@node9/proxy 1.11.2 โ†’ 1.11.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -2,7 +2,7 @@
2
2
 
3
3
  ### The "Sudo" Command for AI Agents.
4
4
 
5
- [![NPM Version](https://img.shields.io/npm/v/@node9/proxy.svg)](https://www.npmjs.com/package/@node9/proxy)
5
+ [![NPM Version](https://img.shields.io/npm/v/node9-ai.svg)](https://www.npmjs.com/package/node9-ai)
6
6
  [![License: Apache 2.0](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)
7
7
  [![Open in HF Spaces](https://huggingface.co/datasets/huggingface/badges/resolve/main/open-in-hf-spaces-sm.svg)](https://huggingface.co/spaces/Node9ai/node9-security-demo)
8
8
  [![Documentation](https://img.shields.io/badge/docs-node9.ai%2Fdocs-blue)](https://node9.ai/docs)
@@ -30,6 +30,35 @@ With Node9:
30
30
 
31
31
  ---
32
32
 
33
+ ## Try it instantly โ€” no install needed
34
+
35
+ See what node9 would have caught in your existing Claude Code, Gemini CLI, and Codex history:
36
+
37
+ ```bash
38
+ npx node9-ai scan
39
+ ```
40
+
41
+ No account, no daemon, no config. Reads `~/.claude/projects/`, `~/.gemini/tmp/`, and `~/.codex/`, runs the full policy engine, and shows every operation that would have been blocked or flagged.
42
+
43
+ ```
44
+ ๐Ÿ” Scanning your AI history โ€” what would node9 have caught?
45
+
46
+ 47 risky operations found โ€” none were blocked
47
+
48
+ ๐Ÿ›‘ Would have blocked 2 operations stopped before execution
49
+ ๐Ÿ‘ Would have flagged 44 sent to you for approval
50
+ ๐Ÿ”‘ Credential leak 1 secret detected in tool call
51
+
52
+ โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€
53
+ bash-safe ยท 12 findings โ†’ node9 shield enable bash-safe
54
+ ๐Ÿ›‘ block-pipe-to-shell ร—8 โ€” Pipe-to-shell is a common supply-chain attack vector
55
+ ๐Ÿ‘ review-eval ร—4 โ€” eval of dynamic content requires human approval
56
+
57
+ โšก 47 operations ran unprotected. node9 would have caught them.
58
+ ```
59
+
60
+ ---
61
+
33
62
  ## Install
34
63
 
35
64
  ```bash
@@ -37,7 +66,7 @@ With Node9:
37
66
  brew tap node9-ai/node9 && brew install node9
38
67
 
39
68
  # or via npm
40
- npm install -g @node9/proxy
69
+ npm install -g node9-ai
41
70
  ```
42
71
 
43
72
  ```bash
@@ -156,6 +185,14 @@ Node9 wires a live statusline into Claude Code that shows you what's happening i
156
185
 
157
186
  The HUD is wired automatically by `node9 init`. Full session logs land in `~/.node9/audit.log`.
158
187
 
188
+ ### `node9 scan` โ€” flags
189
+
190
+ ```bash
191
+ node9 scan # last 90 days
192
+ node9 scan --all # all time
193
+ node9 scan --drill-down # full commands + session IDs
194
+ ```
195
+
159
196
  ### `node9 tail` โ€” live stream
160
197
 
161
198
  Stream every tool call as it happens. Useful when you send an agent off to work and want to watch what it's doing:
@@ -265,35 +302,6 @@ node9 sessions --detail <session-id> # full tool trace (prefix match on sessio
265
302
 
266
303
  Currently works with Claude Code. Support for other agents coming as they expose session history.
267
304
 
268
- ### `node9 scan` โ€” day-0 forecast
269
-
270
- Not installed yet? Run `node9 scan` against your existing Claude Code history to see what Node9 **would have caught** if it had been running:
271
-
272
- ```
273
- $ node9 scan
274
-
275
- ๐Ÿ” node9 scan โ€” what would node9 catch?
276
-
277
- 42 sessions 3,891 tool calls 1,165 bash commands last 90 days
278
-
279
- If node9 had been installed: 23 commands flagged for review
280
-
281
- bash-safe ยท 12 findings โ†’ node9 shield enable bash-safe
282
- block-pipe-to-shell ร—8 โ€” Pipe-to-shell is a common supply-chain attack vector
283
- review-eval ร—4 โ€” eval of dynamic content requires human approval
284
-
285
- Secrets / DLP ยท 2 potential secret leaks
286
- aws-access-key AKIA**************** Bash Apr 12
287
- ```
288
-
289
- `scan` reads raw JSONL history and runs the real policy engine โ€” same shields and rules that would fire in production. No audit log needed.
290
-
291
- ```bash
292
- node9 scan # last 90 days
293
- node9 scan --all # all time
294
- node9 scan --days 30 # custom window
295
- ```
296
-
297
305
  ### `node9 dlp` โ€” response secret scanner
298
306
 
299
307
  Node9's tool-call DLP blocks secrets _before_ they leave your machine. But Claude can also write secrets into its **response text** โ€” a curl example with a real token, a config snippet with a live key โ€” and that text bypasses tool-call interception entirely.