@vibecheckai/cli 3.0.4 → 3.0.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bin/dev/run-v2-torture.js +30 -0
- package/bin/runners/context/index.js +1 -1
- package/bin/runners/lib/analyzers.js +38 -0
- package/bin/runners/lib/assets/vibecheck-logo.png +0 -0
- package/bin/runners/lib/contracts/auth-contract.js +8 -0
- package/bin/runners/lib/contracts/env-contract.js +3 -0
- package/bin/runners/lib/contracts/external-contract.js +10 -2
- package/bin/runners/lib/contracts/route-contract.js +7 -0
- package/bin/runners/lib/contracts.js +804 -0
- package/bin/runners/lib/detectors-v2.js +703 -0
- package/bin/runners/lib/drift.js +425 -0
- package/bin/runners/lib/entitlements-v2.js +3 -1
- package/bin/runners/lib/entitlements.js +11 -3
- package/bin/runners/lib/env-resolver.js +417 -0
- package/bin/runners/lib/extractors/client-calls.js +990 -0
- package/bin/runners/lib/extractors/fastify-route-dump.js +573 -0
- package/bin/runners/lib/extractors/fastify-routes.js +426 -0
- package/bin/runners/lib/extractors/index.js +363 -0
- package/bin/runners/lib/extractors/next-routes.js +524 -0
- package/bin/runners/lib/extractors/proof-graph.js +431 -0
- package/bin/runners/lib/extractors/route-matcher.js +451 -0
- package/bin/runners/lib/extractors/truthpack-v2.js +377 -0
- package/bin/runners/lib/extractors/ui-bindings.js +547 -0
- package/bin/runners/lib/findings-schema.js +281 -0
- package/bin/runners/lib/html-report.js +650 -0
- package/bin/runners/lib/missions/templates.js +45 -0
- package/bin/runners/lib/policy.js +295 -0
- package/bin/runners/lib/reality/correlation-detectors.js +359 -0
- package/bin/runners/lib/reality/index.js +318 -0
- package/bin/runners/lib/reality/request-hashing.js +416 -0
- package/bin/runners/lib/reality/request-mapper.js +453 -0
- package/bin/runners/lib/reality/safety-rails.js +463 -0
- package/bin/runners/lib/reality/semantic-snapshot.js +408 -0
- package/bin/runners/lib/reality/toast-detector.js +393 -0
- package/bin/runners/lib/report-html.js +5 -0
- package/bin/runners/lib/report-templates.js +5 -0
- package/bin/runners/lib/report.js +135 -0
- package/bin/runners/lib/route-truth.js +10 -10
- package/bin/runners/lib/schema-validator.js +350 -0
- package/bin/runners/lib/schemas/contracts.schema.json +160 -0
- package/bin/runners/lib/schemas/finding.schema.json +100 -0
- package/bin/runners/lib/schemas/mission-pack.schema.json +206 -0
- package/bin/runners/lib/schemas/proof-graph.schema.json +176 -0
- package/bin/runners/lib/schemas/reality-report.schema.json +162 -0
- package/bin/runners/lib/schemas/share-pack.schema.json +180 -0
- package/bin/runners/lib/schemas/ship-report.schema.json +117 -0
- package/bin/runners/lib/schemas/truthpack-v2.schema.json +303 -0
- package/bin/runners/lib/schemas/validator.js +438 -0
- package/bin/runners/lib/ui.js +562 -0
- package/bin/runners/lib/verdict-engine.js +628 -0
- package/bin/runners/runAIAgent.js +228 -1
- package/bin/runners/runBadge.js +181 -1
- package/bin/runners/runCtx.js +7 -2
- package/bin/runners/runCtxDiff.js +301 -0
- package/bin/runners/runGuard.js +168 -0
- package/bin/runners/runInitGha.js +78 -15
- package/bin/runners/runLabs.js +341 -0
- package/bin/runners/runLaunch.js +180 -1
- package/bin/runners/runMdc.js +203 -1
- package/bin/runners/runProof.zip +0 -0
- package/bin/runners/runProve.js +23 -0
- package/bin/runners/runReplay.js +114 -84
- package/bin/runners/runScan.js +111 -32
- package/bin/runners/runShip.js +23 -2
- package/bin/runners/runTruthpack.js +9 -7
- package/bin/runners/runValidate.js +161 -1
- package/bin/vibecheck.js +416 -770
- package/mcp-server/.guardrail/audit/audit.log.jsonl +2 -0
- package/mcp-server/.specs/architecture.mdc +90 -0
- package/mcp-server/.specs/security.mdc +30 -0
- package/mcp-server/README.md +252 -0
- package/mcp-server/agent-checkpoint.js +364 -0
- package/mcp-server/architect-tools.js +707 -0
- package/mcp-server/audit-mcp.js +206 -0
- package/mcp-server/codebase-architect-tools.js +838 -0
- package/mcp-server/consolidated-tools.js +804 -0
- package/mcp-server/hygiene-tools.js +428 -0
- package/mcp-server/index-v1.js +698 -0
- package/mcp-server/index.js +2092 -0
- package/mcp-server/index.old.js +4137 -0
- package/mcp-server/intelligence-tools.js +664 -0
- package/mcp-server/intent-drift-tools.js +873 -0
- package/mcp-server/mdc-generator.js +298 -0
- package/mcp-server/package-lock.json +165 -0
- package/mcp-server/package.json +47 -0
- package/mcp-server/premium-tools.js +1275 -0
- package/mcp-server/test-mcp.js +108 -0
- package/mcp-server/test-tools.js +36 -0
- package/mcp-server/tier-auth.js +147 -0
- package/mcp-server/tools/index.js +72 -0
- package/mcp-server/tools-reorganized.ts +244 -0
- package/mcp-server/truth-context.js +581 -0
- package/mcp-server/truth-firewall-tools.js +1500 -0
- package/mcp-server/vibecheck-2.0-tools.js +748 -0
- package/mcp-server/vibecheck-tools.js +1075 -0
- package/package.json +10 -8
- package/bin/guardrail.js +0 -834
- package/bin/runners/runAudit.js +0 -2
- package/bin/runners/runAutopilot.js +0 -2
- package/bin/runners/runCertify.js +0 -2
- package/bin/runners/runDashboard.js +0 -10
- package/bin/runners/runEnhancedShip.js +0 -2
- package/bin/runners/runFixPacks.js +0 -2
- package/bin/runners/runNaturalLanguage.js +0 -3
- package/bin/runners/runProof.js +0 -2
- package/bin/runners/runRealitySniff.js +0 -2
- package/bin/runners/runUpgrade.js +0 -2
- package/bin/runners/runVerifyAgentOutput.js +0 -2
|
@@ -134,6 +134,51 @@ function templateForMissionType(type) {
|
|
|
134
134
|
success: ["Dead UI findings disappear from ship (after running reality again)."]
|
|
135
135
|
};
|
|
136
136
|
|
|
137
|
+
case "SYNC_CONTRACTS":
|
|
138
|
+
return {
|
|
139
|
+
intent: "Update contracts to match current code reality. Drift causes AI hallucinations.",
|
|
140
|
+
do: [
|
|
141
|
+
"Run 'vibecheck ctx sync' to regenerate contracts from truthpack.",
|
|
142
|
+
"Review the diff to ensure changes are intentional.",
|
|
143
|
+
"Commit updated contracts alongside code changes."
|
|
144
|
+
],
|
|
145
|
+
dont: [
|
|
146
|
+
"Do not manually edit contract JSON files.",
|
|
147
|
+
"Do not ignore drift - it will cause AI to generate broken code."
|
|
148
|
+
],
|
|
149
|
+
success: ["Contract drift findings disappear from ship."]
|
|
150
|
+
};
|
|
151
|
+
|
|
152
|
+
case "FIX_ROUTE_DRIFT":
|
|
153
|
+
return {
|
|
154
|
+
intent: "Align route contract with actual server routes.",
|
|
155
|
+
do: [
|
|
156
|
+
"If route was intentionally added: run 'vibecheck ctx sync'.",
|
|
157
|
+
"If route was accidentally removed: restore it or update client refs.",
|
|
158
|
+
"If client refs fake route: fix the client to use real routes."
|
|
159
|
+
],
|
|
160
|
+
dont: [
|
|
161
|
+
"Do not invent routes to match client refs.",
|
|
162
|
+
"Do not remove routes without updating all client references."
|
|
163
|
+
],
|
|
164
|
+
success: ["Route drift findings disappear."]
|
|
165
|
+
};
|
|
166
|
+
|
|
167
|
+
case "FIX_AUTH_DRIFT":
|
|
168
|
+
return {
|
|
169
|
+
intent: "Align auth contract with actual middleware patterns.",
|
|
170
|
+
do: [
|
|
171
|
+
"If auth pattern was intentionally changed: run 'vibecheck ctx sync'.",
|
|
172
|
+
"If auth was accidentally removed: RESTORE IT IMMEDIATELY (security risk).",
|
|
173
|
+
"Verify all sensitive routes are still protected."
|
|
174
|
+
],
|
|
175
|
+
dont: [
|
|
176
|
+
"Do not remove auth patterns without security review.",
|
|
177
|
+
"Do not ignore auth drift - it may indicate a security regression."
|
|
178
|
+
],
|
|
179
|
+
success: ["Auth drift findings disappear."]
|
|
180
|
+
};
|
|
181
|
+
|
|
137
182
|
default:
|
|
138
183
|
return {
|
|
139
184
|
intent: "Fix the specific finding with smallest correct patch.",
|
|
@@ -0,0 +1,295 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Policy Presets v2
|
|
3
|
+
*
|
|
4
|
+
* Pre-configured policy settings so users don't have to bikeshed.
|
|
5
|
+
*/
|
|
6
|
+
|
|
7
|
+
"use strict";
|
|
8
|
+
|
|
9
|
+
const fs = require("fs");
|
|
10
|
+
const path = require("path");
|
|
11
|
+
|
|
12
|
+
// =============================================================================
|
|
13
|
+
// POLICY PRESETS
|
|
14
|
+
// =============================================================================
|
|
15
|
+
|
|
16
|
+
const POLICY_PRESETS = {
|
|
17
|
+
/**
|
|
18
|
+
* DEV: Warn-heavy, low thresholds
|
|
19
|
+
* For local development - informative but not blocking
|
|
20
|
+
*/
|
|
21
|
+
dev: {
|
|
22
|
+
name: "dev",
|
|
23
|
+
description: "Development mode - warn-heavy, informative",
|
|
24
|
+
failOnWarn: false,
|
|
25
|
+
coverage: {
|
|
26
|
+
minActionCoverage: 0,
|
|
27
|
+
minRouteCoverage: 0,
|
|
28
|
+
requireAuthCoverage: false,
|
|
29
|
+
},
|
|
30
|
+
fastify: {
|
|
31
|
+
requireRuntimeDump: false,
|
|
32
|
+
allowStaticOnlyRoutes: true,
|
|
33
|
+
},
|
|
34
|
+
auth: {
|
|
35
|
+
requireVerifyAuth: false,
|
|
36
|
+
strictProtectedPatterns: false,
|
|
37
|
+
},
|
|
38
|
+
findings: {
|
|
39
|
+
// Downgrade some blockers to warnings in dev
|
|
40
|
+
downgradeToWarn: [
|
|
41
|
+
"D_ROUTE_MISSING", // Missing routes less critical in dev
|
|
42
|
+
"D_CONTRACT_DRIFT", // Drift expected during dev
|
|
43
|
+
],
|
|
44
|
+
},
|
|
45
|
+
output: {
|
|
46
|
+
generateHTML: true,
|
|
47
|
+
verboseConsole: true,
|
|
48
|
+
},
|
|
49
|
+
},
|
|
50
|
+
|
|
51
|
+
/**
|
|
52
|
+
* CI: Strict enough to block bad PRs
|
|
53
|
+
* Default for CI pipelines
|
|
54
|
+
*/
|
|
55
|
+
ci: {
|
|
56
|
+
name: "ci",
|
|
57
|
+
description: "CI mode - strict, blocks on real issues",
|
|
58
|
+
failOnWarn: false,
|
|
59
|
+
coverage: {
|
|
60
|
+
minActionCoverage: 0, // Don't require coverage yet
|
|
61
|
+
minRouteCoverage: 0,
|
|
62
|
+
requireAuthCoverage: false,
|
|
63
|
+
},
|
|
64
|
+
fastify: {
|
|
65
|
+
requireRuntimeDump: false, // Optional but recommended
|
|
66
|
+
allowStaticOnlyRoutes: true,
|
|
67
|
+
},
|
|
68
|
+
auth: {
|
|
69
|
+
requireVerifyAuth: false, // Only if auth patterns exist
|
|
70
|
+
strictProtectedPatterns: true,
|
|
71
|
+
},
|
|
72
|
+
findings: {
|
|
73
|
+
downgradeToWarn: [],
|
|
74
|
+
},
|
|
75
|
+
output: {
|
|
76
|
+
generateHTML: true,
|
|
77
|
+
verboseConsole: false,
|
|
78
|
+
},
|
|
79
|
+
},
|
|
80
|
+
|
|
81
|
+
/**
|
|
82
|
+
* RELEASE: Production-ready checks
|
|
83
|
+
* Strictest mode for release gates
|
|
84
|
+
*/
|
|
85
|
+
release: {
|
|
86
|
+
name: "release",
|
|
87
|
+
description: "Release mode - requires coverage if patterns exist",
|
|
88
|
+
failOnWarn: true,
|
|
89
|
+
coverage: {
|
|
90
|
+
minActionCoverage: 50, // At least 50% of UI actions verified
|
|
91
|
+
minRouteCoverage: 80, // At least 80% of routes covered
|
|
92
|
+
requireAuthCoverage: true, // If auth patterns exist, verify them
|
|
93
|
+
minAuthCoverage: 80,
|
|
94
|
+
},
|
|
95
|
+
fastify: {
|
|
96
|
+
requireRuntimeDump: true, // Must run runtime dump for Fastify
|
|
97
|
+
allowStaticOnlyRoutes: false,
|
|
98
|
+
},
|
|
99
|
+
auth: {
|
|
100
|
+
requireVerifyAuth: true, // Must verify auth if patterns exist
|
|
101
|
+
strictProtectedPatterns: true,
|
|
102
|
+
},
|
|
103
|
+
findings: {
|
|
104
|
+
downgradeToWarn: [],
|
|
105
|
+
upgradeToBlock: [
|
|
106
|
+
"D_FAKE_SUCCESS", // Fake success is blocking in release
|
|
107
|
+
"D_DEAD_CLICK", // Dead clicks are blocking in release
|
|
108
|
+
],
|
|
109
|
+
},
|
|
110
|
+
output: {
|
|
111
|
+
generateHTML: true,
|
|
112
|
+
verboseConsole: false,
|
|
113
|
+
},
|
|
114
|
+
},
|
|
115
|
+
};
|
|
116
|
+
|
|
117
|
+
// =============================================================================
|
|
118
|
+
// POLICY RESOLUTION
|
|
119
|
+
// =============================================================================
|
|
120
|
+
|
|
121
|
+
/**
|
|
122
|
+
* Load policy from file or preset
|
|
123
|
+
*/
|
|
124
|
+
function loadPolicy(options = {}) {
|
|
125
|
+
const {
|
|
126
|
+
preset = "ci",
|
|
127
|
+
policyFile = null,
|
|
128
|
+
repoRoot = process.cwd(),
|
|
129
|
+
overrides = {},
|
|
130
|
+
} = options;
|
|
131
|
+
|
|
132
|
+
let policy;
|
|
133
|
+
|
|
134
|
+
// Try loading from file first
|
|
135
|
+
if (policyFile) {
|
|
136
|
+
const policyPath = path.isAbsolute(policyFile)
|
|
137
|
+
? policyFile
|
|
138
|
+
: path.join(repoRoot, policyFile);
|
|
139
|
+
|
|
140
|
+
if (fs.existsSync(policyPath)) {
|
|
141
|
+
try {
|
|
142
|
+
policy = JSON.parse(fs.readFileSync(policyPath, "utf8"));
|
|
143
|
+
} catch (e) {
|
|
144
|
+
console.warn(`Warning: Could not parse policy file ${policyPath}: ${e.message}`);
|
|
145
|
+
}
|
|
146
|
+
}
|
|
147
|
+
}
|
|
148
|
+
|
|
149
|
+
// Try loading from .vibecheck/policy.json
|
|
150
|
+
if (!policy) {
|
|
151
|
+
const defaultPolicyPath = path.join(repoRoot, ".vibecheck", "policy.json");
|
|
152
|
+
if (fs.existsSync(defaultPolicyPath)) {
|
|
153
|
+
try {
|
|
154
|
+
policy = JSON.parse(fs.readFileSync(defaultPolicyPath, "utf8"));
|
|
155
|
+
} catch (e) {
|
|
156
|
+
// Ignore parse errors for default file
|
|
157
|
+
}
|
|
158
|
+
}
|
|
159
|
+
}
|
|
160
|
+
|
|
161
|
+
// Fall back to preset
|
|
162
|
+
if (!policy) {
|
|
163
|
+
policy = POLICY_PRESETS[preset] || POLICY_PRESETS.ci;
|
|
164
|
+
}
|
|
165
|
+
|
|
166
|
+
// Apply overrides
|
|
167
|
+
return mergePolicy(policy, overrides);
|
|
168
|
+
}
|
|
169
|
+
|
|
170
|
+
/**
|
|
171
|
+
* Deep merge policy with overrides
|
|
172
|
+
*/
|
|
173
|
+
function mergePolicy(base, overrides) {
|
|
174
|
+
const merged = JSON.parse(JSON.stringify(base));
|
|
175
|
+
|
|
176
|
+
for (const [key, value] of Object.entries(overrides)) {
|
|
177
|
+
if (value === undefined) continue;
|
|
178
|
+
|
|
179
|
+
if (typeof value === "object" && value !== null && !Array.isArray(value)) {
|
|
180
|
+
merged[key] = mergePolicy(merged[key] || {}, value);
|
|
181
|
+
} else {
|
|
182
|
+
merged[key] = value;
|
|
183
|
+
}
|
|
184
|
+
}
|
|
185
|
+
|
|
186
|
+
return merged;
|
|
187
|
+
}
|
|
188
|
+
|
|
189
|
+
/**
|
|
190
|
+
* Get effective thresholds from policy
|
|
191
|
+
*/
|
|
192
|
+
function getThresholdsFromPolicy(policy) {
|
|
193
|
+
return {
|
|
194
|
+
minActionCoverage: policy.coverage?.minActionCoverage ?? 0,
|
|
195
|
+
minRouteCoverage: policy.coverage?.minRouteCoverage ?? 0,
|
|
196
|
+
requireAuthCoverage: policy.coverage?.requireAuthCoverage ?? false,
|
|
197
|
+
minAuthCoverage: policy.coverage?.minAuthCoverage ?? 80,
|
|
198
|
+
};
|
|
199
|
+
}
|
|
200
|
+
|
|
201
|
+
/**
|
|
202
|
+
* Apply policy to findings (downgrades/upgrades)
|
|
203
|
+
*/
|
|
204
|
+
function applyPolicyToFindings(findings, policy) {
|
|
205
|
+
const downgrade = new Set(policy.findings?.downgradeToWarn || []);
|
|
206
|
+
const upgrade = new Set(policy.findings?.upgradeToBlock || []);
|
|
207
|
+
|
|
208
|
+
return findings.map(finding => {
|
|
209
|
+
if (downgrade.has(finding.detectorId) && finding.severity === "BLOCK") {
|
|
210
|
+
return {
|
|
211
|
+
...finding,
|
|
212
|
+
severity: "WARN",
|
|
213
|
+
originalSeverity: "BLOCK",
|
|
214
|
+
policyDowngraded: true,
|
|
215
|
+
};
|
|
216
|
+
}
|
|
217
|
+
|
|
218
|
+
if (upgrade.has(finding.detectorId) && finding.severity === "WARN") {
|
|
219
|
+
return {
|
|
220
|
+
...finding,
|
|
221
|
+
severity: "BLOCK",
|
|
222
|
+
originalSeverity: "WARN",
|
|
223
|
+
policyUpgraded: true,
|
|
224
|
+
};
|
|
225
|
+
}
|
|
226
|
+
|
|
227
|
+
return finding;
|
|
228
|
+
});
|
|
229
|
+
}
|
|
230
|
+
|
|
231
|
+
/**
|
|
232
|
+
* Check if auth verification is required based on policy and truthpack
|
|
233
|
+
*/
|
|
234
|
+
function requiresAuthVerification(policy, truthpack) {
|
|
235
|
+
if (!policy.auth?.requireVerifyAuth) return false;
|
|
236
|
+
|
|
237
|
+
// Only require if auth patterns exist
|
|
238
|
+
const hasAuthPatterns = truthpack?.auth?.protectedPatterns?.length > 0;
|
|
239
|
+
return hasAuthPatterns;
|
|
240
|
+
}
|
|
241
|
+
|
|
242
|
+
/**
|
|
243
|
+
* Check if Fastify runtime dump is required
|
|
244
|
+
*/
|
|
245
|
+
function requiresFastifyRuntimeDump(policy, truthpack) {
|
|
246
|
+
if (!policy.fastify?.requireRuntimeDump) return false;
|
|
247
|
+
|
|
248
|
+
// Only require if Fastify is detected
|
|
249
|
+
const hasFastify = truthpack?.stack?.fastify?.present;
|
|
250
|
+
return hasFastify;
|
|
251
|
+
}
|
|
252
|
+
|
|
253
|
+
/**
|
|
254
|
+
* Write policy file
|
|
255
|
+
*/
|
|
256
|
+
function writePolicyFile(repoRoot, policy) {
|
|
257
|
+
const dir = path.join(repoRoot, ".vibecheck");
|
|
258
|
+
fs.mkdirSync(dir, { recursive: true });
|
|
259
|
+
|
|
260
|
+
const policyPath = path.join(dir, "policy.json");
|
|
261
|
+
fs.writeFileSync(policyPath, JSON.stringify(policy, null, 2));
|
|
262
|
+
|
|
263
|
+
return policyPath;
|
|
264
|
+
}
|
|
265
|
+
|
|
266
|
+
/**
|
|
267
|
+
* Get preset names
|
|
268
|
+
*/
|
|
269
|
+
function getPresetNames() {
|
|
270
|
+
return Object.keys(POLICY_PRESETS);
|
|
271
|
+
}
|
|
272
|
+
|
|
273
|
+
/**
|
|
274
|
+
* Get preset by name
|
|
275
|
+
*/
|
|
276
|
+
function getPreset(name) {
|
|
277
|
+
return POLICY_PRESETS[name] || null;
|
|
278
|
+
}
|
|
279
|
+
|
|
280
|
+
// =============================================================================
|
|
281
|
+
// EXPORTS
|
|
282
|
+
// =============================================================================
|
|
283
|
+
|
|
284
|
+
module.exports = {
|
|
285
|
+
POLICY_PRESETS,
|
|
286
|
+
loadPolicy,
|
|
287
|
+
mergePolicy,
|
|
288
|
+
getThresholdsFromPolicy,
|
|
289
|
+
applyPolicyToFindings,
|
|
290
|
+
requiresAuthVerification,
|
|
291
|
+
requiresFastifyRuntimeDump,
|
|
292
|
+
writePolicyFile,
|
|
293
|
+
getPresetNames,
|
|
294
|
+
getPreset,
|
|
295
|
+
};
|
|
@@ -0,0 +1,359 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Correlation Detectors v2
|
|
3
|
+
*
|
|
4
|
+
* Detects mismatches between toast signals, UI changes, and network requests.
|
|
5
|
+
* These are the "fake success theatre" detectors.
|
|
6
|
+
*/
|
|
7
|
+
|
|
8
|
+
"use strict";
|
|
9
|
+
|
|
10
|
+
const crypto = require("crypto");
|
|
11
|
+
|
|
12
|
+
// =============================================================================
|
|
13
|
+
// DETECTOR DEFINITIONS
|
|
14
|
+
// =============================================================================
|
|
15
|
+
|
|
16
|
+
const DETECTORS = {
|
|
17
|
+
D_CORR_012: {
|
|
18
|
+
id: "D_CORR_012",
|
|
19
|
+
name: "Success toast but no real change",
|
|
20
|
+
description: "Success toast appeared but UI didn't change meaningfully and no mutation succeeded",
|
|
21
|
+
severity: "BLOCK",
|
|
22
|
+
category: "FakeSuccess",
|
|
23
|
+
},
|
|
24
|
+
D_CORR_013: {
|
|
25
|
+
id: "D_CORR_013",
|
|
26
|
+
name: "Mutation succeeded but no UI feedback",
|
|
27
|
+
description: "Mutation request succeeded but no meaningful UI change or toast appeared",
|
|
28
|
+
severity: "WARN",
|
|
29
|
+
category: "DeadUI",
|
|
30
|
+
},
|
|
31
|
+
D_CORR_014: {
|
|
32
|
+
id: "D_CORR_014",
|
|
33
|
+
name: "Error toast with successful mutation",
|
|
34
|
+
description: "Error toast appeared but the mutation request succeeded",
|
|
35
|
+
severity: "WARN",
|
|
36
|
+
category: "UIMismatch",
|
|
37
|
+
},
|
|
38
|
+
D_CORR_015: {
|
|
39
|
+
id: "D_CORR_015",
|
|
40
|
+
name: "Click with no effect",
|
|
41
|
+
description: "Button/link clicked but no network request, no UI change, no toast",
|
|
42
|
+
severity: "BLOCK",
|
|
43
|
+
category: "DeadUI",
|
|
44
|
+
},
|
|
45
|
+
D_CORR_016: {
|
|
46
|
+
id: "D_CORR_016",
|
|
47
|
+
name: "Form submit with no validation feedback",
|
|
48
|
+
description: "Form submitted but no validation errors shown and no success indicator",
|
|
49
|
+
severity: "WARN",
|
|
50
|
+
category: "DeadUI",
|
|
51
|
+
},
|
|
52
|
+
D_CORR_017: {
|
|
53
|
+
id: "D_CORR_017",
|
|
54
|
+
name: "Optimistic update without server confirmation",
|
|
55
|
+
description: "UI updated immediately but server request failed or never completed",
|
|
56
|
+
severity: "BLOCK",
|
|
57
|
+
category: "FakeSuccess",
|
|
58
|
+
},
|
|
59
|
+
D_CORR_018: {
|
|
60
|
+
id: "D_CORR_018",
|
|
61
|
+
name: "Success toast before request completed",
|
|
62
|
+
description: "Success toast appeared before the mutation request finished",
|
|
63
|
+
severity: "BLOCK",
|
|
64
|
+
category: "FakeSuccess",
|
|
65
|
+
},
|
|
66
|
+
};
|
|
67
|
+
|
|
68
|
+
// =============================================================================
|
|
69
|
+
// CORRELATION ANALYSIS
|
|
70
|
+
// =============================================================================
|
|
71
|
+
|
|
72
|
+
/**
|
|
73
|
+
* Analyze action outcomes and detect correlation issues
|
|
74
|
+
*/
|
|
75
|
+
function analyzeActionCorrelation(action, options = {}) {
|
|
76
|
+
const findings = [];
|
|
77
|
+
const {
|
|
78
|
+
uiChange = {},
|
|
79
|
+
signals = [],
|
|
80
|
+
requests = [],
|
|
81
|
+
actionType = "click",
|
|
82
|
+
actionLabel = "",
|
|
83
|
+
} = action;
|
|
84
|
+
|
|
85
|
+
const { meaningfulScoreThreshold = 0.6 } = options;
|
|
86
|
+
|
|
87
|
+
// Extract key data
|
|
88
|
+
const toastSuccess = signals.find(s => s.kind === "toast_success");
|
|
89
|
+
const toastError = signals.find(s => s.kind === "toast_error");
|
|
90
|
+
const toastAny = signals.find(s => s.kind?.startsWith("toast_"));
|
|
91
|
+
|
|
92
|
+
const mutationRequests = requests.filter(r =>
|
|
93
|
+
["POST", "PUT", "PATCH", "DELETE"].includes(r.method?.toUpperCase())
|
|
94
|
+
);
|
|
95
|
+
const successfulMutations = mutationRequests.filter(r => r.status >= 200 && r.status < 300);
|
|
96
|
+
const failedMutations = mutationRequests.filter(r => r.status >= 400 || r.failed);
|
|
97
|
+
|
|
98
|
+
const hasMeaningfulChange = uiChange.meaningful === true || uiChange.score >= meaningfulScoreThreshold;
|
|
99
|
+
const hasNetworkActivity = requests.length > 0;
|
|
100
|
+
const hasMutation = mutationRequests.length > 0;
|
|
101
|
+
|
|
102
|
+
// D_CORR_012: Success toast but no real change
|
|
103
|
+
if (toastSuccess && !hasMeaningfulChange && successfulMutations.length === 0) {
|
|
104
|
+
findings.push(createFinding(DETECTORS.D_CORR_012, {
|
|
105
|
+
action,
|
|
106
|
+
evidence: {
|
|
107
|
+
toast: toastSuccess,
|
|
108
|
+
uiChangeScore: uiChange.score,
|
|
109
|
+
mutations: mutationRequests.length,
|
|
110
|
+
successfulMutations: successfulMutations.length,
|
|
111
|
+
},
|
|
112
|
+
reason: `Success toast "${toastSuccess.message?.slice(0, 50)}" appeared but UI score was ${uiChange.score?.toFixed(2)} and no mutation succeeded`,
|
|
113
|
+
}));
|
|
114
|
+
}
|
|
115
|
+
|
|
116
|
+
// D_CORR_013: Mutation succeeded but no UI feedback
|
|
117
|
+
if (successfulMutations.length > 0 && !hasMeaningfulChange && !toastAny) {
|
|
118
|
+
findings.push(createFinding(DETECTORS.D_CORR_013, {
|
|
119
|
+
action,
|
|
120
|
+
evidence: {
|
|
121
|
+
successfulMutations: successfulMutations.map(r => ({ method: r.method, url: r.url, status: r.status })),
|
|
122
|
+
uiChangeScore: uiChange.score,
|
|
123
|
+
hasToast: false,
|
|
124
|
+
},
|
|
125
|
+
reason: `Mutation ${successfulMutations[0]?.method} ${successfulMutations[0]?.url} succeeded (${successfulMutations[0]?.status}) but no UI feedback`,
|
|
126
|
+
}));
|
|
127
|
+
}
|
|
128
|
+
|
|
129
|
+
// D_CORR_014: Error toast with successful mutation
|
|
130
|
+
if (toastError && successfulMutations.length > 0 && failedMutations.length === 0) {
|
|
131
|
+
findings.push(createFinding(DETECTORS.D_CORR_014, {
|
|
132
|
+
action,
|
|
133
|
+
evidence: {
|
|
134
|
+
toast: toastError,
|
|
135
|
+
successfulMutations: successfulMutations.map(r => ({ method: r.method, url: r.url, status: r.status })),
|
|
136
|
+
},
|
|
137
|
+
reason: `Error toast "${toastError.message?.slice(0, 50)}" but mutation succeeded with ${successfulMutations[0]?.status}`,
|
|
138
|
+
}));
|
|
139
|
+
}
|
|
140
|
+
|
|
141
|
+
// D_CORR_015: Click with no effect
|
|
142
|
+
if (actionType === "click" && !hasNetworkActivity && !hasMeaningfulChange && !toastAny) {
|
|
143
|
+
// Only flag if it looks like an interactive element
|
|
144
|
+
const isInteractive = actionLabel && (
|
|
145
|
+
/save|submit|send|update|delete|create|add|remove/i.test(actionLabel)
|
|
146
|
+
);
|
|
147
|
+
|
|
148
|
+
if (isInteractive) {
|
|
149
|
+
findings.push(createFinding(DETECTORS.D_CORR_015, {
|
|
150
|
+
action,
|
|
151
|
+
evidence: {
|
|
152
|
+
actionLabel,
|
|
153
|
+
uiChangeScore: uiChange.score,
|
|
154
|
+
requestCount: requests.length,
|
|
155
|
+
hasToast: !!toastAny,
|
|
156
|
+
},
|
|
157
|
+
reason: `Click on "${actionLabel}" had no network request, no UI change, no toast`,
|
|
158
|
+
}));
|
|
159
|
+
}
|
|
160
|
+
}
|
|
161
|
+
|
|
162
|
+
// D_CORR_017: Optimistic update without server confirmation
|
|
163
|
+
if (uiChange.meaningful && hasMutation && failedMutations.length > 0 && successfulMutations.length === 0) {
|
|
164
|
+
findings.push(createFinding(DETECTORS.D_CORR_017, {
|
|
165
|
+
action,
|
|
166
|
+
evidence: {
|
|
167
|
+
uiChangeReasons: uiChange.reasons,
|
|
168
|
+
failedMutations: failedMutations.map(r => ({ method: r.method, url: r.url, status: r.status })),
|
|
169
|
+
},
|
|
170
|
+
reason: `UI updated (${uiChange.reasons?.join(", ")}) but mutation failed with ${failedMutations[0]?.status}`,
|
|
171
|
+
}));
|
|
172
|
+
}
|
|
173
|
+
|
|
174
|
+
// D_CORR_018: Success toast before request completed
|
|
175
|
+
if (toastSuccess && mutationRequests.length > 0) {
|
|
176
|
+
const toastTime = toastSuccess.atMs;
|
|
177
|
+
const pendingAtToastTime = mutationRequests.filter(r => {
|
|
178
|
+
// Request was still pending when toast appeared
|
|
179
|
+
const requestEndTime = r.startTime + (r.duration || 0);
|
|
180
|
+
return r.startTime < toastTime && requestEndTime > toastTime;
|
|
181
|
+
});
|
|
182
|
+
|
|
183
|
+
if (pendingAtToastTime.length > 0) {
|
|
184
|
+
findings.push(createFinding(DETECTORS.D_CORR_018, {
|
|
185
|
+
action,
|
|
186
|
+
evidence: {
|
|
187
|
+
toast: toastSuccess,
|
|
188
|
+
toastTime,
|
|
189
|
+
pendingRequests: pendingAtToastTime.map(r => ({
|
|
190
|
+
method: r.method,
|
|
191
|
+
url: r.url,
|
|
192
|
+
startTime: r.startTime,
|
|
193
|
+
duration: r.duration,
|
|
194
|
+
})),
|
|
195
|
+
},
|
|
196
|
+
reason: `Success toast appeared at ${toastTime}ms but request was still pending`,
|
|
197
|
+
}));
|
|
198
|
+
}
|
|
199
|
+
}
|
|
200
|
+
|
|
201
|
+
return findings;
|
|
202
|
+
}
|
|
203
|
+
|
|
204
|
+
/**
|
|
205
|
+
* Analyze multiple actions and aggregate findings
|
|
206
|
+
*/
|
|
207
|
+
function analyzeAllActions(actions, options = {}) {
|
|
208
|
+
const allFindings = [];
|
|
209
|
+
|
|
210
|
+
for (const action of actions) {
|
|
211
|
+
const findings = analyzeActionCorrelation(action, options);
|
|
212
|
+
allFindings.push(...findings);
|
|
213
|
+
}
|
|
214
|
+
|
|
215
|
+
// Dedupe by fingerprint
|
|
216
|
+
const seen = new Set();
|
|
217
|
+
const deduped = [];
|
|
218
|
+
for (const f of allFindings) {
|
|
219
|
+
if (!seen.has(f.fingerprint)) {
|
|
220
|
+
seen.add(f.fingerprint);
|
|
221
|
+
deduped.push(f);
|
|
222
|
+
}
|
|
223
|
+
}
|
|
224
|
+
|
|
225
|
+
return {
|
|
226
|
+
findings: deduped,
|
|
227
|
+
stats: {
|
|
228
|
+
totalActions: actions.length,
|
|
229
|
+
actionsWithFindings: new Set(allFindings.map(f => f.actionId)).size,
|
|
230
|
+
findingsByDetector: countByDetector(deduped),
|
|
231
|
+
findingsBySeverity: countBySeverity(deduped),
|
|
232
|
+
},
|
|
233
|
+
};
|
|
234
|
+
}
|
|
235
|
+
|
|
236
|
+
/**
|
|
237
|
+
* Create a finding from detector definition
|
|
238
|
+
*/
|
|
239
|
+
function createFinding(detector, data = {}) {
|
|
240
|
+
const { action, evidence, reason } = data;
|
|
241
|
+
|
|
242
|
+
const fingerprint = generateFingerprint([
|
|
243
|
+
detector.id,
|
|
244
|
+
action?.id || action?.selector || "",
|
|
245
|
+
reason,
|
|
246
|
+
]);
|
|
247
|
+
|
|
248
|
+
return {
|
|
249
|
+
id: `F_${detector.id}_${fingerprint.slice(0, 8)}`,
|
|
250
|
+
detectorId: detector.id,
|
|
251
|
+
fingerprint: `sha256:${fingerprint}`,
|
|
252
|
+
severity: detector.severity,
|
|
253
|
+
category: detector.category,
|
|
254
|
+
scope: "runtime",
|
|
255
|
+
title: detector.name,
|
|
256
|
+
why: reason || detector.description,
|
|
257
|
+
confidence: "high",
|
|
258
|
+
evidence: [
|
|
259
|
+
{
|
|
260
|
+
id: `E_${fingerprint.slice(0, 12)}`,
|
|
261
|
+
kind: "runtime",
|
|
262
|
+
reason,
|
|
263
|
+
data: evidence,
|
|
264
|
+
},
|
|
265
|
+
],
|
|
266
|
+
actionId: action?.id,
|
|
267
|
+
repro: action?.selector ? `Click on "${action.selector}"` : null,
|
|
268
|
+
};
|
|
269
|
+
}
|
|
270
|
+
|
|
271
|
+
/**
|
|
272
|
+
* Generate deterministic fingerprint
|
|
273
|
+
*/
|
|
274
|
+
function generateFingerprint(parts) {
|
|
275
|
+
const content = parts.filter(Boolean).join("|");
|
|
276
|
+
return crypto.createHash("sha256").update(content).digest("hex");
|
|
277
|
+
}
|
|
278
|
+
|
|
279
|
+
/**
|
|
280
|
+
* Count findings by detector
|
|
281
|
+
*/
|
|
282
|
+
function countByDetector(findings) {
|
|
283
|
+
const counts = {};
|
|
284
|
+
for (const f of findings) {
|
|
285
|
+
counts[f.detectorId] = (counts[f.detectorId] || 0) + 1;
|
|
286
|
+
}
|
|
287
|
+
return counts;
|
|
288
|
+
}
|
|
289
|
+
|
|
290
|
+
/**
|
|
291
|
+
* Count findings by severity
|
|
292
|
+
*/
|
|
293
|
+
function countBySeverity(findings) {
|
|
294
|
+
const counts = { BLOCK: 0, WARN: 0, INFO: 0 };
|
|
295
|
+
for (const f of findings) {
|
|
296
|
+
counts[f.severity] = (counts[f.severity] || 0) + 1;
|
|
297
|
+
}
|
|
298
|
+
return counts;
|
|
299
|
+
}
|
|
300
|
+
|
|
301
|
+
/**
|
|
302
|
+
* Summarize action outcome for reporting
|
|
303
|
+
*/
|
|
304
|
+
function summarizeActionOutcome(action) {
|
|
305
|
+
const {
|
|
306
|
+
uiChange = {},
|
|
307
|
+
signals = [],
|
|
308
|
+
requests = [],
|
|
309
|
+
selector = "",
|
|
310
|
+
actionType = "click",
|
|
311
|
+
} = action;
|
|
312
|
+
|
|
313
|
+
const toasts = signals.filter(s => s.kind?.startsWith("toast_"));
|
|
314
|
+
const mutations = requests.filter(r =>
|
|
315
|
+
["POST", "PUT", "PATCH", "DELETE"].includes(r.method?.toUpperCase())
|
|
316
|
+
);
|
|
317
|
+
const successfulMutations = mutations.filter(r => r.status >= 200 && r.status < 300);
|
|
318
|
+
|
|
319
|
+
let outcome = "unknown";
|
|
320
|
+
|
|
321
|
+
if (successfulMutations.length > 0 && uiChange.meaningful) {
|
|
322
|
+
outcome = "success_confirmed";
|
|
323
|
+
} else if (successfulMutations.length > 0 && !uiChange.meaningful) {
|
|
324
|
+
outcome = "success_silent";
|
|
325
|
+
} else if (mutations.length > 0 && successfulMutations.length === 0) {
|
|
326
|
+
outcome = "mutation_failed";
|
|
327
|
+
} else if (toasts.some(t => t.kind === "toast_success")) {
|
|
328
|
+
outcome = successfulMutations.length > 0 ? "success_confirmed" : "toast_only";
|
|
329
|
+
} else if (toasts.some(t => t.kind === "toast_error")) {
|
|
330
|
+
outcome = "error_shown";
|
|
331
|
+
} else if (!uiChange.meaningful && requests.length === 0) {
|
|
332
|
+
outcome = "no_effect";
|
|
333
|
+
} else if (uiChange.meaningful) {
|
|
334
|
+
outcome = "ui_changed";
|
|
335
|
+
}
|
|
336
|
+
|
|
337
|
+
return {
|
|
338
|
+
actionType,
|
|
339
|
+
selector,
|
|
340
|
+
outcome,
|
|
341
|
+
uiChangeScore: uiChange.score,
|
|
342
|
+
uiChangeMeaningful: uiChange.meaningful,
|
|
343
|
+
uiChangeReasons: uiChange.reasons || [],
|
|
344
|
+
toastCount: toasts.length,
|
|
345
|
+
toastKinds: toasts.map(t => t.kind),
|
|
346
|
+
requestCount: requests.length,
|
|
347
|
+
mutationCount: mutations.length,
|
|
348
|
+
successfulMutationCount: successfulMutations.length,
|
|
349
|
+
};
|
|
350
|
+
}
|
|
351
|
+
|
|
352
|
+
module.exports = {
|
|
353
|
+
DETECTORS,
|
|
354
|
+
analyzeActionCorrelation,
|
|
355
|
+
analyzeAllActions,
|
|
356
|
+
createFinding,
|
|
357
|
+
summarizeActionOutcome,
|
|
358
|
+
generateFingerprint,
|
|
359
|
+
};
|