@nerviq/cli 1.20.1 → 1.22.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +23 -23
- package/README.md +20 -2
- package/bin/cli.js +3 -3
- package/package.json +1 -1
- package/src/activity.js +1039 -1039
- package/src/adoption-advisor.js +299 -299
- package/src/aider/config-parser.js +166 -166
- package/src/aider/context.js +4 -1
- package/src/aider/deep-review.js +316 -316
- package/src/aider/domain-packs.js +303 -303
- package/src/aider/freshness.js +93 -93
- package/src/aider/governance.js +253 -253
- package/src/aider/interactive.js +334 -334
- package/src/aider/mcp-packs.js +329 -329
- package/src/aider/patch.js +214 -214
- package/src/aider/plans.js +186 -186
- package/src/aider/premium.js +360 -360
- package/src/aider/setup.js +404 -404
- package/src/aider/techniques.js +312 -67
- package/src/analyze.js +951 -951
- package/src/anti-patterns.js +485 -485
- package/src/audit/instruction-files.js +180 -180
- package/src/audit/recommendations.js +577 -577
- package/src/audit.js +20 -0
- package/src/auto-suggest.js +154 -154
- package/src/badge.js +13 -13
- package/src/behavioral-drift.js +801 -801
- package/src/benchmark.js +67 -67
- package/src/catalog.js +103 -103
- package/src/certification.js +128 -128
- package/src/codex/config-parser.js +183 -183
- package/src/codex/context.js +223 -223
- package/src/codex/deep-review.js +493 -493
- package/src/codex/domain-packs.js +394 -394
- package/src/codex/freshness.js +84 -84
- package/src/codex/governance.js +192 -192
- package/src/codex/interactive.js +618 -618
- package/src/codex/mcp-packs.js +914 -914
- package/src/codex/patch.js +209 -209
- package/src/codex/plans.js +251 -251
- package/src/codex/premium.js +614 -614
- package/src/codex/setup.js +591 -591
- package/src/continuous-ops.js +681 -681
- package/src/copilot/activity.js +309 -309
- package/src/copilot/deep-review.js +346 -346
- package/src/copilot/domain-packs.js +372 -372
- package/src/copilot/freshness.js +57 -57
- package/src/copilot/governance.js +222 -222
- package/src/copilot/interactive.js +406 -406
- package/src/copilot/mcp-packs.js +826 -826
- package/src/copilot/plans.js +253 -253
- package/src/copilot/premium.js +451 -451
- package/src/copilot/setup.js +488 -488
- package/src/cost-tracking.js +61 -61
- package/src/cursor/activity.js +301 -301
- package/src/cursor/config-parser.js +265 -265
- package/src/cursor/context.js +256 -256
- package/src/cursor/deep-review.js +334 -334
- package/src/cursor/domain-packs.js +368 -368
- package/src/cursor/freshness.js +65 -65
- package/src/cursor/governance.js +229 -229
- package/src/cursor/interactive.js +391 -391
- package/src/cursor/mcp-packs.js +828 -828
- package/src/cursor/plans.js +254 -254
- package/src/cursor/premium.js +469 -469
- package/src/cursor/setup.js +488 -488
- package/src/dashboard.js +493 -493
- package/src/deep-review.js +428 -428
- package/src/deprecation.js +98 -98
- package/src/diff-only.js +280 -280
- package/src/doctor.js +119 -119
- package/src/domain-pack-expansion.js +1033 -1033
- package/src/domain-packs.js +387 -387
- package/src/feedback.js +178 -178
- package/src/fix-engine.js +783 -783
- package/src/fix-prompts.js +122 -122
- package/src/formatters/csv.js +69 -0
- package/src/formatters/junit.js +99 -0
- package/src/formatters/markdown.js +118 -0
- package/src/formatters/sarif.js +115 -115
- package/src/freshness.js +74 -74
- package/src/gemini/config-parser.js +275 -275
- package/src/gemini/deep-review.js +559 -559
- package/src/gemini/domain-packs.js +393 -393
- package/src/gemini/freshness.js +66 -66
- package/src/gemini/governance.js +201 -201
- package/src/gemini/interactive.js +860 -860
- package/src/gemini/mcp-packs.js +915 -915
- package/src/gemini/plans.js +269 -269
- package/src/gemini/premium.js +760 -760
- package/src/gemini/setup.js +692 -692
- package/src/governance.js +72 -72
- package/src/harmony/add.js +68 -68
- package/src/harmony/advisor.js +333 -333
- package/src/harmony/canon.js +565 -565
- package/src/harmony/cli.js +591 -591
- package/src/harmony/drift.js +401 -401
- package/src/harmony/governance.js +313 -313
- package/src/harmony/memory.js +239 -239
- package/src/harmony/sync.js +475 -475
- package/src/harmony/watch.js +370 -370
- package/src/hook-validation.js +342 -342
- package/src/index.js +271 -271
- package/src/init.js +184 -184
- package/src/instruction-surfaces.js +185 -185
- package/src/integrations.js +144 -144
- package/src/interactive.js +118 -118
- package/src/locales/en.json +1 -1
- package/src/locales/es.json +1 -1
- package/src/mcp-packs.js +830 -830
- package/src/mcp-server.js +726 -726
- package/src/mcp-validation.js +337 -337
- package/src/nerviq-sync.json +7 -7
- package/src/opencode/config-parser.js +109 -109
- package/src/opencode/context.js +247 -247
- package/src/opencode/deep-review.js +313 -313
- package/src/opencode/domain-packs.js +262 -262
- package/src/opencode/freshness.js +66 -66
- package/src/opencode/governance.js +159 -159
- package/src/opencode/interactive.js +392 -392
- package/src/opencode/mcp-packs.js +705 -705
- package/src/opencode/patch.js +184 -184
- package/src/opencode/plans.js +231 -231
- package/src/opencode/premium.js +413 -413
- package/src/opencode/setup.js +449 -449
- package/src/opencode/techniques.js +27 -27
- package/src/operating-profile.js +574 -574
- package/src/org.js +152 -152
- package/src/permission-rules.js +218 -218
- package/src/plans.js +839 -839
- package/src/platform-change-manifest.js +86 -86
- package/src/plugins.js +110 -110
- package/src/policy-layers.js +210 -210
- package/src/profiles.js +124 -124
- package/src/prompt-injection.js +74 -74
- package/src/public-api.js +173 -173
- package/src/recommendation-rules.js +84 -84
- package/src/repo-archetype.js +386 -386
- package/src/secret-patterns.js +39 -39
- package/src/server.js +527 -527
- package/src/setup/analysis.js +607 -607
- package/src/setup/runtime.js +172 -172
- package/src/setup.js +677 -677
- package/src/shared/capabilities.js +194 -194
- package/src/source-urls.js +132 -132
- package/src/stack-checks.js +565 -565
- package/src/supplemental-checks.js +13 -13
- package/src/synergy/adaptive.js +261 -261
- package/src/synergy/compensation.js +137 -137
- package/src/synergy/evidence.js +193 -193
- package/src/synergy/learning.js +199 -199
- package/src/synergy/patterns.js +227 -227
- package/src/synergy/ranking.js +83 -83
- package/src/synergy/report.js +165 -165
- package/src/synergy/routing.js +146 -146
- package/src/techniques/api.js +407 -407
- package/src/techniques/automation.js +316 -316
- package/src/techniques/compliance.js +257 -257
- package/src/techniques/hygiene.js +294 -294
- package/src/techniques/instructions.js +243 -243
- package/src/techniques/observability.js +226 -226
- package/src/techniques/optimization.js +142 -142
- package/src/techniques/quality.js +318 -318
- package/src/techniques/security.js +237 -237
- package/src/techniques/shared.js +443 -443
- package/src/techniques/stacks.js +2294 -2294
- package/src/techniques/tools.js +106 -106
- package/src/techniques/workflow.js +413 -413
- package/src/techniques.js +81 -81
- package/src/terminology.js +73 -73
- package/src/token-estimate.js +35 -35
- package/src/usage-patterns.js +99 -99
- package/src/verification-metadata.js +145 -145
- package/src/watch.js +247 -247
- package/src/windsurf/activity.js +302 -302
- package/src/windsurf/config-parser.js +267 -267
- package/src/windsurf/deep-review.js +337 -337
- package/src/windsurf/domain-packs.js +370 -370
- package/src/windsurf/freshness.js +36 -36
- package/src/windsurf/governance.js +231 -231
- package/src/windsurf/interactive.js +388 -388
- package/src/windsurf/mcp-packs.js +792 -792
- package/src/windsurf/plans.js +247 -247
- package/src/windsurf/premium.js +468 -468
- package/src/windsurf/setup.js +471 -471
- package/src/workspace.js +375 -375
package/src/gemini/freshness.js
CHANGED
|
@@ -27,39 +27,39 @@ const P0_SOURCES = [
|
|
|
27
27
|
stalenessThresholdDays: 30,
|
|
28
28
|
verifiedAt: '2026-04-07',
|
|
29
29
|
},
|
|
30
|
-
{
|
|
31
|
-
key: 'gemini-md-guide',
|
|
32
|
-
label: 'GEMINI.md Guide',
|
|
33
|
-
url: 'https://google-gemini.github.io/gemini-cli/docs/cli/gemini-md.html',
|
|
34
|
-
stalenessThresholdDays: 30,
|
|
35
|
-
verifiedAt: '2026-04-07',
|
|
36
|
-
},
|
|
37
|
-
{
|
|
38
|
-
key: 'gemini-trusted-folders-docs',
|
|
39
|
-
label: 'Gemini Trusted Folders',
|
|
40
|
-
url: 'https://google-gemini.github.io/gemini-cli/docs/cli/trusted-folders.html',
|
|
41
|
-
stalenessThresholdDays: 14,
|
|
42
|
-
verifiedAt: '2026-04-10',
|
|
43
|
-
},
|
|
44
|
-
{
|
|
45
|
-
key: 'gemini-ide-integration-docs',
|
|
46
|
-
label: 'Gemini IDE Integration',
|
|
47
|
-
url: 'https://google-gemini.github.io/gemini-cli/docs/ide-integration.html',
|
|
48
|
-
stalenessThresholdDays: 14,
|
|
49
|
-
verifiedAt: '2026-04-10',
|
|
50
|
-
},
|
|
51
|
-
{
|
|
52
|
-
key: 'gemini-architecture-docs',
|
|
53
|
-
label: 'Gemini Architecture Overview',
|
|
54
|
-
url: 'https://google-gemini.github.io/gemini-cli/docs/architecture.html',
|
|
55
|
-
stalenessThresholdDays: 30,
|
|
56
|
-
verifiedAt: '2026-04-10',
|
|
57
|
-
},
|
|
58
|
-
{
|
|
59
|
-
key: 'gemini-hooks-docs',
|
|
60
|
-
label: 'Gemini Hooks Documentation',
|
|
61
|
-
url: 'https://google-gemini.github.io/gemini-cli/docs/hooks/',
|
|
62
|
-
stalenessThresholdDays: 30,
|
|
30
|
+
{
|
|
31
|
+
key: 'gemini-md-guide',
|
|
32
|
+
label: 'GEMINI.md Guide',
|
|
33
|
+
url: 'https://google-gemini.github.io/gemini-cli/docs/cli/gemini-md.html',
|
|
34
|
+
stalenessThresholdDays: 30,
|
|
35
|
+
verifiedAt: '2026-04-07',
|
|
36
|
+
},
|
|
37
|
+
{
|
|
38
|
+
key: 'gemini-trusted-folders-docs',
|
|
39
|
+
label: 'Gemini Trusted Folders',
|
|
40
|
+
url: 'https://google-gemini.github.io/gemini-cli/docs/cli/trusted-folders.html',
|
|
41
|
+
stalenessThresholdDays: 14,
|
|
42
|
+
verifiedAt: '2026-04-10',
|
|
43
|
+
},
|
|
44
|
+
{
|
|
45
|
+
key: 'gemini-ide-integration-docs',
|
|
46
|
+
label: 'Gemini IDE Integration',
|
|
47
|
+
url: 'https://google-gemini.github.io/gemini-cli/docs/ide-integration.html',
|
|
48
|
+
stalenessThresholdDays: 14,
|
|
49
|
+
verifiedAt: '2026-04-10',
|
|
50
|
+
},
|
|
51
|
+
{
|
|
52
|
+
key: 'gemini-architecture-docs',
|
|
53
|
+
label: 'Gemini Architecture Overview',
|
|
54
|
+
url: 'https://google-gemini.github.io/gemini-cli/docs/architecture.html',
|
|
55
|
+
stalenessThresholdDays: 30,
|
|
56
|
+
verifiedAt: '2026-04-10',
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
key: 'gemini-hooks-docs',
|
|
60
|
+
label: 'Gemini Hooks Documentation',
|
|
61
|
+
url: 'https://google-gemini.github.io/gemini-cli/docs/hooks/',
|
|
62
|
+
stalenessThresholdDays: 30,
|
|
63
63
|
verifiedAt: '2026-04-07',
|
|
64
64
|
},
|
|
65
65
|
{
|
|
@@ -135,39 +135,39 @@ const PROPAGATION_CHECKLIST = [
|
|
|
135
135
|
'src/gemini/setup.js — update sandbox starter template',
|
|
136
136
|
],
|
|
137
137
|
},
|
|
138
|
-
{
|
|
139
|
-
trigger: 'Policy engine syntax or rule format change',
|
|
140
|
-
targets: [
|
|
141
|
-
'src/gemini/techniques.js — update policy validation checks',
|
|
142
|
-
'src/gemini/governance.js — update policy templates and caveats',
|
|
143
|
-
'src/gemini/config-parser.js — update policy parsing rules',
|
|
144
|
-
],
|
|
145
|
-
},
|
|
146
|
-
{
|
|
147
|
-
trigger: 'Trusted-folder or safe-mode behavior change',
|
|
148
|
-
targets: [
|
|
149
|
-
'src/gemini/techniques.js — update trust/safe-mode checks',
|
|
150
|
-
'src/gemini/governance.js — update trusted-folder caveats and permission guidance',
|
|
151
|
-
'src/source-urls.js — refresh Gemini trust source mappings',
|
|
152
|
-
],
|
|
153
|
-
},
|
|
154
|
-
{
|
|
155
|
-
trigger: 'IDE integration change (workspace context, diffing, companion extension behavior)',
|
|
156
|
-
targets: [
|
|
157
|
-
'src/gemini/techniques.js — update IDE-assist and context-surface checks',
|
|
158
|
-
'src/gemini/setup.js — update IDE integration starter guidance',
|
|
159
|
-
'src/source-urls.js — refresh Gemini IDE source mappings',
|
|
160
|
-
],
|
|
161
|
-
},
|
|
162
|
-
{
|
|
163
|
-
trigger: 'Architecture or orchestration change (packages/core, tool flow, approval path)',
|
|
164
|
-
targets: [
|
|
165
|
-
'src/gemini/context.js — revisit assumptions tied to tool and session orchestration',
|
|
166
|
-
'src/gemini/techniques.js — update modern-feature and tool-flow checks',
|
|
167
|
-
'src/source-urls.js — refresh Gemini architecture source mappings',
|
|
168
|
-
],
|
|
169
|
-
},
|
|
170
|
-
];
|
|
138
|
+
{
|
|
139
|
+
trigger: 'Policy engine syntax or rule format change',
|
|
140
|
+
targets: [
|
|
141
|
+
'src/gemini/techniques.js — update policy validation checks',
|
|
142
|
+
'src/gemini/governance.js — update policy templates and caveats',
|
|
143
|
+
'src/gemini/config-parser.js — update policy parsing rules',
|
|
144
|
+
],
|
|
145
|
+
},
|
|
146
|
+
{
|
|
147
|
+
trigger: 'Trusted-folder or safe-mode behavior change',
|
|
148
|
+
targets: [
|
|
149
|
+
'src/gemini/techniques.js — update trust/safe-mode checks',
|
|
150
|
+
'src/gemini/governance.js — update trusted-folder caveats and permission guidance',
|
|
151
|
+
'src/source-urls.js — refresh Gemini trust source mappings',
|
|
152
|
+
],
|
|
153
|
+
},
|
|
154
|
+
{
|
|
155
|
+
trigger: 'IDE integration change (workspace context, diffing, companion extension behavior)',
|
|
156
|
+
targets: [
|
|
157
|
+
'src/gemini/techniques.js — update IDE-assist and context-surface checks',
|
|
158
|
+
'src/gemini/setup.js — update IDE integration starter guidance',
|
|
159
|
+
'src/source-urls.js — refresh Gemini IDE source mappings',
|
|
160
|
+
],
|
|
161
|
+
},
|
|
162
|
+
{
|
|
163
|
+
trigger: 'Architecture or orchestration change (packages/core, tool flow, approval path)',
|
|
164
|
+
targets: [
|
|
165
|
+
'src/gemini/context.js — revisit assumptions tied to tool and session orchestration',
|
|
166
|
+
'src/gemini/techniques.js — update modern-feature and tool-flow checks',
|
|
167
|
+
'src/source-urls.js — refresh Gemini architecture source mappings',
|
|
168
|
+
],
|
|
169
|
+
},
|
|
170
|
+
];
|
|
171
171
|
|
|
172
172
|
/**
|
|
173
173
|
* Release gate: check if all P0 sources are within staleness threshold.
|
package/src/gemini/governance.js
CHANGED
|
@@ -1,201 +1,201 @@
|
|
|
1
|
-
const { GEMINI_DOMAIN_PACKS } = require('./domain-packs');
|
|
2
|
-
const { GEMINI_MCP_PACKS } = require('./mcp-packs');
|
|
3
|
-
|
|
4
|
-
const GEMINI_PERMISSION_PROFILES = [
|
|
5
|
-
{
|
|
6
|
-
key: 'locked-down',
|
|
7
|
-
label: 'Locked Down',
|
|
8
|
-
risk: 'low',
|
|
9
|
-
defaultSandbox: 'restricted',
|
|
10
|
-
approvalPolicy: 'always-confirm',
|
|
11
|
-
useWhen: 'First contact with a repo, security review, or regulated environments.',
|
|
12
|
-
behavior: 'No writes, explicit confirmation for anything outside read-only operations.',
|
|
13
|
-
},
|
|
14
|
-
{
|
|
15
|
-
key: 'normal',
|
|
16
|
-
label: 'Normal',
|
|
17
|
-
risk: 'medium',
|
|
18
|
-
defaultSandbox: 'sandbox-enabled',
|
|
19
|
-
approvalPolicy: 'prompt-on-write',
|
|
20
|
-
useWhen: 'Default product work where Gemini CLI edits locally but risky commands still need review.',
|
|
21
|
-
behavior: 'Balanced baseline for normal repo work with sandbox protection.',
|
|
22
|
-
},
|
|
23
|
-
{
|
|
24
|
-
key: 'auto-edit',
|
|
25
|
-
label: 'Auto Edit',
|
|
26
|
-
risk: 'medium',
|
|
27
|
-
defaultSandbox: 'sandbox-enabled',
|
|
28
|
-
approvalPolicy: 'auto-approve-edits',
|
|
29
|
-
useWhen: 'Trusted repos where file edits are pre-approved but shell commands still require confirmation.',
|
|
30
|
-
behavior: 'Auto-approves file writes but prompts for shell execution and network access.',
|
|
31
|
-
},
|
|
32
|
-
{
|
|
33
|
-
key: 'yolo',
|
|
34
|
-
label: 'YOLO',
|
|
35
|
-
risk: 'critical',
|
|
36
|
-
defaultSandbox: 'disabled',
|
|
37
|
-
approvalPolicy: 'never',
|
|
38
|
-
useWhen: 'Exceptional internal debugging or fully sandboxed external environments only.',
|
|
39
|
-
behavior: 'Bypasses ALL confirmation prompts. --yolo flag. Extremely dangerous in production repos. Should never be the product default.',
|
|
40
|
-
},
|
|
41
|
-
{
|
|
42
|
-
key: 'sandboxed',
|
|
43
|
-
label: 'Sandboxed',
|
|
44
|
-
risk: 'low',
|
|
45
|
-
defaultSandbox: 'strict-sandbox',
|
|
46
|
-
approvalPolicy: 'prompt-on-escape',
|
|
47
|
-
useWhen: 'Repos requiring strict filesystem isolation with explicit sandbox escape approval.',
|
|
48
|
-
behavior: 'All operations run in sandbox. Any escape from sandbox requires explicit user approval.',
|
|
49
|
-
},
|
|
50
|
-
{
|
|
51
|
-
key: 'ci-headless',
|
|
52
|
-
label: 'CI Headless',
|
|
53
|
-
risk: 'high',
|
|
54
|
-
defaultSandbox: 'sandbox-enabled',
|
|
55
|
-
approvalPolicy: 'never',
|
|
56
|
-
useWhen: 'GitHub Actions, CI pipelines, or scheduled automation where the outer CI environment provides containment.',
|
|
57
|
-
behavior: 'No prompts. Designed for CI contexts with CI_* environment variables. Requires GEMINI_API_KEY, not user credentials.',
|
|
58
|
-
},
|
|
59
|
-
];
|
|
60
|
-
|
|
61
|
-
const GEMINI_HOOK_REGISTRY = [
|
|
62
|
-
{
|
|
63
|
-
key: 'before-tool',
|
|
64
|
-
file: '.gemini/settings.json',
|
|
65
|
-
triggerPoint: 'BeforeTool',
|
|
66
|
-
matcher: 'tool events',
|
|
67
|
-
purpose: 'Pre-flight validation before tool execution.',
|
|
68
|
-
risk: 'medium',
|
|
69
|
-
},
|
|
70
|
-
{
|
|
71
|
-
key: 'after-tool',
|
|
72
|
-
file: '.gemini/settings.json',
|
|
73
|
-
triggerPoint: 'AfterTool',
|
|
74
|
-
matcher: 'tool events',
|
|
75
|
-
purpose: 'Post-execution checks and guardrails after tool commands complete.',
|
|
76
|
-
risk: 'medium',
|
|
77
|
-
},
|
|
78
|
-
{
|
|
79
|
-
key: 'after-tool-scrub',
|
|
80
|
-
file: '.gemini/settings.json',
|
|
81
|
-
triggerPoint: 'AfterTool',
|
|
82
|
-
matcher: 'sensitive output patterns',
|
|
83
|
-
purpose: 'Scrub sensitive data (secrets, tokens, PII) from tool output before it reaches the model context. Gemini-unique hook variant.',
|
|
84
|
-
risk: 'medium',
|
|
85
|
-
},
|
|
86
|
-
{
|
|
87
|
-
key: 'session-start',
|
|
88
|
-
file: '.gemini/settings.json',
|
|
89
|
-
triggerPoint: 'SessionStart',
|
|
90
|
-
matcher: null,
|
|
91
|
-
purpose: 'Bootstrap local context, load policies, or set guardrails at session start.',
|
|
92
|
-
risk: 'low',
|
|
93
|
-
},
|
|
94
|
-
{
|
|
95
|
-
key: 'session-end',
|
|
96
|
-
file: '.gemini/settings.json',
|
|
97
|
-
triggerPoint: 'SessionEnd',
|
|
98
|
-
matcher: null,
|
|
99
|
-
purpose: 'Clean up resources, log session outcomes, or export metrics when Gemini CLI exits.',
|
|
100
|
-
risk: 'low',
|
|
101
|
-
},
|
|
102
|
-
{
|
|
103
|
-
key: 'user-prompt-submit',
|
|
104
|
-
file: '.gemini/settings.json',
|
|
105
|
-
triggerPoint: 'UserPromptSubmit',
|
|
106
|
-
matcher: null,
|
|
107
|
-
purpose: 'Validate or transform user prompts before they reach the model.',
|
|
108
|
-
risk: 'low',
|
|
109
|
-
},
|
|
110
|
-
{
|
|
111
|
-
key: 'policy-enforce',
|
|
112
|
-
file: '.gemini/settings.json',
|
|
113
|
-
triggerPoint: 'PolicyEnforce',
|
|
114
|
-
matcher: 'policy rule violations',
|
|
115
|
-
purpose: 'Enforce policy TOML rules before allowing operations. Gemini-unique hook for declarative governance.',
|
|
116
|
-
risk: 'medium',
|
|
117
|
-
},
|
|
118
|
-
];
|
|
119
|
-
|
|
120
|
-
const GEMINI_POLICY_PACKS = [
|
|
121
|
-
{
|
|
122
|
-
key: 'baseline-safe',
|
|
123
|
-
label: 'Baseline Safe',
|
|
124
|
-
modules: ['GEMINI.md baseline', 'safe settings.json', 'sandbox enabled', 'yolo disabled'],
|
|
125
|
-
useWhen: 'Default local Gemini CLI rollout.',
|
|
126
|
-
},
|
|
127
|
-
{
|
|
128
|
-
key: 'sandbox-enforced',
|
|
129
|
-
label: 'Sandbox Enforced',
|
|
130
|
-
modules: ['strict sandbox mode', 'filesystem isolation', 'escape approval required', 'blocked paths list'],
|
|
131
|
-
useWhen: 'Repos requiring strict filesystem boundaries with no implicit sandbox escapes. Gemini-unique policy pack.',
|
|
132
|
-
},
|
|
133
|
-
{
|
|
134
|
-
key: 'policy-governed',
|
|
135
|
-
label: 'Policy Governed',
|
|
136
|
-
modules: ['policy TOML files active', 'PolicyEnforce hook enabled', 'declarative rule engine', 'audit trail for violations'],
|
|
137
|
-
useWhen: 'Repos using Gemini CLI declarative policy system for governance. Gemini-unique policy pack.',
|
|
138
|
-
},
|
|
139
|
-
{
|
|
140
|
-
key: 'automation-reviewed',
|
|
141
|
-
label: 'Automation Reviewed',
|
|
142
|
-
modules: ['safe GitHub Action strategy', 'managed GEMINI_API_KEY', 'CI_* env detection', 'manual test note'],
|
|
143
|
-
useWhen: 'Repos adding Gemini CLI workflows in CI or scheduled automation.',
|
|
144
|
-
},
|
|
145
|
-
{
|
|
146
|
-
key: 'enterprise-strict',
|
|
147
|
-
label: 'Enterprise Strict',
|
|
148
|
-
modules: ['locked-down profile', 'audit trail', 'explicit governance export', 'compliance-safe settings', 'policy-governed enforcement'],
|
|
149
|
-
useWhen: 'Regulated or compliance-sensitive repos where every Gemini CLI action must be auditable.',
|
|
150
|
-
},
|
|
151
|
-
];
|
|
152
|
-
|
|
153
|
-
const GEMINI_PILOT_ROLLOUT_KIT = {
|
|
154
|
-
recommendedScope: [
|
|
155
|
-
'Start with audit and setup on one trusted repo before enabling automation.',
|
|
156
|
-
'Keep GEMINI.md and settings.json in version control so Gemini CLI behavior is reviewable.',
|
|
157
|
-
'Use workflow_dispatch or manual dry runs before schedules or CI tasks.',
|
|
158
|
-
'Never use --yolo in production without external sandbox containment.',
|
|
159
|
-
],
|
|
160
|
-
approvals: [
|
|
161
|
-
'Engineering owner approves sandbox mode and approval policy.',
|
|
162
|
-
'Security owner approves any CI, automation, or --yolo posture.',
|
|
163
|
-
'Pilot owner records before/after audit deltas and rollback expectations.',
|
|
164
|
-
'Policy files (.gemini/policy/) require review like code changes.',
|
|
165
|
-
],
|
|
166
|
-
successMetrics: [
|
|
167
|
-
'Audit score delta',
|
|
168
|
-
'Settings explicitness delta',
|
|
169
|
-
'Time to first useful Gemini CLI task',
|
|
170
|
-
'No-overwrite rate on existing repo files',
|
|
171
|
-
'Policy violation detection rate',
|
|
172
|
-
],
|
|
173
|
-
rollbackExpectations: [
|
|
174
|
-
'Every Gemini CLI setup/apply write path should emit a rollback artifact.',
|
|
175
|
-
'Re-run audit after rollback to confirm the repo returned to the expected state.',
|
|
176
|
-
'Policy files can be removed to revert governance without affecting other config.',
|
|
177
|
-
],
|
|
178
|
-
};
|
|
179
|
-
|
|
180
|
-
function getGeminiGovernanceSummary() {
|
|
181
|
-
return {
|
|
182
|
-
platform: 'gemini',
|
|
183
|
-
platformLabel: 'Gemini CLI',
|
|
184
|
-
permissionProfiles: GEMINI_PERMISSION_PROFILES,
|
|
185
|
-
hookRegistry: GEMINI_HOOK_REGISTRY,
|
|
186
|
-
policyPacks: GEMINI_POLICY_PACKS,
|
|
187
|
-
domainPacks: GEMINI_DOMAIN_PACKS,
|
|
188
|
-
mcpPacks: GEMINI_MCP_PACKS,
|
|
189
|
-
pilotRolloutKit: GEMINI_PILOT_ROLLOUT_KIT,
|
|
190
|
-
platformCaveats: [
|
|
191
|
-
'The --yolo flag bypasses ALL confirmation prompts and is a critical risk if used outside a fully sandboxed environment.',
|
|
192
|
-
'Code deletion bug: Gemini CLI may delete files unexpectedly during refactors — always review diffs before confirming.',
|
|
193
|
-
'Rate limiting: Gemini API has per-minute and per-day rate limits that can interrupt long automation chains.',
|
|
194
|
-
'CI_* environment variables change Gemini CLI behavior — ensure CI contexts use ci-headless profile explicitly.',
|
|
195
|
-
],
|
|
196
|
-
};
|
|
197
|
-
}
|
|
198
|
-
|
|
199
|
-
module.exports = {
|
|
200
|
-
getGeminiGovernanceSummary,
|
|
201
|
-
};
|
|
1
|
+
const { GEMINI_DOMAIN_PACKS } = require('./domain-packs');
|
|
2
|
+
const { GEMINI_MCP_PACKS } = require('./mcp-packs');
|
|
3
|
+
|
|
4
|
+
const GEMINI_PERMISSION_PROFILES = [
|
|
5
|
+
{
|
|
6
|
+
key: 'locked-down',
|
|
7
|
+
label: 'Locked Down',
|
|
8
|
+
risk: 'low',
|
|
9
|
+
defaultSandbox: 'restricted',
|
|
10
|
+
approvalPolicy: 'always-confirm',
|
|
11
|
+
useWhen: 'First contact with a repo, security review, or regulated environments.',
|
|
12
|
+
behavior: 'No writes, explicit confirmation for anything outside read-only operations.',
|
|
13
|
+
},
|
|
14
|
+
{
|
|
15
|
+
key: 'normal',
|
|
16
|
+
label: 'Normal',
|
|
17
|
+
risk: 'medium',
|
|
18
|
+
defaultSandbox: 'sandbox-enabled',
|
|
19
|
+
approvalPolicy: 'prompt-on-write',
|
|
20
|
+
useWhen: 'Default product work where Gemini CLI edits locally but risky commands still need review.',
|
|
21
|
+
behavior: 'Balanced baseline for normal repo work with sandbox protection.',
|
|
22
|
+
},
|
|
23
|
+
{
|
|
24
|
+
key: 'auto-edit',
|
|
25
|
+
label: 'Auto Edit',
|
|
26
|
+
risk: 'medium',
|
|
27
|
+
defaultSandbox: 'sandbox-enabled',
|
|
28
|
+
approvalPolicy: 'auto-approve-edits',
|
|
29
|
+
useWhen: 'Trusted repos where file edits are pre-approved but shell commands still require confirmation.',
|
|
30
|
+
behavior: 'Auto-approves file writes but prompts for shell execution and network access.',
|
|
31
|
+
},
|
|
32
|
+
{
|
|
33
|
+
key: 'yolo',
|
|
34
|
+
label: 'YOLO',
|
|
35
|
+
risk: 'critical',
|
|
36
|
+
defaultSandbox: 'disabled',
|
|
37
|
+
approvalPolicy: 'never',
|
|
38
|
+
useWhen: 'Exceptional internal debugging or fully sandboxed external environments only.',
|
|
39
|
+
behavior: 'Bypasses ALL confirmation prompts. --yolo flag. Extremely dangerous in production repos. Should never be the product default.',
|
|
40
|
+
},
|
|
41
|
+
{
|
|
42
|
+
key: 'sandboxed',
|
|
43
|
+
label: 'Sandboxed',
|
|
44
|
+
risk: 'low',
|
|
45
|
+
defaultSandbox: 'strict-sandbox',
|
|
46
|
+
approvalPolicy: 'prompt-on-escape',
|
|
47
|
+
useWhen: 'Repos requiring strict filesystem isolation with explicit sandbox escape approval.',
|
|
48
|
+
behavior: 'All operations run in sandbox. Any escape from sandbox requires explicit user approval.',
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
key: 'ci-headless',
|
|
52
|
+
label: 'CI Headless',
|
|
53
|
+
risk: 'high',
|
|
54
|
+
defaultSandbox: 'sandbox-enabled',
|
|
55
|
+
approvalPolicy: 'never',
|
|
56
|
+
useWhen: 'GitHub Actions, CI pipelines, or scheduled automation where the outer CI environment provides containment.',
|
|
57
|
+
behavior: 'No prompts. Designed for CI contexts with CI_* environment variables. Requires GEMINI_API_KEY, not user credentials.',
|
|
58
|
+
},
|
|
59
|
+
];
|
|
60
|
+
|
|
61
|
+
const GEMINI_HOOK_REGISTRY = [
|
|
62
|
+
{
|
|
63
|
+
key: 'before-tool',
|
|
64
|
+
file: '.gemini/settings.json',
|
|
65
|
+
triggerPoint: 'BeforeTool',
|
|
66
|
+
matcher: 'tool events',
|
|
67
|
+
purpose: 'Pre-flight validation before tool execution.',
|
|
68
|
+
risk: 'medium',
|
|
69
|
+
},
|
|
70
|
+
{
|
|
71
|
+
key: 'after-tool',
|
|
72
|
+
file: '.gemini/settings.json',
|
|
73
|
+
triggerPoint: 'AfterTool',
|
|
74
|
+
matcher: 'tool events',
|
|
75
|
+
purpose: 'Post-execution checks and guardrails after tool commands complete.',
|
|
76
|
+
risk: 'medium',
|
|
77
|
+
},
|
|
78
|
+
{
|
|
79
|
+
key: 'after-tool-scrub',
|
|
80
|
+
file: '.gemini/settings.json',
|
|
81
|
+
triggerPoint: 'AfterTool',
|
|
82
|
+
matcher: 'sensitive output patterns',
|
|
83
|
+
purpose: 'Scrub sensitive data (secrets, tokens, PII) from tool output before it reaches the model context. Gemini-unique hook variant.',
|
|
84
|
+
risk: 'medium',
|
|
85
|
+
},
|
|
86
|
+
{
|
|
87
|
+
key: 'session-start',
|
|
88
|
+
file: '.gemini/settings.json',
|
|
89
|
+
triggerPoint: 'SessionStart',
|
|
90
|
+
matcher: null,
|
|
91
|
+
purpose: 'Bootstrap local context, load policies, or set guardrails at session start.',
|
|
92
|
+
risk: 'low',
|
|
93
|
+
},
|
|
94
|
+
{
|
|
95
|
+
key: 'session-end',
|
|
96
|
+
file: '.gemini/settings.json',
|
|
97
|
+
triggerPoint: 'SessionEnd',
|
|
98
|
+
matcher: null,
|
|
99
|
+
purpose: 'Clean up resources, log session outcomes, or export metrics when Gemini CLI exits.',
|
|
100
|
+
risk: 'low',
|
|
101
|
+
},
|
|
102
|
+
{
|
|
103
|
+
key: 'user-prompt-submit',
|
|
104
|
+
file: '.gemini/settings.json',
|
|
105
|
+
triggerPoint: 'UserPromptSubmit',
|
|
106
|
+
matcher: null,
|
|
107
|
+
purpose: 'Validate or transform user prompts before they reach the model.',
|
|
108
|
+
risk: 'low',
|
|
109
|
+
},
|
|
110
|
+
{
|
|
111
|
+
key: 'policy-enforce',
|
|
112
|
+
file: '.gemini/settings.json',
|
|
113
|
+
triggerPoint: 'PolicyEnforce',
|
|
114
|
+
matcher: 'policy rule violations',
|
|
115
|
+
purpose: 'Enforce policy TOML rules before allowing operations. Gemini-unique hook for declarative governance.',
|
|
116
|
+
risk: 'medium',
|
|
117
|
+
},
|
|
118
|
+
];
|
|
119
|
+
|
|
120
|
+
const GEMINI_POLICY_PACKS = [
|
|
121
|
+
{
|
|
122
|
+
key: 'baseline-safe',
|
|
123
|
+
label: 'Baseline Safe',
|
|
124
|
+
modules: ['GEMINI.md baseline', 'safe settings.json', 'sandbox enabled', 'yolo disabled'],
|
|
125
|
+
useWhen: 'Default local Gemini CLI rollout.',
|
|
126
|
+
},
|
|
127
|
+
{
|
|
128
|
+
key: 'sandbox-enforced',
|
|
129
|
+
label: 'Sandbox Enforced',
|
|
130
|
+
modules: ['strict sandbox mode', 'filesystem isolation', 'escape approval required', 'blocked paths list'],
|
|
131
|
+
useWhen: 'Repos requiring strict filesystem boundaries with no implicit sandbox escapes. Gemini-unique policy pack.',
|
|
132
|
+
},
|
|
133
|
+
{
|
|
134
|
+
key: 'policy-governed',
|
|
135
|
+
label: 'Policy Governed',
|
|
136
|
+
modules: ['policy TOML files active', 'PolicyEnforce hook enabled', 'declarative rule engine', 'audit trail for violations'],
|
|
137
|
+
useWhen: 'Repos using Gemini CLI declarative policy system for governance. Gemini-unique policy pack.',
|
|
138
|
+
},
|
|
139
|
+
{
|
|
140
|
+
key: 'automation-reviewed',
|
|
141
|
+
label: 'Automation Reviewed',
|
|
142
|
+
modules: ['safe GitHub Action strategy', 'managed GEMINI_API_KEY', 'CI_* env detection', 'manual test note'],
|
|
143
|
+
useWhen: 'Repos adding Gemini CLI workflows in CI or scheduled automation.',
|
|
144
|
+
},
|
|
145
|
+
{
|
|
146
|
+
key: 'enterprise-strict',
|
|
147
|
+
label: 'Enterprise Strict',
|
|
148
|
+
modules: ['locked-down profile', 'audit trail', 'explicit governance export', 'compliance-safe settings', 'policy-governed enforcement'],
|
|
149
|
+
useWhen: 'Regulated or compliance-sensitive repos where every Gemini CLI action must be auditable.',
|
|
150
|
+
},
|
|
151
|
+
];
|
|
152
|
+
|
|
153
|
+
const GEMINI_PILOT_ROLLOUT_KIT = {
|
|
154
|
+
recommendedScope: [
|
|
155
|
+
'Start with audit and setup on one trusted repo before enabling automation.',
|
|
156
|
+
'Keep GEMINI.md and settings.json in version control so Gemini CLI behavior is reviewable.',
|
|
157
|
+
'Use workflow_dispatch or manual dry runs before schedules or CI tasks.',
|
|
158
|
+
'Never use --yolo in production without external sandbox containment.',
|
|
159
|
+
],
|
|
160
|
+
approvals: [
|
|
161
|
+
'Engineering owner approves sandbox mode and approval policy.',
|
|
162
|
+
'Security owner approves any CI, automation, or --yolo posture.',
|
|
163
|
+
'Pilot owner records before/after audit deltas and rollback expectations.',
|
|
164
|
+
'Policy files (.gemini/policy/) require review like code changes.',
|
|
165
|
+
],
|
|
166
|
+
successMetrics: [
|
|
167
|
+
'Audit score delta',
|
|
168
|
+
'Settings explicitness delta',
|
|
169
|
+
'Time to first useful Gemini CLI task',
|
|
170
|
+
'No-overwrite rate on existing repo files',
|
|
171
|
+
'Policy violation detection rate',
|
|
172
|
+
],
|
|
173
|
+
rollbackExpectations: [
|
|
174
|
+
'Every Gemini CLI setup/apply write path should emit a rollback artifact.',
|
|
175
|
+
'Re-run audit after rollback to confirm the repo returned to the expected state.',
|
|
176
|
+
'Policy files can be removed to revert governance without affecting other config.',
|
|
177
|
+
],
|
|
178
|
+
};
|
|
179
|
+
|
|
180
|
+
function getGeminiGovernanceSummary() {
|
|
181
|
+
return {
|
|
182
|
+
platform: 'gemini',
|
|
183
|
+
platformLabel: 'Gemini CLI',
|
|
184
|
+
permissionProfiles: GEMINI_PERMISSION_PROFILES,
|
|
185
|
+
hookRegistry: GEMINI_HOOK_REGISTRY,
|
|
186
|
+
policyPacks: GEMINI_POLICY_PACKS,
|
|
187
|
+
domainPacks: GEMINI_DOMAIN_PACKS,
|
|
188
|
+
mcpPacks: GEMINI_MCP_PACKS,
|
|
189
|
+
pilotRolloutKit: GEMINI_PILOT_ROLLOUT_KIT,
|
|
190
|
+
platformCaveats: [
|
|
191
|
+
'The --yolo flag bypasses ALL confirmation prompts and is a critical risk if used outside a fully sandboxed environment.',
|
|
192
|
+
'Code deletion bug: Gemini CLI may delete files unexpectedly during refactors — always review diffs before confirming.',
|
|
193
|
+
'Rate limiting: Gemini API has per-minute and per-day rate limits that can interrupt long automation chains.',
|
|
194
|
+
'CI_* environment variables change Gemini CLI behavior — ensure CI contexts use ci-headless profile explicitly.',
|
|
195
|
+
],
|
|
196
|
+
};
|
|
197
|
+
}
|
|
198
|
+
|
|
199
|
+
module.exports = {
|
|
200
|
+
getGeminiGovernanceSummary,
|
|
201
|
+
};
|