@sanctuary-framework/mcp-server 0.5.4 → 0.5.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/cli.cjs CHANGED
@@ -51,7 +51,7 @@ function defaultConfig() {
51
51
  }
52
52
  },
53
53
  disclosure: {
54
- proof_system: "commitment-only",
54
+ proof_system: "schnorr-pedersen",
55
55
  default_policy: "minimum-necessary"
56
56
  },
57
57
  reputation: {
@@ -165,7 +165,7 @@ function validateConfig(config) {
165
165
  `Unimplemented config value: execution.environment = "${config.execution.environment}". Only ${[...implementedEnvironment].map((v) => `"${v}"`).join(", ")} are currently implemented. Using an unimplemented environment would silently degrade security.`
166
166
  );
167
167
  }
168
- const implementedProofSystem = /* @__PURE__ */ new Set(["commitment-only"]);
168
+ const implementedProofSystem = /* @__PURE__ */ new Set(["schnorr-pedersen", "commitment-only"]);
169
169
  if (!implementedProofSystem.has(config.disclosure.proof_system)) {
170
170
  errors.push(
171
171
  `Unimplemented config value: disclosure.proof_system = "${config.disclosure.proof_system}". Only ${[...implementedProofSystem].map((v) => `"${v}"`).join(", ")} is currently implemented. Using an unimplemented proof system would silently degrade security.`
@@ -7636,15 +7636,6 @@ function generateSHR(identityId, opts) {
7636
7636
  mitigation: "TEE attestation planned for a future release"
7637
7637
  });
7638
7638
  }
7639
- if (config.disclosure.proof_system === "commitment-only") {
7640
- degradations.push({
7641
- layer: "l3",
7642
- code: "COMMITMENT_ONLY",
7643
- severity: "info",
7644
- description: "Commitment schemes only (no ZK proofs)",
7645
- mitigation: "ZK proof support planned for future release"
7646
- });
7647
- }
7648
7639
  const body = {
7649
7640
  shr_version: "1.0",
7650
7641
  implementation: {
@@ -7670,9 +7661,9 @@ function generateSHR(identityId, opts) {
7670
7661
  attestation_available: config.execution.attestation
7671
7662
  },
7672
7663
  l3: {
7673
- status: config.disclosure.proof_system === "commitment-only" ? "degraded" : "active",
7664
+ status: "active",
7674
7665
  proof_system: config.disclosure.proof_system,
7675
- selective_disclosure: config.disclosure.proof_system !== "commitment-only"
7666
+ selective_disclosure: true
7676
7667
  },
7677
7668
  l4: {
7678
7669
  status: "active",
@@ -7885,7 +7876,7 @@ function extractAuthorizationSignals(body) {
7885
7876
  behavioral_baseline_active: false,
7886
7877
  // Would need explicit field in SHR v1.1
7887
7878
  identity_verified: l1.identity_type === "ed25519" || l1.identity_type !== "none",
7888
- zero_knowledge_capable: l3.status === "active" && l3.proof_system !== "commitment-only",
7879
+ zero_knowledge_capable: l3.status === "active",
7889
7880
  selective_disclosure_active: l3.selective_disclosure,
7890
7881
  reputation_portable: l4.reputation_portable,
7891
7882
  handshake_capable: body.capabilities.handshake
@@ -7963,14 +7954,6 @@ function generateAuthorizationConstraints(body, _degradations) {
7963
7954
  priority: "high"
7964
7955
  });
7965
7956
  }
7966
- if (layers.l3.proof_system === "commitment-only") {
7967
- constraints.push({
7968
- type: "restricted_scope",
7969
- description: "No zero-knowledge proofs available \u2014 entire state context may be visible",
7970
- rationale: "Proof system is commitment-only (no ZK)",
7971
- priority: "medium"
7972
- });
7973
- }
7974
7957
  if (layers.l4.status === "degraded") {
7975
7958
  constraints.push({
7976
7959
  type: "known_agents_only",
@@ -12059,11 +12042,6 @@ async function createSanctuaryServer(options) {
12059
12042
  degradations.push(
12060
12043
  "L2 isolation is process-level only; no TEE available"
12061
12044
  );
12062
- if (config.disclosure.proof_system === "commitment-only") {
12063
- degradations.push(
12064
- "L3 proofs are commitment-based only; ZK proofs not yet available"
12065
- );
12066
- }
12067
12045
  return toolResult({
12068
12046
  attestation: {
12069
12047
  environment_type: config.execution.environment,
@@ -12089,7 +12067,7 @@ async function createSanctuaryServer(options) {
12089
12067
  l1_state_encrypted: true,
12090
12068
  l2_execution_isolated: false,
12091
12069
  l2_isolation_type: "process-level",
12092
- l3_proofs_available: config.disclosure.proof_system !== "commitment-only",
12070
+ l3_proofs_available: true,
12093
12071
  l4_reputation_active: true,
12094
12072
  overall_level: "mvs",
12095
12073
  degradations
@@ -12112,14 +12090,6 @@ async function createSanctuaryServer(options) {
12112
12090
  severity: "warning",
12113
12091
  mitigation: "TEE support planned for a future release"
12114
12092
  });
12115
- if (config.disclosure.proof_system === "commitment-only") {
12116
- degradations.push({
12117
- layer: "l3",
12118
- description: "Commitment schemes only (no ZK proofs)",
12119
- severity: "info",
12120
- mitigation: "ZK proof support planned for v0.2.0"
12121
- });
12122
- }
12123
12093
  return toolResult({
12124
12094
  status: degradations.some((d) => d.severity === "critical") ? "compromised" : degradations.some((d) => d.severity === "warning") ? "degraded" : "healthy",
12125
12095
  storage_bytes: storageSizeBytes,
@@ -12138,7 +12108,7 @@ async function createSanctuaryServer(options) {
12138
12108
  last_attestation: (/* @__PURE__ */ new Date()).toISOString()
12139
12109
  },
12140
12110
  l3: {
12141
- status: config.disclosure.proof_system === "commitment-only" ? "degraded" : "active",
12111
+ status: "active",
12142
12112
  proof_system: config.disclosure.proof_system,
12143
12113
  circuits_loaded: 0,
12144
12114
  proofs_generated_total: 0