@node9/proxy 1.16.0 โ 1.18.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +25 -39
- package/dist/cli.js +3801 -6608
- package/dist/cli.mjs +3751 -6557
- package/dist/index.js +99 -29
- package/dist/index.mjs +99 -29
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
<p align="center">
|
|
2
|
-
<img src="https://github.com/user-attachments/assets/
|
|
2
|
+
<img src="https://github.com/user-attachments/assets/bc165779-4200-438d-967a-20d42bbfe69e" width="720" alt="Node9 scan scorecard" />
|
|
3
3
|
</p>
|
|
4
4
|
|
|
5
5
|
<h1 align="center">๐ก๏ธ Node9</h1>
|
|
6
6
|
|
|
7
|
-
<p align="center"><strong>
|
|
7
|
+
<p align="center"><strong>What did your AI agent actually do? Find out, and stop the dangerous stuff.</strong></p>
|
|
8
8
|
|
|
9
9
|
<p align="center">
|
|
10
10
|
<a href="https://www.npmjs.com/package/node9-ai"><img src="https://img.shields.io/npm/v/node9-ai.svg" alt="npm version" /></a>
|
|
@@ -14,54 +14,29 @@
|
|
|
14
14
|
<a href="https://huggingface.co/spaces/Node9ai/node9-security-demo"><img src="https://huggingface.co/datasets/huggingface/badges/resolve/main/open-in-hf-spaces-sm.svg" alt="Try on HF Spaces" /></a>
|
|
15
15
|
</p>
|
|
16
16
|
|
|
17
|
-
Node9 sits between your AI agent and your system. Every shell command, file write, database query, and MCP tool call passes through Node9 first โ blocked, reviewed, or logged based on your policy. Works with **Claude Code**, **Gemini CLI**, **Cursor**, **Codex**, and any **MCP server**.
|
|
18
|
-
|
|
19
|
-
- ๐ **Block** dangerous actions (`git push --force`, `rm -rf /`, `curl|bash`, `DROP TABLE`, ...) before they run
|
|
20
|
-
- ๐ **Review** anything worth a human glance โ OS-native popup, Slack, or browser approval
|
|
21
|
-
- ๐ **Catch credential leaks** in tool arguments, file contents Claude reads back, and shell config files
|
|
22
|
-
- ๐ญ **Map your blast radius** โ see exactly what SSH keys, AWS credentials, and `.env` files an AI agent can reach right now
|
|
23
|
-
- ๐ **Stop agent loops** that burn tokens and money
|
|
24
|
-
- ๐ **Gate MCP tools** and detect rug-pull attacks on server definitions
|
|
25
|
-
- ๐ **Dashboard + scan report** in your browser โ see what your agents actually did
|
|
26
|
-
|
|
27
17
|
---
|
|
28
18
|
|
|
29
|
-
##
|
|
19
|
+
## What `node9 scan` shows on a real machine
|
|
30
20
|
|
|
31
|
-
|
|
32
|
-
npx node9-ai scan
|
|
33
|
-
```
|
|
34
|
-
|
|
35
|
-
Reads your existing Claude / Gemini / Codex session history, runs the full Node9 policy engine, and shows every operation that would have been blocked or flagged.
|
|
36
|
-
|
|
37
|
-
> Runs entirely locally โ no API calls, no telemetry on `scan`, nothing leaves your machine.
|
|
21
|
+
This is my own machine โ 30 days while building Node9. Score 25/100, 5 credential files an AI agent could reach right now.
|
|
38
22
|
|
|
39
23
|
```
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
15 sessions (8 Claude ยท 6 Gemini ยท 1 Codex) 5,470 tool calls
|
|
43
|
-
2,439 bash commands last 90 days Apr 6, 2026 โ Apr 23, 2026
|
|
24
|
+
๐ก Node9 Scan ยท 21 sessions ยท 8,114 tool calls ยท Apr 6 โ May 1, 2026
|
|
44
25
|
|
|
45
|
-
|
|
26
|
+
Security Score: 25/100 ยท Critical
|
|
27
|
+
$3,789 AI spend ยท 62 risky operations
|
|
46
28
|
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
29
|
+
๐ 14 credential leak (Bearer Token ร4, GCP API Key ร4, JWT ร2)
|
|
30
|
+
๐ 15 would have blocked (force-push ร5, read-ssh ร4, read-aws ร4)
|
|
31
|
+
๐ 193 agent loops (18% wasted ยท ~$6.51)
|
|
32
|
+
๐ 33 flagged for review (git-destructive ร19, rm ร9, sudo ร2)
|
|
51
33
|
|
|
52
|
-
|
|
53
|
-
Your Rules ยท added in node9.config.json 2 blocked ยท 157 review
|
|
54
|
-
๐ block-force-push ร2 โ Force push overwrites remote history
|
|
55
|
-
๐ review-git-push ร154 โ git push sends changes to a shared remote
|
|
34
|
+
๐ญ Blast radius ssh ร gcp ร npm ร other (5 exposures)
|
|
56
35
|
|
|
57
|
-
|
|
58
|
-
bash-safe ยท high-risk bash patterns 1 blocked ยท 1 review
|
|
59
|
-
๐ block-eval-remote โ eval of remote download (supply-chain attack)
|
|
60
|
-
|
|
61
|
-
๐ View in browser: http://127.0.0.1:7391/
|
|
36
|
+
โ npx node9-ai scan run this on your machine
|
|
62
37
|
```
|
|
63
38
|
|
|
64
|
-
|
|
39
|
+
Run it on yours โ `npx node9-ai scan` finishes in ~10 seconds and runs entirely local. Nothing uploads. The full breakdown with every tool call, file path, and timestamp is `node9 scan` (default mode). For a browser dashboard view, run `node9 daemon start --openui`.
|
|
65
40
|
|
|
66
41
|
<p align="center">
|
|
67
42
|
<img src="https://github.com/user-attachments/assets/825f99d8-b487-4746-9cef-a02a9ca76c1f" width="90%" alt="Node9 browser History Audit dashboard" />
|
|
@@ -69,6 +44,17 @@ The last line opens a live dashboard in your browser with collapsible drill-down
|
|
|
69
44
|
|
|
70
45
|
---
|
|
71
46
|
|
|
47
|
+
## What Node9 does
|
|
48
|
+
|
|
49
|
+
- ๐ **Block** dangerous AI actions before they run โ `rm -rf`, `git push --force`, `DROP TABLE`, credential reads, `curl | bash`
|
|
50
|
+
- ๐ **Scan** what your AI agent has already been doing โ loops, leaked secrets, blocked operations across every session
|
|
51
|
+
- ๐ **Catch credential leaks** โ AWS keys, GitHub tokens, JWTs, GCP API keys, PEM private keys flagged in tool arguments, file contents Claude reads back, and shell config files
|
|
52
|
+
- ๐ญ **Map your blast radius** โ every SSH key, AWS credential, and `.env` file an AI agent on this machine could reach right now
|
|
53
|
+
|
|
54
|
+
Works with **Claude Code ยท Cursor ยท Codex ยท Gemini CLI ยท any MCP server**.
|
|
55
|
+
|
|
56
|
+
---
|
|
57
|
+
|
|
72
58
|
## How is this different from gitleaks / Snyk / TruffleHog?
|
|
73
59
|
|
|
74
60
|
Those scan **repositories** for credentials. Node9 scans **AI agent session history** โ what your AI ran, what it read, what credentials passed through tool calls. Different surface area.
|