@safekeylab/sdk 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/README.md +212 -0
  2. package/dist/index.d.mts +100 -0
  3. package/dist/index.d.ts +100 -0
  4. package/dist/index.js +241 -0
  5. package/dist/index.js.map +1 -0
  6. package/dist/index.mjs +231 -0
  7. package/dist/index.mjs.map +1 -0
  8. package/dist/integrations/anthropic.d.mts +65 -0
  9. package/dist/integrations/anthropic.d.ts +65 -0
  10. package/dist/integrations/anthropic.js +347 -0
  11. package/dist/integrations/anthropic.js.map +1 -0
  12. package/dist/integrations/anthropic.mjs +341 -0
  13. package/dist/integrations/anthropic.mjs.map +1 -0
  14. package/dist/integrations/langchain.d.mts +106 -0
  15. package/dist/integrations/langchain.d.ts +106 -0
  16. package/dist/integrations/langchain.js +415 -0
  17. package/dist/integrations/langchain.js.map +1 -0
  18. package/dist/integrations/langchain.mjs +406 -0
  19. package/dist/integrations/langchain.mjs.map +1 -0
  20. package/dist/integrations/openai.d.mts +72 -0
  21. package/dist/integrations/openai.d.ts +72 -0
  22. package/dist/integrations/openai.js +327 -0
  23. package/dist/integrations/openai.js.map +1 -0
  24. package/dist/integrations/openai.mjs +321 -0
  25. package/dist/integrations/openai.mjs.map +1 -0
  26. package/dist/integrations/vercel-ai.d.mts +80 -0
  27. package/dist/integrations/vercel-ai.d.ts +80 -0
  28. package/dist/integrations/vercel-ai.js +377 -0
  29. package/dist/integrations/vercel-ai.js.map +1 -0
  30. package/dist/integrations/vercel-ai.mjs +371 -0
  31. package/dist/integrations/vercel-ai.mjs.map +1 -0
  32. package/dist/types-CtDYLaOX.d.mts +129 -0
  33. package/dist/types-CtDYLaOX.d.ts +129 -0
  34. package/package.json +106 -0
@@ -0,0 +1,377 @@
1
+ 'use strict';
2
+
3
+ Object.defineProperty(exports, '__esModule', { value: true });
4
+
5
+ // src/types.ts
6
+ var SafeKeyLabError = class extends Error {
7
+ constructor(message, code, statusCode) {
8
+ super(message);
9
+ this.code = code;
10
+ this.statusCode = statusCode;
11
+ this.name = "SafeKeyLabError";
12
+ }
13
+ };
14
+ var PIIBlockedError = class extends SafeKeyLabError {
15
+ constructor(detections) {
16
+ super(
17
+ `Request blocked: PII detected (${detections.map((d) => d.type).join(", ")})`,
18
+ "PII_BLOCKED"
19
+ );
20
+ this.detections = detections;
21
+ this.name = "PIIBlockedError";
22
+ }
23
+ };
24
+ var ThreatBlockedError = class extends SafeKeyLabError {
25
+ constructor(threats) {
26
+ super(
27
+ `Request blocked: Threat detected (${threats.map((t) => t.type).join(", ")})`,
28
+ "THREAT_BLOCKED"
29
+ );
30
+ this.threats = threats;
31
+ this.name = "ThreatBlockedError";
32
+ }
33
+ };
34
+
35
+ // src/client.ts
36
+ var DEFAULT_BASE_URL = "https://api.safekeylab.com";
37
+ var DEFAULT_TIMEOUT = 3e4;
38
+ var SafeKeyLab = class {
39
+ constructor(config) {
40
+ if (!config.apiKey) {
41
+ throw new SafeKeyLabError("API key is required", "MISSING_API_KEY");
42
+ }
43
+ this.apiKey = config.apiKey;
44
+ this.baseUrl = config.baseUrl || DEFAULT_BASE_URL;
45
+ this.timeout = config.timeout || DEFAULT_TIMEOUT;
46
+ this.debug = config.debug || false;
47
+ }
48
+ log(...args) {
49
+ if (this.debug) {
50
+ console.log("[SafeKeyLab]", ...args);
51
+ }
52
+ }
53
+ async request(method, endpoint, body) {
54
+ const url = `${this.baseUrl}${endpoint}`;
55
+ const controller = new AbortController();
56
+ const timeoutId = setTimeout(() => controller.abort(), this.timeout);
57
+ this.log(`${method} ${url}`, body);
58
+ try {
59
+ const response = await fetch(url, {
60
+ method,
61
+ headers: {
62
+ "Authorization": `Bearer ${this.apiKey}`,
63
+ "Content-Type": "application/json",
64
+ "User-Agent": "@safekeylab/sdk/1.0.0"
65
+ },
66
+ body: body ? JSON.stringify(body) : void 0,
67
+ signal: controller.signal
68
+ });
69
+ clearTimeout(timeoutId);
70
+ const data = await response.json();
71
+ if (!response.ok) {
72
+ throw new SafeKeyLabError(
73
+ data.error || data.message || "Request failed",
74
+ data.code || "API_ERROR",
75
+ response.status
76
+ );
77
+ }
78
+ this.log("Response:", data);
79
+ return data;
80
+ } catch (error) {
81
+ clearTimeout(timeoutId);
82
+ if (error instanceof SafeKeyLabError) {
83
+ throw error;
84
+ }
85
+ if (error instanceof Error) {
86
+ if (error.name === "AbortError") {
87
+ throw new SafeKeyLabError("Request timeout", "TIMEOUT");
88
+ }
89
+ throw new SafeKeyLabError(error.message, "NETWORK_ERROR");
90
+ }
91
+ throw new SafeKeyLabError("Unknown error", "UNKNOWN_ERROR");
92
+ }
93
+ }
94
+ /**
95
+ * Detect PII in text
96
+ */
97
+ async detect(request) {
98
+ return this.request("POST", "/v1/detect", request);
99
+ }
100
+ /**
101
+ * Detect PII in text (convenience method)
102
+ */
103
+ async detectPII(text, options) {
104
+ return this.detect({ text, ...options });
105
+ }
106
+ /**
107
+ * Redact/protect PII in text
108
+ */
109
+ async protect(request) {
110
+ return this.request("POST", "/v1/protect", request);
111
+ }
112
+ /**
113
+ * Redact PII from text (convenience method)
114
+ */
115
+ async redact(text, options) {
116
+ const response = await this.protect({ text, ...options });
117
+ return response.redacted_text;
118
+ }
119
+ /**
120
+ * Validate a prompt for security threats
121
+ */
122
+ async validatePrompt(request) {
123
+ return this.request("POST", "/v1/validate-prompt", request);
124
+ }
125
+ /**
126
+ * Check if a prompt is safe (convenience method)
127
+ */
128
+ async isPromptSafe(prompt, context) {
129
+ const response = await this.validatePrompt({ prompt, context });
130
+ return response.is_safe;
131
+ }
132
+ /**
133
+ * Scan LLM output for issues
134
+ */
135
+ async scanOutput(request) {
136
+ return this.request("POST", "/v1/scan-output", request);
137
+ }
138
+ /**
139
+ * Full protection pipeline: validate input, redact PII, return protected text
140
+ */
141
+ async protectInput(text) {
142
+ const [detectResult, validateResult] = await Promise.all([
143
+ this.detect({ text }),
144
+ this.validatePrompt({ prompt: text })
145
+ ]);
146
+ let protectedText = text;
147
+ let wasModified = false;
148
+ if (detectResult.count > 0) {
149
+ const protectResult = await this.protect({ text });
150
+ protectedText = protectResult.redacted_text;
151
+ wasModified = true;
152
+ }
153
+ return {
154
+ text: protectedText,
155
+ wasModified,
156
+ detections: detectResult.detections,
157
+ threats: validateResult.threats
158
+ };
159
+ }
160
+ /**
161
+ * Create a sandbox client (no API key required, rate limited)
162
+ */
163
+ static sandbox(options) {
164
+ return new SafeKeyLabSandbox(options);
165
+ }
166
+ };
167
+ var SafeKeyLabSandbox = class {
168
+ constructor(config) {
169
+ this.baseUrl = config?.baseUrl || DEFAULT_BASE_URL;
170
+ this.timeout = config?.timeout || DEFAULT_TIMEOUT;
171
+ this.debug = config?.debug || false;
172
+ }
173
+ log(...args) {
174
+ if (this.debug) {
175
+ console.log("[SafeKeyLab:Sandbox]", ...args);
176
+ }
177
+ }
178
+ async request(method, endpoint, body) {
179
+ const url = `${this.baseUrl}${endpoint}`;
180
+ const controller = new AbortController();
181
+ const timeoutId = setTimeout(() => controller.abort(), this.timeout);
182
+ this.log(`${method} ${url}`, body);
183
+ try {
184
+ const response = await fetch(url, {
185
+ method,
186
+ headers: {
187
+ "Content-Type": "application/json",
188
+ "User-Agent": "@safekeylab/sdk/1.0.0"
189
+ },
190
+ body: body ? JSON.stringify(body) : void 0,
191
+ signal: controller.signal
192
+ });
193
+ clearTimeout(timeoutId);
194
+ const data = await response.json();
195
+ if (!response.ok) {
196
+ throw new SafeKeyLabError(
197
+ data.error || data.message || "Request failed",
198
+ data.code || "API_ERROR",
199
+ response.status
200
+ );
201
+ }
202
+ this.log("Response:", data);
203
+ return data;
204
+ } catch (error) {
205
+ clearTimeout(timeoutId);
206
+ if (error instanceof SafeKeyLabError) {
207
+ throw error;
208
+ }
209
+ if (error instanceof Error) {
210
+ if (error.name === "AbortError") {
211
+ throw new SafeKeyLabError("Request timeout", "TIMEOUT");
212
+ }
213
+ throw new SafeKeyLabError(error.message, "NETWORK_ERROR");
214
+ }
215
+ throw new SafeKeyLabError("Unknown error", "UNKNOWN_ERROR");
216
+ }
217
+ }
218
+ async detect(request) {
219
+ return this.request("POST", "/sandbox/v1/detect", request);
220
+ }
221
+ async protect(request) {
222
+ return this.request("POST", "/sandbox/v1/protect", request);
223
+ }
224
+ async validatePrompt(request) {
225
+ return this.request("POST", "/sandbox/v1/validate-prompt", request);
226
+ }
227
+ };
228
+
229
+ // src/integrations/vercel-ai.ts
230
+ function withSafeKeyLab(model, options) {
231
+ const safekeylab = new SafeKeyLab({
232
+ apiKey: options.apiKey,
233
+ baseUrl: options.baseUrl,
234
+ timeout: options.timeout,
235
+ debug: options.debug
236
+ });
237
+ const config = {
238
+ blockOnPII: options.blockOnPII ?? false,
239
+ blockOnThreat: options.blockOnThreat ?? true,
240
+ piiTypes: options.piiTypes,
241
+ scanOutputs: options.scanOutputs ?? true,
242
+ onError: options.onError,
243
+ onPIIDetected: options.onPIIDetected,
244
+ onThreatDetected: options.onThreatDetected
245
+ };
246
+ const wrappedModel = {
247
+ specificationVersion: model.specificationVersion,
248
+ provider: `safekeylab:${model.provider}`,
249
+ modelId: model.modelId,
250
+ defaultObjectGenerationMode: model.defaultObjectGenerationMode,
251
+ async doGenerate(generateOptions) {
252
+ const allDetections = [];
253
+ const allThreats = [];
254
+ const protectedPrompt = await processPrompt(
255
+ safekeylab,
256
+ config,
257
+ generateOptions.prompt,
258
+ allDetections,
259
+ allThreats
260
+ );
261
+ const result = await model.doGenerate({
262
+ ...generateOptions,
263
+ prompt: protectedPrompt
264
+ });
265
+ if (config.scanOutputs && result.text) {
266
+ const scanResult = await safekeylab.scanOutput({ output: result.text });
267
+ if (!scanResult.is_safe) {
268
+ result._safekeylab_output_issues = scanResult.issues;
269
+ }
270
+ }
271
+ result._safekeylab = {
272
+ pii_detected: allDetections,
273
+ threats_detected: allThreats,
274
+ inputs_modified: allDetections.length > 0
275
+ };
276
+ return result;
277
+ },
278
+ async doStream(streamOptions) {
279
+ if (!model.doStream) {
280
+ throw new Error("Model does not support streaming");
281
+ }
282
+ const allDetections = [];
283
+ const allThreats = [];
284
+ const protectedPrompt = await processPrompt(
285
+ safekeylab,
286
+ config,
287
+ streamOptions.prompt,
288
+ allDetections,
289
+ allThreats
290
+ );
291
+ return model.doStream({
292
+ ...streamOptions,
293
+ prompt: protectedPrompt
294
+ });
295
+ }
296
+ };
297
+ return wrappedModel;
298
+ }
299
+ async function processPrompt(client, config, prompt, allDetections, allThreats) {
300
+ const protectedPrompt = { ...prompt };
301
+ if (prompt.system) {
302
+ const [detectResult, validateResult] = await Promise.all([
303
+ client.detect({ text: prompt.system, types: config.piiTypes }),
304
+ client.validatePrompt({ prompt: prompt.system })
305
+ ]);
306
+ if (detectResult.detections.length > 0) {
307
+ allDetections.push(...detectResult.detections);
308
+ config.onPIIDetected?.(detectResult.detections);
309
+ if (config.blockOnPII) {
310
+ throw new PIIBlockedError(detectResult.detections);
311
+ }
312
+ const protectResult = await client.protect({ text: prompt.system });
313
+ protectedPrompt.system = protectResult.redacted_text;
314
+ }
315
+ if (validateResult.threats.length > 0) {
316
+ allThreats.push(...validateResult.threats);
317
+ config.onThreatDetected?.(validateResult.threats);
318
+ if (config.blockOnThreat) {
319
+ throw new ThreatBlockedError(validateResult.threats);
320
+ }
321
+ }
322
+ }
323
+ if (prompt.messages) {
324
+ protectedPrompt.messages = await Promise.all(
325
+ prompt.messages.map(async (message) => {
326
+ const content = extractContent(message.content);
327
+ if (!content) return message;
328
+ const [detectResult, validateResult] = await Promise.all([
329
+ client.detect({ text: content, types: config.piiTypes }),
330
+ client.validatePrompt({ prompt: content })
331
+ ]);
332
+ if (detectResult.detections.length > 0) {
333
+ allDetections.push(...detectResult.detections);
334
+ config.onPIIDetected?.(detectResult.detections);
335
+ if (config.blockOnPII) {
336
+ throw new PIIBlockedError(detectResult.detections);
337
+ }
338
+ }
339
+ if (validateResult.threats.length > 0) {
340
+ allThreats.push(...validateResult.threats);
341
+ config.onThreatDetected?.(validateResult.threats);
342
+ if (config.blockOnThreat) {
343
+ throw new ThreatBlockedError(validateResult.threats);
344
+ }
345
+ }
346
+ if (detectResult.detections.length > 0) {
347
+ const protectResult = await client.protect({ text: content });
348
+ return {
349
+ ...message,
350
+ content: protectResult.redacted_text
351
+ };
352
+ }
353
+ return message;
354
+ })
355
+ );
356
+ }
357
+ return protectedPrompt;
358
+ }
359
+ function extractContent(content) {
360
+ if (typeof content === "string") {
361
+ return content;
362
+ }
363
+ if (Array.isArray(content)) {
364
+ return content.filter((part) => part.type === "text" && part.text).map((part) => part.text).join("\n");
365
+ }
366
+ return null;
367
+ }
368
+ function createSafeKeyLabMiddleware(options) {
369
+ return (model) => withSafeKeyLab(model, options);
370
+ }
371
+ var vercel_ai_default = withSafeKeyLab;
372
+
373
+ exports.createSafeKeyLabMiddleware = createSafeKeyLabMiddleware;
374
+ exports.default = vercel_ai_default;
375
+ exports.withSafeKeyLab = withSafeKeyLab;
376
+ //# sourceMappingURL=vercel-ai.js.map
377
+ //# sourceMappingURL=vercel-ai.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../src/types.ts","../../src/client.ts","../../src/integrations/vercel-ai.ts"],"names":[],"mappings":";;;;;AAgIO,IAAM,eAAA,GAAN,cAA8B,KAAA,CAAM;AAAA,EACzC,WAAA,CACE,OAAA,EACO,IAAA,EACA,UAAA,EACP;AACA,IAAA,KAAA,CAAM,OAAO,CAAA;AAHN,IAAA,IAAA,CAAA,IAAA,GAAA,IAAA;AACA,IAAA,IAAA,CAAA,UAAA,GAAA,UAAA;AAGP,IAAA,IAAA,CAAK,IAAA,GAAO,iBAAA;AAAA,EACd;AACF,CAAA;AAEO,IAAM,eAAA,GAAN,cAA8B,eAAA,CAAgB;AAAA,EACnD,YACS,UAAA,EACP;AACA,IAAA,KAAA;AAAA,MACE,CAAA,+BAAA,EAAkC,WAAW,GAAA,CAAI,CAAA,CAAA,KAAK,EAAE,IAAI,CAAA,CAAE,IAAA,CAAK,IAAI,CAAC,CAAA,CAAA,CAAA;AAAA,MACxE;AAAA,KACF;AALO,IAAA,IAAA,CAAA,UAAA,GAAA,UAAA;AAMP,IAAA,IAAA,CAAK,IAAA,GAAO,iBAAA;AAAA,EACd;AACF,CAAA;AAEO,IAAM,kBAAA,GAAN,cAAiC,eAAA,CAAgB;AAAA,EACtD,YACS,OAAA,EACP;AACA,IAAA,KAAA;AAAA,MACE,CAAA,kCAAA,EAAqC,QAAQ,GAAA,CAAI,CAAA,CAAA,KAAK,EAAE,IAAI,CAAA,CAAE,IAAA,CAAK,IAAI,CAAC,CAAA,CAAA,CAAA;AAAA,MACxE;AAAA,KACF;AALO,IAAA,IAAA,CAAA,OAAA,GAAA,OAAA;AAMP,IAAA,IAAA,CAAK,IAAA,GAAO,oBAAA;AAAA,EACd;AACF,CAAA;;;AChJA,IAAM,gBAAA,GAAmB,4BAAA;AACzB,IAAM,eAAA,GAAkB,GAAA;AAEjB,IAAM,aAAN,MAAiB;AAAA,EAMtB,YAAY,MAAA,EAA0B;AACpC,IAAA,IAAI,CAAC,OAAO,MAAA,EAAQ;AAClB,MAAA,MAAM,IAAI,eAAA,CAAgB,qBAAA,EAAuB,iBAAiB,CAAA;AAAA,IACpE;AACA,IAAA,IAAA,CAAK,SAAS,MAAA,CAAO,MAAA;AACrB,IAAA,IAAA,CAAK,OAAA,GAAU,OAAO,OAAA,IAAW,gBAAA;AACjC,IAAA,IAAA,CAAK,OAAA,GAAU,OAAO,OAAA,IAAW,eAAA;AACjC,IAAA,IAAA,CAAK,KAAA,GAAQ,OAAO,KAAA,IAAS,KAAA;AAAA,EAC/B;AAAA,EAEQ,OAAO,IAAA,EAAuB;AACpC,IAAA,IAAI,KAAK,KAAA,EAAO;AACd,MAAA,OAAA,CAAQ,GAAA,CAAI,cAAA,EAAgB,GAAG,IAAI,CAAA;AAAA,IACrC;AAAA,EACF;AAAA,EAEA,MAAc,OAAA,CACZ,MAAA,EACA,QAAA,EACA,IAAA,EACY;AACZ,IAAA,MAAM,GAAA,GAAM,CAAA,EAAG,IAAA,CAAK,OAAO,GAAG,QAAQ,CAAA,CAAA;AACtC,IAAA,MAAM,UAAA,GAAa,IAAI,eAAA,EAAgB;AACvC,IAAA,MAAM,YAAY,UAAA,CAAW,MAAM,WAAW,KAAA,EAAM,EAAG,KAAK,OAAO,CAAA;AAEnE,IAAA,IAAA,CAAK,IAAI,CAAA,EAAG,MAAM,CAAA,CAAA,EAAI,GAAG,IAAI,IAAI,CAAA;AAEjC,IAAA,IAAI;AACF,MAAA,MAAM,QAAA,GAAW,MAAM,KAAA,CAAM,GAAA,EAAK;AAAA,QAChC,MAAA;AAAA,QACA,OAAA,EAAS;AAAA,UACP,eAAA,EAAiB,CAAA,OAAA,EAAU,IAAA,CAAK,MAAM,CAAA,CAAA;AAAA,UACtC,cAAA,EAAgB,kBAAA;AAAA,UAChB,YAAA,EAAc;AAAA,SAChB;AAAA,QACA,IAAA,EAAM,IAAA,GAAO,IAAA,CAAK,SAAA,CAAU,IAAI,CAAA,GAAI,KAAA,CAAA;AAAA,QACpC,QAAQ,UAAA,CAAW;AAAA,OACpB,CAAA;AAED,MAAA,YAAA,CAAa,SAAS,CAAA;AAEtB,MAAA,MAAM,IAAA,GAAO,MAAM,QAAA,CAAS,IAAA,EAAK;AAEjC,MAAA,IAAI,CAAC,SAAS,EAAA,EAAI;AAChB,QAAA,MAAM,IAAI,eAAA;AAAA,UACP,IAAA,CAAK,KAAA,IAAqB,IAAA,CAAK,OAAA,IAAsB,gBAAA;AAAA,UACrD,KAAK,IAAA,IAAmB,WAAA;AAAA,UACzB,QAAA,CAAS;AAAA,SACX;AAAA,MACF;AAEA,MAAA,IAAA,CAAK,GAAA,CAAI,aAAa,IAAI,CAAA;AAC1B,MAAA,OAAO,IAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,YAAA,CAAa,SAAS,CAAA;AACtB,MAAA,IAAI,iBAAiB,eAAA,EAAiB;AACpC,QAAA,MAAM,KAAA;AAAA,MACR;AACA,MAAA,IAAI,iBAAiB,KAAA,EAAO;AAC1B,QAAA,IAAI,KAAA,CAAM,SAAS,YAAA,EAAc;AAC/B,UAAA,MAAM,IAAI,eAAA,CAAgB,iBAAA,EAAmB,SAAS,CAAA;AAAA,QACxD;AACA,QAAA,MAAM,IAAI,eAAA,CAAgB,KAAA,CAAM,OAAA,EAAS,eAAe,CAAA;AAAA,MAC1D;AACA,MAAA,MAAM,IAAI,eAAA,CAAgB,eAAA,EAAiB,eAAe,CAAA;AAAA,IAC5D;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,OAAO,OAAA,EAAiD;AAC5D,IAAA,OAAO,IAAA,CAAK,OAAA,CAAwB,MAAA,EAAQ,YAAA,EAAc,OAAO,CAAA;AAAA,EACnE;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,SAAA,CAAU,IAAA,EAAc,OAAA,EAAgE;AAC5F,IAAA,OAAO,KAAK,MAAA,CAAO,EAAE,IAAA,EAAM,GAAG,SAAS,CAAA;AAAA,EACzC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,QAAQ,OAAA,EAAmD;AAC/D,IAAA,OAAO,IAAA,CAAK,OAAA,CAAyB,MAAA,EAAQ,aAAA,EAAe,OAAO,CAAA;AAAA,EACrE;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,MAAA,CAAO,IAAA,EAAc,OAAA,EAAyD;AAClF,IAAA,MAAM,QAAA,GAAW,MAAM,IAAA,CAAK,OAAA,CAAQ,EAAE,IAAA,EAAM,GAAG,SAAS,CAAA;AACxD,IAAA,OAAO,QAAA,CAAS,aAAA;AAAA,EAClB;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,eAAe,OAAA,EAAiE;AACpF,IAAA,OAAO,IAAA,CAAK,OAAA,CAAgC,MAAA,EAAQ,qBAAA,EAAuB,OAAO,CAAA;AAAA,EACpF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,YAAA,CAAa,MAAA,EAAgB,OAAA,EAAoC;AACrE,IAAA,MAAM,WAAW,MAAM,IAAA,CAAK,eAAe,EAAE,MAAA,EAAQ,SAAS,CAAA;AAC9D,IAAA,OAAO,QAAA,CAAS,OAAA;AAAA,EAClB;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,WAAW,OAAA,EAAyD;AACxE,IAAA,OAAO,IAAA,CAAK,OAAA,CAA4B,MAAA,EAAQ,iBAAA,EAAmB,OAAO,CAAA;AAAA,EAC5E;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,aAAa,IAAA,EAKhB;AAED,IAAA,MAAM,CAAC,YAAA,EAAc,cAAc,CAAA,GAAI,MAAM,QAAQ,GAAA,CAAI;AAAA,MACvD,IAAA,CAAK,MAAA,CAAO,EAAE,IAAA,EAAM,CAAA;AAAA,MACpB,IAAA,CAAK,cAAA,CAAe,EAAE,MAAA,EAAQ,MAAM;AAAA,KACrC,CAAA;AAED,IAAA,IAAI,aAAA,GAAgB,IAAA;AACpB,IAAA,IAAI,WAAA,GAAc,KAAA;AAGlB,IAAA,IAAI,YAAA,CAAa,QAAQ,CAAA,EAAG;AAC1B,MAAA,MAAM,gBAAgB,MAAM,IAAA,CAAK,OAAA,CAAQ,EAAE,MAAM,CAAA;AACjD,MAAA,aAAA,GAAgB,aAAA,CAAc,aAAA;AAC9B,MAAA,WAAA,GAAc,IAAA;AAAA,IAChB;AAEA,IAAA,OAAO;AAAA,MACL,IAAA,EAAM,aAAA;AAAA,MACN,WAAA;AAAA,MACA,YAAY,YAAA,CAAa,UAAA;AAAA,MACzB,SAAS,cAAA,CAAe;AAAA,KAC1B;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,OAAO,QAAQ,OAAA,EAA+D;AAC5E,IAAA,OAAO,IAAI,kBAAkB,OAAO,CAAA;AAAA,EACtC;AACF,CAAA;AAKO,IAAM,oBAAN,MAAwB;AAAA,EAK7B,YAAY,MAAA,EAA2C;AACrD,IAAA,IAAA,CAAK,OAAA,GAAU,QAAQ,OAAA,IAAW,gBAAA;AAClC,IAAA,IAAA,CAAK,OAAA,GAAU,QAAQ,OAAA,IAAW,eAAA;AAClC,IAAA,IAAA,CAAK,KAAA,GAAQ,QAAQ,KAAA,IAAS,KAAA;AAAA,EAChC;AAAA,EAEQ,OAAO,IAAA,EAAuB;AACpC,IAAA,IAAI,KAAK,KAAA,EAAO;AACd,MAAA,OAAA,CAAQ,GAAA,CAAI,sBAAA,EAAwB,GAAG,IAAI,CAAA;AAAA,IAC7C;AAAA,EACF;AAAA,EAEA,MAAc,OAAA,CACZ,MAAA,EACA,QAAA,EACA,IAAA,EACY;AACZ,IAAA,MAAM,GAAA,GAAM,CAAA,EAAG,IAAA,CAAK,OAAO,GAAG,QAAQ,CAAA,CAAA;AACtC,IAAA,MAAM,UAAA,GAAa,IAAI,eAAA,EAAgB;AACvC,IAAA,MAAM,YAAY,UAAA,CAAW,MAAM,WAAW,KAAA,EAAM,EAAG,KAAK,OAAO,CAAA;AAEnE,IAAA,IAAA,CAAK,IAAI,CAAA,EAAG,MAAM,CAAA,CAAA,EAAI,GAAG,IAAI,IAAI,CAAA;AAEjC,IAAA,IAAI;AACF,MAAA,MAAM,QAAA,GAAW,MAAM,KAAA,CAAM,GAAA,EAAK;AAAA,QAChC,MAAA;AAAA,QACA,OAAA,EAAS;AAAA,UACP,cAAA,EAAgB,kBAAA;AAAA,UAChB,YAAA,EAAc;AAAA,SAChB;AAAA,QACA,IAAA,EAAM,IAAA,GAAO,IAAA,CAAK,SAAA,CAAU,IAAI,CAAA,GAAI,KAAA,CAAA;AAAA,QACpC,QAAQ,UAAA,CAAW;AAAA,OACpB,CAAA;AAED,MAAA,YAAA,CAAa,SAAS,CAAA;AACtB,MAAA,MAAM,IAAA,GAAO,MAAM,QAAA,CAAS,IAAA,EAAK;AAEjC,MAAA,IAAI,CAAC,SAAS,EAAA,EAAI;AAChB,QAAA,MAAM,IAAI,eAAA;AAAA,UACP,IAAA,CAAK,KAAA,IAAqB,IAAA,CAAK,OAAA,IAAsB,gBAAA;AAAA,UACrD,KAAK,IAAA,IAAmB,WAAA;AAAA,UACzB,QAAA,CAAS;AAAA,SACX;AAAA,MACF;AAEA,MAAA,IAAA,CAAK,GAAA,CAAI,aAAa,IAAI,CAAA;AAC1B,MAAA,OAAO,IAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,YAAA,CAAa,SAAS,CAAA;AACtB,MAAA,IAAI,iBAAiB,eAAA,EAAiB;AACpC,QAAA,MAAM,KAAA;AAAA,MACR;AACA,MAAA,IAAI,iBAAiB,KAAA,EAAO;AAC1B,QAAA,IAAI,KAAA,CAAM,SAAS,YAAA,EAAc;AAC/B,UAAA,MAAM,IAAI,eAAA,CAAgB,iBAAA,EAAmB,SAAS,CAAA;AAAA,QACxD;AACA,QAAA,MAAM,IAAI,eAAA,CAAgB,KAAA,CAAM,OAAA,EAAS,eAAe,CAAA;AAAA,MAC1D;AACA,MAAA,MAAM,IAAI,eAAA,CAAgB,eAAA,EAAiB,eAAe,CAAA;AAAA,IAC5D;AAAA,EACF;AAAA,EAEA,MAAM,OAAO,OAAA,EAAiD;AAC5D,IAAA,OAAO,IAAA,CAAK,OAAA,CAAwB,MAAA,EAAQ,oBAAA,EAAsB,OAAO,CAAA;AAAA,EAC3E;AAAA,EAEA,MAAM,QAAQ,OAAA,EAAmD;AAC/D,IAAA,OAAO,IAAA,CAAK,OAAA,CAAyB,MAAA,EAAQ,qBAAA,EAAuB,OAAO,CAAA;AAAA,EAC7E;AAAA,EAEA,MAAM,eAAe,OAAA,EAAiE;AACpF,IAAA,OAAO,IAAA,CAAK,OAAA,CAAgC,MAAA,EAAQ,6BAAA,EAA+B,OAAO,CAAA;AAAA,EAC5F;AACF,CAAA;;;AC9LO,SAAS,cAAA,CACd,OACA,OAAA,EACG;AACH,EAAA,MAAM,UAAA,GAAa,IAAI,UAAA,CAAW;AAAA,IAChC,QAAQ,OAAA,CAAQ,MAAA;AAAA,IAChB,SAAS,OAAA,CAAQ,OAAA;AAAA,IACjB,SAAS,OAAA,CAAQ,OAAA;AAAA,IACjB,OAAO,OAAA,CAAQ;AAAA,GAChB,CAAA;AAED,EAAA,MAAM,MAAA,GAAwB;AAAA,IAC5B,UAAA,EAAY,QAAQ,UAAA,IAAc,KAAA;AAAA,IAClC,aAAA,EAAe,QAAQ,aAAA,IAAiB,IAAA;AAAA,IACxC,UAAU,OAAA,CAAQ,QAAA;AAAA,IAClB,WAAA,EAAa,QAAQ,WAAA,IAAe,IAAA;AAAA,IACpC,SAAS,OAAA,CAAQ,OAAA;AAAA,IACjB,eAAe,OAAA,CAAQ,aAAA;AAAA,IACvB,kBAAkB,OAAA,CAAQ;AAAA,GAC5B;AAGA,EAAA,MAAM,YAAA,GAAgC;AAAA,IACpC,sBAAsB,KAAA,CAAM,oBAAA;AAAA,IAC5B,QAAA,EAAU,CAAA,WAAA,EAAc,KAAA,CAAM,QAAQ,CAAA,CAAA;AAAA,IACtC,SAAS,KAAA,CAAM,OAAA;AAAA,IACf,6BAA6B,KAAA,CAAM,2BAAA;AAAA,IAEnC,MAAM,WAAW,eAAA,EAA+D;AAC9E,MAAA,MAAM,gBAAgC,EAAC;AACvC,MAAA,MAAM,aAAuB,EAAC;AAG9B,MAAA,MAAM,kBAAkB,MAAM,aAAA;AAAA,QAC5B,UAAA;AAAA,QACA,MAAA;AAAA,QACA,eAAA,CAAgB,MAAA;AAAA,QAChB,aAAA;AAAA,QACA;AAAA,OACF;AAGA,MAAA,MAAM,MAAA,GAAS,MAAM,KAAA,CAAM,UAAA,CAAW;AAAA,QACpC,GAAG,eAAA;AAAA,QACH,MAAA,EAAQ;AAAA,OACT,CAAA;AAGD,MAAA,IAAI,MAAA,CAAO,WAAA,IAAe,MAAA,CAAO,IAAA,EAAM;AACrC,QAAA,MAAM,UAAA,GAAa,MAAM,UAAA,CAAW,UAAA,CAAW,EAAE,MAAA,EAAQ,MAAA,CAAO,MAAM,CAAA;AACtE,QAAA,IAAI,CAAC,WAAW,OAAA,EAAS;AACvB,UAAC,MAAA,CAAmC,4BAA4B,UAAA,CAAW,MAAA;AAAA,QAC7E;AAAA,MACF;AAGA,MAAC,OAAmC,WAAA,GAAc;AAAA,QAChD,YAAA,EAAc,aAAA;AAAA,QACd,gBAAA,EAAkB,UAAA;AAAA,QAClB,eAAA,EAAiB,cAAc,MAAA,GAAS;AAAA,OAC1C;AAEA,MAAA,OAAO,MAAA;AAAA,IACT,CAAA;AAAA,IAEA,MAAM,SAAS,aAAA,EAA2D;AACxE,MAAA,IAAI,CAAC,MAAM,QAAA,EAAU;AACnB,QAAA,MAAM,IAAI,MAAM,kCAAkC,CAAA;AAAA,MACpD;AAEA,MAAA,MAAM,gBAAgC,EAAC;AACvC,MAAA,MAAM,aAAuB,EAAC;AAG9B,MAAA,MAAM,kBAAkB,MAAM,aAAA;AAAA,QAC5B,UAAA;AAAA,QACA,MAAA;AAAA,QACA,aAAA,CAAc,MAAA;AAAA,QACd,aAAA;AAAA,QACA;AAAA,OACF;AAGA,MAAA,OAAO,MAAM,QAAA,CAAS;AAAA,QACpB,GAAG,aAAA;AAAA,QACH,MAAA,EAAQ;AAAA,OACT,CAAA;AAAA,IACH;AAAA,GACF;AAEA,EAAA,OAAO,YAAA;AACT;AAKA,eAAe,aAAA,CACb,MAAA,EACA,MAAA,EACA,MAAA,EACA,eACA,UAAA,EAC8B;AAC9B,EAAA,MAAM,eAAA,GAAuC,EAAE,GAAG,MAAA,EAAO;AAGzD,EAAA,IAAI,OAAO,MAAA,EAAQ;AACjB,IAAA,MAAM,CAAC,YAAA,EAAc,cAAc,CAAA,GAAI,MAAM,QAAQ,GAAA,CAAI;AAAA,MACvD,MAAA,CAAO,OAAO,EAAE,IAAA,EAAM,OAAO,MAAA,EAAQ,KAAA,EAAO,MAAA,CAAO,QAAA,EAAU,CAAA;AAAA,MAC7D,OAAO,cAAA,CAAe,EAAE,MAAA,EAAQ,MAAA,CAAO,QAAQ;AAAA,KAChD,CAAA;AAED,IAAA,IAAI,YAAA,CAAa,UAAA,CAAW,MAAA,GAAS,CAAA,EAAG;AACtC,MAAA,aAAA,CAAc,IAAA,CAAK,GAAG,YAAA,CAAa,UAAU,CAAA;AAC7C,MAAA,MAAA,CAAO,aAAA,GAAgB,aAAa,UAAU,CAAA;AAE9C,MAAA,IAAI,OAAO,UAAA,EAAY;AACrB,QAAA,MAAM,IAAI,eAAA,CAAgB,YAAA,CAAa,UAAU,CAAA;AAAA,MACnD;AAEA,MAAA,MAAM,aAAA,GAAgB,MAAM,MAAA,CAAO,OAAA,CAAQ,EAAE,IAAA,EAAM,MAAA,CAAO,QAAQ,CAAA;AAClE,MAAA,eAAA,CAAgB,SAAS,aAAA,CAAc,aAAA;AAAA,IACzC;AAEA,IAAA,IAAI,cAAA,CAAe,OAAA,CAAQ,MAAA,GAAS,CAAA,EAAG;AACrC,MAAA,UAAA,CAAW,IAAA,CAAK,GAAG,cAAA,CAAe,OAAO,CAAA;AACzC,MAAA,MAAA,CAAO,gBAAA,GAAmB,eAAe,OAAO,CAAA;AAEhD,MAAA,IAAI,OAAO,aAAA,EAAe;AACxB,QAAA,MAAM,IAAI,kBAAA,CAAmB,cAAA,CAAe,OAAO,CAAA;AAAA,MACrD;AAAA,IACF;AAAA,EACF;AAGA,EAAA,IAAI,OAAO,QAAA,EAAU;AACnB,IAAA,eAAA,CAAgB,QAAA,GAAW,MAAM,OAAA,CAAQ,GAAA;AAAA,MACvC,MAAA,CAAO,QAAA,CAAS,GAAA,CAAI,OAAO,OAAA,KAAY;AACrC,QAAA,MAAM,OAAA,GAAU,cAAA,CAAe,OAAA,CAAQ,OAAO,CAAA;AAC9C,QAAA,IAAI,CAAC,SAAS,OAAO,OAAA;AAErB,QAAA,MAAM,CAAC,YAAA,EAAc,cAAc,CAAA,GAAI,MAAM,QAAQ,GAAA,CAAI;AAAA,UACvD,MAAA,CAAO,OAAO,EAAE,IAAA,EAAM,SAAS,KAAA,EAAO,MAAA,CAAO,UAAU,CAAA;AAAA,UACvD,MAAA,CAAO,cAAA,CAAe,EAAE,MAAA,EAAQ,SAAS;AAAA,SAC1C,CAAA;AAED,QAAA,IAAI,YAAA,CAAa,UAAA,CAAW,MAAA,GAAS,CAAA,EAAG;AACtC,UAAA,aAAA,CAAc,IAAA,CAAK,GAAG,YAAA,CAAa,UAAU,CAAA;AAC7C,UAAA,MAAA,CAAO,aAAA,GAAgB,aAAa,UAAU,CAAA;AAE9C,UAAA,IAAI,OAAO,UAAA,EAAY;AACrB,YAAA,MAAM,IAAI,eAAA,CAAgB,YAAA,CAAa,UAAU,CAAA;AAAA,UACnD;AAAA,QACF;AAEA,QAAA,IAAI,cAAA,CAAe,OAAA,CAAQ,MAAA,GAAS,CAAA,EAAG;AACrC,UAAA,UAAA,CAAW,IAAA,CAAK,GAAG,cAAA,CAAe,OAAO,CAAA;AACzC,UAAA,MAAA,CAAO,gBAAA,GAAmB,eAAe,OAAO,CAAA;AAEhD,UAAA,IAAI,OAAO,aAAA,EAAe;AACxB,YAAA,MAAM,IAAI,kBAAA,CAAmB,cAAA,CAAe,OAAO,CAAA;AAAA,UACrD;AAAA,QACF;AAEA,QAAA,IAAI,YAAA,CAAa,UAAA,CAAW,MAAA,GAAS,CAAA,EAAG;AACtC,UAAA,MAAM,gBAAgB,MAAM,MAAA,CAAO,QAAQ,EAAE,IAAA,EAAM,SAAS,CAAA;AAC5D,UAAA,OAAO;AAAA,YACL,GAAG,OAAA;AAAA,YACH,SAAS,aAAA,CAAc;AAAA,WACzB;AAAA,QACF;AAEA,QAAA,OAAO,OAAA;AAAA,MACT,CAAC;AAAA,KACH;AAAA,EACF;AAEA,EAAA,OAAO,eAAA;AACT;AAKA,SAAS,eACP,OAAA,EACe;AACf,EAAA,IAAI,OAAO,YAAY,QAAA,EAAU;AAC/B,IAAA,OAAO,OAAA;AAAA,EACT;AACA,EAAA,IAAI,KAAA,CAAM,OAAA,CAAQ,OAAO,CAAA,EAAG;AAC1B,IAAA,OAAO,QACJ,MAAA,CAAO,CAAC,IAAA,KAAS,IAAA,CAAK,SAAS,MAAA,IAAU,IAAA,CAAK,IAAI,CAAA,CAClD,IAAI,CAAC,IAAA,KAAS,KAAK,IAAI,CAAA,CACvB,KAAK,IAAI,CAAA;AAAA,EACd;AACA,EAAA,OAAO,IAAA;AACT;AAKO,SAAS,2BAA2B,OAAA,EAAiC;AAC1E,EAAA,OAAO,CAA4B,KAAA,KAAgB,cAAA,CAAe,KAAA,EAAO,OAAO,CAAA;AAClF;AAEA,IAAO,iBAAA,GAAQ","file":"vercel-ai.js","sourcesContent":["/**\n * SafeKeyLab SDK Types\n */\n\nexport interface SafeKeyLabConfig {\n /** API key for authentication */\n apiKey: string;\n /** Base URL for the API (default: https://api.safekeylab.com) */\n baseUrl?: string;\n /** Request timeout in milliseconds (default: 30000) */\n timeout?: number;\n /** Enable debug logging (default: false) */\n debug?: boolean;\n}\n\nexport interface PIIDetection {\n /** Type of PII detected (EMAIL, PHONE, SSN, etc.) */\n type: string;\n /** The detected value */\n value: string;\n /** Start position in text */\n start: number;\n /** End position in text */\n end: number;\n /** Confidence score (0-1) */\n confidence: number;\n}\n\nexport interface DetectRequest {\n /** Text to scan for PII */\n text: string;\n /** Types of PII to detect (default: all) */\n types?: string[];\n /** Minimum confidence threshold (default: 0.5) */\n minConfidence?: number;\n}\n\nexport interface DetectResponse {\n success: boolean;\n detections: PIIDetection[];\n count: number;\n processing_time_ms: number;\n}\n\nexport interface ProtectRequest {\n /** Text to redact PII from */\n text: string;\n /** Types of PII to redact (default: all) */\n types?: string[];\n /** Redaction style: 'placeholder' | 'mask' | 'hash' (default: placeholder) */\n style?: 'placeholder' | 'mask' | 'hash';\n}\n\nexport interface Redaction {\n type: string;\n original: string;\n start: number;\n end: number;\n}\n\nexport interface ProtectResponse {\n success: boolean;\n redacted_text: string;\n redactions: Redaction[];\n redactions_count: number;\n original_length: number;\n redacted_length: number;\n processing_time_ms: number;\n}\n\nexport interface ValidatePromptRequest {\n /** Prompt to validate */\n prompt: string;\n /** Additional context for validation */\n context?: string;\n}\n\nexport interface Threat {\n type: string;\n severity: 'low' | 'medium' | 'high' | 'critical';\n description: string;\n matched?: string;\n}\n\nexport interface ValidatePromptResponse {\n success: boolean;\n is_safe: boolean;\n threats: Threat[];\n threats_detected: number;\n recommendation: 'allow' | 'review' | 'block';\n processing_time_ms: number;\n}\n\nexport interface ScanOutputRequest {\n /** LLM output to scan */\n output: string;\n /** Original prompt for context */\n prompt?: string;\n}\n\nexport interface ScanOutputResponse {\n success: boolean;\n is_safe: boolean;\n issues: Array<{\n type: string;\n severity: string;\n description: string;\n }>;\n processing_time_ms: number;\n}\n\nexport interface WrapperConfig {\n /** Block requests containing PII (default: false, will redact instead) */\n blockOnPII?: boolean;\n /** Block requests with detected threats (default: true) */\n blockOnThreat?: boolean;\n /** Types of PII to detect/redact */\n piiTypes?: string[];\n /** Scan LLM outputs for issues (default: true) */\n scanOutputs?: boolean;\n /** Custom error handler */\n onError?: (error: Error) => void;\n /** Callback when PII is detected */\n onPIIDetected?: (detections: PIIDetection[]) => void;\n /** Callback when threat is detected */\n onThreatDetected?: (threats: Threat[]) => void;\n}\n\nexport class SafeKeyLabError extends Error {\n constructor(\n message: string,\n public code: string,\n public statusCode?: number\n ) {\n super(message);\n this.name = 'SafeKeyLabError';\n }\n}\n\nexport class PIIBlockedError extends SafeKeyLabError {\n constructor(\n public detections: PIIDetection[]\n ) {\n super(\n `Request blocked: PII detected (${detections.map(d => d.type).join(', ')})`,\n 'PII_BLOCKED'\n );\n this.name = 'PIIBlockedError';\n }\n}\n\nexport class ThreatBlockedError extends SafeKeyLabError {\n constructor(\n public threats: Threat[]\n ) {\n super(\n `Request blocked: Threat detected (${threats.map(t => t.type).join(', ')})`,\n 'THREAT_BLOCKED'\n );\n this.name = 'ThreatBlockedError';\n }\n}\n","/**\n * SafeKeyLab API Client\n */\n\nimport {\n SafeKeyLabConfig,\n DetectRequest,\n DetectResponse,\n ProtectRequest,\n ProtectResponse,\n ValidatePromptRequest,\n ValidatePromptResponse,\n ScanOutputRequest,\n ScanOutputResponse,\n SafeKeyLabError,\n} from './types';\n\nconst DEFAULT_BASE_URL = 'https://api.safekeylab.com';\nconst DEFAULT_TIMEOUT = 30000;\n\nexport class SafeKeyLab {\n private apiKey: string;\n private baseUrl: string;\n private timeout: number;\n private debug: boolean;\n\n constructor(config: SafeKeyLabConfig) {\n if (!config.apiKey) {\n throw new SafeKeyLabError('API key is required', 'MISSING_API_KEY');\n }\n this.apiKey = config.apiKey;\n this.baseUrl = config.baseUrl || DEFAULT_BASE_URL;\n this.timeout = config.timeout || DEFAULT_TIMEOUT;\n this.debug = config.debug || false;\n }\n\n private log(...args: unknown[]): void {\n if (this.debug) {\n console.log('[SafeKeyLab]', ...args);\n }\n }\n\n private async request<T>(\n method: string,\n endpoint: string,\n body?: unknown\n ): Promise<T> {\n const url = `${this.baseUrl}${endpoint}`;\n const controller = new AbortController();\n const timeoutId = setTimeout(() => controller.abort(), this.timeout);\n\n this.log(`${method} ${url}`, body);\n\n try {\n const response = await fetch(url, {\n method,\n headers: {\n 'Authorization': `Bearer ${this.apiKey}`,\n 'Content-Type': 'application/json',\n 'User-Agent': '@safekeylab/sdk/1.0.0',\n },\n body: body ? JSON.stringify(body) : undefined,\n signal: controller.signal,\n });\n\n clearTimeout(timeoutId);\n\n const data = await response.json() as Record<string, unknown>;\n\n if (!response.ok) {\n throw new SafeKeyLabError(\n (data.error as string) || (data.message as string) || 'Request failed',\n (data.code as string) || 'API_ERROR',\n response.status\n );\n }\n\n this.log('Response:', data);\n return data as T;\n } catch (error) {\n clearTimeout(timeoutId);\n if (error instanceof SafeKeyLabError) {\n throw error;\n }\n if (error instanceof Error) {\n if (error.name === 'AbortError') {\n throw new SafeKeyLabError('Request timeout', 'TIMEOUT');\n }\n throw new SafeKeyLabError(error.message, 'NETWORK_ERROR');\n }\n throw new SafeKeyLabError('Unknown error', 'UNKNOWN_ERROR');\n }\n }\n\n /**\n * Detect PII in text\n */\n async detect(request: DetectRequest): Promise<DetectResponse> {\n return this.request<DetectResponse>('POST', '/v1/detect', request);\n }\n\n /**\n * Detect PII in text (convenience method)\n */\n async detectPII(text: string, options?: Omit<DetectRequest, 'text'>): Promise<DetectResponse> {\n return this.detect({ text, ...options });\n }\n\n /**\n * Redact/protect PII in text\n */\n async protect(request: ProtectRequest): Promise<ProtectResponse> {\n return this.request<ProtectResponse>('POST', '/v1/protect', request);\n }\n\n /**\n * Redact PII from text (convenience method)\n */\n async redact(text: string, options?: Omit<ProtectRequest, 'text'>): Promise<string> {\n const response = await this.protect({ text, ...options });\n return response.redacted_text;\n }\n\n /**\n * Validate a prompt for security threats\n */\n async validatePrompt(request: ValidatePromptRequest): Promise<ValidatePromptResponse> {\n return this.request<ValidatePromptResponse>('POST', '/v1/validate-prompt', request);\n }\n\n /**\n * Check if a prompt is safe (convenience method)\n */\n async isPromptSafe(prompt: string, context?: string): Promise<boolean> {\n const response = await this.validatePrompt({ prompt, context });\n return response.is_safe;\n }\n\n /**\n * Scan LLM output for issues\n */\n async scanOutput(request: ScanOutputRequest): Promise<ScanOutputResponse> {\n return this.request<ScanOutputResponse>('POST', '/v1/scan-output', request);\n }\n\n /**\n * Full protection pipeline: validate input, redact PII, return protected text\n */\n async protectInput(text: string): Promise<{\n text: string;\n wasModified: boolean;\n detections: DetectResponse['detections'];\n threats: ValidatePromptResponse['threats'];\n }> {\n // Run detection and validation in parallel\n const [detectResult, validateResult] = await Promise.all([\n this.detect({ text }),\n this.validatePrompt({ prompt: text }),\n ]);\n\n let protectedText = text;\n let wasModified = false;\n\n // Redact if PII found\n if (detectResult.count > 0) {\n const protectResult = await this.protect({ text });\n protectedText = protectResult.redacted_text;\n wasModified = true;\n }\n\n return {\n text: protectedText,\n wasModified,\n detections: detectResult.detections,\n threats: validateResult.threats,\n };\n }\n\n /**\n * Create a sandbox client (no API key required, rate limited)\n */\n static sandbox(options?: Omit<SafeKeyLabConfig, 'apiKey'>): SafeKeyLabSandbox {\n return new SafeKeyLabSandbox(options);\n }\n}\n\n/**\n * Sandbox client for testing (no API key required)\n */\nexport class SafeKeyLabSandbox {\n private baseUrl: string;\n private timeout: number;\n private debug: boolean;\n\n constructor(config?: Omit<SafeKeyLabConfig, 'apiKey'>) {\n this.baseUrl = config?.baseUrl || DEFAULT_BASE_URL;\n this.timeout = config?.timeout || DEFAULT_TIMEOUT;\n this.debug = config?.debug || false;\n }\n\n private log(...args: unknown[]): void {\n if (this.debug) {\n console.log('[SafeKeyLab:Sandbox]', ...args);\n }\n }\n\n private async request<T>(\n method: string,\n endpoint: string,\n body?: unknown\n ): Promise<T> {\n const url = `${this.baseUrl}${endpoint}`;\n const controller = new AbortController();\n const timeoutId = setTimeout(() => controller.abort(), this.timeout);\n\n this.log(`${method} ${url}`, body);\n\n try {\n const response = await fetch(url, {\n method,\n headers: {\n 'Content-Type': 'application/json',\n 'User-Agent': '@safekeylab/sdk/1.0.0',\n },\n body: body ? JSON.stringify(body) : undefined,\n signal: controller.signal,\n });\n\n clearTimeout(timeoutId);\n const data = await response.json() as Record<string, unknown>;\n\n if (!response.ok) {\n throw new SafeKeyLabError(\n (data.error as string) || (data.message as string) || 'Request failed',\n (data.code as string) || 'API_ERROR',\n response.status\n );\n }\n\n this.log('Response:', data);\n return data as T;\n } catch (error) {\n clearTimeout(timeoutId);\n if (error instanceof SafeKeyLabError) {\n throw error;\n }\n if (error instanceof Error) {\n if (error.name === 'AbortError') {\n throw new SafeKeyLabError('Request timeout', 'TIMEOUT');\n }\n throw new SafeKeyLabError(error.message, 'NETWORK_ERROR');\n }\n throw new SafeKeyLabError('Unknown error', 'UNKNOWN_ERROR');\n }\n }\n\n async detect(request: DetectRequest): Promise<DetectResponse> {\n return this.request<DetectResponse>('POST', '/sandbox/v1/detect', request);\n }\n\n async protect(request: ProtectRequest): Promise<ProtectResponse> {\n return this.request<ProtectResponse>('POST', '/sandbox/v1/protect', request);\n }\n\n async validatePrompt(request: ValidatePromptRequest): Promise<ValidatePromptResponse> {\n return this.request<ValidatePromptResponse>('POST', '/sandbox/v1/validate-prompt', request);\n }\n}\n\nexport default SafeKeyLab;\n","/**\n * SafeKeyLab Vercel AI SDK Integration\n *\n * Provides middleware and wrappers for the Vercel AI SDK\n *\n * @example\n * ```typescript\n * import { openai } from '@ai-sdk/openai';\n * import { generateText } from 'ai';\n * import { withSafeKeyLab } from '@safekeylab/sdk/vercel-ai';\n *\n * // Wrap the model with SafeKeyLab protection\n * const protectedModel = withSafeKeyLab(openai('gpt-4'), {\n * apiKey: 'sk_live_...',\n * });\n *\n * const { text } = await generateText({\n * model: protectedModel,\n * prompt: 'My email is john@example.com',\n * });\n * // Input is automatically protected\n * ```\n */\n\nimport { SafeKeyLab } from '../client';\nimport {\n SafeKeyLabConfig,\n WrapperConfig,\n PIIDetection,\n Threat,\n PIIBlockedError,\n ThreatBlockedError,\n} from '../types';\n\n// Minimal Vercel AI types\ninterface LanguageModelV1 {\n specificationVersion: 'v1';\n provider: string;\n modelId: string;\n defaultObjectGenerationMode?: 'json' | 'tool' | 'grammar';\n doGenerate(options: DoGenerateOptions): Promise<DoGenerateResult>;\n doStream?(options: DoGenerateOptions): Promise<DoStreamResult>;\n}\n\ninterface DoGenerateOptions {\n inputFormat: 'prompt' | 'messages';\n mode: { type: string; [key: string]: unknown };\n prompt: LanguageModelPrompt;\n [key: string]: unknown;\n}\n\ninterface LanguageModelPrompt {\n system?: string;\n messages?: Array<{\n role: 'user' | 'assistant' | 'system' | 'tool';\n content: string | Array<{ type: string; text?: string; [key: string]: unknown }>;\n }>;\n}\n\ninterface DoGenerateResult {\n text?: string;\n toolCalls?: unknown[];\n finishReason: string;\n usage: { promptTokens: number; completionTokens: number };\n [key: string]: unknown;\n}\n\ninterface DoStreamResult {\n stream: ReadableStream;\n [key: string]: unknown;\n}\n\nexport interface VercelAIWrapperOptions extends Partial<SafeKeyLabConfig>, WrapperConfig {}\n\n/**\n * Wrap a Vercel AI SDK model with SafeKeyLab protection\n */\nexport function withSafeKeyLab<T extends LanguageModelV1>(\n model: T,\n options: VercelAIWrapperOptions\n): T {\n const safekeylab = new SafeKeyLab({\n apiKey: options.apiKey!,\n baseUrl: options.baseUrl,\n timeout: options.timeout,\n debug: options.debug,\n });\n\n const config: WrapperConfig = {\n blockOnPII: options.blockOnPII ?? false,\n blockOnThreat: options.blockOnThreat ?? true,\n piiTypes: options.piiTypes,\n scanOutputs: options.scanOutputs ?? true,\n onError: options.onError,\n onPIIDetected: options.onPIIDetected,\n onThreatDetected: options.onThreatDetected,\n };\n\n // Create wrapped model\n const wrappedModel: LanguageModelV1 = {\n specificationVersion: model.specificationVersion,\n provider: `safekeylab:${model.provider}`,\n modelId: model.modelId,\n defaultObjectGenerationMode: model.defaultObjectGenerationMode,\n\n async doGenerate(generateOptions: DoGenerateOptions): Promise<DoGenerateResult> {\n const allDetections: PIIDetection[] = [];\n const allThreats: Threat[] = [];\n\n // Process the prompt\n const protectedPrompt = await processPrompt(\n safekeylab,\n config,\n generateOptions.prompt,\n allDetections,\n allThreats\n );\n\n // Call the original model with protected prompt\n const result = await model.doGenerate({\n ...generateOptions,\n prompt: protectedPrompt,\n });\n\n // Scan output if enabled\n if (config.scanOutputs && result.text) {\n const scanResult = await safekeylab.scanOutput({ output: result.text });\n if (!scanResult.is_safe) {\n (result as Record<string, unknown>)._safekeylab_output_issues = scanResult.issues;\n }\n }\n\n // Attach metadata\n (result as Record<string, unknown>)._safekeylab = {\n pii_detected: allDetections,\n threats_detected: allThreats,\n inputs_modified: allDetections.length > 0,\n };\n\n return result;\n },\n\n async doStream(streamOptions: DoGenerateOptions): Promise<DoStreamResult> {\n if (!model.doStream) {\n throw new Error('Model does not support streaming');\n }\n\n const allDetections: PIIDetection[] = [];\n const allThreats: Threat[] = [];\n\n // Process the prompt\n const protectedPrompt = await processPrompt(\n safekeylab,\n config,\n streamOptions.prompt,\n allDetections,\n allThreats\n );\n\n // Call the original model with protected prompt\n return model.doStream({\n ...streamOptions,\n prompt: protectedPrompt,\n });\n },\n };\n\n return wrappedModel as T;\n}\n\n/**\n * Process prompt and apply protections\n */\nasync function processPrompt(\n client: SafeKeyLab,\n config: WrapperConfig,\n prompt: LanguageModelPrompt,\n allDetections: PIIDetection[],\n allThreats: Threat[]\n): Promise<LanguageModelPrompt> {\n const protectedPrompt: LanguageModelPrompt = { ...prompt };\n\n // Process system prompt\n if (prompt.system) {\n const [detectResult, validateResult] = await Promise.all([\n client.detect({ text: prompt.system, types: config.piiTypes }),\n client.validatePrompt({ prompt: prompt.system }),\n ]);\n\n if (detectResult.detections.length > 0) {\n allDetections.push(...detectResult.detections);\n config.onPIIDetected?.(detectResult.detections);\n\n if (config.blockOnPII) {\n throw new PIIBlockedError(detectResult.detections);\n }\n\n const protectResult = await client.protect({ text: prompt.system });\n protectedPrompt.system = protectResult.redacted_text;\n }\n\n if (validateResult.threats.length > 0) {\n allThreats.push(...validateResult.threats);\n config.onThreatDetected?.(validateResult.threats);\n\n if (config.blockOnThreat) {\n throw new ThreatBlockedError(validateResult.threats);\n }\n }\n }\n\n // Process messages\n if (prompt.messages) {\n protectedPrompt.messages = await Promise.all(\n prompt.messages.map(async (message) => {\n const content = extractContent(message.content);\n if (!content) return message;\n\n const [detectResult, validateResult] = await Promise.all([\n client.detect({ text: content, types: config.piiTypes }),\n client.validatePrompt({ prompt: content }),\n ]);\n\n if (detectResult.detections.length > 0) {\n allDetections.push(...detectResult.detections);\n config.onPIIDetected?.(detectResult.detections);\n\n if (config.blockOnPII) {\n throw new PIIBlockedError(detectResult.detections);\n }\n }\n\n if (validateResult.threats.length > 0) {\n allThreats.push(...validateResult.threats);\n config.onThreatDetected?.(validateResult.threats);\n\n if (config.blockOnThreat) {\n throw new ThreatBlockedError(validateResult.threats);\n }\n }\n\n if (detectResult.detections.length > 0) {\n const protectResult = await client.protect({ text: content });\n return {\n ...message,\n content: protectResult.redacted_text,\n };\n }\n\n return message;\n })\n );\n }\n\n return protectedPrompt;\n}\n\n/**\n * Extract text content from message content\n */\nfunction extractContent(\n content: string | Array<{ type: string; text?: string; [key: string]: unknown }>\n): string | null {\n if (typeof content === 'string') {\n return content;\n }\n if (Array.isArray(content)) {\n return content\n .filter((part) => part.type === 'text' && part.text)\n .map((part) => part.text)\n .join('\\n');\n }\n return null;\n}\n\n/**\n * Create a middleware function for Vercel AI SDK\n */\nexport function createSafeKeyLabMiddleware(options: VercelAIWrapperOptions) {\n return <T extends LanguageModelV1>(model: T): T => withSafeKeyLab(model, options);\n}\n\nexport default withSafeKeyLab;\n"]}