create-vellaveto 4.0.4 → 4.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/generators/toml.js +6 -7
- package/package.json +1 -1
package/dist/generators/toml.js
CHANGED
|
@@ -148,7 +148,7 @@ function generateStrictPreset() {
|
|
|
148
148
|
toml += 'function_pattern = "*"\n\n';
|
|
149
149
|
toml += "[policies.path_rules]\n";
|
|
150
150
|
toml +=
|
|
151
|
-
'
|
|
151
|
+
'blocked = ["**/.env", "**/*.key", "**/*.pem", "**/credentials*", "**/.ssh/**", "**/.aws/**"]\n\n';
|
|
152
152
|
// Block exfiltration
|
|
153
153
|
toml += "[[policies]]\n";
|
|
154
154
|
toml += 'id = "block-exfiltration"\n';
|
|
@@ -168,8 +168,7 @@ function generateStrictPreset() {
|
|
|
168
168
|
toml += "priority = 50\n";
|
|
169
169
|
toml += 'tool_pattern = "*"\n';
|
|
170
170
|
toml += 'function_pattern = "*"\n\n';
|
|
171
|
-
|
|
172
|
-
toml += 'write_patterns = ["**/*"]\n\n';
|
|
171
|
+
// No path_rules needed — tool_pattern/function_pattern already match all
|
|
173
172
|
return toml;
|
|
174
173
|
}
|
|
175
174
|
function generateBalancedPreset() {
|
|
@@ -194,14 +193,14 @@ function generateBalancedPreset() {
|
|
|
194
193
|
toml += 'function_pattern = "*"\n\n';
|
|
195
194
|
toml += "[policies.path_rules]\n";
|
|
196
195
|
toml +=
|
|
197
|
-
'
|
|
196
|
+
'blocked = ["**/.env", "**/*.key", "**/*.pem", "**/credentials*", "**/.ssh/**", "**/.aws/**"]\n\n';
|
|
198
197
|
// Allow reads
|
|
199
198
|
toml += "[[policies]]\n";
|
|
200
199
|
toml += 'id = "allow-reads"\n';
|
|
201
200
|
toml += 'name = "Allow file reads"\n';
|
|
202
201
|
toml += 'policy_type = "Allow"\n';
|
|
203
202
|
toml += "priority = 50\n";
|
|
204
|
-
toml += '
|
|
203
|
+
toml += 'tool_pattern = "*"\n';
|
|
205
204
|
toml += 'function_pattern = "read*"\n\n';
|
|
206
205
|
// Require approval for writes
|
|
207
206
|
toml += "[[policies]]\n";
|
|
@@ -209,7 +208,7 @@ function generateBalancedPreset() {
|
|
|
209
208
|
toml += 'name = "Require approval for file writes"\n';
|
|
210
209
|
toml += 'policy_type = "RequireApproval"\n';
|
|
211
210
|
toml += "priority = 50\n";
|
|
212
|
-
toml += '
|
|
211
|
+
toml += 'tool_pattern = "*"\n';
|
|
213
212
|
toml += 'function_pattern = "write*"\n\n';
|
|
214
213
|
return toml;
|
|
215
214
|
}
|
|
@@ -235,7 +234,7 @@ function generatePermissivePreset() {
|
|
|
235
234
|
toml += 'function_pattern = "*"\n\n';
|
|
236
235
|
toml += "[policies.path_rules]\n";
|
|
237
236
|
toml +=
|
|
238
|
-
'
|
|
237
|
+
'blocked = ["**/.env", "**/*.key", "**/*.pem", "**/credentials*", "**/.ssh/**", "**/.aws/**"]\n\n';
|
|
239
238
|
// Block exfiltration
|
|
240
239
|
toml += "[[policies]]\n";
|
|
241
240
|
toml += 'id = "block-exfiltration"\n';
|