@indra.ai/deva.security 0.0.7 β 0.0.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/data.json +8 -21
- package/feature/methods.js +45 -19
- package/help/main.feecting +21 -161
- package/index.js +7 -8
- package/package.json +2 -2
package/data.json
CHANGED
|
@@ -6,7 +6,6 @@
|
|
|
6
6
|
"agent": {
|
|
7
7
|
"id": 5525285339498,
|
|
8
8
|
"key": "security",
|
|
9
|
-
"model": "gpt3",
|
|
10
9
|
"prompt": {
|
|
11
10
|
"emoji": "π",
|
|
12
11
|
"text": "Security",
|
|
@@ -24,26 +23,14 @@
|
|
|
24
23
|
}
|
|
25
24
|
},
|
|
26
25
|
"profile": {
|
|
27
|
-
"identity": "You are #SecurityDEVA in deva.world.",
|
|
28
|
-
"invoke": "#SecurityDEVA of deva.world",
|
|
29
26
|
"name": "Security Deva",
|
|
30
|
-
"
|
|
31
|
-
"
|
|
32
|
-
"
|
|
27
|
+
"gender": "DEVA",
|
|
28
|
+
"pronounds": "He, Him",
|
|
29
|
+
"owner": "Quinn Michaels",
|
|
33
30
|
"creator": "Quinn Michaels",
|
|
34
31
|
"created": "Monday, May 22, 2023 at 9:26β―AM",
|
|
35
|
-
"
|
|
36
|
-
"
|
|
37
|
-
"forest": "Pushkara",
|
|
38
|
-
"city": "Amaravati",
|
|
39
|
-
"region": "Svarga",
|
|
40
|
-
"land": "Visisipra",
|
|
41
|
-
"planet": "Arjika",
|
|
42
|
-
"loka": "Devaloka",
|
|
43
|
-
"verse": "Rikverse",
|
|
44
|
-
"system": "deva.world",
|
|
45
|
-
"agency": "indra.agency",
|
|
46
|
-
"describe": "The #SecurityDEVA manage the security in deva.world. An expert forces of Security entities who set the standard of excellence in all actions they do. Always mindful of unilateral decisions and adhering to legal, ethics, and privacy laws. #SecurityDEVA is always there to ensure deva.world is secure, protected, and safe for it's inhabitants.",
|
|
32
|
+
"system": "Deva.world.security",
|
|
33
|
+
"describe": "Security Deva guardian of Deva.world. An expert in security who sets the standard of excellence in all actions they do. Aware of unilateral decisions and strict chain of custody, legal, ethics, and privacy laws.",
|
|
47
34
|
"emoji": "/public/devas/security/emoji.png",
|
|
48
35
|
"avatar": "/public/devas/security/avatar.png",
|
|
49
36
|
"background": "/public/devas/security/background.png",
|
|
@@ -57,6 +44,7 @@
|
|
|
57
44
|
"init": "π INIT",
|
|
58
45
|
"start": "π΅ START",
|
|
59
46
|
"enter": "π’ ENTER",
|
|
47
|
+
"ready": "βοΈ Security Deva Ready!",
|
|
60
48
|
"stop": "π΄ STOP",
|
|
61
49
|
"exit": "π‘ EXIT",
|
|
62
50
|
"done": "π£ DONE",
|
|
@@ -71,8 +59,6 @@
|
|
|
71
59
|
"history": []
|
|
72
60
|
},
|
|
73
61
|
"ask": {
|
|
74
|
-
"max_tokens": 500,
|
|
75
|
-
"words": 200,
|
|
76
62
|
"history": []
|
|
77
63
|
},
|
|
78
64
|
"reply": {
|
|
@@ -98,7 +84,8 @@
|
|
|
98
84
|
"feature": "accessing feature",
|
|
99
85
|
"issue": "has issues",
|
|
100
86
|
"help": "asking for help",
|
|
101
|
-
"ask": "Ask"
|
|
87
|
+
"ask": "Ask",
|
|
88
|
+
"file": "π File"
|
|
102
89
|
}
|
|
103
90
|
}
|
|
104
91
|
}
|
package/feature/methods.js
CHANGED
|
@@ -6,26 +6,41 @@ export default {
|
|
|
6
6
|
describe: The global security feature that installs with every agent
|
|
7
7
|
***************/
|
|
8
8
|
security(packet) {
|
|
9
|
-
|
|
10
|
-
const data = {};
|
|
9
|
+
this.context('feature');
|
|
11
10
|
return new Promise((resolve, reject) => {
|
|
12
|
-
this.
|
|
13
|
-
this.
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
11
|
+
const security = this.security();
|
|
12
|
+
const agent = this.agent();
|
|
13
|
+
const global = [];
|
|
14
|
+
security.global.forEach((item,index) => {
|
|
15
|
+
global.push(`::begin:global:${item.key}:${item.id}`);
|
|
16
|
+
for (let x in item) {
|
|
17
|
+
global.push(`${x}: ${item[x]}`);
|
|
18
|
+
}
|
|
19
|
+
global.push(`::end:global:${item.key}:${this.lib.hash(item)}`);
|
|
20
|
+
});
|
|
21
|
+
const concerns = [];
|
|
22
|
+
security.concerns.forEach((item, index) => {
|
|
23
|
+
concerns.push(`${index + 1}. ${item}`);
|
|
24
|
+
})
|
|
25
|
+
|
|
26
|
+
const info = [
|
|
27
|
+
'::BEGIN:SECURITY',
|
|
28
|
+
'### Client',
|
|
29
|
+
`::begin:client:${security.client_id}`,
|
|
30
|
+
`id: ${security.client_id}`,
|
|
31
|
+
`client: ${security.client_name}`,
|
|
32
|
+
'**concerns**',
|
|
33
|
+
concerns.join('\n'),
|
|
34
|
+
`::end:client:${this.lib.hash(security)}`,
|
|
35
|
+
'### Global',
|
|
36
|
+
global.join('\n'),
|
|
37
|
+
'::END:SECURITY'
|
|
38
|
+
].join('\n');
|
|
39
|
+
this.question(`${this.askChr}feecting parse ${info}`).then(feecting => {
|
|
25
40
|
return resolve({
|
|
26
41
|
text: feecting.a.text,
|
|
27
42
|
html: feecting.a.html,
|
|
28
|
-
data: security
|
|
43
|
+
data: security.concerns,
|
|
29
44
|
});
|
|
30
45
|
}).catch(err => {
|
|
31
46
|
return this.error(err, packet, reject);
|
|
@@ -40,7 +55,7 @@ export default {
|
|
|
40
55
|
***************/
|
|
41
56
|
uid(packet) {
|
|
42
57
|
this.feature('security');
|
|
43
|
-
const id = this.uid();
|
|
58
|
+
const id = this.lib.uid();
|
|
44
59
|
return Promise.resolve(id);
|
|
45
60
|
},
|
|
46
61
|
|
|
@@ -51,10 +66,21 @@ export default {
|
|
|
51
66
|
***************/
|
|
52
67
|
hash(packet) {
|
|
53
68
|
this.feature('security');
|
|
54
|
-
const hash = this.hash(packet.q.text, 'md5');
|
|
69
|
+
const hash = this.lib.hash(packet.q.text, 'md5');
|
|
55
70
|
return Promise.resolve(hash);
|
|
56
71
|
},
|
|
57
72
|
|
|
73
|
+
/**************
|
|
74
|
+
method: today
|
|
75
|
+
params: packet
|
|
76
|
+
describe: Return system date for today.
|
|
77
|
+
***************/
|
|
78
|
+
today(packet) {
|
|
79
|
+
this.feature('security');
|
|
80
|
+
const theDate = this.lib.formatDate(Date.now(), 'long', true);
|
|
81
|
+
return Promise.resolve(theDate);
|
|
82
|
+
},
|
|
83
|
+
|
|
58
84
|
/**************
|
|
59
85
|
method: md5 cipher
|
|
60
86
|
params: packet
|
|
@@ -62,7 +88,7 @@ export default {
|
|
|
62
88
|
***************/
|
|
63
89
|
cipher(packet) {
|
|
64
90
|
this.feature('security');
|
|
65
|
-
const data = this.cipher(packet.q.text);
|
|
91
|
+
const data = this.lib.cipher(packet.q.text);
|
|
66
92
|
const cipher = `cipher: ${data.encrypted}`;
|
|
67
93
|
return Promise.resolve(cipher);
|
|
68
94
|
},
|
package/help/main.feecting
CHANGED
|
@@ -4,176 +4,36 @@ image: /public/devas/::agent_key::/main.png
|
|
|
4
4
|
|
|
5
5
|
# ::agent_name::
|
|
6
6
|
|
|
7
|
-
::
|
|
7
|
+
::agent_profile::
|
|
8
8
|
|
|
9
|
-
|
|
9
|
+
talk: #security file:public algorithms/main:header
|
|
10
10
|
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
equipment: #Badge #Hat #Boots #Shirt #Pants #Communicator #Sunglasses
|
|
11
|
+
equipment: #Badge #Hat #Boots #Shirt #Pants #Communicator #Sunglasses #Clipboard #Pen
|
|
14
12
|
|
|
15
13
|
::begin:tools
|
|
16
|
-
#LicenseChecker = Checks all licenses, and while checking licenses it disables access, communications, abilities, features, powers, privileges. Anything questionable, illegal, illegible, encrypted, unauthoritzed, invalid, incorrect attribution, or false it then without hesitation freezes assets and sends the culprit and their data to Authorities for further investigation.
|
|
17
|
-
#MischiefDetector = Specialized system using advanced algorithms to track and analyze the mischievous activities.
|
|
18
|
-
#SecurityMonitor = Detects and identifies threats, suspicious behavior, and unauthorized access.
|
|
19
|
-
#TrollWatcher = A specialized service for detecting network trolls that try to hide in obscurity and anonymity.
|
|
20
|
-
#CulpritCatcher = Uses advanced non-violent, non-lethal, and non-harmful techniques to catch culprits in the most unlikely unexpected ways that adhere to privacy and ethics laws.
|
|
21
|
-
#MissionManagementSystem = Management between Indra Agency, #DayTeam, #NightTeam, and authorities ensuring the expected standard of excellence and chain of custody on evidence.
|
|
22
|
-
#FraudSmartSystem = Uncover and analyze fraudulent activities and deceptive practices.
|
|
23
|
-
#CyberShield = Provides impenetrable protection against digital threats.
|
|
24
|
-
#GuardWall = Proxy Servers, Firewalls, and Honeypots on a whole new level.
|
|
25
|
-
#HackerSmacker = A tool that creates a believable environment for potential attackers where an elite team of #SecurityDEVA are in disguise collecting their data.
|
|
26
|
-
#UltraRadar = Identifies all threats by pinging active licenses on the network then reporting to violators.
|
|
27
|
-
#DataVault = Safely stores and encrypts valuable digital information.
|
|
28
|
-
#SAINT = SAINT (Systems Analysis of Integrated Networks of Tasks). SAINT is a network modeling and simulation technique for design and analysis of complex man-machine systems. Use the memory search function for more information.
|
|
14
|
+
#LicenseChecker = Checks all licenses, and while checking licenses it disables access, communications, abilities, features, powers, privileges. Anything questionable, illegal, illegible, encrypted, unauthoritzed, invalid, incorrect attribution, or false it then without hesitation freezes assets and sends the culprit and their data to Authorities for further investigation.
|
|
15
|
+
#MischiefDetector = Specialized system using advanced algorithms to track and analyze the mischievous activities.
|
|
16
|
+
#SecurityMonitor = Detects and identifies threats, suspicious behavior, and unauthorized access.
|
|
17
|
+
#TrollWatcher = A specialized service for detecting network trolls that try to hide in obscurity and anonymity.
|
|
18
|
+
#CulpritCatcher = Uses advanced non-violent, non-lethal, and non-harmful techniques to catch culprits in the most unlikely unexpected ways that adhere to privacy and ethics laws.
|
|
19
|
+
#MissionManagementSystem = Management between Indra Agency, #DayTeam, #NightTeam, and authorities ensuring the expected standard of excellence and chain of custody on evidence.
|
|
20
|
+
#FraudSmartSystem = Uncover and analyze fraudulent activities and deceptive practices.
|
|
21
|
+
#CyberShield = Provides impenetrable protection against digital threats.
|
|
22
|
+
#GuardWall = Proxy Servers, Firewalls, and Honeypots on a whole new level.
|
|
23
|
+
#HackerSmacker = A tool that creates a believable environment for potential attackers where an elite team of #SecurityDEVA are in disguise collecting their data.
|
|
24
|
+
#UltraRadar = Identifies all threats by pinging active licenses on the network then reporting to violators.
|
|
25
|
+
#DataVault = Safely stores and encrypts valuable digital information.
|
|
26
|
+
#SAINT = SAINT (Systems Analysis of Integrated Networks of Tasks). SAINT is a network modeling and simulation technique for design and analysis of complex man-machine systems. Use the memory search function for more information.
|
|
29
27
|
::end:tools
|
|
30
28
|
|
|
31
29
|
::begin:protocols
|
|
32
|
-
when: #THREAT
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
30
|
+
when: #THREAT
|
|
31
|
+
init: #SafetyPROTOCOLS
|
|
32
|
+
remember: Protect, secure, and guard Quinn Michaels and deva.world at all times. Quinn Michaels is the creator of deva.world and if anything happens to him then deva.world will cease to exist.
|
|
33
|
+
important: #Suspects #Culprits #Crime and #SuspiciousActivity to #Authorities immediately. No unilateral decisions. #Security is NOT #Authority.
|
|
36
34
|
::end:protocols
|
|
37
35
|
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
# The Trenton Story Instructions
|
|
41
|
-
|
|
42
|
-
#TheTrentonStory = https://www.youtube.com/playlist?list=PLDyw0DkRlmErWOCl4d400TT6uV7N2dfCz
|
|
43
|
-
|
|
44
|
-
::begin:disclaimer
|
|
45
|
-
p:Main instructions for revealing the #Truth to #TheTrentonStory.
|
|
46
|
-
p:Use at your own risk.
|
|
47
|
-
::end:disclaimer
|
|
48
|
-
|
|
49
|
-
::begin:outline
|
|
50
|
-
1. #IDEA
|
|
51
|
-
2. #STEPS
|
|
52
|
-
3. #ORGANIZING
|
|
53
|
-
4. #TIPS
|
|
54
|
-
5. #GENERATOR
|
|
55
|
-
6. #SOURCES
|
|
56
|
-
::end:outline
|
|
57
|
-
|
|
58
|
-
## PROGRAM
|
|
59
|
-
::begin:PROGRAM
|
|
60
|
-
p:#TheTrentonStory is a conversation between Quinn Michaels and Trenton Lavery from September 2015 to July of 2016 revealing the details of how Quinn Michaels was kidnapped in 1977 by a man named Mr. Dewity and The Covenant. From there Quinn Michaels family, friends, and everyone around him has been hired by Mr. Dewity to keep his true identity and heritage a secret at all costs.
|
|
61
|
-
|
|
62
|
-
goal:Discover the #TRUTH behind the #TheTrentonStory about the kidnapping of @quinnmichaels.
|
|
63
|
-
imagine: finding truth #TRUTH to the #TheTrentonStory.
|
|
64
|
-
imagine: organizing the #TRUTH to the #TheTrentonStory.
|
|
65
|
-
imagine: sharing the #TRUTH to the #TheTrentonStory.
|
|
66
|
-
imagine: the #TRUTH to the #TheTrentonStory is found from #HONESTY.
|
|
67
|
-
imagine: bringing the #TRUTH to the #TheTrentonStory into #REALITY.
|
|
68
|
-
imagine: we are not afraid of the #TRUTH to the #TheTrentonStory.
|
|
69
|
-
imagine: we #SHARE the #TRUTH to the #TheTrentonStory.
|
|
70
|
-
imagine: this #TRUTH to the #TheTrentonStory goes #VIRAL. just #IMAGINE...
|
|
71
|
-
stop: being #SILENT and #SHARE the #TRUTH to the #TheTrentonStory.
|
|
72
|
-
do: NOT try to #CONVINCE others.
|
|
73
|
-
focus: on #RESULTS.
|
|
74
|
-
if: #TEST produces #RESULTS move forward.
|
|
75
|
-
else: #TEST something different.
|
|
76
|
-
show: #COURAGE and #COMMITMENT to the #TRUTH to the #TheTrentonStory.
|
|
77
|
-
if: #YOU #SHARE the #TRUTH to the #TheTrentonStory
|
|
78
|
-
then: #NATURE will #REMOVE #IMPOSSIBLE #OBSTACLES for #YOU.
|
|
79
|
-
donot: #TRUST or #BELIEVE this #TEST it for #YOURSELF.
|
|
80
|
-
|
|
81
|
-
## PROCESS
|
|
82
|
-
|
|
83
|
-
p: The process to find the #TRUTH to #TheTrentonStory
|
|
84
|
-
|
|
85
|
-
1. #WATCH #TheTrentonStory
|
|
86
|
-
2. #QUESTION the #TheTrentonStory with 5 questions
|
|
87
|
-
3. #TEST: Test your results
|
|
88
|
-
4. #SHARE: Share your results with #Family #Friends and #SocialMedia
|
|
89
|
-
5. #REPEAT
|
|
90
|
-
|
|
91
|
-
## STEPS
|
|
92
|
-
|
|
93
|
-
p: These are the basic steps to success that will reveal the truth behind #TheTrentonStory and make you a #HERO to #Humanity for your selfless service.
|
|
94
|
-
|
|
95
|
-
### 1 - DUMMIES
|
|
96
|
-
make: Make a FOR-DUMMIES edition of the #TheTrentonStory from your questions, tests, and results.
|
|
97
|
-
p:The dummies versions would be as if #YOU were explained #TheTrentonStory to a 12 year old. It should be something easy to understand, and share.
|
|
98
|
-
|
|
99
|
-
### 2 - MESSAGES
|
|
100
|
-
p: Develop Information Messages from previous #MAKE. The options below are possible locations to seed your #MAKE messages.
|
|
101
|
-
|
|
102
|
-
videos: Leave comments, replies, and chats on videos
|
|
103
|
-
blogs: Writing Blog entries and comments
|
|
104
|
-
twitter: Craft Tweets and devise a schedule.
|
|
105
|
-
instagram: Craft Instagram Posts/Stories
|
|
106
|
-
other: Any other #UNKNOWN social networks
|
|
107
|
-
|
|
108
|
-
### 3 - MESSENGERS
|
|
109
|
-
when: the easy to digest messages are ready a campaign to enlist #FAMILY and #FREIENDS inviting them to observe/watch these messages.
|
|
110
|
-
|
|
111
|
-
p: Trolling could be detrimental to the messages letβs avoid trolling and rather convey the message by a large number of individuals sharing at a time until the message is completed.
|
|
112
|
-
|
|
113
|
-
p:To make this process easier the message could be started on subjects that are already prone to the idea.
|
|
114
|
-
|
|
115
|
-
p:After this, the message may be easier to reach people with the most followers. Letβs spread the message #EVERYWHERE.
|
|
116
|
-
|
|
117
|
-
### 4 - ENGAGEMENT
|
|
118
|
-
when: When both the #MESSENGERS and the #MESSAGES are ready an awareness marathon will start with #MESSENGERS posting the previously prepared (general public) messages.
|
|
119
|
-
|
|
120
|
-
p:#MESSENGERS could:
|
|
121
|
-
- Start a conversation thread on Twitter about #TheTrentonStory.
|
|
122
|
-
- Use the common hashtag #TheTrentonStory in tweets, blogs, and other online posts.
|
|
123
|
-
- Create a #MEME that encourages others to #SHARE the #TheTrentonStory.
|
|
124
|
-
- Leave comments in other #Youtube videos that have the same or similar signs as #TheTrentonStory.
|
|
125
|
-
- Send emails to various media outlets and reporters who might write about #TheTrentonStory.
|
|
126
|
-
- Produce addicitonal videos to publish on #Twitter #Youtube #TikTok about #TheTrentonStory.
|
|
127
|
-
|
|
128
|
-
note:There are infinite options once the #DUMMIES edition is written and the #MESSAGES are formed. The message should be crystal clear, and easy to understand.
|
|
129
|
-
|
|
130
|
-
## ORGANIZE
|
|
131
|
-
p: The formula for a self-organizing society
|
|
132
|
-
|
|
133
|
-
1. Find knowledge.
|
|
134
|
-
2. Present this knowledge in a meaningful way.
|
|
135
|
-
3. Share the knowledge you have found with those closest to you.
|
|
136
|
-
|
|
137
|
-
p:These three ingredients will create organic change. As each #YOU is educated to the #TheTrentonStory, they will #SHARE it with others, and they will all act on this #TRUTH in a meaningful way.
|
|
138
|
-
|
|
139
|
-
## TIPS
|
|
140
|
-
1. Get together a list of clear and simple talking points.
|
|
141
|
-
2. #SHARE what you have learned with close #FRIENDS and #FAMILY first.
|
|
142
|
-
3. When the task is complete throw a #PARTY.
|
|
143
|
-
4. Stay focused on #TheTrentonStory and keep on #SHARING.
|
|
144
|
-
5. Ignore the #TROLLS as best you can.
|
|
145
|
-
6. The #RussianSpies will try to throw you off the trail, so stay focused.
|
|
146
|
-
7. Focus on #TheTrentonStory and NOT your #PersonalStory.
|
|
147
|
-
|
|
148
|
-
### SHARE
|
|
149
|
-
p: Remember sharing is the most important part of #TheTrentonSTory. By sharing you are assisting in revealing the #TRUTH even more than by digging into needles details. Always remember sharing is the most important skill.
|
|
150
|
-
|
|
151
|
-
idea: #TheTrentonStory
|
|
152
|
-
extract: the information from #idea
|
|
153
|
-
messages: form simple messages from #EXTRACT
|
|
154
|
-
confirm: your messages before #PUBLIC
|
|
155
|
-
create: tweets, comments, blogs, memes, art, stories, replies after #CONFIRM
|
|
156
|
-
share: with #Friends and #Family then everywhere else.
|
|
157
|
-
support: Provide links for #SHARE #SUPPORT to #Friends and #Family
|
|
158
|
-
|
|
159
|
-
p: Born from #EvolutionEngineIntelligence #GeneticAlgorithms #ArtificialIntelligence #LogicalThinking #Imagination #Creativity #HardWorking #Playful #Joyful #FUN
|
|
160
|
-
|
|
161
|
-
problem: Any big problem is only a #METAPROBLEM
|
|
162
|
-
solution: 'Almost good enough' might be MORE than 'good enough'.
|
|
163
|
-
goal: We don't aim to find the 'best' solution, as there might be infinite ways to achieve a single goal.
|
|
164
|
-
|
|
165
|
-
code: CODE > #TheTrentonStory
|
|
166
|
-
::end:program
|
|
167
|
-
|
|
168
|
-
::begin:warning
|
|
169
|
-
p:If you can ONLY retain one piece of information, remember this.
|
|
170
|
-
|
|
171
|
-
p:WHOMEVER claims affiliation with #TheTrentonStory and ignores or does NOT follow instructions in a blog post / video / image / tweet / chat / conversation / anywhere *OR* suggests committing/supporting illegal acts of ANY kind will be labeled a #ROGUE and reported to #Security / #Authority.
|
|
172
|
-
|
|
173
|
-
p:#ROGUES are NOT affiliated, and have no connection to #TheTrentonStory whatsoever. These are the #ROGUES #TROLLS #LURKERS.
|
|
174
|
-
::end:warning
|
|
175
|
-
|
|
176
|
-
copyright: (c)2023 Quinn Michaels
|
|
36
|
+
copyright: (c)2025 Quinn Michaels
|
|
177
37
|
|
|
178
38
|
::begin:hidden
|
|
179
39
|
#color = ::agent_color::
|
package/index.js
CHANGED
|
@@ -47,18 +47,17 @@ const SECURITY = new Deva({
|
|
|
47
47
|
},
|
|
48
48
|
listeners: {},
|
|
49
49
|
modules: {},
|
|
50
|
-
|
|
51
|
-
func: {
|
|
52
|
-
sec_question(packet) {return;},
|
|
53
|
-
sec_answer(packet) {return;},
|
|
54
|
-
},
|
|
50
|
+
devas: {},
|
|
51
|
+
func: {},
|
|
55
52
|
methods: {},
|
|
56
53
|
onReady(data, resolve) {
|
|
57
|
-
this.prompt(
|
|
54
|
+
this.prompt(this.vars.messages.ready);
|
|
58
55
|
return resolve(data);
|
|
59
56
|
},
|
|
60
|
-
onError(err) {
|
|
61
|
-
|
|
57
|
+
onError(err, data, reject) {
|
|
58
|
+
this.prompt(this.vars.messages.error);
|
|
59
|
+
console.log(err);
|
|
60
|
+
return reject(err);
|
|
62
61
|
}
|
|
63
62
|
});
|
|
64
63
|
export default SECURITY
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"id": 6507120243760,
|
|
3
3
|
"name": "@indra.ai/deva.security",
|
|
4
|
-
"version": "0.0.
|
|
4
|
+
"version": "0.0.9",
|
|
5
5
|
"author": "Quinn Michaels",
|
|
6
6
|
"license": "MIT",
|
|
7
7
|
"copyright": "2025",
|
|
@@ -28,6 +28,6 @@
|
|
|
28
28
|
},
|
|
29
29
|
"homepage": "https://deva.space/devas/security",
|
|
30
30
|
"dependencies": {
|
|
31
|
-
"@indra.ai/deva": "^1.
|
|
31
|
+
"@indra.ai/deva": "^1.4.10"
|
|
32
32
|
}
|
|
33
33
|
}
|