agentvibes 5.6.0 → 5.6.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (101) hide show
  1. package/.agentvibes/config.json +3 -38
  2. package/.claude/config/audio-effects.cfg +1 -1
  3. package/.claude/config/background-music-enabled.txt +1 -1
  4. package/.claude/config/background-music-position.txt +6 -6
  5. package/.claude/github-star-reminder.txt +1 -1
  6. package/.claude/hooks/play-tts-ssh-remote.sh +119 -42
  7. package/.claude/hooks/play-tts-windows-receiver.sh +31 -0
  8. package/.claude/hooks/stop.sh +2 -27
  9. package/.claude/hooks-windows/play-tts-windows-sapi.ps1 +108 -108
  10. package/.claude/hooks-windows/play-tts.ps1 +58 -8
  11. package/.claude/piper-voices-dir.txt +1 -1
  12. package/.clawdbot/skill/README.md +326 -0
  13. package/.mcp.json +17 -27
  14. package/README.md +15 -2
  15. package/RELEASE_NOTES.md +64 -0
  16. package/bin/agent-vibes +39 -39
  17. package/package.json +1 -1
  18. package/src/bmad-detector.js +71 -71
  19. package/src/cli/list-personalities.js +110 -110
  20. package/src/cli/list-voices.js +114 -114
  21. package/src/commands/bmad-voices.js +394 -394
  22. package/src/commands/install-mcp.js +476 -476
  23. package/src/console/brand-colors.js +13 -13
  24. package/src/console/constants/personalities.js +44 -44
  25. package/src/console/modals/modal-overlay.js +247 -247
  26. package/src/console/navigation.js +5 -1
  27. package/src/console/tabs/agents-tab.js +5 -5
  28. package/src/console/tabs/help-tab.js +314 -314
  29. package/src/console/tabs/readme-tab.js +272 -272
  30. package/src/console/tabs/setup-tab.js +32 -17
  31. package/src/console/tabs/voices-tab.js +2 -2
  32. package/src/console/widgets/destroy-list.js +25 -25
  33. package/src/console/widgets/notice.js +55 -55
  34. package/src/console/widgets/personality-picker.js +213 -213
  35. package/src/console/widgets/reverb-picker.js +97 -97
  36. package/src/console/widgets/track-picker.js +1 -1
  37. package/src/i18n/de.js +202 -202
  38. package/src/i18n/es.js +202 -202
  39. package/src/i18n/fr.js +202 -202
  40. package/src/i18n/hi.js +202 -202
  41. package/src/i18n/ja.js +202 -202
  42. package/src/i18n/ko.js +202 -202
  43. package/src/i18n/pt.js +202 -202
  44. package/src/i18n/strings.js +54 -54
  45. package/src/i18n/zh-CN.js +202 -202
  46. package/src/installer/language-screen.js +31 -31
  47. package/src/installer/music-file-input.js +304 -304
  48. package/src/services/agent-voice-store.js +420 -423
  49. package/src/services/config-service.js +264 -264
  50. package/src/services/language-service.js +47 -47
  51. package/src/services/llm-provider-service.js +11 -4
  52. package/src/services/navigation-service.js +34 -10
  53. package/src/services/provider-service.js +143 -143
  54. package/src/utils/audio-duration-validator.js +298 -298
  55. package/src/utils/audio-format-validator.js +277 -277
  56. package/src/utils/dependency-checker.js +469 -469
  57. package/src/utils/file-ownership-verifier.js +358 -358
  58. package/src/utils/list-formatter.js +194 -194
  59. package/src/utils/music-file-validator.js +285 -285
  60. package/src/utils/preview-list-prompt.js +136 -136
  61. package/src/utils/secure-music-storage.js +412 -412
  62. package/.agentvibes/LITE-MODE.md +0 -236
  63. package/.agentvibes/README.md +0 -136
  64. package/.agentvibes/backup/session-start-tts.sh.20251210_212814 +0 -141
  65. package/.agentvibes/backups/agents/analyst_20260204_144958.md +0 -78
  66. package/.agentvibes/backups/agents/architect_20260204_144958.md +0 -72
  67. package/.agentvibes/backups/agents/dev_20260204_144958.md +0 -74
  68. package/.agentvibes/backups/agents/pm_20260204_144958.md +0 -72
  69. package/.agentvibes/backups/agents/quick-flow-solo-dev_20260204_144958.md +0 -64
  70. package/.agentvibes/backups/agents/sm_20260204_144958.md +0 -87
  71. package/.agentvibes/backups/agents/tea_20260204_144958.md +0 -79
  72. package/.agentvibes/backups/agents/tech-writer_20260204_144958.md +0 -82
  73. package/.agentvibes/backups/agents/ux-designer_20260204_144958.md +0 -80
  74. package/.agentvibes/config/README-personality-defaults.md +0 -162
  75. package/.agentvibes/config/agentvibes.json +0 -1
  76. package/.agentvibes/config/mode.txt +0 -1
  77. package/.agentvibes/config/personality-voice-defaults.default.json +0 -21
  78. package/.agentvibes/config/save-audio.txt +0 -1
  79. package/.agentvibes/config/voice-metadata.json +0 -160
  80. package/.agentvibes/hooks/help.sh +0 -191
  81. package/.agentvibes/hooks/post-tool-use-lite.sh +0 -111
  82. package/.agentvibes/hooks/save-audio-manager.sh +0 -162
  83. package/.agentvibes/hooks/session-start-full-optimized.sh +0 -102
  84. package/.agentvibes/hooks/session-start-full.sh +0 -142
  85. package/.agentvibes/hooks/session-start-lite-v2.sh +0 -34
  86. package/.agentvibes/hooks/session-start-lite.sh +0 -29
  87. package/.agentvibes/hooks/stop-lite.sh +0 -115
  88. package/.agentvibes/hooks/switch-mode.sh +0 -215
  89. package/.agentvibes/output-styles/audio-summary.md +0 -30
  90. package/.claude/audio/voice-samples/piper/alan.wav +0 -0
  91. package/.claude/audio/voice-samples/piper/amy.wav +0 -0
  92. package/.claude/audio/voice-samples/piper/charlotte.wav +0 -0
  93. package/.claude/audio/voice-samples/piper/joe.wav +0 -0
  94. package/.claude/audio/voice-samples/piper/john.wav +0 -0
  95. package/.claude/audio/voice-samples/piper/katherine.wav +0 -0
  96. package/.claude/audio/voice-samples/piper/kristin.wav +0 -0
  97. package/.claude/audio/voice-samples/piper/linda.wav +0 -0
  98. package/.claude/audio/voice-samples/piper/marcus.wav +0 -0
  99. package/.claude/audio/voice-samples/piper/ryan.wav +0 -0
  100. package/.claude/hooks/post-response.sh +0 -41
  101. package/bin/ensure-soprano-running.sh +0 -43
@@ -1,285 +1,285 @@
1
- /**
2
- * Music File Validator - Security-Critical Path and File Validation
3
- * Story 4.1: Path Validation and Security Hardening
4
- *
5
- * CRITICAL: All functions enforce CLAUDE.md security requirements:
6
- * - Use path.resolve() for all path operations
7
- * - Verify file ownership before processing external files
8
- * - Prevent path traversal attacks via traversal patterns, symlinks, etc.
9
- * - Validate file exists, is readable, and owned by current user
10
- *
11
- * @module music-file-validator
12
- * @requires fs
13
- * @requires path
14
- * @requires os
15
- */
16
-
17
- import fs from 'node:fs';
18
- import path from 'node:path';
19
- import os from 'node:os';
20
-
21
- /**
22
- * Story 4.1: Validate that a file path is safe and within user's home directory
23
- *
24
- * Security checks:
25
- * 1. Resolves path to absolute form (prevents ../ tricks)
26
- * 2. Validates path is within home directory
27
- * 3. Rejects symlinks pointing outside home
28
- * 4. Verifies file ownership matches current user
29
- * 5. Checks file is readable
30
- *
31
- * @param {string} userPath - Path provided by user (absolute or relative)
32
- * @param {string} userHomeDir - User's home directory (default: process.env.HOME)
33
- * @returns {Object} { isValid: boolean, error: string|null, resolvedPath: string|null }
34
- * @throws {Error} If path validation encounters unexpected errors
35
- */
36
- export function isPathSafe(userPath, userHomeDir = null) {
37
- try {
38
- // Parameter validation
39
- if (!userPath || typeof userPath !== 'string') {
40
- return {
41
- isValid: false,
42
- error: 'Path must be a non-empty string',
43
- resolvedPath: null
44
- };
45
- }
46
-
47
- // Use provided home dir or default to environment
48
- const homeDir = userHomeDir || (process.env.HOME || process.env.USERPROFILE);
49
- if (!homeDir) {
50
- return {
51
- isValid: false,
52
- error: 'Unable to determine home directory',
53
- resolvedPath: null
54
- };
55
- }
56
-
57
- // CRITICAL: Use path.resolve() to get absolute path (CLAUDE.md requirement)
58
- // This prevents directory traversal attacks like "../../etc/passwd"
59
- const resolvedPath = path.resolve(userPath);
60
- const resolvedHome = path.resolve(homeDir);
61
-
62
- // Check if path is within home directory
63
- // Must either match exactly OR start with home + separator (prevents /home/user2 bypass)
64
- const isWithinHome = resolvedPath === resolvedHome ||
65
- resolvedPath.startsWith(resolvedHome + path.sep);
66
-
67
- if (!isWithinHome) {
68
- return {
69
- isValid: false,
70
- error: `Security validation failed: path must be within home directory (${resolvedHome})`,
71
- resolvedPath: null
72
- };
73
- }
74
-
75
- // SECURITY: Use lstatSync first to detect symlinks before following them (#131)
76
- let lstats;
77
- try {
78
- lstats = fs.lstatSync(resolvedPath);
79
- } catch (err) {
80
- if (err.code === 'ENOENT') {
81
- return { isValid: false, error: `File not found: ${userPath}`, resolvedPath: null };
82
- }
83
- return { isValid: false, error: `Cannot access file: ${err.message}`, resolvedPath: null };
84
- }
85
-
86
- // Check if symlink - if so, verify target is also within home directory
87
- if (lstats.isSymbolicLink()) {
88
- try {
89
- const targetPath = fs.realpathSync(resolvedPath);
90
- const isTargetWithinHome = targetPath === resolvedHome ||
91
- targetPath.startsWith(resolvedHome + path.sep);
92
-
93
- if (!isTargetWithinHome) {
94
- return {
95
- isValid: false,
96
- error: 'Security validation failed: symlink target must be within home directory',
97
- resolvedPath: null
98
- };
99
- }
100
- } catch (err) {
101
- return {
102
- isValid: false,
103
- error: `Failed to resolve symlink: ${err.message}`,
104
- resolvedPath: null
105
- };
106
- }
107
- }
108
-
109
- // Get file stats (follows symlinks for regular file check)
110
- const stats = fs.statSync(resolvedPath);
111
-
112
- // Check if it's a regular file (not directory, special file, etc)
113
- if (!stats.isFile()) {
114
- return {
115
- isValid: false,
116
- error: `Path must be a regular file, not a ${stats.isDirectory() ? 'directory' : 'special file'}`,
117
- resolvedPath: null
118
- };
119
- }
120
-
121
- // CRITICAL: Verify file ownership (CLAUDE.md requirement)
122
- // Prevent other users from planting malicious files
123
- // SECURITY: Fail-secure on platforms where getuid is unavailable (#131)
124
- const currentUserId = process.getuid ? process.getuid() : null;
125
- if (currentUserId === null) {
126
- return {
127
- isValid: false,
128
- error: 'Security validation failed: unable to verify file ownership on this platform',
129
- resolvedPath: null
130
- };
131
- }
132
- if (stats.uid !== currentUserId) {
133
- return {
134
- isValid: false,
135
- error: 'Security validation failed: file not owned by current user',
136
- resolvedPath: null
137
- };
138
- }
139
-
140
- // Check if file is readable
141
- try {
142
- fs.accessSync(resolvedPath, fs.constants.R_OK);
143
- } catch (err) {
144
- return {
145
- isValid: false,
146
- error: `File is not readable: ${err.message}`,
147
- resolvedPath: null
148
- };
149
- }
150
-
151
- // All checks passed
152
- return {
153
- isValid: true,
154
- error: null,
155
- resolvedPath
156
- };
157
-
158
- } catch (err) {
159
- // Unexpected error during validation
160
- return {
161
- isValid: false,
162
- error: `Unexpected validation error: ${err.message}`,
163
- resolvedPath: null
164
- };
165
- }
166
- }
167
-
168
- /**
169
- * Verify file size is within acceptable limits for music files
170
- *
171
- * @param {string} filePath - Path to file (must already be validated with isPathSafe)
172
- * @param {number} maxSizeBytes - Maximum file size in bytes (default: 50MB)
173
- * @returns {Object} { isValid: boolean, error: string|null, sizeBytes: number }
174
- */
175
- export function validateFileSize(filePath, maxSizeBytes = 50 * 1024 * 1024) {
176
- try {
177
- if (!fs.existsSync(filePath)) {
178
- return {
179
- isValid: false,
180
- error: 'File does not exist',
181
- sizeBytes: 0
182
- };
183
- }
184
-
185
- const stats = fs.statSync(filePath);
186
- const sizeBytes = stats.size;
187
-
188
- if (sizeBytes > maxSizeBytes) {
189
- const sizeMB = (sizeBytes / 1024 / 1024).toFixed(2);
190
- const maxMB = (maxSizeBytes / 1024 / 1024).toFixed(2);
191
- return {
192
- isValid: false,
193
- error: `File size (${sizeMB}MB) exceeds maximum (${maxMB}MB)`,
194
- sizeBytes
195
- };
196
- }
197
-
198
- if (sizeBytes === 0) {
199
- return {
200
- isValid: false,
201
- error: 'File is empty',
202
- sizeBytes
203
- };
204
- }
205
-
206
- return {
207
- isValid: true,
208
- error: null,
209
- sizeBytes
210
- };
211
-
212
- } catch (err) {
213
- return {
214
- isValid: false,
215
- error: `Error checking file size: ${err.message}`,
216
- sizeBytes: 0
217
- };
218
- }
219
- }
220
-
221
- /**
222
- * Get secure temp directory for audio file operations
223
- * Uses XDG_RUNTIME_DIR if available (follows CLAUDE.md requirement)
224
- * Falls back to user-specific /tmp directory
225
- *
226
- * @param {string} prefix - Directory name prefix (default: 'agentvibes-music')
227
- * @returns {string} Secure temp directory path
228
- */
229
- export function getSecureTempDir(prefix = 'agentvibes-music') {
230
- const xdgRuntime = process.env.XDG_RUNTIME_DIR;
231
-
232
- if (xdgRuntime && fs.existsSync(xdgRuntime)) {
233
- return path.join(xdgRuntime, `${prefix}-${process.pid}`);
234
- }
235
-
236
- // Fallback to user-specific /tmp
237
- const userTmp = path.join(os.tmpdir(), `${prefix}-${process.env.USER || 'user'}`);
238
- return userTmp;
239
- }
240
-
241
- /**
242
- * Create secure temp directory with restrictive permissions
243
- *
244
- * @param {string} dirPath - Directory path to create
245
- * @returns {Object} { success: boolean, error: string|null, dirPath: string|null }
246
- */
247
- export function createSecureTempDir(dirPath) {
248
- try {
249
- // Create directory if it doesn't exist
250
- if (!fs.existsSync(dirPath)) {
251
- fs.mkdirSync(dirPath, { recursive: true, mode: 0o700 });
252
- } else {
253
- // If exists, verify permissions are restrictive
254
- const stats = fs.statSync(dirPath);
255
- // Check if world-readable (mode & 0o077 should be 0 for secure)
256
- if ((stats.mode & 0o077) !== 0) {
257
- return {
258
- success: false,
259
- error: 'Temp directory has insecure permissions',
260
- dirPath: null
261
- };
262
- }
263
- }
264
-
265
- return {
266
- success: true,
267
- error: null,
268
- dirPath
269
- };
270
-
271
- } catch (err) {
272
- return {
273
- success: false,
274
- error: `Failed to create secure temp directory: ${err.message}`,
275
- dirPath: null
276
- };
277
- }
278
- }
279
-
280
- export default {
281
- isPathSafe,
282
- validateFileSize,
283
- getSecureTempDir,
284
- createSecureTempDir
285
- };
1
+ /**
2
+ * Music File Validator - Security-Critical Path and File Validation
3
+ * Story 4.1: Path Validation and Security Hardening
4
+ *
5
+ * CRITICAL: All functions enforce CLAUDE.md security requirements:
6
+ * - Use path.resolve() for all path operations
7
+ * - Verify file ownership before processing external files
8
+ * - Prevent path traversal attacks via traversal patterns, symlinks, etc.
9
+ * - Validate file exists, is readable, and owned by current user
10
+ *
11
+ * @module music-file-validator
12
+ * @requires fs
13
+ * @requires path
14
+ * @requires os
15
+ */
16
+
17
+ import fs from 'node:fs';
18
+ import path from 'node:path';
19
+ import os from 'node:os';
20
+
21
+ /**
22
+ * Story 4.1: Validate that a file path is safe and within user's home directory
23
+ *
24
+ * Security checks:
25
+ * 1. Resolves path to absolute form (prevents ../ tricks)
26
+ * 2. Validates path is within home directory
27
+ * 3. Rejects symlinks pointing outside home
28
+ * 4. Verifies file ownership matches current user
29
+ * 5. Checks file is readable
30
+ *
31
+ * @param {string} userPath - Path provided by user (absolute or relative)
32
+ * @param {string} userHomeDir - User's home directory (default: process.env.HOME)
33
+ * @returns {Object} { isValid: boolean, error: string|null, resolvedPath: string|null }
34
+ * @throws {Error} If path validation encounters unexpected errors
35
+ */
36
+ export function isPathSafe(userPath, userHomeDir = null) {
37
+ try {
38
+ // Parameter validation
39
+ if (!userPath || typeof userPath !== 'string') {
40
+ return {
41
+ isValid: false,
42
+ error: 'Path must be a non-empty string',
43
+ resolvedPath: null
44
+ };
45
+ }
46
+
47
+ // Use provided home dir or default to environment
48
+ const homeDir = userHomeDir || (process.env.HOME || process.env.USERPROFILE);
49
+ if (!homeDir) {
50
+ return {
51
+ isValid: false,
52
+ error: 'Unable to determine home directory',
53
+ resolvedPath: null
54
+ };
55
+ }
56
+
57
+ // CRITICAL: Use path.resolve() to get absolute path (CLAUDE.md requirement)
58
+ // This prevents directory traversal attacks like "../../etc/passwd"
59
+ const resolvedPath = path.resolve(userPath);
60
+ const resolvedHome = path.resolve(homeDir);
61
+
62
+ // Check if path is within home directory
63
+ // Must either match exactly OR start with home + separator (prevents /home/user2 bypass)
64
+ const isWithinHome = resolvedPath === resolvedHome ||
65
+ resolvedPath.startsWith(resolvedHome + path.sep);
66
+
67
+ if (!isWithinHome) {
68
+ return {
69
+ isValid: false,
70
+ error: `Security validation failed: path must be within home directory (${resolvedHome})`,
71
+ resolvedPath: null
72
+ };
73
+ }
74
+
75
+ // SECURITY: Use lstatSync first to detect symlinks before following them (#131)
76
+ let lstats;
77
+ try {
78
+ lstats = fs.lstatSync(resolvedPath);
79
+ } catch (err) {
80
+ if (err.code === 'ENOENT') {
81
+ return { isValid: false, error: `File not found: ${userPath}`, resolvedPath: null };
82
+ }
83
+ return { isValid: false, error: `Cannot access file: ${err.message}`, resolvedPath: null };
84
+ }
85
+
86
+ // Check if symlink - if so, verify target is also within home directory
87
+ if (lstats.isSymbolicLink()) {
88
+ try {
89
+ const targetPath = fs.realpathSync(resolvedPath);
90
+ const isTargetWithinHome = targetPath === resolvedHome ||
91
+ targetPath.startsWith(resolvedHome + path.sep);
92
+
93
+ if (!isTargetWithinHome) {
94
+ return {
95
+ isValid: false,
96
+ error: 'Security validation failed: symlink target must be within home directory',
97
+ resolvedPath: null
98
+ };
99
+ }
100
+ } catch (err) {
101
+ return {
102
+ isValid: false,
103
+ error: `Failed to resolve symlink: ${err.message}`,
104
+ resolvedPath: null
105
+ };
106
+ }
107
+ }
108
+
109
+ // Get file stats (follows symlinks for regular file check)
110
+ const stats = fs.statSync(resolvedPath);
111
+
112
+ // Check if it's a regular file (not directory, special file, etc)
113
+ if (!stats.isFile()) {
114
+ return {
115
+ isValid: false,
116
+ error: `Path must be a regular file, not a ${stats.isDirectory() ? 'directory' : 'special file'}`,
117
+ resolvedPath: null
118
+ };
119
+ }
120
+
121
+ // CRITICAL: Verify file ownership (CLAUDE.md requirement)
122
+ // Prevent other users from planting malicious files
123
+ // SECURITY: Fail-secure on platforms where getuid is unavailable (#131)
124
+ const currentUserId = process.getuid ? process.getuid() : null;
125
+ if (currentUserId === null) {
126
+ return {
127
+ isValid: false,
128
+ error: 'Security validation failed: unable to verify file ownership on this platform',
129
+ resolvedPath: null
130
+ };
131
+ }
132
+ if (stats.uid !== currentUserId) {
133
+ return {
134
+ isValid: false,
135
+ error: 'Security validation failed: file not owned by current user',
136
+ resolvedPath: null
137
+ };
138
+ }
139
+
140
+ // Check if file is readable
141
+ try {
142
+ fs.accessSync(resolvedPath, fs.constants.R_OK);
143
+ } catch (err) {
144
+ return {
145
+ isValid: false,
146
+ error: `File is not readable: ${err.message}`,
147
+ resolvedPath: null
148
+ };
149
+ }
150
+
151
+ // All checks passed
152
+ return {
153
+ isValid: true,
154
+ error: null,
155
+ resolvedPath
156
+ };
157
+
158
+ } catch (err) {
159
+ // Unexpected error during validation
160
+ return {
161
+ isValid: false,
162
+ error: `Unexpected validation error: ${err.message}`,
163
+ resolvedPath: null
164
+ };
165
+ }
166
+ }
167
+
168
+ /**
169
+ * Verify file size is within acceptable limits for music files
170
+ *
171
+ * @param {string} filePath - Path to file (must already be validated with isPathSafe)
172
+ * @param {number} maxSizeBytes - Maximum file size in bytes (default: 50MB)
173
+ * @returns {Object} { isValid: boolean, error: string|null, sizeBytes: number }
174
+ */
175
+ export function validateFileSize(filePath, maxSizeBytes = 50 * 1024 * 1024) {
176
+ try {
177
+ if (!fs.existsSync(filePath)) {
178
+ return {
179
+ isValid: false,
180
+ error: 'File does not exist',
181
+ sizeBytes: 0
182
+ };
183
+ }
184
+
185
+ const stats = fs.statSync(filePath);
186
+ const sizeBytes = stats.size;
187
+
188
+ if (sizeBytes > maxSizeBytes) {
189
+ const sizeMB = (sizeBytes / 1024 / 1024).toFixed(2);
190
+ const maxMB = (maxSizeBytes / 1024 / 1024).toFixed(2);
191
+ return {
192
+ isValid: false,
193
+ error: `File size (${sizeMB}MB) exceeds maximum (${maxMB}MB)`,
194
+ sizeBytes
195
+ };
196
+ }
197
+
198
+ if (sizeBytes === 0) {
199
+ return {
200
+ isValid: false,
201
+ error: 'File is empty',
202
+ sizeBytes
203
+ };
204
+ }
205
+
206
+ return {
207
+ isValid: true,
208
+ error: null,
209
+ sizeBytes
210
+ };
211
+
212
+ } catch (err) {
213
+ return {
214
+ isValid: false,
215
+ error: `Error checking file size: ${err.message}`,
216
+ sizeBytes: 0
217
+ };
218
+ }
219
+ }
220
+
221
+ /**
222
+ * Get secure temp directory for audio file operations
223
+ * Uses XDG_RUNTIME_DIR if available (follows CLAUDE.md requirement)
224
+ * Falls back to user-specific /tmp directory
225
+ *
226
+ * @param {string} prefix - Directory name prefix (default: 'agentvibes-music')
227
+ * @returns {string} Secure temp directory path
228
+ */
229
+ export function getSecureTempDir(prefix = 'agentvibes-music') {
230
+ const xdgRuntime = process.env.XDG_RUNTIME_DIR;
231
+
232
+ if (xdgRuntime && fs.existsSync(xdgRuntime)) {
233
+ return path.join(xdgRuntime, `${prefix}-${process.pid}`);
234
+ }
235
+
236
+ // Fallback to user-specific /tmp
237
+ const userTmp = path.join(os.tmpdir(), `${prefix}-${process.env.USER || 'user'}`);
238
+ return userTmp;
239
+ }
240
+
241
+ /**
242
+ * Create secure temp directory with restrictive permissions
243
+ *
244
+ * @param {string} dirPath - Directory path to create
245
+ * @returns {Object} { success: boolean, error: string|null, dirPath: string|null }
246
+ */
247
+ export function createSecureTempDir(dirPath) {
248
+ try {
249
+ // Create directory if it doesn't exist
250
+ if (!fs.existsSync(dirPath)) {
251
+ fs.mkdirSync(dirPath, { recursive: true, mode: 0o700 });
252
+ } else {
253
+ // If exists, verify permissions are restrictive
254
+ const stats = fs.statSync(dirPath);
255
+ // Check if world-readable (mode & 0o077 should be 0 for secure)
256
+ if ((stats.mode & 0o077) !== 0) {
257
+ return {
258
+ success: false,
259
+ error: 'Temp directory has insecure permissions',
260
+ dirPath: null
261
+ };
262
+ }
263
+ }
264
+
265
+ return {
266
+ success: true,
267
+ error: null,
268
+ dirPath
269
+ };
270
+
271
+ } catch (err) {
272
+ return {
273
+ success: false,
274
+ error: `Failed to create secure temp directory: ${err.message}`,
275
+ dirPath: null
276
+ };
277
+ }
278
+ }
279
+
280
+ export default {
281
+ isPathSafe,
282
+ validateFileSize,
283
+ getSecureTempDir,
284
+ createSecureTempDir
285
+ };