@node9/proxy 1.11.3 โ 1.11.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +39 -31
- package/dist/cli.js +1602 -230
- package/dist/cli.mjs +1596 -224
- package/dist/index.js +465 -75
- package/dist/index.mjs +465 -75
- package/dist/shields/builtin/bash-safe.json +18 -4
- package/package.json +2 -2
package/README.md
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
|
|
3
3
|
### The "Sudo" Command for AI Agents.
|
|
4
4
|
|
|
5
|
-
[](https://www.npmjs.com/package/node9-ai)
|
|
6
6
|
[](https://opensource.org/licenses/Apache-2.0)
|
|
7
7
|
[](https://huggingface.co/spaces/Node9ai/node9-security-demo)
|
|
8
8
|
[](https://node9.ai/docs)
|
|
@@ -30,6 +30,35 @@ With Node9:
|
|
|
30
30
|
|
|
31
31
|
---
|
|
32
32
|
|
|
33
|
+
## Try it instantly โ no install needed
|
|
34
|
+
|
|
35
|
+
See what node9 would have caught in your existing Claude Code, Gemini CLI, and Codex history:
|
|
36
|
+
|
|
37
|
+
```bash
|
|
38
|
+
npx node9-ai scan
|
|
39
|
+
```
|
|
40
|
+
|
|
41
|
+
No account, no daemon, no config. Reads `~/.claude/projects/`, `~/.gemini/tmp/`, and `~/.codex/`, runs the full policy engine, and shows every operation that would have been blocked or flagged.
|
|
42
|
+
|
|
43
|
+
```
|
|
44
|
+
๐ Scanning your AI history โ what would node9 have caught?
|
|
45
|
+
|
|
46
|
+
47 risky operations found โ none were blocked
|
|
47
|
+
|
|
48
|
+
๐ Would have blocked 2 operations stopped before execution
|
|
49
|
+
๐ Would have flagged 44 sent to you for approval
|
|
50
|
+
๐ Credential leak 1 secret detected in tool call
|
|
51
|
+
|
|
52
|
+
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
|
|
53
|
+
bash-safe ยท 12 findings โ node9 shield enable bash-safe
|
|
54
|
+
๐ block-pipe-to-shell ร8 โ Pipe-to-shell is a common supply-chain attack vector
|
|
55
|
+
๐ review-eval ร4 โ eval of dynamic content requires human approval
|
|
56
|
+
|
|
57
|
+
โก 47 operations ran unprotected. node9 would have caught them.
|
|
58
|
+
```
|
|
59
|
+
|
|
60
|
+
---
|
|
61
|
+
|
|
33
62
|
## Install
|
|
34
63
|
|
|
35
64
|
```bash
|
|
@@ -37,7 +66,7 @@ With Node9:
|
|
|
37
66
|
brew tap node9-ai/node9 && brew install node9
|
|
38
67
|
|
|
39
68
|
# or via npm
|
|
40
|
-
npm install -g
|
|
69
|
+
npm install -g node9-ai
|
|
41
70
|
```
|
|
42
71
|
|
|
43
72
|
```bash
|
|
@@ -156,6 +185,14 @@ Node9 wires a live statusline into Claude Code that shows you what's happening i
|
|
|
156
185
|
|
|
157
186
|
The HUD is wired automatically by `node9 init`. Full session logs land in `~/.node9/audit.log`.
|
|
158
187
|
|
|
188
|
+
### `node9 scan` โ flags
|
|
189
|
+
|
|
190
|
+
```bash
|
|
191
|
+
node9 scan # last 90 days
|
|
192
|
+
node9 scan --all # all time
|
|
193
|
+
node9 scan --drill-down # full commands + session IDs
|
|
194
|
+
```
|
|
195
|
+
|
|
159
196
|
### `node9 tail` โ live stream
|
|
160
197
|
|
|
161
198
|
Stream every tool call as it happens. Useful when you send an agent off to work and want to watch what it's doing:
|
|
@@ -265,35 +302,6 @@ node9 sessions --detail <session-id> # full tool trace (prefix match on sessio
|
|
|
265
302
|
|
|
266
303
|
Currently works with Claude Code. Support for other agents coming as they expose session history.
|
|
267
304
|
|
|
268
|
-
### `node9 scan` โ day-0 forecast
|
|
269
|
-
|
|
270
|
-
Not installed yet? Run `node9 scan` against your existing Claude Code history to see what Node9 **would have caught** if it had been running:
|
|
271
|
-
|
|
272
|
-
```
|
|
273
|
-
$ node9 scan
|
|
274
|
-
|
|
275
|
-
๐ node9 scan โ what would node9 catch?
|
|
276
|
-
|
|
277
|
-
42 sessions 3,891 tool calls 1,165 bash commands last 90 days
|
|
278
|
-
|
|
279
|
-
If node9 had been installed: 23 commands flagged for review
|
|
280
|
-
|
|
281
|
-
bash-safe ยท 12 findings โ node9 shield enable bash-safe
|
|
282
|
-
block-pipe-to-shell ร8 โ Pipe-to-shell is a common supply-chain attack vector
|
|
283
|
-
review-eval ร4 โ eval of dynamic content requires human approval
|
|
284
|
-
|
|
285
|
-
Secrets / DLP ยท 2 potential secret leaks
|
|
286
|
-
aws-access-key AKIA**************** Bash Apr 12
|
|
287
|
-
```
|
|
288
|
-
|
|
289
|
-
`scan` reads raw JSONL history and runs the real policy engine โ same shields and rules that would fire in production. No audit log needed.
|
|
290
|
-
|
|
291
|
-
```bash
|
|
292
|
-
node9 scan # last 90 days
|
|
293
|
-
node9 scan --all # all time
|
|
294
|
-
node9 scan --days 30 # custom window
|
|
295
|
-
```
|
|
296
|
-
|
|
297
305
|
### `node9 dlp` โ response secret scanner
|
|
298
306
|
|
|
299
307
|
Node9's tool-call DLP blocks secrets _before_ they leave your machine. But Claude can also write secrets into its **response text** โ a curl example with a real token, a config snippet with a live key โ and that text bypasses tool-call interception entirely.
|