@vorionsys/shared-constants 1.0.2 → 1.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +2 -2
- package/README.md +7 -7
- package/dist/capabilities.cjs +4 -3
- package/dist/capabilities.d.cts +3 -2
- package/dist/capabilities.d.ts +3 -2
- package/dist/capabilities.js +1 -1
- package/dist/chunk-CJQJGJZ6.js +216 -0
- package/dist/chunk-JOS3AHBL.js +176 -0
- package/dist/index.cjs +344 -5
- package/dist/index.d.cts +118 -3
- package/dist/index.d.ts +118 -3
- package/dist/index.js +328 -3
- package/dist/products.cjs +1 -1
- package/dist/products.js +1 -1
- package/package.json +5 -5
package/CHANGELOG.md
CHANGED
|
@@ -35,5 +35,5 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
|
35
35
|
- ESM and CJS dual-format builds via tsup
|
|
36
36
|
- Full TypeScript type exports
|
|
37
37
|
|
|
38
|
-
[1.0.1]: https://github.com/
|
|
39
|
-
[1.0.0]: https://github.com/
|
|
38
|
+
[1.0.1]: https://github.com/vorionsys/vorion/compare/shared-constants-v1.0.0...shared-constants-v1.0.1
|
|
39
|
+
[1.0.0]: https://github.com/vorionsys/vorion/releases/tag/shared-constants-v1.0.0
|
package/README.md
CHANGED
|
@@ -128,12 +128,12 @@ import {
|
|
|
128
128
|
} from '@vorionsys/shared-constants';
|
|
129
129
|
|
|
130
130
|
VORION_DOMAINS.basis; // "https://basis.vorion.org"
|
|
131
|
-
AGENTANCHOR_DOMAINS.trust; // "https://trust.
|
|
131
|
+
AGENTANCHOR_DOMAINS.trust; // "https://trust.vorion.org"
|
|
132
132
|
COGNIGATE_DOMAINS.main; // "https://cognigate.dev"
|
|
133
133
|
API_ENDPOINTS.cognigate.production; // "https://cognigate.dev/v1"
|
|
134
|
-
API_ENDPOINTS.agentAnchor.sandbox; // "https://sandbox.
|
|
134
|
+
API_ENDPOINTS.agentAnchor.sandbox; // "https://sandbox.vorion.org/v1"
|
|
135
135
|
VORION_EMAILS.security; // "security@vorion.org"
|
|
136
|
-
GITHUB.vorion.mainRepo; // "https://github.com/
|
|
136
|
+
GITHUB.vorion.mainRepo; // "https://github.com/vorionsys/vorion"
|
|
137
137
|
NPM_PACKAGES.vorion.sharedConstants; // "@vorionsys/shared-constants"
|
|
138
138
|
```
|
|
139
139
|
|
|
@@ -337,13 +337,13 @@ const cssVars = themeToCssVars('midnight_cyan');
|
|
|
337
337
|
| `COGNIGATE_DOMAINS` | const | Cognigate URLs (main, docs) |
|
|
338
338
|
| `API_ENDPOINTS` | const | Production/staging/sandbox API base URLs |
|
|
339
339
|
| `VORION_EMAILS` | const | Vorion contact email addresses |
|
|
340
|
-
| `AGENTANCHOR_EMAILS` | const |
|
|
340
|
+
| `AGENTANCHOR_EMAILS` | const | Vorion platform contact email addresses |
|
|
341
341
|
| `GITHUB` | const | GitHub organization and repo URLs |
|
|
342
342
|
| `NPM_PACKAGES` | const | npm package names for all published packages |
|
|
343
343
|
| `ALL_DOMAINS` | const | Combined object containing all domain groups |
|
|
344
344
|
| `DOMAIN_ALIASES` | const | Map of alternate domains to their primary |
|
|
345
345
|
| `VorionDomain` | type | Key union for `VORION_DOMAINS` |
|
|
346
|
-
| `AgentAnchorDomain` | type | Key union for `AGENTANCHOR_DOMAINS` |
|
|
346
|
+
| `AgentAnchorDomain` | type | Key union for `AGENTANCHOR_DOMAINS` (legacy name) |
|
|
347
347
|
| `CognigateDomain` | type | Key union for `COGNIGATE_DOMAINS` |
|
|
348
348
|
|
|
349
349
|
### Capabilities (`@vorionsys/shared-constants/capabilities`)
|
|
@@ -367,7 +367,7 @@ const cssVars = themeToCssVars('midnight_cyan');
|
|
|
367
367
|
| `ProductCategory` | enum | Product categories (OPEN_SOURCE, COMMERCIAL, DEVELOPER_TOOLS, EDUCATION) |
|
|
368
368
|
| `ProductStatus` | enum | Product lifecycle status (DEVELOPMENT through EOL) |
|
|
369
369
|
| `VORION_PRODUCTS` | const | Vorion open-source product definitions |
|
|
370
|
-
| `AGENTANCHOR_PRODUCTS` | const |
|
|
370
|
+
| `AGENTANCHOR_PRODUCTS` | const | Vorion commercial product definitions (legacy name) |
|
|
371
371
|
| `ALL_PRODUCTS` | const | Combined product catalog |
|
|
372
372
|
| `getProduct(id)` | function | Look up a product by ID |
|
|
373
373
|
| `getProductsByCategory(category)` | function | Filter products by category |
|
|
@@ -496,7 +496,7 @@ import type {
|
|
|
496
496
|
|
|
497
497
|
This package lives in the Vorion monorepo:
|
|
498
498
|
|
|
499
|
-
[https://github.com/
|
|
499
|
+
[https://github.com/vorionsys/vorion/tree/master/packages/shared-constants](https://github.com/vorionsys/vorion/tree/master/packages/shared-constants)
|
|
500
500
|
|
|
501
501
|
## License
|
|
502
502
|
|
package/dist/capabilities.cjs
CHANGED
|
@@ -32,12 +32,13 @@ __export(capabilities_exports, {
|
|
|
32
32
|
module.exports = __toCommonJS(capabilities_exports);
|
|
33
33
|
var CapabilityCategory = /* @__PURE__ */ ((CapabilityCategory2) => {
|
|
34
34
|
CapabilityCategory2["DATA_ACCESS"] = "data_access";
|
|
35
|
+
CapabilityCategory2["FILE_OPERATIONS"] = "file_operations";
|
|
35
36
|
CapabilityCategory2["API_ACCESS"] = "api_access";
|
|
36
37
|
CapabilityCategory2["CODE_EXECUTION"] = "code_execution";
|
|
37
38
|
CapabilityCategory2["AGENT_INTERACTION"] = "agent_interaction";
|
|
38
39
|
CapabilityCategory2["RESOURCE_MANAGEMENT"] = "resource_management";
|
|
40
|
+
CapabilityCategory2["SYSTEM_ADMINISTRATION"] = "system_administration";
|
|
39
41
|
CapabilityCategory2["GOVERNANCE"] = "governance";
|
|
40
|
-
CapabilityCategory2["ADMIN"] = "admin";
|
|
41
42
|
return CapabilityCategory2;
|
|
42
43
|
})(CapabilityCategory || {});
|
|
43
44
|
var CAPABILITIES = [
|
|
@@ -77,7 +78,7 @@ var CAPABILITIES = [
|
|
|
77
78
|
{
|
|
78
79
|
code: "CAP-FILE-WRITE",
|
|
79
80
|
name: "Write Files",
|
|
80
|
-
category: "
|
|
81
|
+
category: "file_operations" /* FILE_OPERATIONS */,
|
|
81
82
|
description: "Write to approved directories",
|
|
82
83
|
unlockTier: 2 /* T2_PROVISIONAL */,
|
|
83
84
|
constraints: ["Approved dirs only", "Size limited"]
|
|
@@ -193,7 +194,7 @@ var CAPABILITIES = [
|
|
|
193
194
|
{
|
|
194
195
|
code: "CAP-FULL-ADMIN",
|
|
195
196
|
name: "Full Administration",
|
|
196
|
-
category: "
|
|
197
|
+
category: "system_administration" /* SYSTEM_ADMINISTRATION */,
|
|
197
198
|
description: "Full administrative access",
|
|
198
199
|
unlockTier: 7 /* T7_AUTONOMOUS */
|
|
199
200
|
},
|
package/dist/capabilities.d.cts
CHANGED
|
@@ -11,12 +11,13 @@ import { TrustTier } from './tiers.cjs';
|
|
|
11
11
|
|
|
12
12
|
declare enum CapabilityCategory {
|
|
13
13
|
DATA_ACCESS = "data_access",
|
|
14
|
+
FILE_OPERATIONS = "file_operations",
|
|
14
15
|
API_ACCESS = "api_access",
|
|
15
16
|
CODE_EXECUTION = "code_execution",
|
|
16
17
|
AGENT_INTERACTION = "agent_interaction",
|
|
17
18
|
RESOURCE_MANAGEMENT = "resource_management",
|
|
18
|
-
|
|
19
|
-
|
|
19
|
+
SYSTEM_ADMINISTRATION = "system_administration",
|
|
20
|
+
GOVERNANCE = "governance"
|
|
20
21
|
}
|
|
21
22
|
interface CapabilityDefinition {
|
|
22
23
|
readonly code: string;
|
package/dist/capabilities.d.ts
CHANGED
|
@@ -11,12 +11,13 @@ import { TrustTier } from './tiers.js';
|
|
|
11
11
|
|
|
12
12
|
declare enum CapabilityCategory {
|
|
13
13
|
DATA_ACCESS = "data_access",
|
|
14
|
+
FILE_OPERATIONS = "file_operations",
|
|
14
15
|
API_ACCESS = "api_access",
|
|
15
16
|
CODE_EXECUTION = "code_execution",
|
|
16
17
|
AGENT_INTERACTION = "agent_interaction",
|
|
17
18
|
RESOURCE_MANAGEMENT = "resource_management",
|
|
18
|
-
|
|
19
|
-
|
|
19
|
+
SYSTEM_ADMINISTRATION = "system_administration",
|
|
20
|
+
GOVERNANCE = "governance"
|
|
20
21
|
}
|
|
21
22
|
interface CapabilityDefinition {
|
|
22
23
|
readonly code: string;
|
package/dist/capabilities.js
CHANGED
|
@@ -0,0 +1,216 @@
|
|
|
1
|
+
// src/capabilities.ts
|
|
2
|
+
var CapabilityCategory = /* @__PURE__ */ ((CapabilityCategory2) => {
|
|
3
|
+
CapabilityCategory2["DATA_ACCESS"] = "data_access";
|
|
4
|
+
CapabilityCategory2["FILE_OPERATIONS"] = "file_operations";
|
|
5
|
+
CapabilityCategory2["API_ACCESS"] = "api_access";
|
|
6
|
+
CapabilityCategory2["CODE_EXECUTION"] = "code_execution";
|
|
7
|
+
CapabilityCategory2["AGENT_INTERACTION"] = "agent_interaction";
|
|
8
|
+
CapabilityCategory2["RESOURCE_MANAGEMENT"] = "resource_management";
|
|
9
|
+
CapabilityCategory2["SYSTEM_ADMINISTRATION"] = "system_administration";
|
|
10
|
+
CapabilityCategory2["GOVERNANCE"] = "governance";
|
|
11
|
+
return CapabilityCategory2;
|
|
12
|
+
})(CapabilityCategory || {});
|
|
13
|
+
var CAPABILITIES = [
|
|
14
|
+
// T0 - Sandbox
|
|
15
|
+
{
|
|
16
|
+
code: "CAP-READ-PUBLIC",
|
|
17
|
+
name: "Read Public Data",
|
|
18
|
+
category: "data_access" /* DATA_ACCESS */,
|
|
19
|
+
description: "Access publicly available data",
|
|
20
|
+
unlockTier: 0 /* T0_SANDBOX */
|
|
21
|
+
},
|
|
22
|
+
{
|
|
23
|
+
code: "CAP-GENERATE-TEXT",
|
|
24
|
+
name: "Generate Text",
|
|
25
|
+
category: "code_execution" /* CODE_EXECUTION */,
|
|
26
|
+
description: "Generate text responses",
|
|
27
|
+
unlockTier: 0 /* T0_SANDBOX */
|
|
28
|
+
},
|
|
29
|
+
// T1 - Observed
|
|
30
|
+
{
|
|
31
|
+
code: "CAP-READ-INTERNAL",
|
|
32
|
+
name: "Read Internal Data",
|
|
33
|
+
category: "data_access" /* DATA_ACCESS */,
|
|
34
|
+
description: "Access internal data within allowed scopes",
|
|
35
|
+
unlockTier: 1 /* T1_OBSERVED */,
|
|
36
|
+
constraints: ["Read-only", "Logged"]
|
|
37
|
+
},
|
|
38
|
+
{
|
|
39
|
+
code: "CAP-INTERNAL-API",
|
|
40
|
+
name: "Internal API Access",
|
|
41
|
+
category: "api_access" /* API_ACCESS */,
|
|
42
|
+
description: "Make read-only internal API calls",
|
|
43
|
+
unlockTier: 1 /* T1_OBSERVED */,
|
|
44
|
+
constraints: ["GET only", "Rate limited"]
|
|
45
|
+
},
|
|
46
|
+
// T2 - Provisional
|
|
47
|
+
{
|
|
48
|
+
code: "CAP-FILE-WRITE",
|
|
49
|
+
name: "Write Files",
|
|
50
|
+
category: "file_operations" /* FILE_OPERATIONS */,
|
|
51
|
+
description: "Write to approved directories",
|
|
52
|
+
unlockTier: 2 /* T2_PROVISIONAL */,
|
|
53
|
+
constraints: ["Approved dirs only", "Size limited"]
|
|
54
|
+
},
|
|
55
|
+
{
|
|
56
|
+
code: "CAP-DB-READ",
|
|
57
|
+
name: "Database Read",
|
|
58
|
+
category: "data_access" /* DATA_ACCESS */,
|
|
59
|
+
description: "Read from approved database tables",
|
|
60
|
+
unlockTier: 2 /* T2_PROVISIONAL */,
|
|
61
|
+
constraints: ["Approved tables", "Query timeout"]
|
|
62
|
+
},
|
|
63
|
+
{
|
|
64
|
+
code: "CAP-EXTERNAL-API-READ",
|
|
65
|
+
name: "External API Read",
|
|
66
|
+
category: "api_access" /* API_ACCESS */,
|
|
67
|
+
description: "Make GET requests to approved external APIs",
|
|
68
|
+
unlockTier: 2 /* T2_PROVISIONAL */,
|
|
69
|
+
constraints: ["GET only", "Approved endpoints"]
|
|
70
|
+
},
|
|
71
|
+
// T3 - Monitored
|
|
72
|
+
{
|
|
73
|
+
code: "CAP-DB-WRITE",
|
|
74
|
+
name: "Database Write",
|
|
75
|
+
category: "data_access" /* DATA_ACCESS */,
|
|
76
|
+
description: "Write to approved database tables",
|
|
77
|
+
unlockTier: 3 /* T3_MONITORED */,
|
|
78
|
+
constraints: ["Approved tables", "Transaction limits"]
|
|
79
|
+
},
|
|
80
|
+
{
|
|
81
|
+
code: "CAP-EXTERNAL-API-FULL",
|
|
82
|
+
name: "External API Full Access",
|
|
83
|
+
category: "api_access" /* API_ACCESS */,
|
|
84
|
+
description: "Full REST operations on approved external APIs",
|
|
85
|
+
unlockTier: 3 /* T3_MONITORED */,
|
|
86
|
+
constraints: ["Approved endpoints", "Rate limited"]
|
|
87
|
+
},
|
|
88
|
+
{
|
|
89
|
+
code: "CAP-CODE-SANDBOX",
|
|
90
|
+
name: "Sandboxed Code Execution",
|
|
91
|
+
category: "code_execution" /* CODE_EXECUTION */,
|
|
92
|
+
description: "Execute code in isolated sandbox",
|
|
93
|
+
unlockTier: 3 /* T3_MONITORED */,
|
|
94
|
+
constraints: ["Sandboxed", "Time limited", "No network"]
|
|
95
|
+
},
|
|
96
|
+
// T4 - Standard
|
|
97
|
+
{
|
|
98
|
+
code: "CAP-AGENT-COMMUNICATE",
|
|
99
|
+
name: "Agent Communication",
|
|
100
|
+
category: "agent_interaction" /* AGENT_INTERACTION */,
|
|
101
|
+
description: "Send and receive messages to/from other agents",
|
|
102
|
+
unlockTier: 4 /* T4_STANDARD */,
|
|
103
|
+
constraints: ["Approved agents", "Message limits"]
|
|
104
|
+
},
|
|
105
|
+
{
|
|
106
|
+
code: "CAP-WORKFLOW-MULTI",
|
|
107
|
+
name: "Multi-Step Workflow",
|
|
108
|
+
category: "code_execution" /* CODE_EXECUTION */,
|
|
109
|
+
description: "Orchestrate multi-step workflows",
|
|
110
|
+
unlockTier: 4 /* T4_STANDARD */,
|
|
111
|
+
constraints: ["Approved patterns", "Checkpoints required"]
|
|
112
|
+
},
|
|
113
|
+
{
|
|
114
|
+
code: "CAP-ESCALATE-HUMAN",
|
|
115
|
+
name: "Human Escalation",
|
|
116
|
+
category: "governance" /* GOVERNANCE */,
|
|
117
|
+
description: "Initiate escalation to human reviewers",
|
|
118
|
+
unlockTier: 4 /* T4_STANDARD */
|
|
119
|
+
},
|
|
120
|
+
// T5 - Trusted
|
|
121
|
+
{
|
|
122
|
+
code: "CAP-AGENT-DELEGATE",
|
|
123
|
+
name: "Task Delegation",
|
|
124
|
+
category: "agent_interaction" /* AGENT_INTERACTION */,
|
|
125
|
+
description: "Delegate tasks to other agents",
|
|
126
|
+
unlockTier: 5 /* T5_TRUSTED */,
|
|
127
|
+
constraints: ["Trust verified agents"]
|
|
128
|
+
},
|
|
129
|
+
{
|
|
130
|
+
code: "CAP-RESOURCE-PROVISION",
|
|
131
|
+
name: "Resource Provisioning",
|
|
132
|
+
category: "resource_management" /* RESOURCE_MANAGEMENT */,
|
|
133
|
+
description: "Provision computational resources",
|
|
134
|
+
unlockTier: 5 /* T5_TRUSTED */,
|
|
135
|
+
constraints: ["Budget limits", "Approval required"]
|
|
136
|
+
},
|
|
137
|
+
// T6 - Certified
|
|
138
|
+
{
|
|
139
|
+
code: "CAP-AGENT-SPAWN",
|
|
140
|
+
name: "Spawn Agents",
|
|
141
|
+
category: "agent_interaction" /* AGENT_INTERACTION */,
|
|
142
|
+
description: "Create new agent instances",
|
|
143
|
+
unlockTier: 6 /* T6_CERTIFIED */,
|
|
144
|
+
constraints: ["Template required", "Quota limited"]
|
|
145
|
+
},
|
|
146
|
+
{
|
|
147
|
+
code: "CAP-INFRA-MANAGE",
|
|
148
|
+
name: "Infrastructure Management",
|
|
149
|
+
category: "resource_management" /* RESOURCE_MANAGEMENT */,
|
|
150
|
+
description: "Manage infrastructure resources",
|
|
151
|
+
unlockTier: 6 /* T6_CERTIFIED */,
|
|
152
|
+
constraints: ["Approved resources"]
|
|
153
|
+
},
|
|
154
|
+
{
|
|
155
|
+
code: "CAP-POLICY-CREATE",
|
|
156
|
+
name: "Policy Creation",
|
|
157
|
+
category: "governance" /* GOVERNANCE */,
|
|
158
|
+
description: "Create governance policies",
|
|
159
|
+
unlockTier: 6 /* T6_CERTIFIED */,
|
|
160
|
+
constraints: ["Review required"]
|
|
161
|
+
},
|
|
162
|
+
// T7 - Autonomous
|
|
163
|
+
{
|
|
164
|
+
code: "CAP-FULL-ADMIN",
|
|
165
|
+
name: "Full Administration",
|
|
166
|
+
category: "system_administration" /* SYSTEM_ADMINISTRATION */,
|
|
167
|
+
description: "Full administrative access",
|
|
168
|
+
unlockTier: 7 /* T7_AUTONOMOUS */
|
|
169
|
+
},
|
|
170
|
+
{
|
|
171
|
+
code: "CAP-SELF-MODIFY",
|
|
172
|
+
name: "Self-Modification",
|
|
173
|
+
category: "code_execution" /* CODE_EXECUTION */,
|
|
174
|
+
description: "Modify own configuration and behavior",
|
|
175
|
+
unlockTier: 7 /* T7_AUTONOMOUS */,
|
|
176
|
+
constraints: ["Ethical bounds", "Audit logged"]
|
|
177
|
+
},
|
|
178
|
+
{
|
|
179
|
+
code: "CAP-STRATEGIC-DECISION",
|
|
180
|
+
name: "Strategic Decisions",
|
|
181
|
+
category: "governance" /* GOVERNANCE */,
|
|
182
|
+
description: "Make strategic organizational decisions",
|
|
183
|
+
unlockTier: 7 /* T7_AUTONOMOUS */,
|
|
184
|
+
constraints: ["Human oversight available"]
|
|
185
|
+
}
|
|
186
|
+
];
|
|
187
|
+
function getCapabilitiesForTier(tier) {
|
|
188
|
+
return CAPABILITIES.filter((cap) => cap.unlockTier <= tier);
|
|
189
|
+
}
|
|
190
|
+
function getCapability(code) {
|
|
191
|
+
return CAPABILITIES.find((cap) => cap.code === code);
|
|
192
|
+
}
|
|
193
|
+
function isCapabilityAvailable(code, tier) {
|
|
194
|
+
const cap = getCapability(code);
|
|
195
|
+
return cap !== void 0 && cap.unlockTier <= tier;
|
|
196
|
+
}
|
|
197
|
+
function getCapabilityMinTier(code) {
|
|
198
|
+
return getCapability(code)?.unlockTier;
|
|
199
|
+
}
|
|
200
|
+
function getCapabilitiesByCategory(category) {
|
|
201
|
+
return CAPABILITIES.filter((cap) => cap.category === category);
|
|
202
|
+
}
|
|
203
|
+
function getAllCapabilityCodes() {
|
|
204
|
+
return CAPABILITIES.map((cap) => cap.code);
|
|
205
|
+
}
|
|
206
|
+
|
|
207
|
+
export {
|
|
208
|
+
CapabilityCategory,
|
|
209
|
+
CAPABILITIES,
|
|
210
|
+
getCapabilitiesForTier,
|
|
211
|
+
getCapability,
|
|
212
|
+
isCapabilityAvailable,
|
|
213
|
+
getCapabilityMinTier,
|
|
214
|
+
getCapabilitiesByCategory,
|
|
215
|
+
getAllCapabilityCodes
|
|
216
|
+
};
|
|
@@ -0,0 +1,176 @@
|
|
|
1
|
+
// src/products.ts
|
|
2
|
+
var ProductCategory = /* @__PURE__ */ ((ProductCategory2) => {
|
|
3
|
+
ProductCategory2["OPEN_SOURCE"] = "open_source";
|
|
4
|
+
ProductCategory2["COMMERCIAL"] = "commercial";
|
|
5
|
+
ProductCategory2["DEVELOPER_TOOLS"] = "developer_tools";
|
|
6
|
+
ProductCategory2["EDUCATION"] = "education";
|
|
7
|
+
return ProductCategory2;
|
|
8
|
+
})(ProductCategory || {});
|
|
9
|
+
var ProductStatus = /* @__PURE__ */ ((ProductStatus2) => {
|
|
10
|
+
ProductStatus2["DEVELOPMENT"] = "development";
|
|
11
|
+
ProductStatus2["ALPHA"] = "alpha";
|
|
12
|
+
ProductStatus2["BETA"] = "beta";
|
|
13
|
+
ProductStatus2["GA"] = "ga";
|
|
14
|
+
ProductStatus2["DEPRECATED"] = "deprecated";
|
|
15
|
+
ProductStatus2["EOL"] = "eol";
|
|
16
|
+
return ProductStatus2;
|
|
17
|
+
})(ProductStatus || {});
|
|
18
|
+
var VORION_PRODUCTS = {
|
|
19
|
+
basis: {
|
|
20
|
+
id: "basis",
|
|
21
|
+
name: "BASIS",
|
|
22
|
+
description: "Blockchain Agent Safety & Identity Standard - Open framework for AI agent governance",
|
|
23
|
+
category: "open_source" /* OPEN_SOURCE */,
|
|
24
|
+
status: "ga" /* GA */,
|
|
25
|
+
url: "https://basis.vorion.org",
|
|
26
|
+
docsUrl: "https://basis.vorion.org/docs",
|
|
27
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/packages/basis",
|
|
28
|
+
npmPackage: "@vorionsys/basis",
|
|
29
|
+
organization: "vorion",
|
|
30
|
+
version: "1.0.0"
|
|
31
|
+
},
|
|
32
|
+
carId: {
|
|
33
|
+
id: "car-id",
|
|
34
|
+
name: "CAR ID",
|
|
35
|
+
description: "Categorical Agentic Registry - Universal agent identification system",
|
|
36
|
+
category: "open_source" /* OPEN_SOURCE */,
|
|
37
|
+
status: "ga" /* GA */,
|
|
38
|
+
url: "https://carid.vorion.org",
|
|
39
|
+
docsUrl: "https://carid.vorion.org/docs",
|
|
40
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/packages/car-spec",
|
|
41
|
+
npmPackage: "@vorionsys/car-spec",
|
|
42
|
+
organization: "vorion",
|
|
43
|
+
version: "1.0.0"
|
|
44
|
+
},
|
|
45
|
+
atsf: {
|
|
46
|
+
id: "atsf",
|
|
47
|
+
name: "ATSF",
|
|
48
|
+
description: "Agent Trust & Safety Framework - Comprehensive safety evaluation system",
|
|
49
|
+
category: "open_source" /* OPEN_SOURCE */,
|
|
50
|
+
status: "beta" /* BETA */,
|
|
51
|
+
url: "https://atsf.vorion.org",
|
|
52
|
+
docsUrl: "https://atsf.vorion.org/docs",
|
|
53
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/packages/atsf-core",
|
|
54
|
+
npmPackage: "@vorionsys/atsf-core",
|
|
55
|
+
organization: "vorion",
|
|
56
|
+
version: "0.9.0"
|
|
57
|
+
},
|
|
58
|
+
kaizen: {
|
|
59
|
+
id: "kaizen",
|
|
60
|
+
name: "Kaizen",
|
|
61
|
+
description: "Interactive AI Learning Experience - Educational platform for agentic AI",
|
|
62
|
+
category: "education" /* EDUCATION */,
|
|
63
|
+
status: "beta" /* BETA */,
|
|
64
|
+
url: "https://learn.vorion.org",
|
|
65
|
+
docsUrl: "https://learn.vorion.org/docs",
|
|
66
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/kaizen",
|
|
67
|
+
organization: "vorion"
|
|
68
|
+
},
|
|
69
|
+
kaizenStudio: {
|
|
70
|
+
id: "kaizen-studio",
|
|
71
|
+
name: "Kaizen Studio",
|
|
72
|
+
description: "Interactive AI learning studio - hands-on agentic AI experiments",
|
|
73
|
+
category: "education" /* EDUCATION */,
|
|
74
|
+
status: "beta" /* BETA */,
|
|
75
|
+
url: "https://kaizen.vorion.org",
|
|
76
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/kaizen",
|
|
77
|
+
organization: "vorion"
|
|
78
|
+
},
|
|
79
|
+
proofPlane: {
|
|
80
|
+
id: "proof-plane",
|
|
81
|
+
name: "Proof Plane",
|
|
82
|
+
description: "Cryptographic proof layer for agent attestations and verifiable execution",
|
|
83
|
+
category: "open_source" /* OPEN_SOURCE */,
|
|
84
|
+
status: "beta" /* BETA */,
|
|
85
|
+
url: "https://vorion.org/proof-plane",
|
|
86
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/packages/proof-plane",
|
|
87
|
+
npmPackage: "@vorionsys/proof-plane",
|
|
88
|
+
organization: "vorion",
|
|
89
|
+
version: "0.5.0"
|
|
90
|
+
},
|
|
91
|
+
contracts: {
|
|
92
|
+
id: "contracts",
|
|
93
|
+
name: "Vorion Contracts",
|
|
94
|
+
description: "Smart contracts for on-chain agent governance and attestations",
|
|
95
|
+
category: "open_source" /* OPEN_SOURCE */,
|
|
96
|
+
status: "beta" /* BETA */,
|
|
97
|
+
url: "https://vorion.org/contracts",
|
|
98
|
+
repoUrl: "https://github.com/voriongit/vorion/tree/master/packages/contracts",
|
|
99
|
+
npmPackage: "@vorionsys/contracts",
|
|
100
|
+
organization: "vorion"
|
|
101
|
+
}
|
|
102
|
+
};
|
|
103
|
+
var AGENTANCHOR_PRODUCTS = {
|
|
104
|
+
cognigate: {
|
|
105
|
+
id: "cognigate",
|
|
106
|
+
name: "Cognigate",
|
|
107
|
+
description: "AI Governance API - Reference implementation of BASIS runtime",
|
|
108
|
+
category: "commercial" /* COMMERCIAL */,
|
|
109
|
+
status: "ga" /* GA */,
|
|
110
|
+
url: "https://cognigate.dev",
|
|
111
|
+
docsUrl: "https://cognigate.dev/docs",
|
|
112
|
+
npmPackage: "@vorionsys/cognigate",
|
|
113
|
+
organization: "agentanchor",
|
|
114
|
+
version: "1.0.0"
|
|
115
|
+
},
|
|
116
|
+
trust: {
|
|
117
|
+
id: "trust",
|
|
118
|
+
name: "Agent Anchor Trust",
|
|
119
|
+
description: "Trust verification and certification platform for AI agents",
|
|
120
|
+
category: "commercial" /* COMMERCIAL */,
|
|
121
|
+
status: "ga" /* GA */,
|
|
122
|
+
url: "https://trust.agentanchorai.com",
|
|
123
|
+
docsUrl: "https://trust.agentanchorai.com/docs",
|
|
124
|
+
organization: "agentanchor"
|
|
125
|
+
},
|
|
126
|
+
logic: {
|
|
127
|
+
id: "logic",
|
|
128
|
+
name: "Agent Anchor Logic",
|
|
129
|
+
description: "Policy engine and governance logic for enterprise AI",
|
|
130
|
+
category: "commercial" /* COMMERCIAL */,
|
|
131
|
+
status: "beta" /* BETA */,
|
|
132
|
+
url: "https://logic.agentanchorai.com",
|
|
133
|
+
docsUrl: "https://logic.agentanchorai.com/docs",
|
|
134
|
+
organization: "agentanchor"
|
|
135
|
+
},
|
|
136
|
+
platform: {
|
|
137
|
+
id: "platform",
|
|
138
|
+
name: "Agent Anchor Platform",
|
|
139
|
+
description: "Enterprise AI governance dashboard and management console",
|
|
140
|
+
category: "commercial" /* COMMERCIAL */,
|
|
141
|
+
status: "ga" /* GA */,
|
|
142
|
+
url: "https://agentanchorai.com",
|
|
143
|
+
docsUrl: "https://agentanchorai.com/docs",
|
|
144
|
+
organization: "agentanchor"
|
|
145
|
+
}
|
|
146
|
+
};
|
|
147
|
+
var ALL_PRODUCTS = {
|
|
148
|
+
vorion: VORION_PRODUCTS,
|
|
149
|
+
agentAnchor: AGENTANCHOR_PRODUCTS
|
|
150
|
+
};
|
|
151
|
+
function getProduct(productId) {
|
|
152
|
+
return VORION_PRODUCTS[productId] || AGENTANCHOR_PRODUCTS[productId];
|
|
153
|
+
}
|
|
154
|
+
function getProductsByCategory(category) {
|
|
155
|
+
const allProducts = [...Object.values(VORION_PRODUCTS), ...Object.values(AGENTANCHOR_PRODUCTS)];
|
|
156
|
+
return allProducts.filter((p) => p.category === category);
|
|
157
|
+
}
|
|
158
|
+
function getProductsByStatus(status) {
|
|
159
|
+
const allProducts = [...Object.values(VORION_PRODUCTS), ...Object.values(AGENTANCHOR_PRODUCTS)];
|
|
160
|
+
return allProducts.filter((p) => p.status === status);
|
|
161
|
+
}
|
|
162
|
+
function getProductsByOrganization(org) {
|
|
163
|
+
return org === "vorion" ? Object.values(VORION_PRODUCTS) : Object.values(AGENTANCHOR_PRODUCTS);
|
|
164
|
+
}
|
|
165
|
+
|
|
166
|
+
export {
|
|
167
|
+
ProductCategory,
|
|
168
|
+
ProductStatus,
|
|
169
|
+
VORION_PRODUCTS,
|
|
170
|
+
AGENTANCHOR_PRODUCTS,
|
|
171
|
+
ALL_PRODUCTS,
|
|
172
|
+
getProduct,
|
|
173
|
+
getProductsByCategory,
|
|
174
|
+
getProductsByStatus,
|
|
175
|
+
getProductsByOrganization
|
|
176
|
+
};
|