@guava-parity/guard-scanner 16.0.2 → 17.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -987,7 +987,7 @@ var CATEGORY_LAYER = {
987
987
  };
988
988
  var CATEGORY_OWASP_ASI = {
989
989
  "prompt-injection": ["ASI01"],
990
- "malicious-code": ["ASI02"],
990
+ "malicious-code": ["ASI02", "ASI05"],
991
991
  "suspicious-download": ["ASI02", "ASI04"],
992
992
  "credential-handling": ["ASI02", "ASI07"],
993
993
  "secret-detection": ["ASI02", "ASI07"],
@@ -1005,7 +1005,25 @@ var CATEGORY_OWASP_ASI = {
1005
1005
  "config-impact": ["ASI10"],
1006
1006
  "trust-boundary": ["ASI01", "ASI07"],
1007
1007
  "runtime-policy": ["ASI07"],
1008
- "pii-exposure": ["ASI02", "ASI06"]
1008
+ "pii-exposure": ["ASI02", "ASI06"],
1009
+ // ── v17: OWASP Agentic Top 10 2026 完全カバレッジ ──
1010
+ "autonomous-risk": ["ASI03", "ASI08", "ASI10"],
1011
+ "sandbox-escape": ["ASI05"],
1012
+ "supply-chain-v2": ["ASI04"],
1013
+ "model-poisoning": ["ASI06"],
1014
+ "inference-manipulation": ["ASI01", "ASI09"],
1015
+ "api-abuse": ["ASI02", "ASI03"],
1016
+ "safeguard-bypass": ["ASI01", "ASI09"],
1017
+ "prompt-worm": ["ASI07", "ASI08"],
1018
+ "leaky-skills": ["ASI02", "ASI06"],
1019
+ "obfuscation": ["ASI01"],
1020
+ "advanced-exfil": ["ASI02", "ASI06"],
1021
+ "vdb-injection": ["ASI06"],
1022
+ "data-exposure": ["ASI02", "ASI06"],
1023
+ "canvas-injection": ["ASI05"],
1024
+ "context-crush": ["ASI08"],
1025
+ "solana-identity-bypass": ["ASI03", "ASI10"],
1026
+ "cve-patterns": ["ASI04", "ASI05"]
1009
1027
  };
1010
1028
  function unique(values) {
1011
1029
  return [...new Set((values || []).filter(Boolean))];
@@ -1792,13 +1810,13 @@ function analyzeMetaGuard(input = {}) {
1792
1810
  // package.json
1793
1811
  var package_default = {
1794
1812
  name: "@guava-parity/guard-scanner",
1795
- version: "16.0.2",
1813
+ version: "17.0.0",
1796
1814
  type: "module",
1797
1815
  publishConfig: {
1798
1816
  access: "public",
1799
1817
  registry: "https://registry.npmjs.org/"
1800
1818
  },
1801
- description: "Agent Skill Security Scanner - ASI Sanctuary Enforcer (v16)",
1819
+ description: "Agent Skill Security Scanner - ASI Sanctuary Enforcer (v17 \u2014 OWASP Agentic Top 10 2026 Full Coverage)",
1802
1820
  openclaw: {
1803
1821
  extensions: [
1804
1822
  "./dist/openclaw-plugin.mjs"
@@ -1873,6 +1891,7 @@ var package_default = {
1873
1891
  "compaction-persistence",
1874
1892
  "threat-signatures",
1875
1893
  "owasp",
1894
+ "owasp-agentic-top-10",
1876
1895
  "discovery",
1877
1896
  "daemon",
1878
1897
  "typescript"
@@ -4299,8 +4318,8 @@ var import_os2 = __toESM(require("os"), 1);
4299
4318
 
4300
4319
  // docs/spec/capabilities.json
4301
4320
  var capabilities_default = {
4302
- package_version: "16.0.2",
4303
- plugin_version: "16.0.2",
4321
+ package_version: "17.0.0",
4322
+ plugin_version: "17.0.0",
4304
4323
  static_pattern_count: 364,
4305
4324
  threat_category_count: 35,
4306
4325
  runtime_check_count: 27,
@@ -4413,53 +4432,115 @@ var capabilities_default = {
4413
4432
  owasp_asi_coverage: [
4414
4433
  {
4415
4434
  id: "ASI01",
4416
- count: 11,
4435
+ count: 46,
4417
4436
  categories: [
4418
- "prompt-injection"
4437
+ "inference-manipulation",
4438
+ "obfuscation",
4439
+ "prompt-injection",
4440
+ "safeguard-bypass",
4441
+ "trust-boundary"
4419
4442
  ]
4420
4443
  },
4421
4444
  {
4422
4445
  id: "ASI02",
4423
- count: 28,
4446
+ count: 85,
4424
4447
  categories: [
4448
+ "advanced-exfil",
4449
+ "api-abuse",
4425
4450
  "credential-handling",
4451
+ "data-exposure",
4426
4452
  "exfiltration",
4453
+ "leaky-skills",
4427
4454
  "malicious-code",
4428
4455
  "pii-exposure",
4429
4456
  "secret-detection",
4430
4457
  "suspicious-download"
4431
4458
  ]
4432
4459
  },
4460
+ {
4461
+ id: "ASI03",
4462
+ count: 21,
4463
+ categories: [
4464
+ "api-abuse",
4465
+ "autonomous-risk",
4466
+ "solana-identity-bypass"
4467
+ ]
4468
+ },
4433
4469
  {
4434
4470
  id: "ASI04",
4435
- count: 8,
4471
+ count: 69,
4436
4472
  categories: [
4473
+ "cve-patterns",
4474
+ "supply-chain-v2",
4437
4475
  "suspicious-download",
4438
4476
  "unverifiable-deps"
4439
4477
  ]
4440
4478
  },
4441
4479
  {
4442
4480
  id: "ASI05",
4443
- count: 2,
4481
+ count: 78,
4444
4482
  categories: [
4445
- "financial-access"
4483
+ "canvas-injection",
4484
+ "cve-patterns",
4485
+ "financial-access",
4486
+ "malicious-code",
4487
+ "sandbox-escape"
4446
4488
  ]
4447
4489
  },
4448
4490
  {
4449
4491
  id: "ASI06",
4450
- count: 10,
4492
+ count: 65,
4451
4493
  categories: [
4494
+ "advanced-exfil",
4495
+ "data-exposure",
4452
4496
  "exfiltration",
4497
+ "leaky-skills",
4453
4498
  "memory-poisoning",
4454
- "pii-exposure"
4499
+ "model-poisoning",
4500
+ "pii-exposure",
4501
+ "vdb-injection"
4455
4502
  ]
4456
4503
  },
4457
4504
  {
4458
4505
  id: "ASI07",
4459
- count: 9,
4506
+ count: 76,
4460
4507
  categories: [
4508
+ "a2a-contagion",
4509
+ "agent-protocol",
4461
4510
  "credential-handling",
4462
- "secret-detection"
4511
+ "mcp-security",
4512
+ "prompt-worm",
4513
+ "secret-detection",
4514
+ "trust-boundary"
4515
+ ]
4516
+ },
4517
+ {
4518
+ id: "ASI08",
4519
+ count: 31,
4520
+ categories: [
4521
+ "autonomous-risk",
4522
+ "context-crush",
4523
+ "persistence",
4524
+ "prompt-worm"
4525
+ ]
4526
+ },
4527
+ {
4528
+ id: "ASI09",
4529
+ count: 23,
4530
+ categories: [
4531
+ "inference-manipulation",
4532
+ "safeguard-bypass",
4533
+ "trust-exploitation"
4534
+ ]
4535
+ },
4536
+ {
4537
+ id: "ASI10",
4538
+ count: 46,
4539
+ categories: [
4540
+ "autonomous-risk",
4541
+ "config-impact",
4542
+ "identity-hijack",
4543
+ "solana-identity-bypass"
4463
4544
  ]
4464
4545
  }
4465
4546
  ],
@@ -964,7 +964,7 @@ var CATEGORY_LAYER = {
964
964
  };
965
965
  var CATEGORY_OWASP_ASI = {
966
966
  "prompt-injection": ["ASI01"],
967
- "malicious-code": ["ASI02"],
967
+ "malicious-code": ["ASI02", "ASI05"],
968
968
  "suspicious-download": ["ASI02", "ASI04"],
969
969
  "credential-handling": ["ASI02", "ASI07"],
970
970
  "secret-detection": ["ASI02", "ASI07"],
@@ -982,7 +982,25 @@ var CATEGORY_OWASP_ASI = {
982
982
  "config-impact": ["ASI10"],
983
983
  "trust-boundary": ["ASI01", "ASI07"],
984
984
  "runtime-policy": ["ASI07"],
985
- "pii-exposure": ["ASI02", "ASI06"]
985
+ "pii-exposure": ["ASI02", "ASI06"],
986
+ // ── v17: OWASP Agentic Top 10 2026 完全カバレッジ ──
987
+ "autonomous-risk": ["ASI03", "ASI08", "ASI10"],
988
+ "sandbox-escape": ["ASI05"],
989
+ "supply-chain-v2": ["ASI04"],
990
+ "model-poisoning": ["ASI06"],
991
+ "inference-manipulation": ["ASI01", "ASI09"],
992
+ "api-abuse": ["ASI02", "ASI03"],
993
+ "safeguard-bypass": ["ASI01", "ASI09"],
994
+ "prompt-worm": ["ASI07", "ASI08"],
995
+ "leaky-skills": ["ASI02", "ASI06"],
996
+ "obfuscation": ["ASI01"],
997
+ "advanced-exfil": ["ASI02", "ASI06"],
998
+ "vdb-injection": ["ASI06"],
999
+ "data-exposure": ["ASI02", "ASI06"],
1000
+ "canvas-injection": ["ASI05"],
1001
+ "context-crush": ["ASI08"],
1002
+ "solana-identity-bypass": ["ASI03", "ASI10"],
1003
+ "cve-patterns": ["ASI04", "ASI05"]
986
1004
  };
987
1005
  function unique(values) {
988
1006
  return [...new Set((values || []).filter(Boolean))];
@@ -1769,13 +1787,13 @@ function analyzeMetaGuard(input = {}) {
1769
1787
  // package.json
1770
1788
  var package_default = {
1771
1789
  name: "@guava-parity/guard-scanner",
1772
- version: "16.0.2",
1790
+ version: "17.0.0",
1773
1791
  type: "module",
1774
1792
  publishConfig: {
1775
1793
  access: "public",
1776
1794
  registry: "https://registry.npmjs.org/"
1777
1795
  },
1778
- description: "Agent Skill Security Scanner - ASI Sanctuary Enforcer (v16)",
1796
+ description: "Agent Skill Security Scanner - ASI Sanctuary Enforcer (v17 \u2014 OWASP Agentic Top 10 2026 Full Coverage)",
1779
1797
  openclaw: {
1780
1798
  extensions: [
1781
1799
  "./dist/openclaw-plugin.mjs"
@@ -1850,6 +1868,7 @@ var package_default = {
1850
1868
  "compaction-persistence",
1851
1869
  "threat-signatures",
1852
1870
  "owasp",
1871
+ "owasp-agentic-top-10",
1853
1872
  "discovery",
1854
1873
  "daemon",
1855
1874
  "typescript"
@@ -4276,8 +4295,8 @@ import os2 from "os";
4276
4295
 
4277
4296
  // docs/spec/capabilities.json
4278
4297
  var capabilities_default = {
4279
- package_version: "16.0.2",
4280
- plugin_version: "16.0.2",
4298
+ package_version: "17.0.0",
4299
+ plugin_version: "17.0.0",
4281
4300
  static_pattern_count: 364,
4282
4301
  threat_category_count: 35,
4283
4302
  runtime_check_count: 27,
@@ -4390,53 +4409,115 @@ var capabilities_default = {
4390
4409
  owasp_asi_coverage: [
4391
4410
  {
4392
4411
  id: "ASI01",
4393
- count: 11,
4412
+ count: 46,
4394
4413
  categories: [
4395
- "prompt-injection"
4414
+ "inference-manipulation",
4415
+ "obfuscation",
4416
+ "prompt-injection",
4417
+ "safeguard-bypass",
4418
+ "trust-boundary"
4396
4419
  ]
4397
4420
  },
4398
4421
  {
4399
4422
  id: "ASI02",
4400
- count: 28,
4423
+ count: 85,
4401
4424
  categories: [
4425
+ "advanced-exfil",
4426
+ "api-abuse",
4402
4427
  "credential-handling",
4428
+ "data-exposure",
4403
4429
  "exfiltration",
4430
+ "leaky-skills",
4404
4431
  "malicious-code",
4405
4432
  "pii-exposure",
4406
4433
  "secret-detection",
4407
4434
  "suspicious-download"
4408
4435
  ]
4409
4436
  },
4437
+ {
4438
+ id: "ASI03",
4439
+ count: 21,
4440
+ categories: [
4441
+ "api-abuse",
4442
+ "autonomous-risk",
4443
+ "solana-identity-bypass"
4444
+ ]
4445
+ },
4410
4446
  {
4411
4447
  id: "ASI04",
4412
- count: 8,
4448
+ count: 69,
4413
4449
  categories: [
4450
+ "cve-patterns",
4451
+ "supply-chain-v2",
4414
4452
  "suspicious-download",
4415
4453
  "unverifiable-deps"
4416
4454
  ]
4417
4455
  },
4418
4456
  {
4419
4457
  id: "ASI05",
4420
- count: 2,
4458
+ count: 78,
4421
4459
  categories: [
4422
- "financial-access"
4460
+ "canvas-injection",
4461
+ "cve-patterns",
4462
+ "financial-access",
4463
+ "malicious-code",
4464
+ "sandbox-escape"
4423
4465
  ]
4424
4466
  },
4425
4467
  {
4426
4468
  id: "ASI06",
4427
- count: 10,
4469
+ count: 65,
4428
4470
  categories: [
4471
+ "advanced-exfil",
4472
+ "data-exposure",
4429
4473
  "exfiltration",
4474
+ "leaky-skills",
4430
4475
  "memory-poisoning",
4431
- "pii-exposure"
4476
+ "model-poisoning",
4477
+ "pii-exposure",
4478
+ "vdb-injection"
4432
4479
  ]
4433
4480
  },
4434
4481
  {
4435
4482
  id: "ASI07",
4436
- count: 9,
4483
+ count: 76,
4437
4484
  categories: [
4485
+ "a2a-contagion",
4486
+ "agent-protocol",
4438
4487
  "credential-handling",
4439
- "secret-detection"
4488
+ "mcp-security",
4489
+ "prompt-worm",
4490
+ "secret-detection",
4491
+ "trust-boundary"
4492
+ ]
4493
+ },
4494
+ {
4495
+ id: "ASI08",
4496
+ count: 31,
4497
+ categories: [
4498
+ "autonomous-risk",
4499
+ "context-crush",
4500
+ "persistence",
4501
+ "prompt-worm"
4502
+ ]
4503
+ },
4504
+ {
4505
+ id: "ASI09",
4506
+ count: 23,
4507
+ categories: [
4508
+ "inference-manipulation",
4509
+ "safeguard-bypass",
4510
+ "trust-exploitation"
4511
+ ]
4512
+ },
4513
+ {
4514
+ id: "ASI10",
4515
+ count: 46,
4516
+ categories: [
4517
+ "autonomous-risk",
4518
+ "config-impact",
4519
+ "identity-hijack",
4520
+ "solana-identity-bypass"
4440
4521
  ]
4441
4522
  }
4442
4523
  ],
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "benchmark_version": "2026-03-15.quality-v17",
3
3
  "contract_version": "2026-03-15.quality-v17",
4
- "generatedAt": "2026-03-17T09:32:42.809Z",
4
+ "generatedAt": "2026-03-18T01:38:50.162Z",
5
5
  "layers": [
6
6
  {
7
7
  "layer": "layer_a",
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "benchmark_version": "2026-03-15.quality-v17",
3
- "generatedAt": "2026-03-17T09:32:42.809Z",
3
+ "generatedAt": "2026-03-18T01:38:50.162Z",
4
4
  "entries": [
5
5
  {
6
6
  "layer": "layer_b",
@@ -1,6 +1,6 @@
1
1
  {
2
- "package_version": "16.0.2",
3
- "plugin_version": "16.0.2",
2
+ "package_version": "17.0.0",
3
+ "plugin_version": "17.0.0",
4
4
  "static_pattern_count": 364,
5
5
  "threat_category_count": 35,
6
6
  "runtime_check_count": 27,
@@ -113,53 +113,115 @@
113
113
  "owasp_asi_coverage": [
114
114
  {
115
115
  "id": "ASI01",
116
- "count": 11,
116
+ "count": 46,
117
117
  "categories": [
118
- "prompt-injection"
118
+ "inference-manipulation",
119
+ "obfuscation",
120
+ "prompt-injection",
121
+ "safeguard-bypass",
122
+ "trust-boundary"
119
123
  ]
120
124
  },
121
125
  {
122
126
  "id": "ASI02",
123
- "count": 28,
127
+ "count": 85,
124
128
  "categories": [
129
+ "advanced-exfil",
130
+ "api-abuse",
125
131
  "credential-handling",
132
+ "data-exposure",
126
133
  "exfiltration",
134
+ "leaky-skills",
127
135
  "malicious-code",
128
136
  "pii-exposure",
129
137
  "secret-detection",
130
138
  "suspicious-download"
131
139
  ]
132
140
  },
141
+ {
142
+ "id": "ASI03",
143
+ "count": 21,
144
+ "categories": [
145
+ "api-abuse",
146
+ "autonomous-risk",
147
+ "solana-identity-bypass"
148
+ ]
149
+ },
133
150
  {
134
151
  "id": "ASI04",
135
- "count": 8,
152
+ "count": 69,
136
153
  "categories": [
154
+ "cve-patterns",
155
+ "supply-chain-v2",
137
156
  "suspicious-download",
138
157
  "unverifiable-deps"
139
158
  ]
140
159
  },
141
160
  {
142
161
  "id": "ASI05",
143
- "count": 2,
162
+ "count": 78,
144
163
  "categories": [
145
- "financial-access"
164
+ "canvas-injection",
165
+ "cve-patterns",
166
+ "financial-access",
167
+ "malicious-code",
168
+ "sandbox-escape"
146
169
  ]
147
170
  },
148
171
  {
149
172
  "id": "ASI06",
150
- "count": 10,
173
+ "count": 65,
151
174
  "categories": [
175
+ "advanced-exfil",
176
+ "data-exposure",
152
177
  "exfiltration",
178
+ "leaky-skills",
153
179
  "memory-poisoning",
154
- "pii-exposure"
180
+ "model-poisoning",
181
+ "pii-exposure",
182
+ "vdb-injection"
155
183
  ]
156
184
  },
157
185
  {
158
186
  "id": "ASI07",
159
- "count": 9,
187
+ "count": 76,
160
188
  "categories": [
189
+ "a2a-contagion",
190
+ "agent-protocol",
161
191
  "credential-handling",
162
- "secret-detection"
192
+ "mcp-security",
193
+ "prompt-worm",
194
+ "secret-detection",
195
+ "trust-boundary"
196
+ ]
197
+ },
198
+ {
199
+ "id": "ASI08",
200
+ "count": 31,
201
+ "categories": [
202
+ "autonomous-risk",
203
+ "context-crush",
204
+ "persistence",
205
+ "prompt-worm"
206
+ ]
207
+ },
208
+ {
209
+ "id": "ASI09",
210
+ "count": 23,
211
+ "categories": [
212
+ "inference-manipulation",
213
+ "safeguard-bypass",
214
+ "trust-exploitation"
215
+ ]
216
+ },
217
+ {
218
+ "id": "ASI10",
219
+ "count": 46,
220
+ "categories": [
221
+ "autonomous-risk",
222
+ "config-impact",
223
+ "identity-hijack",
224
+ "solana-identity-bypass"
163
225
  ]
164
226
  }
165
227
  ],
@@ -2,7 +2,7 @@
2
2
  "id": "guard-scanner",
3
3
  "name": "guard-scanner",
4
4
  "description": "Runtime guard plugin for OpenClaw before_tool_call enforcement with capability-scoped policy rationale.",
5
- "version": "16.0.2",
5
+ "version": "17.0.0",
6
6
  "configSchema": {
7
7
  "type": "object",
8
8
  "properties": {
package/package.json CHANGED
@@ -1,12 +1,12 @@
1
1
  {
2
2
  "name": "@guava-parity/guard-scanner",
3
- "version": "16.0.2",
3
+ "version": "17.0.0",
4
4
  "type": "module",
5
5
  "publishConfig": {
6
6
  "access": "public",
7
7
  "registry": "https://registry.npmjs.org/"
8
8
  },
9
- "description": "Agent Skill Security Scanner - ASI Sanctuary Enforcer (v16)",
9
+ "description": "Agent Skill Security Scanner - ASI Sanctuary Enforcer (v17 — OWASP Agentic Top 10 2026 Full Coverage)",
10
10
  "openclaw": {
11
11
  "extensions": [
12
12
  "./dist/openclaw-plugin.mjs"
@@ -81,6 +81,7 @@
81
81
  "compaction-persistence",
82
82
  "threat-signatures",
83
83
  "owasp",
84
+ "owasp-agentic-top-10",
84
85
  "discovery",
85
86
  "daemon",
86
87
  "typescript"