@nimiplatform/nimi-coding 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (186) hide show
  1. package/LICENSE +21 -0
  2. package/README.md +348 -0
  3. package/adapters/README.md +25 -0
  4. package/adapters/claude/README.md +89 -0
  5. package/adapters/claude/profile.yaml +70 -0
  6. package/adapters/codex/README.md +53 -0
  7. package/adapters/codex/profile.yaml +78 -0
  8. package/adapters/oh-my-codex/README.md +185 -0
  9. package/adapters/oh-my-codex/profile.yaml +46 -0
  10. package/bin/nimicoding.mjs +6 -0
  11. package/cli/commands/admit-high-risk-decision.mjs +108 -0
  12. package/cli/commands/audit-sweep.mjs +341 -0
  13. package/cli/commands/blueprint-audit.mjs +91 -0
  14. package/cli/commands/clear.mjs +168 -0
  15. package/cli/commands/closeout.mjs +183 -0
  16. package/cli/commands/decide-high-risk-execution.mjs +124 -0
  17. package/cli/commands/doctor.mjs +53 -0
  18. package/cli/commands/generate-spec-derived-docs.mjs +131 -0
  19. package/cli/commands/handoff.mjs +123 -0
  20. package/cli/commands/ingest-high-risk-execution.mjs +95 -0
  21. package/cli/commands/review-high-risk-execution.mjs +95 -0
  22. package/cli/commands/start.mjs +717 -0
  23. package/cli/commands/topic-formatters.mjs +382 -0
  24. package/cli/commands/topic-goal.mjs +33 -0
  25. package/cli/commands/topic-options-shared.mjs +27 -0
  26. package/cli/commands/topic-options-workflow.mjs +767 -0
  27. package/cli/commands/topic-options.mjs +626 -0
  28. package/cli/commands/topic-runner.mjs +169 -0
  29. package/cli/commands/topic.mjs +795 -0
  30. package/cli/commands/validate-acceptance.mjs +5 -0
  31. package/cli/commands/validate-ai-governance.mjs +214 -0
  32. package/cli/commands/validate-execution-packet.mjs +5 -0
  33. package/cli/commands/validate-orchestration-state.mjs +5 -0
  34. package/cli/commands/validate-prompt.mjs +5 -0
  35. package/cli/commands/validate-spec-audit.mjs +27 -0
  36. package/cli/commands/validate-spec-governance.mjs +124 -0
  37. package/cli/commands/validate-spec-tree.mjs +27 -0
  38. package/cli/commands/validate-worker-output.mjs +5 -0
  39. package/cli/constants.mjs +489 -0
  40. package/cli/help.mjs +134 -0
  41. package/cli/index.mjs +103 -0
  42. package/cli/lib/adapter-profiles.mjs +403 -0
  43. package/cli/lib/audit-execution.mjs +52 -0
  44. package/cli/lib/audit-sweep-runtime/admissions.mjs +381 -0
  45. package/cli/lib/audit-sweep-runtime/audit-validity.mjs +333 -0
  46. package/cli/lib/audit-sweep-runtime/chunks.mjs +697 -0
  47. package/cli/lib/audit-sweep-runtime/closeout.mjs +144 -0
  48. package/cli/lib/audit-sweep-runtime/codex-auditor-evidence.mjs +639 -0
  49. package/cli/lib/audit-sweep-runtime/codex-auditor.mjs +515 -0
  50. package/cli/lib/audit-sweep-runtime/common.mjs +329 -0
  51. package/cli/lib/audit-sweep-runtime/coverage-quality.mjs +172 -0
  52. package/cli/lib/audit-sweep-runtime/evidence-assignment.mjs +152 -0
  53. package/cli/lib/audit-sweep-runtime/format.mjs +57 -0
  54. package/cli/lib/audit-sweep-runtime/ingest.mjs +486 -0
  55. package/cli/lib/audit-sweep-runtime/inventory-spec-chunks.mjs +198 -0
  56. package/cli/lib/audit-sweep-runtime/inventory.mjs +728 -0
  57. package/cli/lib/audit-sweep-runtime/ledger.mjs +315 -0
  58. package/cli/lib/audit-sweep-runtime/p0p1-profile.mjs +101 -0
  59. package/cli/lib/audit-sweep-runtime/remediation.mjs +349 -0
  60. package/cli/lib/audit-sweep-runtime/rerun.mjs +129 -0
  61. package/cli/lib/audit-sweep-runtime/risk-budget.mjs +300 -0
  62. package/cli/lib/audit-sweep-runtime/status.mjs +62 -0
  63. package/cli/lib/audit-sweep-runtime/validators-ledger.mjs +215 -0
  64. package/cli/lib/audit-sweep-runtime/validators.mjs +758 -0
  65. package/cli/lib/audit-sweep.mjs +18 -0
  66. package/cli/lib/authority-convergence.mjs +309 -0
  67. package/cli/lib/blueprint-audit.mjs +370 -0
  68. package/cli/lib/bootstrap.mjs +228 -0
  69. package/cli/lib/closeout.mjs +623 -0
  70. package/cli/lib/codex-sdk-runner.mjs +76 -0
  71. package/cli/lib/contracts.mjs +180 -0
  72. package/cli/lib/doctor.mjs +18 -0
  73. package/cli/lib/entrypoints.mjs +274 -0
  74. package/cli/lib/external-execution.mjs +101 -0
  75. package/cli/lib/fs-helpers.mjs +33 -0
  76. package/cli/lib/handoff.mjs +785 -0
  77. package/cli/lib/high-risk-admission.mjs +442 -0
  78. package/cli/lib/high-risk-decision.mjs +324 -0
  79. package/cli/lib/high-risk-ingest.mjs +317 -0
  80. package/cli/lib/high-risk-review.mjs +263 -0
  81. package/cli/lib/internal/contracts-loaders.mjs +132 -0
  82. package/cli/lib/internal/contracts-parse-high-risk.mjs +131 -0
  83. package/cli/lib/internal/contracts-parse.mjs +457 -0
  84. package/cli/lib/internal/contracts-validators.mjs +398 -0
  85. package/cli/lib/internal/doctor-bootstrap-surface.mjs +359 -0
  86. package/cli/lib/internal/doctor-delegated-surface.mjs +256 -0
  87. package/cli/lib/internal/doctor-finalize.mjs +385 -0
  88. package/cli/lib/internal/doctor-format.mjs +286 -0
  89. package/cli/lib/internal/doctor-inspectors.mjs +294 -0
  90. package/cli/lib/internal/doctor-state.mjs +205 -0
  91. package/cli/lib/internal/governance/ai/ai-context-budget-core.mjs +315 -0
  92. package/cli/lib/internal/governance/ai/ai-structure-budget-core.mjs +358 -0
  93. package/cli/lib/internal/governance/ai/check-agents-freshness.mjs +155 -0
  94. package/cli/lib/internal/governance/ai/check-high-risk-doc-metadata-core.mjs +173 -0
  95. package/cli/lib/internal/governance/config.mjs +150 -0
  96. package/cli/lib/internal/governance/runner.mjs +35 -0
  97. package/cli/lib/internal/governance/shared/read-yaml-with-fragments.mjs +49 -0
  98. package/cli/lib/internal/validators-artifacts.mjs +515 -0
  99. package/cli/lib/internal/validators-shared.mjs +28 -0
  100. package/cli/lib/internal/validators-spec-helpers.mjs +186 -0
  101. package/cli/lib/internal/validators-spec.mjs +410 -0
  102. package/cli/lib/shared.mjs +83 -0
  103. package/cli/lib/topic-draft-packets.mjs +48 -0
  104. package/cli/lib/topic-goal.mjs +361 -0
  105. package/cli/lib/topic-runner.mjs +772 -0
  106. package/cli/lib/topic.mjs +93 -0
  107. package/cli/lib/ui.mjs +178 -0
  108. package/cli/lib/validators.mjs +78 -0
  109. package/cli/lib/value-helpers.mjs +24 -0
  110. package/cli/lib/yaml-helpers.mjs +133 -0
  111. package/cli/nimicoding.mjs +1 -0
  112. package/cli/seeds/bootstrap.mjs +47 -0
  113. package/config/audit-execution-artifacts.yaml +20 -0
  114. package/config/bootstrap.yaml +6 -0
  115. package/config/external-execution-artifacts.yaml +16 -0
  116. package/config/host-adapter.yaml +30 -0
  117. package/config/host-profile.yaml +29 -0
  118. package/config/installer-evidence.yaml +31 -0
  119. package/config/skill-installer.yaml +23 -0
  120. package/config/skill-manifest.yaml +46 -0
  121. package/config/skills.yaml +30 -0
  122. package/config/spec-generation-inputs.yaml +25 -0
  123. package/contracts/acceptance.schema.yaml +16 -0
  124. package/contracts/admission-checklist.schema.yaml +15 -0
  125. package/contracts/audit-chunk.schema.yaml +110 -0
  126. package/contracts/audit-closeout.schema.yaml +51 -0
  127. package/contracts/audit-finding.schema.yaml +61 -0
  128. package/contracts/audit-ledger.schema.yaml +138 -0
  129. package/contracts/audit-plan.schema.yaml +123 -0
  130. package/contracts/audit-remediation-map.schema.yaml +51 -0
  131. package/contracts/audit-rerun.schema.yaml +31 -0
  132. package/contracts/audit-sweep-result.yaml +49 -0
  133. package/contracts/authority-convergence-audit.schema.yaml +19 -0
  134. package/contracts/closeout.schema.yaml +25 -0
  135. package/contracts/decision-review.schema.yaml +16 -0
  136. package/contracts/doc-spec-audit-result.yaml +19 -0
  137. package/contracts/execution-packet.schema.yaml +49 -0
  138. package/contracts/external-host-compatibility.yaml +22 -0
  139. package/contracts/forbidden-shortcuts.catalog.yaml +23 -0
  140. package/contracts/high-risk-admission.schema.yaml +23 -0
  141. package/contracts/high-risk-execution-result.yaml +20 -0
  142. package/contracts/orchestration-state.schema.yaml +41 -0
  143. package/contracts/overflow-continuation.schema.yaml +12 -0
  144. package/contracts/packet.schema.yaml +30 -0
  145. package/contracts/pending-note.schema.yaml +17 -0
  146. package/contracts/prompt.schema.yaml +12 -0
  147. package/contracts/remediation.schema.yaml +16 -0
  148. package/contracts/result.schema.yaml +24 -0
  149. package/contracts/spec-generation-audit.schema.yaml +31 -0
  150. package/contracts/spec-generation-inputs.schema.yaml +39 -0
  151. package/contracts/spec-reconstruction-result.yaml +37 -0
  152. package/contracts/topic-goal.schema.yaml +78 -0
  153. package/contracts/topic-run-ledger.schema.yaml +72 -0
  154. package/contracts/topic-step-decision.schema.yaml +45 -0
  155. package/contracts/topic.schema.yaml +65 -0
  156. package/contracts/true-close.schema.yaml +15 -0
  157. package/contracts/wave.schema.yaml +29 -0
  158. package/contracts/worker-output.schema.yaml +15 -0
  159. package/methodology/audit-sweep-p0p1-recall.yaml +45 -0
  160. package/methodology/authority-convergence-policy.yaml +42 -0
  161. package/methodology/core.yaml +25 -0
  162. package/methodology/four-closure-policy.yaml +28 -0
  163. package/methodology/overflow-continuation-policy.yaml +14 -0
  164. package/methodology/role-separation-policy.yaml +28 -0
  165. package/methodology/skill-exchange-projection.yaml +114 -0
  166. package/methodology/skill-handoff.yaml +34 -0
  167. package/methodology/skill-installer-result.yaml +27 -0
  168. package/methodology/skill-installer-summary-projection.yaml +181 -0
  169. package/methodology/skill-runtime.yaml +23 -0
  170. package/methodology/spec-reconstruction.yaml +63 -0
  171. package/methodology/spec-target-truth-profile.yaml +53 -0
  172. package/methodology/topic-lifecycle-report.yaml +144 -0
  173. package/methodology/topic-lifecycle.yaml +37 -0
  174. package/methodology/topic-naming-ontology.yaml +21 -0
  175. package/methodology/topic-ontology.yaml +38 -0
  176. package/methodology/topic-validation-policy.yaml +9 -0
  177. package/methodology/wave-dag-policy.yaml +14 -0
  178. package/package.json +50 -0
  179. package/spec/_meta/command-gating-matrix.yaml +110 -0
  180. package/spec/_meta/generate-drift-migration-checklist.yaml +155 -0
  181. package/spec/_meta/governance-routing-cutover-checklist.yaml +35 -0
  182. package/spec/_meta/phase2-impacted-surface-matrix.yaml +44 -0
  183. package/spec/_meta/spec-authority-cutover-readiness.yaml +104 -0
  184. package/spec/_meta/spec-tree-model.yaml +72 -0
  185. package/spec/bootstrap-state.yaml +99 -0
  186. package/spec/product-scope.yaml +56 -0
@@ -0,0 +1,398 @@
1
+ import {
2
+ HIGH_RISK_ADMISSION_CONTRACT_REF,
3
+ SPEC_GENERATION_AUDIT_REF,
4
+ } from "../../constants.mjs";
5
+ import {
6
+ arraysEqual,
7
+ isIsoUtcTimestamp,
8
+ isPlainObject,
9
+ } from "../value-helpers.mjs";
10
+
11
+ const SPEC_RECONSTRUCTION_COVERAGE_SUMMARY_REQUIRED_FIELDS = [
12
+ "complete_files",
13
+ "partial_files",
14
+ "placeholder_files",
15
+ ];
16
+
17
+ function validateRequiredFields(subject, requiredFields, label) {
18
+ const missingFields = requiredFields.filter((field) => !(field in subject));
19
+ if (missingFields.length > 0) {
20
+ return {
21
+ ok: false,
22
+ reason: `${label} is missing required fields: ${missingFields.join(", ")}`,
23
+ };
24
+ }
25
+
26
+ return null;
27
+ }
28
+
29
+ function validateSummaryEnvelope(summary, contract, verifiedAt, label) {
30
+ if (!isPlainObject(summary)) {
31
+ return {
32
+ ok: false,
33
+ reason: `${label} must be an object`,
34
+ };
35
+ }
36
+
37
+ const missingFields = validateRequiredFields(summary, contract.summaryRequiredFields, label);
38
+ if (missingFields) {
39
+ return missingFields;
40
+ }
41
+
42
+ if (typeof summary.summary !== "string" || summary.summary.trim().length === 0) {
43
+ return {
44
+ ok: false,
45
+ reason: `${label}.summary must be a non-empty string`,
46
+ };
47
+ }
48
+
49
+ if (!contract.summaryStatusEnum.includes(summary.status)) {
50
+ return {
51
+ ok: false,
52
+ reason: `${label}.status must be one of: ${contract.summaryStatusEnum.join(", ")}`,
53
+ };
54
+ }
55
+
56
+ if (!isIsoUtcTimestamp(summary.verified_at)) {
57
+ return {
58
+ ok: false,
59
+ reason: `${label}.verified_at must be an ISO-8601 UTC timestamp`,
60
+ };
61
+ }
62
+
63
+ if (verifiedAt && summary.verified_at !== verifiedAt) {
64
+ return {
65
+ ok: false,
66
+ reason: `${label}.verified_at must match the top-level verifiedAt`,
67
+ };
68
+ }
69
+
70
+ return null;
71
+ }
72
+
73
+ export function validateSpecReconstructionSummary(summary, contract, verifiedAt) {
74
+ const envelopeError = validateSummaryEnvelope(
75
+ summary,
76
+ contract,
77
+ verifiedAt,
78
+ "spec_reconstruction summary",
79
+ );
80
+ if (envelopeError) {
81
+ return envelopeError;
82
+ }
83
+
84
+ if (
85
+ !Array.isArray(summary.generated_paths)
86
+ || summary.generated_paths.some((entry) => typeof entry !== "string")
87
+ ) {
88
+ return {
89
+ ok: false,
90
+ reason: "spec_reconstruction summary.generated_paths must be an array of strings",
91
+ };
92
+ }
93
+
94
+ if (typeof summary.audit_ref !== "string" || summary.audit_ref !== SPEC_GENERATION_AUDIT_REF) {
95
+ return {
96
+ ok: false,
97
+ reason: `spec_reconstruction summary.audit_ref must be \`${SPEC_GENERATION_AUDIT_REF}\``,
98
+ };
99
+ }
100
+
101
+ if (!isPlainObject(summary.coverage_summary)) {
102
+ return {
103
+ ok: false,
104
+ reason: "spec_reconstruction summary.coverage_summary must be an object",
105
+ };
106
+ }
107
+
108
+ const missingCoverageFields = validateRequiredFields(
109
+ summary.coverage_summary,
110
+ SPEC_RECONSTRUCTION_COVERAGE_SUMMARY_REQUIRED_FIELDS,
111
+ "spec_reconstruction summary.coverage_summary",
112
+ );
113
+ if (missingCoverageFields) {
114
+ return missingCoverageFields;
115
+ }
116
+
117
+ for (const field of SPEC_RECONSTRUCTION_COVERAGE_SUMMARY_REQUIRED_FIELDS) {
118
+ if (!Number.isInteger(summary.coverage_summary[field]) || summary.coverage_summary[field] < 0) {
119
+ return {
120
+ ok: false,
121
+ reason: `spec_reconstruction summary.coverage_summary.${field} must be a non-negative integer`,
122
+ };
123
+ }
124
+ }
125
+
126
+ if (!Number.isInteger(summary.unresolved_file_count) || summary.unresolved_file_count < 0) {
127
+ return {
128
+ ok: false,
129
+ reason: "spec_reconstruction summary.unresolved_file_count must be a non-negative integer",
130
+ };
131
+ }
132
+
133
+ if (!Number.isInteger(summary.inferred_file_count) || summary.inferred_file_count < 0) {
134
+ return {
135
+ ok: false,
136
+ reason: "spec_reconstruction summary.inferred_file_count must be a non-negative integer",
137
+ };
138
+ }
139
+
140
+ return { ok: true };
141
+ }
142
+
143
+ export function validateDocSpecAuditSummary(summary, contract, verifiedAt) {
144
+ const envelopeError = validateSummaryEnvelope(summary, contract, verifiedAt, "doc_spec_audit summary");
145
+ if (envelopeError) {
146
+ return envelopeError;
147
+ }
148
+
149
+ if (
150
+ !Array.isArray(summary.compared_paths)
151
+ || summary.compared_paths.length === 0
152
+ || summary.compared_paths.some((entry) => typeof entry !== "string")
153
+ ) {
154
+ return {
155
+ ok: false,
156
+ reason: "doc_spec_audit summary.compared_paths must be a non-empty array of strings",
157
+ };
158
+ }
159
+
160
+ if (!Number.isInteger(summary.finding_count) || summary.finding_count < 0) {
161
+ return {
162
+ ok: false,
163
+ reason: "doc_spec_audit summary.finding_count must be a non-negative integer",
164
+ };
165
+ }
166
+
167
+ return { ok: true };
168
+ }
169
+
170
+ export function validateAuditSweepSummary(summary, contract, verifiedAt) {
171
+ const envelopeError = validateSummaryEnvelope(summary, contract, verifiedAt, "audit_sweep summary");
172
+ if (envelopeError) {
173
+ return envelopeError;
174
+ }
175
+
176
+ const unexpectedFields = Object.keys(summary).filter(
177
+ (field) => !contract.summaryRequiredFields.includes(field),
178
+ );
179
+ if (unexpectedFields.length > 0) {
180
+ return {
181
+ ok: false,
182
+ reason: `audit_sweep summary contains unexpected fields: ${unexpectedFields.join(", ")}`,
183
+ };
184
+ }
185
+
186
+ for (const field of [
187
+ "plan_ref",
188
+ "ledger_ref",
189
+ "report_ref",
190
+ "remediation_map_ref",
191
+ "audit_closeout_ref",
192
+ ]) {
193
+ if (typeof summary[field] !== "string" || summary[field].trim().length === 0) {
194
+ return {
195
+ ok: false,
196
+ reason: `audit_sweep summary.${field} must be a non-empty string`,
197
+ };
198
+ }
199
+ }
200
+
201
+ for (const field of ["chunk_refs", "evidence_refs"]) {
202
+ if (
203
+ !Array.isArray(summary[field])
204
+ || summary[field].length === 0
205
+ || summary[field].some((entry) => typeof entry !== "string" || entry.trim().length === 0)
206
+ ) {
207
+ return {
208
+ ok: false,
209
+ reason: `audit_sweep summary.${field} must be a non-empty array of non-empty strings`,
210
+ };
211
+ }
212
+ }
213
+
214
+ for (const field of ["finding_count", "unresolved_finding_count"]) {
215
+ if (!Number.isInteger(summary[field]) || summary[field] < 0) {
216
+ return {
217
+ ok: false,
218
+ reason: `audit_sweep summary.${field} must be a non-negative integer`,
219
+ };
220
+ }
221
+ }
222
+
223
+ if (typeof summary.coverage_scope !== "string" || summary.coverage_scope.trim().length === 0) {
224
+ return {
225
+ ok: false,
226
+ reason: "audit_sweep summary.coverage_scope must be a non-empty string",
227
+ };
228
+ }
229
+
230
+ for (const field of ["coverage_quality", "audit_validity"]) {
231
+ if (!isPlainObject(summary[field])) {
232
+ return {
233
+ ok: false,
234
+ reason: `audit_sweep summary.${field} must be an object`,
235
+ };
236
+ }
237
+ }
238
+
239
+ return { ok: true };
240
+ }
241
+
242
+ export function validateHighRiskExecutionSummary(summary, contract, verifiedAt) {
243
+ const envelopeError = validateSummaryEnvelope(
244
+ summary,
245
+ contract,
246
+ verifiedAt,
247
+ "high_risk_execution summary",
248
+ );
249
+ if (envelopeError) {
250
+ return envelopeError;
251
+ }
252
+
253
+ const unexpectedFields = Object.keys(summary).filter(
254
+ (field) => !contract.summaryRequiredFields.includes(field),
255
+ );
256
+ if (unexpectedFields.length > 0) {
257
+ return {
258
+ ok: false,
259
+ reason: `high_risk_execution summary contains unexpected fields: ${unexpectedFields.join(", ")}`,
260
+ };
261
+ }
262
+
263
+ for (const field of [
264
+ "packet_ref",
265
+ "orchestration_state_ref",
266
+ "prompt_ref",
267
+ "worker_output_ref",
268
+ ]) {
269
+ if (typeof summary[field] !== "string" || summary[field].trim().length === 0) {
270
+ return {
271
+ ok: false,
272
+ reason: `high_risk_execution summary.${field} must be a non-empty string`,
273
+ };
274
+ }
275
+ }
276
+
277
+ if (
278
+ !Array.isArray(summary.evidence_refs)
279
+ || summary.evidence_refs.length === 0
280
+ || summary.evidence_refs.some((entry) => typeof entry !== "string" || entry.trim().length === 0)
281
+ ) {
282
+ return {
283
+ ok: false,
284
+ reason: "high_risk_execution summary.evidence_refs must be a non-empty array of non-empty strings",
285
+ };
286
+ }
287
+
288
+ return { ok: true };
289
+ }
290
+
291
+ export function validateHighRiskAdmissionRecord(record, contract) {
292
+ if (!isPlainObject(record)) {
293
+ return {
294
+ ok: false,
295
+ reason: "high-risk admission record must be an object",
296
+ };
297
+ }
298
+
299
+ const keys = Object.keys(record).sort();
300
+ const expectedKeys = contract.admissionRequiredFields.slice().sort();
301
+ if (!arraysEqual(keys, expectedKeys)) {
302
+ return {
303
+ ok: false,
304
+ reason: `high-risk admission record must contain exactly these fields: ${contract.admissionRequiredFields.join(", ")}`,
305
+ };
306
+ }
307
+
308
+ for (const field of [
309
+ "topic_id",
310
+ "packet_id",
311
+ "manager_review_owner",
312
+ "summary",
313
+ "source_decision_contract",
314
+ ]) {
315
+ if (typeof record[field] !== "string" || record[field].trim().length === 0) {
316
+ return {
317
+ ok: false,
318
+ reason: `high-risk admission record ${field} must be a non-empty string`,
319
+ };
320
+ }
321
+ }
322
+
323
+ if (!contract.dispositionEnum.includes(record.disposition)) {
324
+ return {
325
+ ok: false,
326
+ reason: `high-risk admission record disposition must be one of: ${contract.dispositionEnum.join(", ")}`,
327
+ };
328
+ }
329
+
330
+ if (!isIsoUtcTimestamp(record.admitted_at)) {
331
+ return {
332
+ ok: false,
333
+ reason: "high-risk admission record admitted_at must be an ISO-8601 UTC timestamp",
334
+ };
335
+ }
336
+
337
+ return { ok: true };
338
+ }
339
+
340
+ export function validateHighRiskAdmissionsSpec(spec, contract) {
341
+ if (!isPlainObject(spec)) {
342
+ return {
343
+ ok: false,
344
+ reason: "high-risk admissions spec must be an object",
345
+ };
346
+ }
347
+
348
+ const missingKeys = contract.topLevelRequiredKeys.filter((key) => !(key in spec));
349
+ if (missingKeys.length > 0) {
350
+ return {
351
+ ok: false,
352
+ reason: `high-risk admissions spec is missing top-level keys: ${missingKeys.join(", ")}`,
353
+ };
354
+ }
355
+
356
+ if (
357
+ !Array.isArray(spec.admissions)
358
+ || !Array.isArray(spec.admission_rules)
359
+ || !Array.isArray(spec.semantic_constraints)
360
+ ) {
361
+ return {
362
+ ok: false,
363
+ reason: "high-risk admissions spec top-level sections must be arrays",
364
+ };
365
+ }
366
+
367
+ if (
368
+ spec.admission_rules.some((entry) => typeof entry !== "string")
369
+ || spec.semantic_constraints.some((entry) => typeof entry !== "string")
370
+ ) {
371
+ return {
372
+ ok: false,
373
+ reason: "high-risk admissions spec rules and semantic constraints must be string arrays",
374
+ };
375
+ }
376
+
377
+ const seenTopicIds = new Set();
378
+ for (const record of spec.admissions) {
379
+ const validation = validateHighRiskAdmissionRecord(record, contract);
380
+ if (!validation.ok) {
381
+ return validation;
382
+ }
383
+
384
+ if (seenTopicIds.has(record.topic_id)) {
385
+ return {
386
+ ok: false,
387
+ reason: `high-risk admissions spec contains duplicate topic_id ${record.topic_id}`,
388
+ };
389
+ }
390
+ seenTopicIds.add(record.topic_id);
391
+ }
392
+
393
+ return { ok: true };
394
+ }
395
+
396
+ export function makeInvalidHighRiskAdmissionContractReason() {
397
+ return `${HIGH_RISK_ADMISSION_CONTRACT_REF} is missing or malformed`;
398
+ }