@nimiplatform/nimi-coding 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (186) hide show
  1. package/LICENSE +21 -0
  2. package/README.md +348 -0
  3. package/adapters/README.md +25 -0
  4. package/adapters/claude/README.md +89 -0
  5. package/adapters/claude/profile.yaml +70 -0
  6. package/adapters/codex/README.md +53 -0
  7. package/adapters/codex/profile.yaml +78 -0
  8. package/adapters/oh-my-codex/README.md +185 -0
  9. package/adapters/oh-my-codex/profile.yaml +46 -0
  10. package/bin/nimicoding.mjs +6 -0
  11. package/cli/commands/admit-high-risk-decision.mjs +108 -0
  12. package/cli/commands/audit-sweep.mjs +341 -0
  13. package/cli/commands/blueprint-audit.mjs +91 -0
  14. package/cli/commands/clear.mjs +168 -0
  15. package/cli/commands/closeout.mjs +183 -0
  16. package/cli/commands/decide-high-risk-execution.mjs +124 -0
  17. package/cli/commands/doctor.mjs +53 -0
  18. package/cli/commands/generate-spec-derived-docs.mjs +131 -0
  19. package/cli/commands/handoff.mjs +123 -0
  20. package/cli/commands/ingest-high-risk-execution.mjs +95 -0
  21. package/cli/commands/review-high-risk-execution.mjs +95 -0
  22. package/cli/commands/start.mjs +717 -0
  23. package/cli/commands/topic-formatters.mjs +382 -0
  24. package/cli/commands/topic-goal.mjs +33 -0
  25. package/cli/commands/topic-options-shared.mjs +27 -0
  26. package/cli/commands/topic-options-workflow.mjs +767 -0
  27. package/cli/commands/topic-options.mjs +626 -0
  28. package/cli/commands/topic-runner.mjs +169 -0
  29. package/cli/commands/topic.mjs +795 -0
  30. package/cli/commands/validate-acceptance.mjs +5 -0
  31. package/cli/commands/validate-ai-governance.mjs +214 -0
  32. package/cli/commands/validate-execution-packet.mjs +5 -0
  33. package/cli/commands/validate-orchestration-state.mjs +5 -0
  34. package/cli/commands/validate-prompt.mjs +5 -0
  35. package/cli/commands/validate-spec-audit.mjs +27 -0
  36. package/cli/commands/validate-spec-governance.mjs +124 -0
  37. package/cli/commands/validate-spec-tree.mjs +27 -0
  38. package/cli/commands/validate-worker-output.mjs +5 -0
  39. package/cli/constants.mjs +489 -0
  40. package/cli/help.mjs +134 -0
  41. package/cli/index.mjs +103 -0
  42. package/cli/lib/adapter-profiles.mjs +403 -0
  43. package/cli/lib/audit-execution.mjs +52 -0
  44. package/cli/lib/audit-sweep-runtime/admissions.mjs +381 -0
  45. package/cli/lib/audit-sweep-runtime/audit-validity.mjs +333 -0
  46. package/cli/lib/audit-sweep-runtime/chunks.mjs +697 -0
  47. package/cli/lib/audit-sweep-runtime/closeout.mjs +144 -0
  48. package/cli/lib/audit-sweep-runtime/codex-auditor-evidence.mjs +639 -0
  49. package/cli/lib/audit-sweep-runtime/codex-auditor.mjs +515 -0
  50. package/cli/lib/audit-sweep-runtime/common.mjs +329 -0
  51. package/cli/lib/audit-sweep-runtime/coverage-quality.mjs +172 -0
  52. package/cli/lib/audit-sweep-runtime/evidence-assignment.mjs +152 -0
  53. package/cli/lib/audit-sweep-runtime/format.mjs +57 -0
  54. package/cli/lib/audit-sweep-runtime/ingest.mjs +486 -0
  55. package/cli/lib/audit-sweep-runtime/inventory-spec-chunks.mjs +198 -0
  56. package/cli/lib/audit-sweep-runtime/inventory.mjs +728 -0
  57. package/cli/lib/audit-sweep-runtime/ledger.mjs +315 -0
  58. package/cli/lib/audit-sweep-runtime/p0p1-profile.mjs +101 -0
  59. package/cli/lib/audit-sweep-runtime/remediation.mjs +349 -0
  60. package/cli/lib/audit-sweep-runtime/rerun.mjs +129 -0
  61. package/cli/lib/audit-sweep-runtime/risk-budget.mjs +300 -0
  62. package/cli/lib/audit-sweep-runtime/status.mjs +62 -0
  63. package/cli/lib/audit-sweep-runtime/validators-ledger.mjs +215 -0
  64. package/cli/lib/audit-sweep-runtime/validators.mjs +758 -0
  65. package/cli/lib/audit-sweep.mjs +18 -0
  66. package/cli/lib/authority-convergence.mjs +309 -0
  67. package/cli/lib/blueprint-audit.mjs +370 -0
  68. package/cli/lib/bootstrap.mjs +228 -0
  69. package/cli/lib/closeout.mjs +623 -0
  70. package/cli/lib/codex-sdk-runner.mjs +76 -0
  71. package/cli/lib/contracts.mjs +180 -0
  72. package/cli/lib/doctor.mjs +18 -0
  73. package/cli/lib/entrypoints.mjs +274 -0
  74. package/cli/lib/external-execution.mjs +101 -0
  75. package/cli/lib/fs-helpers.mjs +33 -0
  76. package/cli/lib/handoff.mjs +785 -0
  77. package/cli/lib/high-risk-admission.mjs +442 -0
  78. package/cli/lib/high-risk-decision.mjs +324 -0
  79. package/cli/lib/high-risk-ingest.mjs +317 -0
  80. package/cli/lib/high-risk-review.mjs +263 -0
  81. package/cli/lib/internal/contracts-loaders.mjs +132 -0
  82. package/cli/lib/internal/contracts-parse-high-risk.mjs +131 -0
  83. package/cli/lib/internal/contracts-parse.mjs +457 -0
  84. package/cli/lib/internal/contracts-validators.mjs +398 -0
  85. package/cli/lib/internal/doctor-bootstrap-surface.mjs +359 -0
  86. package/cli/lib/internal/doctor-delegated-surface.mjs +256 -0
  87. package/cli/lib/internal/doctor-finalize.mjs +385 -0
  88. package/cli/lib/internal/doctor-format.mjs +286 -0
  89. package/cli/lib/internal/doctor-inspectors.mjs +294 -0
  90. package/cli/lib/internal/doctor-state.mjs +205 -0
  91. package/cli/lib/internal/governance/ai/ai-context-budget-core.mjs +315 -0
  92. package/cli/lib/internal/governance/ai/ai-structure-budget-core.mjs +358 -0
  93. package/cli/lib/internal/governance/ai/check-agents-freshness.mjs +155 -0
  94. package/cli/lib/internal/governance/ai/check-high-risk-doc-metadata-core.mjs +173 -0
  95. package/cli/lib/internal/governance/config.mjs +150 -0
  96. package/cli/lib/internal/governance/runner.mjs +35 -0
  97. package/cli/lib/internal/governance/shared/read-yaml-with-fragments.mjs +49 -0
  98. package/cli/lib/internal/validators-artifacts.mjs +515 -0
  99. package/cli/lib/internal/validators-shared.mjs +28 -0
  100. package/cli/lib/internal/validators-spec-helpers.mjs +186 -0
  101. package/cli/lib/internal/validators-spec.mjs +410 -0
  102. package/cli/lib/shared.mjs +83 -0
  103. package/cli/lib/topic-draft-packets.mjs +48 -0
  104. package/cli/lib/topic-goal.mjs +361 -0
  105. package/cli/lib/topic-runner.mjs +772 -0
  106. package/cli/lib/topic.mjs +93 -0
  107. package/cli/lib/ui.mjs +178 -0
  108. package/cli/lib/validators.mjs +78 -0
  109. package/cli/lib/value-helpers.mjs +24 -0
  110. package/cli/lib/yaml-helpers.mjs +133 -0
  111. package/cli/nimicoding.mjs +1 -0
  112. package/cli/seeds/bootstrap.mjs +47 -0
  113. package/config/audit-execution-artifacts.yaml +20 -0
  114. package/config/bootstrap.yaml +6 -0
  115. package/config/external-execution-artifacts.yaml +16 -0
  116. package/config/host-adapter.yaml +30 -0
  117. package/config/host-profile.yaml +29 -0
  118. package/config/installer-evidence.yaml +31 -0
  119. package/config/skill-installer.yaml +23 -0
  120. package/config/skill-manifest.yaml +46 -0
  121. package/config/skills.yaml +30 -0
  122. package/config/spec-generation-inputs.yaml +25 -0
  123. package/contracts/acceptance.schema.yaml +16 -0
  124. package/contracts/admission-checklist.schema.yaml +15 -0
  125. package/contracts/audit-chunk.schema.yaml +110 -0
  126. package/contracts/audit-closeout.schema.yaml +51 -0
  127. package/contracts/audit-finding.schema.yaml +61 -0
  128. package/contracts/audit-ledger.schema.yaml +138 -0
  129. package/contracts/audit-plan.schema.yaml +123 -0
  130. package/contracts/audit-remediation-map.schema.yaml +51 -0
  131. package/contracts/audit-rerun.schema.yaml +31 -0
  132. package/contracts/audit-sweep-result.yaml +49 -0
  133. package/contracts/authority-convergence-audit.schema.yaml +19 -0
  134. package/contracts/closeout.schema.yaml +25 -0
  135. package/contracts/decision-review.schema.yaml +16 -0
  136. package/contracts/doc-spec-audit-result.yaml +19 -0
  137. package/contracts/execution-packet.schema.yaml +49 -0
  138. package/contracts/external-host-compatibility.yaml +22 -0
  139. package/contracts/forbidden-shortcuts.catalog.yaml +23 -0
  140. package/contracts/high-risk-admission.schema.yaml +23 -0
  141. package/contracts/high-risk-execution-result.yaml +20 -0
  142. package/contracts/orchestration-state.schema.yaml +41 -0
  143. package/contracts/overflow-continuation.schema.yaml +12 -0
  144. package/contracts/packet.schema.yaml +30 -0
  145. package/contracts/pending-note.schema.yaml +17 -0
  146. package/contracts/prompt.schema.yaml +12 -0
  147. package/contracts/remediation.schema.yaml +16 -0
  148. package/contracts/result.schema.yaml +24 -0
  149. package/contracts/spec-generation-audit.schema.yaml +31 -0
  150. package/contracts/spec-generation-inputs.schema.yaml +39 -0
  151. package/contracts/spec-reconstruction-result.yaml +37 -0
  152. package/contracts/topic-goal.schema.yaml +78 -0
  153. package/contracts/topic-run-ledger.schema.yaml +72 -0
  154. package/contracts/topic-step-decision.schema.yaml +45 -0
  155. package/contracts/topic.schema.yaml +65 -0
  156. package/contracts/true-close.schema.yaml +15 -0
  157. package/contracts/wave.schema.yaml +29 -0
  158. package/contracts/worker-output.schema.yaml +15 -0
  159. package/methodology/audit-sweep-p0p1-recall.yaml +45 -0
  160. package/methodology/authority-convergence-policy.yaml +42 -0
  161. package/methodology/core.yaml +25 -0
  162. package/methodology/four-closure-policy.yaml +28 -0
  163. package/methodology/overflow-continuation-policy.yaml +14 -0
  164. package/methodology/role-separation-policy.yaml +28 -0
  165. package/methodology/skill-exchange-projection.yaml +114 -0
  166. package/methodology/skill-handoff.yaml +34 -0
  167. package/methodology/skill-installer-result.yaml +27 -0
  168. package/methodology/skill-installer-summary-projection.yaml +181 -0
  169. package/methodology/skill-runtime.yaml +23 -0
  170. package/methodology/spec-reconstruction.yaml +63 -0
  171. package/methodology/spec-target-truth-profile.yaml +53 -0
  172. package/methodology/topic-lifecycle-report.yaml +144 -0
  173. package/methodology/topic-lifecycle.yaml +37 -0
  174. package/methodology/topic-naming-ontology.yaml +21 -0
  175. package/methodology/topic-ontology.yaml +38 -0
  176. package/methodology/topic-validation-policy.yaml +9 -0
  177. package/methodology/wave-dag-policy.yaml +14 -0
  178. package/package.json +50 -0
  179. package/spec/_meta/command-gating-matrix.yaml +110 -0
  180. package/spec/_meta/generate-drift-migration-checklist.yaml +155 -0
  181. package/spec/_meta/governance-routing-cutover-checklist.yaml +35 -0
  182. package/spec/_meta/phase2-impacted-surface-matrix.yaml +44 -0
  183. package/spec/_meta/spec-authority-cutover-readiness.yaml +104 -0
  184. package/spec/_meta/spec-tree-model.yaml +72 -0
  185. package/spec/bootstrap-state.yaml +99 -0
  186. package/spec/product-scope.yaml +56 -0
@@ -0,0 +1,315 @@
1
+ import { mkdir, writeFile } from "node:fs/promises";
2
+ import path from "node:path";
3
+
4
+ import YAML from "yaml";
5
+
6
+ import {
7
+ ACTIVE_CHUNK_STATES,
8
+ appendRunEvent,
9
+ artifactPath,
10
+ artifactRef,
11
+ chunkRef,
12
+ ensureIsoTimestamp,
13
+ findingsRef,
14
+ inputError,
15
+ loadJsonFile,
16
+ ledgerRef,
17
+ loadChunk,
18
+ loadFindings,
19
+ loadPlan,
20
+ remediationMapRef,
21
+ reportRef,
22
+ runLedgerRef,
23
+ safeSweepId,
24
+ writeYamlRef,
25
+ } from "./common.mjs";
26
+ import { buildAuditValidityForEvidence, combineAuditValidity } from "./audit-validity.mjs";
27
+ import { buildCoverageQuality } from "./coverage-quality.mjs";
28
+ import { deriveLedgerSnapshotId } from "./validators.mjs";
29
+ import { ensureClusterStore } from "./risk-budget.mjs";
30
+
31
+ function countBy(values, keyFn) {
32
+ const counts = {};
33
+ for (const value of values) {
34
+ const key = keyFn(value);
35
+ counts[key] = (counts[key] ?? 0) + 1;
36
+ }
37
+ return counts;
38
+ }
39
+
40
+ async function loadChunks(projectRoot, sweepId, plan) {
41
+ const chunks = [];
42
+ for (const chunk of plan.chunks) {
43
+ const loaded = await loadChunk(projectRoot, sweepId, chunk.chunk_id);
44
+ if (!loaded.ok) {
45
+ return loaded;
46
+ }
47
+ chunks.push(loaded.chunk);
48
+ }
49
+ return { ok: true, chunks };
50
+ }
51
+
52
+ function buildFindingPosture(findings) {
53
+ return {
54
+ open: findings.filter((finding) => finding.disposition === "open").length,
55
+ remediated: findings.filter((finding) => finding.disposition === "remediated").length,
56
+ accepted_risk: findings.filter((finding) => finding.disposition === "accepted-risk").length,
57
+ false_positive: findings.filter((finding) => finding.disposition === "false-positive").length,
58
+ deferred_backlog: findings.filter((finding) => finding.disposition === "deferred-backlog").length,
59
+ };
60
+ }
61
+
62
+ function buildLedgerCoverage(plan, chunks) {
63
+ const frozenChunks = chunks.filter((chunk) => chunk.state === "frozen");
64
+ const base = {
65
+ frozen_chunks: frozenChunks.length,
66
+ failed_chunks: chunks.filter((chunk) => chunk.state === "failed").length,
67
+ skipped_chunks: chunks.filter((chunk) => chunk.state === "skipped").length,
68
+ active_chunks: chunks.filter((chunk) => ACTIVE_CHUNK_STATES.has(chunk.state)).length,
69
+ };
70
+ if (plan.planning_basis?.mode !== "spec_authority") {
71
+ const auditedFiles = new Set(frozenChunks.flatMap((chunk) => chunk.files));
72
+ return {
73
+ total_files: plan.coverage.total_files,
74
+ included_files: plan.coverage.included_files,
75
+ audited_files: auditedFiles.size,
76
+ ...base,
77
+ };
78
+ }
79
+
80
+ const auditedAuthorityFiles = new Set(frozenChunks.flatMap((chunk) => chunk.files));
81
+ const auditedEvidenceFiles = new Set(frozenChunks.flatMap((chunk) => chunk.evidence_inventory ?? []));
82
+ const authorityTotal = plan.coverage?.authority_files ?? plan.coverage?.included_files ?? 0;
83
+ const evidenceTotal = plan.coverage?.evidence_files ?? plan.evidence_inventory?.length ?? 0;
84
+ const unmappedEvidenceFiles = plan.coverage?.unmapped_evidence_files ?? plan.unmapped_evidence_files?.length ?? 0;
85
+ const emptyEvidenceChunks = plan.coverage?.authority_chunks_without_evidence_inventory
86
+ ?? chunks.filter((chunk) => (chunk.evidence_inventory ?? []).length === 0).length;
87
+ return {
88
+ total_files: authorityTotal + evidenceTotal,
89
+ included_files: authorityTotal + evidenceTotal,
90
+ audited_files: auditedAuthorityFiles.size + auditedEvidenceFiles.size,
91
+ authority_coverage: {
92
+ total_files: authorityTotal,
93
+ audited_files: auditedAuthorityFiles.size,
94
+ chunks_without_evidence_inventory: emptyEvidenceChunks,
95
+ },
96
+ evidence_coverage: {
97
+ total_files: evidenceTotal,
98
+ audited_files: auditedEvidenceFiles.size,
99
+ unmapped_files: unmappedEvidenceFiles,
100
+ },
101
+ ...base,
102
+ };
103
+ }
104
+
105
+ async function buildLedgerAuditValidity(projectRoot, chunks) {
106
+ const entries = [];
107
+ for (const chunk of chunks) {
108
+ if (!chunk.evidence_ref) {
109
+ continue;
110
+ }
111
+ const evidence = await loadJsonFile(artifactPath(projectRoot, chunk.evidence_ref));
112
+ if (evidence.ok) {
113
+ entries.push(buildAuditValidityForEvidence(chunk, evidence.value));
114
+ }
115
+ }
116
+ return combineAuditValidity(entries);
117
+ }
118
+
119
+ function deriveLedgerStatus(plan, coverage, chunks) {
120
+ const includedFiles = coverage.included_files ?? 0;
121
+ const frozenChunks = chunks.filter((chunk) => chunk.state === "frozen").length;
122
+
123
+ if (includedFiles === 0) {
124
+ return "blocked";
125
+ }
126
+ if (coverage.active_chunks > 0) {
127
+ return "partial";
128
+ }
129
+ if (coverage.failed_chunks > 0 || coverage.skipped_chunks > 0) {
130
+ return "partial";
131
+ }
132
+ if (plan.planning_basis?.mode === "spec_authority") {
133
+ const authorityFull = coverage.authority_coverage?.total_files > 0
134
+ && coverage.authority_coverage.audited_files === coverage.authority_coverage.total_files;
135
+ const evidenceFull = coverage.evidence_coverage?.audited_files === coverage.evidence_coverage?.total_files
136
+ && coverage.evidence_coverage?.unmapped_files === 0;
137
+ if (frozenChunks === chunks.length && authorityFull && evidenceFull) {
138
+ return "candidate_ready";
139
+ }
140
+ if (authorityFull && !evidenceFull) {
141
+ return "blocked_evidence_incomplete";
142
+ }
143
+ return "partial_authority_only";
144
+ }
145
+ return frozenChunks === chunks.length ? "candidate_ready" : "partial";
146
+ }
147
+
148
+ function formatReport({ sweepId, ledger, findings }) {
149
+ const lines = [
150
+ `# Audit Sweep ${sweepId}`,
151
+ "",
152
+ `- Snapshot: ${ledger.snapshot_id}`,
153
+ `- Status: ${ledger.status}`,
154
+ `- Included files: ${ledger.coverage.included_files}`,
155
+ `- Audited files: ${ledger.coverage.audited_files}`,
156
+ ...(ledger.coverage_quality ? [
157
+ `- Coverage quality: ${ledger.coverage_quality.posture}`,
158
+ `- Coverage quality warnings: ${ledger.coverage_quality.warnings.length}`,
159
+ `- Coverage quality blockers: ${ledger.coverage_quality.blockers.length}`,
160
+ ] : []),
161
+ ...(ledger.audit_validity ? [
162
+ `- Audit validity: ${ledger.audit_validity.posture}`,
163
+ `- Audit validity warnings: ${ledger.audit_validity.warnings.length}`,
164
+ `- Audit validity blockers: ${ledger.audit_validity.blockers.length}`,
165
+ `- No-finding posture: ${ledger.audit_validity.no_finding_posture}`,
166
+ ] : []),
167
+ ...(ledger.coverage.authority_coverage ? [
168
+ `- Authority coverage: ${ledger.coverage.authority_coverage.audited_files}/${ledger.coverage.authority_coverage.total_files}`,
169
+ `- Evidence coverage: ${ledger.coverage.evidence_coverage.audited_files}/${ledger.coverage.evidence_coverage.total_files}`,
170
+ `- Unmapped evidence files: ${ledger.coverage.evidence_coverage.unmapped_files}`,
171
+ ] : []),
172
+ `- Frozen chunks: ${ledger.coverage.frozen_chunks}`,
173
+ `- Findings: ${ledger.finding_count}`,
174
+ `- Finding clusters: ${ledger.finding_cluster_count ?? 0}`,
175
+ `- Clustered duplicate symptoms: ${ledger.clustered_symptom_count ?? 0}`,
176
+ `- Open findings: ${ledger.finding_posture.open}`,
177
+ "",
178
+ "## Severity Counts",
179
+ "",
180
+ ...Object.entries(ledger.severity_counts).map(([severity, count]) => `- ${severity}: ${count}`),
181
+ "",
182
+ "## Findings",
183
+ "",
184
+ ];
185
+
186
+ if (findings.length === 0) {
187
+ lines.push("No findings recorded.");
188
+ } else {
189
+ for (const finding of findings) {
190
+ lines.push(`### ${finding.id}: ${finding.title}`);
191
+ lines.push("");
192
+ lines.push(`- Severity: ${finding.severity}`);
193
+ lines.push(`- Disposition: ${finding.disposition}`);
194
+ lines.push(`- Actionability: ${finding.actionability}`);
195
+ lines.push(`- Location: ${finding.location.file}${finding.location.line ? `:${finding.location.line}` : ""}`);
196
+ lines.push(`- Fingerprint: ${finding.fingerprint}`);
197
+ lines.push("");
198
+ lines.push(finding.description);
199
+ lines.push("");
200
+ }
201
+ }
202
+
203
+ return `${lines.join("\n")}\n`;
204
+ }
205
+
206
+ export async function buildAuditSweepLedger(projectRoot, options) {
207
+ const sweepId = safeSweepId(options.sweepId);
208
+ if (!sweepId) {
209
+ return inputError("nimicoding audit-sweep refused: --sweep-id is required.\n");
210
+ }
211
+
212
+ const timestampError = options.verifiedAt ? ensureIsoTimestamp(options.verifiedAt) : null;
213
+ if (timestampError) {
214
+ return timestampError;
215
+ }
216
+ const verifiedAt = options.verifiedAt ?? new Date().toISOString();
217
+
218
+ const planResult = await loadPlan(projectRoot, sweepId);
219
+ if (!planResult.ok) {
220
+ return inputError(planResult.error);
221
+ }
222
+ const chunksResult = await loadChunks(projectRoot, sweepId, planResult.plan);
223
+ if (!chunksResult.ok) {
224
+ return inputError(chunksResult.error);
225
+ }
226
+ const { findingsRef: aggregateFindingsRef, store } = await loadFindings(projectRoot, sweepId);
227
+ ensureClusterStore(store);
228
+ await writeYamlRef(projectRoot, aggregateFindingsRef, store);
229
+ const chunks = chunksResult.chunks;
230
+ const coverage = buildLedgerCoverage(planResult.plan, chunks);
231
+ const status = deriveLedgerStatus(planResult.plan, coverage, chunks);
232
+ const coverageQuality = buildCoverageQuality(planResult.plan, chunks, coverage);
233
+ const auditValidity = await buildLedgerAuditValidity(projectRoot, chunks);
234
+ const evidenceRefs = [
235
+ aggregateFindingsRef,
236
+ ...chunks.map((chunk) => chunk.evidence_ref).filter(Boolean),
237
+ ...store.findings.map((finding) => finding.resolution?.evidence_ref).filter(Boolean),
238
+ ];
239
+ const findingPosture = buildFindingPosture(store.findings);
240
+ const snapshotId = deriveLedgerSnapshotId(sweepId, planResult.plan, chunks, store.findings, store.clusters);
241
+ const currentLedgerRef = ledgerRef(sweepId, snapshotId);
242
+ const currentReportRef = reportRef(sweepId, snapshotId);
243
+ const latestPointerRef = artifactRef("ledger_ref", sweepId, "latest.yaml");
244
+ const ledger = {
245
+ version: 1,
246
+ kind: "audit-ledger",
247
+ sweep_id: sweepId,
248
+ snapshot_id: snapshotId,
249
+ immutable: true,
250
+ plan_ref: planResult.planRef,
251
+ chunk_refs: chunks.map((chunk) => chunkRef(sweepId, chunk.chunk_id)),
252
+ findings_ref: aggregateFindingsRef,
253
+ evidence_refs: evidenceRefs,
254
+ run_ledger_ref: runLedgerRef(sweepId),
255
+ report_ref: currentReportRef,
256
+ remediation_map_ref: remediationMapRef(sweepId, snapshotId),
257
+ status,
258
+ coverage,
259
+ ...(coverageQuality ? { coverage_quality: coverageQuality } : {}),
260
+ audit_validity: auditValidity,
261
+ finding_count: store.findings.length,
262
+ finding_cluster_count: store.clusters.length,
263
+ clustered_symptom_count: store.clustered_symptom_count ?? 0,
264
+ remediation_obligation_count: store.remediation_obligation_count ?? store.findings.length,
265
+ unresolved_finding_count: findingPosture.open,
266
+ finding_posture: findingPosture,
267
+ severity_counts: countBy(store.findings, (finding) => finding.severity),
268
+ actionability_counts: countBy(store.findings, (finding) => finding.actionability),
269
+ created_at: verifiedAt,
270
+ };
271
+
272
+ await writeYamlRef(projectRoot, currentLedgerRef, ledger);
273
+ await writeYamlRef(projectRoot, latestPointerRef, {
274
+ version: 1,
275
+ kind: "audit-ledger-pointer",
276
+ sweep_id: sweepId,
277
+ ledger_ref: currentLedgerRef,
278
+ snapshot_id: snapshotId,
279
+ updated_at: verifiedAt,
280
+ });
281
+ await mkdir(path.dirname(artifactPath(projectRoot, currentReportRef)), { recursive: true });
282
+ await writeFile(artifactPath(projectRoot, currentReportRef), formatReport({ sweepId, ledger, findings: store.findings }), "utf8");
283
+ const runRef = await appendRunEvent(projectRoot, sweepId, {
284
+ event_type: "ledger_snapshot_created",
285
+ ledger_ref: currentLedgerRef,
286
+ snapshot_id: snapshotId,
287
+ status,
288
+ });
289
+
290
+ return {
291
+ ok: true,
292
+ exitCode: 0,
293
+ sweepId,
294
+ status,
295
+ snapshotId,
296
+ planRef: planResult.planRef,
297
+ chunkRefs: ledger.chunk_refs,
298
+ ledgerRef: currentLedgerRef,
299
+ latestLedgerRef: latestPointerRef,
300
+ reportRef: currentReportRef,
301
+ remediationMapRef: ledger.remediation_map_ref,
302
+ runLedgerRef: runRef,
303
+ evidenceRefs,
304
+ findingCount: store.findings.length,
305
+ findingClusterCount: store.clusters.length,
306
+ clusteredSymptomCount: store.clustered_symptom_count ?? 0,
307
+ remediationObligationCount: store.remediation_obligation_count ?? store.findings.length,
308
+ unresolvedFindingCount: findingPosture.open,
309
+ coverage: ledger.coverage,
310
+ coverageQuality: ledger.coverage_quality ?? null,
311
+ auditValidity: ledger.audit_validity,
312
+ };
313
+ }
314
+
315
+ export { formatReport as formatAuditSweepReport };
@@ -0,0 +1,101 @@
1
+ const P0P1_CRITERIA = new Set([
2
+ "p0p1",
3
+ "p0-p1",
4
+ "p0",
5
+ "p1",
6
+ "critical-high",
7
+ "critical_high",
8
+ ]);
9
+
10
+ const HIGH_RISK_OWNER_DOMAINS = new Set([
11
+ "runtime",
12
+ "sdk",
13
+ "platform",
14
+ "security",
15
+ "provider",
16
+ "desktop",
17
+ "web",
18
+ "nimi-coding",
19
+ "nimi-coding/audit-sweep",
20
+ ]);
21
+
22
+ export function criteriaEnableP0P1Recall(criteria) {
23
+ return Array.isArray(criteria)
24
+ && criteria.some((entry) => P0P1_CRITERIA.has(String(entry).trim().toLowerCase()));
25
+ }
26
+
27
+ export function buildP0P1RecallProfile({ chunk, plan }) {
28
+ const ownerDomain = chunk.owner_domain ?? "unknown";
29
+ const highRiskOwnerDomain = HIGH_RISK_OWNER_DOMAINS.has(ownerDomain);
30
+ const calibrationExpectedDefects = Array.isArray(chunk.calibration_expected_defects)
31
+ ? chunk.calibration_expected_defects.length
32
+ : 0;
33
+
34
+ return {
35
+ profile_id: "p0_p1_recall",
36
+ objective: "Prioritize critical/high recall. Missing a P0/P1 issue is worse than a low-confidence false positive.",
37
+ severity_mapping: {
38
+ p0: "critical",
39
+ p1: "high",
40
+ },
41
+ priority_defect_classes: [
42
+ {
43
+ id: "fail_open_or_pseudo_success",
44
+ question: "Can an error, missing dependency, skipped work, or invalid evidence still produce a success posture?",
45
+ },
46
+ {
47
+ id: "authority_boundary_or_private_import_bypass",
48
+ question: "Can runtime/sdk/app/spec boundaries be bypassed or treated as advisory?",
49
+ },
50
+ {
51
+ id: "app_local_shadow_truth",
52
+ question: "Can an unadmitted file, host-local artifact, or generated projection become semantic truth?",
53
+ },
54
+ {
55
+ id: "partial_coverage_misrepresented_as_complete",
56
+ question: "Can partial, skipped, sampled, or authority-only coverage be reported as complete?",
57
+ },
58
+ {
59
+ id: "permission_or_capability_bypass",
60
+ question: "Can user, provider, filesystem, network, or app permissions be bypassed?",
61
+ },
62
+ {
63
+ id: "ungated_destructive_action",
64
+ question: "Can destructive mutation, deletion, overwrite, or publication happen without the required gate?",
65
+ },
66
+ {
67
+ id: "provider_or_model_hardcoding",
68
+ question: "Can provider or model selection be hardcoded instead of flowing through admitted authority and configuration?",
69
+ },
70
+ ],
71
+ triage_flow: [
72
+ "classify whether the chunk contains P0/P1-relevant authority or implementation evidence",
73
+ "scan authority_refs and evidence_inventory for every priority_defect_class",
74
+ "record candidate P0/P1 signals before spending time on low-severity cleanup",
75
+ "deep-audit only the files and flows tied to a candidate P0/P1 signal or trigger",
76
+ "cluster duplicate symptoms under one canonical root-cause finding",
77
+ ],
78
+ deep_audit_triggers: [
79
+ "p0_p1_signal_found_in_triage",
80
+ highRiskOwnerDomain ? "high_risk_owner_domain" : null,
81
+ calibrationExpectedDefects > 0 ? "calibration_expected_defects_present" : null,
82
+ ].filter(Boolean),
83
+ token_budget_policy: {
84
+ triage_first: true,
85
+ deep_audit_only_on_trigger: true,
86
+ cluster_duplicate_symptoms: true,
87
+ prefer_canonical_root_cause_findings: true,
88
+ pause_when_risk_budget_blocks_more_discovery: true,
89
+ max_sweep_high_risk_findings_before_pause: plan.risk_budget_policy?.max_sweep_high_risk_findings ?? null,
90
+ max_domain_high_risk_findings_before_pause: plan.risk_budget_policy?.max_domain_high_risk_findings ?? null,
91
+ },
92
+ no_p0p1_finding_requirement: {
93
+ required: true,
94
+ reasoning_field: "coverage.p0p1_negative_reasoning",
95
+ evidence_refs_field: "coverage.p0p1_evidence_refs",
96
+ implementation_not_applicable_reason_field: "coverage.p0p1_implementation_not_applicable_reason",
97
+ summary: "If no critical/high finding is emitted, explain why each applicable priority defect class did not produce a P0/P1 issue and cite implementation evidence; for empty implementation inventory, explicitly justify why implementation evidence is not applicable.",
98
+ evidence_refs_must_include_implementation: true,
99
+ },
100
+ };
101
+ }