(SALT_LENGTH);\n const iv = crypto.randomBytes(IV_LENGTH);\n const key = await deriveKey(password, salt);\n\n const plaintext = JSON.stringify(data);\n const cipher = crypto.createCipheriv(CIPHER, key, iv);\n\n const encrypted = Buffer.concat([\n cipher.update(plaintext, \"utf8\"),\n cipher.final(),\n ]);\n\n const authTag = cipher.getAuthTag();\n\n const vault: EncryptedVault = {\n version: VAULT_VERSION,\n salt: salt.toString(\"hex\"),\n iv: iv.toString(\"hex\"),\n authTag: authTag.toString(\"hex\"),\n ciphertext: encrypted.toString(\"hex\"),\n };\n\n fs.writeFileSync(getVaultPath(), JSON.stringify(vault, null, 2), {\n mode: 0o600, // owner read/write only\n });\n}\n\n/**\n * Load and decrypt the vault from disk.\n * Throws if the password is wrong or the file has been tampered with.\n */\nexport async function loadVault(password: string): Promise<VaultData> {\n if (!vaultExists()) {\n throw new Error(\"No vault found. Run `wallet init` to create one.\");\n }\n\n const raw = fs.readFileSync(getVaultPath(), \"utf8\");\n const vault: EncryptedVault = JSON.parse(raw);\n\n if (vault.version !== VAULT_VERSION) {\n throw new Error(`Unsupported vault version: ${vault.version}`);\n }\n\n const salt = Buffer.from(vault.salt, \"hex\");\n const iv = Buffer.from(vault.iv, \"hex\");\n const authTag = Buffer.from(vault.authTag, \"hex\");\n const ciphertext = Buffer.from(vault.ciphertext, \"hex\");\n\n const key = await deriveKey(password, salt);\n\n try {\n const decipher = crypto.createDecipheriv(CIPHER, key, iv);\n decipher.setAuthTag(authTag);\n\n const decrypted = Buffer.concat([\n decipher.update(ciphertext),\n decipher.final(),\n ]);\n\n return JSON.parse(decrypted.toString(\"utf8\")) as VaultData;\n } catch {\n // GCM auth tag failure means wrong password OR tampered file\n throw new Error(\"Decryption failed: wrong password or vault is corrupted.\");\n }\n}\n\n/**\n * Change the vault password.\n * Decrypts with old password, re-encrypts with new password.\n */\nexport async function changePassword(\n oldPassword: string,\n newPassword: string,\n): Promise<void> {\n const data = await loadVault(oldPassword);\n await saveVault(data, newPassword);\n}\n\n// ── Internal ──────────────────────────────────────────────────────────────────\n\n/**\n * Derive a 256-bit AES key from a password using PBKDF2-SHA512.\n */\nfunction deriveKey(password: string, salt: Buffer): Promise<Buffer> {\n return new Promise((resolve, reject) => {\n crypto.pbkdf2(\n password,\n salt,\n PBKDF2_ITERATIONS,\n KEY_LENGTH,\n PBKDF2_DIGEST,\n (err, key) => {\n if (err) reject(err);\n else resolve(key);\n },\n );\n });\n}\n","/**\n *\n * BIP-44 HD key derivation for Solana accounts.\n *\n * Derivation path: m/44'/501'/index'/0'\n * 44' = BIP-44 purpose\n * 501' = Solana's registered coin type (SLIP-44)\n * n' = account index (0 = first account, 1 = second, etc.)\n * 0' = change (always 0 for Solana)\n *\n * This is the exact path Phantom, Backpack, and Solflare use.\n * Same seed → same addresses as those wallets.\n *\n * Dependencies: ed25519-hd-key, tweetnacl, bs58\n */\n\nimport { derivePath } from \"ed25519-hd-key\";\nimport nacl from \"tweetnacl\";\nimport bs58 from \"bs58\";\nimport { mnemonicToSeed } from \"./mnemonic\";\n\n// ── Types ─────────────────────────────────────────────────────────────────────\n\nexport interface Account {\n index: number; // derivation index\n name: string; // user-defined label\n publicKey: string; // Base58 encoded — this is the Solana address\n derivationPath: string; // m/44'/501'/index'/0'\n createdAt: string;\n}\n\n/**\n * In-memory keypair — private key NEVER persisted to disk.\n * Lives only for the duration of the daemon session.\n */\nexport interface AccountKeypair extends Account {\n secretKey: Uint8Array; // 64-byte Ed25519 secret key (seed + public key)\n}\n\nexport interface AccountStore {\n accounts: Account[];\n activeIndex: number;\n}\n\n// ── Derivation ────────────────────────────────────────────────────────────────\n\n/**\n * Derive an Ed25519 keypair at a specific BIP-44 index.\n * This is the core operation — called once per session after vault unlock.\n *\n * @param seed - 64-byte seed from BIP-39 mnemonic\n * @param index - account index (0-based)\n * @param name - label for this account\n */\nexport function deriveAccount(\n seed: Buffer,\n index: number,\n name: string = `Account ${index + 1}`,\n): AccountKeypair {\n const path = derivationPath(index);\n\n // SLIP-0010 Ed25519 derivation\n const { key: privateKeyBytes } = derivePath(path, seed.toString(\"hex\"));\n\n // nacl keypair from 32-byte seed\n const keypair = nacl.sign.keyPair.fromSeed(privateKeyBytes);\n\n const publicKey = bs58.encode(Buffer.from(keypair.publicKey));\n\n return {\n index,\n name,\n publicKey,\n secretKey: keypair.secretKey, // 64 bytes: seed + public key\n derivationPath: path,\n createdAt: new Date().toISOString(),\n };\n}\n\n/**\n * Derive multiple accounts at once.\n * Used on wallet startup to load all known accounts into memory.\n */\nexport function deriveAccounts(\n seed: Buffer,\n accountStore: AccountStore,\n): AccountKeypair[] {\n return accountStore.accounts.map((account) =>\n deriveAccount(seed, account.index, account.name),\n );\n}\n\n/**\n * Derive a single account directly from mnemonic.\n * Convenience wrapper used in tests and programmatic access.\n */\nexport async function deriveAccountFromMnemonic(\n mnemonic: string,\n index: number,\n name?: string,\n passphrase?: string,\n): Promise<AccountKeypair> {\n const seed = await mnemonicToSeed(mnemonic, passphrase);\n return deriveAccount(seed, index, name);\n}\n\n// ── Account Store ─────────────────────────────────────────────────────────────\n\n/**\n * Create a fresh account store with the first account.\n */\nexport function createAccountStore(\n firstAccountName: string = \"Account 1\",\n): AccountStore {\n return {\n accounts: [\n {\n index: 0,\n name: firstAccountName,\n publicKey: \"\", // filled in after derivation\n derivationPath: derivationPath(0),\n createdAt: new Date().toISOString(),\n },\n ],\n activeIndex: 0,\n };\n}\n\n/**\n * Add a new account to the store.\n * The next index is always max(existing indices) + 1.\n */\nexport function addAccount(\n store: AccountStore,\n seed: Buffer,\n name?: string,\n): { store: AccountStore; keypair: AccountKeypair } {\n const nextIndex =\n store.accounts.length > 0\n ? Math.max(...store.accounts.map((a) => a.index)) + 1\n : 0;\n\n const accountName = name ?? `Account ${nextIndex + 1}`;\n const keypair = deriveAccount(seed, nextIndex, accountName);\n\n const newAccount: Account = {\n index: nextIndex,\n name: accountName,\n publicKey: keypair.publicKey,\n derivationPath: keypair.derivationPath,\n createdAt: keypair.createdAt,\n };\n\n const updatedStore: AccountStore = {\n ...store,\n accounts: [...store.accounts, newAccount],\n };\n\n return { store: updatedStore, keypair };\n}\n\n/**\n * Set the active account by index.\n * The active account is used for all dApp connections and signing.\n */\nexport function setActiveAccount(\n store: AccountStore,\n index: number,\n): AccountStore {\n const exists = store.accounts.find((a) => a.index === index);\n if (!exists) {\n throw new Error(`Account index ${index} does not exist.`);\n }\n return { ...store, activeIndex: index };\n}\n\n/**\n * Rename an account.\n */\nexport function renameAccount(\n store: AccountStore,\n index: number,\n newName: string,\n): AccountStore {\n return {\n ...store,\n accounts: store.accounts.map((a) =>\n a.index === index ? { ...a, name: newName } : a,\n ),\n };\n}\n\n/**\n * Get the active account metadata from the store.\n */\nexport function getActiveAccount(store: AccountStore): Account {\n const account = store.accounts.find((a) => a.index === store.activeIndex);\n if (!account) throw new Error(\"No active account found.\");\n return account;\n}\n\n// ── Utilities ─────────────────────────────────────────────────────────────────\n\n/**\n * Sign a raw message with an account's secret key.\n * Returns a Base58 encoded signature.\n */\nexport function signMessage(\n message: Uint8Array,\n secretKey: Uint8Array,\n): string {\n const signature = nacl.sign.detached(message, secretKey);\n return bs58.encode(Buffer.from(signature));\n}\n\n/**\n * Format account for display in terminal.\n */\nexport function formatAccount(account: Account, isActive: boolean): string {\n const activeMarker = isActive ? \"●\" : \"○\";\n const shortKey = `${account.publicKey.slice(0, 4)}...${account.publicKey.slice(-4)}`;\n return `${activeMarker} [${account.index}] ${account.name.padEnd(20)} ${shortKey}`;\n}\n\n// ── Internal ──────────────────────────────────────────────────────────────────\n\nfunction derivationPath(index: number): string {\n return `m/44'/501'/${index}'/0'`;\n}\n","/**\n *\n * BIP-39 mnemonic generation, validation, and seed derivation.\n * Supports 12-word (128-bit) and 24-word (256-bit) mnemonics.\n *\n * Dependencies: bip39\n */\n\nimport * as bip39 from \"bip39\";\n\nexport type MnemonicStrength = 12 | 24; // 128 = 12 words, 256 = 24 words\n\nexport interface MnemonicResult {\n mnemonic: string;\n wordCount: 12 | 24;\n}\n\n/**\n * Generate a new cryptographically random BIP-39 mnemonic.\n * @param strength 128 for 12-word, 256 for 24-word (default: 128)\n */\nexport function generateMnemonic(\n strength: MnemonicStrength = 12,\n): MnemonicResult {\n const mnemonic = bip39.generateMnemonic(strength == 12 ? 128 : 256);\n const wordCount = strength;\n return { mnemonic, wordCount };\n}\n\n/**\n * Validate a BIP-39 mnemonic phrase.\n * Checks both wordlist membership and BIP-39 checksum.\n */\nexport function validateMnemonic(mnemonic: string): boolean {\n const cleaned = cleanMnemonic(mnemonic);\n return bip39.validateMnemonic(cleaned);\n}\n\n/**\n * Derive a 64-byte seed buffer from a mnemonic.\n * Optional passphrase adds extra security per BIP-39 spec.\n * This seed is the root of ALL derived accounts.\n */\nexport async function mnemonicToSeed(\n mnemonic: string,\n passphrase: string = \"\",\n): Promise<Buffer> {\n const cleaned = cleanMnemonic(mnemonic);\n\n if (!validateMnemonic(cleaned)) {\n throw new Error(\"Invalid mnemonic: failed wordlist or checksum validation\");\n }\n\n return bip39.mnemonicToSeed(cleaned, passphrase);\n}\n\n/**\n * Split mnemonic into a numbered word array.\n * Used for backup verification display in the terminal UI.\n *\n * Example output:\n * [ \"1. witch\", \"2. collapse\", \"3. practice\", ... ]\n */\nexport function mnemonicToNumberedWords(mnemonic: string): string[] {\n return cleanMnemonic(mnemonic)\n .split(\" \")\n .map((word, i) => `${i + 1}. ${word}`);\n}\n\n/**\n * Reconstruct mnemonic from a word array.\n * Used when user inputs words one by one during restore flow.\n */\nexport function wordsToMnemonic(words: string[]): string {\n return words.map((w) => w.trim().toLowerCase()).join(\" \");\n}\n\n// ── Internal ──────────────────────────────────────────────────────────────────\n\nfunction cleanMnemonic(mnemonic: string): string {\n return mnemonic.trim().toLowerCase().replace(/\\s+/g, \" \");\n}\n","/**\n *\n * Transaction signing and broadcasting.\n *\n * Two methods:\n * signTransaction → sign only, return signed tx bytes (dApp broadcasts)\n * signAndSendTransaction → sign + broadcast, return tx hash\n *\n * Both are supported so any dApp works regardless of which method it uses.\n *\n * Dependencies: @solana/web3.js, tweetnacl, bs58\n */\n\nimport {\n Connection,\n Transaction,\n VersionedTransaction,\n SendOptions,\n Keypair,\n} from \"@solana/web3.js\";\nimport nacl from \"tweetnacl\";\nimport bs58 from \"bs58\";\nimport { getConnection } from \"./rpc\";\nimport { AccountKeypair } from \"../vault/accounts\";\n\n// ── Types ─────────────────────────────────────────────────────────────────────\n\nexport interface SignedTransaction {\n serialized: string; // base64 encoded signed transaction\n signature: string; // base58 encoded signature (first signature)\n}\n\nexport interface SendResult {\n txHash: string; // transaction signature / hash\n confirmed: boolean;\n}\n\n// ── Sign Only ─────────────────────────────────────────────────────────────────\n\n/**\n * Sign a transaction without broadcasting.\n * Returns the signed transaction for the dApp to broadcast.\n * Used for: solana_signTransaction\n */\nexport async function signTransaction(\n serializedTx: string,\n keypair: AccountKeypair,\n): Promise<SignedTransaction> {\n const txBuffer = Buffer.from(serializedTx, \"base64\");\n const solanaKeypair = toSolanaKeypair(keypair);\n\n try {\n // Try versioned transaction first\n const versionedTx = VersionedTransaction.deserialize(txBuffer);\n versionedTx.sign([solanaKeypair]);\n\n const serialized = Buffer.from(versionedTx.serialize()).toString(\"base64\");\n const signature = bs58.encode(versionedTx.signatures[0]);\n\n return { serialized, signature };\n } catch {\n // Fall back to legacy transaction\n const legacyTx = Transaction.from(txBuffer);\n legacyTx.partialSign(solanaKeypair);\n\n const serialized = legacyTx\n .serialize({ requireAllSignatures: false })\n .toString(\"base64\");\n const signature = bs58.encode(legacyTx.signature!);\n\n return { serialized, signature };\n }\n}\n\n/**\n * Sign multiple transactions in a batch.\n * Used for: solana_signAllTransactions\n */\nexport async function signAllTransactions(\n serializedTxs: string[],\n keypair: AccountKeypair,\n): Promise<SignedTransaction[]> {\n return Promise.all(serializedTxs.map((tx) => signTransaction(tx, keypair)));\n}\n\n// ── Sign and Send ─────────────────────────────────────────────────────────────\n\n/**\n * Sign a transaction and broadcast it to Solana.\n * Returns the transaction hash after confirmation.\n * Used for: solana_signAndSendTransaction\n */\nexport async function signAndSendTransaction(\n serializedTx: string,\n keypair: AccountKeypair,\n options: SendOptions = {},\n conn?: Connection,\n): Promise<SendResult> {\n const { serialized } = await signTransaction(serializedTx, keypair);\n return sendSignedTransaction(serialized, options, conn);\n}\n\n/**\n * Broadcast an already-signed transaction.\n * Used when the wallet has already signed and just needs to broadcast.\n */\nexport async function sendSignedTransaction(\n serializedSignedTx: string,\n options: SendOptions = {},\n conn?: Connection,\n): Promise<SendResult> {\n const connection = conn ?? getConnection();\n const txBuffer = Buffer.from(serializedSignedTx, \"base64\");\n\n const sendOptions: SendOptions = {\n skipPreflight: false, // run preflight checks\n preflightCommitment: \"confirmed\",\n ...options,\n };\n\n let txHash: string;\n\n try {\n // Try versioned first\n const versionedTx = VersionedTransaction.deserialize(txBuffer);\n txHash = await connection.sendTransaction(versionedTx, sendOptions);\n } catch {\n // Fall back to legacy\n const legacyTx = Transaction.from(txBuffer);\n txHash = await connection.sendRawTransaction(\n legacyTx.serialize(),\n sendOptions,\n );\n }\n\n // Wait for confirmation\n const { blockhash, lastValidBlockHeight } =\n await connection.getLatestBlockhash();\n const confirmResult = await connection.confirmTransaction(\n { signature: txHash, blockhash, lastValidBlockHeight },\n \"confirmed\",\n );\n\n return {\n txHash,\n confirmed: !confirmResult.value.err,\n };\n}\n\n// ── Message Signing ───────────────────────────────────────────────────────────\n\n/**\n * Sign an off-chain message (for authentication / proof of ownership).\n * Used for: solana_signMessage\n * Returns base58 encoded signature.\n */\nexport function signOffchainMessage(\n message: Uint8Array,\n keypair: AccountKeypair,\n): string {\n const signature = nacl.sign.detached(message, keypair.secretKey);\n return bs58.encode(Buffer.from(signature));\n}\n\n// ── Internal ──────────────────────────────────────────────────────────────────\n\n/**\n * Convert our AccountKeypair to a @solana/web3.js Keypair.\n * The secretKey is already in the correct 64-byte format.\n */\nfunction toSolanaKeypair(keypair: AccountKeypair): Keypair {\n return Keypair.fromSecretKey(keypair.secretKey);\n}\n","/**\n *\n * The central request handler — every signing request from every source\n * (WalletConnect, WebSocket, direct import) flows through here.\n *\n * Pipeline for every request:\n * 1. Parse intent (what method, what transaction)\n * 2. Simulate the transaction on Solana\n * 3. Sign (and optionally send)\n * 4. Return result to caller\n *\n * No request bypasses this pipeline.\n *\n * Dependencies: ../solana/simulate, ../solana/tx, ../vault\n */\n\nimport { simulateTransaction } from \"../solana/simulate\";\nimport {\n signTransaction,\n signAllTransactions,\n signAndSendTransaction,\n signOffchainMessage,\n} from \"../solana/tx\";\nimport { WalletVault } from \"../vault\";\nimport bs58 from \"bs58\";\n\nexport interface DappMetadata {\n name: string;\n url: string;\n icon?: string;\n}\n\n// ── Types ─────────────────────────────────────────────────────────────────────\n\nexport type WalletMethod =\n | \"solana_signTransaction\"\n | \"solana_signAndSendTransaction\"\n | \"solana_signAllTransactions\"\n | \"solana_signMessage\"\n | \"solana_connect\"\n | \"solana_disconnect\";\n\nexport interface WalletRequest {\n id: string | number;\n method: WalletMethod;\n params: {\n transaction?: string; // base64 encoded\n transactions?: string[]; // for signAll\n message?: string; // for signMessage\n options?: Record<string, any>;\n };\n topic: string;\n dapp: DappMetadata;\n agentId?: string; // identifies which agent sent this request\n}\n\nexport interface WalletResponse {\n id: string | number;\n result?: any;\n error?: {\n code: number;\n message: string;\n };\n}\n\n// ── Error Codes (matching WalletConnect standard) ─────────────────────────────\n\nexport const ERROR_CODES = {\n USER_REJECTED: 4001,\n UNAUTHORIZED: 4100,\n UNSUPPORTED_METHOD: 4200,\n DISCONNECTED: 4900,\n CHAIN_DISCONNECTED: 4901,\n};\n\n// ── Handler ───────────────────────────────────────────────────────────────────\n\nexport class WalletRequestHandler {\n private vault: WalletVault;\n\n constructor(vault: WalletVault) {\n this.vault = vault;\n }\n\n /**\n * Handle any incoming wallet request.\n * This is the single entry point — all bridges call this.\n */\n async handle(request: WalletRequest): Promise<WalletResponse> {\n try {\n switch (request.method) {\n case \"solana_connect\":\n return this.handleConnect(request);\n\n case \"solana_disconnect\":\n return this.handleDisconnect(request);\n\n case \"solana_signTransaction\":\n return this.handleSignTransaction(request);\n\n case \"solana_signAndSendTransaction\":\n return this.handleSignAndSend(request);\n\n case \"solana_signAllTransactions\":\n return this.handleSignAll(request);\n\n case \"solana_signMessage\":\n return this.handleSignMessage(request);\n\n default:\n return this.errorResponse(\n request.id,\n ERROR_CODES.UNSUPPORTED_METHOD,\n `Method not supported: ${request.method}`,\n );\n }\n } catch (err) {\n return this.errorResponse(\n request.id,\n 4000,\n err instanceof Error ? err.message : \"Unknown error\",\n );\n }\n }\n\n // ── Connect / Disconnect ───────────────────────────────────────────────────\n\n private async handleConnect(request: WalletRequest): Promise<WalletResponse> {\n const keypair = this.vault.getActiveKeypair();\n return {\n id: request.id,\n result: {\n publicKey: keypair.publicKey,\n },\n };\n }\n\n private async handleDisconnect(\n request: WalletRequest,\n ): Promise<WalletResponse> {\n return { id: request.id, result: { disconnected: true } };\n }\n\n // ── Sign Transaction ───────────────────────────────────────────────────────\n\n private async handleSignTransaction(\n request: WalletRequest,\n ): Promise<WalletResponse> {\n const tx = request.params.transaction;\n if (!tx) return this.errorResponse(request.id, 4000, \"Missing transaction\");\n\n const keypair = this.vault.getActiveKeypair();\n\n // 1. Simulate\n const simulation = await simulateTransaction(tx, keypair.publicKey);\n this.log(request, `simulate → ${simulation.success ? \"ok\" : \"fail\"}`);\n\n if (!simulation.success) {\n return this.errorResponse(\n request.id,\n 4000,\n `Simulation failed: ${simulation.error}`,\n );\n }\n\n // 2. Sign — return signed bytes, dApp broadcasts\n const signed = await signTransaction(tx, keypair);\n this.log(request, `signed → ${signed.signature.slice(0, 8)}...`);\n\n return {\n id: request.id,\n result: { signedTransaction: signed.serialized },\n };\n }\n\n // ── Sign and Send ──────────────────────────────────────────────────────────\n\n private async handleSignAndSend(\n request: WalletRequest,\n ): Promise<WalletResponse> {\n const tx = request.params.transaction;\n if (!tx) return this.errorResponse(request.id, 4000, \"Missing transaction\");\n\n const keypair = this.vault.getActiveKeypair();\n\n // 1. Simulate\n const simulation = await simulateTransaction(tx, keypair.publicKey);\n this.log(request, `simulate → ${simulation.success ? \"ok\" : \"fail\"}`);\n\n if (!simulation.success) {\n return this.errorResponse(\n request.id,\n 4000,\n `Simulation failed: ${simulation.error}`,\n );\n }\n\n // 2. Sign + broadcast — wallet returns tx hash to dApp\n const result = await signAndSendTransaction(tx, keypair);\n this.log(request, `sent → ${result.txHash.slice(0, 8)}...`);\n\n return {\n id: request.id,\n result: {\n signature: result.txHash,\n confirmed: result.confirmed,\n },\n };\n }\n\n // ── Sign All Transactions ──────────────────────────────────────────────────\n\n private async handleSignAll(request: WalletRequest): Promise<WalletResponse> {\n const txs = request.params.transactions;\n if (!txs?.length)\n return this.errorResponse(request.id, 4000, \"Missing transactions\");\n\n const keypair = this.vault.getActiveKeypair();\n\n // Simulate each before signing any\n for (const tx of txs) {\n const simulation = await simulateTransaction(tx, keypair.publicKey);\n if (!simulation.success) {\n return this.errorResponse(\n request.id,\n 4000,\n `Simulation failed for tx in batch: ${simulation.error}`,\n );\n }\n }\n\n // All simulations passed — sign all\n const signed = await signAllTransactions(txs, keypair);\n this.log(request, `signed ${signed.length} transactions`);\n\n return {\n id: request.id,\n result: { signedTransactions: signed.map((s) => s.serialized) },\n };\n }\n\n // ── Sign Message ───────────────────────────────────────────────────────────\n\n private async handleSignMessage(\n request: WalletRequest,\n ): Promise<WalletResponse> {\n const message = request.params.message;\n if (!message)\n return this.errorResponse(request.id, 4000, \"Missing message\");\n\n const keypair = this.vault.getActiveKeypair();\n\n // WalletConnect sends message as base58-encoded bytes.\n // WebSocket / inject.js sends it as base64.\n // Decode to raw Uint8Array before signing.\n let messageBytes: Uint8Array;\n try {\n messageBytes = decodeMessage(message);\n } catch {\n return this.errorResponse(\n request.id,\n 4000,\n \"Could not decode message bytes\",\n );\n }\n\n const signature = signOffchainMessage(messageBytes, keypair);\n this.log(request, \"message signed\");\n\n // Return both signature and publicKey — required by Wallet Standard\n return {\n id: request.id,\n result: {\n signature,\n publicKey: keypair.publicKey,\n },\n };\n }\n\n // ── Helpers ────────────────────────────────────────────────────────────────\n\n private errorResponse(\n id: string | number,\n code: number,\n message: string,\n ): WalletResponse {\n return { id, error: { code, message } };\n }\n\n // TODO: handle logging\n private log(request: WalletRequest, note: string): void {\n // return { request, note };\n // const source = request.agentId ?? request.dapp?.name ?? \"unknown\";\n // addLog(\"handler\", `${request.method} | ${source} | ${note}`, \"info\");\n }\n}\n\n// ── Message Decoding ─────────────────────────────────────────────────────────\n// dApps encode messages differently depending on the transport:\n// WalletConnect → base58\n// WebSocket / inject.js → base64\n// Try base58 first (more common), fall back to base64, then UTF-8.\n\nfunction decodeMessage(message: string): Uint8Array {\n // Try base58 first (WalletConnect standard)\n try {\n const decoded = bs58.decode(message);\n if (decoded.length > 0) return decoded;\n } catch {}\n\n // Try base64 (WebSocket / inject.js)\n try {\n const decoded = Buffer.from(message, \"base64\");\n if (decoded.length > 0) return decoded;\n } catch {}\n\n // Fall back to raw UTF-8 string\n return new TextEncoder().encode(message);\n}\n\n// ── Functional API ────────────────────────────────────────────────────────────\n// Used by websocket.ts and walletconnect.ts so they don't need to\n// instantiate the class themselves.\n\nexport interface HandlerOptions {\n vault: WalletVault;\n}\n\n/**\n * Stateless wrapper around WalletRequestHandler.\n * websocket.ts and walletconnect.ts call this directly.\n */\nexport async function handleRequest(\n request: WalletRequest,\n options: HandlerOptions,\n): Promise<WalletResponse> {\n const handler = new WalletRequestHandler(options.vault);\n return handler.handle(request);\n}\n\nexport * from \"./walletConnect\";\n","import * as fs from \"fs\";\nimport { SESSIONS_FILE, ensureWalletDir } from \"../vault/keystore\";\n\nexport interface DappSession {\n topic: string;\n dappName: string;\n dappUrl: string;\n dappIcon?: string;\n connectedAccount: string;\n connectedAt: string;\n lastActivity: string;\n permissions: string[];\n chainId: string;\n active: boolean;\n}\n\ninterface SessionStore {\n sessions: DappSession[];\n}\n\nfunction read(): SessionStore {\n ensureWalletDir();\n if (!fs.existsSync(SESSIONS_FILE)) return { sessions: [] };\n return JSON.parse(fs.readFileSync(SESSIONS_FILE, \"utf8\"));\n}\n\nfunction write(store: SessionStore): void {\n ensureWalletDir();\n fs.writeFileSync(SESSIONS_FILE, JSON.stringify(store, null, 2));\n}\n\nexport function saveSession(session: DappSession): void {\n const store = read();\n const idx = store.sessions.findIndex((s) => s.topic === session.topic);\n if (idx >= 0) {\n store.sessions[idx] = session;\n } else {\n store.sessions.push(session);\n }\n write(store);\n}\n\nexport function removeSession(topic: string): void {\n const store = read();\n store.sessions = store.sessions.filter((s) => s.topic !== topic);\n write(store);\n}\n\nexport function getSession(topic: string): DappSession | undefined {\n return read().sessions.find((s) => s.topic === topic);\n}\n\nexport function getAllSessions(): DappSession[] {\n return read().sessions.filter((s) => s.active);\n}\n\nexport function updateActivity(topic: string): void {\n const store = read();\n const sess = store.sessions.find((s) => s.topic === topic);\n if (sess) {\n sess.lastActivity = new Date().toISOString();\n write(store);\n }\n}\n\nexport function markInactive(topic: string): void {\n const store = read();\n const sess = store.sessions.find((s) => s.topic === topic);\n if (sess) {\n sess.active = false;\n write(store);\n }\n}\n"],"mappings":";;;AAAA,OAAO,mBAAmB;AAE1B,SAAS,mBAAmB;AAE5B,OAAO,WAAW;;;ACJlB;AAAA,EAEE;AAAA,EACA;AAAA,EACA,oBAAAA;AAAA,OACK;;;ACGP,SAAS,YAAY,WAAW,wBAAwB;;;ACIxD,OAAOC,SAAQ;;;ACIf,OAAO,QAAQ;AACf,OAAO,QAAQ;AACf,OAAO,UAAU;AA8BV,SAAS,eAAuB;AAErC,SAAO,KAAK,KAAK,GAAG,QAAQ,GAAG,SAAS;AAC1C;AAMO,SAAS,gBAAwB;AACtC,SAAO,KAAK,KAAK,aAAa,GAAG,aAAa;AAChD;AAEO,SAAS,kBAA0B;AACxC,SAAO,KAAK,KAAK,aAAa,GAAG,eAAe;AAClD;AAEO,IAAM,gBAAgB,gBAAgB;AAEtC,SAAS,kBAAwB;AACtC,QAAM,MAAM,aAAa;AACzB,MAAI,CAAC,GAAG,WAAW,GAAG,GAAG;AACvB,OAAG,UAAU,KAAK,EAAE,WAAW,MAAM,MAAM,IAAM,CAAC;AAAA,EACpD;AACF;;;ACxDA,SAAS,kBAAkB;AAC3B,OAAO,UAAU;AACjB,OAAO,UAAU;;;ACVjB,YAAY,WAAW;;;AHwBvB,IAAM,iBAAiB,QAAQ,IAAI;AAC5B,IAAM,WAA2D;AAAA,EACtE,gBAAgB,iBACZ,2CAA2C,cAAc,KACzD;AAAA,EACJ,QAAQ,iBACJ,0CAA0C,cAAc,KACxD;AAAA,EACJ,SAAS;AAAA,EACT,UAAU;AACZ;AAMO,SAAS,eAAwB;AACtC,SAAOC,IAAG,WAAW,cAAc,CAAC;AACtC;AAEO,SAAS,aAA2B;AACzC,MAAI,CAAC,aAAa,GAAG;AACnB,UAAM,IAAI,MAAM,2CAA2C;AAAA,EAC7D;AACA,QAAM,MAAMA,IAAG,aAAa,cAAc,GAAG,MAAM;AACnD,SAAO,KAAK,MAAM,GAAG;AACvB;AAkDO,SAAS,YAAoB;AAClC,SAAO,WAAW,EAAE;AACtB;;;ADjGA,IAAI,cAAiC;AAE9B,SAAS,cAAc,WAAoB,OAAmB;AACnE,MAAI,CAAC,eAAe,UAAU;AAC5B,UAAM,SAAS,UAAU;AACzB,kBAAc,IAAI,WAAW,QAAQ,WAAW;AAAA,EAClD;AACA,SAAO;AACT;;;ADiCA,eAAsB,oBACpB,cACA,iBACA,MAC2B;AAC3B,QAAM,aAAa,QAAQ,cAAc;AAEzC,MAAI;AACF,UAAM,WAAW,OAAO,KAAK,cAAc,QAAQ;AAGnD,QAAI;AAEJ,QAAI;AACF,YAAM,cAAc,qBAAqB,YAAY,QAAQ;AAC7D,mBAAa,MAAM,WAAW,oBAAoB,aAAa;AAAA,QAC7D,WAAW;AAAA;AAAA,QACX,wBAAwB;AAAA,MAC1B,CAAC;AAAA,IACH,QAAQ;AAEN,YAAM,WAAW,YAAY,KAAK,QAAQ;AAC1C,mBAAa,MAAM,WAAW,oBAAoB,UAAU,CAAC,CAAC;AAAA,IAChE;AAEA,UAAM,EAAE,MAAM,IAAI;AAElB,WAAO,sBAAsB,OAAO,iBAAiB,QAAQ;AAAA,EAC/D,SAAS,KAAK;AAEZ,WAAO;AAAA,MACL,SAAS;AAAA,MACT,OAAO,eAAe,QAAQ,IAAI,UAAU;AAAA,MAC5C,MAAM,CAAC;AAAA,MACP,gBAAgB,CAAC;AAAA,MACjB,cAAc,CAAC;AAAA,MACf,sBAAsB;AAAA,MACtB,YAAY,CAAC;AAAA,MACb,KAAK;AAAA,MACL,SAAS,CAAC;AAAA,IACZ;AAAA,EACF;AACF;AAGA,SAAS,sBACP,OACA,iBACA,UACkB;AAClB,QAAM,UAAU,CAAC,MAAM;AACvB,QAAM,OAAiB,MAAM,QAAQ,CAAC;AAGtC,QAAM,kBAAmC,MAAM,YAAY,CAAC,GACzD,IAAI,CAAC,SAAc,MAAc;AAChC,QAAI,CAAC,QAAS,QAAO;AACrB,UAAM,aAAa,QAAQ,YAAY;AACvC,UAAM,cAAc,QAAQ,YAAY;AACxC,WAAO;AAAA,MACL,SAAS;AAAA;AAAA,MACT;AAAA,MACA;AAAA,MACA,WAAW,cAAc,cAAcC;AAAA,MACvC,YAAY;AAAA,MACZ,UAAU,MAAM;AAAA,IAClB;AAAA,EACF,CAAC,EACA,OAAO,OAAO;AAGjB,QAAM,aAAa,kBAAkB,IAAI;AAGzC,QAAM,uBAAuB,oBAAoB,IAAI;AAGrD,QAAM,MAAM;AAEZ,SAAO;AAAA,IACL;AAAA,IACA,OAAO,MAAM,MAAM,KAAK,UAAU,MAAM,GAAG,IAAI;AAAA,IAC/C,MAAM,WAAW,IAAI;AAAA,IACrB;AAAA,IACA,cAAc,CAAC;AAAA;AAAA,IACf;AAAA,IACA;AAAA,IACA;AAAA,IACA,SAAS;AAAA,EACX;AACF;AAEA,SAAS,kBAAkB,MAA0B;AACnD,QAAM,MAAM,oBAAI,IAAY;AAC5B,QAAM,gBAAgB;AACtB,aAAW,OAAO,MAAM;AACtB,UAAM,QAAQ,IAAI,MAAM,aAAa;AACrC,QAAI,MAAO,KAAI,IAAI,MAAM,CAAC,CAAC;AAAA,EAC7B;AACA,SAAO,MAAM,KAAK,GAAG;AACvB;AAEA,SAAS,oBAAoB,MAAwB;AACnD,aAAW,OAAO,MAAM;AACtB,UAAM,QAAQ,IAAI,MAAM,mBAAmB;AAC3C,QAAI,MAAO,QAAO,SAAS,MAAM,CAAC,GAAG,EAAE;AAAA,EACzC;AACA,SAAO;AACT;AAEA,SAAS,WAAW,MAA0B;AAC5C,SAAO,KAAK,IAAI,CAAC,QAAQ;AAEvB,WAAO,IAAI,QAAQ,sCAAsC,CAAC,SAAS;AACjE,YAAM,QAAQ,eAAe,IAAI;AACjC,aAAO,QAAQ,QAAQ,GAAG,KAAK,MAAM,GAAG,CAAC,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;AAAA,IAC/D,CAAC;AAAA,EACH,CAAC;AACH;AAGA,IAAM,iBAAyC;AAAA,EAC7C,oCAAoC;AAAA,EACpC,6CAA6C;AAAA,EAC7C,6CAA6C;AAAA,EAC7C,gDAAgD;AAAA,EAChD,6CAA6C;AAAA,EAC7C,6CAA6C;AAAA,EAC7C,6CAA6C;AAC/C;;;AM1KA;AAAA,EAEE,eAAAC;AAAA,EACA,wBAAAC;AAAA,EAEA;AAAA,OACK;AACP,OAAOC,WAAU;AACjB,OAAOC,WAAU;AAuBjB,eAAsB,gBACpB,cACA,SAC4B;AAC5B,QAAM,WAAW,OAAO,KAAK,cAAc,QAAQ;AACnD,QAAM,gBAAgB,gBAAgB,OAAO;AAE7C,MAAI;AAEF,UAAM,cAAcC,sBAAqB,YAAY,QAAQ;AAC7D,gBAAY,KAAK,CAAC,aAAa,CAAC;AAEhC,UAAM,aAAa,OAAO,KAAK,YAAY,UAAU,CAAC,EAAE,SAAS,QAAQ;AACzE,UAAM,YAAYC,MAAK,OAAO,YAAY,WAAW,CAAC,CAAC;AAEvD,WAAO,EAAE,YAAY,UAAU;AAAA,EACjC,QAAQ;AAEN,UAAM,WAAWC,aAAY,KAAK,QAAQ;AAC1C,aAAS,YAAY,aAAa;AAElC,UAAM,aAAa,SAChB,UAAU,EAAE,sBAAsB,MAAM,CAAC,EACzC,SAAS,QAAQ;AACpB,UAAM,YAAYD,MAAK,OAAO,SAAS,SAAU;AAEjD,WAAO,EAAE,YAAY,UAAU;AAAA,EACjC;AACF;AAMA,eAAsB,oBACpB,eACA,SAC8B;AAC9B,SAAO,QAAQ,IAAI,cAAc,IAAI,CAAC,OAAO,gBAAgB,IAAI,OAAO,CAAC,CAAC;AAC5E;AASA,eAAsB,uBACpB,cACA,SACA,UAAuB,CAAC,GACxB,MACqB;AACrB,QAAM,EAAE,WAAW,IAAI,MAAM,gBAAgB,cAAc,OAAO;AAClE,SAAO,sBAAsB,YAAY,SAAS,IAAI;AACxD;AAMA,eAAsB,sBACpB,oBACA,UAAuB,CAAC,GACxB,MACqB;AACrB,QAAM,aAAa,QAAQ,cAAc;AACzC,QAAM,WAAW,OAAO,KAAK,oBAAoB,QAAQ;AAEzD,QAAM,cAA2B;AAAA,IAC/B,eAAe;AAAA;AAAA,IACf,qBAAqB;AAAA,IACrB,GAAG;AAAA,EACL;AAEA,MAAI;AAEJ,MAAI;AAEF,UAAM,cAAcD,sBAAqB,YAAY,QAAQ;AAC7D,aAAS,MAAM,WAAW,gBAAgB,aAAa,WAAW;AAAA,EACpE,QAAQ;AAEN,UAAM,WAAWE,aAAY,KAAK,QAAQ;AAC1C,aAAS,MAAM,WAAW;AAAA,MACxB,SAAS,UAAU;AAAA,MACnB;AAAA,IACF;AAAA,EACF;AAGA,QAAM,EAAE,WAAW,qBAAqB,IACtC,MAAM,WAAW,mBAAmB;AACtC,QAAM,gBAAgB,MAAM,WAAW;AAAA,IACrC,EAAE,WAAW,QAAQ,WAAW,qBAAqB;AAAA,IACrD;AAAA,EACF;AAEA,SAAO;AAAA,IACL;AAAA,IACA,WAAW,CAAC,cAAc,MAAM;AAAA,EAClC;AACF;AASO,SAAS,oBACd,SACA,SACQ;AACR,QAAM,YAAYC,MAAK,KAAK,SAAS,SAAS,QAAQ,SAAS;AAC/D,SAAOF,MAAK,OAAO,OAAO,KAAK,SAAS,CAAC;AAC3C;AAQA,SAAS,gBAAgB,SAAkC;AACzD,SAAO,QAAQ,cAAc,QAAQ,SAAS;AAChD;;;ACpJA,OAAOG,WAAU;AA2CV,IAAM,cAAc;AAAA,EACzB,eAAe;AAAA,EACf,cAAc;AAAA,EACd,oBAAoB;AAAA,EACpB,cAAc;AAAA,EACd,oBAAoB;AACtB;AAIO,IAAM,uBAAN,MAA2B;AAAA,EACxB;AAAA,EAER,YAAY,OAAoB;AAC9B,SAAK,QAAQ;AAAA,EACf;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAM,OAAO,SAAiD;AAC5D,QAAI;AACF,cAAQ,QAAQ,QAAQ;AAAA,QACtB,KAAK;AACH,iBAAO,KAAK,cAAc,OAAO;AAAA,QAEnC,KAAK;AACH,iBAAO,KAAK,iBAAiB,OAAO;AAAA,QAEtC,KAAK;AACH,iBAAO,KAAK,sBAAsB,OAAO;AAAA,QAE3C,KAAK;AACH,iBAAO,KAAK,kBAAkB,OAAO;AAAA,QAEvC,KAAK;AACH,iBAAO,KAAK,cAAc,OAAO;AAAA,QAEnC,KAAK;AACH,iBAAO,KAAK,kBAAkB,OAAO;AAAA,QAEvC;AACE,iBAAO,KAAK;AAAA,YACV,QAAQ;AAAA,YACR,YAAY;AAAA,YACZ,yBAAyB,QAAQ,MAAM;AAAA,UACzC;AAAA,MACJ;AAAA,IACF,SAAS,KAAK;AACZ,aAAO,KAAK;AAAA,QACV,QAAQ;AAAA,QACR;AAAA,QACA,eAAe,QAAQ,IAAI,UAAU;AAAA,MACvC;AAAA,IACF;AAAA,EACF;AAAA;AAAA,EAIA,MAAc,cAAc,SAAiD;AAC3E,UAAM,UAAU,KAAK,MAAM,iBAAiB;AAC5C,WAAO;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,QAAQ;AAAA,QACN,WAAW,QAAQ;AAAA,MACrB;AAAA,IACF;AAAA,EACF;AAAA,EAEA,MAAc,iBACZ,SACyB;AACzB,WAAO,EAAE,IAAI,QAAQ,IAAI,QAAQ,EAAE,cAAc,KAAK,EAAE;AAAA,EAC1D;AAAA;AAAA,EAIA,MAAc,sBACZ,SACyB;AACzB,UAAM,KAAK,QAAQ,OAAO;AAC1B,QAAI,CAAC,GAAI,QAAO,KAAK,cAAc,QAAQ,IAAI,KAAM,qBAAqB;AAE1E,UAAM,UAAU,KAAK,MAAM,iBAAiB;AAG5C,UAAM,aAAa,MAAM,oBAAoB,IAAI,QAAQ,SAAS;AAClE,SAAK,IAAI,SAAS,mBAAc,WAAW,UAAU,OAAO,MAAM,EAAE;AAEpE,QAAI,CAAC,WAAW,SAAS;AACvB,aAAO,KAAK;AAAA,QACV,QAAQ;AAAA,QACR;AAAA,QACA,sBAAsB,WAAW,KAAK;AAAA,MACxC;AAAA,IACF;AAGA,UAAM,SAAS,MAAM,gBAAgB,IAAI,OAAO;AAChD,SAAK,IAAI,SAAS,iBAAY,OAAO,UAAU,MAAM,GAAG,CAAC,CAAC,KAAK;AAE/D,WAAO;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,QAAQ,EAAE,mBAAmB,OAAO,WAAW;AAAA,IACjD;AAAA,EACF;AAAA;AAAA,EAIA,MAAc,kBACZ,SACyB;AACzB,UAAM,KAAK,QAAQ,OAAO;AAC1B,QAAI,CAAC,GAAI,QAAO,KAAK,cAAc,QAAQ,IAAI,KAAM,qBAAqB;AAE1E,UAAM,UAAU,KAAK,MAAM,iBAAiB;AAG5C,UAAM,aAAa,MAAM,oBAAoB,IAAI,QAAQ,SAAS;AAClE,SAAK,IAAI,SAAS,mBAAc,WAAW,UAAU,OAAO,MAAM,EAAE;AAEpE,QAAI,CAAC,WAAW,SAAS;AACvB,aAAO,KAAK;AAAA,QACV,QAAQ;AAAA,QACR;AAAA,QACA,sBAAsB,WAAW,KAAK;AAAA,MACxC;AAAA,IACF;AAGA,UAAM,SAAS,MAAM,uBAAuB,IAAI,OAAO;AACvD,SAAK,IAAI,SAAS,eAAU,OAAO,OAAO,MAAM,GAAG,CAAC,CAAC,KAAK;AAE1D,WAAO;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,QAAQ;AAAA,QACN,WAAW,OAAO;AAAA,QAClB,WAAW,OAAO;AAAA,MACpB;AAAA,IACF;AAAA,EACF;AAAA;AAAA,EAIA,MAAc,cAAc,SAAiD;AAC3E,UAAM,MAAM,QAAQ,OAAO;AAC3B,QAAI,CAAC,KAAK;AACR,aAAO,KAAK,cAAc,QAAQ,IAAI,KAAM,sBAAsB;AAEpE,UAAM,UAAU,KAAK,MAAM,iBAAiB;AAG5C,eAAW,MAAM,KAAK;AACpB,YAAM,aAAa,MAAM,oBAAoB,IAAI,QAAQ,SAAS;AAClE,UAAI,CAAC,WAAW,SAAS;AACvB,eAAO,KAAK;AAAA,UACV,QAAQ;AAAA,UACR;AAAA,UACA,sCAAsC,WAAW,KAAK;AAAA,QACxD;AAAA,MACF;AAAA,IACF;AAGA,UAAM,SAAS,MAAM,oBAAoB,KAAK,OAAO;AACrD,SAAK,IAAI,SAAS,UAAU,OAAO,MAAM,eAAe;AAExD,WAAO;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,QAAQ,EAAE,oBAAoB,OAAO,IAAI,CAAC,MAAM,EAAE,UAAU,EAAE;AAAA,IAChE;AAAA,EACF;AAAA;AAAA,EAIA,MAAc,kBACZ,SACyB;AACzB,UAAM,UAAU,QAAQ,OAAO;AAC/B,QAAI,CAAC;AACH,aAAO,KAAK,cAAc,QAAQ,IAAI,KAAM,iBAAiB;AAE/D,UAAM,UAAU,KAAK,MAAM,iBAAiB;AAK5C,QAAI;AACJ,QAAI;AACF,qBAAe,cAAc,OAAO;AAAA,IACtC,QAAQ;AACN,aAAO,KAAK;AAAA,QACV,QAAQ;AAAA,QACR;AAAA,QACA;AAAA,MACF;AAAA,IACF;AAEA,UAAM,YAAY,oBAAoB,cAAc,OAAO;AAC3D,SAAK,IAAI,SAAS,gBAAgB;AAGlC,WAAO;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,QAAQ;AAAA,QACN;AAAA,QACA,WAAW,QAAQ;AAAA,MACrB;AAAA,IACF;AAAA,EACF;AAAA;AAAA,EAIQ,cACN,IACA,MACA,SACgB;AAChB,WAAO,EAAE,IAAI,OAAO,EAAE,MAAM,QAAQ,EAAE;AAAA,EACxC;AAAA;AAAA,EAGQ,IAAI,SAAwB,MAAoB;AAAA,EAIxD;AACF;AAQA,SAAS,cAAc,SAA6B;AAElD,MAAI;AACF,UAAM,UAAUA,MAAK,OAAO,OAAO;AACnC,QAAI,QAAQ,SAAS,EAAG,QAAO;AAAA,EACjC,QAAQ;AAAA,EAAC;AAGT,MAAI;AACF,UAAM,UAAU,OAAO,KAAK,SAAS,QAAQ;AAC7C,QAAI,QAAQ,SAAS,EAAG,QAAO;AAAA,EACjC,QAAQ;AAAA,EAAC;AAGT,SAAO,IAAI,YAAY,EAAE,OAAO,OAAO;AACzC;AAcA,eAAsB,cACpB,SACA,SACyB;AACzB,QAAM,UAAU,IAAI,qBAAqB,QAAQ,KAAK;AACtD,SAAO,QAAQ,OAAO,OAAO;AAC/B;;;AClVA,YAAYC,SAAQ;AAoBpB,SAAS,OAAqB;AAC5B,kBAAgB;AAChB,MAAI,CAAI,eAAW,aAAa,EAAG,QAAO,EAAE,UAAU,CAAC,EAAE;AACzD,SAAO,KAAK,MAAS,iBAAa,eAAe,MAAM,CAAC;AAC1D;AAEA,SAAS,MAAM,OAA2B;AACxC,kBAAgB;AAChB,EAAG,kBAAc,eAAe,KAAK,UAAU,OAAO,MAAM,CAAC,CAAC;AAChE;AAEO,SAAS,YAAY,SAA4B;AACtD,QAAM,QAAQ,KAAK;AACnB,QAAM,MAAM,MAAM,SAAS,UAAU,CAAC,MAAM,EAAE,UAAU,QAAQ,KAAK;AACrE,MAAI,OAAO,GAAG;AACZ,UAAM,SAAS,GAAG,IAAI;AAAA,EACxB,OAAO;AACL,UAAM,SAAS,KAAK,OAAO;AAAA,EAC7B;AACA,QAAM,KAAK;AACb;AAEO,SAAS,cAAc,OAAqB;AACjD,QAAM,QAAQ,KAAK;AACnB,QAAM,WAAW,MAAM,SAAS,OAAO,CAAC,MAAM,EAAE,UAAU,KAAK;AAC/D,QAAM,KAAK;AACb;AAmBO,SAAS,aAAa,OAAqB;AAChD,QAAM,QAAQ,KAAK;AACnB,QAAM,OAAO,MAAM,SAAS,KAAK,CAAC,MAAM,EAAE,UAAU,KAAK;AACzD,MAAI,MAAM;AACR,SAAK,SAAS;AACd,UAAM,KAAK;AAAA,EACb;AACF;;;ATvEA,IAAM,aAAc,cAAsB,WAAW;AAOrD,IAAM,WAAW;AASjB,IAAI,aAAqD;AAEzD,eAAsB,kBAAkB,MAA4B;AAClE,eAAa,MAAM,WAAW,KAAK;AAAA,IACjC,WAAW,KAAK;AAAA,IAChB,UAAU;AAAA,MACR,MAAM;AAAA,MACN,aAAa;AAAA,MACb,KAAK;AAAA,MACL,OAAO,CAAC;AAAA,IACV;AAAA,EACF,CAAC;AAED,UAAQ,IAAI,MAAM,MAAM,gCAAgC,CAAC;AAGzD,aAAW,GAAG,oBAAoB,OAAO,EAAE,IAAI,OAAO,MAAW;AAC/D,UAAM,OAAO,OAAO,SAAS;AAC7B,YAAQ;AAAA,MACN,MAAM,KAAK;AAAA,8BAAiC,KAAK,IAAI,KAAK,KAAK,GAAG,GAAG;AAAA,IACvE;AAGA,QAAI,WAAW;AACf,QAAI,KAAK,mBAAmB;AAC1B,iBAAW,MAAM,KAAK,kBAAkB,IAAI;AAAA,IAC9C;AAEA,QAAI,CAAC,UAAU;AACb,YAAM,WAAY,OAAO,EAAE,IAAI,QAAQ,YAAY,eAAe,EAAE,CAAC;AACrE,cAAQ,IAAI,MAAM,IAAI,uBAAuB,CAAC;AAC9C;AAAA,IACF;AAEA,UAAM,UAAU,KAAK,eAAe,MAAM,iBAAiB;AAE3D,UAAM,EAAE,OAAO,aAAa,IAAI,MAAM,WAAY,QAAQ;AAAA,MACxD;AAAA,MACA,YAAY;AAAA,QACV,QAAQ;AAAA,UACN,UAAU,CAAC,GAAG,QAAQ,IAAI,QAAQ,SAAS,EAAE;AAAA,UAC7C,SAAS;AAAA,YACP;AAAA,YACA;AAAA,YACA;AAAA,YACA;AAAA,UACF;AAAA,UACA,QAAQ,CAAC;AAAA,QACX;AAAA,MACF;AAAA,IACF,CAAC;AAED,UAAM,aAAa;AAEnB,gBAAY;AAAA,MACV;AAAA,MACA,UAAU,KAAK;AAAA,MACf,SAAS,KAAK;AAAA,MACd,UAAU,KAAK,QAAQ,CAAC;AAAA,MACxB,kBAAkB,QAAQ;AAAA,MAC1B,cAAa,oBAAI,KAAK,GAAE,YAAY;AAAA,MACpC,eAAc,oBAAI,KAAK,GAAE,YAAY;AAAA,MACrC,aAAa;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAAA,MACA,SAAS;AAAA,MACT,QAAQ;AAAA,IACV,CAAC;AAED,YAAQ,IAAI,MAAM,MAAM,qBAAqB,KAAK,IAAI,EAAE,CAAC;AACzD,YAAQ,IAAI,MAAM,IAAI,iBAAiB,QAAQ,SAAS,EAAE,CAAC;AAAA,EAC7D,CAAC;AAGD,aAAW,GAAG,mBAAmB,OAAO,EAAE,IAAI,OAAO,OAAO,MAAW;AACrE,UAAM,UAAU,WAAY,QAAQ,IAAI,KAAK;AAC7C,UAAM,OAAO;AAAA,MACX,MAAM,QAAQ,KAAK,SAAS;AAAA,MAC5B,KAAK,QAAQ,KAAK,SAAS;AAAA,IAC7B;AAEA,YAAQ;AAAA,MACN,MAAM;AAAA,QACJ;AAAA,gBAAmB,OAAO,QAAQ,MAAM,SAAS,KAAK,IAAI;AAAA,MAC5D;AAAA,IACF;AAEA,UAAM,UAAyB;AAAA,MAC7B;AAAA,MACA,QAAQ,OAAO,QAAQ;AAAA,MACvB,QAAQ,OAAO,QAAQ;AAAA,MACvB;AAAA,MACA;AAAA,IACF;AAEA,UAAM,WAAW,MAAM,cAAc,SAAS,KAAK,cAAc;AAGjE,UAAM,kBAAkB,SAAS,QAC7B;AAAA,MACE;AAAA,MACA,SAAS;AAAA,MACT,OAAO,EAAE,MAAM,SAAS,MAAM,MAAM,SAAS,SAAS,MAAM,QAAQ;AAAA,IACtE,IACA,EAAE,IAAI,SAAS,OAAgB,QAAQ,SAAS,UAAU,KAAK;AAEnE,UAAM,WAAY,QAAQ,EAAE,OAAO,UAAU,gBAAgB,CAAC;AAE9D,QAAI,SAAS,OAAO;AAClB,cAAQ,IAAI,MAAM,IAAI,kBAAkB,SAAS,MAAM,OAAO,EAAE,CAAC;AAAA,IACnE,OAAO;AACL,cAAQ,IAAI,MAAM,MAAM,wBAAwB,CAAC;AAAA,IACnD;AAAA,EACF,CAAC;AAGD,aAAW,GAAG,kBAAkB,CAAC,EAAE,MAAM,MAAW;AAClD,iBAAa,KAAK;AAClB,YAAQ;AAAA,MACN,MAAM,IAAI,kCAAkC,MAAM,MAAM,GAAG,CAAC,CAAC,MAAM;AAAA,IACrE;AAAA,EACF,CAAC;AAED,SAAO;AACT;AAKA,eAAsB,aAAa,KAA4B;AAC7D,MAAI,CAAC,WAAY,OAAM,IAAI,MAAM,+BAA+B;AAEhE,UAAQ,IAAI,MAAM,IAAI,4BAA4B,CAAC;AAEnD,QAAM,IAAI,QAAc,CAAC,SAAS,WAAW;AAC3C,UAAM,UAAU,WAAW,MAAM;AAC/B,iBAAY,IAAI,oBAAoB,UAAU;AAC9C,aAAO,IAAI,MAAM,2CAA2C,CAAC;AAAA,IAC/D,GAAG,GAAM;AAKT,UAAM,aAAa,CAAC,EAAE,OAAO,MAAW;AACtC,mBAAa,OAAO;AACpB,iBAAY,IAAI,oBAAoB,UAAU;AAC9C,YAAM,OAAO,OAAO,SAAS;AAC7B,cAAQ;AAAA,QACN,MAAM;AAAA,UACJ,sBAAsB,MAAM,KAAK,KAAK,IAAI,CAAC,KAAK,KAAK,GAAG;AAAA,UACxD;AAAA,QACF;AAAA,MACF;AACA,cAAQ;AAAA,IACV;AAEA,eAAY,GAAG,oBAAoB,UAAU;AAE7C,eAAY,KAAK,QAAQ,KAAK,EAAE,IAAI,CAAC,EAAE,MAAM,CAAC,QAAe;AAC3D,mBAAa,OAAO;AACpB,iBAAY,IAAI,oBAAoB,UAAU;AAC9C,aAAO,GAAG;AAAA,IACZ,CAAC;AAAA,EACH,CAAC;AACH;AAGA,eAAsB,eAAe,OAA8B;AACjE,MAAI,CAAC,WAAY,OAAM,IAAI,MAAM,+BAA+B;AAChE,QAAM,WAAW,WAAW;AAAA,IAC1B;AAAA,IACA,QAAQ,YAAY,mBAAmB;AAAA,EACzC,CAAC;AACD,gBAAc,KAAK;AACnB,UAAQ;AAAA,IACN,MAAM,IAAI,gCAAgC,MAAM,MAAM,GAAG,CAAC,CAAC,KAAK;AAAA,EAClE;AACF;AAEO,SAAS,gBAAgB;AAC9B,SAAO;AACT;","names":["LAMPORTS_PER_SOL","fs","fs","LAMPORTS_PER_SOL","Transaction","VersionedTransaction","nacl","bs58","VersionedTransaction","bs58","Transaction","nacl","bs58","fs"]}
@@ -0,0 +1,14 @@
1
+ export { WalletVault } from './vault/index.js';
2
+ export { confirmTransaction, getBalance, getConnection, getLatestBlockhash, healthCheck, requestAirdrop, resetConnection } from './solana/rpc.js';
3
+ export { AccountChange, KNOWN_PROGRAMS, SimulationResult, TokenChange, simulateTransaction } from './solana/simulate.js';
4
+ export { SendResult, SignedTransaction, sendSignedTransaction, signAllTransactions, signAndSendTransaction, signOffchainMessage, signTransaction } from './solana/tx.js';
5
+ export { addLog, startInkUI } from './cli/ui.js';
6
+ export { cmdAccounts, cmdAirdrop, cmdConnect, cmdDisconnect, cmdInit, cmdLock, cmdNewAccount, cmdSend, cmdSessions, cmdSetCluster, cmdUnlock, cmdUseAccount, isUnlocked } from './cli/commands.js';
7
+ export { inkConfirm, inkPassword, inkSelect } from './cli/prompts.js';
8
+ export { DappMetadata, ERROR_CODES, HandlerOptions, WalletConnectOptions, WalletMethod, WalletRequest, WalletRequestHandler, WalletResponse, disconnectDapp, getSignClient, handleRequest, initWalletConnect, pairWithDapp } from './handler/index.js';
9
+ export { DappSession, getAllSessions, getSession, markInactive, removeSession, saveSession, updateActivity } from './session/index.js';
10
+ export { Account, AccountKeypair, AccountStore, addAccount, createAccountStore, deriveAccount, deriveAccountFromMnemonic, deriveAccounts, formatAccount, getActiveAccount, renameAccount, setActiveAccount, signMessage } from './vault/accounts.js';
11
+ export { ClusterType, RPC_URLS, WalletConfig, configExists, createConfig, getAccountStore, getCluster, getRpcUrl, loadConfig, saveConfig, updateAccountStore, updateCluster, updateRpcUrl } from './vault/config.js';
12
+ export { MnemonicResult, MnemonicStrength, generateMnemonic, mnemonicToNumberedWords, mnemonicToSeed, validateMnemonic, wordsToMnemonic } from './vault/mnemonic.js';
13
+ export { SESSIONS_FILE, VaultData, changePassword, ensureWalletDir, getConfigPath, getSessionsPath, getVaultPath, getWalletDir, loadVault, saveVault, vaultExists } from './vault/keystore.js';
14
+ import '@solana/web3.js';