@vibecheckai/cli 3.0.3 → 3.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (69) hide show
  1. package/bin/cli-hygiene.js +241 -0
  2. package/bin/guardrail.js +834 -0
  3. package/bin/runners/cli-utils.js +1070 -0
  4. package/bin/runners/context/ai-task-decomposer.js +337 -0
  5. package/bin/runners/context/analyzer.js +462 -0
  6. package/bin/runners/context/api-contracts.js +427 -0
  7. package/bin/runners/context/context-diff.js +342 -0
  8. package/bin/runners/context/context-pruner.js +291 -0
  9. package/bin/runners/context/dependency-graph.js +414 -0
  10. package/bin/runners/context/generators/claude.js +107 -0
  11. package/bin/runners/context/generators/codex.js +108 -0
  12. package/bin/runners/context/generators/copilot.js +119 -0
  13. package/bin/runners/context/generators/cursor.js +514 -0
  14. package/bin/runners/context/generators/mcp.js +151 -0
  15. package/bin/runners/context/generators/windsurf.js +180 -0
  16. package/bin/runners/context/git-context.js +302 -0
  17. package/bin/runners/context/index.js +1042 -0
  18. package/bin/runners/context/insights.js +173 -0
  19. package/bin/runners/context/mcp-server/generate-rules.js +337 -0
  20. package/bin/runners/context/mcp-server/index.js +1176 -0
  21. package/bin/runners/context/mcp-server/package.json +24 -0
  22. package/bin/runners/context/memory.js +200 -0
  23. package/bin/runners/context/monorepo.js +215 -0
  24. package/bin/runners/context/multi-repo-federation.js +404 -0
  25. package/bin/runners/context/patterns.js +253 -0
  26. package/bin/runners/context/proof-context.js +972 -0
  27. package/bin/runners/context/security-scanner.js +303 -0
  28. package/bin/runners/context/semantic-search.js +350 -0
  29. package/bin/runners/context/shared.js +264 -0
  30. package/bin/runners/context/team-conventions.js +310 -0
  31. package/bin/runners/lib/ai-bridge.js +416 -0
  32. package/bin/runners/lib/analysis-core.js +271 -0
  33. package/bin/runners/lib/analyzers.js +541 -0
  34. package/bin/runners/lib/audit-bridge.js +391 -0
  35. package/bin/runners/lib/auth-truth.js +193 -0
  36. package/bin/runners/lib/auth.js +215 -0
  37. package/bin/runners/lib/backup.js +62 -0
  38. package/bin/runners/lib/billing.js +107 -0
  39. package/bin/runners/lib/claims.js +118 -0
  40. package/bin/runners/lib/cli-ui.js +540 -0
  41. package/bin/runners/lib/compliance-bridge-new.js +0 -0
  42. package/bin/runners/lib/compliance-bridge.js +165 -0
  43. package/bin/runners/lib/contracts/auth-contract.js +194 -0
  44. package/bin/runners/lib/contracts/env-contract.js +178 -0
  45. package/bin/runners/lib/contracts/external-contract.js +198 -0
  46. package/bin/runners/lib/contracts/guard.js +168 -0
  47. package/bin/runners/lib/contracts/index.js +89 -0
  48. package/bin/runners/lib/contracts/plan-validator.js +311 -0
  49. package/bin/runners/lib/contracts/route-contract.js +192 -0
  50. package/bin/runners/lib/detect.js +89 -0
  51. package/bin/runners/lib/doctor/autofix.js +254 -0
  52. package/bin/runners/lib/doctor/index.js +37 -0
  53. package/bin/runners/lib/doctor/modules/dependencies.js +325 -0
  54. package/bin/runners/lib/doctor/modules/index.js +46 -0
  55. package/bin/runners/lib/doctor/modules/network.js +250 -0
  56. package/bin/runners/lib/doctor/modules/project.js +312 -0
  57. package/bin/runners/lib/doctor/modules/runtime.js +224 -0
  58. package/bin/runners/lib/doctor/modules/security.js +348 -0
  59. package/bin/runners/lib/doctor/modules/system.js +213 -0
  60. package/bin/runners/lib/doctor/modules/vibecheck.js +394 -0
  61. package/bin/runners/lib/doctor/reporter.js +262 -0
  62. package/bin/runners/lib/doctor/service.js +262 -0
  63. package/bin/runners/lib/doctor/types.js +113 -0
  64. package/bin/runners/lib/doctor/ui.js +263 -0
  65. package/bin/runners/lib/doctor-enhanced.js +233 -0
  66. package/bin/runners/lib/doctor-v2.js +608 -0
  67. package/bin/runners/lib/enforcement.js +72 -0
  68. package/bin/vibecheck.js +0 -0
  69. package/package.json +8 -9
@@ -0,0 +1,194 @@
1
+ /**
2
+ * Auth Contract Builder
3
+ * Builds auth.json contract from truthpack
4
+ */
5
+
6
+ "use strict";
7
+
8
+ /**
9
+ * Build auth contract from truthpack
10
+ */
11
+ function buildAuthContract(truthpack) {
12
+ const contract = {
13
+ version: "1.0.0",
14
+ generatedAt: new Date().toISOString(),
15
+ protectedPatterns: [],
16
+ publicPatterns: [],
17
+ roles: [],
18
+ evidence: []
19
+ };
20
+
21
+ // Extract protected patterns from Next middleware
22
+ const nextMiddleware = truthpack?.auth?.nextMiddleware || [];
23
+ const matcherPatterns = truthpack?.auth?.nextMatcherPatterns || [];
24
+
25
+ contract.protectedPatterns = [...new Set(matcherPatterns)];
26
+
27
+ // Add evidence from middleware files
28
+ for (const mw of nextMiddleware) {
29
+ contract.evidence.push({
30
+ file: mw.file,
31
+ type: "next_middleware",
32
+ signals: mw.signalTypes || []
33
+ });
34
+ }
35
+
36
+ // Extract Fastify auth info
37
+ const fastify = truthpack?.auth?.fastify || {};
38
+ if (fastify.hooks?.length) {
39
+ for (const hook of fastify.hooks) {
40
+ contract.evidence.push({
41
+ file: hook.file,
42
+ type: "fastify_hook",
43
+ hookType: hook.hookType,
44
+ line: hook.line
45
+ });
46
+ }
47
+ }
48
+
49
+ // Infer roles from truthpack
50
+ contract.roles = inferRoles(truthpack);
51
+
52
+ // Default public patterns
53
+ contract.publicPatterns = [
54
+ "/api/health",
55
+ "/api/status",
56
+ "/api/public/*",
57
+ "/_next/*",
58
+ "/favicon.ico"
59
+ ];
60
+
61
+ return contract;
62
+ }
63
+
64
+ /**
65
+ * Infer roles from truthpack
66
+ */
67
+ function inferRoles(truthpack) {
68
+ const roles = [];
69
+ const routes = truthpack?.routes?.server || [];
70
+
71
+ // Check for admin routes
72
+ const adminRoutes = routes.filter(r => r.path.includes("/admin"));
73
+ if (adminRoutes.length > 0) {
74
+ roles.push({
75
+ name: "admin",
76
+ routes: adminRoutes.map(r => r.path),
77
+ evidence: adminRoutes.flatMap(r => r.evidence || [])
78
+ });
79
+ }
80
+
81
+ // Check for user routes (default authenticated)
82
+ const userRoutes = routes.filter(r =>
83
+ !r.path.includes("/admin") &&
84
+ !r.path.includes("/public") &&
85
+ !r.path.includes("/health")
86
+ );
87
+ if (userRoutes.length > 0) {
88
+ roles.push({
89
+ name: "user",
90
+ routes: userRoutes.map(r => r.path),
91
+ evidence: []
92
+ });
93
+ }
94
+
95
+ return roles;
96
+ }
97
+
98
+ /**
99
+ * Validate auth coverage
100
+ */
101
+ function validateAuthContract(contract, routes, realityResults) {
102
+ const violations = [];
103
+
104
+ // Check that all non-public routes are protected
105
+ for (const route of routes) {
106
+ const isPublic = contract.publicPatterns.some(p => matchesPattern(route.path, p));
107
+ const isProtected = contract.protectedPatterns.some(p => matchesPattern(route.path, p));
108
+
109
+ if (!isPublic && !isProtected) {
110
+ // Check if route looks sensitive
111
+ if (looksLikeSensitiveRoute(route.path)) {
112
+ violations.push({
113
+ type: "unprotected_sensitive",
114
+ severity: "WARN",
115
+ route: route.path,
116
+ message: `Sensitive route ${route.path} not covered by auth patterns`,
117
+ evidence: route.evidence || []
118
+ });
119
+ }
120
+ }
121
+ }
122
+
123
+ // Check reality results for auth bypass
124
+ if (realityResults) {
125
+ for (const result of realityResults) {
126
+ if (result.type === "AuthCoverage" && result.severity === "BLOCK") {
127
+ violations.push({
128
+ type: "auth_bypass",
129
+ severity: "BLOCK",
130
+ route: result.page,
131
+ message: result.title,
132
+ evidence: []
133
+ });
134
+ }
135
+ }
136
+ }
137
+
138
+ return violations;
139
+ }
140
+
141
+ function matchesPattern(path, pattern) {
142
+ const normPattern = pattern.replace(/\*/g, ".*").replace(/\//g, "\\/");
143
+ try {
144
+ const rx = new RegExp(`^${normPattern}`, "i");
145
+ return rx.test(path);
146
+ } catch {
147
+ return false;
148
+ }
149
+ }
150
+
151
+ function looksLikeSensitiveRoute(path) {
152
+ const sensitivePatterns = [
153
+ /\/api\/users/i,
154
+ /\/api\/billing/i,
155
+ /\/api\/payment/i,
156
+ /\/api\/subscription/i,
157
+ /\/api\/settings/i,
158
+ /\/api\/profile/i,
159
+ /\/api\/account/i,
160
+ /\/api\/admin/i,
161
+ /\/api\/webhook/i,
162
+ ];
163
+
164
+ return sensitivePatterns.some(p => p.test(path));
165
+ }
166
+
167
+ /**
168
+ * Diff two auth contracts
169
+ */
170
+ function diffAuthContracts(before, after) {
171
+ const diff = {
172
+ protectedAdded: [],
173
+ protectedRemoved: [],
174
+ rolesChanged: []
175
+ };
176
+
177
+ const beforeProtected = new Set(before.protectedPatterns);
178
+ const afterProtected = new Set(after.protectedPatterns);
179
+
180
+ for (const p of afterProtected) {
181
+ if (!beforeProtected.has(p)) diff.protectedAdded.push(p);
182
+ }
183
+ for (const p of beforeProtected) {
184
+ if (!afterProtected.has(p)) diff.protectedRemoved.push(p);
185
+ }
186
+
187
+ return diff;
188
+ }
189
+
190
+ module.exports = {
191
+ buildAuthContract,
192
+ validateAuthContract,
193
+ diffAuthContracts
194
+ };
@@ -0,0 +1,178 @@
1
+ /**
2
+ * Env Contract Builder
3
+ * Builds env.json contract from truthpack
4
+ */
5
+
6
+ "use strict";
7
+
8
+ /**
9
+ * Build env contract from truthpack
10
+ */
11
+ function buildEnvContract(truthpack) {
12
+ const contract = {
13
+ version: "1.0.0",
14
+ generatedAt: new Date().toISOString(),
15
+ vars: []
16
+ };
17
+
18
+ const envVars = truthpack?.env?.vars || [];
19
+ const declared = new Set(truthpack?.env?.declared || []);
20
+ const declaredSources = truthpack?.env?.declaredSources || [];
21
+
22
+ for (const v of envVars) {
23
+ const varSpec = {
24
+ name: v.name,
25
+ required: inferRequired(v, declared),
26
+ usedIn: (v.references || []).map(r => r.file).filter(Boolean),
27
+ declaredIn: declaredSources.filter(s => isDeclaredInSource(v.name, s)),
28
+ description: inferDescription(v.name),
29
+ evidence: v.references || []
30
+ };
31
+
32
+ contract.vars.push(varSpec);
33
+ }
34
+
35
+ // Add declared vars that aren't used (might be optional)
36
+ for (const name of declared) {
37
+ if (!envVars.find(v => v.name === name)) {
38
+ contract.vars.push({
39
+ name,
40
+ required: false,
41
+ usedIn: [],
42
+ declaredIn: declaredSources,
43
+ description: inferDescription(name),
44
+ evidence: []
45
+ });
46
+ }
47
+ }
48
+
49
+ return contract;
50
+ }
51
+
52
+ /**
53
+ * Infer if env var is required
54
+ */
55
+ function inferRequired(envVar, declared) {
56
+ const name = envVar.name;
57
+
58
+ // Common required patterns
59
+ const requiredPatterns = [
60
+ /^DATABASE_URL$/i,
61
+ /^NEXTAUTH_SECRET$/i,
62
+ /^NEXTAUTH_URL$/i,
63
+ /^JWT_SECRET$/i,
64
+ /^API_KEY$/i,
65
+ /^STRIPE_SECRET_KEY$/i,
66
+ /^STRIPE_WEBHOOK_SECRET$/i,
67
+ /^AUTH0_/i,
68
+ /^CLERK_/i,
69
+ ];
70
+
71
+ for (const pattern of requiredPatterns) {
72
+ if (pattern.test(name)) return true;
73
+ }
74
+
75
+ // If used but not declared, likely required
76
+ if (!declared.has(name) && envVar.references?.length > 0) {
77
+ return true;
78
+ }
79
+
80
+ return false;
81
+ }
82
+
83
+ function isDeclaredInSource(name, source) {
84
+ // Simple heuristic - would need to parse files for accurate check
85
+ return true;
86
+ }
87
+
88
+ function inferDescription(name) {
89
+ const descriptions = {
90
+ DATABASE_URL: "Database connection string",
91
+ NEXTAUTH_SECRET: "NextAuth.js encryption secret",
92
+ NEXTAUTH_URL: "NextAuth.js base URL",
93
+ JWT_SECRET: "JWT signing secret",
94
+ STRIPE_SECRET_KEY: "Stripe API secret key",
95
+ STRIPE_PUBLISHABLE_KEY: "Stripe publishable key",
96
+ STRIPE_WEBHOOK_SECRET: "Stripe webhook signing secret",
97
+ NODE_ENV: "Node environment (development/production)",
98
+ PORT: "Server port",
99
+ HOST: "Server host",
100
+ };
101
+
102
+ return descriptions[name] || undefined;
103
+ }
104
+
105
+ /**
106
+ * Validate code against env contract
107
+ */
108
+ function validateAgainstEnvContract(contract, usedVars) {
109
+ const violations = [];
110
+ const contractVars = new Map(contract.vars.map(v => [v.name, v]));
111
+
112
+ for (const used of usedVars) {
113
+ if (!contractVars.has(used.name)) {
114
+ violations.push({
115
+ type: "undeclared_env",
116
+ severity: "WARN",
117
+ name: used.name,
118
+ usedIn: used.references?.map(r => r.file) || [],
119
+ message: `Env var ${used.name} used but not declared in contract`,
120
+ evidence: used.references || []
121
+ });
122
+ }
123
+ }
124
+
125
+ // Check for required vars that aren't used
126
+ for (const [name, spec] of contractVars) {
127
+ if (spec.required && spec.usedIn.length === 0) {
128
+ violations.push({
129
+ type: "unused_required",
130
+ severity: "WARN",
131
+ name,
132
+ message: `Required env var ${name} declared but not used`,
133
+ evidence: []
134
+ });
135
+ }
136
+ }
137
+
138
+ return violations;
139
+ }
140
+
141
+ /**
142
+ * Diff two env contracts
143
+ */
144
+ function diffEnvContracts(before, after) {
145
+ const diff = {
146
+ added: [],
147
+ removed: [],
148
+ changed: []
149
+ };
150
+
151
+ const beforeMap = new Map(before.vars.map(v => [v.name, v]));
152
+ const afterMap = new Map(after.vars.map(v => [v.name, v]));
153
+
154
+ for (const [name, spec] of afterMap) {
155
+ if (!beforeMap.has(name)) {
156
+ diff.added.push(spec);
157
+ } else {
158
+ const prev = beforeMap.get(name);
159
+ if (prev.required !== spec.required) {
160
+ diff.changed.push({ before: prev, after: spec });
161
+ }
162
+ }
163
+ }
164
+
165
+ for (const [name, spec] of beforeMap) {
166
+ if (!afterMap.has(name)) {
167
+ diff.removed.push(spec);
168
+ }
169
+ }
170
+
171
+ return diff;
172
+ }
173
+
174
+ module.exports = {
175
+ buildEnvContract,
176
+ validateAgainstEnvContract,
177
+ diffEnvContracts
178
+ };
@@ -0,0 +1,198 @@
1
+ /**
2
+ * External Contract Builder
3
+ * Builds external.json contract from truthpack (Stripe, GitHub, etc.)
4
+ */
5
+
6
+ "use strict";
7
+
8
+ /**
9
+ * Build external services contract from truthpack
10
+ */
11
+ function buildExternalContract(truthpack) {
12
+ const contract = {
13
+ version: "1.0.0",
14
+ generatedAt: new Date().toISOString(),
15
+ services: []
16
+ };
17
+
18
+ // Extract billing/Stripe info
19
+ const billing = truthpack?.billing || {};
20
+ if (billing.hasStripe || billing.webhookCandidates?.length) {
21
+ const stripeService = {
22
+ name: "stripe",
23
+ envVars: extractStripeEnvVars(truthpack),
24
+ usedIn: billing.webhookCandidates?.map(w => w.file) || [],
25
+ webhooks: billing.webhookCandidates?.map(w => ({
26
+ path: w.path,
27
+ verified: w.hasSignatureVerification || false,
28
+ idempotent: w.hasIdempotency || false
29
+ })) || [],
30
+ evidence: billing.webhookCandidates?.flatMap(w => w.evidence || []) || []
31
+ };
32
+ contract.services.push(stripeService);
33
+ }
34
+
35
+ // Detect other external services from env vars
36
+ const envVars = truthpack?.env?.vars || [];
37
+
38
+ // GitHub
39
+ const githubVars = envVars.filter(v => /github/i.test(v.name));
40
+ if (githubVars.length) {
41
+ contract.services.push({
42
+ name: "github",
43
+ envVars: githubVars.map(v => v.name),
44
+ usedIn: githubVars.flatMap(v => v.references?.map(r => r.file) || []),
45
+ evidence: githubVars.flatMap(v => v.references || [])
46
+ });
47
+ }
48
+
49
+ // SendGrid
50
+ const sendgridVars = envVars.filter(v => /sendgrid/i.test(v.name));
51
+ if (sendgridVars.length) {
52
+ contract.services.push({
53
+ name: "sendgrid",
54
+ envVars: sendgridVars.map(v => v.name),
55
+ usedIn: sendgridVars.flatMap(v => v.references?.map(r => r.file) || []),
56
+ evidence: sendgridVars.flatMap(v => v.references || [])
57
+ });
58
+ }
59
+
60
+ // Twilio
61
+ const twilioVars = envVars.filter(v => /twilio/i.test(v.name));
62
+ if (twilioVars.length) {
63
+ contract.services.push({
64
+ name: "twilio",
65
+ envVars: twilioVars.map(v => v.name),
66
+ usedIn: twilioVars.flatMap(v => v.references?.map(r => r.file) || []),
67
+ evidence: twilioVars.flatMap(v => v.references || [])
68
+ });
69
+ }
70
+
71
+ // AWS
72
+ const awsVars = envVars.filter(v => /^aws/i.test(v.name));
73
+ if (awsVars.length) {
74
+ contract.services.push({
75
+ name: "aws",
76
+ envVars: awsVars.map(v => v.name),
77
+ usedIn: awsVars.flatMap(v => v.references?.map(r => r.file) || []),
78
+ evidence: awsVars.flatMap(v => v.references || [])
79
+ });
80
+ }
81
+
82
+ // Supabase
83
+ const supabaseVars = envVars.filter(v => /supabase/i.test(v.name));
84
+ if (supabaseVars.length) {
85
+ contract.services.push({
86
+ name: "supabase",
87
+ envVars: supabaseVars.map(v => v.name),
88
+ usedIn: supabaseVars.flatMap(v => v.references?.map(r => r.file) || []),
89
+ evidence: supabaseVars.flatMap(v => v.references || [])
90
+ });
91
+ }
92
+
93
+ return contract;
94
+ }
95
+
96
+ function extractStripeEnvVars(truthpack) {
97
+ const envVars = truthpack?.env?.vars || [];
98
+ return envVars
99
+ .filter(v => /stripe/i.test(v.name))
100
+ .map(v => v.name);
101
+ }
102
+
103
+ /**
104
+ * Validate external services contract
105
+ */
106
+ function validateExternalContract(contract) {
107
+ const violations = [];
108
+
109
+ for (const service of contract.services) {
110
+ // Check Stripe webhook verification
111
+ if (service.name === "stripe") {
112
+ for (const webhook of service.webhooks || []) {
113
+ if (!webhook.verified) {
114
+ violations.push({
115
+ type: "unverified_webhook",
116
+ severity: "BLOCK",
117
+ service: "stripe",
118
+ path: webhook.path,
119
+ message: `Stripe webhook at ${webhook.path} missing signature verification`,
120
+ evidence: []
121
+ });
122
+ }
123
+ if (!webhook.idempotent) {
124
+ violations.push({
125
+ type: "non_idempotent_webhook",
126
+ severity: "WARN",
127
+ service: "stripe",
128
+ path: webhook.path,
129
+ message: `Stripe webhook at ${webhook.path} may not be idempotent`,
130
+ evidence: []
131
+ });
132
+ }
133
+ }
134
+ }
135
+
136
+ // Check for missing required env vars
137
+ const requiredVars = getRequiredVarsForService(service.name);
138
+ for (const required of requiredVars) {
139
+ if (!service.envVars.includes(required)) {
140
+ violations.push({
141
+ type: "missing_env",
142
+ severity: "WARN",
143
+ service: service.name,
144
+ envVar: required,
145
+ message: `Service ${service.name} typically requires ${required}`,
146
+ evidence: []
147
+ });
148
+ }
149
+ }
150
+ }
151
+
152
+ return violations;
153
+ }
154
+
155
+ function getRequiredVarsForService(name) {
156
+ const requirements = {
157
+ stripe: ["STRIPE_SECRET_KEY", "STRIPE_WEBHOOK_SECRET"],
158
+ github: ["GITHUB_TOKEN"],
159
+ sendgrid: ["SENDGRID_API_KEY"],
160
+ twilio: ["TWILIO_ACCOUNT_SID", "TWILIO_AUTH_TOKEN"],
161
+ supabase: ["SUPABASE_URL", "SUPABASE_ANON_KEY"]
162
+ };
163
+ return requirements[name] || [];
164
+ }
165
+
166
+ /**
167
+ * Diff two external contracts
168
+ */
169
+ function diffExternalContracts(before, after) {
170
+ const diff = {
171
+ added: [],
172
+ removed: [],
173
+ changed: []
174
+ };
175
+
176
+ const beforeMap = new Map(before.services.map(s => [s.name, s]));
177
+ const afterMap = new Map(after.services.map(s => [s.name, s]));
178
+
179
+ for (const [name, service] of afterMap) {
180
+ if (!beforeMap.has(name)) {
181
+ diff.added.push(service);
182
+ }
183
+ }
184
+
185
+ for (const [name, service] of beforeMap) {
186
+ if (!afterMap.has(name)) {
187
+ diff.removed.push(service);
188
+ }
189
+ }
190
+
191
+ return diff;
192
+ }
193
+
194
+ module.exports = {
195
+ buildExternalContract,
196
+ validateExternalContract,
197
+ diffExternalContracts
198
+ };