@vibecheckai/cli 2.5.1 → 2.5.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (70) hide show
  1. package/README.md +88 -88
  2. package/dist/autopatch/verified-autopatch.js +10 -10
  3. package/dist/bundles/index.js +3 -3
  4. package/dist/bundles/vibecheck-core.js +25799 -0
  5. package/dist/bundles/vibecheck-security.js +208687 -0
  6. package/dist/bundles/vibecheck-ship.js +2318 -0
  7. package/dist/commands/baseline.js +1 -1
  8. package/dist/commands/cache.js +4 -4
  9. package/dist/commands/checkpoint.d.ts +1 -1
  10. package/dist/commands/checkpoint.js +1 -1
  11. package/dist/commands/doctor.d.ts +1 -1
  12. package/dist/commands/doctor.js +12 -12
  13. package/dist/commands/evidence.js +4 -4
  14. package/dist/commands/evidence.js.map +1 -1
  15. package/dist/commands/explain.d.ts +1 -1
  16. package/dist/commands/explain.js +4 -4
  17. package/dist/commands/fix-consolidated.d.ts +1 -1
  18. package/dist/commands/fix-consolidated.js +3 -3
  19. package/dist/commands/init.d.ts +1 -1
  20. package/dist/commands/init.js +7 -7
  21. package/dist/commands/launcher.d.ts +1 -1
  22. package/dist/commands/launcher.js +9 -9
  23. package/dist/commands/on.d.ts +1 -1
  24. package/dist/commands/on.js +2 -2
  25. package/dist/commands/replay.d.ts +1 -1
  26. package/dist/commands/replay.js +5 -5
  27. package/dist/commands/scan-consolidated.d.ts +1 -1
  28. package/dist/commands/scan-consolidated.js +10 -10
  29. package/dist/commands/scan-secrets.js +5 -5
  30. package/dist/commands/scan-vulnerabilities-enhanced.d.ts +1 -1
  31. package/dist/commands/scan-vulnerabilities-enhanced.js +1 -1
  32. package/dist/commands/scan-vulnerabilities-osv.d.ts +1 -1
  33. package/dist/commands/scan-vulnerabilities-osv.js +6 -6
  34. package/dist/commands/scan-vulnerabilities-osv.js.map +1 -1
  35. package/dist/commands/secrets-allowlist.js +5 -5
  36. package/dist/commands/secrets-allowlist.js.map +1 -1
  37. package/dist/commands/ship-consolidated.d.ts +1 -1
  38. package/dist/commands/ship-consolidated.js +198 -198
  39. package/dist/commands/stats.d.ts +1 -1
  40. package/dist/commands/stats.js +5 -5
  41. package/dist/commands/upgrade.d.ts +1 -1
  42. package/dist/commands/upgrade.js +2 -2
  43. package/dist/commands/upgrade.js.map +1 -1
  44. package/dist/fix/backup.js +1 -1
  45. package/dist/formatters/sarif-enhanced.js +3 -3
  46. package/dist/formatters/sarif-enhanced.js.map +1 -1
  47. package/dist/formatters/sarif-v2.js +17 -17
  48. package/dist/formatters/sarif-v2.js.map +1 -1
  49. package/dist/formatters/sarif.js +8 -8
  50. package/dist/formatters/sarif.js.map +1 -1
  51. package/dist/index.d.ts +1 -1
  52. package/dist/index.js +102 -150
  53. package/dist/index.js.map +1 -1
  54. package/dist/init/ci-generator.js +29 -29
  55. package/dist/init/hooks-installer.js +19 -19
  56. package/dist/mcp/server.js +1 -1
  57. package/dist/mcp/telemetry.js +2 -2
  58. package/dist/reality/reality-runner.d.ts +1 -1
  59. package/dist/reality/reality-runner.js +3 -3
  60. package/dist/reality/receipt-generator.js +4 -4
  61. package/dist/runtime/client.js +5 -5
  62. package/dist/runtime/client.js.map +1 -1
  63. package/dist/runtime/creds.js +4 -4
  64. package/dist/runtime/creds.js.map +1 -1
  65. package/dist/runtime/json-output.js +1 -1
  66. package/dist/scan/reality-sniff.js +1 -1
  67. package/dist/truth-pack/index.js +1 -1
  68. package/dist/ui/frame.js +1 -1
  69. package/dist/ui.js +1 -1
  70. package/package.json +9 -11
package/README.md CHANGED
@@ -1,6 +1,6 @@
1
- # Guardrail CLI v2.5.0 🎉
1
+ # vibecheck CLI v2.5.0 🎉
2
2
 
3
- The official command-line interface for Guardrail - AI-native code security and guardrail platform.
3
+ The official command-line interface for vibecheck - AI-native code security and vibecheck platform.
4
4
 
5
5
  ## ✨ What's New in v2.5.0
6
6
 
@@ -13,26 +13,26 @@ The official command-line interface for Guardrail - AI-native code security and
13
13
  ## Installation
14
14
 
15
15
  ```bash
16
- npm install -g guardrail-cli@latest
16
+ npm install -g vibecheck-cli-tool@latest
17
17
  ```
18
18
 
19
19
  ## Quick Start
20
20
 
21
21
  ```bash
22
22
  # 🎮 Open the new interactive menu (recommended)
23
- guardrail menu
23
+ vibecheck menu
24
24
 
25
25
  # 🔐 Authenticate with your API key
26
- guardrail auth --key gr_pro_your_api_key_here
26
+ vibecheck auth --key gr_pro_your_api_key_here
27
27
 
28
28
  # 🔍 Scan your project
29
- guardrail scan --path ./your-project
29
+ vibecheck scan --path ./your-project
30
30
 
31
31
  # 🚀 Try Reality Mode (auto-installs Playwright)
32
- guardrail reality --url https://your-site.com --flow user-journey
32
+ vibecheck reality --url https://your-site.com --flow user-journey
33
33
 
34
34
  # 📦 Ship readiness check
35
- guardrail ship --path ./your-project
35
+ vibecheck ship --path ./your-project
36
36
  ```
37
37
 
38
38
  ## Authentication
@@ -42,18 +42,18 @@ The CLI uses enterprise-grade authentication with secure credential storage.
42
42
  ### Commands
43
43
 
44
44
  ```bash
45
- # Authenticate with API key (validates against Guardrail API)
46
- guardrail auth --key gr_pro_abc123xyz789
45
+ # Authenticate with API key (validates against vibecheck API)
46
+ vibecheck auth --key gr_pro_abc123xyz789
47
47
 
48
48
  # Check current authentication status
49
49
  # Shows masked key (gr_pro_****xyz9), tier, email, expiry
50
- guardrail auth --status
50
+ vibecheck auth --status
51
51
 
52
52
  # Force refresh cached entitlements
53
- guardrail auth --refresh
53
+ vibecheck auth --refresh
54
54
 
55
55
  # Logout and remove stored credentials
56
- guardrail auth --logout
56
+ vibecheck auth --logout
57
57
  ```
58
58
 
59
59
  ### Features
@@ -69,48 +69,48 @@ guardrail auth --logout
69
69
 
70
70
  | Platform | Location |
71
71
  |----------|----------|
72
- | macOS | `~/Library/Application Support/guardrail/state.json` |
73
- | Linux | `~/.config/guardrail/state.json` |
74
- | Windows | `%APPDATA%\guardrail\state.json` |
72
+ | macOS | `~/Library/Application Support/vibecheck/state.json` |
73
+ | Linux | `~/.config/vibecheck/state.json` |
74
+ | Windows | `%APPDATA%\vibecheck\state.json` |
75
75
 
76
76
  If `keytar` is available, sensitive tokens are stored in the OS keychain.
77
77
 
78
78
  ## Commands
79
79
 
80
- - `guardrail auth` - Authenticate with your API key
81
- - `guardrail scan` - Run security scans
82
- - `guardrail scan:secrets` - Scan for hardcoded secrets
83
- - `guardrail scan:vulnerabilities` - Scan dependencies for CVEs (OSV integration)
84
- - `guardrail scan:compliance` - Compliance assessment (Pro)
85
- - `guardrail sbom:generate` - Generate SBOM (Pro)
86
- - `guardrail ship` - Ship readiness checks (Starter+)
87
- - `guardrail reality` - Browser testing for fake data (Starter+)
88
- - `guardrail smells` - Code smell analysis
89
- - `guardrail fix` - Manual fix suggestions (Starter+)
90
- - `guardrail autopilot` - AI-powered batch remediation (Pro)
91
- - `guardrail cache:clear` - Clear OSV vulnerability cache
92
- - `guardrail cache:status` - Show cache statistics
93
- - `guardrail init` - Initialize Guardrail in a project (see [Init Command](#init-command))
94
- - `guardrail menu` - Interactive menu
80
+ - `vibecheck auth` - Authenticate with your API key
81
+ - `vibecheck scan` - Run security scans
82
+ - `vibecheck scan:secrets` - Scan for hardcoded secrets
83
+ - `vibecheck scan:vulnerabilities` - Scan dependencies for CVEs (OSV integration)
84
+ - `vibecheck scan:compliance` - Compliance assessment (Pro)
85
+ - `vibecheck sbom:generate` - Generate SBOM (Pro)
86
+ - `vibecheck ship` - Ship readiness checks (Starter+)
87
+ - `vibecheck reality` - Browser testing for fake data (Starter+)
88
+ - `vibecheck smells` - Code smell analysis
89
+ - `vibecheck fix` - Manual fix suggestions (Starter+)
90
+ - `vibecheck autopilot` - AI-powered batch remediation (Pro)
91
+ - `vibecheck cache:clear` - Clear OSV vulnerability cache
92
+ - `vibecheck cache:status` - Show cache statistics
93
+ - `vibecheck init` - Initialize vibecheck in a project (see [Init Command](#init-command))
94
+ - `vibecheck menu` - Interactive menu
95
95
 
96
96
  ## Init Command
97
97
 
98
- The `guardrail init` command provides enterprise-grade project initialization with automatic framework detection and template-based configuration.
98
+ The `vibecheck init` command provides enterprise-grade project initialization with automatic framework detection and template-based configuration.
99
99
 
100
100
  ### Basic Usage
101
101
 
102
102
  ```bash
103
103
  # Initialize with interactive prompts (auto-detects framework)
104
- guardrail init
104
+ vibecheck init
105
105
 
106
106
  # Initialize with a specific template
107
- guardrail init --template enterprise
107
+ vibecheck init --template enterprise
108
108
 
109
109
  # Initialize with CI and git hooks
110
- guardrail init --ci --hooks
110
+ vibecheck init --ci --hooks
111
111
 
112
112
  # Non-interactive mode
113
- guardrail init --template startup --no-interactive
113
+ vibecheck init --template startup --no-interactive
114
114
  ```
115
115
 
116
116
  ### Options
@@ -126,7 +126,7 @@ guardrail init --template startup --no-interactive
126
126
 
127
127
  ### Framework Detection
128
128
 
129
- Guardrail automatically detects your project framework by inspecting `package.json` and file structure:
129
+ vibecheck automatically detects your project framework by inspecting `package.json` and file structure:
130
130
 
131
131
  | Framework | Detection Signals |
132
132
  |-----------|-------------------|
@@ -137,7 +137,7 @@ Guardrail automatically detects your project framework by inspecting `package.js
137
137
  | **Remix** | `@remix-run/*` packages, `remix.config.*`, `app/routes/` |
138
138
  | **Vite+React** | `vite` + `react` dependencies, `@vitejs/plugin-react` |
139
139
 
140
- Based on the detected framework, Guardrail recommends the most relevant scans:
140
+ Based on the detected framework, vibecheck recommends the most relevant scans:
141
141
 
142
142
  - **Next.js/Remix**: secrets, vulnerabilities, ship readiness, reality mode (auth flows)
143
143
  - **Express/NestJS/Fastify**: secrets, vulnerabilities, ship readiness, compliance (logging/rate limits)
@@ -145,7 +145,7 @@ Based on the detected framework, Guardrail recommends the most relevant scans:
145
145
 
146
146
  ### Templates
147
147
 
148
- Templates configure `.guardrail/config.json` with different defaults:
148
+ Templates configure `.vibecheck/config.json` with different defaults:
149
149
 
150
150
  #### Startup Template
151
151
  - **Use case**: Early-stage teams, fast iteration
@@ -156,7 +156,7 @@ Templates configure `.guardrail/config.json` with different defaults:
156
156
  - **Noise reduction**: Suppress test files, low-confidence findings
157
157
 
158
158
  ```bash
159
- guardrail init --template startup
159
+ vibecheck init --template startup
160
160
  ```
161
161
 
162
162
  #### Enterprise Template
@@ -168,7 +168,7 @@ guardrail init --template startup
168
168
  - **SBOM**: Enabled
169
169
 
170
170
  ```bash
171
- guardrail init --template enterprise
171
+ vibecheck init --template enterprise
172
172
  ```
173
173
 
174
174
  #### OSS Template
@@ -179,12 +179,12 @@ guardrail init --template enterprise
179
179
  - **Noise reduction**: Suppress test files, examples
180
180
 
181
181
  ```bash
182
- guardrail init --template oss
182
+ vibecheck init --template oss
183
183
  ```
184
184
 
185
185
  ### Generated Files
186
186
 
187
- #### Configuration (`.guardrail/config.json`)
187
+ #### Configuration (`.vibecheck/config.json`)
188
188
 
189
189
  ```json
190
190
  {
@@ -212,7 +212,7 @@ guardrail init --template oss
212
212
  }
213
213
  ```
214
214
 
215
- #### CI Workflow (`.github/workflows/guardrail.yml`)
215
+ #### CI Workflow (`.github/workflows/vibecheck.yml`)
216
216
 
217
217
  When using `--ci`, generates a GitHub Actions workflow that:
218
218
  - Runs secrets and vulnerability scans
@@ -222,7 +222,7 @@ When using `--ci`, generates a GitHub Actions workflow that:
222
222
  - Runs ship readiness check
223
223
  - Fails the workflow on critical/high findings
224
224
 
225
- **Required**: Add `GUARDRAIL_API_KEY` to your repository secrets.
225
+ **Required**: Add `VIBECHECK_API_KEY` to your repository secrets.
226
226
 
227
227
  #### Git Hooks (`.husky/` or `lefthook.yml`)
228
228
 
@@ -234,16 +234,16 @@ When using `--hooks`, installs:
234
234
 
235
235
  ```bash
236
236
  # Next.js project with enterprise security
237
- guardrail init --template enterprise --ci --hooks
237
+ vibecheck init --template enterprise --ci --hooks
238
238
 
239
239
  # Express API with startup defaults
240
- guardrail init --path ./api --template startup
240
+ vibecheck init --path ./api --template startup
241
241
 
242
242
  # OSS project with lefthook
243
- guardrail init --template oss --hooks --hook-runner lefthook
243
+ vibecheck init --template oss --hooks --hook-runner lefthook
244
244
 
245
245
  # CI-only setup (no hooks)
246
- guardrail init --template enterprise --ci --no-interactive
246
+ vibecheck init --template enterprise --ci --no-interactive
247
247
  ```
248
248
 
249
249
  ## Vulnerability Scanning (OSV Integration)
@@ -255,7 +255,7 @@ The `scan:vulnerabilities` command uses real-time data from the [Open Source Vul
255
255
  - **Real-time OSV API queries** - Live vulnerability data from Google's OSV database
256
256
  - **Multi-ecosystem support** - npm, PyPI, RubyGems, Go
257
257
  - **Lockfile parsing** - package-lock.json, pnpm-lock.yaml, yarn.lock
258
- - **24-hour caching** - Reduces API calls with local cache in `.guardrail/cache/osv.json`
258
+ - **24-hour caching** - Reduces API calls with local cache in `.vibecheck/cache/osv.json`
259
259
  - **CVSS scoring** - Severity levels with optional NVD enrichment
260
260
  - **Remediation paths** - Upgrade suggestions with breaking change detection
261
261
  - **SARIF output** - GitHub code scanning integration
@@ -264,22 +264,22 @@ The `scan:vulnerabilities` command uses real-time data from the [Open Source Vul
264
264
 
265
265
  ```bash
266
266
  # Basic vulnerability scan
267
- guardrail scan:vulnerabilities --path ./my-project
267
+ vibecheck scan:vulnerabilities --path ./my-project
268
268
 
269
269
  # Bypass cache for fresh data
270
- guardrail scan:vulnerabilities --no-cache
270
+ vibecheck scan:vulnerabilities --no-cache
271
271
 
272
272
  # Enable NVD enrichment for CVSS scores (slower)
273
- guardrail scan:vulnerabilities --nvd
273
+ vibecheck scan:vulnerabilities --nvd
274
274
 
275
275
  # Output as SARIF for GitHub code scanning
276
- guardrail scan:vulnerabilities --format sarif -o results.sarif
276
+ vibecheck scan:vulnerabilities --format sarif -o results.sarif
277
277
 
278
278
  # Filter by ecosystem
279
- guardrail scan:vulnerabilities --ecosystem npm
279
+ vibecheck scan:vulnerabilities --ecosystem npm
280
280
 
281
281
  # Fail CI if critical vulnerabilities found
282
- guardrail scan:vulnerabilities --fail-on-critical
282
+ vibecheck scan:vulnerabilities --fail-on-critical
283
283
  ```
284
284
 
285
285
  ### Options
@@ -297,17 +297,17 @@ guardrail scan:vulnerabilities --fail-on-critical
297
297
 
298
298
  ### Cache Management
299
299
 
300
- Vulnerability data is cached for 24 hours in `.guardrail/cache/osv.json`.
300
+ Vulnerability data is cached for 24 hours in `.vibecheck/cache/osv.json`.
301
301
 
302
302
  ```bash
303
303
  # View cache statistics
304
- guardrail cache:status
304
+ vibecheck cache:status
305
305
 
306
306
  # Clear the cache
307
- guardrail cache:clear
307
+ vibecheck cache:clear
308
308
 
309
309
  # Clear global cache
310
- guardrail cache:clear --global
310
+ vibecheck cache:clear --global
311
311
  ```
312
312
 
313
313
  ### SARIF Output for GitHub
@@ -316,11 +316,11 @@ Generate SARIF v2.1.0 output for GitHub code scanning:
316
316
 
317
317
  ```bash
318
318
  # Generate SARIF report
319
- guardrail scan:vulnerabilities --format sarif -o vuln-results.sarif
319
+ vibecheck scan:vulnerabilities --format sarif -o vuln-results.sarif
320
320
 
321
321
  # In GitHub Actions workflow:
322
- - name: Run Guardrail Vulnerability Scan
323
- run: guardrail scan:vulnerabilities --format sarif -o results.sarif
322
+ - name: Run vibecheck Vulnerability Scan
323
+ run: vibecheck scan:vulnerabilities --format sarif -o results.sarif
324
324
 
325
325
  - name: Upload SARIF to GitHub
326
326
  uses: github/codeql-action/upload-sarif@v2
@@ -358,9 +358,9 @@ The header respects `NO_COLOR` environment variable and `--no-color` flag for CI
358
358
 
359
359
  | Variable | Description |
360
360
  |----------|-------------|
361
- | `GUARDRAIL_API_BASE_URL` | Override API endpoint (default: `https://api.guardrail.dev`) |
362
- | `GUARDRAIL_NO_INTERACTIVE` | Disable interactive prompts (`1` to disable) |
363
- | `GUARDRAIL_NO_UNICODE` | Disable Unicode output (`1` for ASCII-only) |
361
+ | `VIBECHECK_API_BASE_URL` | Override API endpoint (default: `https://api.vibecheckai.dev`) |
362
+ | `VIBECHECK_NO_INTERACTIVE` | Disable interactive prompts (`1` to disable) |
363
+ | `VIBECHECK_NO_UNICODE` | Disable Unicode output (`1` for ASCII-only) |
364
364
 
365
365
  ## Reality Mode
366
366
 
@@ -370,29 +370,29 @@ Reality Mode detects fake data, mock backends, and placeholder content in your r
370
370
 
371
371
  ```bash
372
372
  # Generate a Playwright test for the auth flow
373
- guardrail reality --flow auth
373
+ vibecheck reality --flow auth
374
374
 
375
375
  # Generate test for a custom URL
376
- guardrail reality --url http://localhost:8080 --flow checkout
376
+ vibecheck reality --url http://localhost:8080 --flow checkout
377
377
  ```
378
378
 
379
379
  ### Generate + Run
380
380
 
381
381
  ```bash
382
382
  # Generate and immediately execute the test
383
- guardrail reality --run --flow auth
383
+ vibecheck reality --run --flow auth
384
384
 
385
385
  # Run in headed mode (show browser)
386
- guardrail reality --run --flow auth --headless=false
386
+ vibecheck reality --run --flow auth --headless=false
387
387
 
388
388
  # Custom timeout and workers
389
- guardrail reality --run --timeout 60 --workers 2
389
+ vibecheck reality --run --timeout 60 --workers 2
390
390
 
391
391
  # Use HTML reporter for detailed results
392
- guardrail reality --run --reporter html,list
392
+ vibecheck reality --run --reporter html,list
393
393
 
394
394
  # Full configuration example
395
- guardrail reality --run \
395
+ vibecheck reality --run \
396
396
  --url http://localhost:8080 \
397
397
  --flow checkout \
398
398
  --timeout 45 \
@@ -411,17 +411,17 @@ Opens Playwright in interactive recording mode using `codegen` to capture user a
411
411
 
412
412
  ```bash
413
413
  # Start recording session
414
- guardrail reality --record --url http://localhost:3000
414
+ vibecheck reality --record --url http://localhost:3000
415
415
 
416
416
  # Record with custom flow name
417
- guardrail reality --record --url http://localhost:8080 --flow signup
417
+ vibecheck reality --record --url http://localhost:8080 --flow signup
418
418
  ```
419
419
 
420
420
  **How it works**:
421
421
  1. Opens browser with Playwright Inspector
422
422
  2. Interact with your app (click, type, navigate)
423
423
  3. Playwright records all actions with robust selectors
424
- 4. Generated test saved to `.guardrail/reality/<runId>/reality-<flow>.test.ts`
424
+ 4. Generated test saved to `.vibecheck/reality/<runId>/reality-<flow>.test.ts`
425
425
  5. Press Ctrl+C when done
426
426
 
427
427
  ### Options
@@ -443,10 +443,10 @@ guardrail reality --record --url http://localhost:8080 --flow signup
443
443
 
444
444
  ### Artifacts
445
445
 
446
- When using `--run`, artifacts are saved under `.guardrail/reality/<runId>/`:
446
+ When using `--run`, artifacts are saved under `.vibecheck/reality/<runId>/`:
447
447
 
448
448
  ```
449
- .guardrail/reality/auth-1704123456789-a1b2c3d4/
449
+ .vibecheck/reality/auth-1704123456789-a1b2c3d4/
450
450
  ├── reality-auth.test.ts # Generated test file
451
451
  ├── output.log # Playwright console output
452
452
  ├── result.json # Run result summary (success, exitCode, duration)
@@ -462,17 +462,17 @@ When using `--run`, artifacts are saved under `.guardrail/reality/<runId>/`:
462
462
 
463
463
  **HTML Report** (if `--reporter html`):
464
464
  ```bash
465
- npx playwright show-report .guardrail/reality/<runId>/report
465
+ npx playwright show-report .vibecheck/reality/<runId>/report
466
466
  ```
467
467
 
468
468
  **JSON Results**:
469
469
  ```bash
470
- cat .guardrail/reality/<runId>/result.json
470
+ cat .vibecheck/reality/<runId>/result.json
471
471
  ```
472
472
 
473
473
  **Logs**:
474
474
  ```bash
475
- cat .guardrail/reality/<runId>/output.log
475
+ cat .vibecheck/reality/<runId>/output.log
476
476
  ```
477
477
 
478
478
  ### Prerequisites
@@ -499,12 +499,12 @@ The CLI automatically detects missing dependencies and provides exact install co
499
499
 
500
500
  **Quick test in CI**:
501
501
  ```bash
502
- guardrail reality --run --flow auth --headless --timeout 30
502
+ vibecheck reality --run --flow auth --headless --timeout 30
503
503
  ```
504
504
 
505
505
  **Debug with full visibility**:
506
506
  ```bash
507
- guardrail reality --run --flow checkout \
507
+ vibecheck reality --run --flow checkout \
508
508
  --no-headless \
509
509
  --trace on \
510
510
  --video on \
@@ -513,19 +513,19 @@ guardrail reality --run --flow checkout \
513
513
 
514
514
  **Record custom flow**:
515
515
  ```bash
516
- guardrail reality --record --url http://localhost:3000 --flow onboarding
516
+ vibecheck reality --record --url http://localhost:3000 --flow onboarding
517
517
  ```
518
518
 
519
519
  **Parallel execution**:
520
520
  ```bash
521
- guardrail reality --run --workers 4 --reporter html,json
521
+ vibecheck reality --run --workers 4 --reporter html,json
522
522
  ```
523
523
 
524
524
  ## Support
525
525
 
526
- - [Documentation](https://guardrail.dev/docs)
527
- - [Discord](https://discord.gg/guardrail)
528
- - [Support](mailto:support@guardrail.dev)
526
+ - [Documentation](https://vibecheckai.dev/docs)
527
+ - [Discord](https://discord.gg/vibecheck)
528
+ - [Support](mailto:support@vibecheckai.dev)
529
529
 
530
530
  ## License
531
531
 
@@ -60,7 +60,7 @@ class VerifiedAutopatch {
60
60
  */
61
61
  async createVerifiedFix(options) {
62
62
  const fixId = (0, crypto_1.randomUUID)();
63
- const branchName = `guardrail/verified-fix-${fixId.slice(0, 8)}`;
63
+ const branchName = `vibecheck/verified-fix-${fixId.slice(0, 8)}`;
64
64
  const fix = {
65
65
  id: fixId,
66
66
  findingId: options.findingId,
@@ -274,22 +274,22 @@ class VerifiedAutopatch {
274
274
  */
275
275
  async runFlowsGate() {
276
276
  try {
277
- // Check if guardrail is available
277
+ // Check if vibecheck is available
278
278
  try {
279
- (0, child_process_1.execSync)('guardrail --version', {
279
+ (0, child_process_1.execSync)('vibecheck --version', {
280
280
  cwd: this.projectPath,
281
281
  stdio: 'pipe',
282
282
  });
283
283
  }
284
284
  catch {
285
- // Guardrail not available, skip flows gate
285
+ // vibecheck not available, skip flows gate
286
286
  return true;
287
287
  }
288
288
  // Run reality mode for critical flows
289
289
  const flows = ['auth', 'checkout'];
290
290
  for (const flow of flows) {
291
291
  try {
292
- (0, child_process_1.execSync)(`guardrail reality --flow ${flow} --headless`, {
292
+ (0, child_process_1.execSync)(`vibecheck reality --flow ${flow} --headless`, {
293
293
  cwd: this.projectPath,
294
294
  stdio: 'pipe',
295
295
  timeout: 120000,
@@ -311,19 +311,19 @@ class VerifiedAutopatch {
311
311
  */
312
312
  async runPolicyGate() {
313
313
  try {
314
- // Check if guardrail is available
314
+ // Check if vibecheck is available
315
315
  try {
316
- (0, child_process_1.execSync)('guardrail --version', {
316
+ (0, child_process_1.execSync)('vibecheck --version', {
317
317
  cwd: this.projectPath,
318
318
  stdio: 'pipe',
319
319
  });
320
320
  }
321
321
  catch {
322
- return true; // Skip if guardrail not available
322
+ return true; // Skip if vibecheck not available
323
323
  }
324
324
  // Run ship check
325
325
  try {
326
- (0, child_process_1.execSync)('guardrail ship', {
326
+ (0, child_process_1.execSync)('vibecheck ship', {
327
327
  cwd: this.projectPath,
328
328
  stdio: 'pipe',
329
329
  timeout: 120000,
@@ -407,7 +407,7 @@ class VerifiedAutopatch {
407
407
  */
408
408
  async generateFixReceipt(fix, gateResults) {
409
409
  const { generateReceipt } = require('../reality/receipt-generator');
410
- const receiptDir = path.join(this.projectPath, '.guardrail', 'verified-fixes', fix.id);
410
+ const receiptDir = path.join(this.projectPath, '.vibecheck', 'verified-fixes', fix.id);
411
411
  fs.mkdirSync(receiptDir, { recursive: true });
412
412
  const receiptPath = await generateReceipt({
413
413
  projectPath: this.projectPath,
@@ -2,7 +2,7 @@
2
2
  // This file maps workspace packages to bundled versions
3
3
 
4
4
  module.exports = {
5
- '@guardrail/security': require('./bundles/guardrail-security'),
6
- '@guardrail/core': require('./bundles/guardrail-core'),
7
- '@guardrail/ship': require('./bundles/guardrail-ship'),
5
+ '@vibecheck/security': require('./bundles/vibecheck-security'),
6
+ '@vibecheck/core': require('./bundles/vibecheck-core'),
7
+ '@vibecheck/ship': require('./bundles/vibecheck-ship'),
8
8
  };