@vibecheckai/cli 3.0.4 → 3.0.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (108) hide show
  1. package/bin/dev/run-v2-torture.js +30 -0
  2. package/bin/runners/context/index.js +1 -1
  3. package/bin/runners/lib/analyzers.js +38 -0
  4. package/bin/runners/lib/assets/vibecheck-logo.png +0 -0
  5. package/bin/runners/lib/contracts/auth-contract.js +8 -0
  6. package/bin/runners/lib/contracts/env-contract.js +3 -0
  7. package/bin/runners/lib/contracts/external-contract.js +10 -2
  8. package/bin/runners/lib/contracts/route-contract.js +7 -0
  9. package/bin/runners/lib/contracts.js +804 -0
  10. package/bin/runners/lib/detectors-v2.js +703 -0
  11. package/bin/runners/lib/drift.js +425 -0
  12. package/bin/runners/lib/entitlements-v2.js +3 -1
  13. package/bin/runners/lib/entitlements.js +11 -3
  14. package/bin/runners/lib/env-resolver.js +417 -0
  15. package/bin/runners/lib/extractors/client-calls.js +990 -0
  16. package/bin/runners/lib/extractors/fastify-route-dump.js +573 -0
  17. package/bin/runners/lib/extractors/fastify-routes.js +426 -0
  18. package/bin/runners/lib/extractors/index.js +363 -0
  19. package/bin/runners/lib/extractors/next-routes.js +524 -0
  20. package/bin/runners/lib/extractors/proof-graph.js +431 -0
  21. package/bin/runners/lib/extractors/route-matcher.js +451 -0
  22. package/bin/runners/lib/extractors/truthpack-v2.js +377 -0
  23. package/bin/runners/lib/extractors/ui-bindings.js +547 -0
  24. package/bin/runners/lib/findings-schema.js +281 -0
  25. package/bin/runners/lib/html-report.js +650 -0
  26. package/bin/runners/lib/missions/templates.js +45 -0
  27. package/bin/runners/lib/policy.js +295 -0
  28. package/bin/runners/lib/reality/correlation-detectors.js +359 -0
  29. package/bin/runners/lib/reality/index.js +318 -0
  30. package/bin/runners/lib/reality/request-hashing.js +416 -0
  31. package/bin/runners/lib/reality/request-mapper.js +453 -0
  32. package/bin/runners/lib/reality/safety-rails.js +463 -0
  33. package/bin/runners/lib/reality/semantic-snapshot.js +408 -0
  34. package/bin/runners/lib/reality/toast-detector.js +393 -0
  35. package/bin/runners/lib/report-html.js +5 -0
  36. package/bin/runners/lib/report-templates.js +5 -0
  37. package/bin/runners/lib/report.js +135 -0
  38. package/bin/runners/lib/route-truth.js +10 -10
  39. package/bin/runners/lib/schema-validator.js +350 -0
  40. package/bin/runners/lib/schemas/contracts.schema.json +160 -0
  41. package/bin/runners/lib/schemas/finding.schema.json +100 -0
  42. package/bin/runners/lib/schemas/mission-pack.schema.json +206 -0
  43. package/bin/runners/lib/schemas/proof-graph.schema.json +176 -0
  44. package/bin/runners/lib/schemas/reality-report.schema.json +162 -0
  45. package/bin/runners/lib/schemas/share-pack.schema.json +180 -0
  46. package/bin/runners/lib/schemas/ship-report.schema.json +117 -0
  47. package/bin/runners/lib/schemas/truthpack-v2.schema.json +303 -0
  48. package/bin/runners/lib/schemas/validator.js +438 -0
  49. package/bin/runners/lib/ui.js +562 -0
  50. package/bin/runners/lib/verdict-engine.js +628 -0
  51. package/bin/runners/runAIAgent.js +228 -1
  52. package/bin/runners/runBadge.js +181 -1
  53. package/bin/runners/runCtx.js +7 -2
  54. package/bin/runners/runCtxDiff.js +301 -0
  55. package/bin/runners/runGuard.js +168 -0
  56. package/bin/runners/runInitGha.js +78 -15
  57. package/bin/runners/runLabs.js +341 -0
  58. package/bin/runners/runLaunch.js +180 -1
  59. package/bin/runners/runMdc.js +203 -1
  60. package/bin/runners/runProof.zip +0 -0
  61. package/bin/runners/runProve.js +23 -0
  62. package/bin/runners/runReplay.js +114 -84
  63. package/bin/runners/runScan.js +111 -32
  64. package/bin/runners/runShip.js +23 -2
  65. package/bin/runners/runTruthpack.js +9 -7
  66. package/bin/runners/runValidate.js +161 -1
  67. package/bin/vibecheck.js +416 -770
  68. package/mcp-server/.guardrail/audit/audit.log.jsonl +2 -0
  69. package/mcp-server/.specs/architecture.mdc +90 -0
  70. package/mcp-server/.specs/security.mdc +30 -0
  71. package/mcp-server/README.md +252 -0
  72. package/mcp-server/agent-checkpoint.js +364 -0
  73. package/mcp-server/architect-tools.js +707 -0
  74. package/mcp-server/audit-mcp.js +206 -0
  75. package/mcp-server/codebase-architect-tools.js +838 -0
  76. package/mcp-server/consolidated-tools.js +804 -0
  77. package/mcp-server/hygiene-tools.js +428 -0
  78. package/mcp-server/index-v1.js +698 -0
  79. package/mcp-server/index.js +2092 -0
  80. package/mcp-server/index.old.js +4137 -0
  81. package/mcp-server/intelligence-tools.js +664 -0
  82. package/mcp-server/intent-drift-tools.js +873 -0
  83. package/mcp-server/mdc-generator.js +298 -0
  84. package/mcp-server/package-lock.json +165 -0
  85. package/mcp-server/package.json +47 -0
  86. package/mcp-server/premium-tools.js +1275 -0
  87. package/mcp-server/test-mcp.js +108 -0
  88. package/mcp-server/test-tools.js +36 -0
  89. package/mcp-server/tier-auth.js +147 -0
  90. package/mcp-server/tools/index.js +72 -0
  91. package/mcp-server/tools-reorganized.ts +244 -0
  92. package/mcp-server/truth-context.js +581 -0
  93. package/mcp-server/truth-firewall-tools.js +1500 -0
  94. package/mcp-server/vibecheck-2.0-tools.js +748 -0
  95. package/mcp-server/vibecheck-tools.js +1075 -0
  96. package/package.json +10 -8
  97. package/bin/guardrail.js +0 -834
  98. package/bin/runners/runAudit.js +0 -2
  99. package/bin/runners/runAutopilot.js +0 -2
  100. package/bin/runners/runCertify.js +0 -2
  101. package/bin/runners/runDashboard.js +0 -10
  102. package/bin/runners/runEnhancedShip.js +0 -2
  103. package/bin/runners/runFixPacks.js +0 -2
  104. package/bin/runners/runNaturalLanguage.js +0 -3
  105. package/bin/runners/runProof.js +0 -2
  106. package/bin/runners/runRealitySniff.js +0 -2
  107. package/bin/runners/runUpgrade.js +0 -2
  108. package/bin/runners/runVerifyAgentOutput.js +0 -2
@@ -134,6 +134,51 @@ function templateForMissionType(type) {
134
134
  success: ["Dead UI findings disappear from ship (after running reality again)."]
135
135
  };
136
136
 
137
+ case "SYNC_CONTRACTS":
138
+ return {
139
+ intent: "Update contracts to match current code reality. Drift causes AI hallucinations.",
140
+ do: [
141
+ "Run 'vibecheck ctx sync' to regenerate contracts from truthpack.",
142
+ "Review the diff to ensure changes are intentional.",
143
+ "Commit updated contracts alongside code changes."
144
+ ],
145
+ dont: [
146
+ "Do not manually edit contract JSON files.",
147
+ "Do not ignore drift - it will cause AI to generate broken code."
148
+ ],
149
+ success: ["Contract drift findings disappear from ship."]
150
+ };
151
+
152
+ case "FIX_ROUTE_DRIFT":
153
+ return {
154
+ intent: "Align route contract with actual server routes.",
155
+ do: [
156
+ "If route was intentionally added: run 'vibecheck ctx sync'.",
157
+ "If route was accidentally removed: restore it or update client refs.",
158
+ "If client refs fake route: fix the client to use real routes."
159
+ ],
160
+ dont: [
161
+ "Do not invent routes to match client refs.",
162
+ "Do not remove routes without updating all client references."
163
+ ],
164
+ success: ["Route drift findings disappear."]
165
+ };
166
+
167
+ case "FIX_AUTH_DRIFT":
168
+ return {
169
+ intent: "Align auth contract with actual middleware patterns.",
170
+ do: [
171
+ "If auth pattern was intentionally changed: run 'vibecheck ctx sync'.",
172
+ "If auth was accidentally removed: RESTORE IT IMMEDIATELY (security risk).",
173
+ "Verify all sensitive routes are still protected."
174
+ ],
175
+ dont: [
176
+ "Do not remove auth patterns without security review.",
177
+ "Do not ignore auth drift - it may indicate a security regression."
178
+ ],
179
+ success: ["Auth drift findings disappear."]
180
+ };
181
+
137
182
  default:
138
183
  return {
139
184
  intent: "Fix the specific finding with smallest correct patch.",
@@ -0,0 +1,295 @@
1
+ /**
2
+ * Policy Presets v2
3
+ *
4
+ * Pre-configured policy settings so users don't have to bikeshed.
5
+ */
6
+
7
+ "use strict";
8
+
9
+ const fs = require("fs");
10
+ const path = require("path");
11
+
12
+ // =============================================================================
13
+ // POLICY PRESETS
14
+ // =============================================================================
15
+
16
+ const POLICY_PRESETS = {
17
+ /**
18
+ * DEV: Warn-heavy, low thresholds
19
+ * For local development - informative but not blocking
20
+ */
21
+ dev: {
22
+ name: "dev",
23
+ description: "Development mode - warn-heavy, informative",
24
+ failOnWarn: false,
25
+ coverage: {
26
+ minActionCoverage: 0,
27
+ minRouteCoverage: 0,
28
+ requireAuthCoverage: false,
29
+ },
30
+ fastify: {
31
+ requireRuntimeDump: false,
32
+ allowStaticOnlyRoutes: true,
33
+ },
34
+ auth: {
35
+ requireVerifyAuth: false,
36
+ strictProtectedPatterns: false,
37
+ },
38
+ findings: {
39
+ // Downgrade some blockers to warnings in dev
40
+ downgradeToWarn: [
41
+ "D_ROUTE_MISSING", // Missing routes less critical in dev
42
+ "D_CONTRACT_DRIFT", // Drift expected during dev
43
+ ],
44
+ },
45
+ output: {
46
+ generateHTML: true,
47
+ verboseConsole: true,
48
+ },
49
+ },
50
+
51
+ /**
52
+ * CI: Strict enough to block bad PRs
53
+ * Default for CI pipelines
54
+ */
55
+ ci: {
56
+ name: "ci",
57
+ description: "CI mode - strict, blocks on real issues",
58
+ failOnWarn: false,
59
+ coverage: {
60
+ minActionCoverage: 0, // Don't require coverage yet
61
+ minRouteCoverage: 0,
62
+ requireAuthCoverage: false,
63
+ },
64
+ fastify: {
65
+ requireRuntimeDump: false, // Optional but recommended
66
+ allowStaticOnlyRoutes: true,
67
+ },
68
+ auth: {
69
+ requireVerifyAuth: false, // Only if auth patterns exist
70
+ strictProtectedPatterns: true,
71
+ },
72
+ findings: {
73
+ downgradeToWarn: [],
74
+ },
75
+ output: {
76
+ generateHTML: true,
77
+ verboseConsole: false,
78
+ },
79
+ },
80
+
81
+ /**
82
+ * RELEASE: Production-ready checks
83
+ * Strictest mode for release gates
84
+ */
85
+ release: {
86
+ name: "release",
87
+ description: "Release mode - requires coverage if patterns exist",
88
+ failOnWarn: true,
89
+ coverage: {
90
+ minActionCoverage: 50, // At least 50% of UI actions verified
91
+ minRouteCoverage: 80, // At least 80% of routes covered
92
+ requireAuthCoverage: true, // If auth patterns exist, verify them
93
+ minAuthCoverage: 80,
94
+ },
95
+ fastify: {
96
+ requireRuntimeDump: true, // Must run runtime dump for Fastify
97
+ allowStaticOnlyRoutes: false,
98
+ },
99
+ auth: {
100
+ requireVerifyAuth: true, // Must verify auth if patterns exist
101
+ strictProtectedPatterns: true,
102
+ },
103
+ findings: {
104
+ downgradeToWarn: [],
105
+ upgradeToBlock: [
106
+ "D_FAKE_SUCCESS", // Fake success is blocking in release
107
+ "D_DEAD_CLICK", // Dead clicks are blocking in release
108
+ ],
109
+ },
110
+ output: {
111
+ generateHTML: true,
112
+ verboseConsole: false,
113
+ },
114
+ },
115
+ };
116
+
117
+ // =============================================================================
118
+ // POLICY RESOLUTION
119
+ // =============================================================================
120
+
121
+ /**
122
+ * Load policy from file or preset
123
+ */
124
+ function loadPolicy(options = {}) {
125
+ const {
126
+ preset = "ci",
127
+ policyFile = null,
128
+ repoRoot = process.cwd(),
129
+ overrides = {},
130
+ } = options;
131
+
132
+ let policy;
133
+
134
+ // Try loading from file first
135
+ if (policyFile) {
136
+ const policyPath = path.isAbsolute(policyFile)
137
+ ? policyFile
138
+ : path.join(repoRoot, policyFile);
139
+
140
+ if (fs.existsSync(policyPath)) {
141
+ try {
142
+ policy = JSON.parse(fs.readFileSync(policyPath, "utf8"));
143
+ } catch (e) {
144
+ console.warn(`Warning: Could not parse policy file ${policyPath}: ${e.message}`);
145
+ }
146
+ }
147
+ }
148
+
149
+ // Try loading from .vibecheck/policy.json
150
+ if (!policy) {
151
+ const defaultPolicyPath = path.join(repoRoot, ".vibecheck", "policy.json");
152
+ if (fs.existsSync(defaultPolicyPath)) {
153
+ try {
154
+ policy = JSON.parse(fs.readFileSync(defaultPolicyPath, "utf8"));
155
+ } catch (e) {
156
+ // Ignore parse errors for default file
157
+ }
158
+ }
159
+ }
160
+
161
+ // Fall back to preset
162
+ if (!policy) {
163
+ policy = POLICY_PRESETS[preset] || POLICY_PRESETS.ci;
164
+ }
165
+
166
+ // Apply overrides
167
+ return mergePolicy(policy, overrides);
168
+ }
169
+
170
+ /**
171
+ * Deep merge policy with overrides
172
+ */
173
+ function mergePolicy(base, overrides) {
174
+ const merged = JSON.parse(JSON.stringify(base));
175
+
176
+ for (const [key, value] of Object.entries(overrides)) {
177
+ if (value === undefined) continue;
178
+
179
+ if (typeof value === "object" && value !== null && !Array.isArray(value)) {
180
+ merged[key] = mergePolicy(merged[key] || {}, value);
181
+ } else {
182
+ merged[key] = value;
183
+ }
184
+ }
185
+
186
+ return merged;
187
+ }
188
+
189
+ /**
190
+ * Get effective thresholds from policy
191
+ */
192
+ function getThresholdsFromPolicy(policy) {
193
+ return {
194
+ minActionCoverage: policy.coverage?.minActionCoverage ?? 0,
195
+ minRouteCoverage: policy.coverage?.minRouteCoverage ?? 0,
196
+ requireAuthCoverage: policy.coverage?.requireAuthCoverage ?? false,
197
+ minAuthCoverage: policy.coverage?.minAuthCoverage ?? 80,
198
+ };
199
+ }
200
+
201
+ /**
202
+ * Apply policy to findings (downgrades/upgrades)
203
+ */
204
+ function applyPolicyToFindings(findings, policy) {
205
+ const downgrade = new Set(policy.findings?.downgradeToWarn || []);
206
+ const upgrade = new Set(policy.findings?.upgradeToBlock || []);
207
+
208
+ return findings.map(finding => {
209
+ if (downgrade.has(finding.detectorId) && finding.severity === "BLOCK") {
210
+ return {
211
+ ...finding,
212
+ severity: "WARN",
213
+ originalSeverity: "BLOCK",
214
+ policyDowngraded: true,
215
+ };
216
+ }
217
+
218
+ if (upgrade.has(finding.detectorId) && finding.severity === "WARN") {
219
+ return {
220
+ ...finding,
221
+ severity: "BLOCK",
222
+ originalSeverity: "WARN",
223
+ policyUpgraded: true,
224
+ };
225
+ }
226
+
227
+ return finding;
228
+ });
229
+ }
230
+
231
+ /**
232
+ * Check if auth verification is required based on policy and truthpack
233
+ */
234
+ function requiresAuthVerification(policy, truthpack) {
235
+ if (!policy.auth?.requireVerifyAuth) return false;
236
+
237
+ // Only require if auth patterns exist
238
+ const hasAuthPatterns = truthpack?.auth?.protectedPatterns?.length > 0;
239
+ return hasAuthPatterns;
240
+ }
241
+
242
+ /**
243
+ * Check if Fastify runtime dump is required
244
+ */
245
+ function requiresFastifyRuntimeDump(policy, truthpack) {
246
+ if (!policy.fastify?.requireRuntimeDump) return false;
247
+
248
+ // Only require if Fastify is detected
249
+ const hasFastify = truthpack?.stack?.fastify?.present;
250
+ return hasFastify;
251
+ }
252
+
253
+ /**
254
+ * Write policy file
255
+ */
256
+ function writePolicyFile(repoRoot, policy) {
257
+ const dir = path.join(repoRoot, ".vibecheck");
258
+ fs.mkdirSync(dir, { recursive: true });
259
+
260
+ const policyPath = path.join(dir, "policy.json");
261
+ fs.writeFileSync(policyPath, JSON.stringify(policy, null, 2));
262
+
263
+ return policyPath;
264
+ }
265
+
266
+ /**
267
+ * Get preset names
268
+ */
269
+ function getPresetNames() {
270
+ return Object.keys(POLICY_PRESETS);
271
+ }
272
+
273
+ /**
274
+ * Get preset by name
275
+ */
276
+ function getPreset(name) {
277
+ return POLICY_PRESETS[name] || null;
278
+ }
279
+
280
+ // =============================================================================
281
+ // EXPORTS
282
+ // =============================================================================
283
+
284
+ module.exports = {
285
+ POLICY_PRESETS,
286
+ loadPolicy,
287
+ mergePolicy,
288
+ getThresholdsFromPolicy,
289
+ applyPolicyToFindings,
290
+ requiresAuthVerification,
291
+ requiresFastifyRuntimeDump,
292
+ writePolicyFile,
293
+ getPresetNames,
294
+ getPreset,
295
+ };
@@ -0,0 +1,359 @@
1
+ /**
2
+ * Correlation Detectors v2
3
+ *
4
+ * Detects mismatches between toast signals, UI changes, and network requests.
5
+ * These are the "fake success theatre" detectors.
6
+ */
7
+
8
+ "use strict";
9
+
10
+ const crypto = require("crypto");
11
+
12
+ // =============================================================================
13
+ // DETECTOR DEFINITIONS
14
+ // =============================================================================
15
+
16
+ const DETECTORS = {
17
+ D_CORR_012: {
18
+ id: "D_CORR_012",
19
+ name: "Success toast but no real change",
20
+ description: "Success toast appeared but UI didn't change meaningfully and no mutation succeeded",
21
+ severity: "BLOCK",
22
+ category: "FakeSuccess",
23
+ },
24
+ D_CORR_013: {
25
+ id: "D_CORR_013",
26
+ name: "Mutation succeeded but no UI feedback",
27
+ description: "Mutation request succeeded but no meaningful UI change or toast appeared",
28
+ severity: "WARN",
29
+ category: "DeadUI",
30
+ },
31
+ D_CORR_014: {
32
+ id: "D_CORR_014",
33
+ name: "Error toast with successful mutation",
34
+ description: "Error toast appeared but the mutation request succeeded",
35
+ severity: "WARN",
36
+ category: "UIMismatch",
37
+ },
38
+ D_CORR_015: {
39
+ id: "D_CORR_015",
40
+ name: "Click with no effect",
41
+ description: "Button/link clicked but no network request, no UI change, no toast",
42
+ severity: "BLOCK",
43
+ category: "DeadUI",
44
+ },
45
+ D_CORR_016: {
46
+ id: "D_CORR_016",
47
+ name: "Form submit with no validation feedback",
48
+ description: "Form submitted but no validation errors shown and no success indicator",
49
+ severity: "WARN",
50
+ category: "DeadUI",
51
+ },
52
+ D_CORR_017: {
53
+ id: "D_CORR_017",
54
+ name: "Optimistic update without server confirmation",
55
+ description: "UI updated immediately but server request failed or never completed",
56
+ severity: "BLOCK",
57
+ category: "FakeSuccess",
58
+ },
59
+ D_CORR_018: {
60
+ id: "D_CORR_018",
61
+ name: "Success toast before request completed",
62
+ description: "Success toast appeared before the mutation request finished",
63
+ severity: "BLOCK",
64
+ category: "FakeSuccess",
65
+ },
66
+ };
67
+
68
+ // =============================================================================
69
+ // CORRELATION ANALYSIS
70
+ // =============================================================================
71
+
72
+ /**
73
+ * Analyze action outcomes and detect correlation issues
74
+ */
75
+ function analyzeActionCorrelation(action, options = {}) {
76
+ const findings = [];
77
+ const {
78
+ uiChange = {},
79
+ signals = [],
80
+ requests = [],
81
+ actionType = "click",
82
+ actionLabel = "",
83
+ } = action;
84
+
85
+ const { meaningfulScoreThreshold = 0.6 } = options;
86
+
87
+ // Extract key data
88
+ const toastSuccess = signals.find(s => s.kind === "toast_success");
89
+ const toastError = signals.find(s => s.kind === "toast_error");
90
+ const toastAny = signals.find(s => s.kind?.startsWith("toast_"));
91
+
92
+ const mutationRequests = requests.filter(r =>
93
+ ["POST", "PUT", "PATCH", "DELETE"].includes(r.method?.toUpperCase())
94
+ );
95
+ const successfulMutations = mutationRequests.filter(r => r.status >= 200 && r.status < 300);
96
+ const failedMutations = mutationRequests.filter(r => r.status >= 400 || r.failed);
97
+
98
+ const hasMeaningfulChange = uiChange.meaningful === true || uiChange.score >= meaningfulScoreThreshold;
99
+ const hasNetworkActivity = requests.length > 0;
100
+ const hasMutation = mutationRequests.length > 0;
101
+
102
+ // D_CORR_012: Success toast but no real change
103
+ if (toastSuccess && !hasMeaningfulChange && successfulMutations.length === 0) {
104
+ findings.push(createFinding(DETECTORS.D_CORR_012, {
105
+ action,
106
+ evidence: {
107
+ toast: toastSuccess,
108
+ uiChangeScore: uiChange.score,
109
+ mutations: mutationRequests.length,
110
+ successfulMutations: successfulMutations.length,
111
+ },
112
+ reason: `Success toast "${toastSuccess.message?.slice(0, 50)}" appeared but UI score was ${uiChange.score?.toFixed(2)} and no mutation succeeded`,
113
+ }));
114
+ }
115
+
116
+ // D_CORR_013: Mutation succeeded but no UI feedback
117
+ if (successfulMutations.length > 0 && !hasMeaningfulChange && !toastAny) {
118
+ findings.push(createFinding(DETECTORS.D_CORR_013, {
119
+ action,
120
+ evidence: {
121
+ successfulMutations: successfulMutations.map(r => ({ method: r.method, url: r.url, status: r.status })),
122
+ uiChangeScore: uiChange.score,
123
+ hasToast: false,
124
+ },
125
+ reason: `Mutation ${successfulMutations[0]?.method} ${successfulMutations[0]?.url} succeeded (${successfulMutations[0]?.status}) but no UI feedback`,
126
+ }));
127
+ }
128
+
129
+ // D_CORR_014: Error toast with successful mutation
130
+ if (toastError && successfulMutations.length > 0 && failedMutations.length === 0) {
131
+ findings.push(createFinding(DETECTORS.D_CORR_014, {
132
+ action,
133
+ evidence: {
134
+ toast: toastError,
135
+ successfulMutations: successfulMutations.map(r => ({ method: r.method, url: r.url, status: r.status })),
136
+ },
137
+ reason: `Error toast "${toastError.message?.slice(0, 50)}" but mutation succeeded with ${successfulMutations[0]?.status}`,
138
+ }));
139
+ }
140
+
141
+ // D_CORR_015: Click with no effect
142
+ if (actionType === "click" && !hasNetworkActivity && !hasMeaningfulChange && !toastAny) {
143
+ // Only flag if it looks like an interactive element
144
+ const isInteractive = actionLabel && (
145
+ /save|submit|send|update|delete|create|add|remove/i.test(actionLabel)
146
+ );
147
+
148
+ if (isInteractive) {
149
+ findings.push(createFinding(DETECTORS.D_CORR_015, {
150
+ action,
151
+ evidence: {
152
+ actionLabel,
153
+ uiChangeScore: uiChange.score,
154
+ requestCount: requests.length,
155
+ hasToast: !!toastAny,
156
+ },
157
+ reason: `Click on "${actionLabel}" had no network request, no UI change, no toast`,
158
+ }));
159
+ }
160
+ }
161
+
162
+ // D_CORR_017: Optimistic update without server confirmation
163
+ if (uiChange.meaningful && hasMutation && failedMutations.length > 0 && successfulMutations.length === 0) {
164
+ findings.push(createFinding(DETECTORS.D_CORR_017, {
165
+ action,
166
+ evidence: {
167
+ uiChangeReasons: uiChange.reasons,
168
+ failedMutations: failedMutations.map(r => ({ method: r.method, url: r.url, status: r.status })),
169
+ },
170
+ reason: `UI updated (${uiChange.reasons?.join(", ")}) but mutation failed with ${failedMutations[0]?.status}`,
171
+ }));
172
+ }
173
+
174
+ // D_CORR_018: Success toast before request completed
175
+ if (toastSuccess && mutationRequests.length > 0) {
176
+ const toastTime = toastSuccess.atMs;
177
+ const pendingAtToastTime = mutationRequests.filter(r => {
178
+ // Request was still pending when toast appeared
179
+ const requestEndTime = r.startTime + (r.duration || 0);
180
+ return r.startTime < toastTime && requestEndTime > toastTime;
181
+ });
182
+
183
+ if (pendingAtToastTime.length > 0) {
184
+ findings.push(createFinding(DETECTORS.D_CORR_018, {
185
+ action,
186
+ evidence: {
187
+ toast: toastSuccess,
188
+ toastTime,
189
+ pendingRequests: pendingAtToastTime.map(r => ({
190
+ method: r.method,
191
+ url: r.url,
192
+ startTime: r.startTime,
193
+ duration: r.duration,
194
+ })),
195
+ },
196
+ reason: `Success toast appeared at ${toastTime}ms but request was still pending`,
197
+ }));
198
+ }
199
+ }
200
+
201
+ return findings;
202
+ }
203
+
204
+ /**
205
+ * Analyze multiple actions and aggregate findings
206
+ */
207
+ function analyzeAllActions(actions, options = {}) {
208
+ const allFindings = [];
209
+
210
+ for (const action of actions) {
211
+ const findings = analyzeActionCorrelation(action, options);
212
+ allFindings.push(...findings);
213
+ }
214
+
215
+ // Dedupe by fingerprint
216
+ const seen = new Set();
217
+ const deduped = [];
218
+ for (const f of allFindings) {
219
+ if (!seen.has(f.fingerprint)) {
220
+ seen.add(f.fingerprint);
221
+ deduped.push(f);
222
+ }
223
+ }
224
+
225
+ return {
226
+ findings: deduped,
227
+ stats: {
228
+ totalActions: actions.length,
229
+ actionsWithFindings: new Set(allFindings.map(f => f.actionId)).size,
230
+ findingsByDetector: countByDetector(deduped),
231
+ findingsBySeverity: countBySeverity(deduped),
232
+ },
233
+ };
234
+ }
235
+
236
+ /**
237
+ * Create a finding from detector definition
238
+ */
239
+ function createFinding(detector, data = {}) {
240
+ const { action, evidence, reason } = data;
241
+
242
+ const fingerprint = generateFingerprint([
243
+ detector.id,
244
+ action?.id || action?.selector || "",
245
+ reason,
246
+ ]);
247
+
248
+ return {
249
+ id: `F_${detector.id}_${fingerprint.slice(0, 8)}`,
250
+ detectorId: detector.id,
251
+ fingerprint: `sha256:${fingerprint}`,
252
+ severity: detector.severity,
253
+ category: detector.category,
254
+ scope: "runtime",
255
+ title: detector.name,
256
+ why: reason || detector.description,
257
+ confidence: "high",
258
+ evidence: [
259
+ {
260
+ id: `E_${fingerprint.slice(0, 12)}`,
261
+ kind: "runtime",
262
+ reason,
263
+ data: evidence,
264
+ },
265
+ ],
266
+ actionId: action?.id,
267
+ repro: action?.selector ? `Click on "${action.selector}"` : null,
268
+ };
269
+ }
270
+
271
+ /**
272
+ * Generate deterministic fingerprint
273
+ */
274
+ function generateFingerprint(parts) {
275
+ const content = parts.filter(Boolean).join("|");
276
+ return crypto.createHash("sha256").update(content).digest("hex");
277
+ }
278
+
279
+ /**
280
+ * Count findings by detector
281
+ */
282
+ function countByDetector(findings) {
283
+ const counts = {};
284
+ for (const f of findings) {
285
+ counts[f.detectorId] = (counts[f.detectorId] || 0) + 1;
286
+ }
287
+ return counts;
288
+ }
289
+
290
+ /**
291
+ * Count findings by severity
292
+ */
293
+ function countBySeverity(findings) {
294
+ const counts = { BLOCK: 0, WARN: 0, INFO: 0 };
295
+ for (const f of findings) {
296
+ counts[f.severity] = (counts[f.severity] || 0) + 1;
297
+ }
298
+ return counts;
299
+ }
300
+
301
+ /**
302
+ * Summarize action outcome for reporting
303
+ */
304
+ function summarizeActionOutcome(action) {
305
+ const {
306
+ uiChange = {},
307
+ signals = [],
308
+ requests = [],
309
+ selector = "",
310
+ actionType = "click",
311
+ } = action;
312
+
313
+ const toasts = signals.filter(s => s.kind?.startsWith("toast_"));
314
+ const mutations = requests.filter(r =>
315
+ ["POST", "PUT", "PATCH", "DELETE"].includes(r.method?.toUpperCase())
316
+ );
317
+ const successfulMutations = mutations.filter(r => r.status >= 200 && r.status < 300);
318
+
319
+ let outcome = "unknown";
320
+
321
+ if (successfulMutations.length > 0 && uiChange.meaningful) {
322
+ outcome = "success_confirmed";
323
+ } else if (successfulMutations.length > 0 && !uiChange.meaningful) {
324
+ outcome = "success_silent";
325
+ } else if (mutations.length > 0 && successfulMutations.length === 0) {
326
+ outcome = "mutation_failed";
327
+ } else if (toasts.some(t => t.kind === "toast_success")) {
328
+ outcome = successfulMutations.length > 0 ? "success_confirmed" : "toast_only";
329
+ } else if (toasts.some(t => t.kind === "toast_error")) {
330
+ outcome = "error_shown";
331
+ } else if (!uiChange.meaningful && requests.length === 0) {
332
+ outcome = "no_effect";
333
+ } else if (uiChange.meaningful) {
334
+ outcome = "ui_changed";
335
+ }
336
+
337
+ return {
338
+ actionType,
339
+ selector,
340
+ outcome,
341
+ uiChangeScore: uiChange.score,
342
+ uiChangeMeaningful: uiChange.meaningful,
343
+ uiChangeReasons: uiChange.reasons || [],
344
+ toastCount: toasts.length,
345
+ toastKinds: toasts.map(t => t.kind),
346
+ requestCount: requests.length,
347
+ mutationCount: mutations.length,
348
+ successfulMutationCount: successfulMutations.length,
349
+ };
350
+ }
351
+
352
+ module.exports = {
353
+ DETECTORS,
354
+ analyzeActionCorrelation,
355
+ analyzeAllActions,
356
+ createFinding,
357
+ summarizeActionOutcome,
358
+ generateFingerprint,
359
+ };