blackveil-dns 2.6.2 → 2.6.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.d.ts CHANGED
@@ -191,7 +191,7 @@ declare function sanitizeDomain(input: string): string;
191
191
  declare function sanitizeInput(input: string, maxLength?: number): string;
192
192
 
193
193
  /** Server version — keep in sync with package.json */
194
- declare const SERVER_VERSION = "2.6.2";
194
+ declare const SERVER_VERSION = "2.6.4";
195
195
 
196
196
  /**
197
197
  * Map of every tool name to its Zod argument schema.
package/dist/index.js CHANGED
@@ -571,7 +571,7 @@ function sanitizeInput(input, maxLength = 500) {
571
571
  }
572
572
 
573
573
  // src/lib/server-version.ts
574
- var SERVER_VERSION = "2.6.2";
574
+ var SERVER_VERSION = "2.6.4";
575
575
  var DomainSchema = z.string().min(1).max(253);
576
576
  z.string().regex(/^[0-9a-f]{64}$/);
577
577
  var DkimSelectorSchema = z.string().transform((s) => s.trim().toLowerCase()).pipe(z.string().max(63).regex(/^[a-z0-9]([a-z0-9-]*[a-z0-9])?$/));
@@ -761,42 +761,42 @@ function toInputSchema(schema) {
761
761
  }
762
762
  var TOOL_DEFS = {
763
763
  check_mx: {
764
- description: "Validate MX records and email provider detection.",
764
+ description: "Look up MX records for a domain. Shows mail servers, email provider detection, and validates configuration.",
765
765
  schema: BaseDomainArgs,
766
766
  group: "email_auth",
767
767
  tier: "protective",
768
768
  scanIncluded: true
769
769
  },
770
770
  check_spf: {
771
- description: "Validate SPF syntax, policy, and trust surface.",
771
+ description: "Look up and validate SPF record for a domain. Shows authorized senders, syntax issues, and trust surface.",
772
772
  schema: BaseDomainArgs,
773
773
  group: "email_auth",
774
774
  tier: "core",
775
775
  scanIncluded: true
776
776
  },
777
777
  check_dmarc: {
778
- description: "Validate DMARC policy, alignment, and reporting.",
778
+ description: "Look up and validate DMARC record for a domain. Shows policy enforcement, alignment mode, and reporting config.",
779
779
  schema: BaseDomainArgs,
780
780
  group: "email_auth",
781
781
  tier: "core",
782
782
  scanIncluded: true
783
783
  },
784
784
  check_dkim: {
785
- description: "Probe DKIM selectors and validate key strength.",
785
+ description: "Look up DKIM records for a domain. Probes common selectors and validates key strength and algorithm.",
786
786
  schema: CheckDkimArgs,
787
787
  group: "email_auth",
788
788
  tier: "core",
789
789
  scanIncluded: true
790
790
  },
791
791
  check_dnssec: {
792
- description: "Verify DNSSEC validation and DNSKEY/DS records.",
792
+ description: "Check DNSSEC status for a domain. Verifies DNSKEY/DS records and validation chain.",
793
793
  schema: BaseDomainArgs,
794
794
  group: "infrastructure",
795
795
  tier: "core",
796
796
  scanIncluded: true
797
797
  },
798
798
  check_ssl: {
799
- description: "Verify SSL/TLS certificate and HTTPS config.",
799
+ description: "Check SSL/TLS certificate for a domain. Shows issuer, expiry, protocol versions, and HTTPS configuration.",
800
800
  schema: BaseDomainArgs,
801
801
  group: "infrastructure",
802
802
  tier: "core",
@@ -810,14 +810,14 @@ var TOOL_DEFS = {
810
810
  scanIncluded: true
811
811
  },
812
812
  check_ns: {
813
- description: "Analyze NS delegation and provider diversity.",
813
+ description: "Look up NS (nameserver) records for a domain. Shows DNS provider, delegation, and redundancy.",
814
814
  schema: BaseDomainArgs,
815
815
  group: "infrastructure",
816
816
  tier: "protective",
817
817
  scanIncluded: true
818
818
  },
819
819
  check_caa: {
820
- description: "Check authorized Certificate Authorities via CAA.",
820
+ description: "Look up CAA records for a domain. Shows which Certificate Authorities are authorized to issue certificates.",
821
821
  schema: BaseDomainArgs,
822
822
  group: "infrastructure",
823
823
  tier: "protective",
@@ -880,7 +880,7 @@ var TOOL_DEFS = {
880
880
  scanIncluded: true
881
881
  },
882
882
  scan_domain: {
883
- description: "Full DNS and email security audit. Score, grade, maturity, findings. Start here.",
883
+ description: "Look up any domain to get a full DNS and email security audit. Use this whenever a user mentions a domain name, asks to check/scan/lookup/analyze a domain, or wants to know about a domain's security posture. Returns score, grade, maturity stage, and prioritized findings. Start here for any domain-related question.",
884
884
  schema: ScanDomainArgs,
885
885
  group: "meta",
886
886
  scanIncluded: false
@@ -1023,13 +1023,13 @@ var TOOL_DEFS = {
1023
1023
  scanIncluded: false
1024
1024
  },
1025
1025
  resolve_spf_chain: {
1026
- description: "Recursively resolve the full SPF include chain. Shows lookup count, tree depth, and flags issues like circular includes or exceeding the 10-lookup limit.",
1026
+ description: "Trace the full SPF include chain for a domain. Recursively resolves all includes, shows lookup count, tree depth, and flags circular includes or exceeding the 10-lookup limit.",
1027
1027
  schema: BaseDomainArgs,
1028
1028
  group: "intelligence",
1029
1029
  scanIncluded: false
1030
1030
  },
1031
1031
  discover_subdomains: {
1032
- description: "Discover subdomains via Certificate Transparency logs. Reveals shadow IT, forgotten services, and unauthorized certificate issuance.",
1032
+ description: "Find subdomains of a domain using Certificate Transparency logs. Reveals shadow IT, forgotten services, and unauthorized certificate issuance.",
1033
1033
  schema: BaseDomainArgs,
1034
1034
  group: "intelligence",
1035
1035
  scanIncluded: false
@@ -3655,7 +3655,7 @@ async function scanDomain(domain, kv, runtimeOptions) {
3655
3655
  )
3656
3656
  ];
3657
3657
  const result2 = buildCheckResult(category, findings);
3658
- checkResults.push({ ...result2, score: 0, checkStatus: "timeout" });
3658
+ checkResults.push({ ...result2, score: 0, passed: false, checkStatus: "timeout" });
3659
3659
  degradedStatuses.set(category, "timeout");
3660
3660
  }
3661
3661
  }
@@ -3666,7 +3666,7 @@ async function scanDomain(domain, kv, runtimeOptions) {
3666
3666
  if (degradedStatuses.size > 0) {
3667
3667
  checkResults = checkResults.map((r) => {
3668
3668
  const status = degradedStatuses.get(r.category);
3669
- return status ? { ...r, score: 0, checkStatus: status } : r;
3669
+ return status ? { ...r, score: 0, passed: false, checkStatus: status } : r;
3670
3670
  });
3671
3671
  }
3672
3672
  let domainContext = detectDomainContext(checkResults);