@vorionsys/shared-constants 1.0.1 → 1.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +39 -0
- package/LICENSE +190 -0
- package/README.md +418 -44
- package/dist/api-versions.d.ts +91 -0
- package/dist/capabilities.cjs +4 -3
- package/dist/capabilities.d.cts +3 -2
- package/dist/capabilities.d.ts +56 -0
- package/dist/capabilities.js +1 -1
- package/dist/chunk-CJQJGJZ6.js +216 -0
- package/dist/chunk-JOS3AHBL.js +176 -0
- package/dist/{chunk-IKLCEYZT.js → chunk-OEEPW54O.js} +4 -6
- package/dist/domains.cjs +4 -6
- package/dist/domains.d.cts +4 -8
- package/dist/domains.d.ts +246 -0
- package/dist/domains.js +1 -1
- package/dist/error-codes.d.ts +633 -0
- package/dist/index.cjs +349 -12
- package/dist/index.d.cts +119 -4
- package/dist/index.d.ts +169 -0
- package/dist/index.js +330 -5
- package/dist/products.cjs +1 -1
- package/dist/products.d.ts +80 -0
- package/dist/products.js +1 -1
- package/dist/rate-limits.d.ts +80 -0
- package/dist/themes.d.ts +85 -0
- package/dist/tiers.d.ts +75 -0
- package/package.json +30 -8
- package/dist/chunk-F2R6HBF5.js +0 -253
- package/dist/chunk-PHL3CB53.js +0 -159
- package/src/api-versions.ts +0 -250
- package/src/capabilities.ts +0 -272
- package/src/domains.ts +0 -216
- package/src/error-codes.ts +0 -494
- package/src/index.ts +0 -206
- package/src/products.ts +0 -285
- package/src/rate-limits.ts +0 -334
- package/src/themes.ts +0 -380
- package/src/tiers.ts +0 -239
- package/tsconfig.json +0 -25
package/dist/capabilities.d.cts
CHANGED
|
@@ -11,12 +11,13 @@ import { TrustTier } from './tiers.cjs';
|
|
|
11
11
|
|
|
12
12
|
declare enum CapabilityCategory {
|
|
13
13
|
DATA_ACCESS = "data_access",
|
|
14
|
+
FILE_OPERATIONS = "file_operations",
|
|
14
15
|
API_ACCESS = "api_access",
|
|
15
16
|
CODE_EXECUTION = "code_execution",
|
|
16
17
|
AGENT_INTERACTION = "agent_interaction",
|
|
17
18
|
RESOURCE_MANAGEMENT = "resource_management",
|
|
18
|
-
|
|
19
|
-
|
|
19
|
+
SYSTEM_ADMINISTRATION = "system_administration",
|
|
20
|
+
GOVERNANCE = "governance"
|
|
20
21
|
}
|
|
21
22
|
interface CapabilityDefinition {
|
|
22
23
|
readonly code: string;
|
|
@@ -0,0 +1,56 @@
|
|
|
1
|
+
import { TrustTier } from './tiers.js';
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* @vorionsys/shared-constants - Capability Definitions
|
|
5
|
+
*
|
|
6
|
+
* Single source of truth for capability codes and tier requirements
|
|
7
|
+
* Used across all Vorion ecosystem products
|
|
8
|
+
*
|
|
9
|
+
* @see https://basis.vorion.org/capabilities
|
|
10
|
+
*/
|
|
11
|
+
|
|
12
|
+
declare enum CapabilityCategory {
|
|
13
|
+
DATA_ACCESS = "data_access",
|
|
14
|
+
FILE_OPERATIONS = "file_operations",
|
|
15
|
+
API_ACCESS = "api_access",
|
|
16
|
+
CODE_EXECUTION = "code_execution",
|
|
17
|
+
AGENT_INTERACTION = "agent_interaction",
|
|
18
|
+
RESOURCE_MANAGEMENT = "resource_management",
|
|
19
|
+
SYSTEM_ADMINISTRATION = "system_administration",
|
|
20
|
+
GOVERNANCE = "governance"
|
|
21
|
+
}
|
|
22
|
+
interface CapabilityDefinition {
|
|
23
|
+
readonly code: string;
|
|
24
|
+
readonly name: string;
|
|
25
|
+
readonly category: CapabilityCategory;
|
|
26
|
+
readonly description: string;
|
|
27
|
+
readonly unlockTier: TrustTier;
|
|
28
|
+
readonly constraints?: readonly string[];
|
|
29
|
+
}
|
|
30
|
+
declare const CAPABILITIES: readonly CapabilityDefinition[];
|
|
31
|
+
/**
|
|
32
|
+
* Get capabilities available at a specific tier
|
|
33
|
+
*/
|
|
34
|
+
declare function getCapabilitiesForTier(tier: TrustTier): CapabilityDefinition[];
|
|
35
|
+
/**
|
|
36
|
+
* Get capability by code
|
|
37
|
+
*/
|
|
38
|
+
declare function getCapability(code: string): CapabilityDefinition | undefined;
|
|
39
|
+
/**
|
|
40
|
+
* Check if a capability is available at a tier
|
|
41
|
+
*/
|
|
42
|
+
declare function isCapabilityAvailable(code: string, tier: TrustTier): boolean;
|
|
43
|
+
/**
|
|
44
|
+
* Get minimum tier required for a capability
|
|
45
|
+
*/
|
|
46
|
+
declare function getCapabilityMinTier(code: string): TrustTier | undefined;
|
|
47
|
+
/**
|
|
48
|
+
* Get capabilities by category
|
|
49
|
+
*/
|
|
50
|
+
declare function getCapabilitiesByCategory(category: CapabilityCategory): CapabilityDefinition[];
|
|
51
|
+
/**
|
|
52
|
+
* Get all capability codes
|
|
53
|
+
*/
|
|
54
|
+
declare function getAllCapabilityCodes(): string[];
|
|
55
|
+
|
|
56
|
+
export { CAPABILITIES, CapabilityCategory, type CapabilityDefinition, getAllCapabilityCodes, getCapabilitiesByCategory, getCapabilitiesForTier, getCapability, getCapabilityMinTier, isCapabilityAvailable };
|
package/dist/capabilities.js
CHANGED
|
@@ -0,0 +1,216 @@
|
|
|
1
|
+
// src/capabilities.ts
|
|
2
|
+
var CapabilityCategory = /* @__PURE__ */ ((CapabilityCategory2) => {
|
|
3
|
+
CapabilityCategory2["DATA_ACCESS"] = "data_access";
|
|
4
|
+
CapabilityCategory2["FILE_OPERATIONS"] = "file_operations";
|
|
5
|
+
CapabilityCategory2["API_ACCESS"] = "api_access";
|
|
6
|
+
CapabilityCategory2["CODE_EXECUTION"] = "code_execution";
|
|
7
|
+
CapabilityCategory2["AGENT_INTERACTION"] = "agent_interaction";
|
|
8
|
+
CapabilityCategory2["RESOURCE_MANAGEMENT"] = "resource_management";
|
|
9
|
+
CapabilityCategory2["SYSTEM_ADMINISTRATION"] = "system_administration";
|
|
10
|
+
CapabilityCategory2["GOVERNANCE"] = "governance";
|
|
11
|
+
return CapabilityCategory2;
|
|
12
|
+
})(CapabilityCategory || {});
|
|
13
|
+
var CAPABILITIES = [
|
|
14
|
+
// T0 - Sandbox
|
|
15
|
+
{
|
|
16
|
+
code: "CAP-READ-PUBLIC",
|
|
17
|
+
name: "Read Public Data",
|
|
18
|
+
category: "data_access" /* DATA_ACCESS */,
|
|
19
|
+
description: "Access publicly available data",
|
|
20
|
+
unlockTier: 0 /* T0_SANDBOX */
|
|
21
|
+
},
|
|
22
|
+
{
|
|
23
|
+
code: "CAP-GENERATE-TEXT",
|
|
24
|
+
name: "Generate Text",
|
|
25
|
+
category: "code_execution" /* CODE_EXECUTION */,
|
|
26
|
+
description: "Generate text responses",
|
|
27
|
+
unlockTier: 0 /* T0_SANDBOX */
|
|
28
|
+
},
|
|
29
|
+
// T1 - Observed
|
|
30
|
+
{
|
|
31
|
+
code: "CAP-READ-INTERNAL",
|
|
32
|
+
name: "Read Internal Data",
|
|
33
|
+
category: "data_access" /* DATA_ACCESS */,
|
|
34
|
+
description: "Access internal data within allowed scopes",
|
|
35
|
+
unlockTier: 1 /* T1_OBSERVED */,
|
|
36
|
+
constraints: ["Read-only", "Logged"]
|
|
37
|
+
},
|
|
38
|
+
{
|
|
39
|
+
code: "CAP-INTERNAL-API",
|
|
40
|
+
name: "Internal API Access",
|
|
41
|
+
category: "api_access" /* API_ACCESS */,
|
|
42
|
+
description: "Make read-only internal API calls",
|
|
43
|
+
unlockTier: 1 /* T1_OBSERVED */,
|
|
44
|
+
constraints: ["GET only", "Rate limited"]
|
|
45
|
+
},
|
|
46
|
+
// T2 - Provisional
|
|
47
|
+
{
|
|
48
|
+
code: "CAP-FILE-WRITE",
|
|
49
|
+
name: "Write Files",
|
|
50
|
+
category: "file_operations" /* FILE_OPERATIONS */,
|
|
51
|
+
description: "Write to approved directories",
|
|
52
|
+
unlockTier: 2 /* T2_PROVISIONAL */,
|
|
53
|
+
constraints: ["Approved dirs only", "Size limited"]
|
|
54
|
+
},
|
|
55
|
+
{
|
|
56
|
+
code: "CAP-DB-READ",
|
|
57
|
+
name: "Database Read",
|
|
58
|
+
category: "data_access" /* DATA_ACCESS */,
|
|
59
|
+
description: "Read from approved database tables",
|
|
60
|
+
unlockTier: 2 /* T2_PROVISIONAL */,
|
|
61
|
+
constraints: ["Approved tables", "Query timeout"]
|
|
62
|
+
},
|
|
63
|
+
{
|
|
64
|
+
code: "CAP-EXTERNAL-API-READ",
|
|
65
|
+
name: "External API Read",
|
|
66
|
+
category: "api_access" /* API_ACCESS */,
|
|
67
|
+
description: "Make GET requests to approved external APIs",
|
|
68
|
+
unlockTier: 2 /* T2_PROVISIONAL */,
|
|
69
|
+
constraints: ["GET only", "Approved endpoints"]
|
|
70
|
+
},
|
|
71
|
+
// T3 - Monitored
|
|
72
|
+
{
|
|
73
|
+
code: "CAP-DB-WRITE",
|
|
74
|
+
name: "Database Write",
|
|
75
|
+
category: "data_access" /* DATA_ACCESS */,
|
|
76
|
+
description: "Write to approved database tables",
|
|
77
|
+
unlockTier: 3 /* T3_MONITORED */,
|
|
78
|
+
constraints: ["Approved tables", "Transaction limits"]
|
|
79
|
+
},
|
|
80
|
+
{
|
|
81
|
+
code: "CAP-EXTERNAL-API-FULL",
|
|
82
|
+
name: "External API Full Access",
|
|
83
|
+
category: "api_access" /* API_ACCESS */,
|
|
84
|
+
description: "Full REST operations on approved external APIs",
|
|
85
|
+
unlockTier: 3 /* T3_MONITORED */,
|
|
86
|
+
constraints: ["Approved endpoints", "Rate limited"]
|
|
87
|
+
},
|
|
88
|
+
{
|
|
89
|
+
code: "CAP-CODE-SANDBOX",
|
|
90
|
+
name: "Sandboxed Code Execution",
|
|
91
|
+
category: "code_execution" /* CODE_EXECUTION */,
|
|
92
|
+
description: "Execute code in isolated sandbox",
|
|
93
|
+
unlockTier: 3 /* T3_MONITORED */,
|
|
94
|
+
constraints: ["Sandboxed", "Time limited", "No network"]
|
|
95
|
+
},
|
|
96
|
+
// T4 - Standard
|
|
97
|
+
{
|
|
98
|
+
code: "CAP-AGENT-COMMUNICATE",
|
|
99
|
+
name: "Agent Communication",
|
|
100
|
+
category: "agent_interaction" /* AGENT_INTERACTION */,
|
|
101
|
+
description: "Send and receive messages to/from other agents",
|
|
102
|
+
unlockTier: 4 /* T4_STANDARD */,
|
|
103
|
+
constraints: ["Approved agents", "Message limits"]
|
|
104
|
+
},
|
|
105
|
+
{
|
|
106
|
+
code: "CAP-WORKFLOW-MULTI",
|
|
107
|
+
name: "Multi-Step Workflow",
|
|
108
|
+
category: "code_execution" /* CODE_EXECUTION */,
|
|
109
|
+
description: "Orchestrate multi-step workflows",
|
|
110
|
+
unlockTier: 4 /* T4_STANDARD */,
|
|
111
|
+
constraints: ["Approved patterns", "Checkpoints required"]
|
|
112
|
+
},
|
|
113
|
+
{
|
|
114
|
+
code: "CAP-ESCALATE-HUMAN",
|
|
115
|
+
name: "Human Escalation",
|
|
116
|
+
category: "governance" /* GOVERNANCE */,
|
|
117
|
+
description: "Initiate escalation to human reviewers",
|
|
118
|
+
unlockTier: 4 /* T4_STANDARD */
|
|
119
|
+
},
|
|
120
|
+
// T5 - Trusted
|
|
121
|
+
{
|
|
122
|
+
code: "CAP-AGENT-DELEGATE",
|
|
123
|
+
name: "Task Delegation",
|
|
124
|
+
category: "agent_interaction" /* AGENT_INTERACTION */,
|
|
125
|
+
description: "Delegate tasks to other agents",
|
|
126
|
+
unlockTier: 5 /* T5_TRUSTED */,
|
|
127
|
+
constraints: ["Trust verified agents"]
|
|
128
|
+
},
|
|
129
|
+
{
|
|
130
|
+
code: "CAP-RESOURCE-PROVISION",
|
|
131
|
+
name: "Resource Provisioning",
|
|
132
|
+
category: "resource_management" /* RESOURCE_MANAGEMENT */,
|
|
133
|
+
description: "Provision computational resources",
|
|
134
|
+
unlockTier: 5 /* T5_TRUSTED */,
|
|
135
|
+
constraints: ["Budget limits", "Approval required"]
|
|
136
|
+
},
|
|
137
|
+
// T6 - Certified
|
|
138
|
+
{
|
|
139
|
+
code: "CAP-AGENT-SPAWN",
|
|
140
|
+
name: "Spawn Agents",
|
|
141
|
+
category: "agent_interaction" /* AGENT_INTERACTION */,
|
|
142
|
+
description: "Create new agent instances",
|
|
143
|
+
unlockTier: 6 /* T6_CERTIFIED */,
|
|
144
|
+
constraints: ["Template required", "Quota limited"]
|
|
145
|
+
},
|
|
146
|
+
{
|
|
147
|
+
code: "CAP-INFRA-MANAGE",
|
|
148
|
+
name: "Infrastructure Management",
|
|
149
|
+
category: "resource_management" /* RESOURCE_MANAGEMENT */,
|
|
150
|
+
description: "Manage infrastructure resources",
|
|
151
|
+
unlockTier: 6 /* T6_CERTIFIED */,
|
|
152
|
+
constraints: ["Approved resources"]
|
|
153
|
+
},
|
|
154
|
+
{
|
|
155
|
+
code: "CAP-POLICY-CREATE",
|
|
156
|
+
name: "Policy Creation",
|
|
157
|
+
category: "governance" /* GOVERNANCE */,
|
|
158
|
+
description: "Create governance policies",
|
|
159
|
+
unlockTier: 6 /* T6_CERTIFIED */,
|
|
160
|
+
constraints: ["Review required"]
|
|
161
|
+
},
|
|
162
|
+
// T7 - Autonomous
|
|
163
|
+
{
|
|
164
|
+
code: "CAP-FULL-ADMIN",
|
|
165
|
+
name: "Full Administration",
|
|
166
|
+
category: "system_administration" /* SYSTEM_ADMINISTRATION */,
|
|
167
|
+
description: "Full administrative access",
|
|
168
|
+
unlockTier: 7 /* T7_AUTONOMOUS */
|
|
169
|
+
},
|
|
170
|
+
{
|
|
171
|
+
code: "CAP-SELF-MODIFY",
|
|
172
|
+
name: "Self-Modification",
|
|
173
|
+
category: "code_execution" /* CODE_EXECUTION */,
|
|
174
|
+
description: "Modify own configuration and behavior",
|
|
175
|
+
unlockTier: 7 /* T7_AUTONOMOUS */,
|
|
176
|
+
constraints: ["Ethical bounds", "Audit logged"]
|
|
177
|
+
},
|
|
178
|
+
{
|
|
179
|
+
code: "CAP-STRATEGIC-DECISION",
|
|
180
|
+
name: "Strategic Decisions",
|
|
181
|
+
category: "governance" /* GOVERNANCE */,
|
|
182
|
+
description: "Make strategic organizational decisions",
|
|
183
|
+
unlockTier: 7 /* T7_AUTONOMOUS */,
|
|
184
|
+
constraints: ["Human oversight available"]
|
|
185
|
+
}
|
|
186
|
+
];
|
|
187
|
+
function getCapabilitiesForTier(tier) {
|
|
188
|
+
return CAPABILITIES.filter((cap) => cap.unlockTier <= tier);
|
|
189
|
+
}
|
|
190
|
+
function getCapability(code) {
|
|
191
|
+
return CAPABILITIES.find((cap) => cap.code === code);
|
|
192
|
+
}
|
|
193
|
+
function isCapabilityAvailable(code, tier) {
|
|
194
|
+
const cap = getCapability(code);
|
|
195
|
+
return cap !== void 0 && cap.unlockTier <= tier;
|
|
196
|
+
}
|
|
197
|
+
function getCapabilityMinTier(code) {
|
|
198
|
+
return getCapability(code)?.unlockTier;
|
|
199
|
+
}
|
|
200
|
+
function getCapabilitiesByCategory(category) {
|
|
201
|
+
return CAPABILITIES.filter((cap) => cap.category === category);
|
|
202
|
+
}
|
|
203
|
+
function getAllCapabilityCodes() {
|
|
204
|
+
return CAPABILITIES.map((cap) => cap.code);
|
|
205
|
+
}
|
|
206
|
+
|
|
207
|
+
export {
|
|
208
|
+
CapabilityCategory,
|
|
209
|
+
CAPABILITIES,
|
|
210
|
+
getCapabilitiesForTier,
|
|
211
|
+
getCapability,
|
|
212
|
+
isCapabilityAvailable,
|
|
213
|
+
getCapabilityMinTier,
|
|
214
|
+
getCapabilitiesByCategory,
|
|
215
|
+
getAllCapabilityCodes
|
|
216
|
+
};
|
|
@@ -0,0 +1,176 @@
|
|
|
1
|
+
// src/products.ts
|
|
2
|
+
var ProductCategory = /* @__PURE__ */ ((ProductCategory2) => {
|
|
3
|
+
ProductCategory2["OPEN_SOURCE"] = "open_source";
|
|
4
|
+
ProductCategory2["COMMERCIAL"] = "commercial";
|
|
5
|
+
ProductCategory2["DEVELOPER_TOOLS"] = "developer_tools";
|
|
6
|
+
ProductCategory2["EDUCATION"] = "education";
|
|
7
|
+
return ProductCategory2;
|
|
8
|
+
})(ProductCategory || {});
|
|
9
|
+
var ProductStatus = /* @__PURE__ */ ((ProductStatus2) => {
|
|
10
|
+
ProductStatus2["DEVELOPMENT"] = "development";
|
|
11
|
+
ProductStatus2["ALPHA"] = "alpha";
|
|
12
|
+
ProductStatus2["BETA"] = "beta";
|
|
13
|
+
ProductStatus2["GA"] = "ga";
|
|
14
|
+
ProductStatus2["DEPRECATED"] = "deprecated";
|
|
15
|
+
ProductStatus2["EOL"] = "eol";
|
|
16
|
+
return ProductStatus2;
|
|
17
|
+
})(ProductStatus || {});
|
|
18
|
+
var VORION_PRODUCTS = {
|
|
19
|
+
basis: {
|
|
20
|
+
id: "basis",
|
|
21
|
+
name: "BASIS",
|
|
22
|
+
description: "Blockchain Agent Safety & Identity Standard - Open framework for AI agent governance",
|
|
23
|
+
category: "open_source" /* OPEN_SOURCE */,
|
|
24
|
+
status: "ga" /* GA */,
|
|
25
|
+
url: "https://basis.vorion.org",
|
|
26
|
+
docsUrl: "https://basis.vorion.org/docs",
|
|
27
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/packages/basis",
|
|
28
|
+
npmPackage: "@vorionsys/basis",
|
|
29
|
+
organization: "vorion",
|
|
30
|
+
version: "1.0.0"
|
|
31
|
+
},
|
|
32
|
+
carId: {
|
|
33
|
+
id: "car-id",
|
|
34
|
+
name: "CAR ID",
|
|
35
|
+
description: "Categorical Agentic Registry - Universal agent identification system",
|
|
36
|
+
category: "open_source" /* OPEN_SOURCE */,
|
|
37
|
+
status: "ga" /* GA */,
|
|
38
|
+
url: "https://carid.vorion.org",
|
|
39
|
+
docsUrl: "https://carid.vorion.org/docs",
|
|
40
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/packages/car-spec",
|
|
41
|
+
npmPackage: "@vorionsys/car-spec",
|
|
42
|
+
organization: "vorion",
|
|
43
|
+
version: "1.0.0"
|
|
44
|
+
},
|
|
45
|
+
atsf: {
|
|
46
|
+
id: "atsf",
|
|
47
|
+
name: "ATSF",
|
|
48
|
+
description: "Agent Trust & Safety Framework - Comprehensive safety evaluation system",
|
|
49
|
+
category: "open_source" /* OPEN_SOURCE */,
|
|
50
|
+
status: "beta" /* BETA */,
|
|
51
|
+
url: "https://atsf.vorion.org",
|
|
52
|
+
docsUrl: "https://atsf.vorion.org/docs",
|
|
53
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/packages/atsf-core",
|
|
54
|
+
npmPackage: "@vorionsys/atsf-core",
|
|
55
|
+
organization: "vorion",
|
|
56
|
+
version: "0.9.0"
|
|
57
|
+
},
|
|
58
|
+
kaizen: {
|
|
59
|
+
id: "kaizen",
|
|
60
|
+
name: "Kaizen",
|
|
61
|
+
description: "Interactive AI Learning Experience - Educational platform for agentic AI",
|
|
62
|
+
category: "education" /* EDUCATION */,
|
|
63
|
+
status: "beta" /* BETA */,
|
|
64
|
+
url: "https://learn.vorion.org",
|
|
65
|
+
docsUrl: "https://learn.vorion.org/docs",
|
|
66
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/kaizen",
|
|
67
|
+
organization: "vorion"
|
|
68
|
+
},
|
|
69
|
+
kaizenStudio: {
|
|
70
|
+
id: "kaizen-studio",
|
|
71
|
+
name: "Kaizen Studio",
|
|
72
|
+
description: "Interactive AI learning studio - hands-on agentic AI experiments",
|
|
73
|
+
category: "education" /* EDUCATION */,
|
|
74
|
+
status: "beta" /* BETA */,
|
|
75
|
+
url: "https://kaizen.vorion.org",
|
|
76
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/kaizen",
|
|
77
|
+
organization: "vorion"
|
|
78
|
+
},
|
|
79
|
+
proofPlane: {
|
|
80
|
+
id: "proof-plane",
|
|
81
|
+
name: "Proof Plane",
|
|
82
|
+
description: "Cryptographic proof layer for agent attestations and verifiable execution",
|
|
83
|
+
category: "open_source" /* OPEN_SOURCE */,
|
|
84
|
+
status: "beta" /* BETA */,
|
|
85
|
+
url: "https://vorion.org/proof-plane",
|
|
86
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/packages/proof-plane",
|
|
87
|
+
npmPackage: "@vorionsys/proof-plane",
|
|
88
|
+
organization: "vorion",
|
|
89
|
+
version: "0.5.0"
|
|
90
|
+
},
|
|
91
|
+
contracts: {
|
|
92
|
+
id: "contracts",
|
|
93
|
+
name: "Vorion Contracts",
|
|
94
|
+
description: "Smart contracts for on-chain agent governance and attestations",
|
|
95
|
+
category: "open_source" /* OPEN_SOURCE */,
|
|
96
|
+
status: "beta" /* BETA */,
|
|
97
|
+
url: "https://vorion.org/contracts",
|
|
98
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/packages/contracts",
|
|
99
|
+
npmPackage: "@vorionsys/contracts",
|
|
100
|
+
organization: "vorion"
|
|
101
|
+
}
|
|
102
|
+
};
|
|
103
|
+
var AGENTANCHOR_PRODUCTS = {
|
|
104
|
+
cognigate: {
|
|
105
|
+
id: "cognigate",
|
|
106
|
+
name: "Cognigate",
|
|
107
|
+
description: "AI Governance API - Reference implementation of BASIS runtime",
|
|
108
|
+
category: "commercial" /* COMMERCIAL */,
|
|
109
|
+
status: "ga" /* GA */,
|
|
110
|
+
url: "https://cognigate.dev",
|
|
111
|
+
docsUrl: "https://cognigate.dev/docs",
|
|
112
|
+
npmPackage: "@vorionsys/cognigate",
|
|
113
|
+
organization: "agentanchor",
|
|
114
|
+
version: "1.0.0"
|
|
115
|
+
},
|
|
116
|
+
trust: {
|
|
117
|
+
id: "trust",
|
|
118
|
+
name: "Agent Anchor Trust",
|
|
119
|
+
description: "Trust verification and certification platform for AI agents",
|
|
120
|
+
category: "commercial" /* COMMERCIAL */,
|
|
121
|
+
status: "ga" /* GA */,
|
|
122
|
+
url: "https://trust.agentanchorai.com",
|
|
123
|
+
docsUrl: "https://trust.agentanchorai.com/docs",
|
|
124
|
+
organization: "agentanchor"
|
|
125
|
+
},
|
|
126
|
+
logic: {
|
|
127
|
+
id: "logic",
|
|
128
|
+
name: "Agent Anchor Logic",
|
|
129
|
+
description: "Policy engine and governance logic for enterprise AI",
|
|
130
|
+
category: "commercial" /* COMMERCIAL */,
|
|
131
|
+
status: "beta" /* BETA */,
|
|
132
|
+
url: "https://logic.agentanchorai.com",
|
|
133
|
+
docsUrl: "https://logic.agentanchorai.com/docs",
|
|
134
|
+
organization: "agentanchor"
|
|
135
|
+
},
|
|
136
|
+
platform: {
|
|
137
|
+
id: "platform",
|
|
138
|
+
name: "Agent Anchor Platform",
|
|
139
|
+
description: "Enterprise AI governance dashboard and management console",
|
|
140
|
+
category: "commercial" /* COMMERCIAL */,
|
|
141
|
+
status: "ga" /* GA */,
|
|
142
|
+
url: "https://agentanchorai.com",
|
|
143
|
+
docsUrl: "https://agentanchorai.com/docs",
|
|
144
|
+
organization: "agentanchor"
|
|
145
|
+
}
|
|
146
|
+
};
|
|
147
|
+
var ALL_PRODUCTS = {
|
|
148
|
+
vorion: VORION_PRODUCTS,
|
|
149
|
+
agentAnchor: AGENTANCHOR_PRODUCTS
|
|
150
|
+
};
|
|
151
|
+
function getProduct(productId) {
|
|
152
|
+
return VORION_PRODUCTS[productId] || AGENTANCHOR_PRODUCTS[productId];
|
|
153
|
+
}
|
|
154
|
+
function getProductsByCategory(category) {
|
|
155
|
+
const allProducts = [...Object.values(VORION_PRODUCTS), ...Object.values(AGENTANCHOR_PRODUCTS)];
|
|
156
|
+
return allProducts.filter((p) => p.category === category);
|
|
157
|
+
}
|
|
158
|
+
function getProductsByStatus(status) {
|
|
159
|
+
const allProducts = [...Object.values(VORION_PRODUCTS), ...Object.values(AGENTANCHOR_PRODUCTS)];
|
|
160
|
+
return allProducts.filter((p) => p.status === status);
|
|
161
|
+
}
|
|
162
|
+
function getProductsByOrganization(org) {
|
|
163
|
+
return org === "vorion" ? Object.values(VORION_PRODUCTS) : Object.values(AGENTANCHOR_PRODUCTS);
|
|
164
|
+
}
|
|
165
|
+
|
|
166
|
+
export {
|
|
167
|
+
ProductCategory,
|
|
168
|
+
ProductStatus,
|
|
169
|
+
VORION_PRODUCTS,
|
|
170
|
+
AGENTANCHOR_PRODUCTS,
|
|
171
|
+
ALL_PRODUCTS,
|
|
172
|
+
getProduct,
|
|
173
|
+
getProductsByCategory,
|
|
174
|
+
getProductsByStatus,
|
|
175
|
+
getProductsByOrganization
|
|
176
|
+
};
|
|
@@ -11,11 +11,7 @@ var VORION_DOMAINS = {
|
|
|
11
11
|
/** Learning and educational resources (primary) */
|
|
12
12
|
learn: "https://learn.vorion.org",
|
|
13
13
|
/** Kaizen - Interactive AI Learning Experience (mirrors learn) */
|
|
14
|
-
kaizen: "https://kaizen.vorion.org"
|
|
15
|
-
/** Technical documentation */
|
|
16
|
-
docs: "https://docs.vorion.org",
|
|
17
|
-
/** Community forum */
|
|
18
|
-
community: "https://community.vorion.org"
|
|
14
|
+
kaizen: "https://kaizen.vorion.org"
|
|
19
15
|
};
|
|
20
16
|
var DOMAIN_ALIASES = {
|
|
21
17
|
"kaizen.vorion.org": "learn.vorion.org"
|
|
@@ -28,7 +24,9 @@ var AGENTANCHOR_DOMAINS = {
|
|
|
28
24
|
/** Agent Anchor Logic - Policy engine and governance logic */
|
|
29
25
|
logic: "https://logic.agentanchorai.com",
|
|
30
26
|
/** Status page */
|
|
31
|
-
status: "https://status.agentanchorai.com"
|
|
27
|
+
status: "https://status.agentanchorai.com",
|
|
28
|
+
/** Agent trust verification portal */
|
|
29
|
+
verify: "https://verify.agentanchorai.com"
|
|
32
30
|
};
|
|
33
31
|
var COGNIGATE_DOMAINS = {
|
|
34
32
|
/** Cognigate main site and documentation */
|
package/dist/domains.cjs
CHANGED
|
@@ -44,11 +44,7 @@ var VORION_DOMAINS = {
|
|
|
44
44
|
/** Learning and educational resources (primary) */
|
|
45
45
|
learn: "https://learn.vorion.org",
|
|
46
46
|
/** Kaizen - Interactive AI Learning Experience (mirrors learn) */
|
|
47
|
-
kaizen: "https://kaizen.vorion.org"
|
|
48
|
-
/** Technical documentation */
|
|
49
|
-
docs: "https://docs.vorion.org",
|
|
50
|
-
/** Community forum */
|
|
51
|
-
community: "https://community.vorion.org"
|
|
47
|
+
kaizen: "https://kaizen.vorion.org"
|
|
52
48
|
};
|
|
53
49
|
var DOMAIN_ALIASES = {
|
|
54
50
|
"kaizen.vorion.org": "learn.vorion.org"
|
|
@@ -61,7 +57,9 @@ var AGENTANCHOR_DOMAINS = {
|
|
|
61
57
|
/** Agent Anchor Logic - Policy engine and governance logic */
|
|
62
58
|
logic: "https://logic.agentanchorai.com",
|
|
63
59
|
/** Status page */
|
|
64
|
-
status: "https://status.agentanchorai.com"
|
|
60
|
+
status: "https://status.agentanchorai.com",
|
|
61
|
+
/** Agent trust verification portal */
|
|
62
|
+
verify: "https://verify.agentanchorai.com"
|
|
65
63
|
};
|
|
66
64
|
var COGNIGATE_DOMAINS = {
|
|
67
65
|
/** Cognigate main site and documentation */
|
package/dist/domains.d.cts
CHANGED
|
@@ -19,10 +19,6 @@ declare const VORION_DOMAINS: {
|
|
|
19
19
|
readonly learn: "https://learn.vorion.org";
|
|
20
20
|
/** Kaizen - Interactive AI Learning Experience (mirrors learn) */
|
|
21
21
|
readonly kaizen: "https://kaizen.vorion.org";
|
|
22
|
-
/** Technical documentation */
|
|
23
|
-
readonly docs: "https://docs.vorion.org";
|
|
24
|
-
/** Community forum */
|
|
25
|
-
readonly community: "https://community.vorion.org";
|
|
26
22
|
};
|
|
27
23
|
/**
|
|
28
24
|
* Domain aliases - maps alternate domains to primary
|
|
@@ -40,6 +36,8 @@ declare const AGENTANCHOR_DOMAINS: {
|
|
|
40
36
|
readonly logic: "https://logic.agentanchorai.com";
|
|
41
37
|
/** Status page */
|
|
42
38
|
readonly status: "https://status.agentanchorai.com";
|
|
39
|
+
/** Agent trust verification portal */
|
|
40
|
+
readonly verify: "https://verify.agentanchorai.com";
|
|
43
41
|
};
|
|
44
42
|
declare const COGNIGATE_DOMAINS: {
|
|
45
43
|
/** Cognigate main site and documentation */
|
|
@@ -140,10 +138,6 @@ declare const ALL_DOMAINS: {
|
|
|
140
138
|
readonly learn: "https://learn.vorion.org";
|
|
141
139
|
/** Kaizen - Interactive AI Learning Experience (mirrors learn) */
|
|
142
140
|
readonly kaizen: "https://kaizen.vorion.org";
|
|
143
|
-
/** Technical documentation */
|
|
144
|
-
readonly docs: "https://docs.vorion.org";
|
|
145
|
-
/** Community forum */
|
|
146
|
-
readonly community: "https://community.vorion.org";
|
|
147
141
|
};
|
|
148
142
|
readonly agentAnchor: {
|
|
149
143
|
/** Main Agent Anchor AI site */
|
|
@@ -154,6 +148,8 @@ declare const ALL_DOMAINS: {
|
|
|
154
148
|
readonly logic: "https://logic.agentanchorai.com";
|
|
155
149
|
/** Status page */
|
|
156
150
|
readonly status: "https://status.agentanchorai.com";
|
|
151
|
+
/** Agent trust verification portal */
|
|
152
|
+
readonly verify: "https://verify.agentanchorai.com";
|
|
157
153
|
};
|
|
158
154
|
readonly cognigate: {
|
|
159
155
|
/** Cognigate main site and documentation */
|