@nerviq/cli 1.20.0 → 1.21.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +23 -23
- package/README.md +2 -2
- package/bin/cli.js +1 -0
- package/package.json +2 -1
- package/src/activity.js +1039 -1039
- package/src/adoption-advisor.js +299 -299
- package/src/aider/config-parser.js +166 -166
- package/src/aider/context.js +6 -2
- package/src/aider/deep-review.js +316 -316
- package/src/aider/domain-packs.js +303 -303
- package/src/aider/freshness.js +93 -93
- package/src/aider/governance.js +253 -253
- package/src/aider/interactive.js +334 -334
- package/src/aider/mcp-packs.js +329 -329
- package/src/aider/patch.js +214 -214
- package/src/aider/plans.js +186 -186
- package/src/aider/premium.js +360 -360
- package/src/aider/setup.js +404 -404
- package/src/aider/techniques.js +312 -67
- package/src/analyze.js +951 -951
- package/src/anti-patterns.js +485 -485
- package/src/audit/instruction-files.js +180 -180
- package/src/audit/recommendations.js +577 -577
- package/src/auto-suggest.js +154 -154
- package/src/badge.js +13 -13
- package/src/behavioral-drift.js +801 -801
- package/src/benchmark.js +67 -67
- package/src/catalog.js +103 -103
- package/src/certification.js +128 -128
- package/src/codex/config-parser.js +183 -183
- package/src/codex/context.js +223 -223
- package/src/codex/deep-review.js +493 -493
- package/src/codex/domain-packs.js +394 -394
- package/src/codex/freshness.js +84 -84
- package/src/codex/governance.js +192 -192
- package/src/codex/interactive.js +618 -618
- package/src/codex/mcp-packs.js +914 -914
- package/src/codex/patch.js +209 -209
- package/src/codex/plans.js +251 -251
- package/src/codex/premium.js +614 -614
- package/src/codex/setup.js +591 -591
- package/src/context.js +10 -4
- package/src/continuous-ops.js +681 -681
- package/src/copilot/activity.js +309 -309
- package/src/copilot/deep-review.js +346 -346
- package/src/copilot/domain-packs.js +372 -372
- package/src/copilot/freshness.js +57 -57
- package/src/copilot/governance.js +222 -222
- package/src/copilot/interactive.js +406 -406
- package/src/copilot/mcp-packs.js +826 -826
- package/src/copilot/plans.js +253 -253
- package/src/copilot/premium.js +451 -451
- package/src/copilot/setup.js +488 -488
- package/src/cost-tracking.js +61 -61
- package/src/cursor/activity.js +301 -301
- package/src/cursor/config-parser.js +265 -265
- package/src/cursor/context.js +256 -256
- package/src/cursor/deep-review.js +334 -334
- package/src/cursor/domain-packs.js +368 -368
- package/src/cursor/freshness.js +65 -65
- package/src/cursor/governance.js +229 -229
- package/src/cursor/interactive.js +391 -391
- package/src/cursor/mcp-packs.js +828 -828
- package/src/cursor/plans.js +254 -254
- package/src/cursor/premium.js +469 -469
- package/src/cursor/setup.js +488 -488
- package/src/dashboard.js +493 -493
- package/src/deep-review.js +428 -428
- package/src/deprecation.js +98 -98
- package/src/diff-only.js +280 -280
- package/src/doctor.js +119 -119
- package/src/domain-pack-expansion.js +1033 -1033
- package/src/domain-packs.js +387 -387
- package/src/feedback.js +178 -178
- package/src/fix-engine.js +783 -783
- package/src/fix-prompts.js +122 -122
- package/src/formatters/sarif.js +115 -115
- package/src/freshness.js +74 -74
- package/src/gemini/config-parser.js +275 -275
- package/src/gemini/deep-review.js +559 -559
- package/src/gemini/domain-packs.js +393 -393
- package/src/gemini/freshness.js +66 -66
- package/src/gemini/governance.js +201 -201
- package/src/gemini/interactive.js +860 -860
- package/src/gemini/mcp-packs.js +915 -915
- package/src/gemini/plans.js +269 -269
- package/src/gemini/premium.js +760 -760
- package/src/gemini/setup.js +692 -692
- package/src/governance.js +72 -72
- package/src/harmony/add.js +68 -68
- package/src/harmony/advisor.js +333 -333
- package/src/harmony/canon.js +565 -565
- package/src/harmony/cli.js +591 -591
- package/src/harmony/drift.js +401 -401
- package/src/harmony/governance.js +313 -313
- package/src/harmony/memory.js +239 -239
- package/src/harmony/sync.js +475 -475
- package/src/harmony/watch.js +370 -370
- package/src/hook-validation.js +342 -342
- package/src/index.js +271 -271
- package/src/init.js +184 -184
- package/src/instruction-surfaces.js +185 -185
- package/src/integrations.js +144 -144
- package/src/interactive.js +118 -118
- package/src/locales/en.json +1 -1
- package/src/locales/es.json +1 -1
- package/src/mcp-packs.js +830 -830
- package/src/mcp-server.js +726 -726
- package/src/mcp-validation.js +337 -337
- package/src/nerviq-sync.json +7 -7
- package/src/opencode/config-parser.js +109 -109
- package/src/opencode/context.js +247 -247
- package/src/opencode/deep-review.js +313 -313
- package/src/opencode/domain-packs.js +262 -262
- package/src/opencode/freshness.js +66 -66
- package/src/opencode/governance.js +159 -159
- package/src/opencode/interactive.js +392 -392
- package/src/opencode/mcp-packs.js +705 -705
- package/src/opencode/patch.js +184 -184
- package/src/opencode/plans.js +231 -231
- package/src/opencode/premium.js +413 -413
- package/src/opencode/setup.js +449 -449
- package/src/opencode/techniques.js +27 -27
- package/src/operating-profile.js +574 -574
- package/src/org.js +152 -152
- package/src/permission-rules.js +218 -218
- package/src/plans.js +839 -839
- package/src/platform-change-manifest.js +86 -86
- package/src/plugins.js +110 -110
- package/src/policy-layers.js +210 -210
- package/src/profiles.js +124 -124
- package/src/prompt-injection.js +74 -74
- package/src/public-api.js +173 -173
- package/src/recommendation-rules.js +84 -84
- package/src/repo-archetype.js +386 -386
- package/src/secret-patterns.js +39 -39
- package/src/server.js +527 -527
- package/src/setup/analysis.js +607 -607
- package/src/setup/runtime.js +172 -172
- package/src/setup.js +677 -677
- package/src/shared/capabilities.js +194 -194
- package/src/source-urls.js +132 -132
- package/src/stack-checks.js +565 -565
- package/src/supplemental-checks.js +13 -13
- package/src/synergy/adaptive.js +261 -261
- package/src/synergy/compensation.js +137 -137
- package/src/synergy/evidence.js +193 -193
- package/src/synergy/learning.js +199 -199
- package/src/synergy/patterns.js +227 -227
- package/src/synergy/ranking.js +83 -83
- package/src/synergy/report.js +165 -165
- package/src/synergy/routing.js +146 -146
- package/src/techniques/api.js +407 -407
- package/src/techniques/automation.js +316 -316
- package/src/techniques/compliance.js +257 -257
- package/src/techniques/hygiene.js +294 -294
- package/src/techniques/instructions.js +243 -243
- package/src/techniques/observability.js +226 -226
- package/src/techniques/optimization.js +142 -142
- package/src/techniques/quality.js +318 -318
- package/src/techniques/security.js +237 -237
- package/src/techniques/shared.js +443 -443
- package/src/techniques/stacks.js +2294 -2294
- package/src/techniques/tools.js +106 -106
- package/src/techniques/workflow.js +413 -413
- package/src/techniques.js +81 -81
- package/src/terminology.js +73 -73
- package/src/token-estimate.js +35 -35
- package/src/usage-patterns.js +99 -99
- package/src/verification-metadata.js +145 -145
- package/src/watch.js +247 -247
- package/src/windsurf/activity.js +302 -302
- package/src/windsurf/config-parser.js +267 -267
- package/src/windsurf/context.js +120 -10
- package/src/windsurf/deep-review.js +337 -337
- package/src/windsurf/domain-packs.js +370 -370
- package/src/windsurf/freshness.js +36 -36
- package/src/windsurf/governance.js +231 -231
- package/src/windsurf/interactive.js +388 -388
- package/src/windsurf/mcp-packs.js +792 -792
- package/src/windsurf/plans.js +247 -247
- package/src/windsurf/premium.js +468 -468
- package/src/windsurf/setup.js +471 -471
- package/src/windsurf/techniques.js +155 -33
- package/src/workspace.js +375 -375
|
@@ -1,313 +1,313 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* H8. Harmony Governance - Cross-Platform Policy Enforcement
|
|
3
|
-
*
|
|
4
|
-
* Evaluates cross-platform governance posture: minimum trust levels,
|
|
5
|
-
* required instruction coverage, MCP alignment, and per-platform compliance.
|
|
6
|
-
*
|
|
7
|
-
* Zero external dependencies - imports from sibling/parent modules only.
|
|
8
|
-
*/
|
|
9
|
-
|
|
10
|
-
// ─── Required canonical sections every platform should cover ──────────────────
|
|
11
|
-
|
|
12
|
-
const REQUIRED_INSTRUCTION_SECTIONS = [
|
|
13
|
-
{ key: 'role', label: 'Role / Identity', description: 'Define who the AI assistant is in this project.' },
|
|
14
|
-
{ key: 'commands', label: 'Verification Commands', description: 'Test, lint, and build commands the AI should use.' },
|
|
15
|
-
{ key: 'language', label: 'Language Preference', description: 'Communication language for the AI.' },
|
|
16
|
-
{ key: 'permissions', label: 'Permission Boundaries', description: 'What the AI is allowed and denied to do.' },
|
|
17
|
-
{ key: 'context', label: 'Project Context', description: 'Architecture, stack, and codebase overview.' },
|
|
18
|
-
{ key: 'safety', label: 'Safety / Secret Protection', description: 'Rules for handling secrets and sensitive files.' },
|
|
19
|
-
];
|
|
20
|
-
|
|
21
|
-
// ─── Trust posture definitions ────────────────────────────────────────────────
|
|
22
|
-
|
|
23
|
-
const TRUST_LEVELS = {
|
|
24
|
-
strict: {
|
|
25
|
-
level: 1,
|
|
26
|
-
label: 'Strict',
|
|
27
|
-
description: 'Read-only or suggest-only. No file writes without approval.',
|
|
28
|
-
minPermissions: ['deny-write', 'deny-destructive'],
|
|
29
|
-
},
|
|
30
|
-
guarded: {
|
|
31
|
-
level: 2,
|
|
32
|
-
label: 'Guarded',
|
|
33
|
-
description: 'Safe writes with explicit deny rules and hook enforcement.',
|
|
34
|
-
minPermissions: ['deny-destructive', 'secret-protection'],
|
|
35
|
-
},
|
|
36
|
-
standard: {
|
|
37
|
-
level: 3,
|
|
38
|
-
label: 'Standard',
|
|
39
|
-
description: 'Accept-edits with common-sense deny rules.',
|
|
40
|
-
minPermissions: ['secret-protection'],
|
|
41
|
-
},
|
|
42
|
-
permissive: {
|
|
43
|
-
level: 4,
|
|
44
|
-
label: 'Permissive',
|
|
45
|
-
description: 'Broad autonomy with minimal restrictions.',
|
|
46
|
-
minPermissions: [],
|
|
47
|
-
},
|
|
48
|
-
unrestricted: {
|
|
49
|
-
level: 5,
|
|
50
|
-
label: 'Unrestricted',
|
|
51
|
-
description: 'Full bypass, only for internal research.',
|
|
52
|
-
minPermissions: [],
|
|
53
|
-
},
|
|
54
|
-
};
|
|
55
|
-
|
|
56
|
-
// ─── Platform trust detection ─────────────────────────────────────────────────
|
|
57
|
-
|
|
58
|
-
/**
|
|
59
|
-
* Infer trust level from a platform's audit/governance data.
|
|
60
|
-
*/
|
|
61
|
-
function inferTrustLevel(platformGovernance) {
|
|
62
|
-
if (!platformGovernance) return TRUST_LEVELS.unrestricted;
|
|
63
|
-
|
|
64
|
-
const { hasPermissions, hasDenyRules, hasSecretProtection, defaultMode } = platformGovernance;
|
|
65
|
-
|
|
66
|
-
if (defaultMode === 'plan' || defaultMode === 'read-only') return TRUST_LEVELS.strict;
|
|
67
|
-
if (hasDenyRules && hasSecretProtection) return TRUST_LEVELS.guarded;
|
|
68
|
-
if (hasPermissions || hasSecretProtection) return TRUST_LEVELS.standard;
|
|
69
|
-
if (hasPermissions) return TRUST_LEVELS.permissive;
|
|
70
|
-
return TRUST_LEVELS.unrestricted;
|
|
71
|
-
}
|
|
72
|
-
|
|
73
|
-
// ─── Governance evaluation ────────────────────────────────────────────────────
|
|
74
|
-
|
|
75
|
-
/**
|
|
76
|
-
* Evaluate instruction coverage for a single platform.
|
|
77
|
-
*/
|
|
78
|
-
function evaluateInstructionCoverage(platformSections) {
|
|
79
|
-
const covered = [];
|
|
80
|
-
const missing = [];
|
|
81
|
-
|
|
82
|
-
for (const required of REQUIRED_INSTRUCTION_SECTIONS) {
|
|
83
|
-
const found = (platformSections || []).some(s => {
|
|
84
|
-
const key = s.key || s;
|
|
85
|
-
return key === required.key || key.includes(required.key);
|
|
86
|
-
});
|
|
87
|
-
if (found) {
|
|
88
|
-
covered.push(required);
|
|
89
|
-
} else {
|
|
90
|
-
missing.push(required);
|
|
91
|
-
}
|
|
92
|
-
}
|
|
93
|
-
|
|
94
|
-
return {
|
|
95
|
-
total: REQUIRED_INSTRUCTION_SECTIONS.length,
|
|
96
|
-
covered: covered.length,
|
|
97
|
-
missing: missing.length,
|
|
98
|
-
coveredSections: covered,
|
|
99
|
-
missingSections: missing,
|
|
100
|
-
percentage: Math.round((covered.length / REQUIRED_INSTRUCTION_SECTIONS.length) * 100),
|
|
101
|
-
};
|
|
102
|
-
}
|
|
103
|
-
|
|
104
|
-
/**
|
|
105
|
-
* Evaluate MCP server alignment across platforms.
|
|
106
|
-
*/
|
|
107
|
-
function evaluateMcpAlignment(platformAudits) {
|
|
108
|
-
const mcpByPlatform = {};
|
|
109
|
-
const allServers = new Set();
|
|
110
|
-
|
|
111
|
-
for (const audit of (platformAudits || [])) {
|
|
112
|
-
const servers = audit.mcpServers || [];
|
|
113
|
-
mcpByPlatform[audit.platform] = new Set(servers);
|
|
114
|
-
for (const s of servers) allServers.add(s);
|
|
115
|
-
}
|
|
116
|
-
|
|
117
|
-
const alignment = [];
|
|
118
|
-
for (const server of allServers) {
|
|
119
|
-
const presentIn = [];
|
|
120
|
-
const missingFrom = [];
|
|
121
|
-
|
|
122
|
-
for (const audit of (platformAudits || [])) {
|
|
123
|
-
if (mcpByPlatform[audit.platform] && mcpByPlatform[audit.platform].has(server)) {
|
|
124
|
-
presentIn.push(audit.platform);
|
|
125
|
-
} else {
|
|
126
|
-
missingFrom.push(audit.platform);
|
|
127
|
-
}
|
|
128
|
-
}
|
|
129
|
-
|
|
130
|
-
alignment.push({
|
|
131
|
-
server,
|
|
132
|
-
presentIn,
|
|
133
|
-
missingFrom,
|
|
134
|
-
aligned: missingFrom.length === 0,
|
|
135
|
-
});
|
|
136
|
-
}
|
|
137
|
-
|
|
138
|
-
return {
|
|
139
|
-
totalServers: allServers.size,
|
|
140
|
-
fullyAligned: alignment.filter(a => a.aligned).length,
|
|
141
|
-
misaligned: alignment.filter(a => !a.aligned).length,
|
|
142
|
-
servers: alignment,
|
|
143
|
-
};
|
|
144
|
-
}
|
|
145
|
-
|
|
146
|
-
/**
|
|
147
|
-
* Get the complete harmony governance summary.
|
|
148
|
-
*
|
|
149
|
-
* @param {Object|null} canonicalModel - The canonical model from canon.js
|
|
150
|
-
* @param {Array} [platformAudits] - Array of per-platform audit results with governance data
|
|
151
|
-
* @returns {Object} Full governance summary
|
|
152
|
-
*/
|
|
153
|
-
function getHarmonyGovernanceSummary(canonicalModel, platformAudits) {
|
|
154
|
-
const audits = platformAudits || [];
|
|
155
|
-
|
|
156
|
-
// 1. Minimum trust posture (lowest acceptable across all platforms)
|
|
157
|
-
const trustLevels = audits.map(audit => ({
|
|
158
|
-
platform: audit.platform,
|
|
159
|
-
trust: inferTrustLevel(audit.governance),
|
|
160
|
-
}));
|
|
161
|
-
|
|
162
|
-
const lowestTrust = trustLevels.length > 0
|
|
163
|
-
? trustLevels.reduce((min, curr) =>
|
|
164
|
-
curr.trust.level < min.trust.level ? curr : min
|
|
165
|
-
)
|
|
166
|
-
: null;
|
|
167
|
-
|
|
168
|
-
const minimumTrustPosture = {
|
|
169
|
-
level: lowestTrust ? lowestTrust.trust : TRUST_LEVELS.unrestricted,
|
|
170
|
-
lowestPlatform: lowestTrust ? lowestTrust.platform : null,
|
|
171
|
-
perPlatform: trustLevels.map(t => ({
|
|
172
|
-
platform: t.platform,
|
|
173
|
-
level: t.trust.label,
|
|
174
|
-
levelNumber: t.trust.level,
|
|
175
|
-
description: t.trust.description,
|
|
176
|
-
})),
|
|
177
|
-
};
|
|
178
|
-
|
|
179
|
-
// 2. Required instruction coverage per platform
|
|
180
|
-
const instructionCoverage = {
|
|
181
|
-
required: REQUIRED_INSTRUCTION_SECTIONS,
|
|
182
|
-
perPlatform: audits.map(audit => ({
|
|
183
|
-
platform: audit.platform,
|
|
184
|
-
...evaluateInstructionCoverage(audit.sections),
|
|
185
|
-
})),
|
|
186
|
-
};
|
|
187
|
-
|
|
188
|
-
// 3. MCP alignment
|
|
189
|
-
const mcpAlignment = evaluateMcpAlignment(audits);
|
|
190
|
-
|
|
191
|
-
// 4. Compliance: per-platform governance status
|
|
192
|
-
const platformCompliance = audits.map(audit => {
|
|
193
|
-
const coverage = evaluateInstructionCoverage(audit.sections);
|
|
194
|
-
const trust = inferTrustLevel(audit.governance);
|
|
195
|
-
const gaps = [];
|
|
196
|
-
|
|
197
|
-
if (coverage.missing > 0) {
|
|
198
|
-
gaps.push(`Missing ${coverage.missing} required instruction section(s): ${coverage.missingSections.map(s => s.key).join(', ')}`);
|
|
199
|
-
}
|
|
200
|
-
|
|
201
|
-
if (trust.level >= 4) {
|
|
202
|
-
gaps.push(`Trust level "${trust.label}" is too permissive for production use`);
|
|
203
|
-
}
|
|
204
|
-
|
|
205
|
-
if (audit.governance && !audit.governance.hasSecretProtection) {
|
|
206
|
-
gaps.push('No secret protection configured');
|
|
207
|
-
}
|
|
208
|
-
|
|
209
|
-
if (audit.governance && !audit.governance.hasDenyRules) {
|
|
210
|
-
gaps.push('No deny rules configured');
|
|
211
|
-
}
|
|
212
|
-
|
|
213
|
-
return {
|
|
214
|
-
platform: audit.platform,
|
|
215
|
-
compliant: gaps.length === 0,
|
|
216
|
-
score: audit.score || 0,
|
|
217
|
-
trustLevel: trust.label,
|
|
218
|
-
coveragePercent: coverage.percentage,
|
|
219
|
-
gaps,
|
|
220
|
-
};
|
|
221
|
-
});
|
|
222
|
-
|
|
223
|
-
return {
|
|
224
|
-
minimumTrustPosture,
|
|
225
|
-
instructionCoverage,
|
|
226
|
-
mcpAlignment,
|
|
227
|
-
platformCompliance,
|
|
228
|
-
evaluatedAt: new Date().toISOString(),
|
|
229
|
-
};
|
|
230
|
-
}
|
|
231
|
-
|
|
232
|
-
// ─── Report formatting ────────────────────────────────────────────────────────
|
|
233
|
-
|
|
234
|
-
const COLORS = {
|
|
235
|
-
reset: '\x1b[0m', bold: '\x1b[1m', dim: '\x1b[2m',
|
|
236
|
-
green: '\x1b[32m', yellow: '\x1b[33m', red: '\x1b[31m', blue: '\x1b[36m',
|
|
237
|
-
};
|
|
238
|
-
const col = (text, color) => `${COLORS[color] || ''}${text}${COLORS.reset}`;
|
|
239
|
-
|
|
240
|
-
/**
|
|
241
|
-
* Format the governance summary as a human-readable console report.
|
|
242
|
-
*/
|
|
243
|
-
function formatHarmonyGovernanceReport(summary, options) {
|
|
244
|
-
if (options && options.json) {
|
|
245
|
-
return JSON.stringify(summary, null, 2);
|
|
246
|
-
}
|
|
247
|
-
|
|
248
|
-
const lines = [];
|
|
249
|
-
|
|
250
|
-
lines.push('');
|
|
251
|
-
lines.push(col(' Harmony Governance Report', 'bold'));
|
|
252
|
-
lines.push(col(' ═══════════════════════════════════════', 'dim'));
|
|
253
|
-
lines.push('');
|
|
254
|
-
|
|
255
|
-
// Trust posture
|
|
256
|
-
lines.push(col(' Trust Posture', 'bold'));
|
|
257
|
-
for (const entry of summary.minimumTrustPosture.perPlatform) {
|
|
258
|
-
const trustColor = entry.levelNumber <= 2 ? 'green' : entry.levelNumber <= 3 ? 'yellow' : 'red';
|
|
259
|
-
lines.push(` ${entry.platform}: ${col(entry.level, trustColor)} — ${entry.description}`);
|
|
260
|
-
}
|
|
261
|
-
if (summary.minimumTrustPosture.lowestPlatform) {
|
|
262
|
-
lines.push(` ${col('Minimum:', 'dim')} ${summary.minimumTrustPosture.level.label} (${summary.minimumTrustPosture.lowestPlatform})`);
|
|
263
|
-
}
|
|
264
|
-
lines.push('');
|
|
265
|
-
|
|
266
|
-
// Instruction coverage
|
|
267
|
-
lines.push(col(' Instruction Coverage', 'bold'));
|
|
268
|
-
for (const entry of summary.instructionCoverage.perPlatform) {
|
|
269
|
-
const pctColor = entry.percentage >= 80 ? 'green' : entry.percentage >= 50 ? 'yellow' : 'red';
|
|
270
|
-
lines.push(` ${entry.platform}: ${col(`${entry.percentage}%`, pctColor)} (${entry.covered}/${entry.total})`);
|
|
271
|
-
if (entry.missingSections.length > 0) {
|
|
272
|
-
lines.push(` ${col('Missing:', 'dim')} ${entry.missingSections.map(s => s.key).join(', ')}`);
|
|
273
|
-
}
|
|
274
|
-
}
|
|
275
|
-
lines.push('');
|
|
276
|
-
|
|
277
|
-
// MCP alignment
|
|
278
|
-
lines.push(col(' MCP Alignment', 'bold'));
|
|
279
|
-
lines.push(` Total servers: ${summary.mcpAlignment.totalServers}`);
|
|
280
|
-
lines.push(` Fully aligned: ${col(String(summary.mcpAlignment.fullyAligned), 'green')}`);
|
|
281
|
-
lines.push(` Misaligned: ${col(String(summary.mcpAlignment.misaligned), summary.mcpAlignment.misaligned > 0 ? 'yellow' : 'green')}`);
|
|
282
|
-
for (const server of summary.mcpAlignment.servers) {
|
|
283
|
-
if (!server.aligned) {
|
|
284
|
-
lines.push(` ${col(server.server, 'yellow')}: missing from ${server.missingFrom.join(', ')}`);
|
|
285
|
-
}
|
|
286
|
-
}
|
|
287
|
-
lines.push('');
|
|
288
|
-
|
|
289
|
-
// Platform compliance
|
|
290
|
-
lines.push(col(' Platform Compliance', 'bold'));
|
|
291
|
-
for (const entry of summary.platformCompliance) {
|
|
292
|
-
const status = entry.compliant
|
|
293
|
-
? col('COMPLIANT', 'green')
|
|
294
|
-
: col('NON-COMPLIANT', 'red');
|
|
295
|
-
lines.push(` ${entry.platform}: ${status} (score: ${entry.score}, trust: ${entry.trustLevel}, coverage: ${entry.coveragePercent}%)`);
|
|
296
|
-
for (const gap of entry.gaps) {
|
|
297
|
-
lines.push(` ${col('GAP:', 'yellow')} ${gap}`);
|
|
298
|
-
}
|
|
299
|
-
}
|
|
300
|
-
lines.push('');
|
|
301
|
-
|
|
302
|
-
return lines.join('\n');
|
|
303
|
-
}
|
|
304
|
-
|
|
305
|
-
module.exports = {
|
|
306
|
-
getHarmonyGovernanceSummary,
|
|
307
|
-
formatHarmonyGovernanceReport,
|
|
308
|
-
inferTrustLevel,
|
|
309
|
-
evaluateInstructionCoverage,
|
|
310
|
-
evaluateMcpAlignment,
|
|
311
|
-
TRUST_LEVELS,
|
|
312
|
-
REQUIRED_INSTRUCTION_SECTIONS,
|
|
313
|
-
};
|
|
1
|
+
/**
|
|
2
|
+
* H8. Harmony Governance - Cross-Platform Policy Enforcement
|
|
3
|
+
*
|
|
4
|
+
* Evaluates cross-platform governance posture: minimum trust levels,
|
|
5
|
+
* required instruction coverage, MCP alignment, and per-platform compliance.
|
|
6
|
+
*
|
|
7
|
+
* Zero external dependencies - imports from sibling/parent modules only.
|
|
8
|
+
*/
|
|
9
|
+
|
|
10
|
+
// ─── Required canonical sections every platform should cover ──────────────────
|
|
11
|
+
|
|
12
|
+
const REQUIRED_INSTRUCTION_SECTIONS = [
|
|
13
|
+
{ key: 'role', label: 'Role / Identity', description: 'Define who the AI assistant is in this project.' },
|
|
14
|
+
{ key: 'commands', label: 'Verification Commands', description: 'Test, lint, and build commands the AI should use.' },
|
|
15
|
+
{ key: 'language', label: 'Language Preference', description: 'Communication language for the AI.' },
|
|
16
|
+
{ key: 'permissions', label: 'Permission Boundaries', description: 'What the AI is allowed and denied to do.' },
|
|
17
|
+
{ key: 'context', label: 'Project Context', description: 'Architecture, stack, and codebase overview.' },
|
|
18
|
+
{ key: 'safety', label: 'Safety / Secret Protection', description: 'Rules for handling secrets and sensitive files.' },
|
|
19
|
+
];
|
|
20
|
+
|
|
21
|
+
// ─── Trust posture definitions ────────────────────────────────────────────────
|
|
22
|
+
|
|
23
|
+
const TRUST_LEVELS = {
|
|
24
|
+
strict: {
|
|
25
|
+
level: 1,
|
|
26
|
+
label: 'Strict',
|
|
27
|
+
description: 'Read-only or suggest-only. No file writes without approval.',
|
|
28
|
+
minPermissions: ['deny-write', 'deny-destructive'],
|
|
29
|
+
},
|
|
30
|
+
guarded: {
|
|
31
|
+
level: 2,
|
|
32
|
+
label: 'Guarded',
|
|
33
|
+
description: 'Safe writes with explicit deny rules and hook enforcement.',
|
|
34
|
+
minPermissions: ['deny-destructive', 'secret-protection'],
|
|
35
|
+
},
|
|
36
|
+
standard: {
|
|
37
|
+
level: 3,
|
|
38
|
+
label: 'Standard',
|
|
39
|
+
description: 'Accept-edits with common-sense deny rules.',
|
|
40
|
+
minPermissions: ['secret-protection'],
|
|
41
|
+
},
|
|
42
|
+
permissive: {
|
|
43
|
+
level: 4,
|
|
44
|
+
label: 'Permissive',
|
|
45
|
+
description: 'Broad autonomy with minimal restrictions.',
|
|
46
|
+
minPermissions: [],
|
|
47
|
+
},
|
|
48
|
+
unrestricted: {
|
|
49
|
+
level: 5,
|
|
50
|
+
label: 'Unrestricted',
|
|
51
|
+
description: 'Full bypass, only for internal research.',
|
|
52
|
+
minPermissions: [],
|
|
53
|
+
},
|
|
54
|
+
};
|
|
55
|
+
|
|
56
|
+
// ─── Platform trust detection ─────────────────────────────────────────────────
|
|
57
|
+
|
|
58
|
+
/**
|
|
59
|
+
* Infer trust level from a platform's audit/governance data.
|
|
60
|
+
*/
|
|
61
|
+
function inferTrustLevel(platformGovernance) {
|
|
62
|
+
if (!platformGovernance) return TRUST_LEVELS.unrestricted;
|
|
63
|
+
|
|
64
|
+
const { hasPermissions, hasDenyRules, hasSecretProtection, defaultMode } = platformGovernance;
|
|
65
|
+
|
|
66
|
+
if (defaultMode === 'plan' || defaultMode === 'read-only') return TRUST_LEVELS.strict;
|
|
67
|
+
if (hasDenyRules && hasSecretProtection) return TRUST_LEVELS.guarded;
|
|
68
|
+
if (hasPermissions || hasSecretProtection) return TRUST_LEVELS.standard;
|
|
69
|
+
if (hasPermissions) return TRUST_LEVELS.permissive;
|
|
70
|
+
return TRUST_LEVELS.unrestricted;
|
|
71
|
+
}
|
|
72
|
+
|
|
73
|
+
// ─── Governance evaluation ────────────────────────────────────────────────────
|
|
74
|
+
|
|
75
|
+
/**
|
|
76
|
+
* Evaluate instruction coverage for a single platform.
|
|
77
|
+
*/
|
|
78
|
+
function evaluateInstructionCoverage(platformSections) {
|
|
79
|
+
const covered = [];
|
|
80
|
+
const missing = [];
|
|
81
|
+
|
|
82
|
+
for (const required of REQUIRED_INSTRUCTION_SECTIONS) {
|
|
83
|
+
const found = (platformSections || []).some(s => {
|
|
84
|
+
const key = s.key || s;
|
|
85
|
+
return key === required.key || key.includes(required.key);
|
|
86
|
+
});
|
|
87
|
+
if (found) {
|
|
88
|
+
covered.push(required);
|
|
89
|
+
} else {
|
|
90
|
+
missing.push(required);
|
|
91
|
+
}
|
|
92
|
+
}
|
|
93
|
+
|
|
94
|
+
return {
|
|
95
|
+
total: REQUIRED_INSTRUCTION_SECTIONS.length,
|
|
96
|
+
covered: covered.length,
|
|
97
|
+
missing: missing.length,
|
|
98
|
+
coveredSections: covered,
|
|
99
|
+
missingSections: missing,
|
|
100
|
+
percentage: Math.round((covered.length / REQUIRED_INSTRUCTION_SECTIONS.length) * 100),
|
|
101
|
+
};
|
|
102
|
+
}
|
|
103
|
+
|
|
104
|
+
/**
|
|
105
|
+
* Evaluate MCP server alignment across platforms.
|
|
106
|
+
*/
|
|
107
|
+
function evaluateMcpAlignment(platformAudits) {
|
|
108
|
+
const mcpByPlatform = {};
|
|
109
|
+
const allServers = new Set();
|
|
110
|
+
|
|
111
|
+
for (const audit of (platformAudits || [])) {
|
|
112
|
+
const servers = audit.mcpServers || [];
|
|
113
|
+
mcpByPlatform[audit.platform] = new Set(servers);
|
|
114
|
+
for (const s of servers) allServers.add(s);
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
const alignment = [];
|
|
118
|
+
for (const server of allServers) {
|
|
119
|
+
const presentIn = [];
|
|
120
|
+
const missingFrom = [];
|
|
121
|
+
|
|
122
|
+
for (const audit of (platformAudits || [])) {
|
|
123
|
+
if (mcpByPlatform[audit.platform] && mcpByPlatform[audit.platform].has(server)) {
|
|
124
|
+
presentIn.push(audit.platform);
|
|
125
|
+
} else {
|
|
126
|
+
missingFrom.push(audit.platform);
|
|
127
|
+
}
|
|
128
|
+
}
|
|
129
|
+
|
|
130
|
+
alignment.push({
|
|
131
|
+
server,
|
|
132
|
+
presentIn,
|
|
133
|
+
missingFrom,
|
|
134
|
+
aligned: missingFrom.length === 0,
|
|
135
|
+
});
|
|
136
|
+
}
|
|
137
|
+
|
|
138
|
+
return {
|
|
139
|
+
totalServers: allServers.size,
|
|
140
|
+
fullyAligned: alignment.filter(a => a.aligned).length,
|
|
141
|
+
misaligned: alignment.filter(a => !a.aligned).length,
|
|
142
|
+
servers: alignment,
|
|
143
|
+
};
|
|
144
|
+
}
|
|
145
|
+
|
|
146
|
+
/**
|
|
147
|
+
* Get the complete harmony governance summary.
|
|
148
|
+
*
|
|
149
|
+
* @param {Object|null} canonicalModel - The canonical model from canon.js
|
|
150
|
+
* @param {Array} [platformAudits] - Array of per-platform audit results with governance data
|
|
151
|
+
* @returns {Object} Full governance summary
|
|
152
|
+
*/
|
|
153
|
+
function getHarmonyGovernanceSummary(canonicalModel, platformAudits) {
|
|
154
|
+
const audits = platformAudits || [];
|
|
155
|
+
|
|
156
|
+
// 1. Minimum trust posture (lowest acceptable across all platforms)
|
|
157
|
+
const trustLevels = audits.map(audit => ({
|
|
158
|
+
platform: audit.platform,
|
|
159
|
+
trust: inferTrustLevel(audit.governance),
|
|
160
|
+
}));
|
|
161
|
+
|
|
162
|
+
const lowestTrust = trustLevels.length > 0
|
|
163
|
+
? trustLevels.reduce((min, curr) =>
|
|
164
|
+
curr.trust.level < min.trust.level ? curr : min
|
|
165
|
+
)
|
|
166
|
+
: null;
|
|
167
|
+
|
|
168
|
+
const minimumTrustPosture = {
|
|
169
|
+
level: lowestTrust ? lowestTrust.trust : TRUST_LEVELS.unrestricted,
|
|
170
|
+
lowestPlatform: lowestTrust ? lowestTrust.platform : null,
|
|
171
|
+
perPlatform: trustLevels.map(t => ({
|
|
172
|
+
platform: t.platform,
|
|
173
|
+
level: t.trust.label,
|
|
174
|
+
levelNumber: t.trust.level,
|
|
175
|
+
description: t.trust.description,
|
|
176
|
+
})),
|
|
177
|
+
};
|
|
178
|
+
|
|
179
|
+
// 2. Required instruction coverage per platform
|
|
180
|
+
const instructionCoverage = {
|
|
181
|
+
required: REQUIRED_INSTRUCTION_SECTIONS,
|
|
182
|
+
perPlatform: audits.map(audit => ({
|
|
183
|
+
platform: audit.platform,
|
|
184
|
+
...evaluateInstructionCoverage(audit.sections),
|
|
185
|
+
})),
|
|
186
|
+
};
|
|
187
|
+
|
|
188
|
+
// 3. MCP alignment
|
|
189
|
+
const mcpAlignment = evaluateMcpAlignment(audits);
|
|
190
|
+
|
|
191
|
+
// 4. Compliance: per-platform governance status
|
|
192
|
+
const platformCompliance = audits.map(audit => {
|
|
193
|
+
const coverage = evaluateInstructionCoverage(audit.sections);
|
|
194
|
+
const trust = inferTrustLevel(audit.governance);
|
|
195
|
+
const gaps = [];
|
|
196
|
+
|
|
197
|
+
if (coverage.missing > 0) {
|
|
198
|
+
gaps.push(`Missing ${coverage.missing} required instruction section(s): ${coverage.missingSections.map(s => s.key).join(', ')}`);
|
|
199
|
+
}
|
|
200
|
+
|
|
201
|
+
if (trust.level >= 4) {
|
|
202
|
+
gaps.push(`Trust level "${trust.label}" is too permissive for production use`);
|
|
203
|
+
}
|
|
204
|
+
|
|
205
|
+
if (audit.governance && !audit.governance.hasSecretProtection) {
|
|
206
|
+
gaps.push('No secret protection configured');
|
|
207
|
+
}
|
|
208
|
+
|
|
209
|
+
if (audit.governance && !audit.governance.hasDenyRules) {
|
|
210
|
+
gaps.push('No deny rules configured');
|
|
211
|
+
}
|
|
212
|
+
|
|
213
|
+
return {
|
|
214
|
+
platform: audit.platform,
|
|
215
|
+
compliant: gaps.length === 0,
|
|
216
|
+
score: audit.score || 0,
|
|
217
|
+
trustLevel: trust.label,
|
|
218
|
+
coveragePercent: coverage.percentage,
|
|
219
|
+
gaps,
|
|
220
|
+
};
|
|
221
|
+
});
|
|
222
|
+
|
|
223
|
+
return {
|
|
224
|
+
minimumTrustPosture,
|
|
225
|
+
instructionCoverage,
|
|
226
|
+
mcpAlignment,
|
|
227
|
+
platformCompliance,
|
|
228
|
+
evaluatedAt: new Date().toISOString(),
|
|
229
|
+
};
|
|
230
|
+
}
|
|
231
|
+
|
|
232
|
+
// ─── Report formatting ────────────────────────────────────────────────────────
|
|
233
|
+
|
|
234
|
+
const COLORS = {
|
|
235
|
+
reset: '\x1b[0m', bold: '\x1b[1m', dim: '\x1b[2m',
|
|
236
|
+
green: '\x1b[32m', yellow: '\x1b[33m', red: '\x1b[31m', blue: '\x1b[36m',
|
|
237
|
+
};
|
|
238
|
+
const col = (text, color) => `${COLORS[color] || ''}${text}${COLORS.reset}`;
|
|
239
|
+
|
|
240
|
+
/**
|
|
241
|
+
* Format the governance summary as a human-readable console report.
|
|
242
|
+
*/
|
|
243
|
+
function formatHarmonyGovernanceReport(summary, options) {
|
|
244
|
+
if (options && options.json) {
|
|
245
|
+
return JSON.stringify(summary, null, 2);
|
|
246
|
+
}
|
|
247
|
+
|
|
248
|
+
const lines = [];
|
|
249
|
+
|
|
250
|
+
lines.push('');
|
|
251
|
+
lines.push(col(' Harmony Governance Report', 'bold'));
|
|
252
|
+
lines.push(col(' ═══════════════════════════════════════', 'dim'));
|
|
253
|
+
lines.push('');
|
|
254
|
+
|
|
255
|
+
// Trust posture
|
|
256
|
+
lines.push(col(' Trust Posture', 'bold'));
|
|
257
|
+
for (const entry of summary.minimumTrustPosture.perPlatform) {
|
|
258
|
+
const trustColor = entry.levelNumber <= 2 ? 'green' : entry.levelNumber <= 3 ? 'yellow' : 'red';
|
|
259
|
+
lines.push(` ${entry.platform}: ${col(entry.level, trustColor)} — ${entry.description}`);
|
|
260
|
+
}
|
|
261
|
+
if (summary.minimumTrustPosture.lowestPlatform) {
|
|
262
|
+
lines.push(` ${col('Minimum:', 'dim')} ${summary.minimumTrustPosture.level.label} (${summary.minimumTrustPosture.lowestPlatform})`);
|
|
263
|
+
}
|
|
264
|
+
lines.push('');
|
|
265
|
+
|
|
266
|
+
// Instruction coverage
|
|
267
|
+
lines.push(col(' Instruction Coverage', 'bold'));
|
|
268
|
+
for (const entry of summary.instructionCoverage.perPlatform) {
|
|
269
|
+
const pctColor = entry.percentage >= 80 ? 'green' : entry.percentage >= 50 ? 'yellow' : 'red';
|
|
270
|
+
lines.push(` ${entry.platform}: ${col(`${entry.percentage}%`, pctColor)} (${entry.covered}/${entry.total})`);
|
|
271
|
+
if (entry.missingSections.length > 0) {
|
|
272
|
+
lines.push(` ${col('Missing:', 'dim')} ${entry.missingSections.map(s => s.key).join(', ')}`);
|
|
273
|
+
}
|
|
274
|
+
}
|
|
275
|
+
lines.push('');
|
|
276
|
+
|
|
277
|
+
// MCP alignment
|
|
278
|
+
lines.push(col(' MCP Alignment', 'bold'));
|
|
279
|
+
lines.push(` Total servers: ${summary.mcpAlignment.totalServers}`);
|
|
280
|
+
lines.push(` Fully aligned: ${col(String(summary.mcpAlignment.fullyAligned), 'green')}`);
|
|
281
|
+
lines.push(` Misaligned: ${col(String(summary.mcpAlignment.misaligned), summary.mcpAlignment.misaligned > 0 ? 'yellow' : 'green')}`);
|
|
282
|
+
for (const server of summary.mcpAlignment.servers) {
|
|
283
|
+
if (!server.aligned) {
|
|
284
|
+
lines.push(` ${col(server.server, 'yellow')}: missing from ${server.missingFrom.join(', ')}`);
|
|
285
|
+
}
|
|
286
|
+
}
|
|
287
|
+
lines.push('');
|
|
288
|
+
|
|
289
|
+
// Platform compliance
|
|
290
|
+
lines.push(col(' Platform Compliance', 'bold'));
|
|
291
|
+
for (const entry of summary.platformCompliance) {
|
|
292
|
+
const status = entry.compliant
|
|
293
|
+
? col('COMPLIANT', 'green')
|
|
294
|
+
: col('NON-COMPLIANT', 'red');
|
|
295
|
+
lines.push(` ${entry.platform}: ${status} (score: ${entry.score}, trust: ${entry.trustLevel}, coverage: ${entry.coveragePercent}%)`);
|
|
296
|
+
for (const gap of entry.gaps) {
|
|
297
|
+
lines.push(` ${col('GAP:', 'yellow')} ${gap}`);
|
|
298
|
+
}
|
|
299
|
+
}
|
|
300
|
+
lines.push('');
|
|
301
|
+
|
|
302
|
+
return lines.join('\n');
|
|
303
|
+
}
|
|
304
|
+
|
|
305
|
+
module.exports = {
|
|
306
|
+
getHarmonyGovernanceSummary,
|
|
307
|
+
formatHarmonyGovernanceReport,
|
|
308
|
+
inferTrustLevel,
|
|
309
|
+
evaluateInstructionCoverage,
|
|
310
|
+
evaluateMcpAlignment,
|
|
311
|
+
TRUST_LEVELS,
|
|
312
|
+
REQUIRED_INSTRUCTION_SECTIONS,
|
|
313
|
+
};
|