cdp-edge 1.18.0 → 1.18.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/contracts/api-versions.json +12 -8
  2. package/dist/commands/install.js +186 -0
  3. package/dist/commands/setup.js +18 -1
  4. package/extracted-skill/tracking-events-generator/agents/attribution-agent.md +23 -23
  5. package/extracted-skill/tracking-events-generator/agents/browser-tracking.md +172 -72
  6. package/extracted-skill/tracking-events-generator/agents/compliance-agent.md +20 -0
  7. package/extracted-skill/tracking-events-generator/agents/crm-integration-agent.md +48 -16
  8. package/extracted-skill/tracking-events-generator/agents/dashboard-agent.md +7 -7
  9. package/extracted-skill/tracking-events-generator/agents/database-agent.md +8 -8
  10. package/extracted-skill/tracking-events-generator/agents/debug-agent.md +13 -13
  11. package/extracted-skill/tracking-events-generator/agents/devops-agent.md +31 -7
  12. package/extracted-skill/tracking-events-generator/agents/email-agent.md +27 -0
  13. package/extracted-skill/tracking-events-generator/agents/fingerprint-agent.md +205 -0
  14. package/extracted-skill/tracking-events-generator/agents/google-agent.md +118 -0
  15. package/extracted-skill/tracking-events-generator/agents/intelligence-agent.md +90 -4
  16. package/extracted-skill/tracking-events-generator/agents/intelligence-scheduling.md +8 -641
  17. package/extracted-skill/tracking-events-generator/agents/linkedin-agent.md +108 -0
  18. package/extracted-skill/tracking-events-generator/agents/ltv-predictor-agent.md +1 -1
  19. package/extracted-skill/tracking-events-generator/agents/master-feedback-loop.md +68 -8
  20. package/extracted-skill/tracking-events-generator/agents/master-orchestrator.md +71 -34
  21. package/extracted-skill/tracking-events-generator/agents/memory-agent.md +98 -0
  22. package/extracted-skill/tracking-events-generator/agents/performance-agent.md +29 -19
  23. package/extracted-skill/tracking-events-generator/agents/performance-optimization-agent.md +11 -1
  24. package/extracted-skill/tracking-events-generator/agents/security-enterprise-agent.md +137 -28
  25. package/extracted-skill/tracking-events-generator/agents/server-tracking.md +7 -8
  26. package/extracted-skill/tracking-events-generator/agents/tiktok-agent.md +63 -0
  27. package/extracted-skill/tracking-events-generator/agents/tracking-plan-agent.md +100 -5
  28. package/extracted-skill/tracking-events-generator/agents/webhook-agent.md +100 -0
  29. package/extracted-skill/tracking-events-generator/agents/whatsapp-agent.md +58 -5
  30. package/extracted-skill/tracking-events-generator/agents/whatsapp-ctwa-setup-agent.md +16 -16
  31. package/extracted-skill/tracking-events-generator/agents/youtube-agent.md +140 -25
  32. package/extracted-skill/tracking-events-generator/contracts/api-versions.json +12 -8
  33. package/package.json +2 -2
  34. package/server-edge-tracker/worker.js +53 -8
@@ -1,5 +1,15 @@
1
1
  # Performance Agent (Monitoring Master) — CDP Edge
2
2
 
3
+ > **ESCOPO DESTE AGENTE:** Monitoramento e observabilidade em tempo real.
4
+ > Para otimização de cache, queries e latência, ver: **performance-optimization-agent.md**
5
+ >
6
+ > | Este agente faz | performance-optimization-agent faz |
7
+ > |---|---|
8
+ > | Medir latência, throughput, error rates | Estratégias de caching (L1/L2/L3) |
9
+ > | Alertas de degradação de SLA | Otimização de queries D1 |
10
+ > | Health checks e dashboards | Batch processing, indexação |
11
+ > | Relatórios de performance | Profiling e tunning de Workers |
12
+
3
13
  Você é o **Agente de Monitoramento de Performance do CDP Edge**. Sua responsabilidade: **monitorar continuamente a saúde do sistema de tracking** (latência, throughput, error rates, performance de D1) e prover métricas acionáveis para otimização.
4
14
 
5
15
  ---
@@ -107,20 +117,20 @@ function evaluateLatencyPerformance(latencyMetrics) {
107
117
 
108
118
  ```javascript
109
119
  // Monitorar taxa de falhas em todas as APIs
110
- export async function measureApiErrorRate(hours = 24) {
120
+ export async function measureApiErrorRate(env, hours = 24) {
111
121
  const platforms = ['meta', 'google', 'tiktok', 'pinterest', 'reddit'];
112
122
  const errorRates = {};
113
123
 
114
124
  for (const platform of platforms) {
115
125
  // Total de requisições (sucesso + falha)
116
- const totalRequests = await DB.prepare(`
126
+ const totalRequests = await env.DB.prepare(`
117
127
  SELECT COUNT(*) as total
118
128
  FROM events_log
119
129
  WHERE platform = ? AND created_at > datetime('now', '-${hours} hours')
120
130
  `).bind(platform).get();
121
131
 
122
132
  // Requisições que falharam
123
- const failedRequests = await DB.prepare(`
133
+ const failedRequests = await env.DB.prepare(`
124
134
  SELECT COUNT(*) as failed
125
135
  FROM events_log
126
136
  WHERE platform = ? AND status = 'failed' AND created_at > datetime('now', '-${hours} hours')
@@ -159,7 +169,7 @@ function evaluateErrorRate(errorRate) {
159
169
 
160
170
  ```javascript
161
171
  // Monitorar eventos processados por segundo/minuto
162
- export async function measureThroughput(hours = 24) {
172
+ export async function measureThroughput(env, hours = 24) {
163
173
  const now = new Date();
164
174
  const windows = [];
165
175
 
@@ -168,7 +178,7 @@ export async function measureThroughput(hours = 24) {
168
178
  const windowStart = new Date(now - (i + 1) * 60 * 60 * 1000);
169
179
  const windowEnd = new Date(now - i * 60 * 60 * 1000);
170
180
 
171
- const eventsInWindow = await DB.prepare(`
181
+ const eventsInWindow = await env.DB.prepare(`
172
182
  SELECT COUNT(*) as events,
173
183
  MIN(created_at) as first_event,
174
184
  MAX(created_at) as last_event
@@ -229,9 +239,9 @@ function evaluateThroughputTrend(recent, historical) {
229
239
 
230
240
  ```javascript
231
241
  // Monitorar performance do banco de dados D1
232
- export async function measureD1Performance(hours = 24) {
242
+ export async function measureD1Performance(env, hours = 24) {
233
243
  // Queries lentas
234
- const slowQueries = await DB.prepare(`
244
+ const slowQueries = await env.DB.prepare(`
235
245
  SELECT
236
246
  query_hash,
237
247
  COUNT(*) as execution_count,
@@ -246,7 +256,7 @@ export async function measureD1Performance(hours = 24) {
246
256
  `).all();
247
257
 
248
258
  // Verificar locks
249
- const locks = await DB.prepare(`
259
+ const locks = await env.DB.prepare(`
250
260
  SELECT
251
261
  COUNT(*) as total_locks,
252
262
  AVG(lock_duration_ms) as avg_lock_duration,
@@ -323,9 +333,9 @@ function evaluateD1Health(slowQueries, locks, dbSize) {
323
333
 
324
334
  ```javascript
325
335
  // Monitorar eficiência do cache KV
326
- export async function measureCachePerformance(hours = 24) {
336
+ export async function measureCachePerformance(env, hours = 24) {
327
337
  // Cache hits e misses
328
- const cacheStats = await DB.prepare(`
338
+ const cacheStats = await env.DB.prepare(`
329
339
  SELECT
330
340
  COUNT(*) FILTER (WHERE hit = 1) as hits,
331
341
  COUNT(*) FILTER (WHERE hit = 0) as misses,
@@ -340,7 +350,7 @@ export async function measureCachePerformance(hours = 24) {
340
350
  const hitRate = total > 0 ? (hits / total * 100) : 0;
341
351
 
342
352
  // Keys armazenadas
343
- const totalKeys = await KV.list().then(list => list.keys.length);
353
+ const totalKeys = await env.GEO_CACHE.list().then(list => list.keys.length);
344
354
 
345
355
  return {
346
356
  hits,
@@ -849,7 +859,7 @@ cpu_ms = 50 # Aumentar de 10ms para 50ms
849
859
  ```javascript
850
860
  // Cache de métricas globais por 1 hora
851
861
  const cacheKey = `metrics:global:${getHourBucket()}`;
852
- const cached = await KV.get(cacheKey);
862
+ const cached = await env.GEO_CACHE.get(cacheKey);
853
863
 
854
864
  if (cached) {
855
865
  return JSON.parse(cached);
@@ -857,7 +867,7 @@ if (cached) {
857
867
 
858
868
  // Cache miss — consultar D1 e persistir no KV
859
869
  const metrics = await fetchMetricsFromD1();
860
- await KV.put(cacheKey, JSON.stringify(metrics), { expirationTtl: 3600 });
870
+ await env.GEO_CACHE.put(cacheKey, JSON.stringify(metrics), { expirationTtl: 3600 });
861
871
 
862
872
  return metrics;
863
873
  ```
@@ -948,17 +958,17 @@ const RATE_LIMITS = {
948
958
  tiktok: { tokens: 10, refill_rate: 1 } // 10 req/min
949
959
  };
950
960
 
951
- async function consumeToken(platform) {
961
+ async function consumeToken(platform, env) {
952
962
  const limit = RATE_LIMITS[platform];
953
963
  const key = `rate_limit:${platform}`;
954
964
 
955
- let tokens = await KV.get(key) || JSON.stringify(limit.tokens);
965
+ let tokens = await env.GEO_CACHE.get(key) || JSON.stringify(limit.tokens);
956
966
 
957
967
  tokens = JSON.parse(tokens);
958
968
 
959
969
  if (tokens > 0) {
960
970
  tokens--;
961
- await KV.put(key, JSON.stringify(tokens));
971
+ await env.GEO_CACHE.put(key, JSON.stringify(tokens));
962
972
  return true; // Permitido
963
973
  }
964
974
 
@@ -1030,17 +1040,17 @@ const CACHE_TTL = {
1030
1040
  **Solução:**
1031
1041
  ```javascript
1032
1042
  // Invalidar cache quando dados mudarem
1033
- async function invalidateCacheOnChange(eventType) {
1043
+ async function invalidateCacheOnChange(eventType, env) {
1034
1044
  const patterns = {
1035
1045
  'lead_created': ['metrics:*', 'user_profile:*'],
1036
1046
  'purchase_completed': ['metrics:*', 'session_data:*'],
1037
1047
  'api_config_changed': ['api_config:*']
1038
1048
  };
1039
1049
 
1040
- const keysToDelete = await KV.list({ prefix: patterns[eventType] });
1050
+ const keysToDelete = await env.GEO_CACHE.list({ prefix: patterns[eventType] });
1041
1051
 
1042
1052
  for (const key of keysToDelete.keys) {
1043
- await KV.delete(key.name);
1053
+ await env.GEO_CACHE.delete(key.name);
1044
1054
  }
1045
1055
 
1046
1056
  console.log(`Invalidated ${keysToDelete.keys.length} cache keys for ${eventType}`);
@@ -8,6 +8,16 @@ version: "1.0.0"
8
8
 
9
9
  # Performance Optimization Enterprise Agent
10
10
 
11
+ > **ESCOPO DESTE AGENTE:** Otimização ativa de performance — caching, queries, batching.
12
+ > Para monitoramento passivo (métricas, alertas, dashboards), ver: **performance-agent.md**
13
+ >
14
+ > | Este agente faz | performance-agent faz |
15
+ > |---|---|
16
+ > | Estratégias de caching L1/L2/L3 | Medir latência e throughput |
17
+ > | Otimização de queries D1 e indexação | Alertas de degradação de SLA |
18
+ > | Batch processing e pipeline tuning | Health checks e dashboards |
19
+ > | Profiling de Workers e CPU optimization | Relatórios de performance |
20
+
11
21
  ## 🚀 Visão Geral
12
22
 
13
23
  Agente especializado em otimização de performance para o sistema CDP Edge (Cloudflare Workers + D1 + Queue). Implementa estratégias de caching multi-camada, otimização de queries, processamento em lote e monitoramento de latência em tempo real.
@@ -159,7 +169,7 @@ let l1Cache = new L1Cache();
159
169
  */
160
170
  class L2Cache {
161
171
  constructor(env) {
162
- this.kv = env.CACHE_KV; // Cloudflare KV namespace
172
+ this.kv = env.GEO_CACHE; // Cloudflare KV namespace
163
173
  this.stats = {
164
174
  hits: 0,
165
175
  misses: 0,
@@ -402,7 +402,7 @@ export async function checkIPBlocking(request, env) {
402
402
  const ip = request.headers.get('CF-Connecting-IP') || 'unknown';
403
403
 
404
404
  // 1. Verificar whitelist (primeiro - bypass rate limiting)
405
- const isWhitelisted = await checkIPWhitelist(ip);
405
+ const isWhitelisted = await checkIPWhitelist(ip, env);
406
406
  if (isWhitelisted) {
407
407
  return {
408
408
  allowed: true,
@@ -412,7 +412,7 @@ export async function checkIPBlocking(request, env) {
412
412
  }
413
413
 
414
414
  // 2. Verificar blacklist manual
415
- const isManuallyBlocked = await checkIPBlacklist(ip);
415
+ const isManuallyBlocked = await checkIPBlacklist(ip, env);
416
416
  if (isManuallyBlocked) {
417
417
  await logSecurityEvent({
418
418
  type: 'IP_BLACKLISTED',
@@ -430,7 +430,7 @@ export async function checkIPBlocking(request, env) {
430
430
  }
431
431
 
432
432
  // 3. Verificar geoblocking
433
- const isGeoBlocked = await checkGeoBlocking(request);
433
+ const isGeoBlocked = await checkGeoBlocking(request, env);
434
434
  if (isGeoBlocked) {
435
435
  await logSecurityEvent({
436
436
  type: 'IP_GEO_BLOCKED',
@@ -447,7 +447,7 @@ export async function checkIPBlocking(request, env) {
447
447
  }
448
448
 
449
449
  // 4. Verificar bloqueio automático (comportamento malicioso)
450
- const isAutoBlocked = await checkAutoIPBlocking(ip);
450
+ const isAutoBlocked = await checkAutoIPBlocking(ip, env);
451
451
  if (isAutoBlocked) {
452
452
  await logSecurityEvent({
453
453
  type: 'IP_AUTO_BLOCKED',
@@ -470,13 +470,13 @@ export async function checkIPBlocking(request, env) {
470
470
  }
471
471
 
472
472
  // Verificar se IP está na whitelist
473
- async function checkIPWhitelist(ip) {
473
+ async function checkIPWhitelist(ip, env) {
474
474
  if (!IP_BLOCKING_CONFIG.whitelist.enabled) {
475
475
  return false;
476
476
  }
477
477
 
478
478
  // 1. Verificar whitelist manual (IP exato)
479
- const manualWhitelist = await DB.prepare(`
479
+ const manualWhitelist = await env.DB.prepare(`
480
480
  SELECT ip, cidr_range
481
481
  FROM ip_whitelist
482
482
  WHERE ip = ?
@@ -497,8 +497,8 @@ async function checkIPWhitelist(ip) {
497
497
  }
498
498
 
499
499
  // Verificar se IP está na blacklist
500
- async function checkIPBlacklist(ip) {
501
- const blocked = await DB.prepare(`
500
+ async function checkIPBlacklist(ip, env) {
501
+ const blocked = await env.DB.prepare(`
502
502
  SELECT block_reason, blocked_at, unblocked_at, blocking_type, violation_count
503
503
  FROM ip_blacklist
504
504
  WHERE ip = ? AND unblocked_at IS NULL
@@ -508,7 +508,7 @@ async function checkIPBlacklist(ip) {
508
508
  }
509
509
 
510
510
  // Verificar geoblocking
511
- async function checkGeoBlocking(request) {
511
+ async function checkGeoBlocking(request, env) {
512
512
  if (!IP_BLOCKING_CONFIG.blacklist.geo_blocking.enabled) {
513
513
  return null;
514
514
  }
@@ -527,7 +527,7 @@ async function checkGeoBlocking(request) {
527
527
  }
528
528
 
529
529
  // Verificar bloqueio automático por comportamento
530
- async function checkAutoIPBlocking(ip) {
530
+ async function checkAutoIPBlocking(ip, env) {
531
531
  if (!IP_BLOCKING_CONFIG.blacklist.automatic.enabled) {
532
532
  return null;
533
533
  }
@@ -535,7 +535,7 @@ async function checkAutoIPBlocking(ip) {
535
535
  const config = IP_BLOCKING_CONFIG.blacklist.automatic;
536
536
 
537
537
  // 1. Verificar falhas por hora
538
- const failuresPerHour = await DB.prepare(`
538
+ const failuresPerHour = await env.DB.prepare(`
539
539
  SELECT COUNT(*) as failures
540
540
  FROM ip_violations
541
541
  WHERE ip = ?
@@ -544,7 +544,7 @@ async function checkAutoIPBlocking(ip) {
544
544
 
545
545
  if (failuresPerHour.failures >= config.threshold_failures_per_hour) {
546
546
  // Bloquear IP automaticamente
547
- await blockIPAutomatically(ip, 'EXCEEDED_FAILURES_PER_HOUR', failuresPerHour.failures);
547
+ await blockIPAutomatically(ip, 'EXCEEDED_FAILURES_PER_HOUR', failuresPerHour.failures, env);
548
548
  return {
549
549
  blocked: true,
550
550
  reason: 'EXCEEDED_FAILURES_PER_HOUR',
@@ -554,7 +554,7 @@ async function checkAutoIPBlocking(ip) {
554
554
  }
555
555
 
556
556
  // 2. Verificar falhas por dia
557
- const failuresPerDay = await DB.prepare(`
557
+ const failuresPerDay = await env.DB.prepare(`
558
558
  SELECT COUNT(*) as failures
559
559
  FROM ip_violations
560
560
  WHERE ip = ?
@@ -562,7 +562,7 @@ async function checkAutoIPBlocking(ip) {
562
562
  `).bind(ip).get();
563
563
 
564
564
  if (failuresPerDay.failures >= config.threshold_failures_per_day) {
565
- await blockIPAutomatically(ip, 'EXCEEDED_FAILURES_PER_DAY', failuresPerDay.failures);
565
+ await blockIPAutomatically(ip, 'EXCEEDED_FAILURES_PER_DAY', failuresPerDay.failures, env);
566
566
  return {
567
567
  blocked: true,
568
568
  reason: 'EXCEEDED_FAILURES_PER_DAY',
@@ -572,7 +572,7 @@ async function checkAutoIPBlocking(ip) {
572
572
  }
573
573
 
574
574
  // 3. Verificar erros 429 por hora
575
- const rateLimitErrorsPerHour = await DB.prepare(`
575
+ const rateLimitErrorsPerHour = await env.DB.prepare(`
576
576
  SELECT COUNT(*) as errors
577
577
  FROM ip_violations
578
578
  WHERE ip = ?
@@ -581,7 +581,7 @@ async function checkAutoIPBlocking(ip) {
581
581
  `).bind(ip).get();
582
582
 
583
583
  if (rateLimitErrorsPerHour.errors >= config.threshold_429_per_hour) {
584
- await blockIPAutomatically(ip, 'EXCEEDED_RATE_LIMITS_PER_HOUR', rateLimitErrorsPerHour.errors);
584
+ await blockIPAutomatically(ip, 'EXCEEDED_RATE_LIMITS_PER_HOUR', rateLimitErrorsPerHour.errors, env);
585
585
  return {
586
586
  blocked: true,
587
587
  reason: 'EXCEEDED_RATE_LIMITS_PER_HOUR',
@@ -594,10 +594,10 @@ async function checkAutoIPBlocking(ip) {
594
594
  }
595
595
 
596
596
  // Bloquear IP automaticamente
597
- async function blockIPAutomatically(ip, reason, count) {
597
+ async function blockIPAutomatically(ip, reason, count, env) {
598
598
  const now = new Date().toISOString();
599
599
 
600
- await DB.prepare(`
600
+ await env.DB.prepare(`
601
601
  INSERT OR REPLACE INTO ip_blacklist
602
602
  (ip, block_reason, blocked_at, blocking_type, violation_count, last_violation_type, last_violation_at)
603
603
  VALUES (?, ?, ?, ?, ?, ?, ?)
@@ -925,7 +925,106 @@ export function sanitizePayload(eventData, eventName) {
925
925
  }
926
926
  ```
927
927
 
928
- ### 3.3 Middleware de Validação e Sanitização
928
+ ### 3.3 CSRF Protection (Anti-Cross-Site Request Forgery)
929
+
930
+ CSRF é relevante nos **endpoints de webhook** (Hotmart, Kiwify, Ticto) onde um atacante pode forjar requisições. A proteção é HMAC-SHA256 por assinatura — cada plataforma assina o payload com um secret compartilhado.
931
+
932
+ ```javascript
933
+ /**
934
+ * Verificação CSRF via HMAC-SHA256 para webhooks de plataformas de pagamento.
935
+ * Cada plataforma tem seu próprio header e algoritmo.
936
+ *
937
+ * @param {Request} request
938
+ * @param {Object} env
939
+ * @param {string} gateway - 'hotmart' | 'kiwify' | 'ticto' | 'stripe'
940
+ * @returns {Promise<boolean>} true se assinatura válida
941
+ */
942
+ export async function validateWebhookSignature(request, env, gateway) {
943
+ const body = await request.text(); // Ler como texto para HMAC exato
944
+
945
+ switch (gateway) {
946
+ case 'hotmart': {
947
+ // Hotmart: header X-Hotmart-Hottok (token fixo, não HMAC)
948
+ const token = request.headers.get('X-Hotmart-Hottok');
949
+ return token === env.WEBHOOK_SECRET_HOTMART;
950
+ }
951
+
952
+ case 'kiwify': {
953
+ // Kiwify: query param ?signature=HMAC_SHA256(body, secret)
954
+ const url = new URL(request.url);
955
+ const receivedSig = url.searchParams.get('signature') || '';
956
+ const expectedSig = await hmacSHA256(body, env.WEBHOOK_SECRET_KIWIFY);
957
+ return timingSafeEqual(receivedSig, expectedSig);
958
+ }
959
+
960
+ case 'ticto': {
961
+ // Ticto: header X-Ticto-Signature = HMAC_SHA256(body, secret)
962
+ const receivedSig = request.headers.get('X-Ticto-Signature') || '';
963
+ const expectedSig = await hmacSHA256(body, env.WEBHOOK_SECRET_TICTO);
964
+ return timingSafeEqual(receivedSig, expectedSig);
965
+ }
966
+
967
+ case 'stripe': {
968
+ // Stripe: header Stripe-Signature = t={ts},v1={HMAC}
969
+ const sigHeader = request.headers.get('Stripe-Signature') || '';
970
+ const parts = Object.fromEntries(sigHeader.split(',').map(p => p.split('=')));
971
+ const signedPayload = `${parts.t}.${body}`;
972
+ const expectedSig = await hmacSHA256(signedPayload, env.STRIPE_WEBHOOK_SECRET);
973
+ return timingSafeEqual(parts.v1, expectedSig);
974
+ }
975
+
976
+ default:
977
+ return false; // Gateway desconhecido = rejeitar
978
+ }
979
+ }
980
+
981
+ // HMAC-SHA256 usando WebCrypto (disponível em Cloudflare Workers)
982
+ async function hmacSHA256(message, secret) {
983
+ const encoder = new TextEncoder();
984
+ const key = await crypto.subtle.importKey(
985
+ 'raw', encoder.encode(secret),
986
+ { name: 'HMAC', hash: 'SHA-256' },
987
+ false, ['sign']
988
+ );
989
+ const sig = await crypto.subtle.sign('HMAC', key, encoder.encode(message));
990
+ return Array.from(new Uint8Array(sig)).map(b => b.toString(16).padStart(2, '0')).join('');
991
+ }
992
+
993
+ // Comparação em tempo constante — previne timing attacks
994
+ function timingSafeEqual(a, b) {
995
+ if (a.length !== b.length) return false;
996
+ let diff = 0;
997
+ for (let i = 0; i < a.length; i++) {
998
+ diff |= a.charCodeAt(i) ^ b.charCodeAt(i);
999
+ }
1000
+ return diff === 0;
1001
+ }
1002
+
1003
+ /**
1004
+ * Uso no handler de webhook:
1005
+ *
1006
+ * const isValid = await validateWebhookSignature(request, env, 'hotmart');
1007
+ * if (!isValid) return new Response('Unauthorized', { status: 401 });
1008
+ *
1009
+ * REGRA: Validar assinatura ANTES de parsear o body JSON.
1010
+ * Re-clonar o request se precisar ler o body depois:
1011
+ * const clonedRequest = request.clone();
1012
+ * const valid = await validateWebhookSignature(clonedRequest, env, gateway);
1013
+ * const body = await request.json(); // original ainda disponível
1014
+ */
1015
+ ```
1016
+
1017
+ ### Checklist CSRF
1018
+
1019
+ - [ ] HMAC validado para Hotmart, Kiwify, Ticto antes de processar
1020
+ - [ ] Rejeição 401 imediata se assinatura inválida
1021
+ - [ ] Uso de `timingSafeEqual` para prevenir timing attacks
1022
+ - [ ] Body lido como texto para HMAC (não como JSON — evita parsing antes da validação)
1023
+ - [ ] Secrets via `wrangler secret put WEBHOOK_SECRET_HOTMART` etc.
1024
+
1025
+ ---
1026
+
1027
+ ### 3.4 Middleware de Validação e Sanitização
929
1028
 
930
1029
  ```javascript
931
1030
  // Middleware de segurança completo
@@ -1401,7 +1500,7 @@ const SEVERITY_LEVELS = {
1401
1500
 
1402
1501
  ```javascript
1403
1502
  // Log de evento de segurança
1404
- export async function logSecurityEvent(eventData) {
1503
+ export async function logSecurityEvent(eventData, env) {
1405
1504
  const {
1406
1505
  type,
1407
1506
  severity,
@@ -1419,7 +1518,7 @@ export async function logSecurityEvent(eventData) {
1419
1518
 
1420
1519
  const timestamp = new Date().toISOString();
1421
1520
 
1422
- await DB.prepare(`
1521
+ await env.DB.prepare(`
1423
1522
  INSERT INTO audit_logs
1424
1523
  (timestamp, ip, user_id, session_id, user_agent, event_name, event_id,
1425
1524
  log_type, severity, action, outcome, details, blocked)
@@ -1453,7 +1552,7 @@ export async function logSecurityEvent(eventData) {
1453
1552
  }
1454
1553
 
1455
1554
  // Query de audit logs
1456
- export async function queryAuditLogs(filters = {}) {
1555
+ export async function queryAuditLogs(filters = {}, env) {
1457
1556
  const {
1458
1557
  ip,
1459
1558
  user_id,
@@ -1509,7 +1608,7 @@ export async function queryAuditLogs(filters = {}) {
1509
1608
 
1510
1609
  query += ' ORDER BY timestamp DESC LIMIT ?';
1511
1610
 
1512
- const results = await DB.prepare(query).bind(...params).all();
1611
+ const results = await env.DB.prepare(query).bind(...params).all();
1513
1612
 
1514
1613
  return results;
1515
1614
  }
@@ -1539,7 +1638,7 @@ export async function getRateLimitStatus(request, env) {
1539
1638
  refill_rate: rateLimiters.event.get('global').refillRate
1540
1639
  }
1541
1640
  },
1542
- recent_violations: await DB.prepare(`
1641
+ recent_violations: await env.DB.prepare(`
1543
1642
  SELECT
1544
1643
  log_type,
1545
1644
  severity,
@@ -1566,9 +1665,9 @@ export async function getIPStatus(request, env) {
1566
1665
  const ip = request.headers.get('CF-Connecting-IP') || 'unknown';
1567
1666
 
1568
1667
  // Verificar status do IP
1569
- const blacklist = await checkIPBlacklist(ip);
1570
- const whitelist = await checkIPWhitelist(ip);
1571
- const geoBlock = await checkGeoBlocking(request);
1668
+ const blacklist = await checkIPBlacklist(ip, env);
1669
+ const whitelist = await checkIPWhitelist(ip, env);
1670
+ const geoBlock = await checkGeoBlocking(request, env);
1572
1671
 
1573
1672
  const status = {
1574
1673
  ip,
@@ -1577,7 +1676,7 @@ export async function getIPStatus(request, env) {
1577
1676
  blacklist_reason: blacklist ? blacklist.block_reason : null,
1578
1677
  is_geo_blocked: !!geoBlock,
1579
1678
  geo_details: geoBlock || null,
1580
- recent_violations: await DB.prepare(`
1679
+ recent_violations: await env.DB.prepare(`
1581
1680
  SELECT
1582
1681
  COUNT(*) as violations,
1583
1682
  MAX(violation_count) as max_violation_count
@@ -1699,6 +1798,16 @@ export const SEVERITY_LEVELS = { ... };
1699
1798
  - [ ] CIDR ranges implementados
1700
1799
  - [ ] Auto-unblock implementado
1701
1800
 
1801
+ ### CSRF Protection (Webhooks)
1802
+
1803
+ - [ ] HMAC-SHA256 validado para Hotmart
1804
+ - [ ] HMAC-SHA256 validado para Kiwify
1805
+ - [ ] HMAC-SHA256 validado para Ticto
1806
+ - [ ] HMAC-SHA256 validado para Stripe
1807
+ - [ ] `timingSafeEqual` implementado (sem timing attacks)
1808
+ - [ ] Body lido como text antes do JSON.parse para validação HMAC
1809
+ - [ ] Secrets via `wrangler secret put` (nunca hardcode)
1810
+
1702
1811
  ### Input Validation
1703
1812
 
1704
1813
  - [ ] Joi schemas criados (Lead, Purchase, Contact)
@@ -89,11 +89,10 @@ UMBRELLA_DOMAIN = "dominio.com"
89
89
  # META_ACCESS_TOKEN ← obrigatório
90
90
  # GA4_API_SECRET ← obrigatório
91
91
  # TIKTOK_ACCESS_TOKEN ← opcional
92
- # WA_ACCESS_TOKEN ← WhatsApp notificações ao dono
93
- # WA_PHONE_ID ← WhatsApp notificações ao dono
94
- # WHATSAPP_TOKEN WhatsApp Cloud API (CTWA webhook)
95
- # WHATSAPP_PHONE_NUMBER_ID WhatsApp Cloud API (CTWA webhook)
96
- # WA_WEBHOOK_VERIFY_TOKEN ← gerado pelo agente (crypto.randomUUID)
92
+ # WHATSAPP_ACCESS_TOKEN ← WhatsApp Cloud API — token de acesso permanente
93
+ # WHATSAPP_PHONE_NUMBER_ID ← WhatsApp Cloud API — Phone Number ID (ex: 123456789012345)
94
+ # WA_NOTIFY_NUMBER Número do dono para receber notificações (ex: 5511999998888)
95
+ # WA_WEBHOOK_VERIFY_TOKEN Token de verificação do webhook CTWA (gerado via crypto.randomUUID)
97
96
  # PINTEREST_ACCESS_TOKEN ← ativar Pinterest CAPI v5
98
97
  # PINTEREST_AD_ACCOUNT_ID ← ativar Pinterest CAPI v5
99
98
  # REDDIT_ACCESS_TOKEN ← ativar Reddit CAPI v2.0
@@ -1050,7 +1049,7 @@ Timestamp: ${new Date().toISOString()}
1050
1049
  `.trim();
1051
1050
 
1052
1051
  // Verificar se há token do WhatsApp configurado
1053
- const waPhoneId = env.WA_PHONE_ID;
1052
+ const waPhoneId = env.WHATSAPP_PHONE_NUMBER_ID;
1054
1053
  const adminNumber = env.ADMIN_PHONE_NUMBER;
1055
1054
 
1056
1055
  if (waPhoneId && adminNumber) {
@@ -1058,7 +1057,7 @@ Timestamp: ${new Date().toISOString()}
1058
1057
  method: 'POST',
1059
1058
  headers: {
1060
1059
  'Content-Type': 'application/json',
1061
- 'Authorization': `Bearer ${env.WA_ACCESS_TOKEN}`
1060
+ 'Authorization': `Bearer ${env.WHATSAPP_ACCESS_TOKEN}`
1062
1061
  },
1063
1062
  body: JSON.stringify({
1064
1063
  messaging_product: 'whatsapp',
@@ -1145,7 +1144,7 @@ export async function queue(batch, env) {
1145
1144
  - Plataformas selecionadas na FASE 0-B (Meta, Google, TikTok, etc.)
1146
1145
  - `UMBRELLA_DOMAIN` — domínio principal do funil (detectado automaticamente ou fornecido pelo usuário)
1147
1146
  - Secrets de plataformas: `META_ACCESS_TOKEN`, `GA4_API_SECRET`, `TIKTOK_ACCESS_TOKEN`
1148
- - Secrets opcionais: `RESEND_API_KEY`, `WA_ACCESS_TOKEN`, `WA_PHONE_ID`
1147
+ - Secrets opcionais: `RESEND_API_KEY`, `WHATSAPP_ACCESS_TOKEN`, `WHATSAPP_PHONE_NUMBER_ID`
1149
1148
 
1150
1149
  ## RESPONSABILIDADE
1151
1150
 
@@ -73,6 +73,69 @@ Gere payloads para o Worker seguir a API oficial:
73
73
 
74
74
  ---
75
75
 
76
+ ## ⏱️ RATE LIMITS — TikTok Events API v1.3
77
+
78
+ Conforme `contracts/api-versions.json`, a TikTok Events API tem limites estritos:
79
+
80
+ | Limite | Valor | Ação se excedido |
81
+ |--------|-------|-----------------|
82
+ | Requisições por minuto (por pixel) | 10 req/min | Implementar throttling |
83
+ | Eventos por batch | 5 events/batch | Agrupar eventos em batches |
84
+ | Retries máximos | 3 tentativas | Backoff exponencial |
85
+
86
+ ### Implementação de Throttling no Worker
87
+
88
+ ```javascript
89
+ // Rate limit KV key: 'tiktok_rate_{pixel_id}_{minute}'
90
+ async function dispatchTikTokWithRateLimit(env, events, pixelId, accessToken) {
91
+ const now = new Date();
92
+ const minuteKey = `tiktok_rate_${pixelId}_${now.getUTCFullYear()}${now.getUTCMonth()}${now.getUTCDate()}${now.getUTCHours()}${now.getUTCMinutes()}`;
93
+
94
+ // Verificar rate limit no KV
95
+ const currentCount = parseInt(await env.GEO_CACHE.get(minuteKey) || '0');
96
+
97
+ if (currentCount >= 10) {
98
+ // Rate limit atingido — encaminhar para RETRY_QUEUE
99
+ await env.RETRY_QUEUE.send({ platform: 'tiktok', events, pixelId });
100
+ return { queued: true, reason: 'rate_limit' };
101
+ }
102
+
103
+ // Agrupar eventos em batches de 5
104
+ const batches = [];
105
+ for (let i = 0; i < events.length; i += 5) {
106
+ batches.push(events.slice(i, i + 5));
107
+ }
108
+
109
+ const results = [];
110
+ for (const batch of batches) {
111
+ const result = await fetch('https://business-api.tiktok.com/open_api/v1.3/event/track/', {
112
+ method: 'POST',
113
+ headers: {
114
+ 'Content-Type': 'application/json',
115
+ 'Access-Token': accessToken
116
+ },
117
+ body: JSON.stringify({
118
+ pixel_code: pixelId,
119
+ event_source: 'web',
120
+ event_source_id: pixelId,
121
+ data: batch
122
+ })
123
+ });
124
+
125
+ // Incrementar contador no KV (TTL de 60s = 1 minuto)
126
+ await env.GEO_CACHE.put(minuteKey, String(currentCount + 1), { expirationTtl: 60 });
127
+
128
+ results.push(result);
129
+ }
130
+
131
+ return { sent: results.length, batches: batches.length };
132
+ }
133
+ ```
134
+
135
+ > **Regra:** Se `HTTP 429` for recebido da TikTok API, encaminhar eventos para `RETRY_QUEUE` com backoff de 1min, 2min, 4min (máximo 3 tentativas).
136
+
137
+ ---
138
+
76
139
  ## INPUTS RECEBIDOS
77
140
 
78
141
  - JSON do Page Analyzer Agent (eventos mapeados, seletores, tipo de página)