@gaodefa/daocore 2026.5.29 → 2026.5.30

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (1068) hide show
  1. package/dist/abort-DI3P6TIb.js +277 -0
  2. package/dist/abort.runtime-B6Z7lDEa.js +2 -0
  3. package/dist/abort.runtime.js +1 -1
  4. package/dist/account-inspect-BFz7X0TX.js +173 -0
  5. package/dist/accounts-BoYYrY7x.js +107 -0
  6. package/dist/accounts-Busq29zW.js +107 -0
  7. package/dist/accounts-CuvH2tuN.js +119 -0
  8. package/dist/accounts-DkIcqvf7.js +2 -0
  9. package/dist/acp-runtime-BA8lzXzf.js +26 -0
  10. package/dist/acp-spawn-DPz2aX3A.js +2 -0
  11. package/dist/acp-spawn-DvVCsWYV.js +1275 -0
  12. package/dist/acp-stateful-target-driver-DcC76aZW.js +89 -0
  13. package/dist/action-kill-D-dVisIX.js +33 -0
  14. package/dist/action-runtime-BEiqwxDD.js +469 -0
  15. package/dist/action-runtime-api-1LzcGjcX.js +2 -0
  16. package/dist/action-send-c3CnDuPg.js +39 -0
  17. package/dist/action-spawn-Dj4kwpWs.js +47 -0
  18. package/dist/actions-qLccmQBc.js +161 -0
  19. package/dist/actions.runtime-B5vYAgNi.js +5 -0
  20. package/dist/agent-command-D6Ds198G.js +1367 -0
  21. package/dist/agent-components.runtime-xquK0B3L.js +10 -0
  22. package/dist/agent-components.runtime.js +1 -1
  23. package/dist/agent-harness-runtime-Dq1fCBOM.js +180 -0
  24. package/dist/agent-harness-task-runtime-DvSEqFkD.js +140 -0
  25. package/dist/agent-lm5ZYOFy.js +3 -0
  26. package/dist/agent-runner-execution-Dbh2pDhQ.js +1713 -0
  27. package/dist/agent-runner-utils-Di3r2T1T.js +266 -0
  28. package/dist/agent-runner.runtime-BW90EcGW.js +3455 -0
  29. package/dist/agent-runner.runtime.js +1 -1
  30. package/dist/agent-runtime-BgIT5Ytc.js +229 -0
  31. package/dist/agent-via-gateway-DMMS8-hK.js +463 -0
  32. package/dist/agent-ylolD8-V.js +2 -0
  33. package/dist/api-BB4vXLtW.js +2 -0
  34. package/dist/api-CUhM3KNB.js +134 -0
  35. package/dist/api-CewRHSbT.js +6 -0
  36. package/dist/api-CfKjNJlW.js +2 -0
  37. package/dist/api-Rsnqui1u.js +3 -0
  38. package/dist/api-k7AvxwHr.js +639 -0
  39. package/dist/apply-DQ4TQNMA.js +54 -0
  40. package/dist/apply-S_75Py4Y.js +41 -0
  41. package/dist/approval-handler.runtime-Cthxrstu.js +130 -0
  42. package/dist/assistant-Cp9pGaBw.js +291 -0
  43. package/dist/attachment-normalize-5R0bLLOj.js +225 -0
  44. package/dist/attempt-execution-DuyyZYsU.js +558 -0
  45. package/dist/attempt-execution.runtime-DF2GPgNh.js +3 -0
  46. package/dist/attempt-execution.runtime.js +1 -1
  47. package/dist/attempt-execution.shared-CwdukA3t.js +38 -0
  48. package/dist/attempt.prompt-helpers-CUqKtIa5.js +475 -0
  49. package/dist/attempt.tool-run-context-BbN4_BYO.js +2094 -0
  50. package/dist/binding-routing-C6Ex2Blu.js +113 -0
  51. package/dist/binding-targets-BqREncSL.js +121 -0
  52. package/dist/bot-DGMEkaIJ.js +7894 -0
  53. package/dist/bot-deps-BltYjeMX.js +2 -0
  54. package/dist/bot-deps-XvGCor9f.js +747 -0
  55. package/dist/bot-message-context.runtime-kK-xvLV7.js +7 -0
  56. package/dist/bot-message-context.runtime.js +1 -1
  57. package/dist/bot-message-context.session.runtime-DpOIJUae.js +12 -0
  58. package/dist/bot-message-context.session.runtime.js +1 -1
  59. package/dist/bot-native-commands.delivery.runtime-D49p5Lc1.js +4 -0
  60. package/dist/bot-native-commands.delivery.runtime.js +1 -1
  61. package/dist/bot-native-commands.runtime-8XBdSpkQ.js +13 -0
  62. package/dist/bot-native-commands.runtime.js +1 -1
  63. package/dist/bridge-server-y_XGduPx.js +113 -0
  64. package/dist/browser-cli-B2jmmTT3.js +230 -0
  65. package/dist/browser-cli-actions-input-JQt5ZQcn.js +473 -0
  66. package/dist/browser-cli-actions-observe-CrfKh6AX.js +81 -0
  67. package/dist/browser-cli-debug-DQACWlvC.js +137 -0
  68. package/dist/browser-cli-inspect-DDnxx0Xw.js +104 -0
  69. package/dist/browser-cli-lEuOnZzs.js +2 -0
  70. package/dist/browser-cli-manage-DogmwtYt.js +443 -0
  71. package/dist/browser-cli-resize-BHuV71VZ.js +26 -0
  72. package/dist/browser-cli-shared-CidShgoF.js +50 -0
  73. package/dist/browser-cli-state-i8cCGbiQ.js +337 -0
  74. package/dist/browser-control-auth-CKfXdXWj.js +2 -0
  75. package/dist/browser-profiles-ATBTvUGh.js +2 -0
  76. package/dist/browser-runtime-KmCT6FuL.js +384 -0
  77. package/dist/build-DOOT6f62.js +257 -0
  78. package/dist/build-info.json +3 -3
  79. package/dist/bundled/boot-md/handler.js +2 -2
  80. package/dist/bundled/session-memory/handler.js +1 -1
  81. package/dist/canvas-host/a2ui/.bundle.hash +1 -1
  82. package/dist/capability-cli-DwvrwB-g.js +1782 -0
  83. package/dist/channel-B-wgK1bK.js +481 -0
  84. package/dist/channel-B1e_k1P0.js +867 -0
  85. package/dist/channel-BRDfa5tc.js +1777 -0
  86. package/dist/channel-BVEO1O4p.js +376 -0
  87. package/dist/channel-BYlO5l1d.js +508 -0
  88. package/dist/channel-Bl0sPoNx.js +653 -0
  89. package/dist/channel-C84xtDBy.js +1134 -0
  90. package/dist/channel-CLgKq4Ds.js +1556 -0
  91. package/dist/channel-CZT0qxLh.js +1249 -0
  92. package/dist/channel-CffBHWkb.js +955 -0
  93. package/dist/channel-D34ZJvVB.js +2126 -0
  94. package/dist/channel-DcdXLo_W.js +238 -0
  95. package/dist/channel-DnK5TrXV.js +362 -0
  96. package/dist/channel-Dzj4RHY2.js +740 -0
  97. package/dist/channel-OhZzLZCj.js +562 -0
  98. package/dist/channel-actions.runtime-Cdvhqc9s.js +265 -0
  99. package/dist/channel-actions.runtime.js +1 -1
  100. package/dist/channel-core-Dz9I_R4j.js +5 -0
  101. package/dist/channel-inbound-COGoV_aS.js +80 -0
  102. package/dist/channel-mP6HCIMr.js +1496 -0
  103. package/dist/channel-plugin-runtime-C0R46KeG.js +998 -0
  104. package/dist/channel-quGdgWel.js +808 -0
  105. package/dist/channel-runtime-FvPQoIF9.js +408 -0
  106. package/dist/channel.runtime-2vUz3gij.js +109 -0
  107. package/dist/channel.runtime-BZLDSNuQ.js +254 -0
  108. package/dist/channel.runtime-Bo5jO0Hj.js +4 -0
  109. package/dist/channel.runtime-CDgvrjM2.js +652 -0
  110. package/dist/channel.runtime-COf8SDFn.js +88 -0
  111. package/dist/channel.runtime-C_C1f8lu.js +733 -0
  112. package/dist/channel.runtime-CqPbsg8t.js +2528 -0
  113. package/dist/channel.runtime-DtV85Khx.js +1008 -0
  114. package/dist/channel.runtime-Spt1ukGW.js +21009 -0
  115. package/dist/channel.setup-Bc0LUQS1.js +1098 -0
  116. package/dist/channel.setup-ChTkj2hq.js +343 -0
  117. package/dist/channel.setup-CpMD9F8i.js +10 -0
  118. package/dist/chat-mUsjD5YN.js +2666 -0
  119. package/dist/chrome-u314zcbM.js +1503 -0
  120. package/dist/cli/run-main.js +5 -5
  121. package/dist/cli-CJMoqXrc.js +1341 -0
  122. package/dist/cli-compaction-qGYB7suI.js +347 -0
  123. package/dist/cli-metadata-BBJFpNU9.js +22 -0
  124. package/dist/cli-runner-C0kcts0I.js +540 -0
  125. package/dist/cli-runner-CTm8K6s8.js +2 -0
  126. package/dist/cli-runner.runtime-C8deL5FL.js +3 -0
  127. package/dist/cli-runner.runtime-DDAg1D0L.js +4 -0
  128. package/dist/cli-runner.runtime.js +1 -1
  129. package/dist/cli-startup-metadata.json +8 -8
  130. package/dist/client-CPxpgs4m.js +650 -0
  131. package/dist/client-adapter-CLlqOqfu.js +897 -0
  132. package/dist/client-factory-R7Rr2jwn.js +9 -0
  133. package/dist/command-auth-CkQP1buP.js +135 -0
  134. package/dist/command-handlers-CJEjFyMk.js +1609 -0
  135. package/dist/command-registry-BDgyOqDw.js +4 -0
  136. package/dist/command-registry-BVi5Jn1S.js +9 -0
  137. package/dist/command-registry-core-JCfsVRtz.js +110 -0
  138. package/dist/command-status.runtime-CM1JLzi6.js +90 -0
  139. package/dist/command-status.runtime.js +1 -1
  140. package/dist/commands-acp-C1-I78U6.js +74 -0
  141. package/dist/commands-compact.runtime-DOsNavwp.js +10 -0
  142. package/dist/commands-compact.runtime.js +1 -1
  143. package/dist/commands-handlers.runtime-BD1n2WGw.js +6154 -0
  144. package/dist/commands-handlers.runtime.js +1 -1
  145. package/dist/commands-status-DU_UTQz1.js +16 -0
  146. package/dist/commands-status-DejfTakp.js +3 -0
  147. package/dist/commands-status.runtime-DejfTakp.js +3 -0
  148. package/dist/commands-status.runtime.js +1 -1
  149. package/dist/commands-subagents-control.runtime-D7vo_2Y_.js +3 -0
  150. package/dist/commands-subagents-control.runtime-DGybTjJ6.js +2 -0
  151. package/dist/commands-subagents-control.runtime.js +1 -1
  152. package/dist/commands-system-prompt-BEBXAMea.js +2 -0
  153. package/dist/commands-system-prompt-gj3oQpQO.js +162 -0
  154. package/dist/commands.runtime-CgXX70IN.js +176 -0
  155. package/dist/commands.runtime.js +1 -1
  156. package/dist/commitments/runtime.js +1 -1
  157. package/dist/compact-C41XxMDt.js +480 -0
  158. package/dist/compact-DUVAF9EC.js +1141 -0
  159. package/dist/compact.runtime-COMRg6s3.js +12 -0
  160. package/dist/compact.runtime.js +1 -1
  161. package/dist/completion-cli-CmEYoB9a.js +315 -0
  162. package/dist/computer-use-BwJHu1QF.js +367 -0
  163. package/dist/config-ATBTvUGh.js +2 -0
  164. package/dist/config-DlNgjF8W.js +373 -0
  165. package/dist/config-mutations-tl_OqI6d.js +159 -0
  166. package/dist/context-engine-host-compat-BNPAIK9F.js +288 -0
  167. package/dist/context-engine-host-compat-C69CK7zS.js +2 -0
  168. package/dist/context-engine-lifecycle-iQ8f5a_-.js +1274 -0
  169. package/dist/control-auth-vVxyGKxY.js +114 -0
  170. package/dist/control-service-73nj79EW.js +145 -0
  171. package/dist/control-ui/assets/agents-DdWIz8Vk.js +1008 -0
  172. package/dist/control-ui/assets/channel-config-extras-C7ELhuDi.js +2 -0
  173. package/dist/control-ui/assets/channels-Bsoj-9BS.js +367 -0
  174. package/dist/control-ui/assets/cron-BRTEw1tT.js +1013 -0
  175. package/dist/control-ui/assets/debug-EKl_F8_L.js +97 -0
  176. package/dist/control-ui/assets/index-DSbSO7ys.js +7370 -0
  177. package/dist/control-ui/assets/instances-B1AoYwI5.js +57 -0
  178. package/dist/control-ui/assets/logs-BChOznzh.js +74 -0
  179. package/dist/control-ui/assets/nodes-5yebKh9k.js +436 -0
  180. package/dist/control-ui/assets/sessions-BlDYNThc.js +399 -0
  181. package/dist/control-ui/assets/skills-shared-CNFnf7KU.js +11 -0
  182. package/dist/control-ui/assets/skills-uxTDRmLx.js +314 -0
  183. package/dist/control-ui/index.html +1 -1
  184. package/dist/control-ui/sw.js +1 -1
  185. package/dist/conversation-binding-runtime-CmoTKcY1.js +4 -0
  186. package/dist/conversation-runtime-BxOHxuin.js +31 -0
  187. package/dist/core-D0Y2H55f.js +282 -0
  188. package/dist/core-api-BKlJUtDt.js +5 -0
  189. package/dist/core-api-_fiftUHn.js +2 -0
  190. package/dist/crestodian/crestodian.js +1 -1
  191. package/dist/crestodian/rescue-message.js +1 -1
  192. package/dist/crestodian-BJifoQiR.js +55 -0
  193. package/dist/daocore-tools-BMdF8RwK.js +11727 -0
  194. package/dist/delivery-e2ci_bcX.js +1002 -0
  195. package/dist/dialogue-BXayGhnz.js +37 -0
  196. package/dist/dir-fetch-tool-Cara5mZh.js +565 -0
  197. package/dist/dir-list-tool-CQ8Bo5Ez.js +100 -0
  198. package/dist/direct-dm-CPk6Qm9D.js +64 -0
  199. package/dist/directive-handling.fast-lane-BQ9aXqk8.js +68 -0
  200. package/dist/directive-handling.impl--a5AGurq.js +818 -0
  201. package/dist/directive-handling.impl-C4JqMwle.js +2 -0
  202. package/dist/directive-handling.model-selection-pyTYMIXn.js +122 -0
  203. package/dist/directive-handling.persist.runtime-B7vWT1r9.js +263 -0
  204. package/dist/directive-handling.persist.runtime.js +1 -1
  205. package/dist/dispatch-3Ru_eGq1.js +1640 -0
  206. package/dist/dispatch-acp-transcript.runtime-CYMP-5oE.js +40 -0
  207. package/dist/dispatch-acp-transcript.runtime.js +1 -1
  208. package/dist/dispatch-acp.runtime-BVCiklXk.js +18 -0
  209. package/dist/dispatch-acp.runtime.js +1 -1
  210. package/dist/doctor-B8mR3Sgr.js +2 -0
  211. package/dist/doctor-BJ6DuerV.js +6 -0
  212. package/dist/doctor-config-flow-BdOGs_zn.js +1741 -0
  213. package/dist/doctor-core-checks-CDf0stz-.js +2 -0
  214. package/dist/doctor-core-checks-Cpdnu2XI.js +573 -0
  215. package/dist/doctor-health-0qv_acBu.js +65 -0
  216. package/dist/doctor-health-contributions-Db1FQgFw.js +696 -0
  217. package/dist/doctor-lint-C1g4Llgl.js +94 -0
  218. package/dist/doctor-state-integrity-C8iXFLJ7.js +1231 -0
  219. package/dist/doctor-update-CsPu6p3d.js +58 -0
  220. package/dist/dynamic-tools-YQ0z0YKH.js +486 -0
  221. package/dist/embedded-backend-S0cahIZw.js +579 -0
  222. package/dist/embedded-gateway-stub.runtime-Cjw12ALm.js +12 -0
  223. package/dist/embedded-gateway-stub.runtime.js +1 -1
  224. package/dist/exec-approvals-ArHHjoE-.js +149 -0
  225. package/dist/extensionAPI.js +1 -1
  226. package/dist/extensions/active-memory/index.js +1 -1
  227. package/dist/extensions/admin-http-rpc/index.js +1 -1
  228. package/dist/extensions/browser/browser-bridge.js +1 -1
  229. package/dist/extensions/browser/browser-config.js +4 -4
  230. package/dist/extensions/browser/browser-control-auth.js +2 -2
  231. package/dist/extensions/browser/browser-doctor.js +2 -2
  232. package/dist/extensions/browser/browser-maintenance.js +1 -1
  233. package/dist/extensions/browser/browser-profiles.js +2 -2
  234. package/dist/extensions/browser/browser-runtime-api.js +11 -11
  235. package/dist/extensions/browser/cli-metadata.js +1 -1
  236. package/dist/extensions/browser/index.js +1 -1
  237. package/dist/extensions/browser/plugin-registration.js +1 -1
  238. package/dist/extensions/browser/register.runtime.js +4 -4
  239. package/dist/extensions/browser/runtime-api.js +13 -13
  240. package/dist/extensions/canvas/index.js +1 -1
  241. package/dist/extensions/clickclack/api.js +2 -2
  242. package/dist/extensions/clickclack/channel-plugin-api.js +1 -1
  243. package/dist/extensions/clickclack/runtime-api.js +2 -2
  244. package/dist/extensions/device-pair/api.js +1 -1
  245. package/dist/extensions/device-pair/pair-command-approve.js +1 -1
  246. package/dist/extensions/file-transfer/index.js +4 -4
  247. package/dist/extensions/imessage/api.js +2 -2
  248. package/dist/extensions/imessage/channel-plugin-api.js +1 -1
  249. package/dist/extensions/imessage/message-tool-api.d.ts +1 -1
  250. package/dist/extensions/imessage/runtime-api.js +3 -3
  251. package/dist/extensions/irc/api.js +2 -2
  252. package/dist/extensions/irc/channel-plugin-api.js +1 -1
  253. package/dist/extensions/llm-task/index.js +1 -1
  254. package/dist/extensions/mattermost/api.js +1 -1
  255. package/dist/extensions/mattermost/channel-plugin-api.js +1 -1
  256. package/dist/extensions/mattermost/channel-plugin-runtime.js +1 -1
  257. package/dist/extensions/mattermost/policy-api.js +1 -1
  258. package/dist/extensions/mattermost/runtime-api.js +2 -2
  259. package/dist/extensions/mattermost/slash-route-api.js +1 -1
  260. package/dist/extensions/memory-core/cli-metadata.js +1 -1
  261. package/dist/extensions/migrate-claude/apply.js +1 -1
  262. package/dist/extensions/migrate-claude/index.js +1 -1
  263. package/dist/extensions/migrate-claude/plan.js +1 -1
  264. package/dist/extensions/migrate-claude/provider.js +1 -1
  265. package/dist/extensions/migrate-claude/targets.js +1 -1
  266. package/dist/extensions/migrate-hermes/apply.js +1 -1
  267. package/dist/extensions/migrate-hermes/index.js +1 -1
  268. package/dist/extensions/migrate-hermes/model.js +1 -1
  269. package/dist/extensions/migrate-hermes/plan.js +1 -1
  270. package/dist/extensions/migrate-hermes/provider.js +1 -1
  271. package/dist/extensions/migrate-hermes/secrets.js +1 -1
  272. package/dist/extensions/migrate-hermes/targets.js +1 -1
  273. package/dist/extensions/policy/api.js +1 -1
  274. package/dist/extensions/policy/index.js +2 -2
  275. package/dist/extensions/signal/api.js +6 -6
  276. package/dist/extensions/signal/channel-plugin-api.js +1 -1
  277. package/dist/extensions/signal/reaction-runtime-api.js +1 -1
  278. package/dist/extensions/signal/runtime-api.js +7 -7
  279. package/dist/extensions/skill-workshop/api.js +1 -1
  280. package/dist/extensions/skill-workshop/index.js +2 -2
  281. package/dist/extensions/telegram/account-inspect-api.js +1 -1
  282. package/dist/extensions/telegram/api.js +11 -11
  283. package/dist/extensions/telegram/channel-plugin-api.js +2 -2
  284. package/dist/extensions/telegram/contract-api.js +3 -3
  285. package/dist/extensions/telegram/runtime-api.js +7 -7
  286. package/dist/extensions/telegram/security-audit-contract-api.js +1 -1
  287. package/dist/extensions/telegram/setup-plugin-api.js +1 -1
  288. package/dist/extensions/telegram/test-api.js +2 -2
  289. package/dist/extensions/webhooks/api.js +1 -1
  290. package/dist/extensions/webhooks/index.js +1 -1
  291. package/dist/extensions/xai/index.js +4 -4
  292. package/dist/extensions/xai/realtime-transcription-provider.js +1 -1
  293. package/dist/extensions/xai/speech-provider.js +1 -1
  294. package/dist/extensions/xai/test-api.js +1 -1
  295. package/dist/extensions/xai/tts.js +1 -1
  296. package/dist/extensions/xai/web-search.js +1 -1
  297. package/dist/extensions/xai/xai-oauth.js +1 -1
  298. package/dist/file-fetch-tool-DQpAtjX4.js +124 -0
  299. package/dist/file-write-tool-CkB0oYwe.js +127 -0
  300. package/dist/format-DUJUpMFQ.js +1145 -0
  301. package/dist/gateway-cli-CQo_E4Ka.js +435 -0
  302. package/dist/gateway-method-runtime-1QPgVJH7.js +21 -0
  303. package/dist/get-reply-DfUcsC-O.js +4689 -0
  304. package/dist/get-reply-from-config.runtime-C95MG73O.js +2 -0
  305. package/dist/get-reply-from-config.runtime.js +1 -1
  306. package/dist/graph-users-DPJe0fPs.js +1419 -0
  307. package/dist/group-access-DefaNJ6L.js +112 -0
  308. package/dist/handle-action.guild-admin-C1sy1kGJ.js +288 -0
  309. package/dist/harness-BgPRdmNK.js +61 -0
  310. package/dist/health-DFR9A1YV.js +4 -0
  311. package/dist/heartbeat-runner-BiYVPs25.js +5 -0
  312. package/dist/heartbeat-runner.runtime-Bmaq8WUA.js +4 -0
  313. package/dist/heartbeat-runner.runtime.js +1 -1
  314. package/dist/hooks-CNJDuJUm.js +534 -0
  315. package/dist/inbound-direct-dm-runtime-DFt58p71.js +2 -0
  316. package/dist/inbound-reply-dispatch-kgSDM8ax.js +148 -0
  317. package/dist/index.js +1 -1
  318. package/dist/init-B0zO_U4r.js +59 -0
  319. package/dist/inline-buttons-B6zgQW3J.js +40 -0
  320. package/dist/internal-events-C3Q5t6hg.js +90 -0
  321. package/dist/isolated-agent-CaSU5GCJ.js +2 -0
  322. package/dist/isolated-agent-CnsD2TmP.js +1118 -0
  323. package/dist/lifecycle-i3WZDaIn.js +571 -0
  324. package/dist/list.probe-g0rUiVXW.js +449 -0
  325. package/dist/list.status-command-DG3PrmeO.js +789 -0
  326. package/dist/llm-slug-generator-CHlf69FU.js +78 -0
  327. package/dist/llm-slug-generator.js +1 -1
  328. package/dist/local-dispatch.runtime-CDeHUp_A.js +9 -0
  329. package/dist/local-dispatch.runtime.js +1 -1
  330. package/dist/manager.runtime-BlLMPUTq.js +2714 -0
  331. package/dist/manager.runtime.js +1 -1
  332. package/dist/markdown-to-line-r_mBHMdy.js +811 -0
  333. package/dist/mcp-http-C5UPIJGR.js +555 -0
  334. package/dist/mcp-http-CTy9gpfA.js +2 -0
  335. package/dist/media-understanding-provider-BT6TOuVa.js +339 -0
  336. package/dist/message-actions-BdcjjwFt.js +145 -0
  337. package/dist/message-handler-B29Tj2p2.js +1715 -0
  338. package/dist/message-handler-BhHb1FHI.js +384 -0
  339. package/dist/message-handler.preflight-ouZ_-3o8.js +1125 -0
  340. package/dist/message-handler.process-CrYiBx_F.js +1484 -0
  341. package/dist/model-CLbtocQX.js +74 -0
  342. package/dist/model-selection-BG_vU9Kl.js +272 -0
  343. package/dist/models-4KERn3ya.js +104 -0
  344. package/dist/models-BCa-ipxi.js +2 -0
  345. package/dist/models-cli-DtpGXEsf.js +256 -0
  346. package/dist/monitor-B-egsvmI.js +1657 -0
  347. package/dist/monitor-BJX9Yv7k.js +2 -0
  348. package/dist/monitor-BPrIy3pV.js +715 -0
  349. package/dist/monitor-BWknZZ7N.js +4377 -0
  350. package/dist/monitor-C3y_PtI1.js +60 -0
  351. package/dist/monitor-DCzfdqE4.js +1370 -0
  352. package/dist/monitor-P24epSwE.js +2788 -0
  353. package/dist/monitor-auth-CEG_xldE.js +179 -0
  354. package/dist/monitor-jEePJbbS.js +834 -0
  355. package/dist/monitor-polling.runtime-BzlHK11u.js +883 -0
  356. package/dist/monitor-polling.runtime.js +1 -1
  357. package/dist/monitor-webhook.runtime-vFEhk_Zj.js +387 -0
  358. package/dist/monitor-webhook.runtime.js +1 -1
  359. package/dist/monitor.account-BUIfgWXg.js +5233 -0
  360. package/dist/monitor.runtime-Cp7W4fhb.js +2 -0
  361. package/dist/monitor.runtime.js +1 -1
  362. package/dist/monitor.webhook-DzrbeR4T.js +180 -0
  363. package/dist/node-cli-sessions-CLbI14UA.js +1228 -0
  364. package/dist/openai-http-BM9BIA_g.js +824 -0
  365. package/dist/openresponses-http-CNoW9kk8.js +1173 -0
  366. package/dist/operations-DT4bsxV6.js +805 -0
  367. package/dist/outbound-adapter-CZRUOgY0.js +543 -0
  368. package/dist/outbound-session-route-DneMsGNx.js +45 -0
  369. package/dist/outbound.runtime-CHuoKJJI.js +2 -0
  370. package/dist/outbound.runtime.js +1 -1
  371. package/dist/pi-embedded-1-rsueO_.js +3796 -0
  372. package/dist/pi-embedded-BRfDncVO.js +4 -0
  373. package/dist/pi-embedded.runtime-DEYoa6bW.js +4 -0
  374. package/dist/pi-embedded.runtime.js +1 -1
  375. package/dist/pi-tools-C0P3NgP5.js +2413 -0
  376. package/dist/plan-BQUkjBMY.js +81 -0
  377. package/dist/plan-CRO9_2_k.js +112 -0
  378. package/dist/plugin-BJCmWhnh.js +12396 -0
  379. package/dist/plugin-app-cache-key-CXAg0F7A.js +46 -0
  380. package/dist/plugin-enabled-D93Z9LSo.js +233 -0
  381. package/dist/plugin-registration-BBrTcZnf.js +88 -0
  382. package/dist/plugin-sdk/.boundary-entry-shims.stamp +1 -1
  383. package/dist/plugin-sdk/acp-runtime-backend.js +1 -1
  384. package/dist/plugin-sdk/acp-runtime.js +2 -2
  385. package/dist/plugin-sdk/agent-harness-runtime.js +6 -6
  386. package/dist/plugin-sdk/agent-harness-task-runtime.js +1 -1
  387. package/dist/plugin-sdk/agent-harness.js +7 -7
  388. package/dist/plugin-sdk/agent-runtime.js +2 -2
  389. package/dist/plugin-sdk/channel-core.js +2 -2
  390. package/dist/plugin-sdk/channel-inbound.js +2 -2
  391. package/dist/plugin-sdk/channel-test-helpers.js +1 -1
  392. package/dist/plugin-sdk/command-auth.js +1 -1
  393. package/dist/plugin-sdk/command-status-runtime.js +1 -1
  394. package/dist/plugin-sdk/compat.js +1 -1
  395. package/dist/plugin-sdk/conversation-binding-runtime.js +2 -2
  396. package/dist/plugin-sdk/conversation-runtime.js +3 -3
  397. package/dist/plugin-sdk/core.js +2 -2
  398. package/dist/plugin-sdk/direct-dm.js +1 -1
  399. package/dist/plugin-sdk/gateway-method-runtime.js +1 -1
  400. package/dist/plugin-sdk/health.js +2 -2
  401. package/dist/plugin-sdk/inbound-reply-dispatch.js +1 -1
  402. package/dist/plugin-sdk/index.js +1 -1
  403. package/dist/plugin-sdk/mattermost.js +1 -1
  404. package/dist/plugin-sdk/plugin-test-contracts.js +2 -2
  405. package/dist/plugin-sdk/provider-test-contracts.js +4 -4
  406. package/dist/plugin-sdk/reply-runtime.js +4 -4
  407. package/dist/plugin-sdk/testing.js +2 -2
  408. package/dist/plugin-sdk/zalouser.js +1 -1
  409. package/dist/plugin-service-DnZEPBEA.js +1229 -0
  410. package/dist/plugins/runtime/index.js +4 -4
  411. package/dist/policy-CMv5QMPG.js +138 -0
  412. package/dist/policy-CeoP4t9J.js +680 -0
  413. package/dist/prepare.runtime-DZ55JiTt.js +732 -0
  414. package/dist/prepare.runtime.js +1 -1
  415. package/dist/preview-warnings-O08PZRxu.js +392 -0
  416. package/dist/probe-C6w3bP8X.js +682 -0
  417. package/dist/probe-Cs1_X1NA.js +47 -0
  418. package/dist/probe-Cuee_jyM.js +2204 -0
  419. package/dist/probe-DZxCnDzn.js +2 -0
  420. package/dist/program-C2dT8VHB.js +131 -0
  421. package/dist/provider-C2_vSzYh.js +32 -0
  422. package/dist/provider-DSfTDQbj.js +152 -0
  423. package/dist/provider-U8hrm9h-.js +32 -0
  424. package/dist/provider-_v910H8y.js +8735 -0
  425. package/dist/provider-dispatcher-C3kmmIEC.js +22 -0
  426. package/dist/provider-dispatcher.runtime.js +1 -1
  427. package/dist/provider-session.runtime-Mg0fx5hH.js +9 -0
  428. package/dist/provider-session.runtime.js +1 -1
  429. package/dist/provider.runtime-pSTXuHrq.js +2 -0
  430. package/dist/provider.runtime.js +1 -1
  431. package/dist/public-surface-loader-09t4TTue.js +114 -0
  432. package/dist/pw-ai-DjNqHV3_.js +3029 -0
  433. package/dist/pw-role-snapshot-DoGefdv7.js +333 -0
  434. package/dist/reaction-level-C8Mqxizo.js +19 -0
  435. package/dist/reaction-runtime-api-DOP6xOsm.js +116 -0
  436. package/dist/realtime-transcription-provider-BTGEXXna.js +205 -0
  437. package/dist/register-CbZPpqI3.js +2178 -0
  438. package/dist/register.agent-DrBFuPKh.js +156 -0
  439. package/dist/register.crestodian-DwTbmaK8.js +24 -0
  440. package/dist/register.maintenance-BIeoYBub.js +83 -0
  441. package/dist/register.runtime-B5V9_Dwz.js +54 -0
  442. package/dist/register.subclis-CJE9ISZY.js +31 -0
  443. package/dist/register.subclis-YQsKas8N.js +3 -0
  444. package/dist/register.subclis-core-CjwdGeGU.js +273 -0
  445. package/dist/repair-sequencing-C0jrL5pw.js +640 -0
  446. package/dist/reply-delivery-B28mTIpb.js +196 -0
  447. package/dist/reply-runtime-BqQX7HHw.js +11 -0
  448. package/dist/reply.runtime-C95MG73O.js +2 -0
  449. package/dist/reply.runtime.js +1 -1
  450. package/dist/request-BqoMvXxH.js +54 -0
  451. package/dist/resolve-allowlist-hbKKd_kq.js +220 -0
  452. package/dist/result-fallback-classifier-BrORPoxj.js +79 -0
  453. package/dist/route-HHRgSzVy.js +469 -0
  454. package/dist/route-resolution-C7bafjVc.js +274 -0
  455. package/dist/routes-86XGeo7a.js +2 -0
  456. package/dist/routes-BhVGr9ie.js +3602 -0
  457. package/dist/run-Bb5QP5JV.js +1162 -0
  458. package/dist/run-attempt-CLi0wV7j.js +7704 -0
  459. package/dist/run-command-Be6GAxiW.js +2 -0
  460. package/dist/run-command-Ds4hr3iU.js +23 -0
  461. package/dist/run-embedded.runtime-wX9ORojX.js +4 -0
  462. package/dist/run-embedded.runtime.js +1 -1
  463. package/dist/run-execution-cli.runtime-BmNZVB2N.js +4 -0
  464. package/dist/run-execution-cli.runtime.js +1 -1
  465. package/dist/run-executor.runtime.js +1 -1
  466. package/dist/run-subagent-registry.runtime-Uq5sjftu.js +2 -0
  467. package/dist/run-subagent-registry.runtime.js +1 -1
  468. package/dist/runtime-BktLQ75j.js +1287 -0
  469. package/dist/runtime-C9XdR62_.js +438 -0
  470. package/dist/runtime-CTvWDPx9.js +6179 -0
  471. package/dist/runtime-api-BojB3MUw.js +21 -0
  472. package/dist/runtime-api-C92MlAwp.js +13 -0
  473. package/dist/runtime-api-CFNZE9Xt.js +13 -0
  474. package/dist/runtime-api-Cimpgm5_.js +3 -0
  475. package/dist/runtime-api-D8qG_lUm.js +17 -0
  476. package/dist/runtime-api-DMDMnQEG.js +4 -0
  477. package/dist/runtime-api-DupQdIlE.js +24 -0
  478. package/dist/runtime-api.actions-B8i3elqu.js +3 -0
  479. package/dist/runtime-api.monitor-BntFzf_M.js +6 -0
  480. package/dist/runtime-api.send-CPlmi1jc.js +4 -0
  481. package/dist/runtime-api.threads-D-H_r_Nl.js +2 -0
  482. package/dist/runtime-channel-BGhTxnXZ.js +150 -0
  483. package/dist/runtime-channel-CPFxNapZ.js +2 -0
  484. package/dist/runtime-embedded-pi.runtime-BjnMTurB.js +2 -0
  485. package/dist/runtime-embedded-pi.runtime.js +1 -1
  486. package/dist/sanitize-outbound-BMUv1NeS.js +127 -0
  487. package/dist/sdk-setup-tools-Do3DkQi_.js +8 -0
  488. package/dist/secrets-B8YVPHhk.js +113 -0
  489. package/dist/security-audit-7Gg_nL4o.js +122 -0
  490. package/dist/security-audit-Bk3CREj-.js +118 -0
  491. package/dist/security-audit.runtime-BmSJrdeq.js +2 -0
  492. package/dist/security-audit.runtime.js +1 -1
  493. package/dist/selection-BFGde9-_.js +3 -0
  494. package/dist/selection-DrLFlbgG.js +16157 -0
  495. package/dist/send-4dLa-BQo.js +1631 -0
  496. package/dist/send-CV6gCwYP.js +192 -0
  497. package/dist/send-aGiK3Efu.js +143 -0
  498. package/dist/send-dB3CehAN.js +2 -0
  499. package/dist/send.components-BcG9BlkC.js +2 -0
  500. package/dist/send.components-rLjDlfYU.js +500 -0
  501. package/dist/send.runtime-D20k2MSr.js +2 -0
  502. package/dist/send.runtime.js +1 -1
  503. package/dist/server-BTRx_U1s.js +73 -0
  504. package/dist/server-CY0ymhBg.js +24 -0
  505. package/dist/server-close.runtime.js +1 -1
  506. package/dist/server-context-BxGT8wbK.js +955 -0
  507. package/dist/server-context-DYlbhAaT.js +2 -0
  508. package/dist/server-cron-BB_15lcP.js +2 -0
  509. package/dist/server-cron-CfyJX_a4.js +2989 -0
  510. package/dist/server-methods-Ck2ab6TC.js +16494 -0
  511. package/dist/server-node-events-BdRizF-5.js +596 -0
  512. package/dist/server-plugin-bootstrap-CPUr8NFE.js +70 -0
  513. package/dist/server-plugins-__5AxjzH.js +432 -0
  514. package/dist/server-reload-handlers-BMl9Fx9b.js +714 -0
  515. package/dist/server-restart-sentinel-D11M_ZsH.js +747 -0
  516. package/dist/server-restart-sentinel-DGptQ27c.js +2 -0
  517. package/dist/server-runtime-services-BwtLs-8I.js +2 -0
  518. package/dist/server-runtime-services-aJydixRu.js +267 -0
  519. package/dist/server-startup-plugins-m_P3gY4m.js +113 -0
  520. package/dist/server-startup-post-attach-DuXQ1AXL.js +716 -0
  521. package/dist/server-ws-runtime-mXmxB1W8.js +349 -0
  522. package/dist/server.impl-fuV8aKSP.js +2586 -0
  523. package/dist/service-a8cTFka4.js +1446 -0
  524. package/dist/session-binding-BIycxo9u.js +2 -0
  525. package/dist/session-binding-xHwQr9vM.js +219 -0
  526. package/dist/session-kill-http-DiUZhcoN.js +121 -0
  527. package/dist/session-reset-service-DkepDoob.js +625 -0
  528. package/dist/session-route-Ba5u7ecb.js +93 -0
  529. package/dist/session-status.runtime-Cb1X69Rl.js +2 -0
  530. package/dist/session-status.runtime.js +1 -1
  531. package/dist/session-subagent-reactivation.runtime-rbqmto4G.js +2 -0
  532. package/dist/session-subagent-reactivation.runtime.js +1 -1
  533. package/dist/session-tab-registry-DSKOoJta.js +521 -0
  534. package/dist/sessions-history-http-CWP88I_C.js +430 -0
  535. package/dist/sessions.runtime-1q1OwLn3.js +2 -0
  536. package/dist/sessions.runtime.js +1 -1
  537. package/dist/setup-api-DtrOOYeP.js +29 -0
  538. package/dist/setup-core-DMrJS6LP.js +174 -0
  539. package/dist/setup-surface-BFPNu1qA.js +405 -0
  540. package/dist/setup-surface-CedShqhO.js +288 -0
  541. package/dist/setup-surface-DLOBH1Vf.js +320 -0
  542. package/dist/setup-surface-MhCeEWSj.js +221 -0
  543. package/dist/shared-DamL-e8D.js +121 -0
  544. package/dist/shared-client-B48JoAsz.js +2 -0
  545. package/dist/shared-client-BoSiDnUo.js +629 -0
  546. package/dist/side-question-DQoQ_ETb.js +683 -0
  547. package/dist/skill-tool-dispatch.runtime-CWLloYA8.js +143 -0
  548. package/dist/skill-tool-dispatch.runtime.js +1 -1
  549. package/dist/slash-state-DrrWJQfv.js +2166 -0
  550. package/dist/speech-provider-8Hx1uw41.js +184 -0
  551. package/dist/src-BbUYOPwU.js +4256 -0
  552. package/dist/startup-context-opAJAamX.js +313 -0
  553. package/dist/status-subagents.runtime-DSo7ZK_Z.js +18 -0
  554. package/dist/status-subagents.runtime.js +1 -1
  555. package/dist/status-text-AyPuDzrO.js +296 -0
  556. package/dist/sticker-cache-91Tp8mLP.js +206 -0
  557. package/dist/sticker-vision.runtime-DjleFXi5.js +17 -0
  558. package/dist/sticker-vision.runtime.js +1 -1
  559. package/dist/subagent-announce-delivery-DS_2W9oZ.js +958 -0
  560. package/dist/subagent-announce-hatA_PZ2.js +354 -0
  561. package/dist/subagent-control-IyFIvc7T.js +508 -0
  562. package/dist/subagent-hooks-BCj5eB0Z.js +2 -0
  563. package/dist/subagent-hooks-BWjTBkox.js +146 -0
  564. package/dist/subagent-hooks-CdGLK9_3.js +230 -0
  565. package/dist/subagent-hooks-EH0tBkw9.js +2 -0
  566. package/dist/subagent-hooks-api-BhYaXQJV.js +23 -0
  567. package/dist/subagent-hooks-api-uGsV8Xn5.js +22 -0
  568. package/dist/subagent-hooks-api-wfJFKIPx.js +23 -0
  569. package/dist/subagent-hooks-l8Xd94dt.js +2 -0
  570. package/dist/subagent-hooks-m2eHUO_d.js +116 -0
  571. package/dist/subagent-orphan-recovery-Bq9zvX3L.js +352 -0
  572. package/dist/subagent-registry-Bcb3zy6b.js +3 -0
  573. package/dist/subagent-registry-CoZNTFx-.js +2351 -0
  574. package/dist/subagent-registry.runtime.js +1 -1
  575. package/dist/subagent-session-cleanup--00EjDLe.js +525 -0
  576. package/dist/subagent-spawn-ClJJkz3D.js +1164 -0
  577. package/dist/target-id-BsZLiF3x.js +107 -0
  578. package/dist/targets-CQMe4AZP.js +44 -0
  579. package/dist/targets-SmL1AU-H.js +19 -0
  580. package/dist/targets-Y-roiA47.js +19 -0
  581. package/dist/task-registry-control.runtime.js +1 -1
  582. package/dist/telegram/token.js +1 -1
  583. package/dist/testing-B5hNJDuF.js +267 -0
  584. package/dist/thread-bindings-BD3eE0kK.js +232 -0
  585. package/dist/thread-bindings-C9NNiv8K.js +571 -0
  586. package/dist/thread-bindings-Dl4PN1vZ.js +228 -0
  587. package/dist/thread-bindings-uK1LLAwy.js +8 -0
  588. package/dist/thread-bindings.discord-api-BHNEUbnk.js +187 -0
  589. package/dist/thread-bindings.manager-B0LXiH3F.js +2 -0
  590. package/dist/thread-bindings.manager-BTlH4XMG.js +536 -0
  591. package/dist/thread-lifecycle-DG8uyPHd.js +1614 -0
  592. package/dist/token-BbGCANnE.js +134 -0
  593. package/dist/tool-actions.runtime-oUUrD8HB.js +534 -0
  594. package/dist/tool-actions.runtime.js +1 -1
  595. package/dist/tool-bqg-_vYv.js +139 -0
  596. package/dist/tool-resolution-CSZsa3kP.js +149 -0
  597. package/dist/tools-effective-inventory-0CqFp-vq.js +204 -0
  598. package/dist/tools-invoke-http-DhYHY0Yh.js +67 -0
  599. package/dist/tools-invoke-shared-CbVJJUj7.js +200 -0
  600. package/dist/tts-C2qD-ad6.js +66 -0
  601. package/dist/tui-CzGY254f.js +4709 -0
  602. package/dist/tui-backend-fzoeoSN0.js +256 -0
  603. package/dist/tui-cli-B2RWb2gM.js +37 -0
  604. package/dist/tui-dgS8hdXU.js +2 -0
  605. package/dist/update-cli-BmiBDf3c.js +3664 -0
  606. package/dist/update-runner-CM7QVX6u.js +2379 -0
  607. package/dist/vision-tools-BzoBZnIc.js +1409 -0
  608. package/dist/web-search-DmfOd66S.js +62 -0
  609. package/dist/web-search-provider.runtime-3C5-pODD.js +328 -0
  610. package/dist/web-search-provider.runtime-Doh-Z9We.js +2 -0
  611. package/dist/web-search-provider.runtime.js +1 -1
  612. package/dist/xai-oauth-BLvQ43hx.js +479 -0
  613. package/dist/xai-user-agent-BdMQ_0_O.js +32 -0
  614. package/package.json +1 -1
  615. package/dist/abort-DeEb_wKd.js +0 -277
  616. package/dist/abort.runtime-CoYXQGPK.js +0 -2
  617. package/dist/account-inspect-D_06-CYS.js +0 -173
  618. package/dist/accounts-BCTqtj4Y.js +0 -107
  619. package/dist/accounts-BudLl8P2.js +0 -107
  620. package/dist/accounts-CUReBDA0.js +0 -2
  621. package/dist/accounts-PCioSzzr.js +0 -119
  622. package/dist/acp-runtime-B2t9_BHD.js +0 -26
  623. package/dist/acp-spawn-0x4Iiu1o.js +0 -2
  624. package/dist/acp-spawn-B2Ghe0jJ.js +0 -1275
  625. package/dist/acp-stateful-target-driver-C4VgcSyz.js +0 -89
  626. package/dist/action-kill-ClYsXEz7.js +0 -33
  627. package/dist/action-runtime-DrLPkNvU.js +0 -469
  628. package/dist/action-runtime-api-BqSflr9q.js +0 -2
  629. package/dist/action-send-CIy9cziD.js +0 -39
  630. package/dist/action-spawn-BjV6lFnX.js +0 -47
  631. package/dist/actions-D-QH7wq5.js +0 -161
  632. package/dist/actions.runtime-hzDtXQGU.js +0 -5
  633. package/dist/agent-Bb1DTBgv.js +0 -3
  634. package/dist/agent-Cnqj258q.js +0 -2
  635. package/dist/agent-command-BRx6ZNgJ.js +0 -1367
  636. package/dist/agent-components.runtime-D-g6xXJ0.js +0 -10
  637. package/dist/agent-harness-runtime-dKUQFuOc.js +0 -180
  638. package/dist/agent-harness-task-runtime-v2crUm3i.js +0 -140
  639. package/dist/agent-runner-execution-AOzdxvWR.js +0 -1713
  640. package/dist/agent-runner-utils-Byv50B4Z.js +0 -266
  641. package/dist/agent-runner.runtime-hhgRE0Z-.js +0 -3455
  642. package/dist/agent-runtime-BHmh3i0o.js +0 -229
  643. package/dist/agent-via-gateway-DnCqaK4a.js +0 -463
  644. package/dist/api-Bzyb8sFU.js +0 -3
  645. package/dist/api-CIEDFXZs.js +0 -2
  646. package/dist/api-D_dTQAu8.js +0 -2
  647. package/dist/api-DilBjZ9Q.js +0 -6
  648. package/dist/api-E5zoQMmh.js +0 -134
  649. package/dist/api-OJZug8gQ.js +0 -639
  650. package/dist/apply-C0eV5T0O.js +0 -41
  651. package/dist/apply-alsYvxLE.js +0 -54
  652. package/dist/approval-handler.runtime-C6jqZXSN.js +0 -130
  653. package/dist/assistant-DDXnAAB5.js +0 -291
  654. package/dist/attachment-normalize-Cv-_4DWU.js +0 -225
  655. package/dist/attempt-execution-DECEU59r.js +0 -558
  656. package/dist/attempt-execution.runtime-kasMxuER.js +0 -3
  657. package/dist/attempt-execution.shared-ClUxk52p.js +0 -38
  658. package/dist/attempt.prompt-helpers-Bxlv9VSu.js +0 -475
  659. package/dist/attempt.tool-run-context-CplQWX6g.js +0 -2094
  660. package/dist/binding-routing-0Obpp-Ij.js +0 -113
  661. package/dist/binding-targets-CZHQaZL4.js +0 -121
  662. package/dist/bot-BPbQ0840.js +0 -7894
  663. package/dist/bot-deps-Cs1M9USs.js +0 -2
  664. package/dist/bot-deps-xAcaOtTZ.js +0 -747
  665. package/dist/bot-message-context.runtime-Bji78Cbn.js +0 -7
  666. package/dist/bot-message-context.session.runtime-C3dyOIYH.js +0 -12
  667. package/dist/bot-native-commands.delivery.runtime-WshH99fy.js +0 -4
  668. package/dist/bot-native-commands.runtime-C1L364gU.js +0 -13
  669. package/dist/bridge-server-DPlM8_Lk.js +0 -113
  670. package/dist/browser-cli-DFNQE98N.js +0 -230
  671. package/dist/browser-cli-Drb5E5--.js +0 -2
  672. package/dist/browser-cli-actions-input-Dx-1OXmE.js +0 -473
  673. package/dist/browser-cli-actions-observe-BMDfE7xU.js +0 -81
  674. package/dist/browser-cli-debug-nu7Ih09g.js +0 -137
  675. package/dist/browser-cli-inspect-D5X2wohg.js +0 -104
  676. package/dist/browser-cli-manage-DkzYwph4.js +0 -443
  677. package/dist/browser-cli-resize-B30Avedl.js +0 -26
  678. package/dist/browser-cli-shared-cMgQoQzF.js +0 -50
  679. package/dist/browser-cli-state-CQLDvDy7.js +0 -337
  680. package/dist/browser-control-auth-D7ArmHUt.js +0 -2
  681. package/dist/browser-profiles-B39SIZNb.js +0 -2
  682. package/dist/browser-runtime-DUbSAOOS.js +0 -384
  683. package/dist/build-D25KqC92.js +0 -257
  684. package/dist/capability-cli-CuyXrlAB.js +0 -1782
  685. package/dist/channel-0N3YGMGg.js +0 -1496
  686. package/dist/channel-1UyKoLyp.js +0 -481
  687. package/dist/channel-BG87pSEW.js +0 -740
  688. package/dist/channel-BPGSaZW7.js +0 -1249
  689. package/dist/channel-BQMPh1J_.js +0 -376
  690. package/dist/channel-Bd_8V6zn.js +0 -1134
  691. package/dist/channel-BtBjh_ij.js +0 -362
  692. package/dist/channel-CpFBlVH6.js +0 -562
  693. package/dist/channel-CwuTrIrF.js +0 -508
  694. package/dist/channel-Cxl4sJA-.js +0 -1777
  695. package/dist/channel-D-VfU4Z2.js +0 -2126
  696. package/dist/channel-D9q8aYrN.js +0 -867
  697. package/dist/channel-DKSvVvZh.js +0 -238
  698. package/dist/channel-DvoFfWLx.js +0 -808
  699. package/dist/channel-GktTcGHm.js +0 -955
  700. package/dist/channel-actions.runtime-CKcRA0GW.js +0 -265
  701. package/dist/channel-core-nm8s1qFZ.js +0 -5
  702. package/dist/channel-d3t2ESlE.js +0 -653
  703. package/dist/channel-inbound-DKz40dq-.js +0 -80
  704. package/dist/channel-plugin-runtime-DKIGZWfW.js +0 -998
  705. package/dist/channel-runtime-Bh8_GY12.js +0 -408
  706. package/dist/channel-yQ8jCOb9.js +0 -1556
  707. package/dist/channel.runtime-BG4mM5cQ.js +0 -652
  708. package/dist/channel.runtime-BS6PyFFa.js +0 -1008
  709. package/dist/channel.runtime-CE_xECqN.js +0 -88
  710. package/dist/channel.runtime-Cd1Sw8U4.js +0 -254
  711. package/dist/channel.runtime-DIq3XOEe.js +0 -733
  712. package/dist/channel.runtime-Dy1cx35I.js +0 -21009
  713. package/dist/channel.runtime-NyIMjLnP.js +0 -109
  714. package/dist/channel.runtime-Zx5mfE2V.js +0 -4
  715. package/dist/channel.runtime-rJRibGfN.js +0 -2528
  716. package/dist/channel.setup--4ACadmF.js +0 -10
  717. package/dist/channel.setup-DzwqIlo3.js +0 -1098
  718. package/dist/channel.setup-FKYSJwXR.js +0 -343
  719. package/dist/chat-CKxSm7r1.js +0 -2666
  720. package/dist/chrome-rMubJwRG.js +0 -1503
  721. package/dist/cli-CbTod55I.js +0 -1341
  722. package/dist/cli-compaction-BbHgjJyW.js +0 -347
  723. package/dist/cli-metadata-DkOWLC_p.js +0 -22
  724. package/dist/cli-runner-Cwzv_RKf.js +0 -540
  725. package/dist/cli-runner-DdnUsgPl.js +0 -2
  726. package/dist/cli-runner.runtime-BlrSgbEW.js +0 -3
  727. package/dist/cli-runner.runtime-D8kVfvFH.js +0 -4
  728. package/dist/client-ClvxsWgL.js +0 -650
  729. package/dist/client-adapter-CsrIIjK1.js +0 -897
  730. package/dist/client-factory-DAYClhwm.js +0 -9
  731. package/dist/command-auth-CCha2ofd.js +0 -135
  732. package/dist/command-handlers-DCWJzHyB.js +0 -1609
  733. package/dist/command-registry-BIf61QNz.js +0 -9
  734. package/dist/command-registry-DJROBy4h.js +0 -4
  735. package/dist/command-registry-core-BQOWqi6S.js +0 -110
  736. package/dist/command-status.runtime-D88CUglL.js +0 -90
  737. package/dist/commands-acp-B-8dHX4Z.js +0 -74
  738. package/dist/commands-compact.runtime-ComX5mUk.js +0 -10
  739. package/dist/commands-handlers.runtime-DR3wjXHX.js +0 -6154
  740. package/dist/commands-status-CDyGrwsI.js +0 -3
  741. package/dist/commands-status-DV-i_ZIK.js +0 -16
  742. package/dist/commands-status.runtime-CDyGrwsI.js +0 -3
  743. package/dist/commands-subagents-control.runtime-B029cXAS.js +0 -3
  744. package/dist/commands-subagents-control.runtime-DR8Qspe0.js +0 -2
  745. package/dist/commands-system-prompt-C10ctsG3.js +0 -162
  746. package/dist/commands-system-prompt-DQlRWwnk.js +0 -2
  747. package/dist/commands.runtime-BYmIAuN0.js +0 -176
  748. package/dist/compact-14Ljaaeu.js +0 -480
  749. package/dist/compact-B--ovdkx.js +0 -1141
  750. package/dist/compact.runtime-E0Idf2Dq.js +0 -12
  751. package/dist/completion-cli-DMvvQGSk.js +0 -315
  752. package/dist/computer-use-CcLwX5SR.js +0 -367
  753. package/dist/config-B39SIZNb.js +0 -2
  754. package/dist/config-D4rsGOyV.js +0 -373
  755. package/dist/config-mutations-CsI3YJu7.js +0 -159
  756. package/dist/context-engine-host-compat-BZpDFiMJ.js +0 -2
  757. package/dist/context-engine-host-compat-runUdES5.js +0 -288
  758. package/dist/context-engine-lifecycle-D6odtNrn.js +0 -1274
  759. package/dist/control-auth-BPGpPtfz.js +0 -114
  760. package/dist/control-service-C-OmdPCe.js +0 -145
  761. package/dist/control-ui/assets/agents-GeyOHPuW.js +0 -1008
  762. package/dist/control-ui/assets/channel-config-extras-D7en6iUg.js +0 -2
  763. package/dist/control-ui/assets/channels-DkEyr1w5.js +0 -367
  764. package/dist/control-ui/assets/cron-C-wThQ1Q.js +0 -1013
  765. package/dist/control-ui/assets/debug-83AFRtIX.js +0 -97
  766. package/dist/control-ui/assets/index-CiGEhMOA.js +0 -7370
  767. package/dist/control-ui/assets/instances-CVl0t-1h.js +0 -57
  768. package/dist/control-ui/assets/logs-eybVEXxg.js +0 -74
  769. package/dist/control-ui/assets/nodes-C_A7eoU2.js +0 -436
  770. package/dist/control-ui/assets/sessions-Cq4Nc69u.js +0 -399
  771. package/dist/control-ui/assets/skills-ZN6hroIh.js +0 -314
  772. package/dist/control-ui/assets/skills-shared-DIWGwmdC.js +0 -11
  773. package/dist/conversation-binding-runtime-C2U1JElL.js +0 -4
  774. package/dist/conversation-runtime-NmIUd3Zu.js +0 -31
  775. package/dist/core-DGKJP1dm.js +0 -282
  776. package/dist/core-api-1fA4sNeC.js +0 -5
  777. package/dist/core-api-BY822Quq.js +0 -2
  778. package/dist/crestodian-Bp-NXiBC.js +0 -55
  779. package/dist/daocore-tools-Defpam0j.js +0 -11727
  780. package/dist/delivery-CEdVAUGB.js +0 -1002
  781. package/dist/dialogue-CZ69INPq.js +0 -37
  782. package/dist/dir-fetch-tool-BCicHhQE.js +0 -565
  783. package/dist/dir-list-tool-Cv_WktsJ.js +0 -100
  784. package/dist/direct-dm-Bz89rM8x.js +0 -64
  785. package/dist/directive-handling.fast-lane-DDnbcc5S.js +0 -68
  786. package/dist/directive-handling.impl-B0H52Ymr.js +0 -818
  787. package/dist/directive-handling.impl-CgKpwEW-.js +0 -2
  788. package/dist/directive-handling.model-selection-_cXAr0vt.js +0 -122
  789. package/dist/directive-handling.persist.runtime-Dw0mfzXT.js +0 -263
  790. package/dist/dispatch-C3AeYvyP.js +0 -1640
  791. package/dist/dispatch-acp-transcript.runtime-CP8pqBwS.js +0 -40
  792. package/dist/dispatch-acp.runtime-Cdap-AZI.js +0 -18
  793. package/dist/doctor-BZwVH97p.js +0 -2
  794. package/dist/doctor-BfkGBii1.js +0 -6
  795. package/dist/doctor-config-flow-D3JASGDt.js +0 -1741
  796. package/dist/doctor-core-checks-DH5AIT0Q.js +0 -573
  797. package/dist/doctor-core-checks-DiNu7VSh.js +0 -2
  798. package/dist/doctor-health-BDIJ-Nro.js +0 -65
  799. package/dist/doctor-health-contributions-BgmF7w8X.js +0 -696
  800. package/dist/doctor-lint-uIxkMUSO.js +0 -94
  801. package/dist/doctor-state-integrity-ws1b_BGk.js +0 -1231
  802. package/dist/doctor-update-Cx4CqxaX.js +0 -58
  803. package/dist/dynamic-tools-DiqOxhJh.js +0 -486
  804. package/dist/embedded-backend-C634irMl.js +0 -579
  805. package/dist/embedded-gateway-stub.runtime-CCfrTOeN.js +0 -12
  806. package/dist/exec-approvals-D85KThSg.js +0 -149
  807. package/dist/file-fetch-tool-BERaGYCT.js +0 -124
  808. package/dist/file-write-tool-BjHrMyfe.js +0 -127
  809. package/dist/format-DE9PuPg1.js +0 -1145
  810. package/dist/gateway-cli-B5hjhbUy.js +0 -435
  811. package/dist/gateway-method-runtime-Bu0E9Eki.js +0 -21
  812. package/dist/get-reply-6PtPz9hv.js +0 -4689
  813. package/dist/get-reply-from-config.runtime-CwprvhoR.js +0 -2
  814. package/dist/graph-users-DUp1kgnS.js +0 -1419
  815. package/dist/group-access-D5GBQ3w6.js +0 -112
  816. package/dist/handle-action.guild-admin-CA0Y-buD.js +0 -288
  817. package/dist/harness-B5nOFVfm.js +0 -61
  818. package/dist/health-D5heIDj3.js +0 -4
  819. package/dist/heartbeat-runner-BzFkIFHh.js +0 -5
  820. package/dist/heartbeat-runner.runtime-p6H1_xMV.js +0 -4
  821. package/dist/hooks-BvTyQ14X.js +0 -534
  822. package/dist/inbound-direct-dm-runtime-DwiDXi8L.js +0 -2
  823. package/dist/inbound-reply-dispatch-YoDUOC6C.js +0 -148
  824. package/dist/init-CPtcV5Xu.js +0 -59
  825. package/dist/inline-buttons-DeD5d42c.js +0 -40
  826. package/dist/internal-events-DEb50Sw3.js +0 -90
  827. package/dist/isolated-agent-CcxFFZ-Z.js +0 -1118
  828. package/dist/isolated-agent-CpHzq5qr.js +0 -2
  829. package/dist/lifecycle-DNel-oMe.js +0 -571
  830. package/dist/list.probe-DCa3N25d.js +0 -449
  831. package/dist/list.status-command-CyeAJmZW.js +0 -789
  832. package/dist/llm-slug-generator-CyqTY37Z.js +0 -78
  833. package/dist/local-dispatch.runtime-nE39kFIP.js +0 -9
  834. package/dist/manager.runtime-CpAPB8D5.js +0 -2714
  835. package/dist/markdown-to-line-Ci6TRmoZ.js +0 -811
  836. package/dist/mcp-http-BR0vmxFL.js +0 -2
  837. package/dist/mcp-http-C0oniA8h.js +0 -555
  838. package/dist/media-understanding-provider-BwA0XqC3.js +0 -339
  839. package/dist/message-actions-C9C_Ngkd.js +0 -145
  840. package/dist/message-handler-CUUKPC5n.js +0 -384
  841. package/dist/message-handler-xRTfIXWV.js +0 -1715
  842. package/dist/message-handler.preflight-Ch2Q7V3M.js +0 -1125
  843. package/dist/message-handler.process-HM3mK93q.js +0 -1484
  844. package/dist/model-CB8Ex5xS.js +0 -74
  845. package/dist/model-selection-2s0Dinux.js +0 -272
  846. package/dist/models-Cn-6DJ41.js +0 -2
  847. package/dist/models-CzszJD__.js +0 -104
  848. package/dist/models-cli-CbhElnA5.js +0 -256
  849. package/dist/monitor-7aprTsMV.js +0 -715
  850. package/dist/monitor-BuVhqwDS.js +0 -1370
  851. package/dist/monitor-C4H_YkgY.js +0 -2
  852. package/dist/monitor-CPQsMxgv.js +0 -1657
  853. package/dist/monitor-Ce0V1PiR.js +0 -4377
  854. package/dist/monitor-D0bcGJWI.js +0 -60
  855. package/dist/monitor-DEjlJqzh.js +0 -834
  856. package/dist/monitor-auth-DjJZsjgV.js +0 -179
  857. package/dist/monitor-ikSYagv3.js +0 -2788
  858. package/dist/monitor-polling.runtime-D7yEflMM.js +0 -883
  859. package/dist/monitor-webhook.runtime-CIZt-biI.js +0 -387
  860. package/dist/monitor.account-C2sMOBCS.js +0 -5233
  861. package/dist/monitor.runtime-BAi6zmcn.js +0 -2
  862. package/dist/monitor.webhook-BcjpfRCX.js +0 -180
  863. package/dist/node-cli-sessions-CIhkJRU4.js +0 -1228
  864. package/dist/openai-http-Dj21RwSj.js +0 -824
  865. package/dist/openresponses-http-COnnr1ox.js +0 -1173
  866. package/dist/operations-H3vUh0lM.js +0 -805
  867. package/dist/outbound-adapter-WLtWE7wv.js +0 -543
  868. package/dist/outbound-session-route-CZtd64EH.js +0 -45
  869. package/dist/outbound.runtime-D98P0sN1.js +0 -2
  870. package/dist/pi-embedded-BWJzd4mK.js +0 -4
  871. package/dist/pi-embedded-DeNsSqQQ.js +0 -3796
  872. package/dist/pi-embedded.runtime-CZnNwFpc.js +0 -4
  873. package/dist/pi-tools-CNHSpjBa.js +0 -2413
  874. package/dist/plan-B0reFFlM.js +0 -81
  875. package/dist/plan-CrfF-TH8.js +0 -112
  876. package/dist/plugin-DI_8eYOe.js +0 -12396
  877. package/dist/plugin-app-cache-key-WaTUD3e-.js +0 -46
  878. package/dist/plugin-enabled-aWLXgGGi.js +0 -233
  879. package/dist/plugin-registration-ByjRIVJm.js +0 -88
  880. package/dist/plugin-service-VQm_241d.js +0 -1229
  881. package/dist/policy-BmJH-swe.js +0 -680
  882. package/dist/policy-DE-bO1zn.js +0 -138
  883. package/dist/prepare.runtime-bSj3-res.js +0 -732
  884. package/dist/preview-warnings-CbuGYsF9.js +0 -392
  885. package/dist/probe-C_rWg7_m.js +0 -682
  886. package/dist/probe-CagOFfx6.js +0 -2
  887. package/dist/probe-thX1HqOh.js +0 -2204
  888. package/dist/probe-zU6B6gFt.js +0 -47
  889. package/dist/program-BtVdH743.js +0 -131
  890. package/dist/provider-CDoD7tO0.js +0 -8735
  891. package/dist/provider-CK1gMdJ2.js +0 -32
  892. package/dist/provider-DJqr9djy.js +0 -32
  893. package/dist/provider-DsOJp5bK.js +0 -152
  894. package/dist/provider-dispatcher-UNQ-LSx9.js +0 -22
  895. package/dist/provider-session.runtime-DMrkMb4x.js +0 -9
  896. package/dist/provider.runtime-C2-t3zm8.js +0 -2
  897. package/dist/public-surface-loader-hTeyyHcd.js +0 -114
  898. package/dist/pw-ai-BaL3eVYx.js +0 -3029
  899. package/dist/pw-role-snapshot-DKeBqhN1.js +0 -333
  900. package/dist/reaction-level-BV2potsD.js +0 -19
  901. package/dist/reaction-runtime-api-CCBxgM10.js +0 -116
  902. package/dist/realtime-transcription-provider-CHYtIXZm.js +0 -205
  903. package/dist/register-BJf28G9B.js +0 -2178
  904. package/dist/register.agent-oXAHwNQv.js +0 -156
  905. package/dist/register.crestodian-CQ0sqdV2.js +0 -24
  906. package/dist/register.maintenance-CylVRs5M.js +0 -83
  907. package/dist/register.runtime-CcDgwy0X.js +0 -54
  908. package/dist/register.subclis-CpBYNw2X.js +0 -3
  909. package/dist/register.subclis-N2CvieOL.js +0 -31
  910. package/dist/register.subclis-core-BHaGvbzg.js +0 -273
  911. package/dist/repair-sequencing-EBBnBdIB.js +0 -640
  912. package/dist/reply-delivery-BLoPALlI.js +0 -196
  913. package/dist/reply-runtime-D4asNTSa.js +0 -11
  914. package/dist/reply.runtime-CwprvhoR.js +0 -2
  915. package/dist/request-DlWPRUDt.js +0 -54
  916. package/dist/resolve-allowlist-BukQf58x.js +0 -220
  917. package/dist/result-fallback-classifier-DyHFnqfV.js +0 -79
  918. package/dist/route-BMf4keN5.js +0 -469
  919. package/dist/route-resolution-DWNi1QAu.js +0 -274
  920. package/dist/routes-C20LC8c4.js +0 -3602
  921. package/dist/routes-CkK7Vv_m.js +0 -2
  922. package/dist/run-KDF_AEza.js +0 -1162
  923. package/dist/run-attempt-JHYCfonU.js +0 -7704
  924. package/dist/run-command-3PVihYIy.js +0 -2
  925. package/dist/run-command-QHAXnyKY.js +0 -23
  926. package/dist/run-embedded.runtime-BJw-2vss.js +0 -4
  927. package/dist/run-execution-cli.runtime-GHClMn2g.js +0 -4
  928. package/dist/run-subagent-registry.runtime-BLLMrhtE.js +0 -2
  929. package/dist/runtime-C2u-dC1r.js +0 -1287
  930. package/dist/runtime-ClyfkDWT.js +0 -6179
  931. package/dist/runtime-WXCarlPc.js +0 -438
  932. package/dist/runtime-api-3QhGLpZf.js +0 -13
  933. package/dist/runtime-api-DRAu3mjv.js +0 -4
  934. package/dist/runtime-api-JE07pOem.js +0 -13
  935. package/dist/runtime-api-JuKylHvw.js +0 -24
  936. package/dist/runtime-api-bcbk4yax.js +0 -21
  937. package/dist/runtime-api-dDe9U2_V.js +0 -17
  938. package/dist/runtime-api-uMexLqGS.js +0 -3
  939. package/dist/runtime-api.actions-Bo7TLDFl.js +0 -3
  940. package/dist/runtime-api.monitor-7q78L1Em.js +0 -6
  941. package/dist/runtime-api.send-Bf9RR4nV.js +0 -4
  942. package/dist/runtime-api.threads-Dj2QuhHj.js +0 -2
  943. package/dist/runtime-channel-k1C0Satl.js +0 -2
  944. package/dist/runtime-channel-qt9t0J-J.js +0 -150
  945. package/dist/runtime-embedded-pi.runtime-BPB9NlTS.js +0 -2
  946. package/dist/sanitize-outbound-BLH_SQvg.js +0 -127
  947. package/dist/sdk-setup-tools-BshlBPau.js +0 -8
  948. package/dist/secrets-CsHXv7d3.js +0 -113
  949. package/dist/security-audit-CUXBQXNX.js +0 -122
  950. package/dist/security-audit-CzdXbRma.js +0 -118
  951. package/dist/security-audit.runtime-Ca0FMFJG.js +0 -2
  952. package/dist/selection-BmvQJlSD.js +0 -3
  953. package/dist/selection-BplDXc9w.js +0 -16157
  954. package/dist/send--qFg8a9v.js +0 -1631
  955. package/dist/send-BPdryPPA.js +0 -192
  956. package/dist/send-Bl4YaRkS.js +0 -143
  957. package/dist/send-Ccm7RMXC.js +0 -2
  958. package/dist/send.components-c3OUPSmR.js +0 -2
  959. package/dist/send.components-rhQJYoXs.js +0 -500
  960. package/dist/send.runtime-dfUkAp5d.js +0 -2
  961. package/dist/server-DRhyTMLe.js +0 -73
  962. package/dist/server-Dv4BzjGn.js +0 -24
  963. package/dist/server-context-4HRJy2vp.js +0 -955
  964. package/dist/server-context-DlxYb1G5.js +0 -2
  965. package/dist/server-cron-Bt8Pkc3i.js +0 -2989
  966. package/dist/server-cron-CtNWsa4Z.js +0 -2
  967. package/dist/server-methods-rye_okUW.js +0 -16494
  968. package/dist/server-node-events-C1yZ5a1u.js +0 -596
  969. package/dist/server-plugin-bootstrap-DUMyVtlP.js +0 -70
  970. package/dist/server-plugins-B5ZWWkRE.js +0 -432
  971. package/dist/server-reload-handlers-CTnMXNjT.js +0 -714
  972. package/dist/server-restart-sentinel-CAYxtwmY.js +0 -747
  973. package/dist/server-restart-sentinel-DqrtSIvy.js +0 -2
  974. package/dist/server-runtime-services-CuptQTe5.js +0 -2
  975. package/dist/server-runtime-services-aaS2IiW3.js +0 -267
  976. package/dist/server-startup-plugins-D0ymJgQT.js +0 -113
  977. package/dist/server-startup-post-attach-DlrN2uyt.js +0 -716
  978. package/dist/server-ws-runtime-CdpLbv4o.js +0 -349
  979. package/dist/server.impl-Cb4qcMTg.js +0 -2586
  980. package/dist/service-qxvDlMQE.js +0 -1446
  981. package/dist/session-binding-6bLobLHL.js +0 -219
  982. package/dist/session-binding-Bm6fCpoY.js +0 -2
  983. package/dist/session-kill-http-B6WjVo8V.js +0 -121
  984. package/dist/session-reset-service-GUVIhxp4.js +0 -625
  985. package/dist/session-route-BcRDnvzG.js +0 -93
  986. package/dist/session-status.runtime-BcjOunV4.js +0 -2
  987. package/dist/session-subagent-reactivation.runtime-BSmk_KYn.js +0 -2
  988. package/dist/session-tab-registry-BBYzbSOu.js +0 -521
  989. package/dist/sessions-history-http-bLJJfgLm.js +0 -430
  990. package/dist/sessions.runtime-DNRtQzCk.js +0 -2
  991. package/dist/setup-api-CcolVVJs.js +0 -29
  992. package/dist/setup-core-eJD18F3B.js +0 -174
  993. package/dist/setup-surface-B75C2Qtz.js +0 -221
  994. package/dist/setup-surface-CFuPfVHp.js +0 -405
  995. package/dist/setup-surface-Dyy-Mzyz.js +0 -288
  996. package/dist/setup-surface-ZsVF_g8W.js +0 -320
  997. package/dist/shared-BkCNrcLX.js +0 -121
  998. package/dist/shared-client-B7zqC9p2.js +0 -2
  999. package/dist/shared-client-yXjKgZBz.js +0 -629
  1000. package/dist/side-question-DU3gESCb.js +0 -683
  1001. package/dist/skill-tool-dispatch.runtime-CPBuqyvk.js +0 -143
  1002. package/dist/slash-state-Do3bAahA.js +0 -2166
  1003. package/dist/speech-provider-Bg9los3C.js +0 -184
  1004. package/dist/src-D7LzUctH.js +0 -4256
  1005. package/dist/startup-context-CCF2gIOl.js +0 -313
  1006. package/dist/status-subagents.runtime-DX5FTymp.js +0 -18
  1007. package/dist/status-text-B-1u5dSV.js +0 -296
  1008. package/dist/sticker-cache-DwpU_9RJ.js +0 -206
  1009. package/dist/sticker-vision.runtime-Bbldi_YL.js +0 -17
  1010. package/dist/subagent-announce-BCo0VHVL.js +0 -354
  1011. package/dist/subagent-announce-delivery-JcnuDN_N.js +0 -958
  1012. package/dist/subagent-control-BzbA3Suz.js +0 -508
  1013. package/dist/subagent-hooks-BIGZQWrG.js +0 -2
  1014. package/dist/subagent-hooks-Bj4qYZfv.js +0 -230
  1015. package/dist/subagent-hooks-C-rvhVBv.js +0 -2
  1016. package/dist/subagent-hooks-P01_AFl5.js +0 -116
  1017. package/dist/subagent-hooks-VEfak8nl.js +0 -2
  1018. package/dist/subagent-hooks-api-BPnSxxN4.js +0 -23
  1019. package/dist/subagent-hooks-api-DwIAvMoS.js +0 -22
  1020. package/dist/subagent-hooks-api-kgyR9FOb.js +0 -23
  1021. package/dist/subagent-hooks-oED56wqq.js +0 -146
  1022. package/dist/subagent-orphan-recovery-D79ZzwKN.js +0 -352
  1023. package/dist/subagent-registry-D0soBT5j.js +0 -2351
  1024. package/dist/subagent-registry-DRJDkmty.js +0 -3
  1025. package/dist/subagent-session-cleanup-9eAO1aJe.js +0 -525
  1026. package/dist/subagent-spawn-D80vbogm.js +0 -1164
  1027. package/dist/target-id-COLv5LsJ.js +0 -107
  1028. package/dist/targets-CDW5IQ6a.js +0 -44
  1029. package/dist/targets-Ci6O1ZdP.js +0 -19
  1030. package/dist/targets-CsaWFBg1.js +0 -19
  1031. package/dist/testing-BoJit-h1.js +0 -267
  1032. package/dist/thread-bindings-CGCvw0KT.js +0 -571
  1033. package/dist/thread-bindings-ClCTNacX.js +0 -228
  1034. package/dist/thread-bindings-DRb7BMZ6.js +0 -8
  1035. package/dist/thread-bindings-Xc6smav0.js +0 -232
  1036. package/dist/thread-bindings.discord-api-DC467oeF.js +0 -187
  1037. package/dist/thread-bindings.manager-C_mpTDIZ.js +0 -536
  1038. package/dist/thread-bindings.manager-DkCRs612.js +0 -2
  1039. package/dist/thread-lifecycle-DpqCXlx9.js +0 -1614
  1040. package/dist/token-CI6HjbTA.js +0 -134
  1041. package/dist/tool-BMe7hjBK.js +0 -139
  1042. package/dist/tool-actions.runtime-D-h5PI_m.js +0 -534
  1043. package/dist/tool-resolution-CnLx0CHe.js +0 -149
  1044. package/dist/tools-effective-inventory-BR6MUMtE.js +0 -204
  1045. package/dist/tools-invoke-http-CTTs2yMT.js +0 -67
  1046. package/dist/tools-invoke-shared-9B1EjXWf.js +0 -200
  1047. package/dist/tts-eGOviZ5c.js +0 -66
  1048. package/dist/tui-Bw0HqKd7.js +0 -4709
  1049. package/dist/tui-CIZJnPzj.js +0 -2
  1050. package/dist/tui-backend-BJ_r7tcF.js +0 -256
  1051. package/dist/tui-cli-BaSMBpuA.js +0 -37
  1052. package/dist/update-cli-zuCybGNR.js +0 -3664
  1053. package/dist/update-runner-Dek2BHmQ.js +0 -2379
  1054. package/dist/vision-tools-1ps0BEE5.js +0 -1409
  1055. package/dist/web-search-B7EziZXE.js +0 -62
  1056. package/dist/web-search-provider.runtime-DGTCvGch.js +0 -328
  1057. package/dist/web-search-provider.runtime-DWL5t39M.js +0 -2
  1058. package/dist/xai-oauth-CRtsj2Gs.js +0 -479
  1059. package/dist/xai-user-agent-Dndwzw2S.js +0 -32
  1060. /package/dist/{acp-runtime-backend-DSDBcyh9.js → acp-runtime-backend-Cxo7eBHf.js} +0 -0
  1061. /package/dist/{channel-actions-FV66JqtI.js → channel-actions-UDeVjgGz.js} +0 -0
  1062. /package/dist/{command-status-runtime-BRWKSoG7.js → command-status-runtime-CoHd4Fws.js} +0 -0
  1063. /package/dist/{delegate-DGqKhwB4.js → delegate-B-2xZ77o.js} +0 -0
  1064. /package/dist/{dispatch-acp-Ceoxja_Z.js → dispatch-acp-DLPkmK7K.js} +0 -0
  1065. /package/dist/{heartbeat-runner-CJHvr5pG.js → heartbeat-runner-D2j6JwOI.js} +0 -0
  1066. /package/dist/{library-Bq3aDek_.js → library-DBT0cIPP.js} +0 -0
  1067. /package/dist/{run-executor.runtime-DNJhGPbA.js → run-executor.runtime-DE4J7f4M.js} +0 -0
  1068. /package/dist/{shared-CYxmRpq1.js → shared-xeo8Yh5n.js} +0 -0
@@ -0,0 +1,2178 @@
1
+ import { o as coerceSecretRef } from "./types.secrets-Ct1DNG7D.js";
2
+ import { r as normalizeProviderId } from "./provider-id-zTW9Rdln.js";
3
+ import "./provider-model-shared-H18UrK7h.js";
4
+ import "./secret-input-s8BgZnEq.js";
5
+ import { i as registerHealthCheck } from "./health-check-registry-DxXQHCTW.js";
6
+ import "./health-DFR9A1YV.js";
7
+ import JSON5 from "json5";
8
+ import { basename, isAbsolute, resolve } from "node:path";
9
+ import { createHash } from "node:crypto";
10
+ //#region extensions/policy/src/policy-state.ts
11
+ const RESERVED_CHANNEL_CONFIG_KEYS = new Set(["defaults", "modelByChannel"]);
12
+ const NON_SLUG_CHARS = /[^a-z0-9-]+/g;
13
+ const COLLAPSE_HYPHENS = /-+/g;
14
+ const TRIM_HYPHENS = /^-+|-+$/g;
15
+ function policyDocumentHash(policy) {
16
+ return sha256(stableJson(policy));
17
+ }
18
+ function policyWorkspaceHash(evidence) {
19
+ return sha256(stableJson(evidence));
20
+ }
21
+ function policyFindingsHash(findings) {
22
+ return sha256(stableJson(findings));
23
+ }
24
+ function policyAttestationHash(input) {
25
+ return sha256(stableJson(input));
26
+ }
27
+ function createPolicyAttestation(input) {
28
+ const workspaceHash = policyWorkspaceHash(input.evidence);
29
+ const findingsHash = policyFindingsHash(input.findings);
30
+ return {
31
+ checkedAt: input.checkedAt,
32
+ ...input.policyHash === void 0 ? {} : { policy: {
33
+ path: input.policyPath,
34
+ hash: input.policyHash
35
+ } },
36
+ workspace: {
37
+ scope: "policy",
38
+ hash: workspaceHash
39
+ },
40
+ findingsHash,
41
+ attestationHash: policyAttestationHash({
42
+ ok: input.ok,
43
+ policyHash: input.policyHash,
44
+ workspaceHash,
45
+ findingsHash
46
+ })
47
+ };
48
+ }
49
+ function collectPolicyEvidence(cfg, options = {}) {
50
+ const evidence = {
51
+ channels: scanPolicyChannels(cfg),
52
+ mcpServers: scanPolicyMcpServers(cfg),
53
+ modelProviders: scanPolicyModelProviders(cfg),
54
+ modelRefs: scanPolicyModelRefs(cfg),
55
+ network: scanPolicyNetwork(cfg),
56
+ ...options.includeGatewayExposure === false ? {} : { gatewayExposure: scanPolicyGatewayExposure(cfg) },
57
+ ...options.includeSecrets === false ? {} : { secrets: scanPolicySecrets(cfg) },
58
+ ...options.includeAuthProfiles === false ? {} : { authProfiles: scanPolicyAuthProfiles(cfg) }
59
+ };
60
+ if (options.toolsRaw === void 0) return evidence;
61
+ return scanPolicyTools(options.toolsRaw).then((tools) => ({
62
+ ...evidence,
63
+ tools
64
+ }));
65
+ }
66
+ function scanPolicyChannels(cfg) {
67
+ return Object.entries(configuredChannels(cfg)).filter(([id]) => !RESERVED_CHANNEL_CONFIG_KEYS.has(id)).toSorted(([a], [b]) => a.localeCompare(b)).map(([id, value]) => {
68
+ const entry = {
69
+ id,
70
+ provider: id,
71
+ source: `oc://daocore.config/channels/${id}`
72
+ };
73
+ if (isRecord$1(value) && typeof value.enabled === "boolean") entry.enabled = value.enabled;
74
+ return entry;
75
+ });
76
+ }
77
+ function scanPolicyMcpServers(cfg) {
78
+ return Object.entries(configuredMcpServers(cfg)).toSorted(([a], [b]) => a.localeCompare(b)).map(([id, value]) => {
79
+ const entry = {
80
+ id,
81
+ transport: mcpServerTransport(value),
82
+ source: `oc://daocore.config/mcp/servers/${ocPathSegment(id)}`
83
+ };
84
+ if (isRecord$1(value)) {
85
+ if (typeof value.command === "string") entry.command = value.command;
86
+ if (typeof value.url === "string") entry.url = redactMcpUrlForEvidence(value.url);
87
+ }
88
+ return entry;
89
+ });
90
+ }
91
+ function scanPolicyModelProviders(cfg) {
92
+ return Object.keys(configuredModelProviders(cfg)).toSorted((a, b) => a.localeCompare(b)).map((id) => ({
93
+ id: normalizeProviderId(id),
94
+ source: `oc://daocore.config/models/providers/${id}`
95
+ }));
96
+ }
97
+ function scanPolicyModelRefs(cfg) {
98
+ const refs = [];
99
+ if (isRecord$1(cfg.agents)) {
100
+ collectModelRefsFromRecord(refs, cfg.agents, "oc://daocore.config/agents");
101
+ collectModelRefsFromAgentAllowlist(refs, cfg.agents);
102
+ }
103
+ return refs.toSorted((a, b) => a.provider.localeCompare(b.provider) || a.model.localeCompare(b.model));
104
+ }
105
+ function scanPolicyNetwork(cfg) {
106
+ return [
107
+ networkBooleanEvidence(cfg, "browser-private-network", [
108
+ "browser",
109
+ "ssrfPolicy",
110
+ "dangerouslyAllowPrivateNetwork"
111
+ ], "oc://daocore.config/browser/ssrfPolicy/dangerouslyAllowPrivateNetwork"),
112
+ networkBooleanEvidence(cfg, "browser-private-network-legacy", [
113
+ "browser",
114
+ "ssrfPolicy",
115
+ "allowPrivateNetwork"
116
+ ], "oc://daocore.config/browser/ssrfPolicy/allowPrivateNetwork"),
117
+ networkBooleanEvidence(cfg, "web-fetch-private-network", [
118
+ "tools",
119
+ "web",
120
+ "fetch",
121
+ "ssrfPolicy",
122
+ "dangerouslyAllowPrivateNetwork"
123
+ ], "oc://daocore.config/tools/web/fetch/ssrfPolicy/dangerouslyAllowPrivateNetwork"),
124
+ networkBooleanEvidence(cfg, "web-fetch-private-network-legacy", [
125
+ "tools",
126
+ "web",
127
+ "fetch",
128
+ "ssrfPolicy",
129
+ "allowPrivateNetwork"
130
+ ], "oc://daocore.config/tools/web/fetch/ssrfPolicy/allowPrivateNetwork"),
131
+ networkBooleanEvidence(cfg, "web-fetch-rfc2544-benchmark-range", [
132
+ "tools",
133
+ "web",
134
+ "fetch",
135
+ "ssrfPolicy",
136
+ "allowRfc2544BenchmarkRange"
137
+ ], "oc://daocore.config/tools/web/fetch/ssrfPolicy/allowRfc2544BenchmarkRange"),
138
+ networkBooleanEvidence(cfg, "web-fetch-ipv6-unique-local-range", [
139
+ "tools",
140
+ "web",
141
+ "fetch",
142
+ "ssrfPolicy",
143
+ "allowIpv6UniqueLocalRange"
144
+ ], "oc://daocore.config/tools/web/fetch/ssrfPolicy/allowIpv6UniqueLocalRange")
145
+ ].filter((entry) => entry !== void 0);
146
+ }
147
+ function scanPolicyGatewayExposure(cfg) {
148
+ const gateway = isRecord$1(cfg.gateway) ? cfg.gateway : {};
149
+ const entries = [];
150
+ const bind = typeof gateway.bind === "string" ? gateway.bind : void 0;
151
+ const customBindHost = typeof gateway.customBindHost === "string" ? gateway.customBindHost : void 0;
152
+ const hasCustomBindHost = customBindHost !== void 0 && customBindHost.trim() !== "";
153
+ const tailscale = isRecord$1(gateway.tailscale) ? gateway.tailscale : {};
154
+ const tailscaleForcesLoopback = tailscale.mode === "serve" || tailscale.mode === "funnel";
155
+ entries.push({
156
+ id: bind === void 0 ? "gateway-bind-default" : "gateway-bind",
157
+ kind: "bind",
158
+ source: "oc://daocore.config/gateway/bind",
159
+ value: bind ?? (tailscaleForcesLoopback ? "loopback" : "runtime-default"),
160
+ nonLoopback: bind === void 0 ? !tailscaleForcesLoopback : bind === "custom" ? false : isGatewayNonLoopbackBind(bind),
161
+ explicit: bind !== void 0
162
+ });
163
+ if (bind === "custom" && hasCustomBindHost) entries.push({
164
+ id: "gateway-custom-bind-host",
165
+ kind: "bind",
166
+ source: "oc://daocore.config/gateway/customBindHost",
167
+ value: customBindHost,
168
+ nonLoopback: isRuntimeNonLoopbackCustomBindHost(customBindHost)
169
+ });
170
+ const auth = isRecord$1(gateway.auth) ? gateway.auth : {};
171
+ entries.push({
172
+ id: "gateway-auth-mode",
173
+ kind: "auth",
174
+ source: "oc://daocore.config/gateway/auth/mode",
175
+ value: typeof auth.mode === "string" ? auth.mode : "token",
176
+ explicit: typeof auth.mode === "string"
177
+ });
178
+ entries.push({
179
+ id: "gateway-auth-rate-limit",
180
+ kind: "authRateLimit",
181
+ source: "oc://daocore.config/gateway/auth/rateLimit",
182
+ value: isRecord$1(auth.rateLimit),
183
+ explicit: isRecord$1(auth.rateLimit)
184
+ });
185
+ const controlUi = isRecord$1(gateway.controlUi) ? gateway.controlUi : {};
186
+ pushGatewayBooleanEvidence(entries, "gateway-control-ui-enabled", "controlUi", controlUi.enabled, "oc://daocore.config/gateway/controlUi/enabled");
187
+ pushGatewayBooleanEvidence(entries, "gateway-control-ui-insecure-auth", "controlUi", controlUi.allowInsecureAuth, "oc://daocore.config/gateway/controlUi/allowInsecureAuth");
188
+ pushGatewayBooleanEvidence(entries, "gateway-control-ui-device-auth-disabled", "controlUi", controlUi.dangerouslyDisableDeviceAuth, "oc://daocore.config/gateway/controlUi/dangerouslyDisableDeviceAuth");
189
+ pushGatewayBooleanEvidence(entries, "gateway-control-ui-host-origin-fallback", "controlUi", controlUi.dangerouslyAllowHostHeaderOriginFallback, "oc://daocore.config/gateway/controlUi/dangerouslyAllowHostHeaderOriginFallback");
190
+ if (typeof tailscale.mode === "string") entries.push({
191
+ id: "gateway-tailscale-mode",
192
+ kind: "tailscale",
193
+ source: "oc://daocore.config/gateway/tailscale/mode",
194
+ value: tailscale.mode
195
+ });
196
+ if (tailscale.mode === "serve" && tailscale.preserveFunnel === true) entries.push({
197
+ id: "gateway-tailscale-preserve-funnel",
198
+ kind: "tailscale",
199
+ source: "oc://daocore.config/gateway/tailscale/preserveFunnel",
200
+ value: "funnel"
201
+ });
202
+ const remote = isRecord$1(gateway.remote) ? gateway.remote : {};
203
+ if (gateway.mode === "remote") {
204
+ entries.push({
205
+ id: "gateway-mode-remote",
206
+ kind: "remote",
207
+ source: "oc://daocore.config/gateway/mode",
208
+ value: "remote"
209
+ });
210
+ if (typeof remote.url === "string" && remote.url.trim() !== "") entries.push({
211
+ id: "gateway-remote-url",
212
+ kind: "remote",
213
+ source: "oc://daocore.config/gateway/remote/url",
214
+ value: true
215
+ });
216
+ }
217
+ const http = isRecord$1(gateway.http) ? gateway.http : {};
218
+ const endpoints = isRecord$1(http.endpoints) ? http.endpoints : {};
219
+ pushGatewayHttpEndpointEvidence(entries, endpoints, "chatCompletions");
220
+ pushGatewayHttpEndpointEvidence(entries, endpoints, "responses");
221
+ return entries.toSorted((a, b) => a.source.localeCompare(b.source));
222
+ }
223
+ function scanPolicySecrets(cfg) {
224
+ return [...scanPolicySecretProviders(cfg), ...scanPolicySecretInputs(cfg)].toSorted((a, b) => a.source.localeCompare(b.source));
225
+ }
226
+ function scanPolicyAuthProfiles(cfg) {
227
+ const auth = isRecord$1(cfg.auth) ? cfg.auth : {};
228
+ const profiles = isRecord$1(auth.profiles) ? auth.profiles : {};
229
+ return Object.entries(profiles).toSorted(([a], [b]) => a.localeCompare(b)).map(([id, value]) => {
230
+ const entry = {
231
+ id,
232
+ source: `oc://daocore.config/auth/profiles/${ocPathSegment(id)}`,
233
+ validMetadata: isValidAuthProfileMetadata(value)
234
+ };
235
+ if (isRecord$1(value)) {
236
+ if (typeof value.provider === "string") entry.provider = value.provider;
237
+ if (typeof value.mode === "string") entry.mode = value.mode;
238
+ }
239
+ return entry;
240
+ });
241
+ }
242
+ function scanPolicySecretProviders(cfg) {
243
+ const secrets = isRecord$1(cfg.secrets) ? cfg.secrets : {};
244
+ const providers = isRecord$1(secrets.providers) ? secrets.providers : {};
245
+ return Object.entries(providers).map(([id, value]) => {
246
+ const insecure = secretProviderInsecureFlags(value);
247
+ const entry = {
248
+ id,
249
+ kind: "provider",
250
+ source: `oc://daocore.config/secrets/providers/${ocPathSegment(id)}`
251
+ };
252
+ if (isRecord$1(value) && typeof value.source === "string") entry.providerSource = value.source;
253
+ if (insecure.length > 0) entry.insecure = insecure;
254
+ return entry;
255
+ });
256
+ }
257
+ function scanPolicySecretInputs(cfg) {
258
+ const entries = [];
259
+ collectSecretInputs(entries, cfg, [], secretRefDefaults((isRecord$1(cfg.secrets) ? cfg.secrets : {}).defaults));
260
+ return entries;
261
+ }
262
+ function collectSecretInputs(entries, value, path, defaults) {
263
+ if (Array.isArray(value)) {
264
+ value.forEach((item, index) => collectSecretInputs(entries, item, [...path, `#${index}`], defaults));
265
+ return;
266
+ }
267
+ if (!isRecord$1(value)) return;
268
+ for (const [key, child] of Object.entries(value)) {
269
+ const childPath = [...path, key];
270
+ const source = configPathSource(childPath);
271
+ const ref = isSecretInputPath(childPath) ? secretRefEvidence(child, defaults) : void 0;
272
+ if (ref !== void 0) {
273
+ entries.push({
274
+ id: source,
275
+ kind: "input",
276
+ source,
277
+ provenance: "secretRef",
278
+ refSource: ref.source,
279
+ refProvider: ref.provider
280
+ });
281
+ continue;
282
+ }
283
+ collectSecretInputs(entries, child, childPath, defaults);
284
+ }
285
+ }
286
+ function configPathSource(path) {
287
+ return `oc://daocore.config/${path.map(ocPathSegment).join("/")}`;
288
+ }
289
+ function isSecretInputPath(path) {
290
+ const key = path.at(-1);
291
+ if (key === void 0) return false;
292
+ if (matchesConfigPath(path, [
293
+ "plugins",
294
+ "entries",
295
+ "acpx",
296
+ "config",
297
+ "mcpServers",
298
+ "*",
299
+ "env",
300
+ "*"
301
+ ])) return true;
302
+ if (isRawEnvMapValuePath(path)) return false;
303
+ if (isSecretInputKey(key)) return true;
304
+ return matchesConfigPath(path, [
305
+ "models",
306
+ "providers",
307
+ "*",
308
+ "headers",
309
+ "*"
310
+ ]) || isConfiguredProviderRequestSecretPath(path, [
311
+ "models",
312
+ "providers",
313
+ "*"
314
+ ]) || isMediaConfiguredProviderRequestSecretPath(path) || matchesConfigPath(path, [
315
+ "agents",
316
+ "defaults",
317
+ "memorySearch",
318
+ "remote",
319
+ "headers",
320
+ "*"
321
+ ]) || matchesConfigPath(path, [
322
+ "diagnostics",
323
+ "otel",
324
+ "headers",
325
+ "*"
326
+ ]);
327
+ }
328
+ function isRawEnvMapValuePath(path) {
329
+ return path.length >= 2 && path.at(-2) === "env";
330
+ }
331
+ function isMediaConfiguredProviderRequestSecretPath(path) {
332
+ return isConfiguredProviderRequestSecretPath(path, [
333
+ "tools",
334
+ "media",
335
+ "models",
336
+ "#"
337
+ ]) || isConfiguredProviderRequestSecretPath(path, [
338
+ "tools",
339
+ "media",
340
+ "audio"
341
+ ]) || isConfiguredProviderRequestSecretPath(path, [
342
+ "tools",
343
+ "media",
344
+ "audio",
345
+ "models",
346
+ "#"
347
+ ]) || isConfiguredProviderRequestSecretPath(path, [
348
+ "tools",
349
+ "media",
350
+ "image"
351
+ ]) || isConfiguredProviderRequestSecretPath(path, [
352
+ "tools",
353
+ "media",
354
+ "image",
355
+ "models",
356
+ "#"
357
+ ]) || isConfiguredProviderRequestSecretPath(path, [
358
+ "tools",
359
+ "media",
360
+ "video"
361
+ ]) || isConfiguredProviderRequestSecretPath(path, [
362
+ "tools",
363
+ "media",
364
+ "video",
365
+ "models",
366
+ "#"
367
+ ]);
368
+ }
369
+ function isConfiguredProviderRequestSecretPath(path, prefix) {
370
+ if (path.length < prefix.length + 3) return false;
371
+ if (!matchesConfigPathPrefix(path, prefix)) return false;
372
+ const requestIndex = prefix.length;
373
+ if (path[requestIndex] !== "request") return false;
374
+ const suffix = path.slice(requestIndex + 1);
375
+ if (suffix.length === 2 && suffix[0] === "headers") return true;
376
+ if (suffix.length === 2 && suffix[0] === "auth" && isConfiguredProviderAuthSecretKey(suffix[1])) return true;
377
+ if (suffix.length === 2 && suffix[0] === "tls" && isConfiguredProviderTlsSecretKey(suffix[1])) return true;
378
+ return suffix.length === 3 && suffix[0] === "proxy" && suffix[1] === "tls" && isConfiguredProviderTlsSecretKey(suffix[2]);
379
+ }
380
+ function matchesConfigPathPrefix(path, prefix) {
381
+ if (path.length < prefix.length) return false;
382
+ return prefix.every((segment, index) => {
383
+ const value = path[index];
384
+ if (segment === "*") return value !== void 0 && value !== "";
385
+ if (segment === "#") return value?.startsWith("#") ?? false;
386
+ return value === segment;
387
+ });
388
+ }
389
+ function matchesConfigPath(path, pattern) {
390
+ return path.length === pattern.length && matchesConfigPathPrefix(path, pattern);
391
+ }
392
+ function isConfiguredProviderTlsSecretKey(key) {
393
+ return key === "ca" || key === "cert" || key === "key" || key === "passphrase";
394
+ }
395
+ function isConfiguredProviderAuthSecretKey(key) {
396
+ return key === "token" || key === "value";
397
+ }
398
+ function isSecretInputKey(key) {
399
+ const normalized = key.toLowerCase();
400
+ return normalized === "apikey" || normalized === "keyref" || normalized === "token" || normalized === "tokenref" || normalized === "password" || normalized === "secret" || normalized === "encryptkey" || normalized === "webhooksecret" || normalized === "serviceaccount" || normalized === "serviceaccountref" || normalized === "privatekey" || normalized === "certificate" || normalized === "certificatedata" || normalized === "identitydata" || normalized === "knownhosts" || normalized === "knownhostsdata" || normalized.endsWith("apikey") || normalized.endsWith("token") || normalized.endsWith("secret") || normalized.endsWith("password");
401
+ }
402
+ function secretRefDefaults(value) {
403
+ if (!isRecord$1(value)) return;
404
+ const defaults = {};
405
+ if (typeof value.env === "string") defaults.env = value.env;
406
+ if (typeof value.file === "string") defaults.file = value.file;
407
+ if (typeof value.exec === "string") defaults.exec = value.exec;
408
+ return defaults;
409
+ }
410
+ function secretRefEvidence(value, defaults) {
411
+ const ref = coerceSecretRef(value, defaults);
412
+ return ref === null ? void 0 : {
413
+ source: ref.source,
414
+ provider: ref.provider,
415
+ id: ref.id
416
+ };
417
+ }
418
+ function secretProviderInsecureFlags(value) {
419
+ if (!isRecord$1(value)) return [];
420
+ return [...value.allowInsecurePath === true ? ["allowInsecurePath"] : [], ...value.allowSymlinkCommand === true ? ["allowSymlinkCommand"] : []];
421
+ }
422
+ function isValidAuthProfileMetadata(value) {
423
+ if (!isRecord$1(value)) return false;
424
+ return typeof value.provider === "string" && value.provider.trim() !== "" && isAuthProfileMode(value.mode);
425
+ }
426
+ function isAuthProfileMode(value) {
427
+ return value === "api_key" || value === "aws-sdk" || value === "oauth" || value === "token";
428
+ }
429
+ function scanPolicyTools(raw) {
430
+ return Promise.resolve(scanPolicyToolHeaders(raw));
431
+ }
432
+ function scanPolicyToolHeaders(raw) {
433
+ const section = markdownSectionLines(raw, "tools");
434
+ if (section.length === 0) return [];
435
+ const tools = [];
436
+ for (let index = 0; index < section.length; index += 1) {
437
+ const line = section[index]?.text ?? "";
438
+ const heading = /^###\s+([^\s#]+)(.*)$/.exec(line);
439
+ const bullet = /^[-*+]\s+([^:\s][^:]*?)\s*:(.*)$/.exec(line);
440
+ const match = heading ?? bullet;
441
+ if (match === null || slugify(match[1]).length === 0) continue;
442
+ const id = slugify(match[1]);
443
+ const entry = {
444
+ id,
445
+ source: `oc://TOOLS.md/tools/${id}`,
446
+ line: section[index]?.line ?? index + 1
447
+ };
448
+ const metaLines = [match[2] ?? ""];
449
+ for (let metaIndex = index + 1; metaIndex < section.length; metaIndex += 1) {
450
+ const metaLine = section[metaIndex]?.text ?? "";
451
+ if (/^###\s+\S+/.test(metaLine.trim()) || /^[-*+]\s+[^:\s][^:]*?\s*:/.test(metaLine)) break;
452
+ metaLines.push(metaLine);
453
+ }
454
+ const meta = metaLines.join("\n");
455
+ const risk = riskFromMeta(meta);
456
+ const sensitivity = /\bsensitivity\s*:\s*([a-z0-9_-]+)\b/i.exec(meta)?.[1]?.toLowerCase();
457
+ const owner = /\bowner\s*:\s*([^\s#]+)\b/i.exec(meta)?.[1];
458
+ const capabilities = capabilityTokensFromMetaLines(metaLines);
459
+ if (risk !== void 0) entry.risk = risk;
460
+ if (sensitivity !== void 0) entry.sensitivity = sensitivity;
461
+ if (owner !== void 0) entry.owner = owner;
462
+ if (capabilities.length > 0) entry.capabilities = capabilities;
463
+ tools.push(entry);
464
+ }
465
+ return tools;
466
+ }
467
+ function markdownSectionLines(raw, sectionSlug) {
468
+ const lines = raw.split(/\r?\n/);
469
+ let sectionDepth;
470
+ const section = [];
471
+ for (let index = 0; index < lines.length; index += 1) {
472
+ const line = lines[index] ?? "";
473
+ const heading = /^(#{1,6})\s+(.+?)\s*#*\s*$/.exec(line);
474
+ if (heading !== null) {
475
+ const depth = heading[1]?.length ?? 0;
476
+ const slug = slugify(heading[2] ?? "");
477
+ if (sectionDepth !== void 0 && depth <= sectionDepth) break;
478
+ if (sectionDepth !== void 0) {
479
+ section.push({
480
+ line: index + 1,
481
+ text: line
482
+ });
483
+ continue;
484
+ }
485
+ if (sectionDepth === void 0 && slug === sectionSlug) sectionDepth = depth;
486
+ continue;
487
+ }
488
+ if (sectionDepth !== void 0) section.push({
489
+ line: index + 1,
490
+ text: line
491
+ });
492
+ }
493
+ return section;
494
+ }
495
+ function slugify(text) {
496
+ return text.toLowerCase().replace(/_/g, "-").replace(NON_SLUG_CHARS, "-").replace(COLLAPSE_HYPHENS, "-").replace(TRIM_HYPHENS, "");
497
+ }
498
+ function riskFromMeta(meta) {
499
+ const namedRisk = /\brisk\s*:\s*([a-z0-9_-]+)\b/i.exec(meta)?.[1];
500
+ if (namedRisk !== void 0) return namedRisk.toLowerCase();
501
+ switch (/\bR([0-5])\b/.exec(meta)?.[1]) {
502
+ case "0":
503
+ case "1": return "low";
504
+ case "2":
505
+ case "3": return "medium";
506
+ case "4": return "high";
507
+ case "5": return "critical";
508
+ default: return;
509
+ }
510
+ }
511
+ function capabilityTokensFromMetaLines(lines) {
512
+ return lines.flatMap((line, index) => {
513
+ const trimmed = line.trim();
514
+ if (trimmed.length === 0) return [];
515
+ const tokens = trimmed.match(/\b[A-Z][A-Z0-9_]{2,}\b/g) ?? [];
516
+ if (index === 0 || /\bcapabilities\s*:/i.test(trimmed)) return tokens;
517
+ const withoutTokens = tokens.reduce((remaining, token) => {
518
+ return remaining.replace(token, "");
519
+ }, trimmed);
520
+ return /^[\s,;:[\](){}#*_-]*$/.test(withoutTokens) ? tokens : [];
521
+ });
522
+ }
523
+ function configuredChannels(cfg) {
524
+ return isRecord$1(cfg.channels) ? cfg.channels : {};
525
+ }
526
+ function configuredMcpServers(cfg) {
527
+ return isRecord$1(cfg.mcp) && isRecord$1(cfg.mcp.servers) ? cfg.mcp.servers : {};
528
+ }
529
+ function mcpServerTransport(value) {
530
+ if (!isRecord$1(value)) return "unknown";
531
+ if (typeof value.command === "string") return "stdio";
532
+ if (value.transport === "sse" || value.transport === "streamable-http") return value.transport;
533
+ if (typeof value.url === "string") return "streamable-http";
534
+ return "unknown";
535
+ }
536
+ function redactMcpUrlForEvidence(raw) {
537
+ try {
538
+ const url = new URL(raw);
539
+ return `${url.protocol}//${url.host}`;
540
+ } catch {
541
+ return "[redacted-url]";
542
+ }
543
+ }
544
+ function configuredModelProviders(cfg) {
545
+ return isRecord$1(cfg.models) && isRecord$1(cfg.models.providers) ? cfg.models.providers : {};
546
+ }
547
+ function networkBooleanEvidence(cfg, id, path, source) {
548
+ const value = readBooleanPath(cfg, path);
549
+ return value === void 0 ? void 0 : {
550
+ id,
551
+ source,
552
+ value
553
+ };
554
+ }
555
+ function pushGatewayBooleanEvidence(entries, id, kind, value, source) {
556
+ if (typeof value !== "boolean") return;
557
+ entries.push({
558
+ id,
559
+ kind,
560
+ source,
561
+ value
562
+ });
563
+ }
564
+ function pushGatewayHttpEndpointEvidence(entries, endpoints, endpoint) {
565
+ const config = endpoints[endpoint];
566
+ if (!isRecord$1(config)) return;
567
+ const source = `oc://daocore.config/gateway/http/endpoints/${endpoint}`;
568
+ const enabled = config.enabled === true;
569
+ if (enabled) entries.push({
570
+ id: `gateway-http-${endpoint}`,
571
+ kind: "httpEndpoint",
572
+ source: `${source}/enabled`,
573
+ value: true,
574
+ endpoint
575
+ });
576
+ if (!enabled) return;
577
+ if (endpoint === "chatCompletions") {
578
+ pushGatewayHttpUrlFetchEvidence(entries, source, endpoint, ["images"], config.images);
579
+ return;
580
+ }
581
+ pushGatewayHttpUrlFetchEvidence(entries, source, endpoint, ["files"], config.files);
582
+ pushGatewayHttpUrlFetchEvidence(entries, source, endpoint, ["images"], config.images);
583
+ }
584
+ function pushGatewayHttpUrlFetchEvidence(entries, endpointSource, endpoint, path, value) {
585
+ const allowUrl = isRecord$1(value) ? value.allowUrl : void 0;
586
+ if (allowUrl === false || allowUrl !== true && endpoint !== "responses") return;
587
+ const allowlist = isRecord$1(value) ? value.urlAllowlist : void 0;
588
+ const hasEffectiveAllowlist = Array.isArray(allowlist) && allowlist.some((entry) => isEffectiveGatewayUrlAllowlistEntry(entry));
589
+ entries.push({
590
+ id: `gateway-http-${endpoint}-${path.join("-")}-url-fetch`,
591
+ kind: "httpUrlFetch",
592
+ source: `${endpointSource}/${path.map(ocPathSegment).join("/")}/allowUrl`,
593
+ value: true,
594
+ endpoint,
595
+ explicit: allowUrl === true,
596
+ hasAllowlist: hasEffectiveAllowlist
597
+ });
598
+ }
599
+ function isEffectiveGatewayUrlAllowlistEntry(value) {
600
+ if (typeof value !== "string") return false;
601
+ const normalized = value.trim().toLowerCase();
602
+ return normalized !== "" && normalized !== "*" && normalized !== "*.";
603
+ }
604
+ function isGatewayNonLoopbackBind(value) {
605
+ return value === "auto" || value === "lan" || value === "custom" || value === "tailnet";
606
+ }
607
+ function isRuntimeNonLoopbackCustomBindHost(value) {
608
+ const normalized = value.trim().toLowerCase();
609
+ return isCanonicalDottedDecimalIPv4(normalized) && !normalized.startsWith("127.");
610
+ }
611
+ function isCanonicalDottedDecimalIPv4(value) {
612
+ return /^(?:25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(?:\.(?:25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}$/.test(value);
613
+ }
614
+ function readBooleanPath(value, path) {
615
+ let current = value;
616
+ for (const part of path) {
617
+ if (!isRecord$1(current)) return;
618
+ current = current[part];
619
+ }
620
+ return typeof current === "boolean" ? current : void 0;
621
+ }
622
+ function collectModelRefsFromValue(refs, value, source) {
623
+ if (typeof value === "string") {
624
+ pushModelRef(refs, value, source);
625
+ return;
626
+ }
627
+ if (!isRecord$1(value)) return;
628
+ if (typeof value.primary === "string") pushModelRef(refs, value.primary, `${source}/primary`);
629
+ if (Array.isArray(value.fallbacks)) {
630
+ for (const [index, fallback] of value.fallbacks.entries()) if (typeof fallback === "string") pushModelRef(refs, fallback, `${source}/fallbacks/#${index}`);
631
+ }
632
+ }
633
+ function collectModelRefsFromRecord(refs, value, source) {
634
+ for (const [key, child] of Object.entries(value)) {
635
+ const childPath = `${source}/${key}`;
636
+ if (isModelSettingKey(key)) {
637
+ collectModelRefsFromValue(refs, child, childPath);
638
+ continue;
639
+ }
640
+ if (Array.isArray(child)) {
641
+ for (const [index, item] of child.entries()) if (isRecord$1(item)) collectModelRefsFromRecord(refs, item, `${childPath}/#${index}`);
642
+ continue;
643
+ }
644
+ if (isRecord$1(child)) collectModelRefsFromRecord(refs, child, childPath);
645
+ }
646
+ }
647
+ function collectModelRefsFromAgentAllowlist(refs, agents) {
648
+ const defaults = agents.defaults;
649
+ if (isRecord$1(defaults) && isRecord$1(defaults.models)) collectModelRefsFromModelMap(refs, defaults.models, "oc://daocore.config/agents/defaults/models");
650
+ const list = agents.list;
651
+ if (!Array.isArray(list)) return;
652
+ for (const [index, agent] of list.entries()) {
653
+ if (!isRecord$1(agent) || !isRecord$1(agent.models)) continue;
654
+ collectModelRefsFromModelMap(refs, agent.models, `oc://daocore.config/agents/list/#${index}/models`);
655
+ }
656
+ }
657
+ function collectModelRefsFromModelMap(refs, models, source) {
658
+ for (const ref of Object.keys(models)) pushModelRef(refs, ref, `${source}/${ocPathSegment(ref)}`);
659
+ }
660
+ function isModelSettingKey(key) {
661
+ return key === "model" || key.endsWith("Model");
662
+ }
663
+ function ocPathSegment(value) {
664
+ if (/^(?:[A-Za-z0-9_-]+|#\d+)$/.test(value)) return value;
665
+ if (value.includes("\"") || value.includes("\\")) return value;
666
+ return `"${value}"`;
667
+ }
668
+ function pushModelRef(refs, ref, source) {
669
+ const parsed = parseModelRef(ref);
670
+ if (parsed === void 0) return;
671
+ refs.push({
672
+ ref,
673
+ provider: parsed.provider,
674
+ model: parsed.model,
675
+ source
676
+ });
677
+ }
678
+ function parseModelRef(ref) {
679
+ const trimmed = ref.trim();
680
+ const slash = trimmed.indexOf("/");
681
+ if (slash <= 0 || slash >= trimmed.length - 1) return;
682
+ return {
683
+ provider: normalizeProviderId(trimmed.slice(0, slash)),
684
+ model: trimmed.slice(slash + 1)
685
+ };
686
+ }
687
+ function sha256(value) {
688
+ return `sha256:${createHash("sha256").update(value).digest("hex")}`;
689
+ }
690
+ function stableJson(value) {
691
+ if (Array.isArray(value)) return `[${value.map(stableJson).join(",")}]`;
692
+ if (isRecord$1(value)) return `{${Object.entries(value).toSorted(([a], [b]) => a.localeCompare(b)).map(([key, child]) => `${JSON.stringify(key)}:${stableJson(child)}`).join(",")}}`;
693
+ return JSON.stringify(value);
694
+ }
695
+ function isRecord$1(value) {
696
+ return typeof value === "object" && value !== null && !Array.isArray(value);
697
+ }
698
+ //#endregion
699
+ //#region extensions/policy/src/doctor/register.ts
700
+ const CHECK_IDS = {
701
+ policyAttestationMismatch: "policy/attestation-hash-mismatch",
702
+ policyDeniedChannelProvider: "policy/channels-denied-provider",
703
+ policyHashMismatch: "policy/policy-hash-mismatch",
704
+ policyInvalidFile: "policy/policy-jsonc-invalid",
705
+ policyMissingFile: "policy/policy-jsonc-missing",
706
+ policyDeniedMcpServer: "policy/mcp-denied-server",
707
+ policyUnapprovedMcpServer: "policy/mcp-unapproved-server",
708
+ policyDeniedModelProvider: "policy/models-denied-provider",
709
+ policyUnapprovedModelProvider: "policy/models-unapproved-provider",
710
+ policyPrivateNetworkAccess: "policy/network-private-access-enabled",
711
+ policyGatewayNonLoopbackBind: "policy/gateway-non-loopback-bind",
712
+ policyGatewayAuthDisabled: "policy/gateway-auth-disabled",
713
+ policyGatewayRateLimitMissing: "policy/gateway-rate-limit-missing",
714
+ policyGatewayControlUiInsecure: "policy/gateway-control-ui-insecure",
715
+ policyGatewayTailscaleFunnel: "policy/gateway-tailscale-funnel",
716
+ policyGatewayRemoteEnabled: "policy/gateway-remote-enabled",
717
+ policyGatewayHttpEndpointEnabled: "policy/gateway-http-endpoint-enabled",
718
+ policyGatewayHttpUrlFetchUnrestricted: "policy/gateway-http-url-fetch-unrestricted",
719
+ policySecretsUnmanagedProvider: "policy/secrets-unmanaged-provider",
720
+ policySecretsDeniedProviderSource: "policy/secrets-denied-provider-source",
721
+ policySecretsInsecureProvider: "policy/secrets-insecure-provider",
722
+ policyAuthProfileInvalidMetadata: "policy/auth-profile-invalid-metadata",
723
+ policyAuthProfileUnapprovedMode: "policy/auth-profile-unapproved-mode",
724
+ policyMissingToolOwner: "policy/tools-missing-owner",
725
+ policyMissingToolRisk: "policy/tools-missing-risk-level",
726
+ policyMissingToolSensitivity: "policy/tools-missing-sensitivity-token",
727
+ policyUnknownToolRisk: "policy/tools-unknown-risk-level",
728
+ policyUnknownToolSensitivity: "policy/tools-unknown-sensitivity-token"
729
+ };
730
+ const POLICY_CHECK_IDS = [
731
+ CHECK_IDS.policyMissingFile,
732
+ CHECK_IDS.policyInvalidFile,
733
+ CHECK_IDS.policyHashMismatch,
734
+ CHECK_IDS.policyAttestationMismatch,
735
+ CHECK_IDS.policyDeniedChannelProvider,
736
+ CHECK_IDS.policyDeniedMcpServer,
737
+ CHECK_IDS.policyUnapprovedMcpServer,
738
+ CHECK_IDS.policyDeniedModelProvider,
739
+ CHECK_IDS.policyUnapprovedModelProvider,
740
+ CHECK_IDS.policyPrivateNetworkAccess,
741
+ CHECK_IDS.policyGatewayNonLoopbackBind,
742
+ CHECK_IDS.policyGatewayAuthDisabled,
743
+ CHECK_IDS.policyGatewayRateLimitMissing,
744
+ CHECK_IDS.policyGatewayControlUiInsecure,
745
+ CHECK_IDS.policyGatewayTailscaleFunnel,
746
+ CHECK_IDS.policyGatewayRemoteEnabled,
747
+ CHECK_IDS.policyGatewayHttpEndpointEnabled,
748
+ CHECK_IDS.policyGatewayHttpUrlFetchUnrestricted,
749
+ CHECK_IDS.policySecretsUnmanagedProvider,
750
+ CHECK_IDS.policySecretsDeniedProviderSource,
751
+ CHECK_IDS.policySecretsInsecureProvider,
752
+ CHECK_IDS.policyAuthProfileInvalidMetadata,
753
+ CHECK_IDS.policyAuthProfileUnapprovedMode,
754
+ CHECK_IDS.policyMissingToolRisk,
755
+ CHECK_IDS.policyUnknownToolRisk,
756
+ CHECK_IDS.policyMissingToolSensitivity,
757
+ CHECK_IDS.policyMissingToolOwner,
758
+ CHECK_IDS.policyUnknownToolSensitivity
759
+ ];
760
+ const KNOWN_RISK_LEVELS = [
761
+ "low",
762
+ "medium",
763
+ "high",
764
+ "critical"
765
+ ];
766
+ const KNOWN_SENSITIVITY_LEVELS = [
767
+ "public",
768
+ "internal",
769
+ "confidential",
770
+ "restricted"
771
+ ];
772
+ const SUPPORTED_TOOL_METADATA = [
773
+ "risk",
774
+ "sensitivity",
775
+ "owner"
776
+ ];
777
+ const SUPPORTED_AUTH_PROFILE_METADATA = ["provider", "mode"];
778
+ const SUPPORTED_AUTH_PROFILE_MODES = [
779
+ "api_key",
780
+ "aws-sdk",
781
+ "oauth",
782
+ "token"
783
+ ];
784
+ const SUPPORTED_GATEWAY_HTTP_ENDPOINTS = ["chatCompletions", "responses"];
785
+ let registered = false;
786
+ const policyEvaluationCache = /* @__PURE__ */ new WeakMap();
787
+ function registerPolicyDoctorChecks(host) {
788
+ if (registered) return;
789
+ const registerHealthCheck$1 = host?.registerHealthCheck ?? registerHealthCheck;
790
+ registerHealthCheck$1(policyMissingFileCheck);
791
+ registerHealthCheck$1(policyInvalidFileCheck);
792
+ registerHealthCheck$1(policyHashMismatchCheck);
793
+ registerHealthCheck$1(policyAttestationMismatchCheck);
794
+ registerHealthCheck$1(policyChannelsDeniedProviderCheck);
795
+ registerHealthCheck$1(policyMcpDeniedServerCheck);
796
+ registerHealthCheck$1(policyMcpUnapprovedServerCheck);
797
+ registerHealthCheck$1(policyModelsDeniedProviderCheck);
798
+ registerHealthCheck$1(policyModelsUnapprovedProviderCheck);
799
+ registerHealthCheck$1(policyNetworkPrivateAccessCheck);
800
+ registerHealthCheck$1(policyGatewayNonLoopbackBindCheck);
801
+ registerHealthCheck$1(policyGatewayAuthDisabledCheck);
802
+ registerHealthCheck$1(policyGatewayRateLimitMissingCheck);
803
+ registerHealthCheck$1(policyGatewayControlUiInsecureCheck);
804
+ registerHealthCheck$1(policyGatewayTailscaleFunnelCheck);
805
+ registerHealthCheck$1(policyGatewayRemoteEnabledCheck);
806
+ registerHealthCheck$1(policyGatewayHttpEndpointEnabledCheck);
807
+ registerHealthCheck$1(policyGatewayHttpUrlFetchUnrestrictedCheck);
808
+ registerHealthCheck$1(policySecretsUnmanagedProviderCheck);
809
+ registerHealthCheck$1(policySecretsDeniedProviderSourceCheck);
810
+ registerHealthCheck$1(policySecretsInsecureProviderCheck);
811
+ registerHealthCheck$1(policyAuthProfileInvalidMetadataCheck);
812
+ registerHealthCheck$1(policyAuthProfileUnapprovedModeCheck);
813
+ registerHealthCheck$1(policyToolsMissingRiskCheck);
814
+ registerHealthCheck$1(policyToolsUnknownRiskCheck);
815
+ registerHealthCheck$1(policyToolsMissingSensitivityCheck);
816
+ registerHealthCheck$1(policyToolsMissingOwnerCheck);
817
+ registerHealthCheck$1(policyToolsUnknownSensitivityCheck);
818
+ registered = true;
819
+ }
820
+ function evaluatePolicy(ctx) {
821
+ const cached = policyEvaluationCache.get(ctx);
822
+ if (cached !== void 0) return cached;
823
+ const next = evaluatePolicyUncached(ctx);
824
+ policyEvaluationCache.set(ctx, next);
825
+ return next;
826
+ }
827
+ const policyMissingFileCheck = {
828
+ id: CHECK_IDS.policyMissingFile,
829
+ kind: "plugin",
830
+ description: "The enabled Policy plugin has a policy file to verify.",
831
+ source: "policy",
832
+ async detect(ctx) {
833
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyMissingFile);
834
+ }
835
+ };
836
+ const policyHashMismatchCheck = {
837
+ id: CHECK_IDS.policyHashMismatch,
838
+ kind: "plugin",
839
+ description: "The policy file matches the configured expected hash.",
840
+ source: "policy",
841
+ async detect(ctx) {
842
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyHashMismatch);
843
+ }
844
+ };
845
+ const policyAttestationMismatchCheck = {
846
+ id: CHECK_IDS.policyAttestationMismatch,
847
+ kind: "plugin",
848
+ description: "The current policy check matches the accepted attestation.",
849
+ source: "policy",
850
+ async detect(ctx) {
851
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyAttestationMismatch);
852
+ }
853
+ };
854
+ const policyInvalidFileCheck = {
855
+ id: CHECK_IDS.policyInvalidFile,
856
+ kind: "plugin",
857
+ description: "The enabled policy file parses before policy checks run.",
858
+ source: "policy",
859
+ async detect(ctx) {
860
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyInvalidFile);
861
+ }
862
+ };
863
+ const policyChannelsDeniedProviderCheck = {
864
+ id: CHECK_IDS.policyDeniedChannelProvider,
865
+ kind: "plugin",
866
+ description: "Configured channels satisfy policy deny rules.",
867
+ source: "policy",
868
+ async detect(ctx) {
869
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyDeniedChannelProvider);
870
+ },
871
+ async repair(ctx, findings) {
872
+ if (!workspaceRepairsEnabled(ctx)) return workspaceRepairsDisabledResult("channel config");
873
+ const channelIds = channelIdsFromFindings(findings);
874
+ if (channelIds.length === 0) return {
875
+ status: "skipped",
876
+ reason: "no channel findings matched a configurable channel",
877
+ changes: []
878
+ };
879
+ const next = disableChannels(ctx.cfg, channelIds);
880
+ if (next.changed.length === 0) return {
881
+ status: "skipped",
882
+ reason: "matching channels were already disabled or missing",
883
+ changes: []
884
+ };
885
+ return {
886
+ config: next.config,
887
+ changes: next.changed.map((id) => `Disabled channels.${id}.enabled for policy conformance.`)
888
+ };
889
+ }
890
+ };
891
+ const policyMcpDeniedServerCheck = {
892
+ id: CHECK_IDS.policyDeniedMcpServer,
893
+ kind: "plugin",
894
+ description: "Configured MCP servers do not match policy deny rules.",
895
+ source: "policy",
896
+ async detect(ctx) {
897
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyDeniedMcpServer);
898
+ }
899
+ };
900
+ const policyMcpUnapprovedServerCheck = {
901
+ id: CHECK_IDS.policyUnapprovedMcpServer,
902
+ kind: "plugin",
903
+ description: "Configured MCP servers do not match policy allow rules.",
904
+ source: "policy",
905
+ async detect(ctx) {
906
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyUnapprovedMcpServer);
907
+ }
908
+ };
909
+ const policyModelsDeniedProviderCheck = {
910
+ id: CHECK_IDS.policyDeniedModelProvider,
911
+ kind: "plugin",
912
+ description: "Configured model providers do not match policy deny rules.",
913
+ source: "policy",
914
+ async detect(ctx) {
915
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyDeniedModelProvider);
916
+ }
917
+ };
918
+ const policyModelsUnapprovedProviderCheck = {
919
+ id: CHECK_IDS.policyUnapprovedModelProvider,
920
+ kind: "plugin",
921
+ description: "Configured model providers do not match policy allow rules.",
922
+ source: "policy",
923
+ async detect(ctx) {
924
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyUnapprovedModelProvider);
925
+ }
926
+ };
927
+ const policyNetworkPrivateAccessCheck = {
928
+ id: CHECK_IDS.policyPrivateNetworkAccess,
929
+ kind: "plugin",
930
+ description: "Network SSRF policy settings match private-network requirements.",
931
+ source: "policy",
932
+ async detect(ctx) {
933
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyPrivateNetworkAccess);
934
+ }
935
+ };
936
+ const policyGatewayNonLoopbackBindCheck = {
937
+ id: CHECK_IDS.policyGatewayNonLoopbackBind,
938
+ kind: "plugin",
939
+ description: "Gateway bind posture matches policy exposure requirements.",
940
+ source: "policy",
941
+ async detect(ctx) {
942
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayNonLoopbackBind);
943
+ }
944
+ };
945
+ const policyGatewayAuthDisabledCheck = {
946
+ id: CHECK_IDS.policyGatewayAuthDisabled,
947
+ kind: "plugin",
948
+ description: "Gateway authentication remains enabled when required by policy.",
949
+ source: "policy",
950
+ async detect(ctx) {
951
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayAuthDisabled);
952
+ }
953
+ };
954
+ const policyGatewayRateLimitMissingCheck = {
955
+ id: CHECK_IDS.policyGatewayRateLimitMissing,
956
+ kind: "plugin",
957
+ description: "Gateway authentication rate-limit posture is explicit when required by policy.",
958
+ source: "policy",
959
+ async detect(ctx) {
960
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayRateLimitMissing);
961
+ }
962
+ };
963
+ const policyGatewayControlUiInsecureCheck = {
964
+ id: CHECK_IDS.policyGatewayControlUiInsecure,
965
+ kind: "plugin",
966
+ description: "Gateway Control UI insecure exposure toggles remain disabled by policy.",
967
+ source: "policy",
968
+ async detect(ctx) {
969
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayControlUiInsecure);
970
+ }
971
+ };
972
+ const policyGatewayTailscaleFunnelCheck = {
973
+ id: CHECK_IDS.policyGatewayTailscaleFunnel,
974
+ kind: "plugin",
975
+ description: "Gateway Tailscale Funnel exposure matches policy.",
976
+ source: "policy",
977
+ async detect(ctx) {
978
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayTailscaleFunnel);
979
+ }
980
+ };
981
+ const policyGatewayRemoteEnabledCheck = {
982
+ id: CHECK_IDS.policyGatewayRemoteEnabled,
983
+ kind: "plugin",
984
+ description: "Remote gateway mode matches policy.",
985
+ source: "policy",
986
+ async detect(ctx) {
987
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayRemoteEnabled);
988
+ }
989
+ };
990
+ const policyGatewayHttpEndpointEnabledCheck = {
991
+ id: CHECK_IDS.policyGatewayHttpEndpointEnabled,
992
+ kind: "plugin",
993
+ description: "Gateway HTTP API endpoints match policy.",
994
+ source: "policy",
995
+ async detect(ctx) {
996
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayHttpEndpointEnabled);
997
+ }
998
+ };
999
+ const policyGatewayHttpUrlFetchUnrestrictedCheck = {
1000
+ id: CHECK_IDS.policyGatewayHttpUrlFetchUnrestricted,
1001
+ kind: "plugin",
1002
+ description: "Gateway HTTP URL-fetch inputs have allowlists when required by policy.",
1003
+ source: "policy",
1004
+ async detect(ctx) {
1005
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayHttpUrlFetchUnrestricted);
1006
+ }
1007
+ };
1008
+ const policySecretsUnmanagedProviderCheck = {
1009
+ id: CHECK_IDS.policySecretsUnmanagedProvider,
1010
+ kind: "plugin",
1011
+ description: "DaoCore config SecretRefs use configured secret providers when policy requires managed providers.",
1012
+ source: "policy",
1013
+ async detect(ctx) {
1014
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policySecretsUnmanagedProvider);
1015
+ }
1016
+ };
1017
+ const policySecretsDeniedProviderSourceCheck = {
1018
+ id: CHECK_IDS.policySecretsDeniedProviderSource,
1019
+ kind: "plugin",
1020
+ description: "DaoCore config secret providers and SecretRefs do not use sources denied by policy.",
1021
+ source: "policy",
1022
+ async detect(ctx) {
1023
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policySecretsDeniedProviderSource);
1024
+ }
1025
+ };
1026
+ const policySecretsInsecureProviderCheck = {
1027
+ id: CHECK_IDS.policySecretsInsecureProvider,
1028
+ kind: "plugin",
1029
+ description: "Configured secret providers do not opt into insecure posture unless policy allows it.",
1030
+ source: "policy",
1031
+ async detect(ctx) {
1032
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policySecretsInsecureProvider);
1033
+ }
1034
+ };
1035
+ const policyAuthProfileInvalidMetadataCheck = {
1036
+ id: CHECK_IDS.policyAuthProfileInvalidMetadata,
1037
+ kind: "plugin",
1038
+ description: "DaoCore config auth profiles declare required provider and mode metadata.",
1039
+ source: "policy",
1040
+ async detect(ctx) {
1041
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyAuthProfileInvalidMetadata);
1042
+ }
1043
+ };
1044
+ const policyAuthProfileUnapprovedModeCheck = {
1045
+ id: CHECK_IDS.policyAuthProfileUnapprovedMode,
1046
+ kind: "plugin",
1047
+ description: "DaoCore config auth profile modes stay within the policy allowlist.",
1048
+ source: "policy",
1049
+ async detect(ctx) {
1050
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyAuthProfileUnapprovedMode);
1051
+ }
1052
+ };
1053
+ const policyToolsMissingRiskCheck = {
1054
+ id: CHECK_IDS.policyMissingToolRisk,
1055
+ kind: "plugin",
1056
+ description: "TOOLS.md policy entries declare explicit risk levels.",
1057
+ source: "policy",
1058
+ async detect(ctx) {
1059
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyMissingToolRisk);
1060
+ }
1061
+ };
1062
+ const policyToolsUnknownRiskCheck = {
1063
+ id: CHECK_IDS.policyUnknownToolRisk,
1064
+ kind: "plugin",
1065
+ description: "TOOLS.md policy entries use known risk levels.",
1066
+ source: "policy",
1067
+ async detect(ctx) {
1068
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyUnknownToolRisk);
1069
+ }
1070
+ };
1071
+ const policyToolsMissingSensitivityCheck = {
1072
+ id: CHECK_IDS.policyMissingToolSensitivity,
1073
+ kind: "plugin",
1074
+ description: "TOOLS.md policy entries declare default artifact sensitivity.",
1075
+ source: "policy",
1076
+ async detect(ctx) {
1077
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyMissingToolSensitivity);
1078
+ }
1079
+ };
1080
+ const policyToolsUnknownSensitivityCheck = {
1081
+ id: CHECK_IDS.policyUnknownToolSensitivity,
1082
+ kind: "plugin",
1083
+ description: "TOOLS.md policy entries use known sensitivity levels.",
1084
+ source: "policy",
1085
+ async detect(ctx) {
1086
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyUnknownToolSensitivity);
1087
+ }
1088
+ };
1089
+ const policyToolsMissingOwnerCheck = {
1090
+ id: CHECK_IDS.policyMissingToolOwner,
1091
+ kind: "plugin",
1092
+ description: "TOOLS.md policy entries declare an accountable owner.",
1093
+ source: "policy",
1094
+ async detect(ctx) {
1095
+ return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyMissingToolOwner);
1096
+ }
1097
+ };
1098
+ async function evaluatePolicyUncached(ctx) {
1099
+ const settings = policySettings(ctx);
1100
+ const policyPath = policyDisplayName(ctx);
1101
+ let evidence = collectPolicyEvidence(ctx.cfg, {
1102
+ includeGatewayExposure: false,
1103
+ includeSecrets: false,
1104
+ includeAuthProfiles: false
1105
+ });
1106
+ const findings = [];
1107
+ if (!policyChecksEnabled(ctx, settings)) return {
1108
+ policyPath,
1109
+ evidence,
1110
+ expectedAttestationHash: settings.expectedAttestationHash,
1111
+ findings,
1112
+ attestedFindings: findings
1113
+ };
1114
+ const policyFile = await readPolicyFile(ctx);
1115
+ if (policyFile === null) {
1116
+ findings.push({
1117
+ checkId: CHECK_IDS.policyMissingFile,
1118
+ severity: "warning",
1119
+ message: `${policyPath} is missing for the enabled Policy plugin.`,
1120
+ source: "policy",
1121
+ path: policyPath,
1122
+ fixHint: `Restore ${policyPath} or add the policy artifact for this workspace.`
1123
+ });
1124
+ return {
1125
+ policyPath,
1126
+ evidence,
1127
+ expectedAttestationHash: settings.expectedAttestationHash,
1128
+ findings,
1129
+ attestedFindings: findings
1130
+ };
1131
+ }
1132
+ const parsedPolicy = parsePolicyFile(policyFile.raw);
1133
+ if (!parsedPolicy.ok) {
1134
+ findings.push(policyParseFinding(policyFile.displayName, policyFile.ocDocName, parsedPolicy));
1135
+ return {
1136
+ policyPath,
1137
+ evidence,
1138
+ expectedAttestationHash: settings.expectedAttestationHash,
1139
+ findings,
1140
+ attestedFindings: findings
1141
+ };
1142
+ }
1143
+ const policy = parsedPolicy.value;
1144
+ const policyHash = policyDocumentHash(policy);
1145
+ const expectedHash = settings.expectedHash;
1146
+ if (typeof expectedHash === "string" && expectedHash.trim() !== "" && policyHash !== expectedHash.trim()) {
1147
+ findings.push({
1148
+ checkId: CHECK_IDS.policyHashMismatch,
1149
+ severity: "error",
1150
+ message: `${policyFile.displayName} does not match the configured policy hash.`,
1151
+ source: "policy",
1152
+ path: policyFile.displayName,
1153
+ target: `oc://${policyFile.ocDocName}`,
1154
+ requirement: "oc://daocore.config/plugins/entries/policy/config/expectedHash",
1155
+ fixHint: `Restore the approved policy artifact or update plugins.entries.policy.config.expectedHash after review.`
1156
+ });
1157
+ return {
1158
+ policyPath,
1159
+ policy: {
1160
+ value: policy,
1161
+ hash: policyHash
1162
+ },
1163
+ evidence,
1164
+ expectedAttestationHash: settings.expectedAttestationHash,
1165
+ findings,
1166
+ attestedFindings: findings
1167
+ };
1168
+ }
1169
+ const metadataRequirementFindings = toolMetadataRequirementFindings(policy, policyFile.displayName, policyFile.ocDocName);
1170
+ const authMetadataRequirementFindings = authProfileMetadataRequirementFindings(policy, policyFile.displayName, policyFile.ocDocName);
1171
+ const requiredMetadata = metadataRequirementFindings.length === 0 ? requiredToolMetadata(policy) : /* @__PURE__ */ new Set();
1172
+ const includeSecrets = policyHasSecretRules(policy);
1173
+ const includeAuthProfiles = policyHasAuthProfileRules(policy);
1174
+ const includeGatewayExposure = policyHasGatewayRules(policy);
1175
+ if (requiredMetadata.size > 0) {
1176
+ const toolsFile = await readWorkspaceFile(ctx, "TOOLS.md");
1177
+ evidence = await collectPolicyEvidence(ctx.cfg, {
1178
+ toolsRaw: toolsFile?.raw ?? "",
1179
+ includeGatewayExposure,
1180
+ includeSecrets,
1181
+ includeAuthProfiles
1182
+ });
1183
+ } else evidence = collectPolicyEvidence(ctx.cfg, {
1184
+ includeGatewayExposure,
1185
+ includeSecrets,
1186
+ includeAuthProfiles
1187
+ });
1188
+ const policyFindings = [
1189
+ ...policyContainerShapeFindings(policy, policyFile.displayName, policyFile.ocDocName),
1190
+ ...channelFindings(policy, policyFile.displayName, policyFile.ocDocName, evidence),
1191
+ ...mcpServerFindings(policy, policyFile.ocDocName, evidence),
1192
+ ...modelProviderFindings(policy, policyFile.ocDocName, evidence),
1193
+ ...networkFindings(policy, policyFile.ocDocName, evidence),
1194
+ ...secretAuthProvenanceFindings(policy, policyFile.displayName, policyFile.ocDocName, evidence),
1195
+ ...gatewayExposureFindings(policy, policyFile.ocDocName, evidence),
1196
+ ...authMetadataRequirementFindings,
1197
+ ...metadataRequirementFindings
1198
+ ];
1199
+ if (requiredMetadata.has("risk")) {
1200
+ policyFindings.push(...toolRiskFindings(policyFile.ocDocName, evidence));
1201
+ policyFindings.push(...toolUnknownRiskFindings(policyFile.ocDocName, evidence));
1202
+ }
1203
+ if (requiredMetadata.has("sensitivity")) policyFindings.push(...toolSensitivityFindings(policyFile.ocDocName, evidence));
1204
+ if (requiredMetadata.has("owner")) policyFindings.push(...toolOwnerFindings(policyFile.ocDocName, evidence));
1205
+ const attestationFindings = policyAttestationFindings(policyFile.displayName, policyHash, evidence, policyFindings, settings);
1206
+ if (hasPolicyValidationFinding(policyFindings)) findings.push(...policyFindings);
1207
+ else if (attestationFindings.length > 0) findings.push(...attestationFindings);
1208
+ else findings.push(...policyFindings);
1209
+ return {
1210
+ policyPath,
1211
+ policy: {
1212
+ value: policy,
1213
+ hash: policyHash
1214
+ },
1215
+ evidence,
1216
+ expectedAttestationHash: settings.expectedAttestationHash,
1217
+ findings,
1218
+ attestedFindings: policyFindings
1219
+ };
1220
+ }
1221
+ function policyParseFinding(policyPath, policyDocName, parseError) {
1222
+ return {
1223
+ checkId: CHECK_IDS.policyInvalidFile,
1224
+ severity: "error",
1225
+ message: `${policyPath} could not be parsed: ${parseError.message}`,
1226
+ source: "policy",
1227
+ path: policyPath,
1228
+ target: `oc://${policyDocName}`,
1229
+ fixHint: `Fix ${policyPath} so policy conformance checks can run.`
1230
+ };
1231
+ }
1232
+ function findingsForCheck(evaluation, checkId) {
1233
+ return evaluation.findings.filter((finding) => finding.checkId === checkId);
1234
+ }
1235
+ function hasPolicyValidationFinding(findings) {
1236
+ return findings.some((finding) => finding.checkId === CHECK_IDS.policyInvalidFile);
1237
+ }
1238
+ function channelFindings(policy, policyPath, policyDocName, evidence) {
1239
+ const invalidRules = invalidChannelDenyRuleFindings(policy, policyPath, policyDocName);
1240
+ if (invalidRules.length > 0) return invalidRules;
1241
+ const denyRules = readChannelDenyRules(policy, policyDocName);
1242
+ if (denyRules.length === 0) return [];
1243
+ return evidence.channels.flatMap((channel) => {
1244
+ if (channel.enabled === false) return [];
1245
+ const rule = denyRules.find((candidate) => candidate.when?.provider === channel.provider);
1246
+ if (rule === void 0) return [];
1247
+ return [{
1248
+ checkId: CHECK_IDS.policyDeniedChannelProvider,
1249
+ severity: "error",
1250
+ message: `Channel '${channel.id}' uses denied provider '${channel.provider}'.`,
1251
+ source: "policy",
1252
+ path: "daocore config",
1253
+ ocPath: channel.source,
1254
+ target: channel.source,
1255
+ requirement: rule.requirement,
1256
+ fixHint: rule.reason ?? "Disable this channel, remove it from config, or update the policy deny rule."
1257
+ }];
1258
+ });
1259
+ }
1260
+ function policyAttestationFindings(policyPath, policyHash, evidence, findings, settings) {
1261
+ const expected = settings.expectedAttestationHash?.trim();
1262
+ if (!expected) return [];
1263
+ const current = createPolicyAttestation({
1264
+ ok: findings.length === 0,
1265
+ checkedAt: (/* @__PURE__ */ new Date(0)).toISOString(),
1266
+ policyPath,
1267
+ policyHash,
1268
+ evidence,
1269
+ findings: findings.map(toAttestedFinding)
1270
+ });
1271
+ if (current.attestationHash === expected) return [];
1272
+ return [{
1273
+ checkId: CHECK_IDS.policyAttestationMismatch,
1274
+ severity: "error",
1275
+ message: "The current policy check no longer matches the accepted policy attestation.",
1276
+ source: "policy",
1277
+ path: "policy attestation",
1278
+ target: "oc://policy/attestation/current",
1279
+ requirement: "oc://daocore.config/plugins/entries/policy/config/expectedAttestationHash",
1280
+ fixHint: `Run policy check, review attestation ${current.attestationHash}, then update plugins.entries.policy.config.expectedAttestationHash and the supervisor/gateway accepted attestation.`
1281
+ }];
1282
+ }
1283
+ function toAttestedFinding(finding) {
1284
+ return {
1285
+ checkId: finding.checkId,
1286
+ severity: finding.severity,
1287
+ message: finding.message,
1288
+ ...finding.source !== void 0 ? { source: finding.source } : {},
1289
+ ...finding.path !== void 0 ? { path: finding.path } : {},
1290
+ ...finding.line !== void 0 ? { line: finding.line } : {},
1291
+ ...finding.column !== void 0 ? { column: finding.column } : {},
1292
+ ...finding.ocPath !== void 0 ? { ocPath: finding.ocPath } : {},
1293
+ ...finding.target !== void 0 ? { target: finding.target } : {},
1294
+ ...finding.requirement !== void 0 ? { requirement: finding.requirement } : {},
1295
+ ...finding.fixHint !== void 0 ? { fixHint: finding.fixHint } : {}
1296
+ };
1297
+ }
1298
+ function toolMetadataRequirementFindings(policy, policyPath, policyDocName) {
1299
+ if (!isRecord(policy) || !isRecord(policy.tools) || policy.tools.requireMetadata === void 0) return [];
1300
+ if (!Array.isArray(policy.tools.requireMetadata)) return [{
1301
+ checkId: CHECK_IDS.policyInvalidFile,
1302
+ severity: "error",
1303
+ message: `${policyPath} tools.requireMetadata must be an array of metadata keys.`,
1304
+ source: "policy",
1305
+ path: policyPath,
1306
+ target: `oc://${policyDocName}/tools/requireMetadata`,
1307
+ fixHint: `Use supported metadata keys: ${SUPPORTED_TOOL_METADATA.join(", ")}.`
1308
+ }];
1309
+ const invalidIndex = policy.tools.requireMetadata.findIndex((entry) => typeof entry !== "string" || !SUPPORTED_TOOL_METADATA.includes(entry.trim().toLowerCase()));
1310
+ if (invalidIndex < 0) return [];
1311
+ return [{
1312
+ checkId: CHECK_IDS.policyInvalidFile,
1313
+ severity: "error",
1314
+ message: `${policyPath} tools.requireMetadata[${invalidIndex}] must be a supported metadata key.`,
1315
+ source: "policy",
1316
+ path: policyPath,
1317
+ target: `oc://${policyDocName}/tools/requireMetadata/#${invalidIndex}`,
1318
+ fixHint: `Use supported metadata keys: ${SUPPORTED_TOOL_METADATA.join(", ")}.`
1319
+ }];
1320
+ }
1321
+ function policyContainerShapeFindings(policy, policyPath, policyDocName) {
1322
+ if (!isRecord(policy)) return [policyShapeFinding(policyPath, `oc://${policyDocName}`, `${policyPath} must contain a policy object.`, `Fix ${policyPath} so the top-level policy is an object.`)];
1323
+ if (policy.tools !== void 0 && !isRecord(policy.tools)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/tools`, `${policyPath} tools must be an object.`, `Fix ${policyPath} so tools is an object.`)];
1324
+ if (isRecord(policy.tools)) {
1325
+ if (policy.tools.settings !== void 0 && !isRecord(policy.tools.settings)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/tools/settings`, `${policyPath} tools.settings must be an object.`, `Fix ${policyPath} so tools.settings is an object.`)];
1326
+ if (policy.tools.entries !== void 0 && !Array.isArray(policy.tools.entries)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/tools/entries`, `${policyPath} tools.entries must be an array.`, `Fix ${policyPath} so tools.entries is an array.`)];
1327
+ }
1328
+ if (policy.channels !== void 0 && !isRecord(policy.channels)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/channels`, `${policyPath} channels must be an object.`, `Fix ${policyPath} so channels is an object.`)];
1329
+ if (policy.mcp !== void 0 && !isRecord(policy.mcp)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/mcp`, `${policyPath} mcp must be an object.`, `Fix ${policyPath} so mcp is an object.`)];
1330
+ if (isRecord(policy.mcp)) {
1331
+ const finding = policyStringArrayShapeFinding(policy.mcp.servers, {
1332
+ property: "mcp.servers",
1333
+ policyDocName,
1334
+ policyPath,
1335
+ target: "mcp/servers",
1336
+ valueName: "MCP server id"
1337
+ });
1338
+ if (finding !== void 0) return [finding];
1339
+ }
1340
+ if (policy.models !== void 0 && !isRecord(policy.models)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/models`, `${policyPath} models must be an object.`, `Fix ${policyPath} so models is an object.`)];
1341
+ if (isRecord(policy.models)) {
1342
+ const finding = policyStringArrayShapeFinding(policy.models.providers, {
1343
+ property: "models.providers",
1344
+ policyDocName,
1345
+ policyPath,
1346
+ target: "models/providers",
1347
+ valueName: "model provider id"
1348
+ });
1349
+ if (finding !== void 0) return [finding];
1350
+ }
1351
+ if (policy.network !== void 0 && !isRecord(policy.network)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/network`, `${policyPath} network must be an object.`, `Fix ${policyPath} so network is an object.`)];
1352
+ if (isRecord(policy.network)) {
1353
+ if (policy.network.privateNetwork !== void 0 && !isRecord(policy.network.privateNetwork)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/network/privateNetwork`, `${policyPath} network.privateNetwork must be an object.`, `Fix ${policyPath} so network.privateNetwork is an object.`)];
1354
+ if (isRecord(policy.network.privateNetwork) && policy.network.privateNetwork.allow !== void 0 && typeof policy.network.privateNetwork.allow !== "boolean") return [policyShapeFinding(policyPath, `oc://${policyDocName}/network/privateNetwork/allow`, `${policyPath} network.privateNetwork.allow must be a boolean.`, `Fix ${policyPath} so network.privateNetwork.allow is true or false.`)];
1355
+ }
1356
+ if (policy.secrets !== void 0 && !isRecord(policy.secrets)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/secrets`, `${policyPath} secrets must be an object.`, `Fix ${policyPath} so secrets is an object.`)];
1357
+ if (policy.auth !== void 0 && !isRecord(policy.auth)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/auth`, `${policyPath} auth must be an object.`, `Fix ${policyPath} so auth is an object.`)];
1358
+ if (isRecord(policy.auth) && policy.auth.profiles !== void 0 && !isRecord(policy.auth.profiles)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/auth/profiles`, `${policyPath} auth.profiles must be an object.`, `Fix ${policyPath} so auth.profiles is an object.`)];
1359
+ const gatewayFinding = gatewayPolicyShapeFinding(policy.gateway, {
1360
+ policyDocName,
1361
+ policyPath
1362
+ });
1363
+ if (gatewayFinding !== void 0) return [gatewayFinding];
1364
+ return [];
1365
+ }
1366
+ function gatewayPolicyShapeFinding(value, params) {
1367
+ if (value === void 0) return;
1368
+ if (!isRecord(value)) return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/gateway`, `${params.policyPath} gateway must be an object.`, `Fix ${params.policyPath} so gateway is an object.`);
1369
+ for (const section of [
1370
+ "exposure",
1371
+ "auth",
1372
+ "controlUi",
1373
+ "remote",
1374
+ "http"
1375
+ ]) if (value[section] !== void 0 && !isRecord(value[section])) return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/gateway/${section}`, `${params.policyPath} gateway.${section} must be an object.`, `Fix ${params.policyPath} so gateway.${section} is an object.`);
1376
+ const exposure = isRecord(value.exposure) ? value.exposure : {};
1377
+ const auth = isRecord(value.auth) ? value.auth : {};
1378
+ const controlUi = isRecord(value.controlUi) ? value.controlUi : {};
1379
+ const remote = isRecord(value.remote) ? value.remote : {};
1380
+ const http = isRecord(value.http) ? value.http : {};
1381
+ const booleanRules = [
1382
+ [
1383
+ "gateway/exposure/allowNonLoopbackBind",
1384
+ "gateway.exposure.allowNonLoopbackBind",
1385
+ exposure.allowNonLoopbackBind
1386
+ ],
1387
+ [
1388
+ "gateway/exposure/allowTailscaleFunnel",
1389
+ "gateway.exposure.allowTailscaleFunnel",
1390
+ exposure.allowTailscaleFunnel
1391
+ ],
1392
+ [
1393
+ "gateway/auth/requireAuth",
1394
+ "gateway.auth.requireAuth",
1395
+ auth.requireAuth
1396
+ ],
1397
+ [
1398
+ "gateway/auth/requireExplicitRateLimit",
1399
+ "gateway.auth.requireExplicitRateLimit",
1400
+ auth.requireExplicitRateLimit
1401
+ ],
1402
+ [
1403
+ "gateway/controlUi/allowInsecure",
1404
+ "gateway.controlUi.allowInsecure",
1405
+ controlUi.allowInsecure
1406
+ ],
1407
+ [
1408
+ "gateway/remote/allow",
1409
+ "gateway.remote.allow",
1410
+ remote.allow
1411
+ ],
1412
+ [
1413
+ "gateway/http/requireUrlAllowlists",
1414
+ "gateway.http.requireUrlAllowlists",
1415
+ http.requireUrlAllowlists
1416
+ ]
1417
+ ];
1418
+ for (const [target, property, ruleValue] of booleanRules) if (ruleValue !== void 0 && typeof ruleValue !== "boolean") return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/${target}`, `${params.policyPath} ${property} must be a boolean.`, `Fix ${params.policyPath} so ${property} is true or false.`);
1419
+ const denyEndpoints = http.denyEndpoints;
1420
+ if (denyEndpoints !== void 0 && !Array.isArray(denyEndpoints)) return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/gateway/http/denyEndpoints`, `${params.policyPath} gateway.http.denyEndpoints must be an array.`, "Use an array of endpoint ids such as [\"responses\"] or remove gateway.http.denyEndpoints.");
1421
+ if (Array.isArray(denyEndpoints)) {
1422
+ const invalidIndex = denyEndpoints.findIndex((entry) => typeof entry !== "string" || !SUPPORTED_GATEWAY_HTTP_ENDPOINTS.includes(entry.trim()));
1423
+ if (invalidIndex >= 0) return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/gateway/http/denyEndpoints/#${invalidIndex}`, `${params.policyPath} gateway.http.denyEndpoints[${invalidIndex}] must be a supported endpoint id.`, `Use supported endpoint ids: ${SUPPORTED_GATEWAY_HTTP_ENDPOINTS.join(", ")}.`);
1424
+ }
1425
+ }
1426
+ function policyStringArrayShapeFinding(value, params) {
1427
+ if (value === void 0) return;
1428
+ if (!isRecord(value)) return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/${params.target}`, `${params.policyPath} ${params.property} must be an object.`, `Fix ${params.policyPath} so ${params.property} is an object.`);
1429
+ for (const key of ["allow", "deny"]) {
1430
+ const entries = value[key];
1431
+ if (entries === void 0) continue;
1432
+ const target = `oc://${params.policyDocName}/${params.target}/${key}`;
1433
+ if (!Array.isArray(entries)) return policyShapeFinding(params.policyPath, target, `${params.policyPath} ${params.property}.${key} must be an array.`, `Fix ${params.policyPath} so ${params.property}.${key} is an array of ${params.valueName}s.`);
1434
+ const invalidIndex = entries.findIndex((entry) => typeof entry !== "string" || entry.trim() === "");
1435
+ if (invalidIndex >= 0) return policyShapeFinding(params.policyPath, `${target}/#${invalidIndex}`, `${params.policyPath} ${params.property}.${key}[${invalidIndex}] must be a non-empty string.`, `Fix ${params.policyPath} so each ${params.property}.${key} entry is a ${params.valueName}.`);
1436
+ }
1437
+ }
1438
+ function policyShapeFinding(policyPath, target, message, fixHint) {
1439
+ return {
1440
+ checkId: CHECK_IDS.policyInvalidFile,
1441
+ severity: "error",
1442
+ message,
1443
+ source: "policy",
1444
+ path: policyPath,
1445
+ target,
1446
+ fixHint
1447
+ };
1448
+ }
1449
+ function authProfileMetadataRequirementFindings(policy, policyPath, policyDocName) {
1450
+ if (!isRecord(policy) || !isRecord(policy.auth) || !isRecord(policy.auth.profiles) || policy.auth.profiles.requireMetadata === void 0) return [];
1451
+ if (!Array.isArray(policy.auth.profiles.requireMetadata)) return [{
1452
+ checkId: CHECK_IDS.policyInvalidFile,
1453
+ severity: "error",
1454
+ message: `${policyPath} auth.profiles.requireMetadata must be an array of metadata keys.`,
1455
+ source: "policy",
1456
+ path: policyPath,
1457
+ target: `oc://${policyDocName}/auth/profiles/requireMetadata`,
1458
+ fixHint: `Use supported metadata keys: ${SUPPORTED_AUTH_PROFILE_METADATA.join(", ")}.`
1459
+ }];
1460
+ const invalidIndex = policy.auth.profiles.requireMetadata.findIndex((entry) => typeof entry !== "string" || !SUPPORTED_AUTH_PROFILE_METADATA.includes(entry.trim().toLowerCase()));
1461
+ if (invalidIndex < 0) return [];
1462
+ return [{
1463
+ checkId: CHECK_IDS.policyInvalidFile,
1464
+ severity: "error",
1465
+ message: `${policyPath} auth.profiles.requireMetadata[${invalidIndex}] must be a supported metadata key.`,
1466
+ source: "policy",
1467
+ path: policyPath,
1468
+ target: `oc://${policyDocName}/auth/profiles/requireMetadata/#${invalidIndex}`,
1469
+ fixHint: `Use supported metadata keys: ${SUPPORTED_AUTH_PROFILE_METADATA.join(", ")}.`
1470
+ }];
1471
+ }
1472
+ function invalidChannelDenyRuleFindings(policy, policyPath, policyDocName) {
1473
+ if (!isRecord(policy) || !isRecord(policy.channels) || policy.channels.denyRules === void 0) return [];
1474
+ if (!Array.isArray(policy.channels.denyRules)) return [{
1475
+ checkId: CHECK_IDS.policyInvalidFile,
1476
+ severity: "error",
1477
+ message: `${policyPath} channels.denyRules must be an array.`,
1478
+ source: "policy",
1479
+ path: policyPath,
1480
+ target: `oc://${policyDocName}/channels/denyRules`,
1481
+ fixHint: `Fix ${policyPath} so channel deny rules are an array.`
1482
+ }];
1483
+ const invalid = policy.channels.denyRules.findIndex((rule) => !isChannelDenyRule(rule));
1484
+ if (invalid < 0) return [];
1485
+ return [{
1486
+ checkId: CHECK_IDS.policyInvalidFile,
1487
+ severity: "error",
1488
+ message: `${policyPath} channels.denyRules[${invalid}] must define when.provider as a string.`,
1489
+ source: "policy",
1490
+ path: policyPath,
1491
+ target: `oc://${policyDocName}/channels/denyRules/#${invalid}`,
1492
+ fixHint: `Fix ${policyPath} so each channel deny rule has a provider match.`
1493
+ }];
1494
+ }
1495
+ function mcpServerFindings(policy, policyDocName, evidence) {
1496
+ const denied = new Set(readStringList(policy, [
1497
+ "mcp",
1498
+ "servers",
1499
+ "deny"
1500
+ ], { lowercase: false }));
1501
+ const allowed = readStringList(policy, [
1502
+ "mcp",
1503
+ "servers",
1504
+ "allow"
1505
+ ], { lowercase: false });
1506
+ const allowedSet = new Set(allowed);
1507
+ const findings = [];
1508
+ for (const server of evidence.mcpServers) {
1509
+ if (denied.has(server.id)) {
1510
+ findings.push({
1511
+ checkId: CHECK_IDS.policyDeniedMcpServer,
1512
+ severity: "error",
1513
+ message: `MCP server '${server.id}' is denied by policy.`,
1514
+ source: "policy",
1515
+ path: "daocore config",
1516
+ ocPath: server.source,
1517
+ target: server.source,
1518
+ requirement: `oc://${policyDocName}/mcp/servers/deny`,
1519
+ fixHint: "Remove this configured MCP server or update the policy after review."
1520
+ });
1521
+ continue;
1522
+ }
1523
+ if (allowedSet.size > 0 && !allowedSet.has(server.id)) findings.push({
1524
+ checkId: CHECK_IDS.policyUnapprovedMcpServer,
1525
+ severity: "error",
1526
+ message: `MCP server '${server.id}' is not in the policy allowlist.`,
1527
+ source: "policy",
1528
+ path: "daocore config",
1529
+ ocPath: server.source,
1530
+ target: server.source,
1531
+ requirement: `oc://${policyDocName}/mcp/servers/allow`,
1532
+ fixHint: "Use an approved MCP server or update the policy after review."
1533
+ });
1534
+ }
1535
+ return findings;
1536
+ }
1537
+ function modelProviderFindings(policy, policyDocName, evidence) {
1538
+ const denied = new Set(readModelProviderPolicyList(policy, [
1539
+ "models",
1540
+ "providers",
1541
+ "deny"
1542
+ ]));
1543
+ const allowed = readModelProviderPolicyList(policy, [
1544
+ "models",
1545
+ "providers",
1546
+ "allow"
1547
+ ]);
1548
+ const allowedSet = new Set(allowed);
1549
+ const findings = [];
1550
+ for (const provider of evidence.modelProviders) findings.push(...modelProviderConformanceFindings(provider, denied, allowedSet, policyDocName));
1551
+ for (const modelRef of evidence.modelRefs) findings.push(...modelRefConformanceFindings(modelRef, denied, allowedSet, policyDocName));
1552
+ return findings;
1553
+ }
1554
+ function readModelProviderPolicyList(policy, path) {
1555
+ return readStringList(policy, path).map((provider) => normalizeProviderId(provider));
1556
+ }
1557
+ function modelProviderConformanceFindings(provider, denied, allowed, policyDocName) {
1558
+ const findings = [];
1559
+ if (denied.has(provider.id)) findings.push({
1560
+ checkId: CHECK_IDS.policyDeniedModelProvider,
1561
+ severity: "error",
1562
+ message: `Model provider '${provider.id}' is denied by policy.`,
1563
+ source: "policy",
1564
+ path: "daocore config",
1565
+ ocPath: provider.source,
1566
+ target: provider.source,
1567
+ requirement: `oc://${policyDocName}/models/providers/deny`,
1568
+ fixHint: "Remove this configured provider or update the policy after review."
1569
+ });
1570
+ if (!denied.has(provider.id) && allowed.size > 0 && !allowed.has(provider.id)) findings.push({
1571
+ checkId: CHECK_IDS.policyUnapprovedModelProvider,
1572
+ severity: "error",
1573
+ message: `Model provider '${provider.id}' is not in the policy allowlist.`,
1574
+ source: "policy",
1575
+ path: "daocore config",
1576
+ ocPath: provider.source,
1577
+ target: provider.source,
1578
+ requirement: `oc://${policyDocName}/models/providers/allow`,
1579
+ fixHint: "Use an approved model provider or update the policy after review."
1580
+ });
1581
+ return findings;
1582
+ }
1583
+ function modelRefConformanceFindings(modelRef, denied, allowed, policyDocName) {
1584
+ const findings = [];
1585
+ if (denied.has(modelRef.provider)) findings.push({
1586
+ checkId: CHECK_IDS.policyDeniedModelProvider,
1587
+ severity: "error",
1588
+ message: `Model ref '${modelRef.ref}' uses denied provider '${modelRef.provider}'.`,
1589
+ source: "policy",
1590
+ path: "daocore config",
1591
+ ocPath: modelRef.source,
1592
+ target: modelRef.source,
1593
+ requirement: `oc://${policyDocName}/models/providers/deny`,
1594
+ fixHint: "Select an approved model provider or update the policy after review."
1595
+ });
1596
+ if (!denied.has(modelRef.provider) && allowed.size > 0 && !allowed.has(modelRef.provider)) findings.push({
1597
+ checkId: CHECK_IDS.policyUnapprovedModelProvider,
1598
+ severity: "error",
1599
+ message: `Model ref '${modelRef.ref}' uses unapproved provider '${modelRef.provider}'.`,
1600
+ source: "policy",
1601
+ path: "daocore config",
1602
+ ocPath: modelRef.source,
1603
+ target: modelRef.source,
1604
+ requirement: `oc://${policyDocName}/models/providers/allow`,
1605
+ fixHint: "Select an approved model provider or update the policy after review."
1606
+ });
1607
+ return findings;
1608
+ }
1609
+ function networkFindings(policy, policyDocName, evidence) {
1610
+ if (readPolicyBoolean(policy, [
1611
+ "network",
1612
+ "privateNetwork",
1613
+ "allow"
1614
+ ]) !== false) return [];
1615
+ return evidence.network.filter((setting) => setting.value).map((setting) => {
1616
+ return {
1617
+ checkId: CHECK_IDS.policyPrivateNetworkAccess,
1618
+ severity: "error",
1619
+ message: `Network setting '${setting.id}' allows private-network access.`,
1620
+ source: "policy",
1621
+ path: "daocore config",
1622
+ ocPath: setting.source,
1623
+ target: setting.source,
1624
+ requirement: `oc://${policyDocName}/network/privateNetwork/allow`,
1625
+ fixHint: "Disable this private-network access setting or update policy after review."
1626
+ };
1627
+ });
1628
+ }
1629
+ function gatewayExposureFindings(policy, policyDocName, evidence) {
1630
+ return [
1631
+ ...gatewayNonLoopbackBindFindings(policy, policyDocName, evidence),
1632
+ ...gatewayAuthFindings(policy, policyDocName, evidence),
1633
+ ...gatewayControlUiFindings(policy, policyDocName, evidence),
1634
+ ...gatewayTailscaleFindings(policy, policyDocName, evidence),
1635
+ ...gatewayRemoteFindings(policy, policyDocName, evidence),
1636
+ ...gatewayHttpEndpointFindings(policy, policyDocName, evidence),
1637
+ ...gatewayHttpUrlFetchFindings(policy, policyDocName, evidence)
1638
+ ];
1639
+ }
1640
+ function gatewayNonLoopbackBindFindings(policy, policyDocName, evidence) {
1641
+ if (readPolicyBoolean(policy, [
1642
+ "gateway",
1643
+ "exposure",
1644
+ "allowNonLoopbackBind"
1645
+ ]) !== false) return [];
1646
+ return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "bind" && entry.nonLoopback === true).map((entry) => {
1647
+ return {
1648
+ checkId: CHECK_IDS.policyGatewayNonLoopbackBind,
1649
+ severity: "error",
1650
+ message: entry.explicit === false ? "Gateway bind is omitted while the runtime default can permit non-loopback exposure." : `Gateway bind setting '${entry.id}' permits non-loopback exposure.`,
1651
+ source: "policy",
1652
+ path: "daocore config",
1653
+ ocPath: entry.source,
1654
+ target: entry.source,
1655
+ requirement: `oc://${policyDocName}/gateway/exposure/allowNonLoopbackBind`,
1656
+ fixHint: "Use gateway.bind=loopback or update policy after review."
1657
+ };
1658
+ });
1659
+ }
1660
+ function gatewayAuthFindings(policy, policyDocName, evidence) {
1661
+ const findings = [];
1662
+ if (readPolicyBoolean(policy, [
1663
+ "gateway",
1664
+ "auth",
1665
+ "requireAuth"
1666
+ ]) === true) findings.push(...(evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "auth" && entry.value === "none").map((entry) => {
1667
+ return {
1668
+ checkId: CHECK_IDS.policyGatewayAuthDisabled,
1669
+ severity: "error",
1670
+ message: "Gateway authentication is disabled.",
1671
+ source: "policy",
1672
+ path: "daocore config",
1673
+ ocPath: entry.source,
1674
+ target: entry.source,
1675
+ requirement: `oc://${policyDocName}/gateway/auth/requireAuth`,
1676
+ fixHint: "Set gateway.auth.mode to token, password, or trusted-proxy."
1677
+ };
1678
+ }));
1679
+ if (readPolicyBoolean(policy, [
1680
+ "gateway",
1681
+ "auth",
1682
+ "requireExplicitRateLimit"
1683
+ ]) === true) findings.push(...(evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "authRateLimit" && entry.explicit !== true).map((entry) => {
1684
+ return {
1685
+ checkId: CHECK_IDS.policyGatewayRateLimitMissing,
1686
+ severity: "error",
1687
+ message: "Gateway authentication rate-limit posture is not explicit.",
1688
+ source: "policy",
1689
+ path: "daocore config",
1690
+ ocPath: entry.source,
1691
+ target: entry.source,
1692
+ requirement: `oc://${policyDocName}/gateway/auth/requireExplicitRateLimit`,
1693
+ fixHint: "Configure gateway.auth.rateLimit or update policy after review."
1694
+ };
1695
+ }));
1696
+ return findings;
1697
+ }
1698
+ function gatewayControlUiFindings(policy, policyDocName, evidence) {
1699
+ if (readPolicyBoolean(policy, [
1700
+ "gateway",
1701
+ "controlUi",
1702
+ "allowInsecure"
1703
+ ]) !== false) return [];
1704
+ return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "controlUi" && entry.value === true && (entry.id === "gateway-control-ui-insecure-auth" || entry.id === "gateway-control-ui-device-auth-disabled" || entry.id === "gateway-control-ui-host-origin-fallback")).map((entry) => {
1705
+ return {
1706
+ checkId: CHECK_IDS.policyGatewayControlUiInsecure,
1707
+ severity: "error",
1708
+ message: `Gateway Control UI insecure toggle '${entry.id}' is enabled.`,
1709
+ source: "policy",
1710
+ path: "daocore config",
1711
+ ocPath: entry.source,
1712
+ target: entry.source,
1713
+ requirement: `oc://${policyDocName}/gateway/controlUi/allowInsecure`,
1714
+ fixHint: "Disable the insecure Control UI toggle or update policy after review."
1715
+ };
1716
+ });
1717
+ }
1718
+ function gatewayTailscaleFindings(policy, policyDocName, evidence) {
1719
+ if (readPolicyBoolean(policy, [
1720
+ "gateway",
1721
+ "exposure",
1722
+ "allowTailscaleFunnel"
1723
+ ]) !== false) return [];
1724
+ return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "tailscale" && entry.value === "funnel").map((entry) => {
1725
+ return {
1726
+ checkId: CHECK_IDS.policyGatewayTailscaleFunnel,
1727
+ severity: "error",
1728
+ message: "Gateway Tailscale Funnel exposure is enabled.",
1729
+ source: "policy",
1730
+ path: "daocore config",
1731
+ ocPath: entry.source,
1732
+ target: entry.source,
1733
+ requirement: `oc://${policyDocName}/gateway/exposure/allowTailscaleFunnel`,
1734
+ fixHint: "Use tailscale serve/off or update policy after review."
1735
+ };
1736
+ });
1737
+ }
1738
+ function gatewayRemoteFindings(policy, policyDocName, evidence) {
1739
+ if (readPolicyBoolean(policy, [
1740
+ "gateway",
1741
+ "remote",
1742
+ "allow"
1743
+ ]) !== false) return [];
1744
+ return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "remote").map((entry) => {
1745
+ return {
1746
+ checkId: CHECK_IDS.policyGatewayRemoteEnabled,
1747
+ severity: "error",
1748
+ message: `Gateway remote posture '${entry.id}' is enabled.`,
1749
+ source: "policy",
1750
+ path: "daocore config",
1751
+ ocPath: entry.source,
1752
+ target: entry.source,
1753
+ requirement: `oc://${policyDocName}/gateway/remote/allow`,
1754
+ fixHint: "Disable remote gateway mode/config or update policy after review."
1755
+ };
1756
+ });
1757
+ }
1758
+ function gatewayHttpEndpointFindings(policy, policyDocName, evidence) {
1759
+ const denied = new Set(readStringList(policy, [
1760
+ "gateway",
1761
+ "http",
1762
+ "denyEndpoints"
1763
+ ]).map((endpoint) => endpoint.toLowerCase()));
1764
+ if (denied.size === 0) return [];
1765
+ return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "httpEndpoint" && entry.endpoint !== void 0 && denied.has(entry.endpoint.toLowerCase())).map((entry) => {
1766
+ return {
1767
+ checkId: CHECK_IDS.policyGatewayHttpEndpointEnabled,
1768
+ severity: "error",
1769
+ message: `Gateway HTTP endpoint '${entry.endpoint ?? entry.id}' is denied by policy.`,
1770
+ source: "policy",
1771
+ path: "daocore config",
1772
+ ocPath: entry.source,
1773
+ target: entry.source,
1774
+ requirement: `oc://${policyDocName}/gateway/http/denyEndpoints`,
1775
+ fixHint: "Disable the HTTP endpoint or update policy after review."
1776
+ };
1777
+ });
1778
+ }
1779
+ function gatewayHttpUrlFetchFindings(policy, policyDocName, evidence) {
1780
+ if (readPolicyBoolean(policy, [
1781
+ "gateway",
1782
+ "http",
1783
+ "requireUrlAllowlists"
1784
+ ]) !== true) return [];
1785
+ return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "httpUrlFetch" && entry.hasAllowlist !== true).map((entry) => {
1786
+ return {
1787
+ checkId: CHECK_IDS.policyGatewayHttpUrlFetchUnrestricted,
1788
+ severity: "error",
1789
+ message: `Gateway HTTP URL-fetch input '${entry.id}' has no URL allowlist.`,
1790
+ source: "policy",
1791
+ path: "daocore config",
1792
+ ocPath: entry.source,
1793
+ target: entry.source,
1794
+ requirement: `oc://${policyDocName}/gateway/http/requireUrlAllowlists`,
1795
+ fixHint: "Add a urlAllowlist for this URL-fetch input or update policy after review."
1796
+ };
1797
+ });
1798
+ }
1799
+ function secretAuthProvenanceFindings(policy, policyPath, policyDocName, evidence) {
1800
+ const secretShapeFindings = secretPolicyShapeFindings(policy, policyPath, policyDocName);
1801
+ const authShapeFindings = authProfileAllowModesShapeFindings(policy, policyPath, policyDocName);
1802
+ return [...secretShapeFindings.length > 0 ? secretShapeFindings : [
1803
+ ...secretManagedProviderFindings(policy, policyDocName, evidence),
1804
+ ...secretDeniedSourceFindings(policy, policyDocName, evidence),
1805
+ ...secretInsecureProviderFindings(policy, policyDocName, evidence)
1806
+ ], ...authShapeFindings.length > 0 ? authShapeFindings : [...authProfileMetadataFindings(policy, policyDocName, evidence), ...authProfileModeFindings(policy, policyDocName, evidence)]];
1807
+ }
1808
+ function policyHasSecretRules(policy) {
1809
+ if (!isRecord(policy) || !isRecord(policy.secrets)) return false;
1810
+ return policy.secrets.requireManagedProviders !== void 0 || policy.secrets.denySources !== void 0 || policy.secrets.allowInsecureProviders !== void 0;
1811
+ }
1812
+ function policyHasAuthProfileRules(policy) {
1813
+ return isRecord(policy) && isRecord(policy.auth) && isRecord(policy.auth.profiles) && (policy.auth.profiles.requireMetadata !== void 0 || policy.auth.profiles.allowModes !== void 0);
1814
+ }
1815
+ function policyHasGatewayRules(policy) {
1816
+ if (!isRecord(policy) || !isRecord(policy.gateway)) return false;
1817
+ const gateway = policy.gateway;
1818
+ return isRecord(gateway.exposure) && (gateway.exposure.allowNonLoopbackBind !== void 0 || gateway.exposure.allowTailscaleFunnel !== void 0) || isRecord(gateway.auth) && (gateway.auth.requireAuth !== void 0 || gateway.auth.requireExplicitRateLimit !== void 0) || isRecord(gateway.controlUi) && gateway.controlUi.allowInsecure !== void 0 || isRecord(gateway.remote) && gateway.remote.allow !== void 0 || isRecord(gateway.http) && (gateway.http.denyEndpoints !== void 0 || gateway.http.requireUrlAllowlists !== void 0);
1819
+ }
1820
+ function secretPolicyShapeFindings(policy, policyPath, policyDocName) {
1821
+ if (!isRecord(policy) || !isRecord(policy.secrets)) return [];
1822
+ const findings = [];
1823
+ for (const key of ["requireManagedProviders", "allowInsecureProviders"]) if (policy.secrets[key] !== void 0 && typeof policy.secrets[key] !== "boolean") findings.push(policyShapeFinding(policyPath, `oc://${policyDocName}/secrets/${key}`, `${policyPath} secrets.${key} must be a boolean.`, `Set secrets.${key} to true or false.`));
1824
+ if (policy.secrets.denySources !== void 0 && !Array.isArray(policy.secrets.denySources)) findings.push(policyShapeFinding(policyPath, `oc://${policyDocName}/secrets/denySources`, `${policyPath} secrets.denySources must be an array of source names.`, "Use an array such as [\"exec\"] or remove secrets.denySources."));
1825
+ else if (Array.isArray(policy.secrets.denySources)) {
1826
+ const invalidIndex = policy.secrets.denySources.findIndex((entry) => typeof entry !== "string" || entry.trim() === "");
1827
+ if (invalidIndex >= 0) findings.push(policyShapeFinding(policyPath, `oc://${policyDocName}/secrets/denySources/#${invalidIndex}`, `${policyPath} secrets.denySources[${invalidIndex}] must be a non-empty source name.`, "Use non-empty source names such as env, file, exec, or daocore."));
1828
+ }
1829
+ return findings;
1830
+ }
1831
+ function authProfileAllowModesShapeFindings(policy, policyPath, policyDocName) {
1832
+ if (!isRecord(policy) || !isRecord(policy.auth) || !isRecord(policy.auth.profiles) || policy.auth.profiles.allowModes === void 0) return [];
1833
+ if (!Array.isArray(policy.auth.profiles.allowModes)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/auth/profiles/allowModes`, `${policyPath} auth.profiles.allowModes must be an array of auth modes.`, `Use supported auth modes: ${SUPPORTED_AUTH_PROFILE_MODES.join(", ")}.`)];
1834
+ const invalidIndex = policy.auth.profiles.allowModes.findIndex((entry) => typeof entry !== "string" || !SUPPORTED_AUTH_PROFILE_MODES.includes(entry.trim().toLowerCase()));
1835
+ if (invalidIndex < 0) return [];
1836
+ return [policyShapeFinding(policyPath, `oc://${policyDocName}/auth/profiles/allowModes/#${invalidIndex}`, `${policyPath} auth.profiles.allowModes[${invalidIndex}] must be a supported auth mode.`, `Use supported auth modes: ${SUPPORTED_AUTH_PROFILE_MODES.join(", ")}.`)];
1837
+ }
1838
+ function secretManagedProviderFindings(policy, policyDocName, evidence) {
1839
+ if (readPolicyBoolean(policy, ["secrets", "requireManagedProviders"]) !== true) return [];
1840
+ const secrets = evidence.secrets ?? [];
1841
+ const providerKeys = new Set(secrets.filter((secret) => secret.kind === "provider" && secret.providerSource !== void 0).map((secret) => `${secret.providerSource}:${secret.id}`));
1842
+ return secrets.filter((secret) => secret.kind === "input" && secret.provenance === "secretRef" && (secret.refProvider === void 0 || secret.refSource === void 0 || !providerKeys.has(`${secret.refSource}:${secret.refProvider}`))).map((secret) => {
1843
+ return {
1844
+ checkId: CHECK_IDS.policySecretsUnmanagedProvider,
1845
+ severity: "error",
1846
+ message: `SecretRef uses unmanaged provider '${secret.refProvider ?? "default"}'.`,
1847
+ source: "policy",
1848
+ path: "daocore config",
1849
+ ocPath: secret.source,
1850
+ target: secret.source,
1851
+ requirement: `oc://${policyDocName}/secrets/requireManagedProviders`,
1852
+ fixHint: "Declare the referenced provider under secrets.providers or update policy after review."
1853
+ };
1854
+ });
1855
+ }
1856
+ function secretDeniedSourceFindings(policy, policyDocName, evidence) {
1857
+ const deniedSources = new Set(readStringList(policy, ["secrets", "denySources"]));
1858
+ if (deniedSources.size === 0) return [];
1859
+ return (evidence.secrets ?? []).filter((secret) => {
1860
+ const source = secret.kind === "provider" ? secret.providerSource : secret.refSource;
1861
+ return source !== void 0 && deniedSources.has(source);
1862
+ }).map((secret) => {
1863
+ const source = secret.kind === "provider" ? secret.providerSource : secret.refSource;
1864
+ return {
1865
+ checkId: CHECK_IDS.policySecretsDeniedProviderSource,
1866
+ severity: "error",
1867
+ message: `Secret ${secret.kind} '${secret.id}' uses denied source '${source}'.`,
1868
+ source: "policy",
1869
+ path: "daocore config",
1870
+ ocPath: secret.source,
1871
+ target: secret.source,
1872
+ requirement: `oc://${policyDocName}/secrets/denySources`,
1873
+ fixHint: "Move this secret to an approved source or update policy after review."
1874
+ };
1875
+ });
1876
+ }
1877
+ function secretInsecureProviderFindings(policy, policyDocName, evidence) {
1878
+ if (readPolicyBoolean(policy, ["secrets", "allowInsecureProviders"]) !== false) return [];
1879
+ return (evidence.secrets ?? []).filter((secret) => secret.kind === "provider" && (secret.insecure?.length ?? 0) > 0).map((secret) => {
1880
+ return {
1881
+ checkId: CHECK_IDS.policySecretsInsecureProvider,
1882
+ severity: "error",
1883
+ message: `Secret provider '${secret.id}' enables insecure posture: ${(secret.insecure ?? []).join(", ")}.`,
1884
+ source: "policy",
1885
+ path: "daocore config",
1886
+ ocPath: secret.source,
1887
+ target: secret.source,
1888
+ requirement: `oc://${policyDocName}/secrets/allowInsecureProviders`,
1889
+ fixHint: "Remove insecure provider overrides or update policy after review."
1890
+ };
1891
+ });
1892
+ }
1893
+ function authProfileMetadataFindings(policy, policyDocName, evidence) {
1894
+ const requiredMetadata = requiredAuthProfileMetadata(policy);
1895
+ if (requiredMetadata.size === 0) return [];
1896
+ return (evidence.authProfiles ?? []).flatMap((profile) => {
1897
+ const missing = [...requiredMetadata].filter((metadata) => !authProfileHasMetadata(profile, metadata));
1898
+ if (missing.length === 0) return [];
1899
+ return [{
1900
+ checkId: CHECK_IDS.policyAuthProfileInvalidMetadata,
1901
+ severity: "error",
1902
+ message: `Auth profile '${profile.id}' is missing required metadata: ${missing.join(", ")}.`,
1903
+ source: "policy",
1904
+ path: "daocore config",
1905
+ ocPath: profile.source,
1906
+ target: profile.source,
1907
+ requirement: `oc://${policyDocName}/auth/profiles/requireMetadata`,
1908
+ fixHint: "Set auth.profiles.<id>.provider and a supported auth profile mode."
1909
+ }];
1910
+ });
1911
+ }
1912
+ function authProfileModeFindings(policy, policyDocName, evidence) {
1913
+ const allowedModes = new Set(readStringList(policy, [
1914
+ "auth",
1915
+ "profiles",
1916
+ "allowModes"
1917
+ ]));
1918
+ if (allowedModes.size === 0) return [];
1919
+ return (evidence.authProfiles ?? []).filter((profile) => profile.mode !== void 0 && !allowedModes.has(profile.mode)).map((profile) => {
1920
+ return {
1921
+ checkId: CHECK_IDS.policyAuthProfileUnapprovedMode,
1922
+ severity: "error",
1923
+ message: `Auth profile '${profile.id}' uses mode '${profile.mode}' outside the policy allowlist.`,
1924
+ source: "policy",
1925
+ path: "daocore config",
1926
+ ocPath: profile.source,
1927
+ target: profile.source,
1928
+ requirement: `oc://${policyDocName}/auth/profiles/allowModes`,
1929
+ fixHint: "Change the auth profile mode or update policy after review."
1930
+ };
1931
+ });
1932
+ }
1933
+ function toolRiskFindings(policyDocName, evidence) {
1934
+ return (evidence.tools ?? []).filter((tool) => tool.risk === void 0).map((tool) => {
1935
+ return {
1936
+ checkId: CHECK_IDS.policyMissingToolRisk,
1937
+ severity: "error",
1938
+ message: `TOOLS.md tool '${tool.id}' has no explicit risk classification.`,
1939
+ source: "policy",
1940
+ path: "TOOLS.md",
1941
+ line: tool.line,
1942
+ ocPath: tool.source,
1943
+ target: tool.source,
1944
+ requirement: `oc://${policyDocName}/tools/requireMetadata`,
1945
+ fixHint: "Declare risk:low, risk:medium, risk:high, risk:critical, or an R0-R5 review alias."
1946
+ };
1947
+ });
1948
+ }
1949
+ function toolUnknownRiskFindings(policyDocName, evidence) {
1950
+ return (evidence.tools ?? []).filter((tool) => tool.risk !== void 0 && !KNOWN_RISK_LEVELS.includes(tool.risk)).map((tool) => {
1951
+ return {
1952
+ checkId: CHECK_IDS.policyUnknownToolRisk,
1953
+ severity: "error",
1954
+ message: `TOOLS.md tool '${tool.id}' declares unknown risk '${tool.risk}'.`,
1955
+ source: "policy",
1956
+ path: "TOOLS.md",
1957
+ line: tool.line,
1958
+ ocPath: tool.source,
1959
+ target: tool.source,
1960
+ requirement: `oc://${policyDocName}/tools/requireMetadata`,
1961
+ fixHint: `Use one of: ${KNOWN_RISK_LEVELS.join(", ")}.`
1962
+ };
1963
+ });
1964
+ }
1965
+ function toolSensitivityFindings(policyDocName, evidence) {
1966
+ return (evidence.tools ?? []).flatMap((tool) => {
1967
+ if (tool.sensitivity === void 0) return [{
1968
+ checkId: CHECK_IDS.policyMissingToolSensitivity,
1969
+ severity: "error",
1970
+ message: `TOOLS.md tool '${tool.id}' has no declared artifact sensitivity.`,
1971
+ source: "policy",
1972
+ path: "TOOLS.md",
1973
+ line: tool.line,
1974
+ ocPath: tool.source,
1975
+ target: tool.source,
1976
+ requirement: `oc://${policyDocName}/tools/requireMetadata`,
1977
+ fixHint: `Declare sensitivity as one of: ${KNOWN_SENSITIVITY_LEVELS.join(", ")}.`
1978
+ }];
1979
+ if (KNOWN_SENSITIVITY_LEVELS.includes(tool.sensitivity)) return [];
1980
+ return [{
1981
+ checkId: CHECK_IDS.policyUnknownToolSensitivity,
1982
+ severity: "error",
1983
+ message: `TOOLS.md tool '${tool.id}' declares unknown sensitivity '${tool.sensitivity}'.`,
1984
+ source: "policy",
1985
+ path: "TOOLS.md",
1986
+ line: tool.line,
1987
+ ocPath: tool.source,
1988
+ target: tool.source,
1989
+ requirement: `oc://${policyDocName}/tools/requireMetadata`,
1990
+ fixHint: `Use one of: ${KNOWN_SENSITIVITY_LEVELS.join(", ")}.`
1991
+ }];
1992
+ });
1993
+ }
1994
+ function toolOwnerFindings(policyDocName, evidence) {
1995
+ return (evidence.tools ?? []).filter((tool) => tool.owner === void 0).map((tool) => {
1996
+ return {
1997
+ checkId: CHECK_IDS.policyMissingToolOwner,
1998
+ severity: "error",
1999
+ message: `TOOLS.md tool '${tool.id}' has no declared owner.`,
2000
+ source: "policy",
2001
+ path: "TOOLS.md",
2002
+ line: tool.line,
2003
+ ocPath: tool.source,
2004
+ target: tool.source,
2005
+ requirement: `oc://${policyDocName}/tools/requireMetadata`,
2006
+ fixHint: "Declare owner:<team-or-person> for this tool."
2007
+ };
2008
+ });
2009
+ }
2010
+ async function readPolicyFile(ctx) {
2011
+ const displayName = policyDisplayName(ctx);
2012
+ const path = resolveWorkspacePath(ctx, policyPathSetting(ctx));
2013
+ try {
2014
+ return {
2015
+ raw: await (await import("node:fs/promises")).readFile(path, "utf-8"),
2016
+ path,
2017
+ displayName,
2018
+ ocDocName: basename(displayName)
2019
+ };
2020
+ } catch (err) {
2021
+ if (isNotFound(err)) return null;
2022
+ throw err;
2023
+ }
2024
+ }
2025
+ async function readWorkspaceFile(ctx, fileName) {
2026
+ const path = resolveWorkspacePath(ctx, fileName);
2027
+ try {
2028
+ return {
2029
+ raw: await (await import("node:fs/promises")).readFile(path, "utf-8"),
2030
+ path
2031
+ };
2032
+ } catch (err) {
2033
+ if (isNotFound(err)) return null;
2034
+ throw err;
2035
+ }
2036
+ }
2037
+ function resolveWorkspacePath(ctx, fileName) {
2038
+ if (isAbsolute(fileName)) return fileName;
2039
+ return resolve(ctx.cwd ?? process.cwd(), fileName);
2040
+ }
2041
+ function isNotFound(err) {
2042
+ return typeof err === "object" && err !== null && "code" in err && err.code === "ENOENT";
2043
+ }
2044
+ function parsePolicyFile(raw) {
2045
+ try {
2046
+ return {
2047
+ ok: true,
2048
+ value: JSON5.parse(raw)
2049
+ };
2050
+ } catch (err) {
2051
+ return {
2052
+ ok: false,
2053
+ message: err instanceof Error ? err.message : String(err)
2054
+ };
2055
+ }
2056
+ }
2057
+ function workspaceRepairsEnabled(ctx) {
2058
+ return policySettings(ctx).workspaceRepairs === true;
2059
+ }
2060
+ function workspaceRepairsDisabledResult(fileName) {
2061
+ return {
2062
+ status: "skipped",
2063
+ reason: "workspace repairs are disabled",
2064
+ changes: [],
2065
+ warnings: [`Skipped ${fileName} repair. Enable plugins.entries.policy.config.workspaceRepairs to let doctor --fix edit workspace files.`]
2066
+ };
2067
+ }
2068
+ function readChannelDenyRules(policy, policyDocName) {
2069
+ if (!isRecord(policy) || !isRecord(policy.channels) || !Array.isArray(policy.channels.denyRules)) return [];
2070
+ return policy.channels.denyRules.map((rule, index) => ({
2071
+ rule,
2072
+ index
2073
+ })).filter((entry) => isChannelDenyRule(entry.rule)).map(({ rule, index }) => {
2074
+ const next = {
2075
+ when: rule.when,
2076
+ requirement: `oc://${policyDocName}/channels/denyRules/#${index}`
2077
+ };
2078
+ if (rule.id !== void 0) next.id = rule.id;
2079
+ if (rule.reason !== void 0) next.reason = rule.reason;
2080
+ return next;
2081
+ });
2082
+ }
2083
+ function isChannelDenyRule(value) {
2084
+ return isRecord(value) && (value.id === void 0 || typeof value.id === "string") && (value.reason === void 0 || typeof value.reason === "string") && isRecord(value.when) && typeof value.when.provider === "string";
2085
+ }
2086
+ function channelIdsFromFindings(findings) {
2087
+ return [...new Set(findings.filter((finding) => finding.checkId === CHECK_IDS.policyDeniedChannelProvider).map((finding) => finding.ocPath?.match(/^oc:\/\/daocore\.config\/channels\/(.+)$/)?.[1]).filter((id) => id !== void 0 && id !== ""))];
2088
+ }
2089
+ function disableChannels(cfg, channelIds) {
2090
+ if (!isRecord(cfg.channels)) return {
2091
+ config: cfg,
2092
+ changed: []
2093
+ };
2094
+ const channels = { ...cfg.channels };
2095
+ const changed = [];
2096
+ for (const id of channelIds) {
2097
+ const current = channels[id];
2098
+ if (!isRecord(current) || current.enabled === false) continue;
2099
+ channels[id] = {
2100
+ ...current,
2101
+ enabled: false
2102
+ };
2103
+ changed.push(id);
2104
+ }
2105
+ if (changed.length === 0) return {
2106
+ config: cfg,
2107
+ changed
2108
+ };
2109
+ return {
2110
+ config: {
2111
+ ...cfg,
2112
+ channels
2113
+ },
2114
+ changed
2115
+ };
2116
+ }
2117
+ function policySettings(ctx) {
2118
+ const pluginConfig = ctx.cfg.plugins?.entries?.["policy"]?.config;
2119
+ if (!isRecord(pluginConfig)) return {};
2120
+ return pluginConfig;
2121
+ }
2122
+ function policyChecksEnabled(ctx, settings) {
2123
+ const entry = ctx.cfg.plugins?.entries?.["policy"];
2124
+ if (!isRecord(entry) || entry.enabled === false) return false;
2125
+ return settings.enabled !== false;
2126
+ }
2127
+ function requiredToolMetadata(policy) {
2128
+ return new Set(readPolicyStringArray(policy, ["tools", "requireMetadata"]) ?? []);
2129
+ }
2130
+ function requiredAuthProfileMetadata(policy) {
2131
+ const entries = readPolicyStringArray(policy, [
2132
+ "auth",
2133
+ "profiles",
2134
+ "requireMetadata"
2135
+ ]) ?? [];
2136
+ return new Set(entries.filter((entry) => SUPPORTED_AUTH_PROFILE_METADATA.includes(entry)));
2137
+ }
2138
+ function authProfileHasMetadata(profile, metadata) {
2139
+ if (metadata === "provider") return profile.provider !== void 0 && profile.provider.trim() !== "";
2140
+ return SUPPORTED_AUTH_PROFILE_MODES.includes(profile.mode);
2141
+ }
2142
+ function readPolicyStringArray(policy, path, options = {}) {
2143
+ let current = policy;
2144
+ for (const part of path) {
2145
+ if (!isRecord(current)) return;
2146
+ current = current[part];
2147
+ }
2148
+ if (!Array.isArray(current) || !current.every((entry) => typeof entry === "string")) return;
2149
+ const lowercase = options.lowercase ?? true;
2150
+ return current.map((entry) => {
2151
+ const trimmed = entry.trim();
2152
+ return lowercase ? trimmed.toLowerCase() : trimmed;
2153
+ }).filter(Boolean);
2154
+ }
2155
+ function readStringList(policy, path, options) {
2156
+ return readPolicyStringArray(policy, path, options) ?? [];
2157
+ }
2158
+ function readPolicyBoolean(policy, path) {
2159
+ let current = policy;
2160
+ for (const part of path) {
2161
+ if (!isRecord(current)) return;
2162
+ current = current[part];
2163
+ }
2164
+ return typeof current === "boolean" ? current : void 0;
2165
+ }
2166
+ function policyPathSetting(ctx) {
2167
+ const configured = policySettings(ctx).path;
2168
+ return typeof configured === "string" && configured.trim() !== "" ? configured.trim() : "policy.jsonc";
2169
+ }
2170
+ function policyDisplayName(ctx) {
2171
+ const configured = policyPathSetting(ctx);
2172
+ return isAbsolute(configured) ? basename(configured) : configured;
2173
+ }
2174
+ function isRecord(value) {
2175
+ return typeof value === "object" && value !== null && !Array.isArray(value);
2176
+ }
2177
+ //#endregion
2178
+ export { createPolicyAttestation as i, evaluatePolicy as n, registerPolicyDoctorChecks as r, POLICY_CHECK_IDS as t };