blackveil-dns 2.6.0 → 2.6.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.ts +1 -1
- package/dist/index.js +14 -14
- package/dist/index.js.map +1 -1
- package/dist/stdio.js +27 -17
- package/dist/stdio.js.map +1 -1
- package/package.json +2 -2
package/dist/index.d.ts
CHANGED
|
@@ -191,7 +191,7 @@ declare function sanitizeDomain(input: string): string;
|
|
|
191
191
|
declare function sanitizeInput(input: string, maxLength?: number): string;
|
|
192
192
|
|
|
193
193
|
/** Server version — keep in sync with package.json */
|
|
194
|
-
declare const SERVER_VERSION = "2.6.
|
|
194
|
+
declare const SERVER_VERSION = "2.6.4";
|
|
195
195
|
|
|
196
196
|
/**
|
|
197
197
|
* Map of every tool name to its Zod argument schema.
|
package/dist/index.js
CHANGED
|
@@ -571,7 +571,7 @@ function sanitizeInput(input, maxLength = 500) {
|
|
|
571
571
|
}
|
|
572
572
|
|
|
573
573
|
// src/lib/server-version.ts
|
|
574
|
-
var SERVER_VERSION = "2.6.
|
|
574
|
+
var SERVER_VERSION = "2.6.4";
|
|
575
575
|
var DomainSchema = z.string().min(1).max(253);
|
|
576
576
|
z.string().regex(/^[0-9a-f]{64}$/);
|
|
577
577
|
var DkimSelectorSchema = z.string().transform((s) => s.trim().toLowerCase()).pipe(z.string().max(63).regex(/^[a-z0-9]([a-z0-9-]*[a-z0-9])?$/));
|
|
@@ -761,42 +761,42 @@ function toInputSchema(schema) {
|
|
|
761
761
|
}
|
|
762
762
|
var TOOL_DEFS = {
|
|
763
763
|
check_mx: {
|
|
764
|
-
description: "
|
|
764
|
+
description: "Look up MX records for a domain. Shows mail servers, email provider detection, and validates configuration.",
|
|
765
765
|
schema: BaseDomainArgs,
|
|
766
766
|
group: "email_auth",
|
|
767
767
|
tier: "protective",
|
|
768
768
|
scanIncluded: true
|
|
769
769
|
},
|
|
770
770
|
check_spf: {
|
|
771
|
-
description: "
|
|
771
|
+
description: "Look up and validate SPF record for a domain. Shows authorized senders, syntax issues, and trust surface.",
|
|
772
772
|
schema: BaseDomainArgs,
|
|
773
773
|
group: "email_auth",
|
|
774
774
|
tier: "core",
|
|
775
775
|
scanIncluded: true
|
|
776
776
|
},
|
|
777
777
|
check_dmarc: {
|
|
778
|
-
description: "
|
|
778
|
+
description: "Look up and validate DMARC record for a domain. Shows policy enforcement, alignment mode, and reporting config.",
|
|
779
779
|
schema: BaseDomainArgs,
|
|
780
780
|
group: "email_auth",
|
|
781
781
|
tier: "core",
|
|
782
782
|
scanIncluded: true
|
|
783
783
|
},
|
|
784
784
|
check_dkim: {
|
|
785
|
-
description: "
|
|
785
|
+
description: "Look up DKIM records for a domain. Probes common selectors and validates key strength and algorithm.",
|
|
786
786
|
schema: CheckDkimArgs,
|
|
787
787
|
group: "email_auth",
|
|
788
788
|
tier: "core",
|
|
789
789
|
scanIncluded: true
|
|
790
790
|
},
|
|
791
791
|
check_dnssec: {
|
|
792
|
-
description: "
|
|
792
|
+
description: "Check DNSSEC status for a domain. Verifies DNSKEY/DS records and validation chain.",
|
|
793
793
|
schema: BaseDomainArgs,
|
|
794
794
|
group: "infrastructure",
|
|
795
795
|
tier: "core",
|
|
796
796
|
scanIncluded: true
|
|
797
797
|
},
|
|
798
798
|
check_ssl: {
|
|
799
|
-
description: "
|
|
799
|
+
description: "Check SSL/TLS certificate for a domain. Shows issuer, expiry, protocol versions, and HTTPS configuration.",
|
|
800
800
|
schema: BaseDomainArgs,
|
|
801
801
|
group: "infrastructure",
|
|
802
802
|
tier: "core",
|
|
@@ -810,14 +810,14 @@ var TOOL_DEFS = {
|
|
|
810
810
|
scanIncluded: true
|
|
811
811
|
},
|
|
812
812
|
check_ns: {
|
|
813
|
-
description: "
|
|
813
|
+
description: "Look up NS (nameserver) records for a domain. Shows DNS provider, delegation, and redundancy.",
|
|
814
814
|
schema: BaseDomainArgs,
|
|
815
815
|
group: "infrastructure",
|
|
816
816
|
tier: "protective",
|
|
817
817
|
scanIncluded: true
|
|
818
818
|
},
|
|
819
819
|
check_caa: {
|
|
820
|
-
description: "
|
|
820
|
+
description: "Look up CAA records for a domain. Shows which Certificate Authorities are authorized to issue certificates.",
|
|
821
821
|
schema: BaseDomainArgs,
|
|
822
822
|
group: "infrastructure",
|
|
823
823
|
tier: "protective",
|
|
@@ -880,7 +880,7 @@ var TOOL_DEFS = {
|
|
|
880
880
|
scanIncluded: true
|
|
881
881
|
},
|
|
882
882
|
scan_domain: {
|
|
883
|
-
description: "
|
|
883
|
+
description: "Look up any domain to get a full DNS and email security audit. Use this whenever a user mentions a domain name, asks to check/scan/lookup/analyze a domain, or wants to know about a domain's security posture. Returns score, grade, maturity stage, and prioritized findings. Start here for any domain-related question.",
|
|
884
884
|
schema: ScanDomainArgs,
|
|
885
885
|
group: "meta",
|
|
886
886
|
scanIncluded: false
|
|
@@ -1023,13 +1023,13 @@ var TOOL_DEFS = {
|
|
|
1023
1023
|
scanIncluded: false
|
|
1024
1024
|
},
|
|
1025
1025
|
resolve_spf_chain: {
|
|
1026
|
-
description: "
|
|
1026
|
+
description: "Trace the full SPF include chain for a domain. Recursively resolves all includes, shows lookup count, tree depth, and flags circular includes or exceeding the 10-lookup limit.",
|
|
1027
1027
|
schema: BaseDomainArgs,
|
|
1028
1028
|
group: "intelligence",
|
|
1029
1029
|
scanIncluded: false
|
|
1030
1030
|
},
|
|
1031
1031
|
discover_subdomains: {
|
|
1032
|
-
description: "
|
|
1032
|
+
description: "Find subdomains of a domain using Certificate Transparency logs. Reveals shadow IT, forgotten services, and unauthorized certificate issuance.",
|
|
1033
1033
|
schema: BaseDomainArgs,
|
|
1034
1034
|
group: "intelligence",
|
|
1035
1035
|
scanIncluded: false
|
|
@@ -3655,7 +3655,7 @@ async function scanDomain(domain, kv, runtimeOptions) {
|
|
|
3655
3655
|
)
|
|
3656
3656
|
];
|
|
3657
3657
|
const result2 = buildCheckResult(category, findings);
|
|
3658
|
-
checkResults.push({ ...result2, score: 0, checkStatus: "timeout" });
|
|
3658
|
+
checkResults.push({ ...result2, score: 0, passed: false, checkStatus: "timeout" });
|
|
3659
3659
|
degradedStatuses.set(category, "timeout");
|
|
3660
3660
|
}
|
|
3661
3661
|
}
|
|
@@ -3666,7 +3666,7 @@ async function scanDomain(domain, kv, runtimeOptions) {
|
|
|
3666
3666
|
if (degradedStatuses.size > 0) {
|
|
3667
3667
|
checkResults = checkResults.map((r) => {
|
|
3668
3668
|
const status = degradedStatuses.get(r.category);
|
|
3669
|
-
return status ? { ...r, score: 0, checkStatus: status } : r;
|
|
3669
|
+
return status ? { ...r, score: 0, passed: false, checkStatus: status } : r;
|
|
3670
3670
|
});
|
|
3671
3671
|
}
|
|
3672
3672
|
let domainContext = detectDomainContext(checkResults);
|