@vibecheckai/cli 3.2.5 → 3.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (197) hide show
  1. package/bin/.generated +25 -25
  2. package/bin/dev/run-v2-torture.js +30 -30
  3. package/bin/registry.js +192 -5
  4. package/bin/runners/lib/__tests__/entitlements-v2.test.js +295 -295
  5. package/bin/runners/lib/agent-firewall/change-packet/builder.js +280 -6
  6. package/bin/runners/lib/agent-firewall/critic/index.js +151 -0
  7. package/bin/runners/lib/agent-firewall/critic/judge.js +432 -0
  8. package/bin/runners/lib/agent-firewall/critic/prompts.js +305 -0
  9. package/bin/runners/lib/agent-firewall/lawbook/distributor.js +465 -0
  10. package/bin/runners/lib/agent-firewall/lawbook/evaluator.js +604 -0
  11. package/bin/runners/lib/agent-firewall/lawbook/index.js +304 -0
  12. package/bin/runners/lib/agent-firewall/lawbook/registry.js +514 -0
  13. package/bin/runners/lib/agent-firewall/lawbook/schema.js +420 -0
  14. package/bin/runners/lib/agent-firewall/logger.js +141 -0
  15. package/bin/runners/lib/agent-firewall/policy/loader.js +312 -4
  16. package/bin/runners/lib/agent-firewall/policy/rules/ghost-env.js +113 -1
  17. package/bin/runners/lib/agent-firewall/policy/rules/ghost-route.js +133 -6
  18. package/bin/runners/lib/agent-firewall/proposal/extractor.js +394 -0
  19. package/bin/runners/lib/agent-firewall/proposal/index.js +212 -0
  20. package/bin/runners/lib/agent-firewall/proposal/schema.js +251 -0
  21. package/bin/runners/lib/agent-firewall/proposal/validator.js +386 -0
  22. package/bin/runners/lib/agent-firewall/reality/index.js +332 -0
  23. package/bin/runners/lib/agent-firewall/reality/state.js +625 -0
  24. package/bin/runners/lib/agent-firewall/reality/watcher.js +322 -0
  25. package/bin/runners/lib/agent-firewall/risk/index.js +173 -0
  26. package/bin/runners/lib/agent-firewall/risk/scorer.js +328 -0
  27. package/bin/runners/lib/agent-firewall/risk/thresholds.js +321 -0
  28. package/bin/runners/lib/agent-firewall/risk/vectors.js +421 -0
  29. package/bin/runners/lib/agent-firewall/simulator/diff-simulator.js +472 -0
  30. package/bin/runners/lib/agent-firewall/simulator/import-resolver.js +346 -0
  31. package/bin/runners/lib/agent-firewall/simulator/index.js +181 -0
  32. package/bin/runners/lib/agent-firewall/simulator/route-validator.js +380 -0
  33. package/bin/runners/lib/agent-firewall/time-machine/incident-correlator.js +661 -0
  34. package/bin/runners/lib/agent-firewall/time-machine/index.js +267 -0
  35. package/bin/runners/lib/agent-firewall/time-machine/replay-engine.js +436 -0
  36. package/bin/runners/lib/agent-firewall/time-machine/state-reconstructor.js +490 -0
  37. package/bin/runners/lib/agent-firewall/time-machine/timeline-builder.js +530 -0
  38. package/bin/runners/lib/analyzers.js +81 -18
  39. package/bin/runners/lib/api-client.js +269 -0
  40. package/bin/runners/lib/auth-truth.js +193 -193
  41. package/bin/runners/lib/authority-badge.js +425 -0
  42. package/bin/runners/lib/backup.js +62 -62
  43. package/bin/runners/lib/billing.js +107 -107
  44. package/bin/runners/lib/claims.js +118 -118
  45. package/bin/runners/lib/cli-output.js +7 -1
  46. package/bin/runners/lib/cli-ui.js +540 -540
  47. package/bin/runners/lib/contracts/auth-contract.js +202 -202
  48. package/bin/runners/lib/contracts/env-contract.js +181 -181
  49. package/bin/runners/lib/contracts/external-contract.js +206 -206
  50. package/bin/runners/lib/contracts/guard.js +168 -168
  51. package/bin/runners/lib/contracts/index.js +89 -89
  52. package/bin/runners/lib/contracts/plan-validator.js +311 -311
  53. package/bin/runners/lib/contracts/route-contract.js +199 -199
  54. package/bin/runners/lib/contracts.js +804 -804
  55. package/bin/runners/lib/detect.js +89 -89
  56. package/bin/runners/lib/doctor/autofix.js +254 -254
  57. package/bin/runners/lib/doctor/index.js +37 -37
  58. package/bin/runners/lib/doctor/modules/dependencies.js +325 -325
  59. package/bin/runners/lib/doctor/modules/index.js +46 -46
  60. package/bin/runners/lib/doctor/modules/network.js +250 -250
  61. package/bin/runners/lib/doctor/modules/project.js +312 -312
  62. package/bin/runners/lib/doctor/modules/runtime.js +224 -224
  63. package/bin/runners/lib/doctor/modules/security.js +348 -348
  64. package/bin/runners/lib/doctor/modules/system.js +213 -213
  65. package/bin/runners/lib/doctor/modules/vibecheck.js +394 -394
  66. package/bin/runners/lib/doctor/reporter.js +262 -262
  67. package/bin/runners/lib/doctor/service.js +262 -262
  68. package/bin/runners/lib/doctor/types.js +113 -113
  69. package/bin/runners/lib/doctor/ui.js +263 -263
  70. package/bin/runners/lib/doctor-v2.js +608 -608
  71. package/bin/runners/lib/drift.js +425 -425
  72. package/bin/runners/lib/enforcement.js +72 -72
  73. package/bin/runners/lib/enterprise-detect.js +603 -603
  74. package/bin/runners/lib/enterprise-init.js +942 -942
  75. package/bin/runners/lib/env-resolver.js +417 -417
  76. package/bin/runners/lib/env-template.js +66 -66
  77. package/bin/runners/lib/env.js +189 -189
  78. package/bin/runners/lib/error-handler.js +16 -9
  79. package/bin/runners/lib/exit-codes.js +275 -0
  80. package/bin/runners/lib/extractors/client-calls.js +990 -990
  81. package/bin/runners/lib/extractors/fastify-route-dump.js +573 -573
  82. package/bin/runners/lib/extractors/fastify-routes.js +426 -426
  83. package/bin/runners/lib/extractors/index.js +363 -363
  84. package/bin/runners/lib/extractors/next-routes.js +524 -524
  85. package/bin/runners/lib/extractors/proof-graph.js +431 -431
  86. package/bin/runners/lib/extractors/route-matcher.js +451 -451
  87. package/bin/runners/lib/extractors/truthpack-v2.js +377 -377
  88. package/bin/runners/lib/extractors/ui-bindings.js +547 -547
  89. package/bin/runners/lib/findings-schema.js +281 -281
  90. package/bin/runners/lib/firewall-prompt.js +50 -50
  91. package/bin/runners/lib/global-flags.js +37 -0
  92. package/bin/runners/lib/graph/graph-builder.js +265 -265
  93. package/bin/runners/lib/graph/html-renderer.js +413 -413
  94. package/bin/runners/lib/graph/index.js +32 -32
  95. package/bin/runners/lib/graph/runtime-collector.js +215 -215
  96. package/bin/runners/lib/graph/static-extractor.js +518 -518
  97. package/bin/runners/lib/help-formatter.js +413 -0
  98. package/bin/runners/lib/html-report.js +650 -650
  99. package/bin/runners/lib/llm.js +75 -75
  100. package/bin/runners/lib/logger.js +38 -0
  101. package/bin/runners/lib/meter.js +61 -61
  102. package/bin/runners/lib/missions/evidence.js +126 -126
  103. package/bin/runners/lib/patch.js +40 -40
  104. package/bin/runners/lib/permissions/auth-model.js +213 -213
  105. package/bin/runners/lib/permissions/idor-prover.js +205 -205
  106. package/bin/runners/lib/permissions/index.js +45 -45
  107. package/bin/runners/lib/permissions/matrix-builder.js +198 -198
  108. package/bin/runners/lib/pkgjson.js +28 -28
  109. package/bin/runners/lib/policy.js +295 -295
  110. package/bin/runners/lib/preflight.js +142 -142
  111. package/bin/runners/lib/reality/correlation-detectors.js +359 -359
  112. package/bin/runners/lib/reality/index.js +318 -318
  113. package/bin/runners/lib/reality/request-hashing.js +416 -416
  114. package/bin/runners/lib/reality/request-mapper.js +453 -453
  115. package/bin/runners/lib/reality/safety-rails.js +463 -463
  116. package/bin/runners/lib/reality/semantic-snapshot.js +408 -408
  117. package/bin/runners/lib/reality/toast-detector.js +393 -393
  118. package/bin/runners/lib/reality-findings.js +84 -84
  119. package/bin/runners/lib/receipts.js +179 -179
  120. package/bin/runners/lib/redact.js +29 -29
  121. package/bin/runners/lib/replay/capsule-manager.js +154 -154
  122. package/bin/runners/lib/replay/index.js +263 -263
  123. package/bin/runners/lib/replay/player.js +348 -348
  124. package/bin/runners/lib/replay/recorder.js +331 -331
  125. package/bin/runners/lib/report.js +135 -135
  126. package/bin/runners/lib/route-detection.js +1140 -1140
  127. package/bin/runners/lib/sandbox/index.js +59 -59
  128. package/bin/runners/lib/sandbox/proof-chain.js +399 -399
  129. package/bin/runners/lib/sandbox/sandbox-runner.js +205 -205
  130. package/bin/runners/lib/sandbox/worktree.js +174 -174
  131. package/bin/runners/lib/schema-validator.js +350 -350
  132. package/bin/runners/lib/schemas/contracts.schema.json +160 -160
  133. package/bin/runners/lib/schemas/finding.schema.json +100 -100
  134. package/bin/runners/lib/schemas/mission-pack.schema.json +206 -206
  135. package/bin/runners/lib/schemas/proof-graph.schema.json +176 -176
  136. package/bin/runners/lib/schemas/reality-report.schema.json +162 -162
  137. package/bin/runners/lib/schemas/share-pack.schema.json +180 -180
  138. package/bin/runners/lib/schemas/ship-report.schema.json +117 -117
  139. package/bin/runners/lib/schemas/truthpack-v2.schema.json +303 -303
  140. package/bin/runners/lib/schemas/validator.js +438 -438
  141. package/bin/runners/lib/score-history.js +282 -282
  142. package/bin/runners/lib/share-pack.js +239 -239
  143. package/bin/runners/lib/snippets.js +67 -67
  144. package/bin/runners/lib/unified-cli-output.js +604 -0
  145. package/bin/runners/lib/upsell.js +658 -510
  146. package/bin/runners/lib/usage.js +153 -153
  147. package/bin/runners/lib/validate-patch.js +156 -156
  148. package/bin/runners/lib/verdict-engine.js +628 -628
  149. package/bin/runners/reality/engine.js +917 -917
  150. package/bin/runners/reality/flows.js +122 -122
  151. package/bin/runners/reality/report.js +378 -378
  152. package/bin/runners/reality/session.js +193 -193
  153. package/bin/runners/runAgent.d.ts +5 -0
  154. package/bin/runners/runApprove.js +1200 -0
  155. package/bin/runners/runAuth.js +324 -95
  156. package/bin/runners/runCheckpoint.js +39 -21
  157. package/bin/runners/runClassify.js +859 -0
  158. package/bin/runners/runContext.js +136 -24
  159. package/bin/runners/runDoctor.js +108 -68
  160. package/bin/runners/runFirewall.d.ts +5 -0
  161. package/bin/runners/runFirewallHook.d.ts +5 -0
  162. package/bin/runners/runFix.js +6 -5
  163. package/bin/runners/runGuard.js +262 -168
  164. package/bin/runners/runInit.js +3 -2
  165. package/bin/runners/runMcp.js +130 -52
  166. package/bin/runners/runPolish.js +43 -20
  167. package/bin/runners/runProve.js +1 -2
  168. package/bin/runners/runReport.js +3 -2
  169. package/bin/runners/runScan.js +145 -44
  170. package/bin/runners/runShip.js +3 -4
  171. package/bin/runners/runTruth.d.ts +5 -0
  172. package/bin/runners/runValidate.js +19 -2
  173. package/bin/runners/runWatch.js +104 -53
  174. package/bin/vibecheck.js +106 -19
  175. package/mcp-server/HARDENING_SUMMARY.md +299 -0
  176. package/mcp-server/agent-firewall-interceptor.js +367 -31
  177. package/mcp-server/authority-tools.js +569 -0
  178. package/mcp-server/conductor/conflict-resolver.js +588 -0
  179. package/mcp-server/conductor/execution-planner.js +544 -0
  180. package/mcp-server/conductor/index.js +377 -0
  181. package/mcp-server/conductor/lock-manager.js +615 -0
  182. package/mcp-server/conductor/request-queue.js +550 -0
  183. package/mcp-server/conductor/session-manager.js +500 -0
  184. package/mcp-server/conductor/tools.js +510 -0
  185. package/mcp-server/index.js +1199 -208
  186. package/mcp-server/lib/api-client.cjs +305 -0
  187. package/mcp-server/lib/logger.cjs +30 -0
  188. package/mcp-server/logger.js +173 -0
  189. package/mcp-server/package.json +2 -2
  190. package/mcp-server/premium-tools.js +2 -2
  191. package/mcp-server/tier-auth.js +351 -136
  192. package/mcp-server/tools/index.js +72 -72
  193. package/mcp-server/truth-firewall-tools.js +145 -15
  194. package/mcp-server/vibecheck-tools.js +2 -2
  195. package/package.json +2 -3
  196. package/mcp-server/index.old.js +0 -4137
  197. package/mcp-server/package-lock.json +0 -165
@@ -1,425 +1,425 @@
1
- /**
2
- * Contract Drift Detection
3
- *
4
- * Detects when code has drifted from contracts (routes/env/auth/external).
5
- * Per spec: "routes/env/auth drift → usually BLOCK (because AI will lie here)"
6
- */
7
-
8
- "use strict";
9
-
10
- const path = require("path");
11
- const fs = require("fs");
12
- const crypto = require("crypto");
13
- const { createDriftFinding, migrateFindingToV2 } = require("./findings-schema");
14
-
15
- /**
16
- * Generate a stable fingerprint for a finding (for dedupe across runs)
17
- */
18
- function fingerprint(type, ...parts) {
19
- const data = [type, ...parts].join("|");
20
- return crypto.createHash("sha256").update(data).digest("hex").slice(0, 12);
21
- }
22
-
23
- /**
24
- * Find drift between contracts and current truthpack
25
- * Returns findings array with BLOCK/WARN severity based on category
26
- */
27
- function findContractDrift(contracts, truthpack, opts = {}) {
28
- const findings = [];
29
-
30
- // Route drift - BLOCK severity (AI can invent fake endpoints)
31
- if (contracts?.routes && truthpack?.routes) {
32
- const routeFindings = detectRouteDrift(contracts.routes, truthpack);
33
- findings.push(...routeFindings);
34
- }
35
-
36
- // Env drift - BLOCK for required, WARN for optional
37
- if (contracts?.env && truthpack?.env) {
38
- const envFindings = detectEnvDrift(contracts.env, truthpack);
39
- findings.push(...envFindings);
40
- }
41
-
42
- // Auth drift - BLOCK severity (security critical)
43
- if (contracts?.auth && truthpack?.auth) {
44
- const authFindings = detectAuthDrift(contracts.auth, truthpack);
45
- findings.push(...authFindings);
46
- }
47
-
48
- // External drift - WARN severity (service changes)
49
- if (contracts?.external) {
50
- const externalFindings = detectExternalDrift(contracts.external, truthpack);
51
- findings.push(...externalFindings);
52
- }
53
-
54
- return findings;
55
- }
56
-
57
- /**
58
- * Detect route drift: new routes not in contract, removed routes still in contract
59
- */
60
- function detectRouteDrift(routeContract, truthpack) {
61
- const findings = [];
62
- const contractRoutes = new Map();
63
-
64
- for (const r of routeContract.routes || []) {
65
- const key = `${r.method}_${r.path}`;
66
- contractRoutes.set(key, r);
67
- }
68
-
69
- const serverRoutes = truthpack?.routes?.server || [];
70
- const currentRoutes = new Set();
71
-
72
- // Check for new routes not in contract
73
- for (const route of serverRoutes) {
74
- const key = `${route.method}_${route.path}`;
75
- currentRoutes.add(key);
76
-
77
- if (!contractRoutes.has(key)) {
78
- // Check parameterized match
79
- const match = findParameterizedMatch(routeContract.routes, route.method, route.path);
80
- if (!match) {
81
- findings.push({
82
- id: fingerprint("DRIFT_NEW_ROUTE", route.method, route.path),
83
- category: "ContractDrift",
84
- type: "new_route_not_in_contract",
85
- severity: "BLOCK",
86
- scope: "server",
87
- title: `New route ${route.method} ${route.path} not declared in contract`,
88
- message: `Route was added to code but not synced to contracts. AI agents cannot safely reference this route.`,
89
- why: "Contracts are the source of truth. Undeclared routes can cause AI hallucinations.",
90
- evidence: route.evidence || [],
91
- fixHints: [
92
- "Run 'vibecheck ctx sync' to update contracts",
93
- "Or remove the route if unintended"
94
- ],
95
- fingerprint: fingerprint("DRIFT_NEW_ROUTE", route.method, route.path)
96
- });
97
- }
98
- }
99
- }
100
-
101
- // Check for removed routes still in contract
102
- for (const [key, contractRoute] of contractRoutes) {
103
- if (!currentRoutes.has(key)) {
104
- // Check if any current route matches parameterized
105
- const stillExists = serverRoutes.some(r =>
106
- matchesParameterized(contractRoute.path, r.path) &&
107
- (contractRoute.method === "*" || contractRoute.method === r.method)
108
- );
109
-
110
- if (!stillExists) {
111
- findings.push({
112
- id: fingerprint("DRIFT_REMOVED_ROUTE", contractRoute.method, contractRoute.path),
113
- category: "ContractDrift",
114
- type: "route_removed_from_code",
115
- severity: "BLOCK",
116
- scope: "contracts",
117
- title: `Route ${contractRoute.method} ${contractRoute.path} in contract but removed from code`,
118
- message: `Contract declares a route that no longer exists. AI agents will reference a ghost endpoint.`,
119
- why: "Stale contracts cause AI to generate code calling non-existent endpoints.",
120
- evidence: contractRoute.evidence || [],
121
- fixHints: [
122
- "Run 'vibecheck ctx sync' to update contracts",
123
- "Or restore the route if removal was unintended"
124
- ],
125
- fingerprint: fingerprint("DRIFT_REMOVED_ROUTE", contractRoute.method, contractRoute.path)
126
- });
127
- }
128
- }
129
- }
130
-
131
- // Check for client refs not in contract (same as existing analyzer but with drift framing)
132
- const clientRefs = truthpack?.routes?.clientRefs || [];
133
- for (const ref of clientRefs) {
134
- const key = `${ref.method}_${ref.path}`;
135
- if (!contractRoutes.has(key)) {
136
- const match = findParameterizedMatch(routeContract.routes, ref.method, ref.path);
137
- if (!match) {
138
- findings.push({
139
- id: fingerprint("DRIFT_CLIENT_UNDECLARED", ref.method, ref.path),
140
- category: "ContractDrift",
141
- type: "client_refs_undeclared_route",
142
- severity: "BLOCK",
143
- scope: "client",
144
- title: `Client calls ${ref.method} ${ref.path} which is not in contract`,
145
- message: `Frontend references a route not declared in contracts. This will cause runtime errors.`,
146
- why: "Client code should only call routes that exist in the contract.",
147
- evidence: ref.evidence || [],
148
- fixHints: [
149
- "Create the missing route handler",
150
- "Or update the client to use a valid route",
151
- "Then run 'vibecheck ctx sync'"
152
- ],
153
- fingerprint: fingerprint("DRIFT_CLIENT_UNDECLARED", ref.method, ref.path)
154
- });
155
- }
156
- }
157
- }
158
-
159
- return findings;
160
- }
161
-
162
- /**
163
- * Detect env drift: new vars not in contract, required vars removed
164
- */
165
- function detectEnvDrift(envContract, truthpack) {
166
- const findings = [];
167
- const contractVars = new Map();
168
-
169
- for (const v of envContract.vars || []) {
170
- contractVars.set(v.name, v);
171
- }
172
-
173
- const usedVars = truthpack?.env?.vars || [];
174
- const currentVarNames = new Set(usedVars.map(v => v.name));
175
-
176
- // Check for new env vars used but not in contract
177
- for (const usedVar of usedVars) {
178
- if (!contractVars.has(usedVar.name)) {
179
- const isLikelyRequired = isRequiredEnvVar(usedVar.name);
180
- findings.push({
181
- id: fingerprint("DRIFT_NEW_ENV", usedVar.name),
182
- category: "ContractDrift",
183
- type: "new_env_not_in_contract",
184
- severity: isLikelyRequired ? "BLOCK" : "WARN",
185
- scope: "server",
186
- title: `Env var ${usedVar.name} used but not in contract`,
187
- message: `Code uses ${usedVar.name} but it's not declared in env contract.`,
188
- why: "Undeclared env vars can cause deployment failures and AI confusion.",
189
- evidence: usedVar.references || [],
190
- fixHints: [
191
- "Run 'vibecheck ctx sync' to update contracts",
192
- `Add ${usedVar.name} to .env.example`
193
- ],
194
- fingerprint: fingerprint("DRIFT_NEW_ENV", usedVar.name)
195
- });
196
- }
197
- }
198
-
199
- // Check for required contract vars no longer used
200
- for (const [name, spec] of contractVars) {
201
- if (spec.required && !currentVarNames.has(name)) {
202
- findings.push({
203
- id: fingerprint("DRIFT_REMOVED_ENV", name),
204
- category: "ContractDrift",
205
- type: "required_env_removed",
206
- severity: "WARN",
207
- scope: "contracts",
208
- title: `Required env var ${name} in contract but not used in code`,
209
- message: `Contract marks ${name} as required but code no longer uses it.`,
210
- why: "Stale env contracts cause confusion about what's actually needed.",
211
- evidence: [],
212
- fixHints: [
213
- "Run 'vibecheck ctx sync' to update contracts",
214
- "Or check if the var was accidentally removed from code"
215
- ],
216
- fingerprint: fingerprint("DRIFT_REMOVED_ENV", name)
217
- });
218
- }
219
- }
220
-
221
- return findings;
222
- }
223
-
224
- /**
225
- * Detect auth drift: protected patterns changed
226
- */
227
- function detectAuthDrift(authContract, truthpack) {
228
- const findings = [];
229
- const contractPatterns = new Set(authContract.protectedPatterns || []);
230
- const currentPatterns = new Set(truthpack?.auth?.nextMatcherPatterns || []);
231
-
232
- // New protected patterns not in contract
233
- for (const pattern of currentPatterns) {
234
- if (!contractPatterns.has(pattern)) {
235
- findings.push({
236
- id: fingerprint("DRIFT_NEW_AUTH", pattern),
237
- category: "ContractDrift",
238
- type: "new_auth_pattern",
239
- severity: "BLOCK",
240
- scope: "server",
241
- title: `New auth pattern "${pattern}" not in contract`,
242
- message: `Middleware protects a new pattern that isn't in the auth contract.`,
243
- why: "Auth contracts define security boundaries. Undeclared patterns may not be properly tested.",
244
- evidence: [],
245
- fixHints: [
246
- "Run 'vibecheck ctx sync' to update contracts",
247
- "Verify the new pattern is intentional"
248
- ],
249
- fingerprint: fingerprint("DRIFT_NEW_AUTH", pattern)
250
- });
251
- }
252
- }
253
-
254
- // Protected patterns in contract but removed from code
255
- for (const pattern of contractPatterns) {
256
- if (!currentPatterns.has(pattern)) {
257
- findings.push({
258
- id: fingerprint("DRIFT_REMOVED_AUTH", pattern),
259
- category: "ContractDrift",
260
- type: "auth_pattern_removed",
261
- severity: "BLOCK",
262
- scope: "contracts",
263
- title: `Auth pattern "${pattern}" in contract but removed from middleware`,
264
- message: `Contract expects protection for "${pattern}" but middleware no longer enforces it.`,
265
- why: "Removing auth patterns can expose protected routes. This is a security regression.",
266
- evidence: [],
267
- fixHints: [
268
- "Restore the auth pattern in middleware if removal was unintended",
269
- "Or run 'vibecheck ctx sync' to accept the change"
270
- ],
271
- fingerprint: fingerprint("DRIFT_REMOVED_AUTH", pattern)
272
- });
273
- }
274
- }
275
-
276
- return findings;
277
- }
278
-
279
- /**
280
- * Detect external service drift
281
- */
282
- function detectExternalDrift(externalContract, truthpack) {
283
- const findings = [];
284
- const contractServices = new Map();
285
-
286
- for (const svc of externalContract.services || []) {
287
- contractServices.set(svc.name, svc);
288
- }
289
-
290
- // Check Stripe webhook changes
291
- const billing = truthpack?.billing || {};
292
- if (contractServices.has("stripe")) {
293
- const contractStripe = contractServices.get("stripe");
294
- const currentWebhooks = billing.webhookCandidates || [];
295
-
296
- // New webhook not in contract
297
- for (const wh of currentWebhooks) {
298
- const inContract = contractStripe.webhooks?.some(cw => cw.path === wh.path);
299
- if (!inContract) {
300
- findings.push({
301
- id: fingerprint("DRIFT_NEW_WEBHOOK", wh.path),
302
- category: "ContractDrift",
303
- type: "new_webhook_not_in_contract",
304
- severity: "WARN",
305
- scope: "server",
306
- title: `New Stripe webhook at ${wh.path} not in contract`,
307
- message: `A webhook handler was added but not declared in external contract.`,
308
- why: "Webhook contracts ensure proper signature verification and idempotency.",
309
- evidence: wh.evidence || [],
310
- fixHints: [
311
- "Run 'vibecheck ctx sync' to update contracts"
312
- ],
313
- fingerprint: fingerprint("DRIFT_NEW_WEBHOOK", wh.path)
314
- });
315
- }
316
- }
317
- }
318
-
319
- return findings;
320
- }
321
-
322
- function findParameterizedMatch(routes, method, pathToMatch) {
323
- for (const r of routes || []) {
324
- if (r.method !== "*" && r.method !== method) continue;
325
- if (matchesParameterized(r.path, pathToMatch)) return r;
326
- }
327
- return null;
328
- }
329
-
330
- function matchesParameterized(pattern, actual) {
331
- const patternParts = pattern.split("/").filter(Boolean);
332
- const actualParts = actual.split("/").filter(Boolean);
333
-
334
- if (patternParts.length !== actualParts.length) return false;
335
-
336
- for (let i = 0; i < patternParts.length; i++) {
337
- const p = patternParts[i];
338
- if (p.startsWith(":") || p.startsWith("*") || p.startsWith("[")) continue;
339
- if (p !== actualParts[i]) return false;
340
- }
341
- return true;
342
- }
343
-
344
- function isRequiredEnvVar(name) {
345
- const requiredPatterns = [
346
- /^DATABASE_URL$/i,
347
- /^NEXTAUTH_SECRET$/i,
348
- /^NEXTAUTH_URL$/i,
349
- /^JWT_SECRET$/i,
350
- /^STRIPE_SECRET_KEY$/i,
351
- /^STRIPE_WEBHOOK_SECRET$/i,
352
- /^API_KEY$/i,
353
- /SECRET/i,
354
- /TOKEN$/i,
355
- ];
356
- return requiredPatterns.some(p => p.test(name));
357
- }
358
-
359
- /**
360
- * Load contracts from disk
361
- */
362
- function loadContracts(repoRoot) {
363
- const contractDir = path.join(repoRoot, ".vibecheck", "contracts");
364
- const contracts = {};
365
-
366
- const files = {
367
- routes: "routes.json",
368
- env: "env.json",
369
- auth: "auth.json",
370
- external: "external.json"
371
- };
372
-
373
- for (const [key, file] of Object.entries(files)) {
374
- const filePath = path.join(contractDir, file);
375
- if (fs.existsSync(filePath)) {
376
- try {
377
- contracts[key] = JSON.parse(fs.readFileSync(filePath, "utf8"));
378
- } catch (e) {
379
- // Silently skip invalid files
380
- }
381
- }
382
- }
383
-
384
- return contracts;
385
- }
386
-
387
- /**
388
- * Check if contracts exist
389
- */
390
- function hasContracts(repoRoot) {
391
- const contractDir = path.join(repoRoot, ".vibecheck", "contracts");
392
- if (!fs.existsSync(contractDir)) return false;
393
-
394
- const files = ["routes.json", "env.json", "auth.json", "external.json"];
395
- return files.some(f => fs.existsSync(path.join(contractDir, f)));
396
- }
397
-
398
- /**
399
- * Get drift summary for quick checks
400
- */
401
- function getDriftSummary(findings) {
402
- const blocks = findings.filter(f => f.severity === "BLOCK");
403
- const warns = findings.filter(f => f.severity === "WARN");
404
-
405
- return {
406
- hasDrift: findings.length > 0,
407
- blocks: blocks.length,
408
- warns: warns.length,
409
- verdict: blocks.length > 0 ? "BLOCK" : warns.length > 0 ? "WARN" : "PASS",
410
- categories: {
411
- routes: findings.filter(f => f.type.includes("route")).length,
412
- env: findings.filter(f => f.type.includes("env")).length,
413
- auth: findings.filter(f => f.type.includes("auth")).length,
414
- external: findings.filter(f => f.type.includes("webhook")).length
415
- }
416
- };
417
- }
418
-
419
- module.exports = {
420
- findContractDrift,
421
- loadContracts,
422
- hasContracts,
423
- getDriftSummary,
424
- fingerprint
425
- };
1
+ /**
2
+ * Contract Drift Detection
3
+ *
4
+ * Detects when code has drifted from contracts (routes/env/auth/external).
5
+ * Per spec: "routes/env/auth drift → usually BLOCK (because AI will lie here)"
6
+ */
7
+
8
+ "use strict";
9
+
10
+ const path = require("path");
11
+ const fs = require("fs");
12
+ const crypto = require("crypto");
13
+ const { createDriftFinding, migrateFindingToV2 } = require("./findings-schema");
14
+
15
+ /**
16
+ * Generate a stable fingerprint for a finding (for dedupe across runs)
17
+ */
18
+ function fingerprint(type, ...parts) {
19
+ const data = [type, ...parts].join("|");
20
+ return crypto.createHash("sha256").update(data).digest("hex").slice(0, 12);
21
+ }
22
+
23
+ /**
24
+ * Find drift between contracts and current truthpack
25
+ * Returns findings array with BLOCK/WARN severity based on category
26
+ */
27
+ function findContractDrift(contracts, truthpack, opts = {}) {
28
+ const findings = [];
29
+
30
+ // Route drift - BLOCK severity (AI can invent fake endpoints)
31
+ if (contracts?.routes && truthpack?.routes) {
32
+ const routeFindings = detectRouteDrift(contracts.routes, truthpack);
33
+ findings.push(...routeFindings);
34
+ }
35
+
36
+ // Env drift - BLOCK for required, WARN for optional
37
+ if (contracts?.env && truthpack?.env) {
38
+ const envFindings = detectEnvDrift(contracts.env, truthpack);
39
+ findings.push(...envFindings);
40
+ }
41
+
42
+ // Auth drift - BLOCK severity (security critical)
43
+ if (contracts?.auth && truthpack?.auth) {
44
+ const authFindings = detectAuthDrift(contracts.auth, truthpack);
45
+ findings.push(...authFindings);
46
+ }
47
+
48
+ // External drift - WARN severity (service changes)
49
+ if (contracts?.external) {
50
+ const externalFindings = detectExternalDrift(contracts.external, truthpack);
51
+ findings.push(...externalFindings);
52
+ }
53
+
54
+ return findings;
55
+ }
56
+
57
+ /**
58
+ * Detect route drift: new routes not in contract, removed routes still in contract
59
+ */
60
+ function detectRouteDrift(routeContract, truthpack) {
61
+ const findings = [];
62
+ const contractRoutes = new Map();
63
+
64
+ for (const r of routeContract.routes || []) {
65
+ const key = `${r.method}_${r.path}`;
66
+ contractRoutes.set(key, r);
67
+ }
68
+
69
+ const serverRoutes = truthpack?.routes?.server || [];
70
+ const currentRoutes = new Set();
71
+
72
+ // Check for new routes not in contract
73
+ for (const route of serverRoutes) {
74
+ const key = `${route.method}_${route.path}`;
75
+ currentRoutes.add(key);
76
+
77
+ if (!contractRoutes.has(key)) {
78
+ // Check parameterized match
79
+ const match = findParameterizedMatch(routeContract.routes, route.method, route.path);
80
+ if (!match) {
81
+ findings.push({
82
+ id: fingerprint("DRIFT_NEW_ROUTE", route.method, route.path),
83
+ category: "ContractDrift",
84
+ type: "new_route_not_in_contract",
85
+ severity: "BLOCK",
86
+ scope: "server",
87
+ title: `New route ${route.method} ${route.path} not declared in contract`,
88
+ message: `Route was added to code but not synced to contracts. AI agents cannot safely reference this route.`,
89
+ why: "Contracts are the source of truth. Undeclared routes can cause AI hallucinations.",
90
+ evidence: route.evidence || [],
91
+ fixHints: [
92
+ "Run 'vibecheck ctx sync' to update contracts",
93
+ "Or remove the route if unintended"
94
+ ],
95
+ fingerprint: fingerprint("DRIFT_NEW_ROUTE", route.method, route.path)
96
+ });
97
+ }
98
+ }
99
+ }
100
+
101
+ // Check for removed routes still in contract
102
+ for (const [key, contractRoute] of contractRoutes) {
103
+ if (!currentRoutes.has(key)) {
104
+ // Check if any current route matches parameterized
105
+ const stillExists = serverRoutes.some(r =>
106
+ matchesParameterized(contractRoute.path, r.path) &&
107
+ (contractRoute.method === "*" || contractRoute.method === r.method)
108
+ );
109
+
110
+ if (!stillExists) {
111
+ findings.push({
112
+ id: fingerprint("DRIFT_REMOVED_ROUTE", contractRoute.method, contractRoute.path),
113
+ category: "ContractDrift",
114
+ type: "route_removed_from_code",
115
+ severity: "BLOCK",
116
+ scope: "contracts",
117
+ title: `Route ${contractRoute.method} ${contractRoute.path} in contract but removed from code`,
118
+ message: `Contract declares a route that no longer exists. AI agents will reference a ghost endpoint.`,
119
+ why: "Stale contracts cause AI to generate code calling non-existent endpoints.",
120
+ evidence: contractRoute.evidence || [],
121
+ fixHints: [
122
+ "Run 'vibecheck ctx sync' to update contracts",
123
+ "Or restore the route if removal was unintended"
124
+ ],
125
+ fingerprint: fingerprint("DRIFT_REMOVED_ROUTE", contractRoute.method, contractRoute.path)
126
+ });
127
+ }
128
+ }
129
+ }
130
+
131
+ // Check for client refs not in contract (same as existing analyzer but with drift framing)
132
+ const clientRefs = truthpack?.routes?.clientRefs || [];
133
+ for (const ref of clientRefs) {
134
+ const key = `${ref.method}_${ref.path}`;
135
+ if (!contractRoutes.has(key)) {
136
+ const match = findParameterizedMatch(routeContract.routes, ref.method, ref.path);
137
+ if (!match) {
138
+ findings.push({
139
+ id: fingerprint("DRIFT_CLIENT_UNDECLARED", ref.method, ref.path),
140
+ category: "ContractDrift",
141
+ type: "client_refs_undeclared_route",
142
+ severity: "BLOCK",
143
+ scope: "client",
144
+ title: `Client calls ${ref.method} ${ref.path} which is not in contract`,
145
+ message: `Frontend references a route not declared in contracts. This will cause runtime errors.`,
146
+ why: "Client code should only call routes that exist in the contract.",
147
+ evidence: ref.evidence || [],
148
+ fixHints: [
149
+ "Create the missing route handler",
150
+ "Or update the client to use a valid route",
151
+ "Then run 'vibecheck ctx sync'"
152
+ ],
153
+ fingerprint: fingerprint("DRIFT_CLIENT_UNDECLARED", ref.method, ref.path)
154
+ });
155
+ }
156
+ }
157
+ }
158
+
159
+ return findings;
160
+ }
161
+
162
+ /**
163
+ * Detect env drift: new vars not in contract, required vars removed
164
+ */
165
+ function detectEnvDrift(envContract, truthpack) {
166
+ const findings = [];
167
+ const contractVars = new Map();
168
+
169
+ for (const v of envContract.vars || []) {
170
+ contractVars.set(v.name, v);
171
+ }
172
+
173
+ const usedVars = truthpack?.env?.vars || [];
174
+ const currentVarNames = new Set(usedVars.map(v => v.name));
175
+
176
+ // Check for new env vars used but not in contract
177
+ for (const usedVar of usedVars) {
178
+ if (!contractVars.has(usedVar.name)) {
179
+ const isLikelyRequired = isRequiredEnvVar(usedVar.name);
180
+ findings.push({
181
+ id: fingerprint("DRIFT_NEW_ENV", usedVar.name),
182
+ category: "ContractDrift",
183
+ type: "new_env_not_in_contract",
184
+ severity: isLikelyRequired ? "BLOCK" : "WARN",
185
+ scope: "server",
186
+ title: `Env var ${usedVar.name} used but not in contract`,
187
+ message: `Code uses ${usedVar.name} but it's not declared in env contract.`,
188
+ why: "Undeclared env vars can cause deployment failures and AI confusion.",
189
+ evidence: usedVar.references || [],
190
+ fixHints: [
191
+ "Run 'vibecheck ctx sync' to update contracts",
192
+ `Add ${usedVar.name} to .env.example`
193
+ ],
194
+ fingerprint: fingerprint("DRIFT_NEW_ENV", usedVar.name)
195
+ });
196
+ }
197
+ }
198
+
199
+ // Check for required contract vars no longer used
200
+ for (const [name, spec] of contractVars) {
201
+ if (spec.required && !currentVarNames.has(name)) {
202
+ findings.push({
203
+ id: fingerprint("DRIFT_REMOVED_ENV", name),
204
+ category: "ContractDrift",
205
+ type: "required_env_removed",
206
+ severity: "WARN",
207
+ scope: "contracts",
208
+ title: `Required env var ${name} in contract but not used in code`,
209
+ message: `Contract marks ${name} as required but code no longer uses it.`,
210
+ why: "Stale env contracts cause confusion about what's actually needed.",
211
+ evidence: [],
212
+ fixHints: [
213
+ "Run 'vibecheck ctx sync' to update contracts",
214
+ "Or check if the var was accidentally removed from code"
215
+ ],
216
+ fingerprint: fingerprint("DRIFT_REMOVED_ENV", name)
217
+ });
218
+ }
219
+ }
220
+
221
+ return findings;
222
+ }
223
+
224
+ /**
225
+ * Detect auth drift: protected patterns changed
226
+ */
227
+ function detectAuthDrift(authContract, truthpack) {
228
+ const findings = [];
229
+ const contractPatterns = new Set(authContract.protectedPatterns || []);
230
+ const currentPatterns = new Set(truthpack?.auth?.nextMatcherPatterns || []);
231
+
232
+ // New protected patterns not in contract
233
+ for (const pattern of currentPatterns) {
234
+ if (!contractPatterns.has(pattern)) {
235
+ findings.push({
236
+ id: fingerprint("DRIFT_NEW_AUTH", pattern),
237
+ category: "ContractDrift",
238
+ type: "new_auth_pattern",
239
+ severity: "BLOCK",
240
+ scope: "server",
241
+ title: `New auth pattern "${pattern}" not in contract`,
242
+ message: `Middleware protects a new pattern that isn't in the auth contract.`,
243
+ why: "Auth contracts define security boundaries. Undeclared patterns may not be properly tested.",
244
+ evidence: [],
245
+ fixHints: [
246
+ "Run 'vibecheck ctx sync' to update contracts",
247
+ "Verify the new pattern is intentional"
248
+ ],
249
+ fingerprint: fingerprint("DRIFT_NEW_AUTH", pattern)
250
+ });
251
+ }
252
+ }
253
+
254
+ // Protected patterns in contract but removed from code
255
+ for (const pattern of contractPatterns) {
256
+ if (!currentPatterns.has(pattern)) {
257
+ findings.push({
258
+ id: fingerprint("DRIFT_REMOVED_AUTH", pattern),
259
+ category: "ContractDrift",
260
+ type: "auth_pattern_removed",
261
+ severity: "BLOCK",
262
+ scope: "contracts",
263
+ title: `Auth pattern "${pattern}" in contract but removed from middleware`,
264
+ message: `Contract expects protection for "${pattern}" but middleware no longer enforces it.`,
265
+ why: "Removing auth patterns can expose protected routes. This is a security regression.",
266
+ evidence: [],
267
+ fixHints: [
268
+ "Restore the auth pattern in middleware if removal was unintended",
269
+ "Or run 'vibecheck ctx sync' to accept the change"
270
+ ],
271
+ fingerprint: fingerprint("DRIFT_REMOVED_AUTH", pattern)
272
+ });
273
+ }
274
+ }
275
+
276
+ return findings;
277
+ }
278
+
279
+ /**
280
+ * Detect external service drift
281
+ */
282
+ function detectExternalDrift(externalContract, truthpack) {
283
+ const findings = [];
284
+ const contractServices = new Map();
285
+
286
+ for (const svc of externalContract.services || []) {
287
+ contractServices.set(svc.name, svc);
288
+ }
289
+
290
+ // Check Stripe webhook changes
291
+ const billing = truthpack?.billing || {};
292
+ if (contractServices.has("stripe")) {
293
+ const contractStripe = contractServices.get("stripe");
294
+ const currentWebhooks = billing.webhookCandidates || [];
295
+
296
+ // New webhook not in contract
297
+ for (const wh of currentWebhooks) {
298
+ const inContract = contractStripe.webhooks?.some(cw => cw.path === wh.path);
299
+ if (!inContract) {
300
+ findings.push({
301
+ id: fingerprint("DRIFT_NEW_WEBHOOK", wh.path),
302
+ category: "ContractDrift",
303
+ type: "new_webhook_not_in_contract",
304
+ severity: "WARN",
305
+ scope: "server",
306
+ title: `New Stripe webhook at ${wh.path} not in contract`,
307
+ message: `A webhook handler was added but not declared in external contract.`,
308
+ why: "Webhook contracts ensure proper signature verification and idempotency.",
309
+ evidence: wh.evidence || [],
310
+ fixHints: [
311
+ "Run 'vibecheck ctx sync' to update contracts"
312
+ ],
313
+ fingerprint: fingerprint("DRIFT_NEW_WEBHOOK", wh.path)
314
+ });
315
+ }
316
+ }
317
+ }
318
+
319
+ return findings;
320
+ }
321
+
322
+ function findParameterizedMatch(routes, method, pathToMatch) {
323
+ for (const r of routes || []) {
324
+ if (r.method !== "*" && r.method !== method) continue;
325
+ if (matchesParameterized(r.path, pathToMatch)) return r;
326
+ }
327
+ return null;
328
+ }
329
+
330
+ function matchesParameterized(pattern, actual) {
331
+ const patternParts = pattern.split("/").filter(Boolean);
332
+ const actualParts = actual.split("/").filter(Boolean);
333
+
334
+ if (patternParts.length !== actualParts.length) return false;
335
+
336
+ for (let i = 0; i < patternParts.length; i++) {
337
+ const p = patternParts[i];
338
+ if (p.startsWith(":") || p.startsWith("*") || p.startsWith("[")) continue;
339
+ if (p !== actualParts[i]) return false;
340
+ }
341
+ return true;
342
+ }
343
+
344
+ function isRequiredEnvVar(name) {
345
+ const requiredPatterns = [
346
+ /^DATABASE_URL$/i,
347
+ /^NEXTAUTH_SECRET$/i,
348
+ /^NEXTAUTH_URL$/i,
349
+ /^JWT_SECRET$/i,
350
+ /^STRIPE_SECRET_KEY$/i,
351
+ /^STRIPE_WEBHOOK_SECRET$/i,
352
+ /^API_KEY$/i,
353
+ /SECRET/i,
354
+ /TOKEN$/i,
355
+ ];
356
+ return requiredPatterns.some(p => p.test(name));
357
+ }
358
+
359
+ /**
360
+ * Load contracts from disk
361
+ */
362
+ function loadContracts(repoRoot) {
363
+ const contractDir = path.join(repoRoot, ".vibecheck", "contracts");
364
+ const contracts = {};
365
+
366
+ const files = {
367
+ routes: "routes.json",
368
+ env: "env.json",
369
+ auth: "auth.json",
370
+ external: "external.json"
371
+ };
372
+
373
+ for (const [key, file] of Object.entries(files)) {
374
+ const filePath = path.join(contractDir, file);
375
+ if (fs.existsSync(filePath)) {
376
+ try {
377
+ contracts[key] = JSON.parse(fs.readFileSync(filePath, "utf8"));
378
+ } catch (e) {
379
+ // Silently skip invalid files
380
+ }
381
+ }
382
+ }
383
+
384
+ return contracts;
385
+ }
386
+
387
+ /**
388
+ * Check if contracts exist
389
+ */
390
+ function hasContracts(repoRoot) {
391
+ const contractDir = path.join(repoRoot, ".vibecheck", "contracts");
392
+ if (!fs.existsSync(contractDir)) return false;
393
+
394
+ const files = ["routes.json", "env.json", "auth.json", "external.json"];
395
+ return files.some(f => fs.existsSync(path.join(contractDir, f)));
396
+ }
397
+
398
+ /**
399
+ * Get drift summary for quick checks
400
+ */
401
+ function getDriftSummary(findings) {
402
+ const blocks = findings.filter(f => f.severity === "BLOCK");
403
+ const warns = findings.filter(f => f.severity === "WARN");
404
+
405
+ return {
406
+ hasDrift: findings.length > 0,
407
+ blocks: blocks.length,
408
+ warns: warns.length,
409
+ verdict: blocks.length > 0 ? "BLOCK" : warns.length > 0 ? "WARN" : "PASS",
410
+ categories: {
411
+ routes: findings.filter(f => f.type.includes("route")).length,
412
+ env: findings.filter(f => f.type.includes("env")).length,
413
+ auth: findings.filter(f => f.type.includes("auth")).length,
414
+ external: findings.filter(f => f.type.includes("webhook")).length
415
+ }
416
+ };
417
+ }
418
+
419
+ module.exports = {
420
+ findContractDrift,
421
+ loadContracts,
422
+ hasContracts,
423
+ getDriftSummary,
424
+ fingerprint
425
+ };