@sanctuary-framework/mcp-server 0.5.4 → 0.5.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/cli.js CHANGED
@@ -48,7 +48,7 @@ function defaultConfig() {
48
48
  }
49
49
  },
50
50
  disclosure: {
51
- proof_system: "commitment-only",
51
+ proof_system: "schnorr-pedersen",
52
52
  default_policy: "minimum-necessary"
53
53
  },
54
54
  reputation: {
@@ -162,7 +162,7 @@ function validateConfig(config) {
162
162
  `Unimplemented config value: execution.environment = "${config.execution.environment}". Only ${[...implementedEnvironment].map((v) => `"${v}"`).join(", ")} are currently implemented. Using an unimplemented environment would silently degrade security.`
163
163
  );
164
164
  }
165
- const implementedProofSystem = /* @__PURE__ */ new Set(["commitment-only"]);
165
+ const implementedProofSystem = /* @__PURE__ */ new Set(["schnorr-pedersen", "commitment-only"]);
166
166
  if (!implementedProofSystem.has(config.disclosure.proof_system)) {
167
167
  errors.push(
168
168
  `Unimplemented config value: disclosure.proof_system = "${config.disclosure.proof_system}". Only ${[...implementedProofSystem].map((v) => `"${v}"`).join(", ")} is currently implemented. Using an unimplemented proof system would silently degrade security.`
@@ -7633,15 +7633,6 @@ function generateSHR(identityId, opts) {
7633
7633
  mitigation: "TEE attestation planned for a future release"
7634
7634
  });
7635
7635
  }
7636
- if (config.disclosure.proof_system === "commitment-only") {
7637
- degradations.push({
7638
- layer: "l3",
7639
- code: "COMMITMENT_ONLY",
7640
- severity: "info",
7641
- description: "Commitment schemes only (no ZK proofs)",
7642
- mitigation: "ZK proof support planned for future release"
7643
- });
7644
- }
7645
7636
  const body = {
7646
7637
  shr_version: "1.0",
7647
7638
  implementation: {
@@ -7667,9 +7658,9 @@ function generateSHR(identityId, opts) {
7667
7658
  attestation_available: config.execution.attestation
7668
7659
  },
7669
7660
  l3: {
7670
- status: config.disclosure.proof_system === "commitment-only" ? "degraded" : "active",
7661
+ status: "active",
7671
7662
  proof_system: config.disclosure.proof_system,
7672
- selective_disclosure: config.disclosure.proof_system !== "commitment-only"
7663
+ selective_disclosure: true
7673
7664
  },
7674
7665
  l4: {
7675
7666
  status: "active",
@@ -7882,7 +7873,7 @@ function extractAuthorizationSignals(body) {
7882
7873
  behavioral_baseline_active: false,
7883
7874
  // Would need explicit field in SHR v1.1
7884
7875
  identity_verified: l1.identity_type === "ed25519" || l1.identity_type !== "none",
7885
- zero_knowledge_capable: l3.status === "active" && l3.proof_system !== "commitment-only",
7876
+ zero_knowledge_capable: l3.status === "active",
7886
7877
  selective_disclosure_active: l3.selective_disclosure,
7887
7878
  reputation_portable: l4.reputation_portable,
7888
7879
  handshake_capable: body.capabilities.handshake
@@ -7960,14 +7951,6 @@ function generateAuthorizationConstraints(body, _degradations) {
7960
7951
  priority: "high"
7961
7952
  });
7962
7953
  }
7963
- if (layers.l3.proof_system === "commitment-only") {
7964
- constraints.push({
7965
- type: "restricted_scope",
7966
- description: "No zero-knowledge proofs available \u2014 entire state context may be visible",
7967
- rationale: "Proof system is commitment-only (no ZK)",
7968
- priority: "medium"
7969
- });
7970
- }
7971
7954
  if (layers.l4.status === "degraded") {
7972
7955
  constraints.push({
7973
7956
  type: "known_agents_only",
@@ -12056,11 +12039,6 @@ async function createSanctuaryServer(options) {
12056
12039
  degradations.push(
12057
12040
  "L2 isolation is process-level only; no TEE available"
12058
12041
  );
12059
- if (config.disclosure.proof_system === "commitment-only") {
12060
- degradations.push(
12061
- "L3 proofs are commitment-based only; ZK proofs not yet available"
12062
- );
12063
- }
12064
12042
  return toolResult({
12065
12043
  attestation: {
12066
12044
  environment_type: config.execution.environment,
@@ -12086,7 +12064,7 @@ async function createSanctuaryServer(options) {
12086
12064
  l1_state_encrypted: true,
12087
12065
  l2_execution_isolated: false,
12088
12066
  l2_isolation_type: "process-level",
12089
- l3_proofs_available: config.disclosure.proof_system !== "commitment-only",
12067
+ l3_proofs_available: true,
12090
12068
  l4_reputation_active: true,
12091
12069
  overall_level: "mvs",
12092
12070
  degradations
@@ -12109,14 +12087,6 @@ async function createSanctuaryServer(options) {
12109
12087
  severity: "warning",
12110
12088
  mitigation: "TEE support planned for a future release"
12111
12089
  });
12112
- if (config.disclosure.proof_system === "commitment-only") {
12113
- degradations.push({
12114
- layer: "l3",
12115
- description: "Commitment schemes only (no ZK proofs)",
12116
- severity: "info",
12117
- mitigation: "ZK proof support planned for v0.2.0"
12118
- });
12119
- }
12120
12090
  return toolResult({
12121
12091
  status: degradations.some((d) => d.severity === "critical") ? "compromised" : degradations.some((d) => d.severity === "warning") ? "degraded" : "healthy",
12122
12092
  storage_bytes: storageSizeBytes,
@@ -12135,7 +12105,7 @@ async function createSanctuaryServer(options) {
12135
12105
  last_attestation: (/* @__PURE__ */ new Date()).toISOString()
12136
12106
  },
12137
12107
  l3: {
12138
- status: config.disclosure.proof_system === "commitment-only" ? "degraded" : "active",
12108
+ status: "active",
12139
12109
  proof_system: config.disclosure.proof_system,
12140
12110
  circuits_loaded: 0,
12141
12111
  proofs_generated_total: 0