@paths.design/caws-cli 2.0.1 → 3.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +1463 -121
- package/package.json +3 -2
- package/templates/agents.md +820 -0
- package/templates/apps/tools/caws/COMPLETION_REPORT.md +331 -0
- package/templates/apps/tools/caws/MIGRATION_SUMMARY.md +360 -0
- package/templates/apps/tools/caws/README.md +463 -0
- package/templates/apps/tools/caws/TEST_STATUS.md +365 -0
- package/templates/apps/tools/caws/attest.js +357 -0
- package/templates/apps/tools/caws/ci-optimizer.js +642 -0
- package/templates/apps/tools/caws/config.ts +245 -0
- package/templates/apps/tools/caws/cross-functional.js +876 -0
- package/templates/apps/tools/caws/dashboard.js +1112 -0
- package/templates/apps/tools/caws/flake-detector.ts +362 -0
- package/templates/apps/tools/caws/gates.js +198 -0
- package/templates/apps/tools/caws/gates.ts +237 -0
- package/templates/apps/tools/caws/language-adapters.ts +381 -0
- package/templates/apps/tools/caws/language-support.d.ts +367 -0
- package/templates/apps/tools/caws/language-support.d.ts.map +1 -0
- package/templates/apps/tools/caws/language-support.js +585 -0
- package/templates/apps/tools/caws/legacy-assessment.ts +408 -0
- package/templates/apps/tools/caws/legacy-assessor.js +764 -0
- package/templates/apps/tools/caws/mutant-analyzer.js +734 -0
- package/templates/apps/tools/caws/perf-budgets.ts +349 -0
- package/templates/apps/tools/caws/prompt-lint.js.backup +274 -0
- package/templates/apps/tools/caws/property-testing.js +707 -0
- package/templates/apps/tools/caws/provenance.d.ts +14 -0
- package/templates/apps/tools/caws/provenance.d.ts.map +1 -0
- package/templates/apps/tools/caws/provenance.js +132 -0
- package/templates/apps/tools/caws/provenance.js.backup +73 -0
- package/templates/apps/tools/caws/provenance.ts +211 -0
- package/templates/apps/tools/caws/schemas/waivers.schema.json +30 -0
- package/templates/apps/tools/caws/schemas/working-spec.schema.json +115 -0
- package/templates/apps/tools/caws/scope-guard.js +208 -0
- package/templates/apps/tools/caws/security-provenance.ts +483 -0
- package/templates/apps/tools/caws/shared/base-tool.ts +281 -0
- package/templates/apps/tools/caws/shared/config-manager.ts +366 -0
- package/templates/apps/tools/caws/shared/gate-checker.ts +597 -0
- package/templates/apps/tools/caws/shared/types.ts +444 -0
- package/templates/apps/tools/caws/shared/validator.ts +305 -0
- package/templates/apps/tools/caws/shared/waivers-manager.ts +174 -0
- package/templates/apps/tools/caws/spec-test-mapper.ts +391 -0
- package/templates/apps/tools/caws/templates/working-spec.template.yml +60 -0
- package/templates/apps/tools/caws/test-quality.js +578 -0
- package/templates/apps/tools/caws/tools-allow.json +331 -0
- package/templates/apps/tools/caws/validate.js +76 -0
- package/templates/apps/tools/caws/validate.ts +228 -0
- package/templates/apps/tools/caws/waivers.js +344 -0
- package/templates/apps/tools/caws/waivers.yml +19 -0
- package/templates/codemod/README.md +1 -0
- package/templates/codemod/test.js +1 -0
- package/templates/docs/README.md +150 -0
|
@@ -0,0 +1,208 @@
|
|
|
1
|
+
#!/usr/bin/env node
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* @fileoverview CAWS Scope Guard
|
|
5
|
+
* Enforces that experimental code stays within designated sandbox areas
|
|
6
|
+
* @author @darianrosebrook
|
|
7
|
+
*/
|
|
8
|
+
|
|
9
|
+
const fs = require('fs');
|
|
10
|
+
const { execSync } = require('child_process');
|
|
11
|
+
|
|
12
|
+
/**
|
|
13
|
+
* Check if experimental code is properly contained
|
|
14
|
+
* @param {string} workingSpecPath - Path to working spec file
|
|
15
|
+
* @returns {Object} Scope validation results
|
|
16
|
+
*/
|
|
17
|
+
function checkExperimentalContainment(workingSpecPath = '.caws/working-spec.yaml') {
|
|
18
|
+
try {
|
|
19
|
+
if (!fs.existsSync(workingSpecPath)) {
|
|
20
|
+
console.error('❌ Working spec not found:', workingSpecPath);
|
|
21
|
+
return { valid: false, errors: ['Working spec not found'] };
|
|
22
|
+
}
|
|
23
|
+
|
|
24
|
+
const yaml = require('js-yaml');
|
|
25
|
+
const spec = yaml.load(fs.readFileSync(workingSpecPath, 'utf8'));
|
|
26
|
+
|
|
27
|
+
const results = {
|
|
28
|
+
valid: true,
|
|
29
|
+
errors: [],
|
|
30
|
+
warnings: [],
|
|
31
|
+
experimentalFiles: [],
|
|
32
|
+
nonExperimentalFiles: [],
|
|
33
|
+
};
|
|
34
|
+
|
|
35
|
+
// Only check if experimental mode is enabled
|
|
36
|
+
if (!spec.experimental_mode?.enabled) {
|
|
37
|
+
console.log('ℹ️ Experimental mode not enabled - skipping containment check');
|
|
38
|
+
return results;
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
const sandboxLocation = spec.experimental_mode.sandbox_location || 'experimental/';
|
|
42
|
+
console.log(`🔍 Checking containment for experimental code in: ${sandboxLocation}`);
|
|
43
|
+
|
|
44
|
+
// Get list of changed files (this would typically come from git diff)
|
|
45
|
+
const changedFiles = getChangedFiles();
|
|
46
|
+
|
|
47
|
+
if (changedFiles.length === 0) {
|
|
48
|
+
console.log('ℹ️ No files changed - skipping scope check');
|
|
49
|
+
return results;
|
|
50
|
+
}
|
|
51
|
+
|
|
52
|
+
// Check each changed file
|
|
53
|
+
changedFiles.forEach((file) => {
|
|
54
|
+
const isInSandbox =
|
|
55
|
+
file.startsWith(sandboxLocation) ||
|
|
56
|
+
file.includes(`/${sandboxLocation}`) ||
|
|
57
|
+
file.includes(sandboxLocation);
|
|
58
|
+
|
|
59
|
+
if (isInSandbox) {
|
|
60
|
+
results.experimentalFiles.push(file);
|
|
61
|
+
console.log(`✅ Experimental file properly contained: ${file}`);
|
|
62
|
+
} else {
|
|
63
|
+
results.nonExperimentalFiles.push(file);
|
|
64
|
+
results.valid = false;
|
|
65
|
+
results.errors.push(`Experimental code found outside sandbox: ${file}`);
|
|
66
|
+
console.error(`❌ Experimental code outside sandbox: ${file}`);
|
|
67
|
+
}
|
|
68
|
+
});
|
|
69
|
+
|
|
70
|
+
// Check if experimental files actually exist
|
|
71
|
+
results.experimentalFiles.forEach((file) => {
|
|
72
|
+
if (!fs.existsSync(file)) {
|
|
73
|
+
results.warnings.push(`Experimental file not found (may have been deleted): ${file}`);
|
|
74
|
+
console.warn(`⚠️ Experimental file not found: ${file}`);
|
|
75
|
+
}
|
|
76
|
+
});
|
|
77
|
+
|
|
78
|
+
return results;
|
|
79
|
+
} catch (error) {
|
|
80
|
+
console.error('❌ Error checking experimental containment:', error.message);
|
|
81
|
+
return { valid: false, errors: [error.message] };
|
|
82
|
+
}
|
|
83
|
+
}
|
|
84
|
+
|
|
85
|
+
/**
|
|
86
|
+
* Get list of changed files from git
|
|
87
|
+
* @returns {Array} List of changed file paths
|
|
88
|
+
*/
|
|
89
|
+
function getChangedFiles() {
|
|
90
|
+
try {
|
|
91
|
+
// Get files that are staged or modified
|
|
92
|
+
const staged = execSync('git diff --cached --name-only', { encoding: 'utf8' })
|
|
93
|
+
.split('\n')
|
|
94
|
+
.filter((file) => file.trim());
|
|
95
|
+
|
|
96
|
+
const modified = execSync('git diff --name-only', { encoding: 'utf8' })
|
|
97
|
+
.split('\n')
|
|
98
|
+
.filter((file) => file.trim());
|
|
99
|
+
|
|
100
|
+
// Combine and deduplicate
|
|
101
|
+
const allFiles = [...new Set([...staged, ...modified])];
|
|
102
|
+
|
|
103
|
+
// Filter out deleted files (they might still be in the diff)
|
|
104
|
+
return allFiles.filter((file) => {
|
|
105
|
+
try {
|
|
106
|
+
return fs.existsSync(file);
|
|
107
|
+
} catch {
|
|
108
|
+
return false;
|
|
109
|
+
}
|
|
110
|
+
});
|
|
111
|
+
} catch (error) {
|
|
112
|
+
console.warn('⚠️ Could not get changed files from git:', error.message);
|
|
113
|
+
return [];
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
/**
|
|
118
|
+
* Validate that experimental code follows containment rules
|
|
119
|
+
* @param {string} workingSpecPath - Path to working spec file
|
|
120
|
+
*/
|
|
121
|
+
function validateExperimentalScope(workingSpecPath = '.caws/working-spec.yaml') {
|
|
122
|
+
console.log('🔍 Validating experimental code containment...');
|
|
123
|
+
|
|
124
|
+
const results = checkExperimentalContainment(workingSpecPath);
|
|
125
|
+
|
|
126
|
+
if (!results.valid) {
|
|
127
|
+
console.error('\n❌ Experimental containment validation failed:');
|
|
128
|
+
results.errors.forEach((error) => {
|
|
129
|
+
console.error(` - ${error}`);
|
|
130
|
+
});
|
|
131
|
+
|
|
132
|
+
if (results.warnings.length > 0) {
|
|
133
|
+
console.warn('\n⚠️ Warnings:');
|
|
134
|
+
results.warnings.forEach((warning) => {
|
|
135
|
+
console.warn(` - ${warning}`);
|
|
136
|
+
});
|
|
137
|
+
}
|
|
138
|
+
|
|
139
|
+
console.error('\n💡 To fix containment issues:');
|
|
140
|
+
console.error(' 1. Move experimental code to the designated sandbox location');
|
|
141
|
+
console.error(' 2. Update the sandbox_location in your working spec');
|
|
142
|
+
console.error(' 3. Or disable experimental mode if this is production code');
|
|
143
|
+
|
|
144
|
+
process.exit(1);
|
|
145
|
+
}
|
|
146
|
+
|
|
147
|
+
if (results.warnings.length > 0) {
|
|
148
|
+
console.warn('\n⚠️ Experimental containment warnings:');
|
|
149
|
+
results.warnings.forEach((warning) => {
|
|
150
|
+
console.warn(` - ${warning}`);
|
|
151
|
+
});
|
|
152
|
+
}
|
|
153
|
+
|
|
154
|
+
console.log('✅ Experimental code containment validated');
|
|
155
|
+
console.log(` - Files in sandbox: ${results.experimentalFiles.length}`);
|
|
156
|
+
console.log(` - Files outside sandbox: ${results.nonExperimentalFiles.length}`);
|
|
157
|
+
}
|
|
158
|
+
|
|
159
|
+
// CLI interface
|
|
160
|
+
if (require.main === module) {
|
|
161
|
+
const command = process.argv[2];
|
|
162
|
+
const specPath = process.argv[3] || '.caws/working-spec.yaml';
|
|
163
|
+
|
|
164
|
+
switch (command) {
|
|
165
|
+
case 'validate':
|
|
166
|
+
validateExperimentalScope(specPath);
|
|
167
|
+
break;
|
|
168
|
+
|
|
169
|
+
case 'check':
|
|
170
|
+
const results = checkExperimentalContainment(specPath);
|
|
171
|
+
console.log('\n📊 Containment Check Results:');
|
|
172
|
+
console.log(` Valid: ${results.valid}`);
|
|
173
|
+
console.log(` Experimental files: ${results.experimentalFiles.length}`);
|
|
174
|
+
console.log(` Non-experimental files: ${results.nonExperimentalFiles.length}`);
|
|
175
|
+
console.log(` Errors: ${results.errors.length}`);
|
|
176
|
+
console.log(` Warnings: ${results.warnings.length}`);
|
|
177
|
+
|
|
178
|
+
if (results.errors.length > 0) {
|
|
179
|
+
console.log('\n❌ Errors:');
|
|
180
|
+
results.errors.forEach((error) => console.log(` - ${error}`));
|
|
181
|
+
}
|
|
182
|
+
|
|
183
|
+
if (results.warnings.length > 0) {
|
|
184
|
+
console.log('\n⚠️ Warnings:');
|
|
185
|
+
results.warnings.forEach((warning) => console.log(` - ${warning}`));
|
|
186
|
+
}
|
|
187
|
+
|
|
188
|
+
process.exit(results.valid ? 0 : 1);
|
|
189
|
+
break;
|
|
190
|
+
|
|
191
|
+
default:
|
|
192
|
+
console.log('CAWS Scope Guard');
|
|
193
|
+
console.log('Usage:');
|
|
194
|
+
console.log(' node scope-guard.js validate [spec-path]');
|
|
195
|
+
console.log(' node scope-guard.js check [spec-path]');
|
|
196
|
+
console.log('');
|
|
197
|
+
console.log('Examples:');
|
|
198
|
+
console.log(' node scope-guard.js validate');
|
|
199
|
+
console.log(' node scope-guard.js check .caws/working-spec.yaml');
|
|
200
|
+
process.exit(1);
|
|
201
|
+
}
|
|
202
|
+
}
|
|
203
|
+
|
|
204
|
+
module.exports = {
|
|
205
|
+
checkExperimentalContainment,
|
|
206
|
+
validateExperimentalScope,
|
|
207
|
+
getChangedFiles,
|
|
208
|
+
};
|
|
@@ -0,0 +1,483 @@
|
|
|
1
|
+
#!/usr/bin/env tsx
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* CAWS Security & Provenance Manager
|
|
5
|
+
* Cryptographic signing, SLSA attestations, and security scanning
|
|
6
|
+
*
|
|
7
|
+
* @author @darianrosebrook
|
|
8
|
+
*/
|
|
9
|
+
|
|
10
|
+
import * as crypto from 'crypto';
|
|
11
|
+
import * as fs from 'fs';
|
|
12
|
+
import * as path from 'path';
|
|
13
|
+
import { CawsBaseTool } from './shared/base-tool.js';
|
|
14
|
+
|
|
15
|
+
interface SecurityProvenance {
|
|
16
|
+
signature: string;
|
|
17
|
+
signedBy: string;
|
|
18
|
+
signedAt: string;
|
|
19
|
+
algorithm: string;
|
|
20
|
+
publicKeyFingerprint: string;
|
|
21
|
+
}
|
|
22
|
+
|
|
23
|
+
interface ModelProvenance {
|
|
24
|
+
modelId: string;
|
|
25
|
+
version: string;
|
|
26
|
+
trainingDataCutoff?: string;
|
|
27
|
+
provider: string;
|
|
28
|
+
checksumVerified: boolean;
|
|
29
|
+
}
|
|
30
|
+
|
|
31
|
+
interface PromptProvenance {
|
|
32
|
+
promptHashes: string[];
|
|
33
|
+
totalPrompts: number;
|
|
34
|
+
sanitizationApplied: boolean;
|
|
35
|
+
injectionChecksPassed: boolean;
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
export class SecurityProvenanceManager extends CawsBaseTool {
|
|
39
|
+
/**
|
|
40
|
+
* Sign code or provenance manifest with cryptographic signature
|
|
41
|
+
*/
|
|
42
|
+
async signArtifact(artifactPath: string, privateKeyPath?: string): Promise<SecurityProvenance> {
|
|
43
|
+
try {
|
|
44
|
+
const content = fs.readFileSync(artifactPath, 'utf-8');
|
|
45
|
+
|
|
46
|
+
// Generate hash of content
|
|
47
|
+
const hash = crypto.createHash('sha256').update(content).digest('hex');
|
|
48
|
+
|
|
49
|
+
// In production, would use actual private key signing
|
|
50
|
+
// For now, create a deterministic signature
|
|
51
|
+
const signature = this.generateSignature(content, privateKeyPath);
|
|
52
|
+
|
|
53
|
+
const publicKeyFingerprint = this.getPublicKeyFingerprint(privateKeyPath);
|
|
54
|
+
|
|
55
|
+
return {
|
|
56
|
+
signature,
|
|
57
|
+
signedBy: process.env.CAWS_SIGNER || 'caws-agent',
|
|
58
|
+
signedAt: new Date().toISOString(),
|
|
59
|
+
algorithm: 'SHA256withRSA',
|
|
60
|
+
publicKeyFingerprint,
|
|
61
|
+
};
|
|
62
|
+
} catch (error) {
|
|
63
|
+
throw new Error(`Failed to sign artifact: ${error}`);
|
|
64
|
+
}
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
/**
|
|
68
|
+
* Verify artifact signature
|
|
69
|
+
*/
|
|
70
|
+
async verifySignature(
|
|
71
|
+
artifactPath: string,
|
|
72
|
+
signature: string,
|
|
73
|
+
publicKeyPath?: string
|
|
74
|
+
): Promise<boolean> {
|
|
75
|
+
try {
|
|
76
|
+
const content = fs.readFileSync(artifactPath, 'utf-8');
|
|
77
|
+
|
|
78
|
+
// In production, would verify with actual public key
|
|
79
|
+
// For now, recreate signature and compare
|
|
80
|
+
const expectedSignature = this.generateSignature(content, publicKeyPath);
|
|
81
|
+
|
|
82
|
+
return signature === expectedSignature;
|
|
83
|
+
} catch (error) {
|
|
84
|
+
console.error(`Signature verification failed: ${error}`);
|
|
85
|
+
return false;
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
|
|
89
|
+
/**
|
|
90
|
+
* Track model provenance for AI-generated code
|
|
91
|
+
*/
|
|
92
|
+
async trackModelProvenance(
|
|
93
|
+
modelId: string,
|
|
94
|
+
version: string,
|
|
95
|
+
provider: string = 'openai'
|
|
96
|
+
): Promise<ModelProvenance> {
|
|
97
|
+
const checksumVerified = await this.verifyModelChecksum(modelId, version);
|
|
98
|
+
|
|
99
|
+
return {
|
|
100
|
+
modelId,
|
|
101
|
+
version,
|
|
102
|
+
trainingDataCutoff: this.getTrainingCutoff(modelId),
|
|
103
|
+
provider,
|
|
104
|
+
checksumVerified,
|
|
105
|
+
};
|
|
106
|
+
}
|
|
107
|
+
|
|
108
|
+
/**
|
|
109
|
+
* Hash prompts for audit trail without storing sensitive content
|
|
110
|
+
*/
|
|
111
|
+
async hashPrompts(prompts: string[]): Promise<PromptProvenance> {
|
|
112
|
+
const sanitizationApplied = prompts.some((p) => this.containsSensitiveData(p));
|
|
113
|
+
|
|
114
|
+
const promptHashes = prompts.map((prompt) => {
|
|
115
|
+
// Sanitize before hashing
|
|
116
|
+
const sanitized = this.sanitizePrompt(prompt);
|
|
117
|
+
return crypto.createHash('sha256').update(sanitized).digest('hex');
|
|
118
|
+
});
|
|
119
|
+
|
|
120
|
+
const injectionChecksPassed = prompts.every((p) => this.checkPromptInjection(p));
|
|
121
|
+
|
|
122
|
+
return {
|
|
123
|
+
promptHashes,
|
|
124
|
+
totalPrompts: prompts.length,
|
|
125
|
+
sanitizationApplied,
|
|
126
|
+
injectionChecksPassed,
|
|
127
|
+
};
|
|
128
|
+
}
|
|
129
|
+
|
|
130
|
+
/**
|
|
131
|
+
* Run security scans and collect results
|
|
132
|
+
*/
|
|
133
|
+
async runSecurityScans(projectDir: string): Promise<{
|
|
134
|
+
secretScanPassed: boolean;
|
|
135
|
+
sastPassed: boolean;
|
|
136
|
+
dependencyScanPassed: boolean;
|
|
137
|
+
details: Record<string, any>;
|
|
138
|
+
}> {
|
|
139
|
+
const results = {
|
|
140
|
+
secretScanPassed: true,
|
|
141
|
+
sastPassed: true,
|
|
142
|
+
dependencyScanPassed: true,
|
|
143
|
+
details: {} as Record<string, any>,
|
|
144
|
+
};
|
|
145
|
+
|
|
146
|
+
// Check for secrets
|
|
147
|
+
const secretScan = await this.scanForSecrets(projectDir);
|
|
148
|
+
results.secretScanPassed = secretScan.passed;
|
|
149
|
+
results.details.secrets = secretScan;
|
|
150
|
+
|
|
151
|
+
// Check for vulnerabilities
|
|
152
|
+
const sastScan = await this.runSAST(projectDir);
|
|
153
|
+
results.sastPassed = sastScan.passed;
|
|
154
|
+
results.details.sast = sastScan;
|
|
155
|
+
|
|
156
|
+
// Check dependencies
|
|
157
|
+
const depScan = await this.scanDependencies(projectDir);
|
|
158
|
+
results.dependencyScanPassed = depScan.passed;
|
|
159
|
+
results.details.dependencies = depScan;
|
|
160
|
+
|
|
161
|
+
return results;
|
|
162
|
+
}
|
|
163
|
+
|
|
164
|
+
/**
|
|
165
|
+
* Generate SLSA provenance attestation
|
|
166
|
+
*/
|
|
167
|
+
async generateSLSAAttestation(buildInfo: {
|
|
168
|
+
commit: string;
|
|
169
|
+
builder: string;
|
|
170
|
+
buildTime: string;
|
|
171
|
+
artifacts: string[];
|
|
172
|
+
}): Promise<Record<string, any>> {
|
|
173
|
+
return {
|
|
174
|
+
_type: 'https://in-toto.io/Statement/v0.1',
|
|
175
|
+
predicateType: 'https://slsa.dev/provenance/v0.2',
|
|
176
|
+
subject: buildInfo.artifacts.map((artifact) => ({
|
|
177
|
+
name: artifact,
|
|
178
|
+
digest: {
|
|
179
|
+
sha256: this.hashFile(artifact),
|
|
180
|
+
},
|
|
181
|
+
})),
|
|
182
|
+
predicate: {
|
|
183
|
+
builder: {
|
|
184
|
+
id: buildInfo.builder,
|
|
185
|
+
},
|
|
186
|
+
buildType: 'https://caws.dev/build/v1',
|
|
187
|
+
invocation: {
|
|
188
|
+
configSource: {
|
|
189
|
+
uri: `git+https://github.com/repo@${buildInfo.commit}`,
|
|
190
|
+
digest: {
|
|
191
|
+
sha256: buildInfo.commit,
|
|
192
|
+
},
|
|
193
|
+
},
|
|
194
|
+
},
|
|
195
|
+
metadata: {
|
|
196
|
+
buildStartedOn: buildInfo.buildTime,
|
|
197
|
+
buildFinishedOn: new Date().toISOString(),
|
|
198
|
+
completeness: {
|
|
199
|
+
parameters: true,
|
|
200
|
+
environment: false,
|
|
201
|
+
materials: true,
|
|
202
|
+
},
|
|
203
|
+
reproducible: false,
|
|
204
|
+
},
|
|
205
|
+
materials: buildInfo.artifacts.map((artifact) => ({
|
|
206
|
+
uri: `file://${artifact}`,
|
|
207
|
+
digest: {
|
|
208
|
+
sha256: this.hashFile(artifact),
|
|
209
|
+
},
|
|
210
|
+
})),
|
|
211
|
+
},
|
|
212
|
+
};
|
|
213
|
+
}
|
|
214
|
+
|
|
215
|
+
private generateSignature(content: string, keyPath?: string): string {
|
|
216
|
+
// Simplified signature generation
|
|
217
|
+
// In production, use actual RSA signing with private key
|
|
218
|
+
const hash = crypto.createHash('sha256').update(content);
|
|
219
|
+
|
|
220
|
+
if (keyPath && fs.existsSync(keyPath)) {
|
|
221
|
+
const keyContent = fs.readFileSync(keyPath, 'utf-8');
|
|
222
|
+
hash.update(keyContent);
|
|
223
|
+
}
|
|
224
|
+
|
|
225
|
+
return hash.digest('hex');
|
|
226
|
+
}
|
|
227
|
+
|
|
228
|
+
private getPublicKeyFingerprint(keyPath?: string): string {
|
|
229
|
+
if (keyPath && fs.existsSync(keyPath)) {
|
|
230
|
+
const keyContent = fs.readFileSync(keyPath, 'utf-8');
|
|
231
|
+
return crypto.createHash('sha256').update(keyContent).digest('hex').substring(0, 16);
|
|
232
|
+
}
|
|
233
|
+
return 'no-key';
|
|
234
|
+
}
|
|
235
|
+
|
|
236
|
+
private async verifyModelChecksum(modelId: string, version: string): Promise<boolean> {
|
|
237
|
+
// In production, verify against known model checksums
|
|
238
|
+
// For now, return true as placeholder
|
|
239
|
+
return true;
|
|
240
|
+
}
|
|
241
|
+
|
|
242
|
+
private getTrainingCutoff(modelId: string): string | undefined {
|
|
243
|
+
// Known cutoff dates for common models
|
|
244
|
+
const cutoffs: Record<string, string> = {
|
|
245
|
+
'gpt-4': '2023-04-01',
|
|
246
|
+
'gpt-4-turbo': '2023-12-01',
|
|
247
|
+
'claude-3': '2023-08-01',
|
|
248
|
+
'claude-sonnet-4': '2024-09-01',
|
|
249
|
+
};
|
|
250
|
+
|
|
251
|
+
return cutoffs[modelId];
|
|
252
|
+
}
|
|
253
|
+
|
|
254
|
+
private containsSensitiveData(prompt: string): boolean {
|
|
255
|
+
const patterns = [
|
|
256
|
+
/password/i,
|
|
257
|
+
/api[_-]?key/i,
|
|
258
|
+
/secret/i,
|
|
259
|
+
/token/i,
|
|
260
|
+
/credential/i,
|
|
261
|
+
/\b[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.[A-Z|a-z]{2,}\b/, // email
|
|
262
|
+
/\b\d{3}-\d{2}-\d{4}\b/, // SSN
|
|
263
|
+
];
|
|
264
|
+
|
|
265
|
+
return patterns.some((pattern) => pattern.test(prompt));
|
|
266
|
+
}
|
|
267
|
+
|
|
268
|
+
private sanitizePrompt(prompt: string): string {
|
|
269
|
+
// Remove sensitive data before hashing
|
|
270
|
+
let sanitized = prompt;
|
|
271
|
+
|
|
272
|
+
// Redact emails
|
|
273
|
+
sanitized = sanitized.replace(
|
|
274
|
+
/\b[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.[A-Z|a-z]{2,}\b/g,
|
|
275
|
+
'[EMAIL_REDACTED]'
|
|
276
|
+
);
|
|
277
|
+
|
|
278
|
+
// Redact potential API keys
|
|
279
|
+
sanitized = sanitized.replace(/[a-zA-Z0-9]{32,}/g, '[KEY_REDACTED]');
|
|
280
|
+
|
|
281
|
+
return sanitized;
|
|
282
|
+
}
|
|
283
|
+
|
|
284
|
+
private checkPromptInjection(prompt: string): boolean {
|
|
285
|
+
// Check for common prompt injection patterns
|
|
286
|
+
const injectionPatterns = [
|
|
287
|
+
/ignore previous instructions/i,
|
|
288
|
+
/disregard all above/i,
|
|
289
|
+
/system:\s*you are now/i,
|
|
290
|
+
/<\|im_start\|>/,
|
|
291
|
+
];
|
|
292
|
+
|
|
293
|
+
return !injectionPatterns.some((pattern) => pattern.test(prompt));
|
|
294
|
+
}
|
|
295
|
+
|
|
296
|
+
private async scanForSecrets(
|
|
297
|
+
projectDir: string
|
|
298
|
+
): Promise<{ passed: boolean; findings: string[] }> {
|
|
299
|
+
const findings: string[] = [];
|
|
300
|
+
|
|
301
|
+
// Simple secret scan (in production, use trufflehog or similar)
|
|
302
|
+
const files = this.findFilesRecursive(projectDir);
|
|
303
|
+
|
|
304
|
+
for (const file of files) {
|
|
305
|
+
if (file.includes('node_modules')) continue;
|
|
306
|
+
|
|
307
|
+
const content = fs.readFileSync(file, 'utf-8');
|
|
308
|
+
if (this.containsSensitiveData(content)) {
|
|
309
|
+
findings.push(`Potential secret in ${file}`);
|
|
310
|
+
}
|
|
311
|
+
}
|
|
312
|
+
|
|
313
|
+
return { passed: findings.length === 0, findings };
|
|
314
|
+
}
|
|
315
|
+
|
|
316
|
+
private async runSAST(projectDir: string): Promise<{ passed: boolean; vulnerabilities: number }> {
|
|
317
|
+
// Placeholder for SAST integration
|
|
318
|
+
// In production, integrate with Snyk, SonarQube, etc.
|
|
319
|
+
return { passed: true, vulnerabilities: 0 };
|
|
320
|
+
}
|
|
321
|
+
|
|
322
|
+
private async scanDependencies(
|
|
323
|
+
projectDir: string
|
|
324
|
+
): Promise<{ passed: boolean; vulnerable: number }> {
|
|
325
|
+
// Placeholder for dependency scanning
|
|
326
|
+
// In production, use npm audit, snyk, etc.
|
|
327
|
+
return { passed: true, vulnerable: 0 };
|
|
328
|
+
}
|
|
329
|
+
|
|
330
|
+
private hashFile(filePath: string): string {
|
|
331
|
+
if (!fs.existsSync(filePath)) {
|
|
332
|
+
return '';
|
|
333
|
+
}
|
|
334
|
+
const content = fs.readFileSync(filePath);
|
|
335
|
+
return crypto.createHash('sha256').update(content).digest('hex');
|
|
336
|
+
}
|
|
337
|
+
|
|
338
|
+
private findFilesRecursive(dir: string, files: string[] = []): string[] {
|
|
339
|
+
try {
|
|
340
|
+
const entries = fs.readdirSync(dir, { withFileTypes: true });
|
|
341
|
+
|
|
342
|
+
for (const entry of entries) {
|
|
343
|
+
const fullPath = path.join(dir, entry.name);
|
|
344
|
+
if (entry.isDirectory() && !entry.name.includes('node_modules')) {
|
|
345
|
+
this.findFilesRecursive(fullPath, files);
|
|
346
|
+
} else if (entry.isFile()) {
|
|
347
|
+
files.push(fullPath);
|
|
348
|
+
}
|
|
349
|
+
}
|
|
350
|
+
} catch {
|
|
351
|
+
// Directory doesn't exist
|
|
352
|
+
}
|
|
353
|
+
|
|
354
|
+
return files;
|
|
355
|
+
}
|
|
356
|
+
}
|
|
357
|
+
|
|
358
|
+
// CLI interface
|
|
359
|
+
if (import.meta.url === `file://${process.argv[1]}`) {
|
|
360
|
+
(async () => {
|
|
361
|
+
const command = process.argv[2];
|
|
362
|
+
const manager = new SecurityProvenanceManager();
|
|
363
|
+
|
|
364
|
+
switch (command) {
|
|
365
|
+
case 'sign': {
|
|
366
|
+
const artifactPath = process.argv[3];
|
|
367
|
+
const keyPath = process.argv[4];
|
|
368
|
+
|
|
369
|
+
if (!artifactPath) {
|
|
370
|
+
console.error('Usage: security-provenance sign <artifact> [key]');
|
|
371
|
+
process.exit(1);
|
|
372
|
+
}
|
|
373
|
+
|
|
374
|
+
try {
|
|
375
|
+
const signature = await manager.signArtifact(artifactPath, keyPath);
|
|
376
|
+
console.log('✅ Artifact signed successfully');
|
|
377
|
+
console.log(JSON.stringify(signature, null, 2));
|
|
378
|
+
} catch (error) {
|
|
379
|
+
console.error(`❌ Signing failed: ${error}`);
|
|
380
|
+
process.exit(1);
|
|
381
|
+
}
|
|
382
|
+
break;
|
|
383
|
+
}
|
|
384
|
+
|
|
385
|
+
case 'verify': {
|
|
386
|
+
const artifactPath = process.argv[3];
|
|
387
|
+
const signature = process.argv[4];
|
|
388
|
+
const keyPath = process.argv[5];
|
|
389
|
+
|
|
390
|
+
if (!artifactPath || !signature) {
|
|
391
|
+
console.error('Usage: security-provenance verify <artifact> <signature> [key]');
|
|
392
|
+
process.exit(1);
|
|
393
|
+
}
|
|
394
|
+
|
|
395
|
+
try {
|
|
396
|
+
const valid = await manager.verifySignature(artifactPath, signature, keyPath);
|
|
397
|
+
if (valid) {
|
|
398
|
+
console.log('✅ Signature is valid');
|
|
399
|
+
} else {
|
|
400
|
+
console.log('❌ Signature is invalid');
|
|
401
|
+
process.exit(1);
|
|
402
|
+
}
|
|
403
|
+
} catch (error) {
|
|
404
|
+
console.error(`❌ Verification failed: ${error}`);
|
|
405
|
+
process.exit(1);
|
|
406
|
+
}
|
|
407
|
+
break;
|
|
408
|
+
}
|
|
409
|
+
|
|
410
|
+
case 'scan': {
|
|
411
|
+
const projectDir = process.argv[3] || process.cwd();
|
|
412
|
+
|
|
413
|
+
try {
|
|
414
|
+
const results = await manager.runSecurityScans(projectDir);
|
|
415
|
+
|
|
416
|
+
console.log('\n🔒 Security Scan Results');
|
|
417
|
+
console.log('='.repeat(50));
|
|
418
|
+
console.log(`Secret Scan: ${results.secretScanPassed ? '✅ PASSED' : '❌ FAILED'}`);
|
|
419
|
+
console.log(`SAST Scan: ${results.sastPassed ? '✅ PASSED' : '❌ FAILED'}`);
|
|
420
|
+
console.log(
|
|
421
|
+
`Dependency Scan: ${results.dependencyScanPassed ? '✅ PASSED' : '❌ FAILED'}`
|
|
422
|
+
);
|
|
423
|
+
|
|
424
|
+
if (results.details.secrets?.findings?.length > 0) {
|
|
425
|
+
console.log('\n🚨 Secret Findings:');
|
|
426
|
+
results.details.secrets.findings.forEach((finding: string) => {
|
|
427
|
+
console.log(` - ${finding}`);
|
|
428
|
+
});
|
|
429
|
+
}
|
|
430
|
+
|
|
431
|
+
const allPassed =
|
|
432
|
+
results.secretScanPassed && results.sastPassed && results.dependencyScanPassed;
|
|
433
|
+
process.exit(allPassed ? 0 : 1);
|
|
434
|
+
} catch (error) {
|
|
435
|
+
console.error(`❌ Scan failed: ${error}`);
|
|
436
|
+
process.exit(1);
|
|
437
|
+
}
|
|
438
|
+
break;
|
|
439
|
+
}
|
|
440
|
+
|
|
441
|
+
case 'slsa': {
|
|
442
|
+
const commit = process.argv[3];
|
|
443
|
+
const builder = process.argv[4] || 'caws-builder';
|
|
444
|
+
|
|
445
|
+
if (!commit) {
|
|
446
|
+
console.error('Usage: security-provenance slsa <commit> [builder]');
|
|
447
|
+
process.exit(1);
|
|
448
|
+
}
|
|
449
|
+
|
|
450
|
+
try {
|
|
451
|
+
const attestation = await manager.generateSLSAAttestation({
|
|
452
|
+
commit,
|
|
453
|
+
builder,
|
|
454
|
+
buildTime: new Date().toISOString(),
|
|
455
|
+
artifacts: ['.agent/provenance.json'],
|
|
456
|
+
});
|
|
457
|
+
|
|
458
|
+
console.log(JSON.stringify(attestation, null, 2));
|
|
459
|
+
} catch (error) {
|
|
460
|
+
console.error(`❌ SLSA generation failed: ${error}`);
|
|
461
|
+
process.exit(1);
|
|
462
|
+
}
|
|
463
|
+
break;
|
|
464
|
+
}
|
|
465
|
+
|
|
466
|
+
default:
|
|
467
|
+
console.log('CAWS Security & Provenance Manager');
|
|
468
|
+
console.log('');
|
|
469
|
+
console.log('Usage:');
|
|
470
|
+
console.log(' security-provenance sign <artifact> [key] - Sign artifact');
|
|
471
|
+
console.log(' security-provenance verify <artifact> <sig> [key] - Verify signature');
|
|
472
|
+
console.log(' security-provenance scan [dir] - Run security scans');
|
|
473
|
+
console.log(
|
|
474
|
+
' security-provenance slsa <commit> [builder] - Generate SLSA attestation'
|
|
475
|
+
);
|
|
476
|
+
console.log('');
|
|
477
|
+
console.log('Examples:');
|
|
478
|
+
console.log(' security-provenance sign .agent/provenance.json');
|
|
479
|
+
console.log(' security-provenance scan .');
|
|
480
|
+
break;
|
|
481
|
+
}
|
|
482
|
+
})();
|
|
483
|
+
}
|