@sparkleideas/security 3.0.0-alpha.10
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +234 -0
- package/__tests__/acceptance/security-compliance.test.ts +674 -0
- package/__tests__/credential-generator.test.ts +310 -0
- package/__tests__/fixtures/configurations.ts +419 -0
- package/__tests__/fixtures/index.ts +21 -0
- package/__tests__/helpers/create-mock.ts +469 -0
- package/__tests__/helpers/index.ts +32 -0
- package/__tests__/input-validator.test.ts +381 -0
- package/__tests__/integration/security-flow.test.ts +606 -0
- package/__tests__/password-hasher.test.ts +239 -0
- package/__tests__/path-validator.test.ts +302 -0
- package/__tests__/safe-executor.test.ts +292 -0
- package/__tests__/token-generator.test.ts +371 -0
- package/__tests__/unit/credential-generator.test.ts +182 -0
- package/__tests__/unit/password-hasher.test.ts +359 -0
- package/__tests__/unit/path-validator.test.ts +509 -0
- package/__tests__/unit/safe-executor.test.ts +667 -0
- package/__tests__/unit/token-generator.test.ts +310 -0
- package/package.json +28 -0
- package/src/CVE-REMEDIATION.ts +251 -0
- package/src/application/index.ts +10 -0
- package/src/application/services/security-application-service.ts +193 -0
- package/src/credential-generator.ts +368 -0
- package/src/domain/entities/security-context.ts +173 -0
- package/src/domain/index.ts +17 -0
- package/src/domain/services/security-domain-service.ts +296 -0
- package/src/index.ts +271 -0
- package/src/input-validator.ts +466 -0
- package/src/password-hasher.ts +270 -0
- package/src/path-validator.ts +525 -0
- package/src/safe-executor.ts +525 -0
- package/src/token-generator.ts +463 -0
- package/tmp.json +0 -0
- package/tsconfig.json +9 -0
|
@@ -0,0 +1,173 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Security Context Entity - Domain Layer
|
|
3
|
+
*
|
|
4
|
+
* Represents security context for operations with validation and policy enforcement.
|
|
5
|
+
*
|
|
6
|
+
* @module v3/security/domain/entities
|
|
7
|
+
*/
|
|
8
|
+
|
|
9
|
+
import { randomUUID } from 'crypto';
|
|
10
|
+
|
|
11
|
+
/**
|
|
12
|
+
* Permission levels
|
|
13
|
+
*/
|
|
14
|
+
export type PermissionLevel = 'read' | 'write' | 'execute' | 'admin';
|
|
15
|
+
|
|
16
|
+
/**
|
|
17
|
+
* Security context properties
|
|
18
|
+
*/
|
|
19
|
+
export interface SecurityContextProps {
|
|
20
|
+
id?: string;
|
|
21
|
+
principalId: string;
|
|
22
|
+
principalType: 'agent' | 'user' | 'system';
|
|
23
|
+
permissions: PermissionLevel[];
|
|
24
|
+
allowedPaths?: string[];
|
|
25
|
+
blockedPaths?: string[];
|
|
26
|
+
allowedCommands?: string[];
|
|
27
|
+
blockedCommands?: string[];
|
|
28
|
+
metadata?: Record<string, unknown>;
|
|
29
|
+
expiresAt?: Date;
|
|
30
|
+
createdAt?: Date;
|
|
31
|
+
}
|
|
32
|
+
|
|
33
|
+
/**
|
|
34
|
+
* Security Context - Entity
|
|
35
|
+
*/
|
|
36
|
+
export class SecurityContext {
|
|
37
|
+
private _id: string;
|
|
38
|
+
private _principalId: string;
|
|
39
|
+
private _principalType: 'agent' | 'user' | 'system';
|
|
40
|
+
private _permissions: Set<PermissionLevel>;
|
|
41
|
+
private _allowedPaths: Set<string>;
|
|
42
|
+
private _blockedPaths: Set<string>;
|
|
43
|
+
private _allowedCommands: Set<string>;
|
|
44
|
+
private _blockedCommands: Set<string>;
|
|
45
|
+
private _metadata: Record<string, unknown>;
|
|
46
|
+
private _expiresAt?: Date;
|
|
47
|
+
private _createdAt: Date;
|
|
48
|
+
|
|
49
|
+
private constructor(props: SecurityContextProps) {
|
|
50
|
+
this._id = props.id ?? randomUUID();
|
|
51
|
+
this._principalId = props.principalId;
|
|
52
|
+
this._principalType = props.principalType;
|
|
53
|
+
this._permissions = new Set(props.permissions);
|
|
54
|
+
this._allowedPaths = new Set(props.allowedPaths ?? []);
|
|
55
|
+
this._blockedPaths = new Set(props.blockedPaths ?? []);
|
|
56
|
+
this._allowedCommands = new Set(props.allowedCommands ?? []);
|
|
57
|
+
this._blockedCommands = new Set(props.blockedCommands ?? []);
|
|
58
|
+
this._metadata = props.metadata ?? {};
|
|
59
|
+
this._expiresAt = props.expiresAt;
|
|
60
|
+
this._createdAt = props.createdAt ?? new Date();
|
|
61
|
+
}
|
|
62
|
+
|
|
63
|
+
static create(props: SecurityContextProps): SecurityContext {
|
|
64
|
+
return new SecurityContext(props);
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
static fromPersistence(props: SecurityContextProps): SecurityContext {
|
|
68
|
+
return new SecurityContext(props);
|
|
69
|
+
}
|
|
70
|
+
|
|
71
|
+
get id(): string { return this._id; }
|
|
72
|
+
get principalId(): string { return this._principalId; }
|
|
73
|
+
get principalType(): string { return this._principalType; }
|
|
74
|
+
get permissions(): PermissionLevel[] { return Array.from(this._permissions); }
|
|
75
|
+
get allowedPaths(): string[] { return Array.from(this._allowedPaths); }
|
|
76
|
+
get blockedPaths(): string[] { return Array.from(this._blockedPaths); }
|
|
77
|
+
get allowedCommands(): string[] { return Array.from(this._allowedCommands); }
|
|
78
|
+
get blockedCommands(): string[] { return Array.from(this._blockedCommands); }
|
|
79
|
+
get metadata(): Record<string, unknown> { return { ...this._metadata }; }
|
|
80
|
+
get expiresAt(): Date | undefined { return this._expiresAt; }
|
|
81
|
+
get createdAt(): Date { return new Date(this._createdAt); }
|
|
82
|
+
|
|
83
|
+
// Business Logic
|
|
84
|
+
|
|
85
|
+
hasPermission(level: PermissionLevel): boolean {
|
|
86
|
+
return this._permissions.has(level) || this._permissions.has('admin');
|
|
87
|
+
}
|
|
88
|
+
|
|
89
|
+
isExpired(): boolean {
|
|
90
|
+
if (!this._expiresAt) return false;
|
|
91
|
+
return Date.now() > this._expiresAt.getTime();
|
|
92
|
+
}
|
|
93
|
+
|
|
94
|
+
canAccessPath(path: string): boolean {
|
|
95
|
+
if (this.isExpired()) return false;
|
|
96
|
+
|
|
97
|
+
// Check blocked paths first
|
|
98
|
+
for (const blocked of this._blockedPaths) {
|
|
99
|
+
if (path.startsWith(blocked) || this.matchGlob(path, blocked)) {
|
|
100
|
+
return false;
|
|
101
|
+
}
|
|
102
|
+
}
|
|
103
|
+
|
|
104
|
+
// If no allowed paths specified, allow all non-blocked
|
|
105
|
+
if (this._allowedPaths.size === 0) return true;
|
|
106
|
+
|
|
107
|
+
// Check allowed paths
|
|
108
|
+
for (const allowed of this._allowedPaths) {
|
|
109
|
+
if (path.startsWith(allowed) || this.matchGlob(path, allowed)) {
|
|
110
|
+
return true;
|
|
111
|
+
}
|
|
112
|
+
}
|
|
113
|
+
|
|
114
|
+
return false;
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
canExecuteCommand(command: string): boolean {
|
|
118
|
+
if (this.isExpired()) return false;
|
|
119
|
+
|
|
120
|
+
const cmdBase = command.split(' ')[0];
|
|
121
|
+
|
|
122
|
+
// Check blocked commands first
|
|
123
|
+
if (this._blockedCommands.has(cmdBase) || this._blockedCommands.has(command)) {
|
|
124
|
+
return false;
|
|
125
|
+
}
|
|
126
|
+
|
|
127
|
+
// If no allowed commands specified, allow all non-blocked
|
|
128
|
+
if (this._allowedCommands.size === 0) return true;
|
|
129
|
+
|
|
130
|
+
// Check allowed commands
|
|
131
|
+
return this._allowedCommands.has(cmdBase) || this._allowedCommands.has(command);
|
|
132
|
+
}
|
|
133
|
+
|
|
134
|
+
private matchGlob(path: string, pattern: string): boolean {
|
|
135
|
+
const regex = pattern
|
|
136
|
+
.replace(/\*\*/g, '.*')
|
|
137
|
+
.replace(/\*/g, '[^/]*')
|
|
138
|
+
.replace(/\?/g, '.');
|
|
139
|
+
return new RegExp(`^${regex}$`).test(path);
|
|
140
|
+
}
|
|
141
|
+
|
|
142
|
+
grantPermission(level: PermissionLevel): void {
|
|
143
|
+
this._permissions.add(level);
|
|
144
|
+
}
|
|
145
|
+
|
|
146
|
+
revokePermission(level: PermissionLevel): void {
|
|
147
|
+
this._permissions.delete(level);
|
|
148
|
+
}
|
|
149
|
+
|
|
150
|
+
addAllowedPath(path: string): void {
|
|
151
|
+
this._allowedPaths.add(path);
|
|
152
|
+
}
|
|
153
|
+
|
|
154
|
+
addBlockedPath(path: string): void {
|
|
155
|
+
this._blockedPaths.add(path);
|
|
156
|
+
}
|
|
157
|
+
|
|
158
|
+
toPersistence(): Record<string, unknown> {
|
|
159
|
+
return {
|
|
160
|
+
id: this._id,
|
|
161
|
+
principalId: this._principalId,
|
|
162
|
+
principalType: this._principalType,
|
|
163
|
+
permissions: Array.from(this._permissions),
|
|
164
|
+
allowedPaths: Array.from(this._allowedPaths),
|
|
165
|
+
blockedPaths: Array.from(this._blockedPaths),
|
|
166
|
+
allowedCommands: Array.from(this._allowedCommands),
|
|
167
|
+
blockedCommands: Array.from(this._blockedCommands),
|
|
168
|
+
metadata: this._metadata,
|
|
169
|
+
expiresAt: this._expiresAt?.toISOString(),
|
|
170
|
+
createdAt: this._createdAt.toISOString(),
|
|
171
|
+
};
|
|
172
|
+
}
|
|
173
|
+
}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Security Domain Layer - Public Exports
|
|
3
|
+
*
|
|
4
|
+
* @module v3/security/domain
|
|
5
|
+
*/
|
|
6
|
+
|
|
7
|
+
export {
|
|
8
|
+
SecurityContext,
|
|
9
|
+
type PermissionLevel,
|
|
10
|
+
type SecurityContextProps,
|
|
11
|
+
} from './entities/security-context.js';
|
|
12
|
+
|
|
13
|
+
export {
|
|
14
|
+
SecurityDomainService,
|
|
15
|
+
type ValidationResult,
|
|
16
|
+
type ThreatDetectionResult,
|
|
17
|
+
} from './services/security-domain-service.js';
|
|
@@ -0,0 +1,296 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Security Domain Service - Domain Layer
|
|
3
|
+
*
|
|
4
|
+
* Contains security logic for validation, policy enforcement, and threat detection.
|
|
5
|
+
*
|
|
6
|
+
* @module v3/security/domain/services
|
|
7
|
+
*/
|
|
8
|
+
|
|
9
|
+
import { SecurityContext, PermissionLevel } from '../entities/security-context.js';
|
|
10
|
+
|
|
11
|
+
/**
|
|
12
|
+
* Validation result
|
|
13
|
+
*/
|
|
14
|
+
export interface ValidationResult {
|
|
15
|
+
valid: boolean;
|
|
16
|
+
errors: string[];
|
|
17
|
+
warnings: string[];
|
|
18
|
+
sanitized?: string;
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
/**
|
|
22
|
+
* Threat detection result
|
|
23
|
+
*/
|
|
24
|
+
export interface ThreatDetectionResult {
|
|
25
|
+
safe: boolean;
|
|
26
|
+
threats: Array<{
|
|
27
|
+
type: string;
|
|
28
|
+
severity: 'low' | 'medium' | 'high' | 'critical';
|
|
29
|
+
description: string;
|
|
30
|
+
location?: string;
|
|
31
|
+
}>;
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
/**
|
|
35
|
+
* Security Domain Service
|
|
36
|
+
*/
|
|
37
|
+
export class SecurityDomainService {
|
|
38
|
+
// Dangerous patterns for path traversal
|
|
39
|
+
private static readonly PATH_TRAVERSAL_PATTERNS = [
|
|
40
|
+
/\.\./,
|
|
41
|
+
/~\//,
|
|
42
|
+
/^\/etc\//,
|
|
43
|
+
/^\/tmp\//,
|
|
44
|
+
/^\/var\/log\//,
|
|
45
|
+
/^C:\\Windows/i,
|
|
46
|
+
/^C:\\Users\\[^\\]+\\AppData/i,
|
|
47
|
+
];
|
|
48
|
+
|
|
49
|
+
// Dangerous command patterns
|
|
50
|
+
private static readonly DANGEROUS_COMMANDS = [
|
|
51
|
+
/^rm\s+-rf\s+\//,
|
|
52
|
+
/^rm\s+-rf\s+\*/,
|
|
53
|
+
/^dd\s+if=/,
|
|
54
|
+
/^mkfs\./,
|
|
55
|
+
/^format\s+/i,
|
|
56
|
+
/^del\s+\/s\s+\/q/i,
|
|
57
|
+
/>\s*\/dev\/sd[a-z]/,
|
|
58
|
+
/\|\s*bash$/,
|
|
59
|
+
/\|\s*sh$/,
|
|
60
|
+
/eval\s*\(/,
|
|
61
|
+
/exec\s*\(/,
|
|
62
|
+
];
|
|
63
|
+
|
|
64
|
+
// SQL injection patterns
|
|
65
|
+
private static readonly SQL_INJECTION_PATTERNS = [
|
|
66
|
+
/'\s*OR\s+'1'\s*=\s*'1/i,
|
|
67
|
+
/'\s*OR\s+1\s*=\s*1/i,
|
|
68
|
+
/;\s*DROP\s+TABLE/i,
|
|
69
|
+
/;\s*DELETE\s+FROM/i,
|
|
70
|
+
/UNION\s+SELECT/i,
|
|
71
|
+
/--\s*$/,
|
|
72
|
+
];
|
|
73
|
+
|
|
74
|
+
// XSS patterns
|
|
75
|
+
private static readonly XSS_PATTERNS = [
|
|
76
|
+
/<script[\s>]/i,
|
|
77
|
+
/javascript:/i,
|
|
78
|
+
/on\w+\s*=/i,
|
|
79
|
+
/<iframe/i,
|
|
80
|
+
/<object/i,
|
|
81
|
+
/<embed/i,
|
|
82
|
+
];
|
|
83
|
+
|
|
84
|
+
/**
|
|
85
|
+
* Validate a file path
|
|
86
|
+
*/
|
|
87
|
+
validatePath(path: string, context: SecurityContext): ValidationResult {
|
|
88
|
+
const errors: string[] = [];
|
|
89
|
+
const warnings: string[] = [];
|
|
90
|
+
|
|
91
|
+
// Check path traversal
|
|
92
|
+
for (const pattern of SecurityDomainService.PATH_TRAVERSAL_PATTERNS) {
|
|
93
|
+
if (pattern.test(path)) {
|
|
94
|
+
errors.push(`Path traversal detected: ${pattern.source}`);
|
|
95
|
+
}
|
|
96
|
+
}
|
|
97
|
+
|
|
98
|
+
// Check context permissions
|
|
99
|
+
if (!context.canAccessPath(path)) {
|
|
100
|
+
errors.push(`Access denied to path: ${path}`);
|
|
101
|
+
}
|
|
102
|
+
|
|
103
|
+
// Check for suspicious paths
|
|
104
|
+
if (path.includes('..')) {
|
|
105
|
+
warnings.push('Path contains parent directory reference');
|
|
106
|
+
}
|
|
107
|
+
|
|
108
|
+
return {
|
|
109
|
+
valid: errors.length === 0,
|
|
110
|
+
errors,
|
|
111
|
+
warnings,
|
|
112
|
+
sanitized: this.sanitizePath(path),
|
|
113
|
+
};
|
|
114
|
+
}
|
|
115
|
+
|
|
116
|
+
/**
|
|
117
|
+
* Validate a command
|
|
118
|
+
*/
|
|
119
|
+
validateCommand(command: string, context: SecurityContext): ValidationResult {
|
|
120
|
+
const errors: string[] = [];
|
|
121
|
+
const warnings: string[] = [];
|
|
122
|
+
|
|
123
|
+
// Check dangerous commands
|
|
124
|
+
for (const pattern of SecurityDomainService.DANGEROUS_COMMANDS) {
|
|
125
|
+
if (pattern.test(command)) {
|
|
126
|
+
errors.push(`Dangerous command pattern detected: ${pattern.source}`);
|
|
127
|
+
}
|
|
128
|
+
}
|
|
129
|
+
|
|
130
|
+
// Check context permissions
|
|
131
|
+
if (!context.canExecuteCommand(command)) {
|
|
132
|
+
errors.push(`Command execution denied: ${command}`);
|
|
133
|
+
}
|
|
134
|
+
|
|
135
|
+
if (!context.hasPermission('execute')) {
|
|
136
|
+
errors.push('Execute permission required');
|
|
137
|
+
}
|
|
138
|
+
|
|
139
|
+
// Check for shell injection
|
|
140
|
+
if (/[;&|`$(){}]/.test(command)) {
|
|
141
|
+
warnings.push('Command contains shell metacharacters');
|
|
142
|
+
}
|
|
143
|
+
|
|
144
|
+
return {
|
|
145
|
+
valid: errors.length === 0,
|
|
146
|
+
errors,
|
|
147
|
+
warnings,
|
|
148
|
+
sanitized: this.sanitizeCommand(command),
|
|
149
|
+
};
|
|
150
|
+
}
|
|
151
|
+
|
|
152
|
+
/**
|
|
153
|
+
* Validate user input
|
|
154
|
+
*/
|
|
155
|
+
validateInput(input: string): ValidationResult {
|
|
156
|
+
const errors: string[] = [];
|
|
157
|
+
const warnings: string[] = [];
|
|
158
|
+
|
|
159
|
+
// Check for SQL injection
|
|
160
|
+
for (const pattern of SecurityDomainService.SQL_INJECTION_PATTERNS) {
|
|
161
|
+
if (pattern.test(input)) {
|
|
162
|
+
errors.push(`SQL injection pattern detected`);
|
|
163
|
+
break;
|
|
164
|
+
}
|
|
165
|
+
}
|
|
166
|
+
|
|
167
|
+
// Check for XSS
|
|
168
|
+
for (const pattern of SecurityDomainService.XSS_PATTERNS) {
|
|
169
|
+
if (pattern.test(input)) {
|
|
170
|
+
errors.push(`XSS pattern detected`);
|
|
171
|
+
break;
|
|
172
|
+
}
|
|
173
|
+
}
|
|
174
|
+
|
|
175
|
+
// Check length
|
|
176
|
+
if (input.length > 10000) {
|
|
177
|
+
warnings.push('Input exceeds recommended length');
|
|
178
|
+
}
|
|
179
|
+
|
|
180
|
+
return {
|
|
181
|
+
valid: errors.length === 0,
|
|
182
|
+
errors,
|
|
183
|
+
warnings,
|
|
184
|
+
sanitized: this.sanitizeInput(input),
|
|
185
|
+
};
|
|
186
|
+
}
|
|
187
|
+
|
|
188
|
+
/**
|
|
189
|
+
* Detect threats in content
|
|
190
|
+
*/
|
|
191
|
+
detectThreats(content: string): ThreatDetectionResult {
|
|
192
|
+
const threats: ThreatDetectionResult['threats'] = [];
|
|
193
|
+
|
|
194
|
+
// Check for various threat patterns
|
|
195
|
+
if (/<script/i.test(content)) {
|
|
196
|
+
threats.push({
|
|
197
|
+
type: 'xss',
|
|
198
|
+
severity: 'high',
|
|
199
|
+
description: 'Script tag detected',
|
|
200
|
+
});
|
|
201
|
+
}
|
|
202
|
+
|
|
203
|
+
if (/password\s*[:=]\s*["'][^"']+["']/i.test(content)) {
|
|
204
|
+
threats.push({
|
|
205
|
+
type: 'credential-exposure',
|
|
206
|
+
severity: 'critical',
|
|
207
|
+
description: 'Hardcoded password detected',
|
|
208
|
+
});
|
|
209
|
+
}
|
|
210
|
+
|
|
211
|
+
if (/api[_-]?key\s*[:=]\s*["'][^"']+["']/i.test(content)) {
|
|
212
|
+
threats.push({
|
|
213
|
+
type: 'credential-exposure',
|
|
214
|
+
severity: 'critical',
|
|
215
|
+
description: 'API key detected',
|
|
216
|
+
});
|
|
217
|
+
}
|
|
218
|
+
|
|
219
|
+
if (/eval\s*\(/.test(content)) {
|
|
220
|
+
threats.push({
|
|
221
|
+
type: 'code-injection',
|
|
222
|
+
severity: 'high',
|
|
223
|
+
description: 'Eval statement detected',
|
|
224
|
+
});
|
|
225
|
+
}
|
|
226
|
+
|
|
227
|
+
return {
|
|
228
|
+
safe: threats.length === 0,
|
|
229
|
+
threats,
|
|
230
|
+
};
|
|
231
|
+
}
|
|
232
|
+
|
|
233
|
+
/**
|
|
234
|
+
* Sanitize path
|
|
235
|
+
*/
|
|
236
|
+
private sanitizePath(path: string): string {
|
|
237
|
+
return path
|
|
238
|
+
.replace(/\.\./g, '')
|
|
239
|
+
.replace(/\/\//g, '/')
|
|
240
|
+
.replace(/^~\//, '')
|
|
241
|
+
.trim();
|
|
242
|
+
}
|
|
243
|
+
|
|
244
|
+
/**
|
|
245
|
+
* Sanitize command
|
|
246
|
+
*/
|
|
247
|
+
private sanitizeCommand(command: string): string {
|
|
248
|
+
return command
|
|
249
|
+
.replace(/[;&|`$]/g, '')
|
|
250
|
+
.replace(/\$\([^)]*\)/g, '')
|
|
251
|
+
.trim();
|
|
252
|
+
}
|
|
253
|
+
|
|
254
|
+
/**
|
|
255
|
+
* Sanitize user input
|
|
256
|
+
*/
|
|
257
|
+
private sanitizeInput(input: string): string {
|
|
258
|
+
return input
|
|
259
|
+
.replace(/</g, '<')
|
|
260
|
+
.replace(/>/g, '>')
|
|
261
|
+
.replace(/"/g, '"')
|
|
262
|
+
.replace(/'/g, ''')
|
|
263
|
+
.replace(/\//g, '/');
|
|
264
|
+
}
|
|
265
|
+
|
|
266
|
+
/**
|
|
267
|
+
* Create security context for agent
|
|
268
|
+
*/
|
|
269
|
+
createAgentContext(
|
|
270
|
+
agentId: string,
|
|
271
|
+
role: string,
|
|
272
|
+
customPaths?: string[]
|
|
273
|
+
): SecurityContext {
|
|
274
|
+
// Default permissions based on role
|
|
275
|
+
const rolePermissions: Record<string, PermissionLevel[]> = {
|
|
276
|
+
'queen-coordinator': ['read', 'write', 'execute', 'admin'],
|
|
277
|
+
'security-architect': ['read', 'write', 'execute', 'admin'],
|
|
278
|
+
'coder': ['read', 'write', 'execute'],
|
|
279
|
+
'reviewer': ['read'],
|
|
280
|
+
'tester': ['read', 'execute'],
|
|
281
|
+
default: ['read'],
|
|
282
|
+
};
|
|
283
|
+
|
|
284
|
+
const permissions = rolePermissions[role] ?? rolePermissions.default;
|
|
285
|
+
|
|
286
|
+
return SecurityContext.create({
|
|
287
|
+
principalId: agentId,
|
|
288
|
+
principalType: 'agent',
|
|
289
|
+
permissions,
|
|
290
|
+
allowedPaths: customPaths ?? ['./src', './tests', './docs'],
|
|
291
|
+
blockedPaths: ['/etc', '/var', '~/', '../'],
|
|
292
|
+
allowedCommands: ['npm', 'npx', 'node', 'git', 'vitest'],
|
|
293
|
+
blockedCommands: ['rm -rf /', 'dd', 'mkfs', 'format'],
|
|
294
|
+
});
|
|
295
|
+
}
|
|
296
|
+
}
|