@nimiplatform/nimi-coding 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (186) hide show
  1. package/LICENSE +21 -0
  2. package/README.md +348 -0
  3. package/adapters/README.md +25 -0
  4. package/adapters/claude/README.md +89 -0
  5. package/adapters/claude/profile.yaml +70 -0
  6. package/adapters/codex/README.md +53 -0
  7. package/adapters/codex/profile.yaml +78 -0
  8. package/adapters/oh-my-codex/README.md +185 -0
  9. package/adapters/oh-my-codex/profile.yaml +46 -0
  10. package/bin/nimicoding.mjs +6 -0
  11. package/cli/commands/admit-high-risk-decision.mjs +108 -0
  12. package/cli/commands/audit-sweep.mjs +341 -0
  13. package/cli/commands/blueprint-audit.mjs +91 -0
  14. package/cli/commands/clear.mjs +168 -0
  15. package/cli/commands/closeout.mjs +183 -0
  16. package/cli/commands/decide-high-risk-execution.mjs +124 -0
  17. package/cli/commands/doctor.mjs +53 -0
  18. package/cli/commands/generate-spec-derived-docs.mjs +131 -0
  19. package/cli/commands/handoff.mjs +123 -0
  20. package/cli/commands/ingest-high-risk-execution.mjs +95 -0
  21. package/cli/commands/review-high-risk-execution.mjs +95 -0
  22. package/cli/commands/start.mjs +717 -0
  23. package/cli/commands/topic-formatters.mjs +382 -0
  24. package/cli/commands/topic-goal.mjs +33 -0
  25. package/cli/commands/topic-options-shared.mjs +27 -0
  26. package/cli/commands/topic-options-workflow.mjs +767 -0
  27. package/cli/commands/topic-options.mjs +626 -0
  28. package/cli/commands/topic-runner.mjs +169 -0
  29. package/cli/commands/topic.mjs +795 -0
  30. package/cli/commands/validate-acceptance.mjs +5 -0
  31. package/cli/commands/validate-ai-governance.mjs +214 -0
  32. package/cli/commands/validate-execution-packet.mjs +5 -0
  33. package/cli/commands/validate-orchestration-state.mjs +5 -0
  34. package/cli/commands/validate-prompt.mjs +5 -0
  35. package/cli/commands/validate-spec-audit.mjs +27 -0
  36. package/cli/commands/validate-spec-governance.mjs +124 -0
  37. package/cli/commands/validate-spec-tree.mjs +27 -0
  38. package/cli/commands/validate-worker-output.mjs +5 -0
  39. package/cli/constants.mjs +489 -0
  40. package/cli/help.mjs +134 -0
  41. package/cli/index.mjs +103 -0
  42. package/cli/lib/adapter-profiles.mjs +403 -0
  43. package/cli/lib/audit-execution.mjs +52 -0
  44. package/cli/lib/audit-sweep-runtime/admissions.mjs +381 -0
  45. package/cli/lib/audit-sweep-runtime/audit-validity.mjs +333 -0
  46. package/cli/lib/audit-sweep-runtime/chunks.mjs +697 -0
  47. package/cli/lib/audit-sweep-runtime/closeout.mjs +144 -0
  48. package/cli/lib/audit-sweep-runtime/codex-auditor-evidence.mjs +639 -0
  49. package/cli/lib/audit-sweep-runtime/codex-auditor.mjs +515 -0
  50. package/cli/lib/audit-sweep-runtime/common.mjs +329 -0
  51. package/cli/lib/audit-sweep-runtime/coverage-quality.mjs +172 -0
  52. package/cli/lib/audit-sweep-runtime/evidence-assignment.mjs +152 -0
  53. package/cli/lib/audit-sweep-runtime/format.mjs +57 -0
  54. package/cli/lib/audit-sweep-runtime/ingest.mjs +486 -0
  55. package/cli/lib/audit-sweep-runtime/inventory-spec-chunks.mjs +198 -0
  56. package/cli/lib/audit-sweep-runtime/inventory.mjs +728 -0
  57. package/cli/lib/audit-sweep-runtime/ledger.mjs +315 -0
  58. package/cli/lib/audit-sweep-runtime/p0p1-profile.mjs +101 -0
  59. package/cli/lib/audit-sweep-runtime/remediation.mjs +349 -0
  60. package/cli/lib/audit-sweep-runtime/rerun.mjs +129 -0
  61. package/cli/lib/audit-sweep-runtime/risk-budget.mjs +300 -0
  62. package/cli/lib/audit-sweep-runtime/status.mjs +62 -0
  63. package/cli/lib/audit-sweep-runtime/validators-ledger.mjs +215 -0
  64. package/cli/lib/audit-sweep-runtime/validators.mjs +758 -0
  65. package/cli/lib/audit-sweep.mjs +18 -0
  66. package/cli/lib/authority-convergence.mjs +309 -0
  67. package/cli/lib/blueprint-audit.mjs +370 -0
  68. package/cli/lib/bootstrap.mjs +228 -0
  69. package/cli/lib/closeout.mjs +623 -0
  70. package/cli/lib/codex-sdk-runner.mjs +76 -0
  71. package/cli/lib/contracts.mjs +180 -0
  72. package/cli/lib/doctor.mjs +18 -0
  73. package/cli/lib/entrypoints.mjs +274 -0
  74. package/cli/lib/external-execution.mjs +101 -0
  75. package/cli/lib/fs-helpers.mjs +33 -0
  76. package/cli/lib/handoff.mjs +785 -0
  77. package/cli/lib/high-risk-admission.mjs +442 -0
  78. package/cli/lib/high-risk-decision.mjs +324 -0
  79. package/cli/lib/high-risk-ingest.mjs +317 -0
  80. package/cli/lib/high-risk-review.mjs +263 -0
  81. package/cli/lib/internal/contracts-loaders.mjs +132 -0
  82. package/cli/lib/internal/contracts-parse-high-risk.mjs +131 -0
  83. package/cli/lib/internal/contracts-parse.mjs +457 -0
  84. package/cli/lib/internal/contracts-validators.mjs +398 -0
  85. package/cli/lib/internal/doctor-bootstrap-surface.mjs +359 -0
  86. package/cli/lib/internal/doctor-delegated-surface.mjs +256 -0
  87. package/cli/lib/internal/doctor-finalize.mjs +385 -0
  88. package/cli/lib/internal/doctor-format.mjs +286 -0
  89. package/cli/lib/internal/doctor-inspectors.mjs +294 -0
  90. package/cli/lib/internal/doctor-state.mjs +205 -0
  91. package/cli/lib/internal/governance/ai/ai-context-budget-core.mjs +315 -0
  92. package/cli/lib/internal/governance/ai/ai-structure-budget-core.mjs +358 -0
  93. package/cli/lib/internal/governance/ai/check-agents-freshness.mjs +155 -0
  94. package/cli/lib/internal/governance/ai/check-high-risk-doc-metadata-core.mjs +173 -0
  95. package/cli/lib/internal/governance/config.mjs +150 -0
  96. package/cli/lib/internal/governance/runner.mjs +35 -0
  97. package/cli/lib/internal/governance/shared/read-yaml-with-fragments.mjs +49 -0
  98. package/cli/lib/internal/validators-artifacts.mjs +515 -0
  99. package/cli/lib/internal/validators-shared.mjs +28 -0
  100. package/cli/lib/internal/validators-spec-helpers.mjs +186 -0
  101. package/cli/lib/internal/validators-spec.mjs +410 -0
  102. package/cli/lib/shared.mjs +83 -0
  103. package/cli/lib/topic-draft-packets.mjs +48 -0
  104. package/cli/lib/topic-goal.mjs +361 -0
  105. package/cli/lib/topic-runner.mjs +772 -0
  106. package/cli/lib/topic.mjs +93 -0
  107. package/cli/lib/ui.mjs +178 -0
  108. package/cli/lib/validators.mjs +78 -0
  109. package/cli/lib/value-helpers.mjs +24 -0
  110. package/cli/lib/yaml-helpers.mjs +133 -0
  111. package/cli/nimicoding.mjs +1 -0
  112. package/cli/seeds/bootstrap.mjs +47 -0
  113. package/config/audit-execution-artifacts.yaml +20 -0
  114. package/config/bootstrap.yaml +6 -0
  115. package/config/external-execution-artifacts.yaml +16 -0
  116. package/config/host-adapter.yaml +30 -0
  117. package/config/host-profile.yaml +29 -0
  118. package/config/installer-evidence.yaml +31 -0
  119. package/config/skill-installer.yaml +23 -0
  120. package/config/skill-manifest.yaml +46 -0
  121. package/config/skills.yaml +30 -0
  122. package/config/spec-generation-inputs.yaml +25 -0
  123. package/contracts/acceptance.schema.yaml +16 -0
  124. package/contracts/admission-checklist.schema.yaml +15 -0
  125. package/contracts/audit-chunk.schema.yaml +110 -0
  126. package/contracts/audit-closeout.schema.yaml +51 -0
  127. package/contracts/audit-finding.schema.yaml +61 -0
  128. package/contracts/audit-ledger.schema.yaml +138 -0
  129. package/contracts/audit-plan.schema.yaml +123 -0
  130. package/contracts/audit-remediation-map.schema.yaml +51 -0
  131. package/contracts/audit-rerun.schema.yaml +31 -0
  132. package/contracts/audit-sweep-result.yaml +49 -0
  133. package/contracts/authority-convergence-audit.schema.yaml +19 -0
  134. package/contracts/closeout.schema.yaml +25 -0
  135. package/contracts/decision-review.schema.yaml +16 -0
  136. package/contracts/doc-spec-audit-result.yaml +19 -0
  137. package/contracts/execution-packet.schema.yaml +49 -0
  138. package/contracts/external-host-compatibility.yaml +22 -0
  139. package/contracts/forbidden-shortcuts.catalog.yaml +23 -0
  140. package/contracts/high-risk-admission.schema.yaml +23 -0
  141. package/contracts/high-risk-execution-result.yaml +20 -0
  142. package/contracts/orchestration-state.schema.yaml +41 -0
  143. package/contracts/overflow-continuation.schema.yaml +12 -0
  144. package/contracts/packet.schema.yaml +30 -0
  145. package/contracts/pending-note.schema.yaml +17 -0
  146. package/contracts/prompt.schema.yaml +12 -0
  147. package/contracts/remediation.schema.yaml +16 -0
  148. package/contracts/result.schema.yaml +24 -0
  149. package/contracts/spec-generation-audit.schema.yaml +31 -0
  150. package/contracts/spec-generation-inputs.schema.yaml +39 -0
  151. package/contracts/spec-reconstruction-result.yaml +37 -0
  152. package/contracts/topic-goal.schema.yaml +78 -0
  153. package/contracts/topic-run-ledger.schema.yaml +72 -0
  154. package/contracts/topic-step-decision.schema.yaml +45 -0
  155. package/contracts/topic.schema.yaml +65 -0
  156. package/contracts/true-close.schema.yaml +15 -0
  157. package/contracts/wave.schema.yaml +29 -0
  158. package/contracts/worker-output.schema.yaml +15 -0
  159. package/methodology/audit-sweep-p0p1-recall.yaml +45 -0
  160. package/methodology/authority-convergence-policy.yaml +42 -0
  161. package/methodology/core.yaml +25 -0
  162. package/methodology/four-closure-policy.yaml +28 -0
  163. package/methodology/overflow-continuation-policy.yaml +14 -0
  164. package/methodology/role-separation-policy.yaml +28 -0
  165. package/methodology/skill-exchange-projection.yaml +114 -0
  166. package/methodology/skill-handoff.yaml +34 -0
  167. package/methodology/skill-installer-result.yaml +27 -0
  168. package/methodology/skill-installer-summary-projection.yaml +181 -0
  169. package/methodology/skill-runtime.yaml +23 -0
  170. package/methodology/spec-reconstruction.yaml +63 -0
  171. package/methodology/spec-target-truth-profile.yaml +53 -0
  172. package/methodology/topic-lifecycle-report.yaml +144 -0
  173. package/methodology/topic-lifecycle.yaml +37 -0
  174. package/methodology/topic-naming-ontology.yaml +21 -0
  175. package/methodology/topic-ontology.yaml +38 -0
  176. package/methodology/topic-validation-policy.yaml +9 -0
  177. package/methodology/wave-dag-policy.yaml +14 -0
  178. package/package.json +50 -0
  179. package/spec/_meta/command-gating-matrix.yaml +110 -0
  180. package/spec/_meta/generate-drift-migration-checklist.yaml +155 -0
  181. package/spec/_meta/governance-routing-cutover-checklist.yaml +35 -0
  182. package/spec/_meta/phase2-impacted-surface-matrix.yaml +44 -0
  183. package/spec/_meta/spec-authority-cutover-readiness.yaml +104 -0
  184. package/spec/_meta/spec-tree-model.yaml +72 -0
  185. package/spec/bootstrap-state.yaml +99 -0
  186. package/spec/product-scope.yaml +56 -0
@@ -0,0 +1,349 @@
1
+ import {
2
+ SEVERITY_RANK,
3
+ appendRunEvent,
4
+ ensureIsoTimestamp,
5
+ inputError,
6
+ loadFindings,
7
+ loadLatestLedger,
8
+ loadPlan,
9
+ loadYamlRef,
10
+ remediationMapRef,
11
+ safeSweepId,
12
+ nowIso,
13
+ writeYamlRef,
14
+ } from "./common.mjs";
15
+ import { ensureClusterStore } from "./risk-budget.mjs";
16
+ import {
17
+ addWaveToTopic,
18
+ admitWaveInTopic,
19
+ selectWaveInTopic,
20
+ } from "../topic.mjs";
21
+
22
+ function priorityFor(findings) {
23
+ const rank = Math.min(...findings.map((finding) => SEVERITY_RANK[finding.severity] ?? 99));
24
+ if (rank <= 1) {
25
+ return "P0";
26
+ }
27
+ if (rank === 2) {
28
+ return "P1";
29
+ }
30
+ return "P2";
31
+ }
32
+
33
+ function buildAdmissionChecklist(actionability) {
34
+ return {
35
+ authority_closed: false,
36
+ semantic_closed: false,
37
+ consumer_closed: false,
38
+ drift_resistance_closed: false,
39
+ manager_decision_required: actionability === "needs-decision",
40
+ re_audit_required: true,
41
+ };
42
+ }
43
+
44
+ function clusterForFinding(clustersByFindingId, findingId) {
45
+ return clustersByFindingId.get(findingId) ?? null;
46
+ }
47
+
48
+ function remediationBundleForWave(waveId, waveFindings, clustersByFindingId) {
49
+ const clusters = [];
50
+ const seenClusters = new Set();
51
+ for (const finding of waveFindings) {
52
+ const cluster = clusterForFinding(clustersByFindingId, finding.id);
53
+ if (cluster && !seenClusters.has(cluster.cluster_id)) {
54
+ clusters.push(cluster);
55
+ seenClusters.add(cluster.cluster_id);
56
+ }
57
+ }
58
+ return {
59
+ bundle_id: `bundle-${waveId.replace(/^remediation-wave-/, "")}`,
60
+ cluster_ids: clusters.map((cluster) => cluster.cluster_id),
61
+ representative_finding_ids: clusters.map((cluster) => cluster.representative_finding_id),
62
+ canonical_finding_ids: [...new Set(waveFindings.map((finding) => finding.id))].sort(),
63
+ duplicate_symptom_count: clusters.reduce((total, cluster) => total + (cluster.duplicate_symptom_count ?? 0), 0),
64
+ source_chunks: [...new Set([
65
+ ...waveFindings.map((finding) => finding.chunk_id),
66
+ ...clusters.flatMap((cluster) => cluster.source_chunks ?? []),
67
+ ])].sort(),
68
+ authority_refs: [...new Set(clusters.map((cluster) => cluster.authority_ref).filter(Boolean))].sort(),
69
+ evidence_roots: [...new Set(clusters.map((cluster) => cluster.evidence_root).filter(Boolean))].sort(),
70
+ contract_seams: [...new Set(clusters.map((cluster) => cluster.contract_seam).filter(Boolean))].sort(),
71
+ repair_targets: [...new Set(clusters.map((cluster) => cluster.repair_target).filter(Boolean))].sort(),
72
+ };
73
+ }
74
+
75
+ function groupOpenFindings(findings, clusters, maxFindingsPerWave) {
76
+ const groups = new Map();
77
+ const clustersByFindingId = new Map();
78
+ for (const cluster of clusters) {
79
+ for (const findingId of cluster.canonical_finding_ids ?? []) {
80
+ clustersByFindingId.set(findingId, cluster);
81
+ }
82
+ }
83
+ const openFindings = findings
84
+ .filter((finding) => finding.disposition === "open")
85
+ .sort((left, right) => {
86
+ const severityDiff = (SEVERITY_RANK[left.severity] ?? 99) - (SEVERITY_RANK[right.severity] ?? 99);
87
+ if (severityDiff !== 0) {
88
+ return severityDiff;
89
+ }
90
+ return left.id.localeCompare(right.id);
91
+ });
92
+
93
+ for (const finding of openFindings) {
94
+ const fileParts = finding.location.file.split("/");
95
+ const ownerDomain = finding.owner_domain ?? (fileParts.length > 1 ? fileParts[0] : "root");
96
+ const key = `${ownerDomain}:${finding.actionability}`;
97
+ const group = groups.get(key) ?? {
98
+ ownerDomain,
99
+ actionability: finding.actionability,
100
+ findings: [],
101
+ };
102
+ group.findings.push(finding);
103
+ groups.set(key, group);
104
+ }
105
+
106
+ const waves = [];
107
+ for (const group of [...groups.values()].sort((left, right) => left.ownerDomain.localeCompare(right.ownerDomain))) {
108
+ for (let index = 0; index < group.findings.length; index += maxFindingsPerWave) {
109
+ const waveFindings = group.findings.slice(index, index + maxFindingsPerWave);
110
+ const waveId = `remediation-wave-${String(waves.length + 1).padStart(3, "0")}`;
111
+ const writeSet = [...new Set(waveFindings.map((finding) => finding.location.file))].sort();
112
+ const remediationBundle = remediationBundleForWave(waveId, waveFindings, clustersByFindingId);
113
+ waves.push({
114
+ wave_id: waveId,
115
+ status: "proposed",
116
+ owner_domain: group.ownerDomain,
117
+ priority: priorityFor(waveFindings),
118
+ actionability: group.actionability,
119
+ finding_ids: waveFindings.map((finding) => finding.id),
120
+ cluster_ids: remediationBundle.cluster_ids,
121
+ clustered_symptom_count: remediationBundle.duplicate_symptom_count,
122
+ source_chunks: [...new Set(waveFindings.map((finding) => finding.chunk_id))].sort(),
123
+ files: writeSet,
124
+ write_set: writeSet,
125
+ depends_on: [],
126
+ remediation_bundle: remediationBundle,
127
+ admission_checklist: buildAdmissionChecklist(group.actionability),
128
+ });
129
+ }
130
+ }
131
+
132
+ return waves;
133
+ }
134
+
135
+ export async function buildAuditSweepRemediationMap(projectRoot, options) {
136
+ const sweepId = safeSweepId(options.sweepId);
137
+ if (!sweepId) {
138
+ return inputError("nimicoding audit-sweep refused: --sweep-id is required.\n");
139
+ }
140
+ const timestampError = options.verifiedAt ? ensureIsoTimestamp(options.verifiedAt) : null;
141
+ if (timestampError) {
142
+ return timestampError;
143
+ }
144
+ const verifiedAt = options.verifiedAt ?? new Date().toISOString();
145
+
146
+ const ledgerResult = await loadLatestLedger(projectRoot, sweepId);
147
+ if (!ledgerResult.ok) {
148
+ return inputError(ledgerResult.error);
149
+ }
150
+ const { findingsRef, store } = await loadFindings(projectRoot, sweepId);
151
+ ensureClusterStore(store);
152
+ const maxFindingsPerWave = Number.isInteger(options.maxFindingsPerWave) && options.maxFindingsPerWave > 0
153
+ ? options.maxFindingsPerWave
154
+ : 10;
155
+ const waves = groupOpenFindings(store.findings, store.clusters, maxFindingsPerWave);
156
+ const mappedFindingIds = new Set(waves.flatMap((wave) => wave.finding_ids));
157
+ const mapRef = remediationMapRef(sweepId, ledgerResult.ledger.snapshot_id);
158
+ const remediationMap = {
159
+ version: 1,
160
+ kind: "audit-remediation-map",
161
+ sweep_id: sweepId,
162
+ source_ledger_ref: ledgerResult.ledgerRef,
163
+ source_findings_ref: findingsRef,
164
+ grouping_policy: {
165
+ owner_domain: "finding_owner_domain_or_first_two_path_segments",
166
+ cluster_policy: "root_cause_authority_evidence_repair_target",
167
+ split_by_actionability: true,
168
+ split_by_write_set: true,
169
+ max_findings_per_wave: maxFindingsPerWave,
170
+ duplicate_symptoms_count_as_remediation_obligations: false,
171
+ preserve_source_ledger: true,
172
+ },
173
+ remediation_bundles: waves.map((wave) => wave.remediation_bundle),
174
+ waves,
175
+ unmapped_findings: store.findings
176
+ .filter((finding) => finding.disposition === "open" && !mappedFindingIds.has(finding.id))
177
+ .map((finding) => finding.id),
178
+ status: waves.length > 0 ? "proposed" : "empty",
179
+ created_at: verifiedAt,
180
+ updated_at: verifiedAt,
181
+ };
182
+
183
+ await writeYamlRef(projectRoot, mapRef, remediationMap);
184
+ const runRef = await appendRunEvent(projectRoot, sweepId, {
185
+ event_type: "remediation_map_created",
186
+ remediation_map_ref: mapRef,
187
+ source_ledger_ref: ledgerResult.ledgerRef,
188
+ wave_count: waves.length,
189
+ });
190
+
191
+ return {
192
+ ok: true,
193
+ exitCode: 0,
194
+ sweepId,
195
+ ledgerRef: ledgerResult.ledgerRef,
196
+ findingsRef,
197
+ remediationMapRef: mapRef,
198
+ runLedgerRef: runRef,
199
+ waveCount: waves.length,
200
+ mappedFindingCount: mappedFindingIds.size,
201
+ remediationBundleCount: remediationMap.remediation_bundles.length,
202
+ clusteredSymptomCount: remediationMap.remediation_bundles.reduce((total, bundle) => total + bundle.duplicate_symptom_count, 0),
203
+ unmappedFindingCount: remediationMap.unmapped_findings.length,
204
+ waves,
205
+ };
206
+ }
207
+
208
+ function topicWaveIdForRemediationWave(wave) {
209
+ const suffix = String(wave.wave_id ?? "")
210
+ .replace(/^remediation-wave-/, "")
211
+ .replace(/[^a-z0-9]+/g, "-")
212
+ .replace(/^-+|-+$/g, "") || "001";
213
+ return `wave-audit-remediation-${suffix}`;
214
+ }
215
+
216
+ function topicWaveFromRemediationWave(wave, ledgerRef, remediationMapRefValue) {
217
+ const waveId = topicWaveIdForRemediationWave(wave);
218
+ return {
219
+ wave_id: waveId,
220
+ slug: waveId.replace(/^wave-/, ""),
221
+ state: "candidate",
222
+ primary_closure_goal: `Resolve audit findings: ${wave.finding_ids.join(", ")}`,
223
+ deps: Array.isArray(wave.depends_on) ? wave.depends_on.map((dep) => topicWaveIdForRemediationWave({ wave_id: dep })) : [],
224
+ owner_domain: wave.owner_domain,
225
+ parallelizable_after: [],
226
+ selected: false,
227
+ source_audit_sweep: {
228
+ source_remediation_wave_id: wave.wave_id,
229
+ source_ledger_ref: ledgerRef,
230
+ remediation_map_ref: remediationMapRefValue,
231
+ finding_ids: wave.finding_ids,
232
+ cluster_ids: wave.cluster_ids ?? [],
233
+ source_chunks: wave.source_chunks,
234
+ write_set: wave.write_set,
235
+ remediation_bundle: wave.remediation_bundle ?? null,
236
+ actionability: wave.actionability,
237
+ priority: wave.priority,
238
+ admission_checklist: wave.admission_checklist,
239
+ },
240
+ };
241
+ }
242
+
243
+ export async function admitAuditSweepRemediationMap(projectRoot, options) {
244
+ const sweepId = safeSweepId(options.sweepId);
245
+ if (!sweepId || typeof options.topicId !== "string" || !options.topicId.trim()) {
246
+ return inputError("nimicoding audit-sweep refused: --sweep-id and --topic-id are required.\n");
247
+ }
248
+
249
+ const ledgerResult = await loadLatestLedger(projectRoot, sweepId);
250
+ if (!ledgerResult.ok) {
251
+ return inputError(ledgerResult.error);
252
+ }
253
+ const mapRef = remediationMapRef(sweepId, ledgerResult.ledger.snapshot_id);
254
+ const remediationMap = await loadYamlRef(projectRoot, mapRef);
255
+ if (!remediationMap || remediationMap.kind !== "audit-remediation-map" || remediationMap.source_ledger_ref !== ledgerResult.ledgerRef || !Array.isArray(remediationMap.waves)) {
256
+ return inputError("nimicoding audit-sweep refused: latest remediation map is missing or malformed.\n");
257
+ }
258
+ const planResult = await loadPlan(projectRoot, sweepId);
259
+ if (!planResult.ok) {
260
+ return inputError(planResult.error);
261
+ }
262
+ const { findingsRef, store } = await loadFindings(projectRoot, sweepId);
263
+ ensureClusterStore(store);
264
+
265
+ const materialized = [];
266
+ const admitted = [];
267
+ const managerDecisionRequired = [];
268
+ for (const remediationWave of remediationMap.waves) {
269
+ const topicWave = topicWaveFromRemediationWave(remediationWave, ledgerResult.ledgerRef, mapRef);
270
+ const addResult = await addWaveToTopic(projectRoot, options.topicId, topicWave);
271
+ if (!addResult.ok) {
272
+ return {
273
+ ok: false,
274
+ inputError: true,
275
+ exitCode: 1,
276
+ error: `nimicoding audit-sweep refused: remediation wave admission failed: ${addResult.error}\n`,
277
+ };
278
+ }
279
+ materialized.push(topicWave.wave_id);
280
+
281
+ if (remediationWave.admission_checklist?.manager_decision_required === true || remediationWave.actionability === "needs-decision") {
282
+ managerDecisionRequired.push(topicWave.wave_id);
283
+ continue;
284
+ }
285
+
286
+ const selectResult = await selectWaveInTopic(projectRoot, options.topicId, topicWave.wave_id);
287
+ if (!selectResult.ok) {
288
+ return {
289
+ ok: false,
290
+ inputError: true,
291
+ exitCode: 1,
292
+ error: `nimicoding audit-sweep refused: remediation wave selection failed: ${selectResult.error}\n`,
293
+ };
294
+ }
295
+ const admitResult = await admitWaveInTopic(projectRoot, options.topicId, topicWave.wave_id);
296
+ if (!admitResult.ok) {
297
+ return {
298
+ ok: false,
299
+ inputError: true,
300
+ exitCode: 1,
301
+ error: `nimicoding audit-sweep refused: remediation wave admission failed: ${admitResult.error}\n`,
302
+ };
303
+ }
304
+ admitted.push(topicWave.wave_id);
305
+ }
306
+
307
+ const acceptedClusterIds = new Set(remediationMap.waves.flatMap((wave) => wave.cluster_ids ?? []));
308
+ const acceptedAt = nowIso();
309
+ for (const cluster of store.clusters) {
310
+ if (!acceptedClusterIds.has(cluster.cluster_id)) {
311
+ continue;
312
+ }
313
+ cluster.acceptance = {
314
+ topic_id: options.topicId,
315
+ remediation_map_ref: mapRef,
316
+ source_ledger_ref: ledgerResult.ledgerRef,
317
+ source_inventory_hash: planResult.plan.inventory_hash,
318
+ source_evidence_inventory_hash: planResult.plan.evidence_inventory_hash ?? null,
319
+ accepted_at: acceptedAt,
320
+ };
321
+ cluster.updated_at = acceptedAt;
322
+ }
323
+ store.updated_at = acceptedAt;
324
+ await writeYamlRef(projectRoot, findingsRef, store);
325
+
326
+ const runRef = await appendRunEvent(projectRoot, sweepId, {
327
+ event_type: "remediation_map_admitted",
328
+ remediation_map_ref: mapRef,
329
+ source_ledger_ref: ledgerResult.ledgerRef,
330
+ topic_id: options.topicId,
331
+ materialized_wave_ids: materialized,
332
+ admitted_wave_ids: admitted,
333
+ manager_decision_required_wave_ids: managerDecisionRequired,
334
+ accepted_cluster_ids: [...acceptedClusterIds].sort(),
335
+ });
336
+
337
+ return {
338
+ ok: true,
339
+ exitCode: 0,
340
+ sweepId,
341
+ topicId: options.topicId,
342
+ ledgerRef: ledgerResult.ledgerRef,
343
+ remediationMapRef: mapRef,
344
+ runLedgerRef: runRef,
345
+ materializedWaveIds: materialized,
346
+ admittedWaveIds: admitted,
347
+ managerDecisionRequiredWaveIds: managerDecisionRequired,
348
+ };
349
+ }
@@ -0,0 +1,129 @@
1
+ import { copyFile, mkdir } from "node:fs/promises";
2
+ import path from "node:path";
3
+
4
+ import {
5
+ FINDING_DISPOSITION,
6
+ RERUN_VERDICT,
7
+ appendRunEvent,
8
+ artifactPath,
9
+ artifactRef,
10
+ ensureIsoTimestamp,
11
+ findingsRef,
12
+ inputError,
13
+ loadFindings,
14
+ loadJsonFile,
15
+ resolveInsideProject,
16
+ safeSweepId,
17
+ writeYamlRef,
18
+ } from "./common.mjs";
19
+ import { isPlainObject } from "../value-helpers.mjs";
20
+ import { pathExists } from "../fs-helpers.mjs";
21
+
22
+ function validateRerunEvidence(evidence, finding, disposition) {
23
+ if (!isPlainObject(evidence)) {
24
+ return { ok: false, error: "rerun evidence must be a JSON object" };
25
+ }
26
+ if (evidence.finding_id !== finding.id) {
27
+ return { ok: false, error: "rerun evidence finding_id must match --finding-id" };
28
+ }
29
+ if (evidence.source_fingerprint !== finding.fingerprint) {
30
+ return { ok: false, error: "rerun evidence source_fingerprint must match original finding" };
31
+ }
32
+ if (evidence.disposition !== disposition) {
33
+ return { ok: false, error: "rerun evidence disposition must match --disposition" };
34
+ }
35
+ if (!isPlainObject(evidence.rerun) || !Array.isArray(evidence.rerun.covered_files)) {
36
+ return { ok: false, error: "rerun.covered_files is required" };
37
+ }
38
+ if (!evidence.rerun.covered_files.includes(finding.location.file)) {
39
+ return { ok: false, error: "rerun.covered_files must include original finding file" };
40
+ }
41
+ if (!RERUN_VERDICT.has(evidence.rerun.verdict)) {
42
+ return { ok: false, error: "rerun.verdict is invalid" };
43
+ }
44
+ if (disposition === "remediated" && evidence.rerun.verdict !== "not_reproduced") {
45
+ return { ok: false, error: "remediated disposition requires not_reproduced rerun verdict" };
46
+ }
47
+ if (["accepted-risk", "false-positive"].includes(disposition) && !isPlainObject(evidence.manager_acceptance)) {
48
+ return { ok: false, error: `${disposition} disposition requires manager_acceptance evidence` };
49
+ }
50
+ if (disposition === "deferred-backlog" && typeof evidence.backlog_ref !== "string") {
51
+ return { ok: false, error: "deferred-backlog disposition requires backlog_ref" };
52
+ }
53
+ if (typeof evidence.evidence_summary !== "string" || !evidence.evidence_summary.trim()) {
54
+ return { ok: false, error: "evidence_summary is required" };
55
+ }
56
+ return { ok: true };
57
+ }
58
+
59
+ export async function resolveAuditSweepFinding(projectRoot, options) {
60
+ const sweepId = safeSweepId(options.sweepId);
61
+ if (!sweepId || typeof options.findingId !== "string") {
62
+ return inputError("nimicoding audit-sweep refused: --sweep-id and --finding-id are required.\n");
63
+ }
64
+ if (!FINDING_DISPOSITION.has(options.disposition) || options.disposition === "open") {
65
+ return inputError("nimicoding audit-sweep refused: --disposition must be one of remediated, accepted-risk, false-positive, deferred-backlog.\n");
66
+ }
67
+ const timestampError = ensureIsoTimestamp(options.verifiedAt);
68
+ if (timestampError) {
69
+ return timestampError;
70
+ }
71
+ const source = resolveInsideProject(projectRoot, options.fromPath ?? "", "--from");
72
+ if (!source.ok) {
73
+ return inputError(source.error);
74
+ }
75
+ const sourceInfo = await pathExists(source.absolutePath);
76
+ if (!sourceInfo || !sourceInfo.isFile()) {
77
+ return inputError("nimicoding audit-sweep refused: --from must point to an existing JSON evidence file.\n");
78
+ }
79
+
80
+ const { findingsRef: aggregateFindingsRef, store } = await loadFindings(projectRoot, sweepId);
81
+ const findingIndex = store.findings.findIndex((finding) => finding.id === options.findingId);
82
+ if (findingIndex === -1) {
83
+ return inputError(`nimicoding audit-sweep refused: finding not found for ${options.findingId}.\n`);
84
+ }
85
+ const finding = store.findings[findingIndex];
86
+ const evidenceJson = await loadJsonFile(source.absolutePath);
87
+ if (!evidenceJson.ok) {
88
+ return inputError("nimicoding audit-sweep refused: --from must contain valid JSON.\n");
89
+ }
90
+ const validation = validateRerunEvidence(evidenceJson.value, finding, options.disposition);
91
+ if (!validation.ok) {
92
+ return inputError(`nimicoding audit-sweep refused: ${validation.error}.\n`);
93
+ }
94
+
95
+ const evidenceRef = artifactRef("evidence_refs", sweepId, `resolution-${options.findingId}.json`);
96
+ await mkdir(path.dirname(artifactPath(projectRoot, evidenceRef)), { recursive: true });
97
+ await copyFile(source.absolutePath, artifactPath(projectRoot, evidenceRef));
98
+
99
+ store.findings[findingIndex] = {
100
+ ...finding,
101
+ disposition: options.disposition,
102
+ resolution: {
103
+ disposition: options.disposition,
104
+ evidence_ref: evidenceRef,
105
+ rerun: evidenceJson.value.rerun,
106
+ resolved_at: options.verifiedAt,
107
+ },
108
+ };
109
+ store.updated_at = options.verifiedAt;
110
+ await writeYamlRef(projectRoot, aggregateFindingsRef, store);
111
+ const runRef = await appendRunEvent(projectRoot, sweepId, {
112
+ event_type: "finding_resolved",
113
+ finding_id: options.findingId,
114
+ disposition: options.disposition,
115
+ evidence_ref: evidenceRef,
116
+ findings_ref: findingsRef(sweepId),
117
+ });
118
+
119
+ return {
120
+ ok: true,
121
+ exitCode: 0,
122
+ sweepId,
123
+ findingId: options.findingId,
124
+ disposition: options.disposition,
125
+ findingsRef: aggregateFindingsRef,
126
+ evidenceRef,
127
+ runLedgerRef: runRef,
128
+ };
129
+ }