@vibecheckai/cli 3.2.2 → 3.2.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (170) hide show
  1. package/bin/.generated +25 -25
  2. package/bin/dev/run-v2-torture.js +30 -30
  3. package/bin/runners/ENHANCEMENT_GUIDE.md +121 -121
  4. package/bin/runners/lib/__tests__/entitlements-v2.test.js +295 -295
  5. package/bin/runners/lib/agent-firewall/ai/false-positive-analyzer.js +474 -0
  6. package/bin/runners/lib/agent-firewall/claims/extractor.js +117 -28
  7. package/bin/runners/lib/agent-firewall/evidence/env-evidence.js +23 -14
  8. package/bin/runners/lib/agent-firewall/evidence/route-evidence.js +72 -1
  9. package/bin/runners/lib/agent-firewall/interceptor/base.js +2 -2
  10. package/bin/runners/lib/agent-firewall/policy/default-policy.json +6 -0
  11. package/bin/runners/lib/agent-firewall/policy/engine.js +34 -3
  12. package/bin/runners/lib/agent-firewall/policy/rules/fake-success.js +29 -4
  13. package/bin/runners/lib/agent-firewall/policy/rules/ghost-route.js +12 -0
  14. package/bin/runners/lib/agent-firewall/truthpack/loader.js +21 -0
  15. package/bin/runners/lib/agent-firewall/utils/ignore-checker.js +118 -0
  16. package/bin/runners/lib/analyzers.js +606 -325
  17. package/bin/runners/lib/auth-truth.js +193 -193
  18. package/bin/runners/lib/backup.js +62 -62
  19. package/bin/runners/lib/billing.js +107 -107
  20. package/bin/runners/lib/claims.js +118 -118
  21. package/bin/runners/lib/cli-ui.js +540 -540
  22. package/bin/runners/lib/contracts/auth-contract.js +202 -202
  23. package/bin/runners/lib/contracts/env-contract.js +181 -181
  24. package/bin/runners/lib/contracts/external-contract.js +206 -206
  25. package/bin/runners/lib/contracts/guard.js +168 -168
  26. package/bin/runners/lib/contracts/index.js +89 -89
  27. package/bin/runners/lib/contracts/plan-validator.js +311 -311
  28. package/bin/runners/lib/contracts/route-contract.js +199 -199
  29. package/bin/runners/lib/contracts.js +804 -804
  30. package/bin/runners/lib/detect.js +89 -89
  31. package/bin/runners/lib/doctor/autofix.js +254 -254
  32. package/bin/runners/lib/doctor/index.js +37 -37
  33. package/bin/runners/lib/doctor/modules/dependencies.js +325 -325
  34. package/bin/runners/lib/doctor/modules/index.js +46 -46
  35. package/bin/runners/lib/doctor/modules/network.js +250 -250
  36. package/bin/runners/lib/doctor/modules/project.js +312 -312
  37. package/bin/runners/lib/doctor/modules/runtime.js +224 -224
  38. package/bin/runners/lib/doctor/modules/security.js +348 -348
  39. package/bin/runners/lib/doctor/modules/system.js +213 -213
  40. package/bin/runners/lib/doctor/modules/vibecheck.js +394 -394
  41. package/bin/runners/lib/doctor/reporter.js +262 -262
  42. package/bin/runners/lib/doctor/service.js +262 -262
  43. package/bin/runners/lib/doctor/types.js +113 -113
  44. package/bin/runners/lib/doctor/ui.js +263 -263
  45. package/bin/runners/lib/doctor-v2.js +608 -608
  46. package/bin/runners/lib/drift.js +425 -425
  47. package/bin/runners/lib/enforcement.js +72 -72
  48. package/bin/runners/lib/engines/accessibility-engine.js +190 -0
  49. package/bin/runners/lib/engines/api-consistency-engine.js +162 -0
  50. package/bin/runners/lib/engines/ast-cache.js +99 -0
  51. package/bin/runners/lib/engines/code-quality-engine.js +255 -0
  52. package/bin/runners/lib/engines/console-logs-engine.js +115 -0
  53. package/bin/runners/lib/engines/cross-file-analysis-engine.js +268 -0
  54. package/bin/runners/lib/engines/dead-code-engine.js +198 -0
  55. package/bin/runners/lib/engines/deprecated-api-engine.js +226 -0
  56. package/bin/runners/lib/engines/empty-catch-engine.js +150 -0
  57. package/bin/runners/lib/engines/file-filter.js +131 -0
  58. package/bin/runners/lib/engines/hardcoded-secrets-engine.js +251 -0
  59. package/bin/runners/lib/engines/mock-data-engine.js +272 -0
  60. package/bin/runners/lib/engines/parallel-processor.js +71 -0
  61. package/bin/runners/lib/engines/performance-issues-engine.js +265 -0
  62. package/bin/runners/lib/engines/security-vulnerabilities-engine.js +243 -0
  63. package/bin/runners/lib/engines/todo-fixme-engine.js +115 -0
  64. package/bin/runners/lib/engines/type-aware-engine.js +152 -0
  65. package/bin/runners/lib/engines/unsafe-regex-engine.js +225 -0
  66. package/bin/runners/lib/engines/vibecheck-engines/README.md +53 -0
  67. package/bin/runners/lib/engines/vibecheck-engines/index.js +15 -0
  68. package/bin/runners/lib/engines/vibecheck-engines/lib/ast-cache.js +164 -0
  69. package/bin/runners/lib/engines/vibecheck-engines/lib/code-quality-engine.js +291 -0
  70. package/bin/runners/lib/engines/vibecheck-engines/lib/console-logs-engine.js +83 -0
  71. package/bin/runners/lib/engines/vibecheck-engines/lib/dead-code-engine.js +198 -0
  72. package/bin/runners/lib/engines/vibecheck-engines/lib/deprecated-api-engine.js +275 -0
  73. package/bin/runners/lib/engines/vibecheck-engines/lib/empty-catch-engine.js +167 -0
  74. package/bin/runners/lib/engines/vibecheck-engines/lib/file-filter.js +217 -0
  75. package/bin/runners/lib/engines/vibecheck-engines/lib/hardcoded-secrets-engine.js +139 -0
  76. package/bin/runners/lib/engines/vibecheck-engines/lib/mock-data-engine.js +140 -0
  77. package/bin/runners/lib/engines/vibecheck-engines/lib/parallel-processor.js +164 -0
  78. package/bin/runners/lib/engines/vibecheck-engines/lib/performance-issues-engine.js +234 -0
  79. package/bin/runners/lib/engines/vibecheck-engines/lib/type-aware-engine.js +217 -0
  80. package/bin/runners/lib/engines/vibecheck-engines/lib/unsafe-regex-engine.js +78 -0
  81. package/bin/runners/lib/engines/vibecheck-engines/package.json +13 -0
  82. package/bin/runners/lib/enterprise-detect.js +603 -603
  83. package/bin/runners/lib/enterprise-init.js +942 -942
  84. package/bin/runners/lib/env-resolver.js +417 -417
  85. package/bin/runners/lib/env-template.js +66 -66
  86. package/bin/runners/lib/env.js +189 -189
  87. package/bin/runners/lib/extractors/client-calls.js +990 -990
  88. package/bin/runners/lib/extractors/fastify-route-dump.js +573 -573
  89. package/bin/runners/lib/extractors/fastify-routes.js +426 -426
  90. package/bin/runners/lib/extractors/index.js +363 -363
  91. package/bin/runners/lib/extractors/next-routes.js +524 -524
  92. package/bin/runners/lib/extractors/proof-graph.js +431 -431
  93. package/bin/runners/lib/extractors/route-matcher.js +451 -451
  94. package/bin/runners/lib/extractors/truthpack-v2.js +377 -377
  95. package/bin/runners/lib/extractors/ui-bindings.js +547 -547
  96. package/bin/runners/lib/findings-schema.js +281 -281
  97. package/bin/runners/lib/firewall-prompt.js +50 -50
  98. package/bin/runners/lib/global-flags.js +213 -213
  99. package/bin/runners/lib/graph/graph-builder.js +265 -265
  100. package/bin/runners/lib/graph/html-renderer.js +413 -413
  101. package/bin/runners/lib/graph/index.js +32 -32
  102. package/bin/runners/lib/graph/runtime-collector.js +215 -215
  103. package/bin/runners/lib/graph/static-extractor.js +518 -518
  104. package/bin/runners/lib/html-report.js +650 -650
  105. package/bin/runners/lib/interactive-menu.js +1496 -1496
  106. package/bin/runners/lib/llm.js +75 -75
  107. package/bin/runners/lib/meter.js +61 -61
  108. package/bin/runners/lib/missions/evidence.js +126 -126
  109. package/bin/runners/lib/patch.js +40 -40
  110. package/bin/runners/lib/permissions/auth-model.js +213 -213
  111. package/bin/runners/lib/permissions/idor-prover.js +205 -205
  112. package/bin/runners/lib/permissions/index.js +45 -45
  113. package/bin/runners/lib/permissions/matrix-builder.js +198 -198
  114. package/bin/runners/lib/pkgjson.js +28 -28
  115. package/bin/runners/lib/policy.js +295 -295
  116. package/bin/runners/lib/preflight.js +142 -142
  117. package/bin/runners/lib/reality/correlation-detectors.js +359 -359
  118. package/bin/runners/lib/reality/index.js +318 -318
  119. package/bin/runners/lib/reality/request-hashing.js +416 -416
  120. package/bin/runners/lib/reality/request-mapper.js +453 -453
  121. package/bin/runners/lib/reality/safety-rails.js +463 -463
  122. package/bin/runners/lib/reality/semantic-snapshot.js +408 -408
  123. package/bin/runners/lib/reality/toast-detector.js +393 -393
  124. package/bin/runners/lib/reality-findings.js +84 -84
  125. package/bin/runners/lib/receipts.js +179 -179
  126. package/bin/runners/lib/redact.js +29 -29
  127. package/bin/runners/lib/replay/capsule-manager.js +154 -154
  128. package/bin/runners/lib/replay/index.js +263 -263
  129. package/bin/runners/lib/replay/player.js +348 -348
  130. package/bin/runners/lib/replay/recorder.js +331 -331
  131. package/bin/runners/lib/report-output.js +187 -187
  132. package/bin/runners/lib/report.js +135 -135
  133. package/bin/runners/lib/route-detection.js +1140 -1140
  134. package/bin/runners/lib/sandbox/index.js +59 -59
  135. package/bin/runners/lib/sandbox/proof-chain.js +399 -399
  136. package/bin/runners/lib/sandbox/sandbox-runner.js +205 -205
  137. package/bin/runners/lib/sandbox/worktree.js +174 -174
  138. package/bin/runners/lib/scan-output.js +525 -190
  139. package/bin/runners/lib/schema-validator.js +350 -350
  140. package/bin/runners/lib/schemas/contracts.schema.json +160 -160
  141. package/bin/runners/lib/schemas/finding.schema.json +100 -100
  142. package/bin/runners/lib/schemas/mission-pack.schema.json +206 -206
  143. package/bin/runners/lib/schemas/proof-graph.schema.json +176 -176
  144. package/bin/runners/lib/schemas/reality-report.schema.json +162 -162
  145. package/bin/runners/lib/schemas/share-pack.schema.json +180 -180
  146. package/bin/runners/lib/schemas/ship-report.schema.json +117 -117
  147. package/bin/runners/lib/schemas/truthpack-v2.schema.json +303 -303
  148. package/bin/runners/lib/schemas/validator.js +438 -438
  149. package/bin/runners/lib/score-history.js +282 -282
  150. package/bin/runners/lib/share-pack.js +239 -239
  151. package/bin/runners/lib/snippets.js +67 -67
  152. package/bin/runners/lib/status-output.js +253 -253
  153. package/bin/runners/lib/terminal-ui.js +351 -271
  154. package/bin/runners/lib/upsell.js +510 -510
  155. package/bin/runners/lib/usage.js +153 -153
  156. package/bin/runners/lib/validate-patch.js +156 -156
  157. package/bin/runners/lib/verdict-engine.js +628 -628
  158. package/bin/runners/reality/engine.js +917 -917
  159. package/bin/runners/reality/flows.js +122 -122
  160. package/bin/runners/reality/report.js +378 -378
  161. package/bin/runners/reality/session.js +193 -193
  162. package/bin/runners/runGuard.js +168 -168
  163. package/bin/runners/runProof.zip +0 -0
  164. package/bin/runners/runProve.js +8 -0
  165. package/bin/runners/runReality.js +14 -0
  166. package/bin/runners/runScan.js +17 -1
  167. package/bin/runners/runTruth.js +15 -3
  168. package/mcp-server/tier-auth.js +4 -4
  169. package/mcp-server/tools/index.js +72 -72
  170. package/package.json +1 -1
@@ -1,425 +1,425 @@
1
- /**
2
- * Contract Drift Detection
3
- *
4
- * Detects when code has drifted from contracts (routes/env/auth/external).
5
- * Per spec: "routes/env/auth drift → usually BLOCK (because AI will lie here)"
6
- */
7
-
8
- "use strict";
9
-
10
- const path = require("path");
11
- const fs = require("fs");
12
- const crypto = require("crypto");
13
- const { createDriftFinding, migrateFindingToV2 } = require("./findings-schema");
14
-
15
- /**
16
- * Generate a stable fingerprint for a finding (for dedupe across runs)
17
- */
18
- function fingerprint(type, ...parts) {
19
- const data = [type, ...parts].join("|");
20
- return crypto.createHash("sha256").update(data).digest("hex").slice(0, 12);
21
- }
22
-
23
- /**
24
- * Find drift between contracts and current truthpack
25
- * Returns findings array with BLOCK/WARN severity based on category
26
- */
27
- function findContractDrift(contracts, truthpack, opts = {}) {
28
- const findings = [];
29
-
30
- // Route drift - BLOCK severity (AI can invent fake endpoints)
31
- if (contracts?.routes && truthpack?.routes) {
32
- const routeFindings = detectRouteDrift(contracts.routes, truthpack);
33
- findings.push(...routeFindings);
34
- }
35
-
36
- // Env drift - BLOCK for required, WARN for optional
37
- if (contracts?.env && truthpack?.env) {
38
- const envFindings = detectEnvDrift(contracts.env, truthpack);
39
- findings.push(...envFindings);
40
- }
41
-
42
- // Auth drift - BLOCK severity (security critical)
43
- if (contracts?.auth && truthpack?.auth) {
44
- const authFindings = detectAuthDrift(contracts.auth, truthpack);
45
- findings.push(...authFindings);
46
- }
47
-
48
- // External drift - WARN severity (service changes)
49
- if (contracts?.external) {
50
- const externalFindings = detectExternalDrift(contracts.external, truthpack);
51
- findings.push(...externalFindings);
52
- }
53
-
54
- return findings;
55
- }
56
-
57
- /**
58
- * Detect route drift: new routes not in contract, removed routes still in contract
59
- */
60
- function detectRouteDrift(routeContract, truthpack) {
61
- const findings = [];
62
- const contractRoutes = new Map();
63
-
64
- for (const r of routeContract.routes || []) {
65
- const key = `${r.method}_${r.path}`;
66
- contractRoutes.set(key, r);
67
- }
68
-
69
- const serverRoutes = truthpack?.routes?.server || [];
70
- const currentRoutes = new Set();
71
-
72
- // Check for new routes not in contract
73
- for (const route of serverRoutes) {
74
- const key = `${route.method}_${route.path}`;
75
- currentRoutes.add(key);
76
-
77
- if (!contractRoutes.has(key)) {
78
- // Check parameterized match
79
- const match = findParameterizedMatch(routeContract.routes, route.method, route.path);
80
- if (!match) {
81
- findings.push({
82
- id: fingerprint("DRIFT_NEW_ROUTE", route.method, route.path),
83
- category: "ContractDrift",
84
- type: "new_route_not_in_contract",
85
- severity: "BLOCK",
86
- scope: "server",
87
- title: `New route ${route.method} ${route.path} not declared in contract`,
88
- message: `Route was added to code but not synced to contracts. AI agents cannot safely reference this route.`,
89
- why: "Contracts are the source of truth. Undeclared routes can cause AI hallucinations.",
90
- evidence: route.evidence || [],
91
- fixHints: [
92
- "Run 'vibecheck ctx sync' to update contracts",
93
- "Or remove the route if unintended"
94
- ],
95
- fingerprint: fingerprint("DRIFT_NEW_ROUTE", route.method, route.path)
96
- });
97
- }
98
- }
99
- }
100
-
101
- // Check for removed routes still in contract
102
- for (const [key, contractRoute] of contractRoutes) {
103
- if (!currentRoutes.has(key)) {
104
- // Check if any current route matches parameterized
105
- const stillExists = serverRoutes.some(r =>
106
- matchesParameterized(contractRoute.path, r.path) &&
107
- (contractRoute.method === "*" || contractRoute.method === r.method)
108
- );
109
-
110
- if (!stillExists) {
111
- findings.push({
112
- id: fingerprint("DRIFT_REMOVED_ROUTE", contractRoute.method, contractRoute.path),
113
- category: "ContractDrift",
114
- type: "route_removed_from_code",
115
- severity: "BLOCK",
116
- scope: "contracts",
117
- title: `Route ${contractRoute.method} ${contractRoute.path} in contract but removed from code`,
118
- message: `Contract declares a route that no longer exists. AI agents will reference a ghost endpoint.`,
119
- why: "Stale contracts cause AI to generate code calling non-existent endpoints.",
120
- evidence: contractRoute.evidence || [],
121
- fixHints: [
122
- "Run 'vibecheck ctx sync' to update contracts",
123
- "Or restore the route if removal was unintended"
124
- ],
125
- fingerprint: fingerprint("DRIFT_REMOVED_ROUTE", contractRoute.method, contractRoute.path)
126
- });
127
- }
128
- }
129
- }
130
-
131
- // Check for client refs not in contract (same as existing analyzer but with drift framing)
132
- const clientRefs = truthpack?.routes?.clientRefs || [];
133
- for (const ref of clientRefs) {
134
- const key = `${ref.method}_${ref.path}`;
135
- if (!contractRoutes.has(key)) {
136
- const match = findParameterizedMatch(routeContract.routes, ref.method, ref.path);
137
- if (!match) {
138
- findings.push({
139
- id: fingerprint("DRIFT_CLIENT_UNDECLARED", ref.method, ref.path),
140
- category: "ContractDrift",
141
- type: "client_refs_undeclared_route",
142
- severity: "BLOCK",
143
- scope: "client",
144
- title: `Client calls ${ref.method} ${ref.path} which is not in contract`,
145
- message: `Frontend references a route not declared in contracts. This will cause runtime errors.`,
146
- why: "Client code should only call routes that exist in the contract.",
147
- evidence: ref.evidence || [],
148
- fixHints: [
149
- "Create the missing route handler",
150
- "Or update the client to use a valid route",
151
- "Then run 'vibecheck ctx sync'"
152
- ],
153
- fingerprint: fingerprint("DRIFT_CLIENT_UNDECLARED", ref.method, ref.path)
154
- });
155
- }
156
- }
157
- }
158
-
159
- return findings;
160
- }
161
-
162
- /**
163
- * Detect env drift: new vars not in contract, required vars removed
164
- */
165
- function detectEnvDrift(envContract, truthpack) {
166
- const findings = [];
167
- const contractVars = new Map();
168
-
169
- for (const v of envContract.vars || []) {
170
- contractVars.set(v.name, v);
171
- }
172
-
173
- const usedVars = truthpack?.env?.vars || [];
174
- const currentVarNames = new Set(usedVars.map(v => v.name));
175
-
176
- // Check for new env vars used but not in contract
177
- for (const usedVar of usedVars) {
178
- if (!contractVars.has(usedVar.name)) {
179
- const isLikelyRequired = isRequiredEnvVar(usedVar.name);
180
- findings.push({
181
- id: fingerprint("DRIFT_NEW_ENV", usedVar.name),
182
- category: "ContractDrift",
183
- type: "new_env_not_in_contract",
184
- severity: isLikelyRequired ? "BLOCK" : "WARN",
185
- scope: "server",
186
- title: `Env var ${usedVar.name} used but not in contract`,
187
- message: `Code uses ${usedVar.name} but it's not declared in env contract.`,
188
- why: "Undeclared env vars can cause deployment failures and AI confusion.",
189
- evidence: usedVar.references || [],
190
- fixHints: [
191
- "Run 'vibecheck ctx sync' to update contracts",
192
- `Add ${usedVar.name} to .env.example`
193
- ],
194
- fingerprint: fingerprint("DRIFT_NEW_ENV", usedVar.name)
195
- });
196
- }
197
- }
198
-
199
- // Check for required contract vars no longer used
200
- for (const [name, spec] of contractVars) {
201
- if (spec.required && !currentVarNames.has(name)) {
202
- findings.push({
203
- id: fingerprint("DRIFT_REMOVED_ENV", name),
204
- category: "ContractDrift",
205
- type: "required_env_removed",
206
- severity: "WARN",
207
- scope: "contracts",
208
- title: `Required env var ${name} in contract but not used in code`,
209
- message: `Contract marks ${name} as required but code no longer uses it.`,
210
- why: "Stale env contracts cause confusion about what's actually needed.",
211
- evidence: [],
212
- fixHints: [
213
- "Run 'vibecheck ctx sync' to update contracts",
214
- "Or check if the var was accidentally removed from code"
215
- ],
216
- fingerprint: fingerprint("DRIFT_REMOVED_ENV", name)
217
- });
218
- }
219
- }
220
-
221
- return findings;
222
- }
223
-
224
- /**
225
- * Detect auth drift: protected patterns changed
226
- */
227
- function detectAuthDrift(authContract, truthpack) {
228
- const findings = [];
229
- const contractPatterns = new Set(authContract.protectedPatterns || []);
230
- const currentPatterns = new Set(truthpack?.auth?.nextMatcherPatterns || []);
231
-
232
- // New protected patterns not in contract
233
- for (const pattern of currentPatterns) {
234
- if (!contractPatterns.has(pattern)) {
235
- findings.push({
236
- id: fingerprint("DRIFT_NEW_AUTH", pattern),
237
- category: "ContractDrift",
238
- type: "new_auth_pattern",
239
- severity: "BLOCK",
240
- scope: "server",
241
- title: `New auth pattern "${pattern}" not in contract`,
242
- message: `Middleware protects a new pattern that isn't in the auth contract.`,
243
- why: "Auth contracts define security boundaries. Undeclared patterns may not be properly tested.",
244
- evidence: [],
245
- fixHints: [
246
- "Run 'vibecheck ctx sync' to update contracts",
247
- "Verify the new pattern is intentional"
248
- ],
249
- fingerprint: fingerprint("DRIFT_NEW_AUTH", pattern)
250
- });
251
- }
252
- }
253
-
254
- // Protected patterns in contract but removed from code
255
- for (const pattern of contractPatterns) {
256
- if (!currentPatterns.has(pattern)) {
257
- findings.push({
258
- id: fingerprint("DRIFT_REMOVED_AUTH", pattern),
259
- category: "ContractDrift",
260
- type: "auth_pattern_removed",
261
- severity: "BLOCK",
262
- scope: "contracts",
263
- title: `Auth pattern "${pattern}" in contract but removed from middleware`,
264
- message: `Contract expects protection for "${pattern}" but middleware no longer enforces it.`,
265
- why: "Removing auth patterns can expose protected routes. This is a security regression.",
266
- evidence: [],
267
- fixHints: [
268
- "Restore the auth pattern in middleware if removal was unintended",
269
- "Or run 'vibecheck ctx sync' to accept the change"
270
- ],
271
- fingerprint: fingerprint("DRIFT_REMOVED_AUTH", pattern)
272
- });
273
- }
274
- }
275
-
276
- return findings;
277
- }
278
-
279
- /**
280
- * Detect external service drift
281
- */
282
- function detectExternalDrift(externalContract, truthpack) {
283
- const findings = [];
284
- const contractServices = new Map();
285
-
286
- for (const svc of externalContract.services || []) {
287
- contractServices.set(svc.name, svc);
288
- }
289
-
290
- // Check Stripe webhook changes
291
- const billing = truthpack?.billing || {};
292
- if (contractServices.has("stripe")) {
293
- const contractStripe = contractServices.get("stripe");
294
- const currentWebhooks = billing.webhookCandidates || [];
295
-
296
- // New webhook not in contract
297
- for (const wh of currentWebhooks) {
298
- const inContract = contractStripe.webhooks?.some(cw => cw.path === wh.path);
299
- if (!inContract) {
300
- findings.push({
301
- id: fingerprint("DRIFT_NEW_WEBHOOK", wh.path),
302
- category: "ContractDrift",
303
- type: "new_webhook_not_in_contract",
304
- severity: "WARN",
305
- scope: "server",
306
- title: `New Stripe webhook at ${wh.path} not in contract`,
307
- message: `A webhook handler was added but not declared in external contract.`,
308
- why: "Webhook contracts ensure proper signature verification and idempotency.",
309
- evidence: wh.evidence || [],
310
- fixHints: [
311
- "Run 'vibecheck ctx sync' to update contracts"
312
- ],
313
- fingerprint: fingerprint("DRIFT_NEW_WEBHOOK", wh.path)
314
- });
315
- }
316
- }
317
- }
318
-
319
- return findings;
320
- }
321
-
322
- function findParameterizedMatch(routes, method, pathToMatch) {
323
- for (const r of routes || []) {
324
- if (r.method !== "*" && r.method !== method) continue;
325
- if (matchesParameterized(r.path, pathToMatch)) return r;
326
- }
327
- return null;
328
- }
329
-
330
- function matchesParameterized(pattern, actual) {
331
- const patternParts = pattern.split("/").filter(Boolean);
332
- const actualParts = actual.split("/").filter(Boolean);
333
-
334
- if (patternParts.length !== actualParts.length) return false;
335
-
336
- for (let i = 0; i < patternParts.length; i++) {
337
- const p = patternParts[i];
338
- if (p.startsWith(":") || p.startsWith("*") || p.startsWith("[")) continue;
339
- if (p !== actualParts[i]) return false;
340
- }
341
- return true;
342
- }
343
-
344
- function isRequiredEnvVar(name) {
345
- const requiredPatterns = [
346
- /^DATABASE_URL$/i,
347
- /^NEXTAUTH_SECRET$/i,
348
- /^NEXTAUTH_URL$/i,
349
- /^JWT_SECRET$/i,
350
- /^STRIPE_SECRET_KEY$/i,
351
- /^STRIPE_WEBHOOK_SECRET$/i,
352
- /^API_KEY$/i,
353
- /SECRET/i,
354
- /TOKEN$/i,
355
- ];
356
- return requiredPatterns.some(p => p.test(name));
357
- }
358
-
359
- /**
360
- * Load contracts from disk
361
- */
362
- function loadContracts(repoRoot) {
363
- const contractDir = path.join(repoRoot, ".vibecheck", "contracts");
364
- const contracts = {};
365
-
366
- const files = {
367
- routes: "routes.json",
368
- env: "env.json",
369
- auth: "auth.json",
370
- external: "external.json"
371
- };
372
-
373
- for (const [key, file] of Object.entries(files)) {
374
- const filePath = path.join(contractDir, file);
375
- if (fs.existsSync(filePath)) {
376
- try {
377
- contracts[key] = JSON.parse(fs.readFileSync(filePath, "utf8"));
378
- } catch (e) {
379
- // Silently skip invalid files
380
- }
381
- }
382
- }
383
-
384
- return contracts;
385
- }
386
-
387
- /**
388
- * Check if contracts exist
389
- */
390
- function hasContracts(repoRoot) {
391
- const contractDir = path.join(repoRoot, ".vibecheck", "contracts");
392
- if (!fs.existsSync(contractDir)) return false;
393
-
394
- const files = ["routes.json", "env.json", "auth.json", "external.json"];
395
- return files.some(f => fs.existsSync(path.join(contractDir, f)));
396
- }
397
-
398
- /**
399
- * Get drift summary for quick checks
400
- */
401
- function getDriftSummary(findings) {
402
- const blocks = findings.filter(f => f.severity === "BLOCK");
403
- const warns = findings.filter(f => f.severity === "WARN");
404
-
405
- return {
406
- hasDrift: findings.length > 0,
407
- blocks: blocks.length,
408
- warns: warns.length,
409
- verdict: blocks.length > 0 ? "BLOCK" : warns.length > 0 ? "WARN" : "PASS",
410
- categories: {
411
- routes: findings.filter(f => f.type.includes("route")).length,
412
- env: findings.filter(f => f.type.includes("env")).length,
413
- auth: findings.filter(f => f.type.includes("auth")).length,
414
- external: findings.filter(f => f.type.includes("webhook")).length
415
- }
416
- };
417
- }
418
-
419
- module.exports = {
420
- findContractDrift,
421
- loadContracts,
422
- hasContracts,
423
- getDriftSummary,
424
- fingerprint
425
- };
1
+ /**
2
+ * Contract Drift Detection
3
+ *
4
+ * Detects when code has drifted from contracts (routes/env/auth/external).
5
+ * Per spec: "routes/env/auth drift → usually BLOCK (because AI will lie here)"
6
+ */
7
+
8
+ "use strict";
9
+
10
+ const path = require("path");
11
+ const fs = require("fs");
12
+ const crypto = require("crypto");
13
+ const { createDriftFinding, migrateFindingToV2 } = require("./findings-schema");
14
+
15
+ /**
16
+ * Generate a stable fingerprint for a finding (for dedupe across runs)
17
+ */
18
+ function fingerprint(type, ...parts) {
19
+ const data = [type, ...parts].join("|");
20
+ return crypto.createHash("sha256").update(data).digest("hex").slice(0, 12);
21
+ }
22
+
23
+ /**
24
+ * Find drift between contracts and current truthpack
25
+ * Returns findings array with BLOCK/WARN severity based on category
26
+ */
27
+ function findContractDrift(contracts, truthpack, opts = {}) {
28
+ const findings = [];
29
+
30
+ // Route drift - BLOCK severity (AI can invent fake endpoints)
31
+ if (contracts?.routes && truthpack?.routes) {
32
+ const routeFindings = detectRouteDrift(contracts.routes, truthpack);
33
+ findings.push(...routeFindings);
34
+ }
35
+
36
+ // Env drift - BLOCK for required, WARN for optional
37
+ if (contracts?.env && truthpack?.env) {
38
+ const envFindings = detectEnvDrift(contracts.env, truthpack);
39
+ findings.push(...envFindings);
40
+ }
41
+
42
+ // Auth drift - BLOCK severity (security critical)
43
+ if (contracts?.auth && truthpack?.auth) {
44
+ const authFindings = detectAuthDrift(contracts.auth, truthpack);
45
+ findings.push(...authFindings);
46
+ }
47
+
48
+ // External drift - WARN severity (service changes)
49
+ if (contracts?.external) {
50
+ const externalFindings = detectExternalDrift(contracts.external, truthpack);
51
+ findings.push(...externalFindings);
52
+ }
53
+
54
+ return findings;
55
+ }
56
+
57
+ /**
58
+ * Detect route drift: new routes not in contract, removed routes still in contract
59
+ */
60
+ function detectRouteDrift(routeContract, truthpack) {
61
+ const findings = [];
62
+ const contractRoutes = new Map();
63
+
64
+ for (const r of routeContract.routes || []) {
65
+ const key = `${r.method}_${r.path}`;
66
+ contractRoutes.set(key, r);
67
+ }
68
+
69
+ const serverRoutes = truthpack?.routes?.server || [];
70
+ const currentRoutes = new Set();
71
+
72
+ // Check for new routes not in contract
73
+ for (const route of serverRoutes) {
74
+ const key = `${route.method}_${route.path}`;
75
+ currentRoutes.add(key);
76
+
77
+ if (!contractRoutes.has(key)) {
78
+ // Check parameterized match
79
+ const match = findParameterizedMatch(routeContract.routes, route.method, route.path);
80
+ if (!match) {
81
+ findings.push({
82
+ id: fingerprint("DRIFT_NEW_ROUTE", route.method, route.path),
83
+ category: "ContractDrift",
84
+ type: "new_route_not_in_contract",
85
+ severity: "BLOCK",
86
+ scope: "server",
87
+ title: `New route ${route.method} ${route.path} not declared in contract`,
88
+ message: `Route was added to code but not synced to contracts. AI agents cannot safely reference this route.`,
89
+ why: "Contracts are the source of truth. Undeclared routes can cause AI hallucinations.",
90
+ evidence: route.evidence || [],
91
+ fixHints: [
92
+ "Run 'vibecheck ctx sync' to update contracts",
93
+ "Or remove the route if unintended"
94
+ ],
95
+ fingerprint: fingerprint("DRIFT_NEW_ROUTE", route.method, route.path)
96
+ });
97
+ }
98
+ }
99
+ }
100
+
101
+ // Check for removed routes still in contract
102
+ for (const [key, contractRoute] of contractRoutes) {
103
+ if (!currentRoutes.has(key)) {
104
+ // Check if any current route matches parameterized
105
+ const stillExists = serverRoutes.some(r =>
106
+ matchesParameterized(contractRoute.path, r.path) &&
107
+ (contractRoute.method === "*" || contractRoute.method === r.method)
108
+ );
109
+
110
+ if (!stillExists) {
111
+ findings.push({
112
+ id: fingerprint("DRIFT_REMOVED_ROUTE", contractRoute.method, contractRoute.path),
113
+ category: "ContractDrift",
114
+ type: "route_removed_from_code",
115
+ severity: "BLOCK",
116
+ scope: "contracts",
117
+ title: `Route ${contractRoute.method} ${contractRoute.path} in contract but removed from code`,
118
+ message: `Contract declares a route that no longer exists. AI agents will reference a ghost endpoint.`,
119
+ why: "Stale contracts cause AI to generate code calling non-existent endpoints.",
120
+ evidence: contractRoute.evidence || [],
121
+ fixHints: [
122
+ "Run 'vibecheck ctx sync' to update contracts",
123
+ "Or restore the route if removal was unintended"
124
+ ],
125
+ fingerprint: fingerprint("DRIFT_REMOVED_ROUTE", contractRoute.method, contractRoute.path)
126
+ });
127
+ }
128
+ }
129
+ }
130
+
131
+ // Check for client refs not in contract (same as existing analyzer but with drift framing)
132
+ const clientRefs = truthpack?.routes?.clientRefs || [];
133
+ for (const ref of clientRefs) {
134
+ const key = `${ref.method}_${ref.path}`;
135
+ if (!contractRoutes.has(key)) {
136
+ const match = findParameterizedMatch(routeContract.routes, ref.method, ref.path);
137
+ if (!match) {
138
+ findings.push({
139
+ id: fingerprint("DRIFT_CLIENT_UNDECLARED", ref.method, ref.path),
140
+ category: "ContractDrift",
141
+ type: "client_refs_undeclared_route",
142
+ severity: "BLOCK",
143
+ scope: "client",
144
+ title: `Client calls ${ref.method} ${ref.path} which is not in contract`,
145
+ message: `Frontend references a route not declared in contracts. This will cause runtime errors.`,
146
+ why: "Client code should only call routes that exist in the contract.",
147
+ evidence: ref.evidence || [],
148
+ fixHints: [
149
+ "Create the missing route handler",
150
+ "Or update the client to use a valid route",
151
+ "Then run 'vibecheck ctx sync'"
152
+ ],
153
+ fingerprint: fingerprint("DRIFT_CLIENT_UNDECLARED", ref.method, ref.path)
154
+ });
155
+ }
156
+ }
157
+ }
158
+
159
+ return findings;
160
+ }
161
+
162
+ /**
163
+ * Detect env drift: new vars not in contract, required vars removed
164
+ */
165
+ function detectEnvDrift(envContract, truthpack) {
166
+ const findings = [];
167
+ const contractVars = new Map();
168
+
169
+ for (const v of envContract.vars || []) {
170
+ contractVars.set(v.name, v);
171
+ }
172
+
173
+ const usedVars = truthpack?.env?.vars || [];
174
+ const currentVarNames = new Set(usedVars.map(v => v.name));
175
+
176
+ // Check for new env vars used but not in contract
177
+ for (const usedVar of usedVars) {
178
+ if (!contractVars.has(usedVar.name)) {
179
+ const isLikelyRequired = isRequiredEnvVar(usedVar.name);
180
+ findings.push({
181
+ id: fingerprint("DRIFT_NEW_ENV", usedVar.name),
182
+ category: "ContractDrift",
183
+ type: "new_env_not_in_contract",
184
+ severity: isLikelyRequired ? "BLOCK" : "WARN",
185
+ scope: "server",
186
+ title: `Env var ${usedVar.name} used but not in contract`,
187
+ message: `Code uses ${usedVar.name} but it's not declared in env contract.`,
188
+ why: "Undeclared env vars can cause deployment failures and AI confusion.",
189
+ evidence: usedVar.references || [],
190
+ fixHints: [
191
+ "Run 'vibecheck ctx sync' to update contracts",
192
+ `Add ${usedVar.name} to .env.example`
193
+ ],
194
+ fingerprint: fingerprint("DRIFT_NEW_ENV", usedVar.name)
195
+ });
196
+ }
197
+ }
198
+
199
+ // Check for required contract vars no longer used
200
+ for (const [name, spec] of contractVars) {
201
+ if (spec.required && !currentVarNames.has(name)) {
202
+ findings.push({
203
+ id: fingerprint("DRIFT_REMOVED_ENV", name),
204
+ category: "ContractDrift",
205
+ type: "required_env_removed",
206
+ severity: "WARN",
207
+ scope: "contracts",
208
+ title: `Required env var ${name} in contract but not used in code`,
209
+ message: `Contract marks ${name} as required but code no longer uses it.`,
210
+ why: "Stale env contracts cause confusion about what's actually needed.",
211
+ evidence: [],
212
+ fixHints: [
213
+ "Run 'vibecheck ctx sync' to update contracts",
214
+ "Or check if the var was accidentally removed from code"
215
+ ],
216
+ fingerprint: fingerprint("DRIFT_REMOVED_ENV", name)
217
+ });
218
+ }
219
+ }
220
+
221
+ return findings;
222
+ }
223
+
224
+ /**
225
+ * Detect auth drift: protected patterns changed
226
+ */
227
+ function detectAuthDrift(authContract, truthpack) {
228
+ const findings = [];
229
+ const contractPatterns = new Set(authContract.protectedPatterns || []);
230
+ const currentPatterns = new Set(truthpack?.auth?.nextMatcherPatterns || []);
231
+
232
+ // New protected patterns not in contract
233
+ for (const pattern of currentPatterns) {
234
+ if (!contractPatterns.has(pattern)) {
235
+ findings.push({
236
+ id: fingerprint("DRIFT_NEW_AUTH", pattern),
237
+ category: "ContractDrift",
238
+ type: "new_auth_pattern",
239
+ severity: "BLOCK",
240
+ scope: "server",
241
+ title: `New auth pattern "${pattern}" not in contract`,
242
+ message: `Middleware protects a new pattern that isn't in the auth contract.`,
243
+ why: "Auth contracts define security boundaries. Undeclared patterns may not be properly tested.",
244
+ evidence: [],
245
+ fixHints: [
246
+ "Run 'vibecheck ctx sync' to update contracts",
247
+ "Verify the new pattern is intentional"
248
+ ],
249
+ fingerprint: fingerprint("DRIFT_NEW_AUTH", pattern)
250
+ });
251
+ }
252
+ }
253
+
254
+ // Protected patterns in contract but removed from code
255
+ for (const pattern of contractPatterns) {
256
+ if (!currentPatterns.has(pattern)) {
257
+ findings.push({
258
+ id: fingerprint("DRIFT_REMOVED_AUTH", pattern),
259
+ category: "ContractDrift",
260
+ type: "auth_pattern_removed",
261
+ severity: "BLOCK",
262
+ scope: "contracts",
263
+ title: `Auth pattern "${pattern}" in contract but removed from middleware`,
264
+ message: `Contract expects protection for "${pattern}" but middleware no longer enforces it.`,
265
+ why: "Removing auth patterns can expose protected routes. This is a security regression.",
266
+ evidence: [],
267
+ fixHints: [
268
+ "Restore the auth pattern in middleware if removal was unintended",
269
+ "Or run 'vibecheck ctx sync' to accept the change"
270
+ ],
271
+ fingerprint: fingerprint("DRIFT_REMOVED_AUTH", pattern)
272
+ });
273
+ }
274
+ }
275
+
276
+ return findings;
277
+ }
278
+
279
+ /**
280
+ * Detect external service drift
281
+ */
282
+ function detectExternalDrift(externalContract, truthpack) {
283
+ const findings = [];
284
+ const contractServices = new Map();
285
+
286
+ for (const svc of externalContract.services || []) {
287
+ contractServices.set(svc.name, svc);
288
+ }
289
+
290
+ // Check Stripe webhook changes
291
+ const billing = truthpack?.billing || {};
292
+ if (contractServices.has("stripe")) {
293
+ const contractStripe = contractServices.get("stripe");
294
+ const currentWebhooks = billing.webhookCandidates || [];
295
+
296
+ // New webhook not in contract
297
+ for (const wh of currentWebhooks) {
298
+ const inContract = contractStripe.webhooks?.some(cw => cw.path === wh.path);
299
+ if (!inContract) {
300
+ findings.push({
301
+ id: fingerprint("DRIFT_NEW_WEBHOOK", wh.path),
302
+ category: "ContractDrift",
303
+ type: "new_webhook_not_in_contract",
304
+ severity: "WARN",
305
+ scope: "server",
306
+ title: `New Stripe webhook at ${wh.path} not in contract`,
307
+ message: `A webhook handler was added but not declared in external contract.`,
308
+ why: "Webhook contracts ensure proper signature verification and idempotency.",
309
+ evidence: wh.evidence || [],
310
+ fixHints: [
311
+ "Run 'vibecheck ctx sync' to update contracts"
312
+ ],
313
+ fingerprint: fingerprint("DRIFT_NEW_WEBHOOK", wh.path)
314
+ });
315
+ }
316
+ }
317
+ }
318
+
319
+ return findings;
320
+ }
321
+
322
+ function findParameterizedMatch(routes, method, pathToMatch) {
323
+ for (const r of routes || []) {
324
+ if (r.method !== "*" && r.method !== method) continue;
325
+ if (matchesParameterized(r.path, pathToMatch)) return r;
326
+ }
327
+ return null;
328
+ }
329
+
330
+ function matchesParameterized(pattern, actual) {
331
+ const patternParts = pattern.split("/").filter(Boolean);
332
+ const actualParts = actual.split("/").filter(Boolean);
333
+
334
+ if (patternParts.length !== actualParts.length) return false;
335
+
336
+ for (let i = 0; i < patternParts.length; i++) {
337
+ const p = patternParts[i];
338
+ if (p.startsWith(":") || p.startsWith("*") || p.startsWith("[")) continue;
339
+ if (p !== actualParts[i]) return false;
340
+ }
341
+ return true;
342
+ }
343
+
344
+ function isRequiredEnvVar(name) {
345
+ const requiredPatterns = [
346
+ /^DATABASE_URL$/i,
347
+ /^NEXTAUTH_SECRET$/i,
348
+ /^NEXTAUTH_URL$/i,
349
+ /^JWT_SECRET$/i,
350
+ /^STRIPE_SECRET_KEY$/i,
351
+ /^STRIPE_WEBHOOK_SECRET$/i,
352
+ /^API_KEY$/i,
353
+ /SECRET/i,
354
+ /TOKEN$/i,
355
+ ];
356
+ return requiredPatterns.some(p => p.test(name));
357
+ }
358
+
359
+ /**
360
+ * Load contracts from disk
361
+ */
362
+ function loadContracts(repoRoot) {
363
+ const contractDir = path.join(repoRoot, ".vibecheck", "contracts");
364
+ const contracts = {};
365
+
366
+ const files = {
367
+ routes: "routes.json",
368
+ env: "env.json",
369
+ auth: "auth.json",
370
+ external: "external.json"
371
+ };
372
+
373
+ for (const [key, file] of Object.entries(files)) {
374
+ const filePath = path.join(contractDir, file);
375
+ if (fs.existsSync(filePath)) {
376
+ try {
377
+ contracts[key] = JSON.parse(fs.readFileSync(filePath, "utf8"));
378
+ } catch (e) {
379
+ // Silently skip invalid files
380
+ }
381
+ }
382
+ }
383
+
384
+ return contracts;
385
+ }
386
+
387
+ /**
388
+ * Check if contracts exist
389
+ */
390
+ function hasContracts(repoRoot) {
391
+ const contractDir = path.join(repoRoot, ".vibecheck", "contracts");
392
+ if (!fs.existsSync(contractDir)) return false;
393
+
394
+ const files = ["routes.json", "env.json", "auth.json", "external.json"];
395
+ return files.some(f => fs.existsSync(path.join(contractDir, f)));
396
+ }
397
+
398
+ /**
399
+ * Get drift summary for quick checks
400
+ */
401
+ function getDriftSummary(findings) {
402
+ const blocks = findings.filter(f => f.severity === "BLOCK");
403
+ const warns = findings.filter(f => f.severity === "WARN");
404
+
405
+ return {
406
+ hasDrift: findings.length > 0,
407
+ blocks: blocks.length,
408
+ warns: warns.length,
409
+ verdict: blocks.length > 0 ? "BLOCK" : warns.length > 0 ? "WARN" : "PASS",
410
+ categories: {
411
+ routes: findings.filter(f => f.type.includes("route")).length,
412
+ env: findings.filter(f => f.type.includes("env")).length,
413
+ auth: findings.filter(f => f.type.includes("auth")).length,
414
+ external: findings.filter(f => f.type.includes("webhook")).length
415
+ }
416
+ };
417
+ }
418
+
419
+ module.exports = {
420
+ findContractDrift,
421
+ loadContracts,
422
+ hasContracts,
423
+ getDriftSummary,
424
+ fingerprint
425
+ };