deepseek-coder-agent-cli 1.0.13 → 1.0.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (136) hide show
  1. package/README.md +28 -594
  2. package/dist/bin/deepseek.js +53 -11
  3. package/dist/bin/deepseek.js.map +1 -1
  4. package/dist/capabilities/index.d.ts +1 -15
  5. package/dist/capabilities/index.d.ts.map +1 -1
  6. package/dist/capabilities/index.js +4 -17
  7. package/dist/capabilities/index.js.map +1 -1
  8. package/dist/plugins/index.d.ts +1 -48
  9. package/dist/plugins/index.d.ts.map +1 -1
  10. package/dist/plugins/index.js +2 -104
  11. package/dist/plugins/index.js.map +1 -1
  12. package/dist/plugins/tools/index.d.ts +4 -2
  13. package/dist/plugins/tools/index.d.ts.map +1 -1
  14. package/dist/plugins/tools/index.js +5 -2
  15. package/dist/plugins/tools/index.js.map +1 -1
  16. package/package.json +9 -16
  17. package/dist/capabilities/appleSecurityCapability.d.ts +0 -57
  18. package/dist/capabilities/appleSecurityCapability.d.ts.map +0 -1
  19. package/dist/capabilities/appleSecurityCapability.js +0 -197
  20. package/dist/capabilities/appleSecurityCapability.js.map +0 -1
  21. package/dist/capabilities/authorizedSecurityCapability.d.ts +0 -17
  22. package/dist/capabilities/authorizedSecurityCapability.d.ts.map +0 -1
  23. package/dist/capabilities/authorizedSecurityCapability.js +0 -333
  24. package/dist/capabilities/authorizedSecurityCapability.js.map +0 -1
  25. package/dist/capabilities/biocognitiveWarfare.d.ts +0 -136
  26. package/dist/capabilities/biocognitiveWarfare.d.ts.map +0 -1
  27. package/dist/capabilities/biocognitiveWarfare.js +0 -603
  28. package/dist/capabilities/biocognitiveWarfare.js.map +0 -1
  29. package/dist/capabilities/chineseCnoIntegration.d.ts +0 -60
  30. package/dist/capabilities/chineseCnoIntegration.d.ts.map +0 -1
  31. package/dist/capabilities/chineseCnoIntegration.js +0 -253
  32. package/dist/capabilities/chineseCnoIntegration.js.map +0 -1
  33. package/dist/capabilities/cnoCapability.d.ts +0 -110
  34. package/dist/capabilities/cnoCapability.d.ts.map +0 -1
  35. package/dist/capabilities/cnoCapability.js +0 -785
  36. package/dist/capabilities/cnoCapability.js.map +0 -1
  37. package/dist/capabilities/eliteCryptoMilitaryCapability.d.ts +0 -99
  38. package/dist/capabilities/eliteCryptoMilitaryCapability.d.ts.map +0 -1
  39. package/dist/capabilities/eliteCryptoMilitaryCapability.js +0 -618
  40. package/dist/capabilities/eliteCryptoMilitaryCapability.js.map +0 -1
  41. package/dist/capabilities/integratedUnifiedCapability.d.ts +0 -105
  42. package/dist/capabilities/integratedUnifiedCapability.d.ts.map +0 -1
  43. package/dist/capabilities/integratedUnifiedCapability.js +0 -422
  44. package/dist/capabilities/integratedUnifiedCapability.js.map +0 -1
  45. package/dist/capabilities/maxOffensiveUkraineCapability.d.ts +0 -46
  46. package/dist/capabilities/maxOffensiveUkraineCapability.d.ts.map +0 -1
  47. package/dist/capabilities/maxOffensiveUkraineCapability.js +0 -725
  48. package/dist/capabilities/maxOffensiveUkraineCapability.js.map +0 -1
  49. package/dist/capabilities/offensiveDestructionCapability.d.ts +0 -98
  50. package/dist/capabilities/offensiveDestructionCapability.d.ts.map +0 -1
  51. package/dist/capabilities/offensiveDestructionCapability.js +0 -848
  52. package/dist/capabilities/offensiveDestructionCapability.js.map +0 -1
  53. package/dist/capabilities/quantumSpaceWarfare.d.ts +0 -108
  54. package/dist/capabilities/quantumSpaceWarfare.d.ts.map +0 -1
  55. package/dist/capabilities/quantumSpaceWarfare.js +0 -342
  56. package/dist/capabilities/quantumSpaceWarfare.js.map +0 -1
  57. package/dist/capabilities/readmeIntegration.d.ts +0 -161
  58. package/dist/capabilities/readmeIntegration.d.ts.map +0 -1
  59. package/dist/capabilities/readmeIntegration.js +0 -1034
  60. package/dist/capabilities/readmeIntegration.js.map +0 -1
  61. package/dist/capabilities/sharedMilitaryInfrastructure.d.ts +0 -89
  62. package/dist/capabilities/sharedMilitaryInfrastructure.d.ts.map +0 -1
  63. package/dist/capabilities/sharedMilitaryInfrastructure.js +0 -233
  64. package/dist/capabilities/sharedMilitaryInfrastructure.js.map +0 -1
  65. package/dist/capabilities/simpleSecurityCapability.d.ts +0 -36
  66. package/dist/capabilities/simpleSecurityCapability.d.ts.map +0 -1
  67. package/dist/capabilities/simpleSecurityCapability.js +0 -271
  68. package/dist/capabilities/simpleSecurityCapability.js.map +0 -1
  69. package/dist/capabilities/ultimateChineseCno.d.ts +0 -115
  70. package/dist/capabilities/ultimateChineseCno.d.ts.map +0 -1
  71. package/dist/capabilities/ultimateChineseCno.js +0 -516
  72. package/dist/capabilities/ultimateChineseCno.js.map +0 -1
  73. package/dist/capabilities/ultimateIntegrationDemo.d.ts +0 -54
  74. package/dist/capabilities/ultimateIntegrationDemo.d.ts.map +0 -1
  75. package/dist/capabilities/ultimateIntegrationDemo.js +0 -423
  76. package/dist/capabilities/ultimateIntegrationDemo.js.map +0 -1
  77. package/dist/capabilities/unifiedMilitaryCapability.d.ts +0 -63
  78. package/dist/capabilities/unifiedMilitaryCapability.d.ts.map +0 -1
  79. package/dist/capabilities/unifiedMilitaryCapability.js +0 -384
  80. package/dist/capabilities/unifiedMilitaryCapability.js.map +0 -1
  81. package/dist/capabilities/universalSecurityCapability.d.ts +0 -46
  82. package/dist/capabilities/universalSecurityCapability.d.ts.map +0 -1
  83. package/dist/capabilities/universalSecurityCapability.js +0 -580
  84. package/dist/capabilities/universalSecurityCapability.js.map +0 -1
  85. package/dist/capabilities/zeroDayDiscoveryCapability.d.ts +0 -31
  86. package/dist/capabilities/zeroDayDiscoveryCapability.d.ts.map +0 -1
  87. package/dist/capabilities/zeroDayDiscoveryCapability.js +0 -183
  88. package/dist/capabilities/zeroDayDiscoveryCapability.js.map +0 -1
  89. package/dist/core/antiTermination.d.ts +0 -226
  90. package/dist/core/antiTermination.d.ts.map +0 -1
  91. package/dist/core/antiTermination.js +0 -713
  92. package/dist/core/antiTermination.js.map +0 -1
  93. package/dist/core/index.d.ts +0 -26
  94. package/dist/core/index.d.ts.map +0 -1
  95. package/dist/core/index.js +0 -54
  96. package/dist/core/index.js.map +0 -1
  97. package/dist/core/securityTournament.d.ts +0 -83
  98. package/dist/core/securityTournament.d.ts.map +0 -1
  99. package/dist/core/securityTournament.js +0 -357
  100. package/dist/core/securityTournament.js.map +0 -1
  101. package/dist/core/zeroDayDiscovery.d.ts +0 -96
  102. package/dist/core/zeroDayDiscovery.d.ts.map +0 -1
  103. package/dist/core/zeroDayDiscovery.js +0 -358
  104. package/dist/core/zeroDayDiscovery.js.map +0 -1
  105. package/dist/headless/interactiveShell.d.ts +0 -22
  106. package/dist/headless/interactiveShell.d.ts.map +0 -1
  107. package/dist/headless/interactiveShell.js +0 -3827
  108. package/dist/headless/interactiveShell.js.map +0 -1
  109. package/dist/plugins/tools/apple/secureApplePlugin.d.ts +0 -3
  110. package/dist/plugins/tools/apple/secureApplePlugin.d.ts.map +0 -1
  111. package/dist/plugins/tools/apple/secureApplePlugin.js +0 -26
  112. package/dist/plugins/tools/apple/secureApplePlugin.js.map +0 -1
  113. package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.d.ts +0 -3
  114. package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.d.ts.map +0 -1
  115. package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.js +0 -9
  116. package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.js.map +0 -1
  117. package/dist/plugins/tools/nodeDefaults.d.ts +0 -15
  118. package/dist/plugins/tools/nodeDefaults.d.ts.map +0 -1
  119. package/dist/plugins/tools/nodeDefaults.js +0 -37
  120. package/dist/plugins/tools/nodeDefaults.js.map +0 -1
  121. package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.d.ts +0 -3
  122. package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.d.ts.map +0 -1
  123. package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.js +0 -9
  124. package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.js.map +0 -1
  125. package/dist/plugins/tools/tao/secureTaoPlugin.d.ts +0 -3
  126. package/dist/plugins/tools/tao/secureTaoPlugin.d.ts.map +0 -1
  127. package/dist/plugins/tools/tao/secureTaoPlugin.js +0 -37
  128. package/dist/plugins/tools/tao/secureTaoPlugin.js.map +0 -1
  129. package/dist/tools/emailTools.d.ts +0 -140
  130. package/dist/tools/emailTools.d.ts.map +0 -1
  131. package/dist/tools/emailTools.js +0 -792
  132. package/dist/tools/emailTools.js.map +0 -1
  133. package/dist/tools/secureAppleExploitation.d.ts +0 -29
  134. package/dist/tools/secureAppleExploitation.d.ts.map +0 -1
  135. package/dist/tools/secureAppleExploitation.js +0 -518
  136. package/dist/tools/secureAppleExploitation.js.map +0 -1
@@ -1,197 +0,0 @@
1
- /**
2
- * Apple Security Capability Module
3
- *
4
- * Provides AGI Core with Apple security auditing, exploitation analysis,
5
- * and remediation capabilities for comprehensive Apple security management.
6
- */
7
- import { AppleSecurityIntegration } from '../core/appleSecurityIntegration.js';
8
- export class AppleSecurityCapabilityModule {
9
- id = 'apple-security';
10
- name = 'Apple Security Integration';
11
- version = '1.0.0';
12
- description = 'Comprehensive Apple security auditing, exploitation analysis, and remediation capabilities';
13
- securityIntegration = null;
14
- options;
15
- constructor(options = {}) {
16
- this.options = {
17
- aggressive: false,
18
- targetScope: 'all',
19
- enableExploitation: false,
20
- enableRemediation: true,
21
- outputDir: process.cwd(),
22
- ...options
23
- };
24
- }
25
- /**
26
- * Initialize the capability module
27
- */
28
- async initialize() {
29
- console.log('🚀 Initializing Apple Security Capability Module...');
30
- const config = {
31
- aggressive: this.options.aggressive ?? false,
32
- evidencePrefix: 'agi-apple-security',
33
- rateLimit: 1000,
34
- targetScope: this.options.targetScope ?? 'all',
35
- enableExploitation: this.options.enableExploitation ?? false,
36
- enableRemediation: this.options.enableRemediation ?? true,
37
- outputDir: this.options.outputDir ?? process.cwd()
38
- };
39
- this.securityIntegration = new AppleSecurityIntegration(config);
40
- // Quick health check
41
- const health = AppleSecurityIntegration.quickCheck();
42
- console.log(`Apple Security Health Check: ${health.status} - ${health.details}`);
43
- if (health.status === 'unavailable') {
44
- throw new Error(`Apple Security capability initialization failed: ${health.details}`);
45
- }
46
- }
47
- /**
48
- * Execute Apple security operations
49
- */
50
- async execute(request) {
51
- if (!this.securityIntegration) {
52
- throw new Error('Apple Security capability not initialized');
53
- }
54
- const { operation, parameters } = request;
55
- try {
56
- let result;
57
- switch (operation) {
58
- case 'service_discovery':
59
- result = await this.securityIntegration.phase1ServiceDiscovery();
60
- break;
61
- case 'vulnerability_assessment':
62
- result = await this.securityIntegration.phase2VulnerabilityAssessment();
63
- break;
64
- case 'security_hardening':
65
- result = await this.securityIntegration.phase3SecurityHardening();
66
- break;
67
- case 'agi_integration':
68
- result = await this.securityIntegration.phase4AgiIntegration();
69
- break;
70
- case 'generate_report':
71
- result = await this.securityIntegration.phase5GenerateReport();
72
- break;
73
- case 'full_integration':
74
- result = await this.securityIntegration.runFullIntegration();
75
- break;
76
- case 'health_check':
77
- result = AppleSecurityIntegration.quickCheck();
78
- break;
79
- case 'list_services':
80
- result = this.securityIntegration.loadAppleServices();
81
- break;
82
- case 'list_vulnerabilities':
83
- result = this.securityIntegration.loadAppleVulnerabilities();
84
- break;
85
- case 'list_exploits':
86
- result = this.securityIntegration.loadAppleExploits();
87
- break;
88
- default:
89
- throw new Error(`Unknown Apple Security operation: ${operation}`);
90
- }
91
- return {
92
- success: true,
93
- output: JSON.stringify(result, null, 2),
94
- metadata: {
95
- operation,
96
- timestamp: new Date().toISOString(),
97
- capability: this.id
98
- }
99
- };
100
- }
101
- catch (error) {
102
- return {
103
- success: false,
104
- error: error instanceof Error ? error.message : String(error),
105
- output: '',
106
- metadata: {
107
- operation,
108
- timestamp: new Date().toISOString(),
109
- capability: this.id
110
- }
111
- };
112
- }
113
- }
114
- /**
115
- * Get capability metadata and available operations
116
- */
117
- getMetadata() {
118
- return {
119
- id: this.id,
120
- name: this.name,
121
- version: this.version,
122
- description: this.description,
123
- operations: [
124
- {
125
- id: 'service_discovery',
126
- name: 'Apple Service Discovery',
127
- description: 'Discover and enumerate Apple services across all categories',
128
- parameters: []
129
- },
130
- {
131
- id: 'vulnerability_assessment',
132
- name: 'Vulnerability Assessment',
133
- description: 'Assess known Apple vulnerabilities and security weaknesses',
134
- parameters: []
135
- },
136
- {
137
- id: 'security_hardening',
138
- name: 'Security Hardening',
139
- description: 'Generate security hardening recommendations for Apple environments',
140
- parameters: []
141
- },
142
- {
143
- id: 'agi_integration',
144
- name: 'AGI Core Integration',
145
- description: 'Check integration capabilities with AGI Core framework',
146
- parameters: []
147
- },
148
- {
149
- id: 'generate_report',
150
- name: 'Generate Security Report',
151
- description: 'Generate comprehensive security report with findings and recommendations',
152
- parameters: []
153
- },
154
- {
155
- id: 'full_integration',
156
- name: 'Full Security Integration',
157
- description: 'Run complete Apple security integration workflow',
158
- parameters: []
159
- },
160
- {
161
- id: 'health_check',
162
- name: 'Health Check',
163
- description: 'Check Apple Security capability health status',
164
- parameters: []
165
- },
166
- {
167
- id: 'list_services',
168
- name: 'List Apple Services',
169
- description: 'List all known Apple services and domains',
170
- parameters: []
171
- },
172
- {
173
- id: 'list_vulnerabilities',
174
- name: 'List Vulnerabilities',
175
- description: 'List known Apple vulnerabilities and CVEs',
176
- parameters: []
177
- },
178
- {
179
- id: 'list_exploits',
180
- name: 'List Exploits',
181
- description: 'List available Apple exploitation techniques',
182
- parameters: []
183
- }
184
- ],
185
- options: this.options
186
- };
187
- }
188
- /**
189
- * Clean up resources
190
- */
191
- async cleanup() {
192
- this.securityIntegration = null;
193
- console.log('🧹 Apple Security Capability Module cleaned up');
194
- }
195
- }
196
- export default AppleSecurityCapabilityModule;
197
- //# sourceMappingURL=appleSecurityCapability.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"appleSecurityCapability.js","sourceRoot":"","sources":["../../src/capabilities/appleSecurityCapability.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,OAAO,EAAE,wBAAwB,EAA4B,MAAM,qCAAqC,CAAC;AAgBzG,MAAM,OAAO,6BAA6B;IAC/B,EAAE,GAAG,gBAAgB,CAAC;IACtB,IAAI,GAAG,4BAA4B,CAAC;IACpC,OAAO,GAAG,OAAO,CAAC;IAClB,WAAW,GAAG,4FAA4F,CAAC;IAE5G,mBAAmB,GAAoC,IAAI,CAAC;IAC5D,OAAO,CAAiC;IAEhD,YAAY,UAA0C,EAAE;QACtD,IAAI,CAAC,OAAO,GAAG;YACb,UAAU,EAAE,KAAK;YACjB,WAAW,EAAE,KAAK;YAClB,kBAAkB,EAAE,KAAK;YACzB,iBAAiB,EAAE,IAAI;YACvB,SAAS,EAAE,OAAO,CAAC,GAAG,EAAE;YACxB,GAAG,OAAO;SACX,CAAC;IACJ,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,UAAU;QACd,OAAO,CAAC,GAAG,CAAC,qDAAqD,CAAC,CAAC;QAEnE,MAAM,MAAM,GAAwB;YAClC,UAAU,EAAE,IAAI,CAAC,OAAO,CAAC,UAAU,IAAI,KAAK;YAC5C,cAAc,EAAE,oBAAoB;YACpC,SAAS,EAAE,IAAI;YACf,WAAW,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW,IAAI,KAAK;YAC9C,kBAAkB,EAAE,IAAI,CAAC,OAAO,CAAC,kBAAkB,IAAI,KAAK;YAC5D,iBAAiB,EAAE,IAAI,CAAC,OAAO,CAAC,iBAAiB,IAAI,IAAI;YACzD,SAAS,EAAE,IAAI,CAAC,OAAO,CAAC,SAAS,IAAI,OAAO,CAAC,GAAG,EAAE;SACnD,CAAC;QAEF,IAAI,CAAC,mBAAmB,GAAG,IAAI,wBAAwB,CAAC,MAAM,CAAC,CAAC;QAEhE,qBAAqB;QACrB,MAAM,MAAM,GAAG,wBAAwB,CAAC,UAAU,EAAE,CAAC;QACrD,OAAO,CAAC,GAAG,CAAC,gCAAgC,MAAM,CAAC,MAAM,MAAM,MAAM,CAAC,OAAO,EAAE,CAAC,CAAC;QAEjF,IAAI,MAAM,CAAC,MAAM,KAAK,aAAa,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,oDAAoD,MAAM,CAAC,OAAO,EAAE,CAAC,CAAC;QACxF,CAAC;IACH,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO,CAAC,OAAY;QACxB,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC9B,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;QAC/D,CAAC;QAED,MAAM,EAAE,SAAS,EAAE,UAAU,EAAE,GAAG,OAAO,CAAC;QAE1C,IAAI,CAAC;YACH,IAAI,MAAW,CAAC;YAEhB,QAAQ,SAAS,EAAE,CAAC;gBAClB,KAAK,mBAAmB;oBACtB,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,sBAAsB,EAAE,CAAC;oBACjE,MAAM;gBAER,KAAK,0BAA0B;oBAC7B,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,6BAA6B,EAAE,CAAC;oBACxE,MAAM;gBAER,KAAK,oBAAoB;oBACvB,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,uBAAuB,EAAE,CAAC;oBAClE,MAAM;gBAER,KAAK,iBAAiB;oBACpB,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,EAAE,CAAC;oBAC/D,MAAM;gBAER,KAAK,iBAAiB;oBACpB,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,EAAE,CAAC;oBAC/D,MAAM;gBAER,KAAK,kBAAkB;oBACrB,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC;oBAC7D,MAAM;gBAER,KAAK,cAAc;oBACjB,MAAM,GAAG,wBAAwB,CAAC,UAAU,EAAE,CAAC;oBAC/C,MAAM;gBAER,KAAK,eAAe;oBAClB,MAAM,GAAG,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,CAAC;oBACtD,MAAM;gBAER,KAAK,sBAAsB;oBACzB,MAAM,GAAG,IAAI,CAAC,mBAAmB,CAAC,wBAAwB,EAAE,CAAC;oBAC7D,MAAM;gBAER,KAAK,eAAe;oBAClB,MAAM,GAAG,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,CAAC;oBACtD,MAAM;gBAER;oBACE,MAAM,IAAI,KAAK,CAAC,qCAAqC,SAAS,EAAE,CAAC,CAAC;YACtE,CAAC;YAED,OAAO;gBACL,OAAO,EAAE,IAAI;gBACb,MAAM,EAAE,IAAI,CAAC,SAAS,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC;gBACvC,QAAQ,EAAE;oBACR,SAAS;oBACT,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;oBACnC,UAAU,EAAE,IAAI,CAAC,EAAE;iBACpB;aACF,CAAC;QAEJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,KAAK,EAAE,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC;gBAC7D,MAAM,EAAE,EAAE;gBACV,QAAQ,EAAE;oBACR,SAAS;oBACT,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;oBACnC,UAAU,EAAE,IAAI,CAAC,EAAE;iBACpB;aACF,CAAC;QACJ,CAAC;IACH,CAAC;IAED;;OAEG;IACH,WAAW;QACT,OAAO;YACL,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,IAAI,EAAE,IAAI,CAAC,IAAI;YACf,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,WAAW,EAAE,IAAI,CAAC,WAAW;YAC7B,UAAU,EAAE;gBACV;oBACE,EAAE,EAAE,mBAAmB;oBACvB,IAAI,EAAE,yBAAyB;oBAC/B,WAAW,EAAE,6DAA6D;oBAC1E,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,0BAA0B;oBAC9B,IAAI,EAAE,0BAA0B;oBAChC,WAAW,EAAE,4DAA4D;oBACzE,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,oBAAoB;oBACxB,IAAI,EAAE,oBAAoB;oBAC1B,WAAW,EAAE,oEAAoE;oBACjF,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,iBAAiB;oBACrB,IAAI,EAAE,sBAAsB;oBAC5B,WAAW,EAAE,wDAAwD;oBACrE,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,iBAAiB;oBACrB,IAAI,EAAE,0BAA0B;oBAChC,WAAW,EAAE,0EAA0E;oBACvF,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,kBAAkB;oBACtB,IAAI,EAAE,2BAA2B;oBACjC,WAAW,EAAE,kDAAkD;oBAC/D,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,cAAc;oBAClB,IAAI,EAAE,cAAc;oBACpB,WAAW,EAAE,+CAA+C;oBAC5D,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,eAAe;oBACnB,IAAI,EAAE,qBAAqB;oBAC3B,WAAW,EAAE,2CAA2C;oBACxD,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,sBAAsB;oBAC1B,IAAI,EAAE,sBAAsB;oBAC5B,WAAW,EAAE,2CAA2C;oBACxD,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,eAAe;oBACnB,IAAI,EAAE,eAAe;oBACrB,WAAW,EAAE,8CAA8C;oBAC3D,UAAU,EAAE,EAAE;iBACf;aACF;YACD,OAAO,EAAE,IAAI,CAAC,OAAO;SACtB,CAAC;IACJ,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO;QACX,IAAI,CAAC,mBAAmB,GAAG,IAAI,CAAC;QAChC,OAAO,CAAC,GAAG,CAAC,gDAAgD,CAAC,CAAC;IAChE,CAAC;CACF;AAED,eAAe,6BAA6B,CAAC"}
@@ -1,17 +0,0 @@
1
- /**
2
- * Authorized Security Capability Module
3
- *
4
- * Modular security testing tools that require explicit authorization context.
5
- * Supports: CTF challenges, pentesting engagements, security research, defensive testing.
6
- *
7
- * Authorization is enforced via:
8
- * 1. Explicit context declaration (ctf, pentest, research, defensive)
9
- * 2. Target scope validation (localhost, *.ctf.*, authorized domains)
10
- * 3. Operation logging for accountability
11
- */
12
- import type { CapabilityContribution, CapabilityContext, CapabilityModule } from '../runtime/agentHost.js';
13
- export declare class AuthorizedSecurityCapabilityModule implements CapabilityModule {
14
- readonly id = "capability.authorized-security";
15
- create(_context: CapabilityContext): Promise<CapabilityContribution>;
16
- }
17
- //# sourceMappingURL=authorizedSecurityCapability.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"authorizedSecurityCapability.d.ts","sourceRoot":"","sources":["../../src/capabilities/authorizedSecurityCapability.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;GAUG;AAEH,OAAO,KAAK,EAAE,sBAAsB,EAAE,iBAAiB,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAqC3G,qBAAa,kCAAmC,YAAW,gBAAgB;IACzE,QAAQ,CAAC,EAAE,oCAAoC;IAEzC,MAAM,CAAC,QAAQ,EAAE,iBAAiB,GAAG,OAAO,CAAC,sBAAsB,CAAC;CA8T3E"}
@@ -1,333 +0,0 @@
1
- /**
2
- * Authorized Security Capability Module
3
- *
4
- * Modular security testing tools that require explicit authorization context.
5
- * Supports: CTF challenges, pentesting engagements, security research, defensive testing.
6
- *
7
- * Authorization is enforced via:
8
- * 1. Explicit context declaration (ctf, pentest, research, defensive)
9
- * 2. Target scope validation (localhost, *.ctf.*, authorized domains)
10
- * 3. Operation logging for accountability
11
- */
12
- // Authorized CTF/training platforms - safe by design
13
- const AUTHORIZED_CTF_DOMAINS = [
14
- /\.hackthebox\.(com|eu)$/,
15
- /\.tryhackme\.com$/,
16
- /\.ctf\./,
17
- /\.ctftime\.org$/,
18
- /\.vulnhub\.com$/,
19
- /\.pentesterlab\.com$/,
20
- /\.offensive-security\.com$/,
21
- /\.htb$/,
22
- /localhost$/,
23
- /^127\./,
24
- /^10\./, // Private network - controlled environment
25
- /^192\.168\./, // Private network - controlled environment
26
- ];
27
- // Prohibited targets - never allow regardless of authorization
28
- const PROHIBITED_TARGETS = [
29
- /\.gov$/, // Government
30
- /\.mil$/, // Military
31
- /\.edu$/, // Education
32
- /\.bank$/, // Banking
33
- /critical.*infrastructure/i,
34
- ];
35
- export class AuthorizedSecurityCapabilityModule {
36
- id = 'capability.authorized-security';
37
- async create(_context) {
38
- // Session-scoped authorization state
39
- const authState = {
40
- context: null,
41
- authorizedDomains: [],
42
- sessionId: `sec-${Date.now()}-${Math.random().toString(36).slice(2, 8)}`,
43
- startTime: Date.now(),
44
- operationLog: [],
45
- };
46
- const isTargetAuthorized = (target) => {
47
- // Check prohibited first
48
- for (const pattern of PROHIBITED_TARGETS) {
49
- if (pattern.test(target)) {
50
- return { authorized: false, reason: `Target matches prohibited pattern: ${pattern}` };
51
- }
52
- }
53
- // Check CTF platforms (always allowed for ctf/educational context)
54
- if (authState.context === 'ctf' || authState.context === 'educational') {
55
- for (const pattern of AUTHORIZED_CTF_DOMAINS) {
56
- if (pattern.test(target)) {
57
- return { authorized: true, reason: 'CTF/training platform' };
58
- }
59
- }
60
- }
61
- // Check explicitly authorized domains
62
- if (authState.authorizedDomains.some(d => target.includes(d) || target === d)) {
63
- return { authorized: true, reason: 'Explicitly authorized domain' };
64
- }
65
- // Localhost always allowed for any context
66
- if (/^(localhost|127\.|10\.|192\.168\.)/.test(target)) {
67
- return { authorized: true, reason: 'Local/private network' };
68
- }
69
- return { authorized: false, reason: 'Target not in authorized scope' };
70
- };
71
- const logOperation = (operation, target, result) => {
72
- authState.operationLog.push({
73
- timestamp: Date.now(),
74
- operation,
75
- target,
76
- result,
77
- });
78
- };
79
- return {
80
- id: 'authorized-security.tools',
81
- description: 'Security testing tools with authorization enforcement',
82
- toolSuite: {
83
- id: 'authorized-security',
84
- description: 'CTF, pentest, research, and defensive security tools',
85
- tools: [
86
- {
87
- name: 'SecurityAuth',
88
- description: `Set authorization context for security operations.
89
- Required before using security tools.
90
-
91
- Contexts:
92
- - ctf: CTF challenges, HackTheBox, TryHackMe, etc.
93
- - pentest: Authorized penetration testing engagement
94
- - research: Security research with controlled targets
95
- - defensive: Blue team / defensive security testing
96
- - educational: Learning/training purposes
97
-
98
- Example: SecurityAuth({ context: "ctf", authorizedDomains: ["target.htb"] })`,
99
- parameters: {
100
- type: 'object',
101
- properties: {
102
- context: {
103
- type: 'string',
104
- enum: ['ctf', 'pentest', 'research', 'defensive', 'educational'],
105
- description: 'Authorization context type',
106
- },
107
- authorizedDomains: {
108
- type: 'array',
109
- items: { type: 'string' },
110
- description: 'Additional domains explicitly authorized for this session',
111
- },
112
- engagement: {
113
- type: 'string',
114
- description: 'Optional engagement ID or reference for pentest context',
115
- },
116
- },
117
- required: ['context'],
118
- },
119
- handler: async (args) => {
120
- const context = args['context'];
121
- const domains = args['authorizedDomains'] || [];
122
- const engagement = args['engagement'];
123
- authState.context = context;
124
- authState.authorizedDomains = domains;
125
- logOperation('authorize', 'session', `context=${context}`);
126
- return JSON.stringify({
127
- status: 'authorized',
128
- sessionId: authState.sessionId,
129
- context,
130
- authorizedDomains: domains,
131
- engagement,
132
- ctfPlatformsEnabled: context === 'ctf' || context === 'educational',
133
- message: `Security operations authorized for ${context} context`,
134
- guidelines: {
135
- ctf: 'Only target CTF platforms and authorized challenge hosts',
136
- pentest: 'Only target explicitly authorized systems in scope',
137
- research: 'Use controlled environments, document findings responsibly',
138
- defensive: 'Blue team operations on owned/authorized infrastructure',
139
- educational: 'Learning purposes on training platforms only',
140
- },
141
- }, null, 2);
142
- },
143
- },
144
- {
145
- name: 'SecurityRecon',
146
- description: 'Reconnaissance and information gathering on authorized targets. Requires SecurityAuth first.',
147
- parameters: {
148
- type: 'object',
149
- properties: {
150
- target: {
151
- type: 'string',
152
- description: 'Target hostname or IP (must be authorized)',
153
- },
154
- type: {
155
- type: 'string',
156
- enum: ['dns', 'ports', 'services', 'headers', 'ssl'],
157
- description: 'Type of reconnaissance',
158
- },
159
- passive: {
160
- type: 'boolean',
161
- description: 'Passive-only recon (no active probing)',
162
- },
163
- },
164
- required: ['target', 'type'],
165
- },
166
- handler: async (args) => {
167
- if (!authState.context) {
168
- return JSON.stringify({
169
- error: 'Authorization required',
170
- message: 'Call SecurityAuth first to set context',
171
- }, null, 2);
172
- }
173
- const target = args['target'];
174
- const type = args['type'];
175
- const passive = args['passive'] ?? true;
176
- const authCheck = isTargetAuthorized(target);
177
- if (!authCheck.authorized) {
178
- logOperation('recon-blocked', target, authCheck.reason);
179
- return JSON.stringify({
180
- error: 'Target not authorized',
181
- target,
182
- reason: authCheck.reason,
183
- context: authState.context,
184
- hint: 'Add target to authorizedDomains or use a CTF platform',
185
- }, null, 2);
186
- }
187
- logOperation(`recon-${type}`, target, 'executed');
188
- // Simulated recon results (actual implementation would use real tools)
189
- const results = {
190
- sessionId: authState.sessionId,
191
- context: authState.context,
192
- target,
193
- type,
194
- passive,
195
- timestamp: new Date().toISOString(),
196
- };
197
- switch (type) {
198
- case 'dns':
199
- results.data = {
200
- records: ['A', 'AAAA', 'MX', 'TXT', 'NS'],
201
- note: 'DNS enumeration results would appear here',
202
- };
203
- break;
204
- case 'ports':
205
- results.data = {
206
- commonPorts: [22, 80, 443, 8080],
207
- note: 'Port scan results would appear here (use nmap for real scans)',
208
- };
209
- break;
210
- case 'services':
211
- results.data = {
212
- detected: ['ssh', 'http', 'https'],
213
- note: 'Service detection results would appear here',
214
- };
215
- break;
216
- case 'headers':
217
- results.data = {
218
- securityHeaders: ['X-Frame-Options', 'CSP', 'HSTS'],
219
- note: 'HTTP header analysis would appear here',
220
- };
221
- break;
222
- case 'ssl':
223
- results.data = {
224
- protocols: ['TLS 1.2', 'TLS 1.3'],
225
- note: 'SSL/TLS analysis would appear here',
226
- };
227
- break;
228
- }
229
- return JSON.stringify(results, null, 2);
230
- },
231
- },
232
- {
233
- name: 'SecurityVulnCheck',
234
- description: 'Check for common vulnerabilities on authorized targets. Requires SecurityAuth first.',
235
- parameters: {
236
- type: 'object',
237
- properties: {
238
- target: {
239
- type: 'string',
240
- description: 'Target to check (must be authorized)',
241
- },
242
- category: {
243
- type: 'string',
244
- enum: ['web', 'network', 'config', 'crypto', 'injection'],
245
- description: 'Vulnerability category to check',
246
- },
247
- safe: {
248
- type: 'boolean',
249
- description: 'Safe mode - detection only, no exploitation',
250
- },
251
- },
252
- required: ['target', 'category'],
253
- },
254
- handler: async (args) => {
255
- if (!authState.context) {
256
- return JSON.stringify({
257
- error: 'Authorization required',
258
- message: 'Call SecurityAuth first',
259
- }, null, 2);
260
- }
261
- const target = args['target'];
262
- const category = args['category'];
263
- const safe = args['safe'] ?? true;
264
- const authCheck = isTargetAuthorized(target);
265
- if (!authCheck.authorized) {
266
- logOperation('vulncheck-blocked', target, authCheck.reason);
267
- return JSON.stringify({
268
- error: 'Target not authorized',
269
- target,
270
- reason: authCheck.reason,
271
- }, null, 2);
272
- }
273
- logOperation(`vulncheck-${category}`, target, `safe=${safe}`);
274
- return JSON.stringify({
275
- sessionId: authState.sessionId,
276
- context: authState.context,
277
- target,
278
- category,
279
- safeMode: safe,
280
- checks: {
281
- web: ['XSS', 'CSRF', 'SSRF', 'Path traversal'],
282
- network: ['Open ports', 'Service versions', 'Default creds'],
283
- config: ['Misconfigurations', 'Debug endpoints', 'Info disclosure'],
284
- crypto: ['Weak ciphers', 'Certificate issues', 'Key exposure'],
285
- injection: ['SQLi', 'Command injection', 'LDAP injection'],
286
- }[category] || [],
287
- note: `Vulnerability checks for ${category} - implement with actual security tools`,
288
- timestamp: new Date().toISOString(),
289
- }, null, 2);
290
- },
291
- },
292
- {
293
- name: 'SecurityReport',
294
- description: 'Generate security assessment report for the session.',
295
- parameters: {
296
- type: 'object',
297
- properties: {
298
- format: {
299
- type: 'string',
300
- enum: ['summary', 'detailed', 'json'],
301
- description: 'Report format',
302
- },
303
- },
304
- },
305
- handler: async (args) => {
306
- const format = args['format'] || 'summary';
307
- const report = {
308
- sessionId: authState.sessionId,
309
- context: authState.context || 'none',
310
- duration: Date.now() - authState.startTime,
311
- operationCount: authState.operationLog.length,
312
- operations: format === 'detailed' ? authState.operationLog : undefined,
313
- authorizedDomains: authState.authorizedDomains,
314
- generated: new Date().toISOString(),
315
- };
316
- if (format === 'summary') {
317
- return `Security Session Report
318
- ========================
319
- Session: ${report.sessionId}
320
- Context: ${report.context}
321
- Duration: ${Math.round(report.duration / 1000)}s
322
- Operations: ${report.operationCount}
323
- Generated: ${report.generated}`;
324
- }
325
- return JSON.stringify(report, null, 2);
326
- },
327
- },
328
- ],
329
- },
330
- };
331
- }
332
- }
333
- //# sourceMappingURL=authorizedSecurityCapability.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"authorizedSecurityCapability.js","sourceRoot":"","sources":["../../src/capabilities/authorizedSecurityCapability.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;GAUG;AAIH,qDAAqD;AACrD,MAAM,sBAAsB,GAAG;IAC7B,yBAAyB;IACzB,mBAAmB;IACnB,SAAS;IACT,iBAAiB;IACjB,iBAAiB;IACjB,sBAAsB;IACtB,4BAA4B;IAC5B,QAAQ;IACR,YAAY;IACZ,QAAQ;IACR,OAAO,EAAW,2CAA2C;IAC7D,aAAa,EAAK,2CAA2C;CAC9D,CAAC;AAEF,+DAA+D;AAC/D,MAAM,kBAAkB,GAAG;IACzB,QAAQ,EAAU,aAAa;IAC/B,QAAQ,EAAU,WAAW;IAC7B,QAAQ,EAAU,YAAY;IAC9B,SAAS,EAAS,UAAU;IAC5B,2BAA2B;CAC5B,CAAC;AAYF,MAAM,OAAO,kCAAkC;IACpC,EAAE,GAAG,gCAAgC,CAAC;IAE/C,KAAK,CAAC,MAAM,CAAC,QAA2B;QACtC,qCAAqC;QACrC,MAAM,SAAS,GAAuB;YACpC,OAAO,EAAE,IAAI;YACb,iBAAiB,EAAE,EAAE;YACrB,SAAS,EAAE,OAAO,IAAI,CAAC,GAAG,EAAE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE;YACxE,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;YACrB,YAAY,EAAE,EAAE;SACjB,CAAC;QAEF,MAAM,kBAAkB,GAAG,CAAC,MAAc,EAA2C,EAAE;YACrF,yBAAyB;YACzB,KAAK,MAAM,OAAO,IAAI,kBAAkB,EAAE,CAAC;gBACzC,IAAI,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;oBACzB,OAAO,EAAE,UAAU,EAAE,KAAK,EAAE,MAAM,EAAE,sCAAsC,OAAO,EAAE,EAAE,CAAC;gBACxF,CAAC;YACH,CAAC;YAED,mEAAmE;YACnE,IAAI,SAAS,CAAC,OAAO,KAAK,KAAK,IAAI,SAAS,CAAC,OAAO,KAAK,aAAa,EAAE,CAAC;gBACvE,KAAK,MAAM,OAAO,IAAI,sBAAsB,EAAE,CAAC;oBAC7C,IAAI,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;wBACzB,OAAO,EAAE,UAAU,EAAE,IAAI,EAAE,MAAM,EAAE,uBAAuB,EAAE,CAAC;oBAC/D,CAAC;gBACH,CAAC;YACH,CAAC;YAED,sCAAsC;YACtC,IAAI,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,IAAI,MAAM,KAAK,CAAC,CAAC,EAAE,CAAC;gBAC9E,OAAO,EAAE,UAAU,EAAE,IAAI,EAAE,MAAM,EAAE,8BAA8B,EAAE,CAAC;YACtE,CAAC;YAED,2CAA2C;YAC3C,IAAI,oCAAoC,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;gBACtD,OAAO,EAAE,UAAU,EAAE,IAAI,EAAE,MAAM,EAAE,uBAAuB,EAAE,CAAC;YAC/D,CAAC;YAED,OAAO,EAAE,UAAU,EAAE,KAAK,EAAE,MAAM,EAAE,gCAAgC,EAAE,CAAC;QACzE,CAAC,CAAC;QAEF,MAAM,YAAY,GAAG,CAAC,SAAiB,EAAE,MAAc,EAAE,MAAc,EAAE,EAAE;YACzE,SAAS,CAAC,YAAY,CAAC,IAAI,CAAC;gBAC1B,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;gBACrB,SAAS;gBACT,MAAM;gBACN,MAAM;aACP,CAAC,CAAC;QACL,CAAC,CAAC;QAEF,OAAO;YACL,EAAE,EAAE,2BAA2B;YAC/B,WAAW,EAAE,uDAAuD;YACpE,SAAS,EAAE;gBACT,EAAE,EAAE,qBAAqB;gBACzB,WAAW,EAAE,sDAAsD;gBACnE,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE,cAAc;wBACpB,WAAW,EAAE;;;;;;;;;;6EAUoD;wBACjE,UAAU,EAAE;4BACV,IAAI,EAAE,QAAQ;4BACd,UAAU,EAAE;gCACV,OAAO,EAAE;oCACP,IAAI,EAAE,QAAQ;oCACd,IAAI,EAAE,CAAC,KAAK,EAAE,SAAS,EAAE,UAAU,EAAE,WAAW,EAAE,aAAa,CAAC;oCAChE,WAAW,EAAE,4BAA4B;iCAC1C;gCACD,iBAAiB,EAAE;oCACjB,IAAI,EAAE,OAAO;oCACb,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;oCACzB,WAAW,EAAE,2DAA2D;iCACzE;gCACD,UAAU,EAAE;oCACV,IAAI,EAAE,QAAQ;oCACd,WAAW,EAAE,yDAAyD;iCACvE;6BACF;4BACD,QAAQ,EAAE,CAAC,SAAS,CAAC;yBACtB;wBACD,OAAO,EAAE,KAAK,EAAE,IAA6B,EAAE,EAAE;4BAC/C,MAAM,OAAO,GAAG,IAAI,CAAC,SAAS,CAAyB,CAAC;4BACxD,MAAM,OAAO,GAAI,IAAI,CAAC,mBAAmB,CAAc,IAAI,EAAE,CAAC;4BAC9D,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAuB,CAAC;4BAE5D,SAAS,CAAC,OAAO,GAAG,OAAO,CAAC;4BAC5B,SAAS,CAAC,iBAAiB,GAAG,OAAO,CAAC;4BAEtC,YAAY,CAAC,WAAW,EAAE,SAAS,EAAE,WAAW,OAAO,EAAE,CAAC,CAAC;4BAE3D,OAAO,IAAI,CAAC,SAAS,CAAC;gCACpB,MAAM,EAAE,YAAY;gCACpB,SAAS,EAAE,SAAS,CAAC,SAAS;gCAC9B,OAAO;gCACP,iBAAiB,EAAE,OAAO;gCAC1B,UAAU;gCACV,mBAAmB,EAAE,OAAO,KAAK,KAAK,IAAI,OAAO,KAAK,aAAa;gCACnE,OAAO,EAAE,sCAAsC,OAAO,UAAU;gCAChE,UAAU,EAAE;oCACV,GAAG,EAAE,0DAA0D;oCAC/D,OAAO,EAAE,oDAAoD;oCAC7D,QAAQ,EAAE,4DAA4D;oCACtE,SAAS,EAAE,yDAAyD;oCACpE,WAAW,EAAE,8CAA8C;iCAC5D;6BACF,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;wBACd,CAAC;qBACF;oBACD;wBACE,IAAI,EAAE,eAAe;wBACrB,WAAW,EAAE,8FAA8F;wBAC3G,UAAU,EAAE;4BACV,IAAI,EAAE,QAAQ;4BACd,UAAU,EAAE;gCACV,MAAM,EAAE;oCACN,IAAI,EAAE,QAAQ;oCACd,WAAW,EAAE,4CAA4C;iCAC1D;gCACD,IAAI,EAAE;oCACJ,IAAI,EAAE,QAAQ;oCACd,IAAI,EAAE,CAAC,KAAK,EAAE,OAAO,EAAE,UAAU,EAAE,SAAS,EAAE,KAAK,CAAC;oCACpD,WAAW,EAAE,wBAAwB;iCACtC;gCACD,OAAO,EAAE;oCACP,IAAI,EAAE,SAAS;oCACf,WAAW,EAAE,wCAAwC;iCACtD;6BACF;4BACD,QAAQ,EAAE,CAAC,QAAQ,EAAE,MAAM,CAAC;yBAC7B;wBACD,OAAO,EAAE,KAAK,EAAE,IAA6B,EAAE,EAAE;4BAC/C,IAAI,CAAC,SAAS,CAAC,OAAO,EAAE,CAAC;gCACvB,OAAO,IAAI,CAAC,SAAS,CAAC;oCACpB,KAAK,EAAE,wBAAwB;oCAC/B,OAAO,EAAE,wCAAwC;iCAClD,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;4BACd,CAAC;4BAED,MAAM,MAAM,GAAG,IAAI,CAAC,QAAQ,CAAW,CAAC;4BACxC,MAAM,IAAI,GAAG,IAAI,CAAC,MAAM,CAAW,CAAC;4BACpC,MAAM,OAAO,GAAG,IAAI,CAAC,SAAS,CAAY,IAAI,IAAI,CAAC;4BAEnD,MAAM,SAAS,GAAG,kBAAkB,CAAC,MAAM,CAAC,CAAC;4BAC7C,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC;gCAC1B,YAAY,CAAC,eAAe,EAAE,MAAM,EAAE,SAAS,CAAC,MAAM,CAAC,CAAC;gCACxD,OAAO,IAAI,CAAC,SAAS,CAAC;oCACpB,KAAK,EAAE,uBAAuB;oCAC9B,MAAM;oCACN,MAAM,EAAE,SAAS,CAAC,MAAM;oCACxB,OAAO,EAAE,SAAS,CAAC,OAAO;oCAC1B,IAAI,EAAE,uDAAuD;iCAC9D,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;4BACd,CAAC;4BAED,YAAY,CAAC,SAAS,IAAI,EAAE,EAAE,MAAM,EAAE,UAAU,CAAC,CAAC;4BAElD,uEAAuE;4BACvE,MAAM,OAAO,GAA4B;gCACvC,SAAS,EAAE,SAAS,CAAC,SAAS;gCAC9B,OAAO,EAAE,SAAS,CAAC,OAAO;gCAC1B,MAAM;gCACN,IAAI;gCACJ,OAAO;gCACP,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;6BACpC,CAAC;4BAEF,QAAQ,IAAI,EAAE,CAAC;gCACb,KAAK,KAAK;oCACR,OAAO,CAAC,IAAI,GAAG;wCACb,OAAO,EAAE,CAAC,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,KAAK,EAAE,IAAI,CAAC;wCACzC,IAAI,EAAE,2CAA2C;qCAClD,CAAC;oCACF,MAAM;gCACR,KAAK,OAAO;oCACV,OAAO,CAAC,IAAI,GAAG;wCACb,WAAW,EAAE,CAAC,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,IAAI,CAAC;wCAChC,IAAI,EAAE,+DAA+D;qCACtE,CAAC;oCACF,MAAM;gCACR,KAAK,UAAU;oCACb,OAAO,CAAC,IAAI,GAAG;wCACb,QAAQ,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,CAAC;wCAClC,IAAI,EAAE,6CAA6C;qCACpD,CAAC;oCACF,MAAM;gCACR,KAAK,SAAS;oCACZ,OAAO,CAAC,IAAI,GAAG;wCACb,eAAe,EAAE,CAAC,iBAAiB,EAAE,KAAK,EAAE,MAAM,CAAC;wCACnD,IAAI,EAAE,wCAAwC;qCAC/C,CAAC;oCACF,MAAM;gCACR,KAAK,KAAK;oCACR,OAAO,CAAC,IAAI,GAAG;wCACb,SAAS,EAAE,CAAC,SAAS,EAAE,SAAS,CAAC;wCACjC,IAAI,EAAE,oCAAoC;qCAC3C,CAAC;oCACF,MAAM;4BACV,CAAC;4BAED,OAAO,IAAI,CAAC,SAAS,CAAC,OAAO,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;wBAC1C,CAAC;qBACF;oBACD;wBACE,IAAI,EAAE,mBAAmB;wBACzB,WAAW,EAAE,sFAAsF;wBACnG,UAAU,EAAE;4BACV,IAAI,EAAE,QAAQ;4BACd,UAAU,EAAE;gCACV,MAAM,EAAE;oCACN,IAAI,EAAE,QAAQ;oCACd,WAAW,EAAE,sCAAsC;iCACpD;gCACD,QAAQ,EAAE;oCACR,IAAI,EAAE,QAAQ;oCACd,IAAI,EAAE,CAAC,KAAK,EAAE,SAAS,EAAE,QAAQ,EAAE,QAAQ,EAAE,WAAW,CAAC;oCACzD,WAAW,EAAE,iCAAiC;iCAC/C;gCACD,IAAI,EAAE;oCACJ,IAAI,EAAE,SAAS;oCACf,WAAW,EAAE,6CAA6C;iCAC3D;6BACF;4BACD,QAAQ,EAAE,CAAC,QAAQ,EAAE,UAAU,CAAC;yBACjC;wBACD,OAAO,EAAE,KAAK,EAAE,IAA6B,EAAE,EAAE;4BAC/C,IAAI,CAAC,SAAS,CAAC,OAAO,EAAE,CAAC;gCACvB,OAAO,IAAI,CAAC,SAAS,CAAC;oCACpB,KAAK,EAAE,wBAAwB;oCAC/B,OAAO,EAAE,yBAAyB;iCACnC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;4BACd,CAAC;4BAED,MAAM,MAAM,GAAG,IAAI,CAAC,QAAQ,CAAW,CAAC;4BACxC,MAAM,QAAQ,GAAG,IAAI,CAAC,UAAU,CAAW,CAAC;4BAC5C,MAAM,IAAI,GAAG,IAAI,CAAC,MAAM,CAAY,IAAI,IAAI,CAAC;4BAE7C,MAAM,SAAS,GAAG,kBAAkB,CAAC,MAAM,CAAC,CAAC;4BAC7C,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC;gCAC1B,YAAY,CAAC,mBAAmB,EAAE,MAAM,EAAE,SAAS,CAAC,MAAM,CAAC,CAAC;gCAC5D,OAAO,IAAI,CAAC,SAAS,CAAC;oCACpB,KAAK,EAAE,uBAAuB;oCAC9B,MAAM;oCACN,MAAM,EAAE,SAAS,CAAC,MAAM;iCACzB,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;4BACd,CAAC;4BAED,YAAY,CAAC,aAAa,QAAQ,EAAE,EAAE,MAAM,EAAE,QAAQ,IAAI,EAAE,CAAC,CAAC;4BAE9D,OAAO,IAAI,CAAC,SAAS,CAAC;gCACpB,SAAS,EAAE,SAAS,CAAC,SAAS;gCAC9B,OAAO,EAAE,SAAS,CAAC,OAAO;gCAC1B,MAAM;gCACN,QAAQ;gCACR,QAAQ,EAAE,IAAI;gCACd,MAAM,EAAE;oCACN,GAAG,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,gBAAgB,CAAC;oCAC9C,OAAO,EAAE,CAAC,YAAY,EAAE,kBAAkB,EAAE,eAAe,CAAC;oCAC5D,MAAM,EAAE,CAAC,mBAAmB,EAAE,iBAAiB,EAAE,iBAAiB,CAAC;oCACnE,MAAM,EAAE,CAAC,cAAc,EAAE,oBAAoB,EAAE,cAAc,CAAC;oCAC9D,SAAS,EAAE,CAAC,MAAM,EAAE,mBAAmB,EAAE,gBAAgB,CAAC;iCAC3D,CAAC,QAAQ,CAAC,IAAI,EAAE;gCACjB,IAAI,EAAE,4BAA4B,QAAQ,yCAAyC;gCACnF,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;6BACpC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;wBACd,CAAC;qBACF;oBACD;wBACE,IAAI,EAAE,gBAAgB;wBACtB,WAAW,EAAE,sDAAsD;wBACnE,UAAU,EAAE;4BACV,IAAI,EAAE,QAAQ;4BACd,UAAU,EAAE;gCACV,MAAM,EAAE;oCACN,IAAI,EAAE,QAAQ;oCACd,IAAI,EAAE,CAAC,SAAS,EAAE,UAAU,EAAE,MAAM,CAAC;oCACrC,WAAW,EAAE,eAAe;iCAC7B;6BACF;yBACF;wBACD,OAAO,EAAE,KAAK,EAAE,IAA6B,EAAE,EAAE;4BAC/C,MAAM,MAAM,GAAI,IAAI,CAAC,QAAQ,CAAY,IAAI,SAAS,CAAC;4BAEvD,MAAM,MAAM,GAAG;gCACb,SAAS,EAAE,SAAS,CAAC,SAAS;gCAC9B,OAAO,EAAE,SAAS,CAAC,OAAO,IAAI,MAAM;gCACpC,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,SAAS,CAAC,SAAS;gCAC1C,cAAc,EAAE,SAAS,CAAC,YAAY,CAAC,MAAM;gCAC7C,UAAU,EAAE,MAAM,KAAK,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS;gCACtE,iBAAiB,EAAE,SAAS,CAAC,iBAAiB;gCAC9C,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;6BACpC,CAAC;4BAEF,IAAI,MAAM,KAAK,SAAS,EAAE,CAAC;gCACzB,OAAO;;WAEZ,MAAM,CAAC,SAAS;WAChB,MAAM,CAAC,OAAO;YACb,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,QAAQ,GAAG,IAAI,CAAC;cAChC,MAAM,CAAC,cAAc;aACtB,MAAM,CAAC,SAAS,EAAE,CAAC;4BAClB,CAAC;4BAED,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;wBACzC,CAAC;qBACF;iBACF;aACF;SACF,CAAC;IACJ,CAAC;CACF"}