agentvibes 5.5.0 → 5.6.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (100) hide show
  1. package/.agentvibes/config.json +3 -30
  2. package/.claude/config/background-music-enabled.txt +1 -1
  3. package/.claude/config/background-music-position.txt +6 -6
  4. package/.claude/github-star-reminder.txt +1 -1
  5. package/.claude/hooks/play-tts-ssh-remote.sh +119 -42
  6. package/.claude/hooks/play-tts-windows-receiver.sh +31 -0
  7. package/.claude/hooks/stop.sh +2 -27
  8. package/.claude/hooks-windows/play-tts-windows-sapi.ps1 +108 -108
  9. package/.claude/hooks-windows/play-tts.ps1 +23 -7
  10. package/.claude/piper-voices-dir.txt +1 -1
  11. package/.clawdbot/skill/README.md +326 -0
  12. package/.mcp.json +17 -27
  13. package/README.md +73 -82
  14. package/RELEASE_NOTES.md +61 -0
  15. package/bin/agent-vibes +39 -39
  16. package/package.json +1 -1
  17. package/src/bmad-detector.js +71 -71
  18. package/src/cli/list-personalities.js +110 -110
  19. package/src/cli/list-voices.js +114 -114
  20. package/src/commands/bmad-voices.js +394 -394
  21. package/src/commands/install-mcp.js +476 -476
  22. package/src/console/brand-colors.js +13 -13
  23. package/src/console/constants/personalities.js +44 -44
  24. package/src/console/modals/modal-overlay.js +247 -247
  25. package/src/console/navigation.js +5 -1
  26. package/src/console/tabs/agents-tab.js +5 -5
  27. package/src/console/tabs/help-tab.js +314 -314
  28. package/src/console/tabs/readme-tab.js +272 -272
  29. package/src/console/tabs/setup-tab.js +32 -17
  30. package/src/console/tabs/voices-tab.js +2 -2
  31. package/src/console/widgets/destroy-list.js +25 -25
  32. package/src/console/widgets/notice.js +55 -55
  33. package/src/console/widgets/personality-picker.js +213 -213
  34. package/src/console/widgets/reverb-picker.js +97 -97
  35. package/src/console/widgets/track-picker.js +1 -1
  36. package/src/i18n/de.js +202 -202
  37. package/src/i18n/es.js +202 -202
  38. package/src/i18n/fr.js +202 -202
  39. package/src/i18n/hi.js +202 -202
  40. package/src/i18n/ja.js +202 -202
  41. package/src/i18n/ko.js +202 -202
  42. package/src/i18n/pt.js +202 -202
  43. package/src/i18n/strings.js +54 -54
  44. package/src/i18n/zh-CN.js +202 -202
  45. package/src/installer/language-screen.js +31 -31
  46. package/src/installer/music-file-input.js +304 -304
  47. package/src/services/agent-voice-store.js +420 -423
  48. package/src/services/config-service.js +264 -264
  49. package/src/services/language-service.js +47 -47
  50. package/src/services/llm-provider-service.js +11 -4
  51. package/src/services/navigation-service.js +34 -10
  52. package/src/services/provider-service.js +143 -143
  53. package/src/utils/audio-duration-validator.js +298 -298
  54. package/src/utils/audio-format-validator.js +277 -277
  55. package/src/utils/dependency-checker.js +469 -469
  56. package/src/utils/file-ownership-verifier.js +358 -358
  57. package/src/utils/list-formatter.js +194 -194
  58. package/src/utils/music-file-validator.js +285 -285
  59. package/src/utils/preview-list-prompt.js +136 -136
  60. package/src/utils/secure-music-storage.js +412 -412
  61. package/.agentvibes/LITE-MODE.md +0 -236
  62. package/.agentvibes/README.md +0 -136
  63. package/.agentvibes/backup/session-start-tts.sh.20251210_212814 +0 -141
  64. package/.agentvibes/backups/agents/analyst_20260204_144958.md +0 -78
  65. package/.agentvibes/backups/agents/architect_20260204_144958.md +0 -72
  66. package/.agentvibes/backups/agents/dev_20260204_144958.md +0 -74
  67. package/.agentvibes/backups/agents/pm_20260204_144958.md +0 -72
  68. package/.agentvibes/backups/agents/quick-flow-solo-dev_20260204_144958.md +0 -64
  69. package/.agentvibes/backups/agents/sm_20260204_144958.md +0 -87
  70. package/.agentvibes/backups/agents/tea_20260204_144958.md +0 -79
  71. package/.agentvibes/backups/agents/tech-writer_20260204_144958.md +0 -82
  72. package/.agentvibes/backups/agents/ux-designer_20260204_144958.md +0 -80
  73. package/.agentvibes/config/README-personality-defaults.md +0 -162
  74. package/.agentvibes/config/agentvibes.json +0 -1
  75. package/.agentvibes/config/mode.txt +0 -1
  76. package/.agentvibes/config/personality-voice-defaults.default.json +0 -21
  77. package/.agentvibes/config/save-audio.txt +0 -1
  78. package/.agentvibes/config/voice-metadata.json +0 -160
  79. package/.agentvibes/hooks/help.sh +0 -191
  80. package/.agentvibes/hooks/post-tool-use-lite.sh +0 -111
  81. package/.agentvibes/hooks/save-audio-manager.sh +0 -162
  82. package/.agentvibes/hooks/session-start-full-optimized.sh +0 -102
  83. package/.agentvibes/hooks/session-start-full.sh +0 -142
  84. package/.agentvibes/hooks/session-start-lite-v2.sh +0 -34
  85. package/.agentvibes/hooks/session-start-lite.sh +0 -29
  86. package/.agentvibes/hooks/stop-lite.sh +0 -115
  87. package/.agentvibes/hooks/switch-mode.sh +0 -215
  88. package/.agentvibes/output-styles/audio-summary.md +0 -30
  89. package/.claude/audio/voice-samples/piper/alan.wav +0 -0
  90. package/.claude/audio/voice-samples/piper/amy.wav +0 -0
  91. package/.claude/audio/voice-samples/piper/charlotte.wav +0 -0
  92. package/.claude/audio/voice-samples/piper/joe.wav +0 -0
  93. package/.claude/audio/voice-samples/piper/john.wav +0 -0
  94. package/.claude/audio/voice-samples/piper/katherine.wav +0 -0
  95. package/.claude/audio/voice-samples/piper/kristin.wav +0 -0
  96. package/.claude/audio/voice-samples/piper/linda.wav +0 -0
  97. package/.claude/audio/voice-samples/piper/marcus.wav +0 -0
  98. package/.claude/audio/voice-samples/piper/ryan.wav +0 -0
  99. package/.claude/hooks/post-response.sh +0 -41
  100. package/bin/ensure-soprano-running.sh +0 -43
@@ -1,285 +1,285 @@
1
- /**
2
- * Music File Validator - Security-Critical Path and File Validation
3
- * Story 4.1: Path Validation and Security Hardening
4
- *
5
- * CRITICAL: All functions enforce CLAUDE.md security requirements:
6
- * - Use path.resolve() for all path operations
7
- * - Verify file ownership before processing external files
8
- * - Prevent path traversal attacks via traversal patterns, symlinks, etc.
9
- * - Validate file exists, is readable, and owned by current user
10
- *
11
- * @module music-file-validator
12
- * @requires fs
13
- * @requires path
14
- * @requires os
15
- */
16
-
17
- import fs from 'node:fs';
18
- import path from 'node:path';
19
- import os from 'node:os';
20
-
21
- /**
22
- * Story 4.1: Validate that a file path is safe and within user's home directory
23
- *
24
- * Security checks:
25
- * 1. Resolves path to absolute form (prevents ../ tricks)
26
- * 2. Validates path is within home directory
27
- * 3. Rejects symlinks pointing outside home
28
- * 4. Verifies file ownership matches current user
29
- * 5. Checks file is readable
30
- *
31
- * @param {string} userPath - Path provided by user (absolute or relative)
32
- * @param {string} userHomeDir - User's home directory (default: process.env.HOME)
33
- * @returns {Object} { isValid: boolean, error: string|null, resolvedPath: string|null }
34
- * @throws {Error} If path validation encounters unexpected errors
35
- */
36
- export function isPathSafe(userPath, userHomeDir = null) {
37
- try {
38
- // Parameter validation
39
- if (!userPath || typeof userPath !== 'string') {
40
- return {
41
- isValid: false,
42
- error: 'Path must be a non-empty string',
43
- resolvedPath: null
44
- };
45
- }
46
-
47
- // Use provided home dir or default to environment
48
- const homeDir = userHomeDir || (process.env.HOME || process.env.USERPROFILE);
49
- if (!homeDir) {
50
- return {
51
- isValid: false,
52
- error: 'Unable to determine home directory',
53
- resolvedPath: null
54
- };
55
- }
56
-
57
- // CRITICAL: Use path.resolve() to get absolute path (CLAUDE.md requirement)
58
- // This prevents directory traversal attacks like "../../etc/passwd"
59
- const resolvedPath = path.resolve(userPath);
60
- const resolvedHome = path.resolve(homeDir);
61
-
62
- // Check if path is within home directory
63
- // Must either match exactly OR start with home + separator (prevents /home/user2 bypass)
64
- const isWithinHome = resolvedPath === resolvedHome ||
65
- resolvedPath.startsWith(resolvedHome + path.sep);
66
-
67
- if (!isWithinHome) {
68
- return {
69
- isValid: false,
70
- error: `Security validation failed: path must be within home directory (${resolvedHome})`,
71
- resolvedPath: null
72
- };
73
- }
74
-
75
- // SECURITY: Use lstatSync first to detect symlinks before following them (#131)
76
- let lstats;
77
- try {
78
- lstats = fs.lstatSync(resolvedPath);
79
- } catch (err) {
80
- if (err.code === 'ENOENT') {
81
- return { isValid: false, error: `File not found: ${userPath}`, resolvedPath: null };
82
- }
83
- return { isValid: false, error: `Cannot access file: ${err.message}`, resolvedPath: null };
84
- }
85
-
86
- // Check if symlink - if so, verify target is also within home directory
87
- if (lstats.isSymbolicLink()) {
88
- try {
89
- const targetPath = fs.realpathSync(resolvedPath);
90
- const isTargetWithinHome = targetPath === resolvedHome ||
91
- targetPath.startsWith(resolvedHome + path.sep);
92
-
93
- if (!isTargetWithinHome) {
94
- return {
95
- isValid: false,
96
- error: 'Security validation failed: symlink target must be within home directory',
97
- resolvedPath: null
98
- };
99
- }
100
- } catch (err) {
101
- return {
102
- isValid: false,
103
- error: `Failed to resolve symlink: ${err.message}`,
104
- resolvedPath: null
105
- };
106
- }
107
- }
108
-
109
- // Get file stats (follows symlinks for regular file check)
110
- const stats = fs.statSync(resolvedPath);
111
-
112
- // Check if it's a regular file (not directory, special file, etc)
113
- if (!stats.isFile()) {
114
- return {
115
- isValid: false,
116
- error: `Path must be a regular file, not a ${stats.isDirectory() ? 'directory' : 'special file'}`,
117
- resolvedPath: null
118
- };
119
- }
120
-
121
- // CRITICAL: Verify file ownership (CLAUDE.md requirement)
122
- // Prevent other users from planting malicious files
123
- // SECURITY: Fail-secure on platforms where getuid is unavailable (#131)
124
- const currentUserId = process.getuid ? process.getuid() : null;
125
- if (currentUserId === null) {
126
- return {
127
- isValid: false,
128
- error: 'Security validation failed: unable to verify file ownership on this platform',
129
- resolvedPath: null
130
- };
131
- }
132
- if (stats.uid !== currentUserId) {
133
- return {
134
- isValid: false,
135
- error: 'Security validation failed: file not owned by current user',
136
- resolvedPath: null
137
- };
138
- }
139
-
140
- // Check if file is readable
141
- try {
142
- fs.accessSync(resolvedPath, fs.constants.R_OK);
143
- } catch (err) {
144
- return {
145
- isValid: false,
146
- error: `File is not readable: ${err.message}`,
147
- resolvedPath: null
148
- };
149
- }
150
-
151
- // All checks passed
152
- return {
153
- isValid: true,
154
- error: null,
155
- resolvedPath
156
- };
157
-
158
- } catch (err) {
159
- // Unexpected error during validation
160
- return {
161
- isValid: false,
162
- error: `Unexpected validation error: ${err.message}`,
163
- resolvedPath: null
164
- };
165
- }
166
- }
167
-
168
- /**
169
- * Verify file size is within acceptable limits for music files
170
- *
171
- * @param {string} filePath - Path to file (must already be validated with isPathSafe)
172
- * @param {number} maxSizeBytes - Maximum file size in bytes (default: 50MB)
173
- * @returns {Object} { isValid: boolean, error: string|null, sizeBytes: number }
174
- */
175
- export function validateFileSize(filePath, maxSizeBytes = 50 * 1024 * 1024) {
176
- try {
177
- if (!fs.existsSync(filePath)) {
178
- return {
179
- isValid: false,
180
- error: 'File does not exist',
181
- sizeBytes: 0
182
- };
183
- }
184
-
185
- const stats = fs.statSync(filePath);
186
- const sizeBytes = stats.size;
187
-
188
- if (sizeBytes > maxSizeBytes) {
189
- const sizeMB = (sizeBytes / 1024 / 1024).toFixed(2);
190
- const maxMB = (maxSizeBytes / 1024 / 1024).toFixed(2);
191
- return {
192
- isValid: false,
193
- error: `File size (${sizeMB}MB) exceeds maximum (${maxMB}MB)`,
194
- sizeBytes
195
- };
196
- }
197
-
198
- if (sizeBytes === 0) {
199
- return {
200
- isValid: false,
201
- error: 'File is empty',
202
- sizeBytes
203
- };
204
- }
205
-
206
- return {
207
- isValid: true,
208
- error: null,
209
- sizeBytes
210
- };
211
-
212
- } catch (err) {
213
- return {
214
- isValid: false,
215
- error: `Error checking file size: ${err.message}`,
216
- sizeBytes: 0
217
- };
218
- }
219
- }
220
-
221
- /**
222
- * Get secure temp directory for audio file operations
223
- * Uses XDG_RUNTIME_DIR if available (follows CLAUDE.md requirement)
224
- * Falls back to user-specific /tmp directory
225
- *
226
- * @param {string} prefix - Directory name prefix (default: 'agentvibes-music')
227
- * @returns {string} Secure temp directory path
228
- */
229
- export function getSecureTempDir(prefix = 'agentvibes-music') {
230
- const xdgRuntime = process.env.XDG_RUNTIME_DIR;
231
-
232
- if (xdgRuntime && fs.existsSync(xdgRuntime)) {
233
- return path.join(xdgRuntime, `${prefix}-${process.pid}`);
234
- }
235
-
236
- // Fallback to user-specific /tmp
237
- const userTmp = path.join(os.tmpdir(), `${prefix}-${process.env.USER || 'user'}`);
238
- return userTmp;
239
- }
240
-
241
- /**
242
- * Create secure temp directory with restrictive permissions
243
- *
244
- * @param {string} dirPath - Directory path to create
245
- * @returns {Object} { success: boolean, error: string|null, dirPath: string|null }
246
- */
247
- export function createSecureTempDir(dirPath) {
248
- try {
249
- // Create directory if it doesn't exist
250
- if (!fs.existsSync(dirPath)) {
251
- fs.mkdirSync(dirPath, { recursive: true, mode: 0o700 });
252
- } else {
253
- // If exists, verify permissions are restrictive
254
- const stats = fs.statSync(dirPath);
255
- // Check if world-readable (mode & 0o077 should be 0 for secure)
256
- if ((stats.mode & 0o077) !== 0) {
257
- return {
258
- success: false,
259
- error: 'Temp directory has insecure permissions',
260
- dirPath: null
261
- };
262
- }
263
- }
264
-
265
- return {
266
- success: true,
267
- error: null,
268
- dirPath
269
- };
270
-
271
- } catch (err) {
272
- return {
273
- success: false,
274
- error: `Failed to create secure temp directory: ${err.message}`,
275
- dirPath: null
276
- };
277
- }
278
- }
279
-
280
- export default {
281
- isPathSafe,
282
- validateFileSize,
283
- getSecureTempDir,
284
- createSecureTempDir
285
- };
1
+ /**
2
+ * Music File Validator - Security-Critical Path and File Validation
3
+ * Story 4.1: Path Validation and Security Hardening
4
+ *
5
+ * CRITICAL: All functions enforce CLAUDE.md security requirements:
6
+ * - Use path.resolve() for all path operations
7
+ * - Verify file ownership before processing external files
8
+ * - Prevent path traversal attacks via traversal patterns, symlinks, etc.
9
+ * - Validate file exists, is readable, and owned by current user
10
+ *
11
+ * @module music-file-validator
12
+ * @requires fs
13
+ * @requires path
14
+ * @requires os
15
+ */
16
+
17
+ import fs from 'node:fs';
18
+ import path from 'node:path';
19
+ import os from 'node:os';
20
+
21
+ /**
22
+ * Story 4.1: Validate that a file path is safe and within user's home directory
23
+ *
24
+ * Security checks:
25
+ * 1. Resolves path to absolute form (prevents ../ tricks)
26
+ * 2. Validates path is within home directory
27
+ * 3. Rejects symlinks pointing outside home
28
+ * 4. Verifies file ownership matches current user
29
+ * 5. Checks file is readable
30
+ *
31
+ * @param {string} userPath - Path provided by user (absolute or relative)
32
+ * @param {string} userHomeDir - User's home directory (default: process.env.HOME)
33
+ * @returns {Object} { isValid: boolean, error: string|null, resolvedPath: string|null }
34
+ * @throws {Error} If path validation encounters unexpected errors
35
+ */
36
+ export function isPathSafe(userPath, userHomeDir = null) {
37
+ try {
38
+ // Parameter validation
39
+ if (!userPath || typeof userPath !== 'string') {
40
+ return {
41
+ isValid: false,
42
+ error: 'Path must be a non-empty string',
43
+ resolvedPath: null
44
+ };
45
+ }
46
+
47
+ // Use provided home dir or default to environment
48
+ const homeDir = userHomeDir || (process.env.HOME || process.env.USERPROFILE);
49
+ if (!homeDir) {
50
+ return {
51
+ isValid: false,
52
+ error: 'Unable to determine home directory',
53
+ resolvedPath: null
54
+ };
55
+ }
56
+
57
+ // CRITICAL: Use path.resolve() to get absolute path (CLAUDE.md requirement)
58
+ // This prevents directory traversal attacks like "../../etc/passwd"
59
+ const resolvedPath = path.resolve(userPath);
60
+ const resolvedHome = path.resolve(homeDir);
61
+
62
+ // Check if path is within home directory
63
+ // Must either match exactly OR start with home + separator (prevents /home/user2 bypass)
64
+ const isWithinHome = resolvedPath === resolvedHome ||
65
+ resolvedPath.startsWith(resolvedHome + path.sep);
66
+
67
+ if (!isWithinHome) {
68
+ return {
69
+ isValid: false,
70
+ error: `Security validation failed: path must be within home directory (${resolvedHome})`,
71
+ resolvedPath: null
72
+ };
73
+ }
74
+
75
+ // SECURITY: Use lstatSync first to detect symlinks before following them (#131)
76
+ let lstats;
77
+ try {
78
+ lstats = fs.lstatSync(resolvedPath);
79
+ } catch (err) {
80
+ if (err.code === 'ENOENT') {
81
+ return { isValid: false, error: `File not found: ${userPath}`, resolvedPath: null };
82
+ }
83
+ return { isValid: false, error: `Cannot access file: ${err.message}`, resolvedPath: null };
84
+ }
85
+
86
+ // Check if symlink - if so, verify target is also within home directory
87
+ if (lstats.isSymbolicLink()) {
88
+ try {
89
+ const targetPath = fs.realpathSync(resolvedPath);
90
+ const isTargetWithinHome = targetPath === resolvedHome ||
91
+ targetPath.startsWith(resolvedHome + path.sep);
92
+
93
+ if (!isTargetWithinHome) {
94
+ return {
95
+ isValid: false,
96
+ error: 'Security validation failed: symlink target must be within home directory',
97
+ resolvedPath: null
98
+ };
99
+ }
100
+ } catch (err) {
101
+ return {
102
+ isValid: false,
103
+ error: `Failed to resolve symlink: ${err.message}`,
104
+ resolvedPath: null
105
+ };
106
+ }
107
+ }
108
+
109
+ // Get file stats (follows symlinks for regular file check)
110
+ const stats = fs.statSync(resolvedPath);
111
+
112
+ // Check if it's a regular file (not directory, special file, etc)
113
+ if (!stats.isFile()) {
114
+ return {
115
+ isValid: false,
116
+ error: `Path must be a regular file, not a ${stats.isDirectory() ? 'directory' : 'special file'}`,
117
+ resolvedPath: null
118
+ };
119
+ }
120
+
121
+ // CRITICAL: Verify file ownership (CLAUDE.md requirement)
122
+ // Prevent other users from planting malicious files
123
+ // SECURITY: Fail-secure on platforms where getuid is unavailable (#131)
124
+ const currentUserId = process.getuid ? process.getuid() : null;
125
+ if (currentUserId === null) {
126
+ return {
127
+ isValid: false,
128
+ error: 'Security validation failed: unable to verify file ownership on this platform',
129
+ resolvedPath: null
130
+ };
131
+ }
132
+ if (stats.uid !== currentUserId) {
133
+ return {
134
+ isValid: false,
135
+ error: 'Security validation failed: file not owned by current user',
136
+ resolvedPath: null
137
+ };
138
+ }
139
+
140
+ // Check if file is readable
141
+ try {
142
+ fs.accessSync(resolvedPath, fs.constants.R_OK);
143
+ } catch (err) {
144
+ return {
145
+ isValid: false,
146
+ error: `File is not readable: ${err.message}`,
147
+ resolvedPath: null
148
+ };
149
+ }
150
+
151
+ // All checks passed
152
+ return {
153
+ isValid: true,
154
+ error: null,
155
+ resolvedPath
156
+ };
157
+
158
+ } catch (err) {
159
+ // Unexpected error during validation
160
+ return {
161
+ isValid: false,
162
+ error: `Unexpected validation error: ${err.message}`,
163
+ resolvedPath: null
164
+ };
165
+ }
166
+ }
167
+
168
+ /**
169
+ * Verify file size is within acceptable limits for music files
170
+ *
171
+ * @param {string} filePath - Path to file (must already be validated with isPathSafe)
172
+ * @param {number} maxSizeBytes - Maximum file size in bytes (default: 50MB)
173
+ * @returns {Object} { isValid: boolean, error: string|null, sizeBytes: number }
174
+ */
175
+ export function validateFileSize(filePath, maxSizeBytes = 50 * 1024 * 1024) {
176
+ try {
177
+ if (!fs.existsSync(filePath)) {
178
+ return {
179
+ isValid: false,
180
+ error: 'File does not exist',
181
+ sizeBytes: 0
182
+ };
183
+ }
184
+
185
+ const stats = fs.statSync(filePath);
186
+ const sizeBytes = stats.size;
187
+
188
+ if (sizeBytes > maxSizeBytes) {
189
+ const sizeMB = (sizeBytes / 1024 / 1024).toFixed(2);
190
+ const maxMB = (maxSizeBytes / 1024 / 1024).toFixed(2);
191
+ return {
192
+ isValid: false,
193
+ error: `File size (${sizeMB}MB) exceeds maximum (${maxMB}MB)`,
194
+ sizeBytes
195
+ };
196
+ }
197
+
198
+ if (sizeBytes === 0) {
199
+ return {
200
+ isValid: false,
201
+ error: 'File is empty',
202
+ sizeBytes
203
+ };
204
+ }
205
+
206
+ return {
207
+ isValid: true,
208
+ error: null,
209
+ sizeBytes
210
+ };
211
+
212
+ } catch (err) {
213
+ return {
214
+ isValid: false,
215
+ error: `Error checking file size: ${err.message}`,
216
+ sizeBytes: 0
217
+ };
218
+ }
219
+ }
220
+
221
+ /**
222
+ * Get secure temp directory for audio file operations
223
+ * Uses XDG_RUNTIME_DIR if available (follows CLAUDE.md requirement)
224
+ * Falls back to user-specific /tmp directory
225
+ *
226
+ * @param {string} prefix - Directory name prefix (default: 'agentvibes-music')
227
+ * @returns {string} Secure temp directory path
228
+ */
229
+ export function getSecureTempDir(prefix = 'agentvibes-music') {
230
+ const xdgRuntime = process.env.XDG_RUNTIME_DIR;
231
+
232
+ if (xdgRuntime && fs.existsSync(xdgRuntime)) {
233
+ return path.join(xdgRuntime, `${prefix}-${process.pid}`);
234
+ }
235
+
236
+ // Fallback to user-specific /tmp
237
+ const userTmp = path.join(os.tmpdir(), `${prefix}-${process.env.USER || 'user'}`);
238
+ return userTmp;
239
+ }
240
+
241
+ /**
242
+ * Create secure temp directory with restrictive permissions
243
+ *
244
+ * @param {string} dirPath - Directory path to create
245
+ * @returns {Object} { success: boolean, error: string|null, dirPath: string|null }
246
+ */
247
+ export function createSecureTempDir(dirPath) {
248
+ try {
249
+ // Create directory if it doesn't exist
250
+ if (!fs.existsSync(dirPath)) {
251
+ fs.mkdirSync(dirPath, { recursive: true, mode: 0o700 });
252
+ } else {
253
+ // If exists, verify permissions are restrictive
254
+ const stats = fs.statSync(dirPath);
255
+ // Check if world-readable (mode & 0o077 should be 0 for secure)
256
+ if ((stats.mode & 0o077) !== 0) {
257
+ return {
258
+ success: false,
259
+ error: 'Temp directory has insecure permissions',
260
+ dirPath: null
261
+ };
262
+ }
263
+ }
264
+
265
+ return {
266
+ success: true,
267
+ error: null,
268
+ dirPath
269
+ };
270
+
271
+ } catch (err) {
272
+ return {
273
+ success: false,
274
+ error: `Failed to create secure temp directory: ${err.message}`,
275
+ dirPath: null
276
+ };
277
+ }
278
+ }
279
+
280
+ export default {
281
+ isPathSafe,
282
+ validateFileSize,
283
+ getSecureTempDir,
284
+ createSecureTempDir
285
+ };