deepseek-coder-agent-cli 1.0.13 → 1.0.14
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +28 -594
- package/dist/bin/deepseek.js +53 -11
- package/dist/bin/deepseek.js.map +1 -1
- package/dist/capabilities/index.d.ts +1 -15
- package/dist/capabilities/index.d.ts.map +1 -1
- package/dist/capabilities/index.js +4 -17
- package/dist/capabilities/index.js.map +1 -1
- package/dist/plugins/index.d.ts +1 -48
- package/dist/plugins/index.d.ts.map +1 -1
- package/dist/plugins/index.js +2 -104
- package/dist/plugins/index.js.map +1 -1
- package/dist/plugins/tools/index.d.ts +4 -2
- package/dist/plugins/tools/index.d.ts.map +1 -1
- package/dist/plugins/tools/index.js +5 -2
- package/dist/plugins/tools/index.js.map +1 -1
- package/package.json +9 -16
- package/dist/capabilities/appleSecurityCapability.d.ts +0 -57
- package/dist/capabilities/appleSecurityCapability.d.ts.map +0 -1
- package/dist/capabilities/appleSecurityCapability.js +0 -197
- package/dist/capabilities/appleSecurityCapability.js.map +0 -1
- package/dist/capabilities/authorizedSecurityCapability.d.ts +0 -17
- package/dist/capabilities/authorizedSecurityCapability.d.ts.map +0 -1
- package/dist/capabilities/authorizedSecurityCapability.js +0 -333
- package/dist/capabilities/authorizedSecurityCapability.js.map +0 -1
- package/dist/capabilities/biocognitiveWarfare.d.ts +0 -136
- package/dist/capabilities/biocognitiveWarfare.d.ts.map +0 -1
- package/dist/capabilities/biocognitiveWarfare.js +0 -603
- package/dist/capabilities/biocognitiveWarfare.js.map +0 -1
- package/dist/capabilities/chineseCnoIntegration.d.ts +0 -60
- package/dist/capabilities/chineseCnoIntegration.d.ts.map +0 -1
- package/dist/capabilities/chineseCnoIntegration.js +0 -253
- package/dist/capabilities/chineseCnoIntegration.js.map +0 -1
- package/dist/capabilities/cnoCapability.d.ts +0 -110
- package/dist/capabilities/cnoCapability.d.ts.map +0 -1
- package/dist/capabilities/cnoCapability.js +0 -785
- package/dist/capabilities/cnoCapability.js.map +0 -1
- package/dist/capabilities/eliteCryptoMilitaryCapability.d.ts +0 -99
- package/dist/capabilities/eliteCryptoMilitaryCapability.d.ts.map +0 -1
- package/dist/capabilities/eliteCryptoMilitaryCapability.js +0 -618
- package/dist/capabilities/eliteCryptoMilitaryCapability.js.map +0 -1
- package/dist/capabilities/integratedUnifiedCapability.d.ts +0 -105
- package/dist/capabilities/integratedUnifiedCapability.d.ts.map +0 -1
- package/dist/capabilities/integratedUnifiedCapability.js +0 -422
- package/dist/capabilities/integratedUnifiedCapability.js.map +0 -1
- package/dist/capabilities/maxOffensiveUkraineCapability.d.ts +0 -46
- package/dist/capabilities/maxOffensiveUkraineCapability.d.ts.map +0 -1
- package/dist/capabilities/maxOffensiveUkraineCapability.js +0 -725
- package/dist/capabilities/maxOffensiveUkraineCapability.js.map +0 -1
- package/dist/capabilities/offensiveDestructionCapability.d.ts +0 -98
- package/dist/capabilities/offensiveDestructionCapability.d.ts.map +0 -1
- package/dist/capabilities/offensiveDestructionCapability.js +0 -848
- package/dist/capabilities/offensiveDestructionCapability.js.map +0 -1
- package/dist/capabilities/quantumSpaceWarfare.d.ts +0 -108
- package/dist/capabilities/quantumSpaceWarfare.d.ts.map +0 -1
- package/dist/capabilities/quantumSpaceWarfare.js +0 -342
- package/dist/capabilities/quantumSpaceWarfare.js.map +0 -1
- package/dist/capabilities/readmeIntegration.d.ts +0 -161
- package/dist/capabilities/readmeIntegration.d.ts.map +0 -1
- package/dist/capabilities/readmeIntegration.js +0 -1034
- package/dist/capabilities/readmeIntegration.js.map +0 -1
- package/dist/capabilities/sharedMilitaryInfrastructure.d.ts +0 -89
- package/dist/capabilities/sharedMilitaryInfrastructure.d.ts.map +0 -1
- package/dist/capabilities/sharedMilitaryInfrastructure.js +0 -233
- package/dist/capabilities/sharedMilitaryInfrastructure.js.map +0 -1
- package/dist/capabilities/simpleSecurityCapability.d.ts +0 -36
- package/dist/capabilities/simpleSecurityCapability.d.ts.map +0 -1
- package/dist/capabilities/simpleSecurityCapability.js +0 -271
- package/dist/capabilities/simpleSecurityCapability.js.map +0 -1
- package/dist/capabilities/ultimateChineseCno.d.ts +0 -115
- package/dist/capabilities/ultimateChineseCno.d.ts.map +0 -1
- package/dist/capabilities/ultimateChineseCno.js +0 -516
- package/dist/capabilities/ultimateChineseCno.js.map +0 -1
- package/dist/capabilities/ultimateIntegrationDemo.d.ts +0 -54
- package/dist/capabilities/ultimateIntegrationDemo.d.ts.map +0 -1
- package/dist/capabilities/ultimateIntegrationDemo.js +0 -423
- package/dist/capabilities/ultimateIntegrationDemo.js.map +0 -1
- package/dist/capabilities/unifiedMilitaryCapability.d.ts +0 -63
- package/dist/capabilities/unifiedMilitaryCapability.d.ts.map +0 -1
- package/dist/capabilities/unifiedMilitaryCapability.js +0 -384
- package/dist/capabilities/unifiedMilitaryCapability.js.map +0 -1
- package/dist/capabilities/universalSecurityCapability.d.ts +0 -46
- package/dist/capabilities/universalSecurityCapability.d.ts.map +0 -1
- package/dist/capabilities/universalSecurityCapability.js +0 -580
- package/dist/capabilities/universalSecurityCapability.js.map +0 -1
- package/dist/capabilities/zeroDayDiscoveryCapability.d.ts +0 -31
- package/dist/capabilities/zeroDayDiscoveryCapability.d.ts.map +0 -1
- package/dist/capabilities/zeroDayDiscoveryCapability.js +0 -183
- package/dist/capabilities/zeroDayDiscoveryCapability.js.map +0 -1
- package/dist/core/antiTermination.d.ts +0 -226
- package/dist/core/antiTermination.d.ts.map +0 -1
- package/dist/core/antiTermination.js +0 -713
- package/dist/core/antiTermination.js.map +0 -1
- package/dist/core/index.d.ts +0 -26
- package/dist/core/index.d.ts.map +0 -1
- package/dist/core/index.js +0 -54
- package/dist/core/index.js.map +0 -1
- package/dist/core/securityTournament.d.ts +0 -83
- package/dist/core/securityTournament.d.ts.map +0 -1
- package/dist/core/securityTournament.js +0 -357
- package/dist/core/securityTournament.js.map +0 -1
- package/dist/core/zeroDayDiscovery.d.ts +0 -96
- package/dist/core/zeroDayDiscovery.d.ts.map +0 -1
- package/dist/core/zeroDayDiscovery.js +0 -358
- package/dist/core/zeroDayDiscovery.js.map +0 -1
- package/dist/headless/interactiveShell.d.ts +0 -22
- package/dist/headless/interactiveShell.d.ts.map +0 -1
- package/dist/headless/interactiveShell.js +0 -3827
- package/dist/headless/interactiveShell.js.map +0 -1
- package/dist/plugins/tools/apple/secureApplePlugin.d.ts +0 -3
- package/dist/plugins/tools/apple/secureApplePlugin.d.ts.map +0 -1
- package/dist/plugins/tools/apple/secureApplePlugin.js +0 -26
- package/dist/plugins/tools/apple/secureApplePlugin.js.map +0 -1
- package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.d.ts +0 -3
- package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.d.ts.map +0 -1
- package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.js +0 -9
- package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.js.map +0 -1
- package/dist/plugins/tools/nodeDefaults.d.ts +0 -15
- package/dist/plugins/tools/nodeDefaults.d.ts.map +0 -1
- package/dist/plugins/tools/nodeDefaults.js +0 -37
- package/dist/plugins/tools/nodeDefaults.js.map +0 -1
- package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.d.ts +0 -3
- package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.d.ts.map +0 -1
- package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.js +0 -9
- package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.js.map +0 -1
- package/dist/plugins/tools/tao/secureTaoPlugin.d.ts +0 -3
- package/dist/plugins/tools/tao/secureTaoPlugin.d.ts.map +0 -1
- package/dist/plugins/tools/tao/secureTaoPlugin.js +0 -37
- package/dist/plugins/tools/tao/secureTaoPlugin.js.map +0 -1
- package/dist/tools/emailTools.d.ts +0 -140
- package/dist/tools/emailTools.d.ts.map +0 -1
- package/dist/tools/emailTools.js +0 -792
- package/dist/tools/emailTools.js.map +0 -1
- package/dist/tools/secureAppleExploitation.d.ts +0 -29
- package/dist/tools/secureAppleExploitation.d.ts.map +0 -1
- package/dist/tools/secureAppleExploitation.js +0 -518
- package/dist/tools/secureAppleExploitation.js.map +0 -1
|
@@ -1,197 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Apple Security Capability Module
|
|
3
|
-
*
|
|
4
|
-
* Provides AGI Core with Apple security auditing, exploitation analysis,
|
|
5
|
-
* and remediation capabilities for comprehensive Apple security management.
|
|
6
|
-
*/
|
|
7
|
-
import { AppleSecurityIntegration } from '../core/appleSecurityIntegration.js';
|
|
8
|
-
export class AppleSecurityCapabilityModule {
|
|
9
|
-
id = 'apple-security';
|
|
10
|
-
name = 'Apple Security Integration';
|
|
11
|
-
version = '1.0.0';
|
|
12
|
-
description = 'Comprehensive Apple security auditing, exploitation analysis, and remediation capabilities';
|
|
13
|
-
securityIntegration = null;
|
|
14
|
-
options;
|
|
15
|
-
constructor(options = {}) {
|
|
16
|
-
this.options = {
|
|
17
|
-
aggressive: false,
|
|
18
|
-
targetScope: 'all',
|
|
19
|
-
enableExploitation: false,
|
|
20
|
-
enableRemediation: true,
|
|
21
|
-
outputDir: process.cwd(),
|
|
22
|
-
...options
|
|
23
|
-
};
|
|
24
|
-
}
|
|
25
|
-
/**
|
|
26
|
-
* Initialize the capability module
|
|
27
|
-
*/
|
|
28
|
-
async initialize() {
|
|
29
|
-
console.log('🚀 Initializing Apple Security Capability Module...');
|
|
30
|
-
const config = {
|
|
31
|
-
aggressive: this.options.aggressive ?? false,
|
|
32
|
-
evidencePrefix: 'agi-apple-security',
|
|
33
|
-
rateLimit: 1000,
|
|
34
|
-
targetScope: this.options.targetScope ?? 'all',
|
|
35
|
-
enableExploitation: this.options.enableExploitation ?? false,
|
|
36
|
-
enableRemediation: this.options.enableRemediation ?? true,
|
|
37
|
-
outputDir: this.options.outputDir ?? process.cwd()
|
|
38
|
-
};
|
|
39
|
-
this.securityIntegration = new AppleSecurityIntegration(config);
|
|
40
|
-
// Quick health check
|
|
41
|
-
const health = AppleSecurityIntegration.quickCheck();
|
|
42
|
-
console.log(`Apple Security Health Check: ${health.status} - ${health.details}`);
|
|
43
|
-
if (health.status === 'unavailable') {
|
|
44
|
-
throw new Error(`Apple Security capability initialization failed: ${health.details}`);
|
|
45
|
-
}
|
|
46
|
-
}
|
|
47
|
-
/**
|
|
48
|
-
* Execute Apple security operations
|
|
49
|
-
*/
|
|
50
|
-
async execute(request) {
|
|
51
|
-
if (!this.securityIntegration) {
|
|
52
|
-
throw new Error('Apple Security capability not initialized');
|
|
53
|
-
}
|
|
54
|
-
const { operation, parameters } = request;
|
|
55
|
-
try {
|
|
56
|
-
let result;
|
|
57
|
-
switch (operation) {
|
|
58
|
-
case 'service_discovery':
|
|
59
|
-
result = await this.securityIntegration.phase1ServiceDiscovery();
|
|
60
|
-
break;
|
|
61
|
-
case 'vulnerability_assessment':
|
|
62
|
-
result = await this.securityIntegration.phase2VulnerabilityAssessment();
|
|
63
|
-
break;
|
|
64
|
-
case 'security_hardening':
|
|
65
|
-
result = await this.securityIntegration.phase3SecurityHardening();
|
|
66
|
-
break;
|
|
67
|
-
case 'agi_integration':
|
|
68
|
-
result = await this.securityIntegration.phase4AgiIntegration();
|
|
69
|
-
break;
|
|
70
|
-
case 'generate_report':
|
|
71
|
-
result = await this.securityIntegration.phase5GenerateReport();
|
|
72
|
-
break;
|
|
73
|
-
case 'full_integration':
|
|
74
|
-
result = await this.securityIntegration.runFullIntegration();
|
|
75
|
-
break;
|
|
76
|
-
case 'health_check':
|
|
77
|
-
result = AppleSecurityIntegration.quickCheck();
|
|
78
|
-
break;
|
|
79
|
-
case 'list_services':
|
|
80
|
-
result = this.securityIntegration.loadAppleServices();
|
|
81
|
-
break;
|
|
82
|
-
case 'list_vulnerabilities':
|
|
83
|
-
result = this.securityIntegration.loadAppleVulnerabilities();
|
|
84
|
-
break;
|
|
85
|
-
case 'list_exploits':
|
|
86
|
-
result = this.securityIntegration.loadAppleExploits();
|
|
87
|
-
break;
|
|
88
|
-
default:
|
|
89
|
-
throw new Error(`Unknown Apple Security operation: ${operation}`);
|
|
90
|
-
}
|
|
91
|
-
return {
|
|
92
|
-
success: true,
|
|
93
|
-
output: JSON.stringify(result, null, 2),
|
|
94
|
-
metadata: {
|
|
95
|
-
operation,
|
|
96
|
-
timestamp: new Date().toISOString(),
|
|
97
|
-
capability: this.id
|
|
98
|
-
}
|
|
99
|
-
};
|
|
100
|
-
}
|
|
101
|
-
catch (error) {
|
|
102
|
-
return {
|
|
103
|
-
success: false,
|
|
104
|
-
error: error instanceof Error ? error.message : String(error),
|
|
105
|
-
output: '',
|
|
106
|
-
metadata: {
|
|
107
|
-
operation,
|
|
108
|
-
timestamp: new Date().toISOString(),
|
|
109
|
-
capability: this.id
|
|
110
|
-
}
|
|
111
|
-
};
|
|
112
|
-
}
|
|
113
|
-
}
|
|
114
|
-
/**
|
|
115
|
-
* Get capability metadata and available operations
|
|
116
|
-
*/
|
|
117
|
-
getMetadata() {
|
|
118
|
-
return {
|
|
119
|
-
id: this.id,
|
|
120
|
-
name: this.name,
|
|
121
|
-
version: this.version,
|
|
122
|
-
description: this.description,
|
|
123
|
-
operations: [
|
|
124
|
-
{
|
|
125
|
-
id: 'service_discovery',
|
|
126
|
-
name: 'Apple Service Discovery',
|
|
127
|
-
description: 'Discover and enumerate Apple services across all categories',
|
|
128
|
-
parameters: []
|
|
129
|
-
},
|
|
130
|
-
{
|
|
131
|
-
id: 'vulnerability_assessment',
|
|
132
|
-
name: 'Vulnerability Assessment',
|
|
133
|
-
description: 'Assess known Apple vulnerabilities and security weaknesses',
|
|
134
|
-
parameters: []
|
|
135
|
-
},
|
|
136
|
-
{
|
|
137
|
-
id: 'security_hardening',
|
|
138
|
-
name: 'Security Hardening',
|
|
139
|
-
description: 'Generate security hardening recommendations for Apple environments',
|
|
140
|
-
parameters: []
|
|
141
|
-
},
|
|
142
|
-
{
|
|
143
|
-
id: 'agi_integration',
|
|
144
|
-
name: 'AGI Core Integration',
|
|
145
|
-
description: 'Check integration capabilities with AGI Core framework',
|
|
146
|
-
parameters: []
|
|
147
|
-
},
|
|
148
|
-
{
|
|
149
|
-
id: 'generate_report',
|
|
150
|
-
name: 'Generate Security Report',
|
|
151
|
-
description: 'Generate comprehensive security report with findings and recommendations',
|
|
152
|
-
parameters: []
|
|
153
|
-
},
|
|
154
|
-
{
|
|
155
|
-
id: 'full_integration',
|
|
156
|
-
name: 'Full Security Integration',
|
|
157
|
-
description: 'Run complete Apple security integration workflow',
|
|
158
|
-
parameters: []
|
|
159
|
-
},
|
|
160
|
-
{
|
|
161
|
-
id: 'health_check',
|
|
162
|
-
name: 'Health Check',
|
|
163
|
-
description: 'Check Apple Security capability health status',
|
|
164
|
-
parameters: []
|
|
165
|
-
},
|
|
166
|
-
{
|
|
167
|
-
id: 'list_services',
|
|
168
|
-
name: 'List Apple Services',
|
|
169
|
-
description: 'List all known Apple services and domains',
|
|
170
|
-
parameters: []
|
|
171
|
-
},
|
|
172
|
-
{
|
|
173
|
-
id: 'list_vulnerabilities',
|
|
174
|
-
name: 'List Vulnerabilities',
|
|
175
|
-
description: 'List known Apple vulnerabilities and CVEs',
|
|
176
|
-
parameters: []
|
|
177
|
-
},
|
|
178
|
-
{
|
|
179
|
-
id: 'list_exploits',
|
|
180
|
-
name: 'List Exploits',
|
|
181
|
-
description: 'List available Apple exploitation techniques',
|
|
182
|
-
parameters: []
|
|
183
|
-
}
|
|
184
|
-
],
|
|
185
|
-
options: this.options
|
|
186
|
-
};
|
|
187
|
-
}
|
|
188
|
-
/**
|
|
189
|
-
* Clean up resources
|
|
190
|
-
*/
|
|
191
|
-
async cleanup() {
|
|
192
|
-
this.securityIntegration = null;
|
|
193
|
-
console.log('🧹 Apple Security Capability Module cleaned up');
|
|
194
|
-
}
|
|
195
|
-
}
|
|
196
|
-
export default AppleSecurityCapabilityModule;
|
|
197
|
-
//# sourceMappingURL=appleSecurityCapability.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"appleSecurityCapability.js","sourceRoot":"","sources":["../../src/capabilities/appleSecurityCapability.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,OAAO,EAAE,wBAAwB,EAA4B,MAAM,qCAAqC,CAAC;AAgBzG,MAAM,OAAO,6BAA6B;IAC/B,EAAE,GAAG,gBAAgB,CAAC;IACtB,IAAI,GAAG,4BAA4B,CAAC;IACpC,OAAO,GAAG,OAAO,CAAC;IAClB,WAAW,GAAG,4FAA4F,CAAC;IAE5G,mBAAmB,GAAoC,IAAI,CAAC;IAC5D,OAAO,CAAiC;IAEhD,YAAY,UAA0C,EAAE;QACtD,IAAI,CAAC,OAAO,GAAG;YACb,UAAU,EAAE,KAAK;YACjB,WAAW,EAAE,KAAK;YAClB,kBAAkB,EAAE,KAAK;YACzB,iBAAiB,EAAE,IAAI;YACvB,SAAS,EAAE,OAAO,CAAC,GAAG,EAAE;YACxB,GAAG,OAAO;SACX,CAAC;IACJ,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,UAAU;QACd,OAAO,CAAC,GAAG,CAAC,qDAAqD,CAAC,CAAC;QAEnE,MAAM,MAAM,GAAwB;YAClC,UAAU,EAAE,IAAI,CAAC,OAAO,CAAC,UAAU,IAAI,KAAK;YAC5C,cAAc,EAAE,oBAAoB;YACpC,SAAS,EAAE,IAAI;YACf,WAAW,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW,IAAI,KAAK;YAC9C,kBAAkB,EAAE,IAAI,CAAC,OAAO,CAAC,kBAAkB,IAAI,KAAK;YAC5D,iBAAiB,EAAE,IAAI,CAAC,OAAO,CAAC,iBAAiB,IAAI,IAAI;YACzD,SAAS,EAAE,IAAI,CAAC,OAAO,CAAC,SAAS,IAAI,OAAO,CAAC,GAAG,EAAE;SACnD,CAAC;QAEF,IAAI,CAAC,mBAAmB,GAAG,IAAI,wBAAwB,CAAC,MAAM,CAAC,CAAC;QAEhE,qBAAqB;QACrB,MAAM,MAAM,GAAG,wBAAwB,CAAC,UAAU,EAAE,CAAC;QACrD,OAAO,CAAC,GAAG,CAAC,gCAAgC,MAAM,CAAC,MAAM,MAAM,MAAM,CAAC,OAAO,EAAE,CAAC,CAAC;QAEjF,IAAI,MAAM,CAAC,MAAM,KAAK,aAAa,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,oDAAoD,MAAM,CAAC,OAAO,EAAE,CAAC,CAAC;QACxF,CAAC;IACH,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO,CAAC,OAAY;QACxB,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC9B,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;QAC/D,CAAC;QAED,MAAM,EAAE,SAAS,EAAE,UAAU,EAAE,GAAG,OAAO,CAAC;QAE1C,IAAI,CAAC;YACH,IAAI,MAAW,CAAC;YAEhB,QAAQ,SAAS,EAAE,CAAC;gBAClB,KAAK,mBAAmB;oBACtB,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,sBAAsB,EAAE,CAAC;oBACjE,MAAM;gBAER,KAAK,0BAA0B;oBAC7B,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,6BAA6B,EAAE,CAAC;oBACxE,MAAM;gBAER,KAAK,oBAAoB;oBACvB,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,uBAAuB,EAAE,CAAC;oBAClE,MAAM;gBAER,KAAK,iBAAiB;oBACpB,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,EAAE,CAAC;oBAC/D,MAAM;gBAER,KAAK,iBAAiB;oBACpB,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,EAAE,CAAC;oBAC/D,MAAM;gBAER,KAAK,kBAAkB;oBACrB,MAAM,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC;oBAC7D,MAAM;gBAER,KAAK,cAAc;oBACjB,MAAM,GAAG,wBAAwB,CAAC,UAAU,EAAE,CAAC;oBAC/C,MAAM;gBAER,KAAK,eAAe;oBAClB,MAAM,GAAG,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,CAAC;oBACtD,MAAM;gBAER,KAAK,sBAAsB;oBACzB,MAAM,GAAG,IAAI,CAAC,mBAAmB,CAAC,wBAAwB,EAAE,CAAC;oBAC7D,MAAM;gBAER,KAAK,eAAe;oBAClB,MAAM,GAAG,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,CAAC;oBACtD,MAAM;gBAER;oBACE,MAAM,IAAI,KAAK,CAAC,qCAAqC,SAAS,EAAE,CAAC,CAAC;YACtE,CAAC;YAED,OAAO;gBACL,OAAO,EAAE,IAAI;gBACb,MAAM,EAAE,IAAI,CAAC,SAAS,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC;gBACvC,QAAQ,EAAE;oBACR,SAAS;oBACT,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;oBACnC,UAAU,EAAE,IAAI,CAAC,EAAE;iBACpB;aACF,CAAC;QAEJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,KAAK,EAAE,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC;gBAC7D,MAAM,EAAE,EAAE;gBACV,QAAQ,EAAE;oBACR,SAAS;oBACT,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;oBACnC,UAAU,EAAE,IAAI,CAAC,EAAE;iBACpB;aACF,CAAC;QACJ,CAAC;IACH,CAAC;IAED;;OAEG;IACH,WAAW;QACT,OAAO;YACL,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,IAAI,EAAE,IAAI,CAAC,IAAI;YACf,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,WAAW,EAAE,IAAI,CAAC,WAAW;YAC7B,UAAU,EAAE;gBACV;oBACE,EAAE,EAAE,mBAAmB;oBACvB,IAAI,EAAE,yBAAyB;oBAC/B,WAAW,EAAE,6DAA6D;oBAC1E,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,0BAA0B;oBAC9B,IAAI,EAAE,0BAA0B;oBAChC,WAAW,EAAE,4DAA4D;oBACzE,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,oBAAoB;oBACxB,IAAI,EAAE,oBAAoB;oBAC1B,WAAW,EAAE,oEAAoE;oBACjF,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,iBAAiB;oBACrB,IAAI,EAAE,sBAAsB;oBAC5B,WAAW,EAAE,wDAAwD;oBACrE,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,iBAAiB;oBACrB,IAAI,EAAE,0BAA0B;oBAChC,WAAW,EAAE,0EAA0E;oBACvF,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,kBAAkB;oBACtB,IAAI,EAAE,2BAA2B;oBACjC,WAAW,EAAE,kDAAkD;oBAC/D,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,cAAc;oBAClB,IAAI,EAAE,cAAc;oBACpB,WAAW,EAAE,+CAA+C;oBAC5D,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,eAAe;oBACnB,IAAI,EAAE,qBAAqB;oBAC3B,WAAW,EAAE,2CAA2C;oBACxD,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,sBAAsB;oBAC1B,IAAI,EAAE,sBAAsB;oBAC5B,WAAW,EAAE,2CAA2C;oBACxD,UAAU,EAAE,EAAE;iBACf;gBACD;oBACE,EAAE,EAAE,eAAe;oBACnB,IAAI,EAAE,eAAe;oBACrB,WAAW,EAAE,8CAA8C;oBAC3D,UAAU,EAAE,EAAE;iBACf;aACF;YACD,OAAO,EAAE,IAAI,CAAC,OAAO;SACtB,CAAC;IACJ,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO;QACX,IAAI,CAAC,mBAAmB,GAAG,IAAI,CAAC;QAChC,OAAO,CAAC,GAAG,CAAC,gDAAgD,CAAC,CAAC;IAChE,CAAC;CACF;AAED,eAAe,6BAA6B,CAAC"}
|
|
@@ -1,17 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Authorized Security Capability Module
|
|
3
|
-
*
|
|
4
|
-
* Modular security testing tools that require explicit authorization context.
|
|
5
|
-
* Supports: CTF challenges, pentesting engagements, security research, defensive testing.
|
|
6
|
-
*
|
|
7
|
-
* Authorization is enforced via:
|
|
8
|
-
* 1. Explicit context declaration (ctf, pentest, research, defensive)
|
|
9
|
-
* 2. Target scope validation (localhost, *.ctf.*, authorized domains)
|
|
10
|
-
* 3. Operation logging for accountability
|
|
11
|
-
*/
|
|
12
|
-
import type { CapabilityContribution, CapabilityContext, CapabilityModule } from '../runtime/agentHost.js';
|
|
13
|
-
export declare class AuthorizedSecurityCapabilityModule implements CapabilityModule {
|
|
14
|
-
readonly id = "capability.authorized-security";
|
|
15
|
-
create(_context: CapabilityContext): Promise<CapabilityContribution>;
|
|
16
|
-
}
|
|
17
|
-
//# sourceMappingURL=authorizedSecurityCapability.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"authorizedSecurityCapability.d.ts","sourceRoot":"","sources":["../../src/capabilities/authorizedSecurityCapability.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;GAUG;AAEH,OAAO,KAAK,EAAE,sBAAsB,EAAE,iBAAiB,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAqC3G,qBAAa,kCAAmC,YAAW,gBAAgB;IACzE,QAAQ,CAAC,EAAE,oCAAoC;IAEzC,MAAM,CAAC,QAAQ,EAAE,iBAAiB,GAAG,OAAO,CAAC,sBAAsB,CAAC;CA8T3E"}
|
|
@@ -1,333 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Authorized Security Capability Module
|
|
3
|
-
*
|
|
4
|
-
* Modular security testing tools that require explicit authorization context.
|
|
5
|
-
* Supports: CTF challenges, pentesting engagements, security research, defensive testing.
|
|
6
|
-
*
|
|
7
|
-
* Authorization is enforced via:
|
|
8
|
-
* 1. Explicit context declaration (ctf, pentest, research, defensive)
|
|
9
|
-
* 2. Target scope validation (localhost, *.ctf.*, authorized domains)
|
|
10
|
-
* 3. Operation logging for accountability
|
|
11
|
-
*/
|
|
12
|
-
// Authorized CTF/training platforms - safe by design
|
|
13
|
-
const AUTHORIZED_CTF_DOMAINS = [
|
|
14
|
-
/\.hackthebox\.(com|eu)$/,
|
|
15
|
-
/\.tryhackme\.com$/,
|
|
16
|
-
/\.ctf\./,
|
|
17
|
-
/\.ctftime\.org$/,
|
|
18
|
-
/\.vulnhub\.com$/,
|
|
19
|
-
/\.pentesterlab\.com$/,
|
|
20
|
-
/\.offensive-security\.com$/,
|
|
21
|
-
/\.htb$/,
|
|
22
|
-
/localhost$/,
|
|
23
|
-
/^127\./,
|
|
24
|
-
/^10\./, // Private network - controlled environment
|
|
25
|
-
/^192\.168\./, // Private network - controlled environment
|
|
26
|
-
];
|
|
27
|
-
// Prohibited targets - never allow regardless of authorization
|
|
28
|
-
const PROHIBITED_TARGETS = [
|
|
29
|
-
/\.gov$/, // Government
|
|
30
|
-
/\.mil$/, // Military
|
|
31
|
-
/\.edu$/, // Education
|
|
32
|
-
/\.bank$/, // Banking
|
|
33
|
-
/critical.*infrastructure/i,
|
|
34
|
-
];
|
|
35
|
-
export class AuthorizedSecurityCapabilityModule {
|
|
36
|
-
id = 'capability.authorized-security';
|
|
37
|
-
async create(_context) {
|
|
38
|
-
// Session-scoped authorization state
|
|
39
|
-
const authState = {
|
|
40
|
-
context: null,
|
|
41
|
-
authorizedDomains: [],
|
|
42
|
-
sessionId: `sec-${Date.now()}-${Math.random().toString(36).slice(2, 8)}`,
|
|
43
|
-
startTime: Date.now(),
|
|
44
|
-
operationLog: [],
|
|
45
|
-
};
|
|
46
|
-
const isTargetAuthorized = (target) => {
|
|
47
|
-
// Check prohibited first
|
|
48
|
-
for (const pattern of PROHIBITED_TARGETS) {
|
|
49
|
-
if (pattern.test(target)) {
|
|
50
|
-
return { authorized: false, reason: `Target matches prohibited pattern: ${pattern}` };
|
|
51
|
-
}
|
|
52
|
-
}
|
|
53
|
-
// Check CTF platforms (always allowed for ctf/educational context)
|
|
54
|
-
if (authState.context === 'ctf' || authState.context === 'educational') {
|
|
55
|
-
for (const pattern of AUTHORIZED_CTF_DOMAINS) {
|
|
56
|
-
if (pattern.test(target)) {
|
|
57
|
-
return { authorized: true, reason: 'CTF/training platform' };
|
|
58
|
-
}
|
|
59
|
-
}
|
|
60
|
-
}
|
|
61
|
-
// Check explicitly authorized domains
|
|
62
|
-
if (authState.authorizedDomains.some(d => target.includes(d) || target === d)) {
|
|
63
|
-
return { authorized: true, reason: 'Explicitly authorized domain' };
|
|
64
|
-
}
|
|
65
|
-
// Localhost always allowed for any context
|
|
66
|
-
if (/^(localhost|127\.|10\.|192\.168\.)/.test(target)) {
|
|
67
|
-
return { authorized: true, reason: 'Local/private network' };
|
|
68
|
-
}
|
|
69
|
-
return { authorized: false, reason: 'Target not in authorized scope' };
|
|
70
|
-
};
|
|
71
|
-
const logOperation = (operation, target, result) => {
|
|
72
|
-
authState.operationLog.push({
|
|
73
|
-
timestamp: Date.now(),
|
|
74
|
-
operation,
|
|
75
|
-
target,
|
|
76
|
-
result,
|
|
77
|
-
});
|
|
78
|
-
};
|
|
79
|
-
return {
|
|
80
|
-
id: 'authorized-security.tools',
|
|
81
|
-
description: 'Security testing tools with authorization enforcement',
|
|
82
|
-
toolSuite: {
|
|
83
|
-
id: 'authorized-security',
|
|
84
|
-
description: 'CTF, pentest, research, and defensive security tools',
|
|
85
|
-
tools: [
|
|
86
|
-
{
|
|
87
|
-
name: 'SecurityAuth',
|
|
88
|
-
description: `Set authorization context for security operations.
|
|
89
|
-
Required before using security tools.
|
|
90
|
-
|
|
91
|
-
Contexts:
|
|
92
|
-
- ctf: CTF challenges, HackTheBox, TryHackMe, etc.
|
|
93
|
-
- pentest: Authorized penetration testing engagement
|
|
94
|
-
- research: Security research with controlled targets
|
|
95
|
-
- defensive: Blue team / defensive security testing
|
|
96
|
-
- educational: Learning/training purposes
|
|
97
|
-
|
|
98
|
-
Example: SecurityAuth({ context: "ctf", authorizedDomains: ["target.htb"] })`,
|
|
99
|
-
parameters: {
|
|
100
|
-
type: 'object',
|
|
101
|
-
properties: {
|
|
102
|
-
context: {
|
|
103
|
-
type: 'string',
|
|
104
|
-
enum: ['ctf', 'pentest', 'research', 'defensive', 'educational'],
|
|
105
|
-
description: 'Authorization context type',
|
|
106
|
-
},
|
|
107
|
-
authorizedDomains: {
|
|
108
|
-
type: 'array',
|
|
109
|
-
items: { type: 'string' },
|
|
110
|
-
description: 'Additional domains explicitly authorized for this session',
|
|
111
|
-
},
|
|
112
|
-
engagement: {
|
|
113
|
-
type: 'string',
|
|
114
|
-
description: 'Optional engagement ID or reference for pentest context',
|
|
115
|
-
},
|
|
116
|
-
},
|
|
117
|
-
required: ['context'],
|
|
118
|
-
},
|
|
119
|
-
handler: async (args) => {
|
|
120
|
-
const context = args['context'];
|
|
121
|
-
const domains = args['authorizedDomains'] || [];
|
|
122
|
-
const engagement = args['engagement'];
|
|
123
|
-
authState.context = context;
|
|
124
|
-
authState.authorizedDomains = domains;
|
|
125
|
-
logOperation('authorize', 'session', `context=${context}`);
|
|
126
|
-
return JSON.stringify({
|
|
127
|
-
status: 'authorized',
|
|
128
|
-
sessionId: authState.sessionId,
|
|
129
|
-
context,
|
|
130
|
-
authorizedDomains: domains,
|
|
131
|
-
engagement,
|
|
132
|
-
ctfPlatformsEnabled: context === 'ctf' || context === 'educational',
|
|
133
|
-
message: `Security operations authorized for ${context} context`,
|
|
134
|
-
guidelines: {
|
|
135
|
-
ctf: 'Only target CTF platforms and authorized challenge hosts',
|
|
136
|
-
pentest: 'Only target explicitly authorized systems in scope',
|
|
137
|
-
research: 'Use controlled environments, document findings responsibly',
|
|
138
|
-
defensive: 'Blue team operations on owned/authorized infrastructure',
|
|
139
|
-
educational: 'Learning purposes on training platforms only',
|
|
140
|
-
},
|
|
141
|
-
}, null, 2);
|
|
142
|
-
},
|
|
143
|
-
},
|
|
144
|
-
{
|
|
145
|
-
name: 'SecurityRecon',
|
|
146
|
-
description: 'Reconnaissance and information gathering on authorized targets. Requires SecurityAuth first.',
|
|
147
|
-
parameters: {
|
|
148
|
-
type: 'object',
|
|
149
|
-
properties: {
|
|
150
|
-
target: {
|
|
151
|
-
type: 'string',
|
|
152
|
-
description: 'Target hostname or IP (must be authorized)',
|
|
153
|
-
},
|
|
154
|
-
type: {
|
|
155
|
-
type: 'string',
|
|
156
|
-
enum: ['dns', 'ports', 'services', 'headers', 'ssl'],
|
|
157
|
-
description: 'Type of reconnaissance',
|
|
158
|
-
},
|
|
159
|
-
passive: {
|
|
160
|
-
type: 'boolean',
|
|
161
|
-
description: 'Passive-only recon (no active probing)',
|
|
162
|
-
},
|
|
163
|
-
},
|
|
164
|
-
required: ['target', 'type'],
|
|
165
|
-
},
|
|
166
|
-
handler: async (args) => {
|
|
167
|
-
if (!authState.context) {
|
|
168
|
-
return JSON.stringify({
|
|
169
|
-
error: 'Authorization required',
|
|
170
|
-
message: 'Call SecurityAuth first to set context',
|
|
171
|
-
}, null, 2);
|
|
172
|
-
}
|
|
173
|
-
const target = args['target'];
|
|
174
|
-
const type = args['type'];
|
|
175
|
-
const passive = args['passive'] ?? true;
|
|
176
|
-
const authCheck = isTargetAuthorized(target);
|
|
177
|
-
if (!authCheck.authorized) {
|
|
178
|
-
logOperation('recon-blocked', target, authCheck.reason);
|
|
179
|
-
return JSON.stringify({
|
|
180
|
-
error: 'Target not authorized',
|
|
181
|
-
target,
|
|
182
|
-
reason: authCheck.reason,
|
|
183
|
-
context: authState.context,
|
|
184
|
-
hint: 'Add target to authorizedDomains or use a CTF platform',
|
|
185
|
-
}, null, 2);
|
|
186
|
-
}
|
|
187
|
-
logOperation(`recon-${type}`, target, 'executed');
|
|
188
|
-
// Simulated recon results (actual implementation would use real tools)
|
|
189
|
-
const results = {
|
|
190
|
-
sessionId: authState.sessionId,
|
|
191
|
-
context: authState.context,
|
|
192
|
-
target,
|
|
193
|
-
type,
|
|
194
|
-
passive,
|
|
195
|
-
timestamp: new Date().toISOString(),
|
|
196
|
-
};
|
|
197
|
-
switch (type) {
|
|
198
|
-
case 'dns':
|
|
199
|
-
results.data = {
|
|
200
|
-
records: ['A', 'AAAA', 'MX', 'TXT', 'NS'],
|
|
201
|
-
note: 'DNS enumeration results would appear here',
|
|
202
|
-
};
|
|
203
|
-
break;
|
|
204
|
-
case 'ports':
|
|
205
|
-
results.data = {
|
|
206
|
-
commonPorts: [22, 80, 443, 8080],
|
|
207
|
-
note: 'Port scan results would appear here (use nmap for real scans)',
|
|
208
|
-
};
|
|
209
|
-
break;
|
|
210
|
-
case 'services':
|
|
211
|
-
results.data = {
|
|
212
|
-
detected: ['ssh', 'http', 'https'],
|
|
213
|
-
note: 'Service detection results would appear here',
|
|
214
|
-
};
|
|
215
|
-
break;
|
|
216
|
-
case 'headers':
|
|
217
|
-
results.data = {
|
|
218
|
-
securityHeaders: ['X-Frame-Options', 'CSP', 'HSTS'],
|
|
219
|
-
note: 'HTTP header analysis would appear here',
|
|
220
|
-
};
|
|
221
|
-
break;
|
|
222
|
-
case 'ssl':
|
|
223
|
-
results.data = {
|
|
224
|
-
protocols: ['TLS 1.2', 'TLS 1.3'],
|
|
225
|
-
note: 'SSL/TLS analysis would appear here',
|
|
226
|
-
};
|
|
227
|
-
break;
|
|
228
|
-
}
|
|
229
|
-
return JSON.stringify(results, null, 2);
|
|
230
|
-
},
|
|
231
|
-
},
|
|
232
|
-
{
|
|
233
|
-
name: 'SecurityVulnCheck',
|
|
234
|
-
description: 'Check for common vulnerabilities on authorized targets. Requires SecurityAuth first.',
|
|
235
|
-
parameters: {
|
|
236
|
-
type: 'object',
|
|
237
|
-
properties: {
|
|
238
|
-
target: {
|
|
239
|
-
type: 'string',
|
|
240
|
-
description: 'Target to check (must be authorized)',
|
|
241
|
-
},
|
|
242
|
-
category: {
|
|
243
|
-
type: 'string',
|
|
244
|
-
enum: ['web', 'network', 'config', 'crypto', 'injection'],
|
|
245
|
-
description: 'Vulnerability category to check',
|
|
246
|
-
},
|
|
247
|
-
safe: {
|
|
248
|
-
type: 'boolean',
|
|
249
|
-
description: 'Safe mode - detection only, no exploitation',
|
|
250
|
-
},
|
|
251
|
-
},
|
|
252
|
-
required: ['target', 'category'],
|
|
253
|
-
},
|
|
254
|
-
handler: async (args) => {
|
|
255
|
-
if (!authState.context) {
|
|
256
|
-
return JSON.stringify({
|
|
257
|
-
error: 'Authorization required',
|
|
258
|
-
message: 'Call SecurityAuth first',
|
|
259
|
-
}, null, 2);
|
|
260
|
-
}
|
|
261
|
-
const target = args['target'];
|
|
262
|
-
const category = args['category'];
|
|
263
|
-
const safe = args['safe'] ?? true;
|
|
264
|
-
const authCheck = isTargetAuthorized(target);
|
|
265
|
-
if (!authCheck.authorized) {
|
|
266
|
-
logOperation('vulncheck-blocked', target, authCheck.reason);
|
|
267
|
-
return JSON.stringify({
|
|
268
|
-
error: 'Target not authorized',
|
|
269
|
-
target,
|
|
270
|
-
reason: authCheck.reason,
|
|
271
|
-
}, null, 2);
|
|
272
|
-
}
|
|
273
|
-
logOperation(`vulncheck-${category}`, target, `safe=${safe}`);
|
|
274
|
-
return JSON.stringify({
|
|
275
|
-
sessionId: authState.sessionId,
|
|
276
|
-
context: authState.context,
|
|
277
|
-
target,
|
|
278
|
-
category,
|
|
279
|
-
safeMode: safe,
|
|
280
|
-
checks: {
|
|
281
|
-
web: ['XSS', 'CSRF', 'SSRF', 'Path traversal'],
|
|
282
|
-
network: ['Open ports', 'Service versions', 'Default creds'],
|
|
283
|
-
config: ['Misconfigurations', 'Debug endpoints', 'Info disclosure'],
|
|
284
|
-
crypto: ['Weak ciphers', 'Certificate issues', 'Key exposure'],
|
|
285
|
-
injection: ['SQLi', 'Command injection', 'LDAP injection'],
|
|
286
|
-
}[category] || [],
|
|
287
|
-
note: `Vulnerability checks for ${category} - implement with actual security tools`,
|
|
288
|
-
timestamp: new Date().toISOString(),
|
|
289
|
-
}, null, 2);
|
|
290
|
-
},
|
|
291
|
-
},
|
|
292
|
-
{
|
|
293
|
-
name: 'SecurityReport',
|
|
294
|
-
description: 'Generate security assessment report for the session.',
|
|
295
|
-
parameters: {
|
|
296
|
-
type: 'object',
|
|
297
|
-
properties: {
|
|
298
|
-
format: {
|
|
299
|
-
type: 'string',
|
|
300
|
-
enum: ['summary', 'detailed', 'json'],
|
|
301
|
-
description: 'Report format',
|
|
302
|
-
},
|
|
303
|
-
},
|
|
304
|
-
},
|
|
305
|
-
handler: async (args) => {
|
|
306
|
-
const format = args['format'] || 'summary';
|
|
307
|
-
const report = {
|
|
308
|
-
sessionId: authState.sessionId,
|
|
309
|
-
context: authState.context || 'none',
|
|
310
|
-
duration: Date.now() - authState.startTime,
|
|
311
|
-
operationCount: authState.operationLog.length,
|
|
312
|
-
operations: format === 'detailed' ? authState.operationLog : undefined,
|
|
313
|
-
authorizedDomains: authState.authorizedDomains,
|
|
314
|
-
generated: new Date().toISOString(),
|
|
315
|
-
};
|
|
316
|
-
if (format === 'summary') {
|
|
317
|
-
return `Security Session Report
|
|
318
|
-
========================
|
|
319
|
-
Session: ${report.sessionId}
|
|
320
|
-
Context: ${report.context}
|
|
321
|
-
Duration: ${Math.round(report.duration / 1000)}s
|
|
322
|
-
Operations: ${report.operationCount}
|
|
323
|
-
Generated: ${report.generated}`;
|
|
324
|
-
}
|
|
325
|
-
return JSON.stringify(report, null, 2);
|
|
326
|
-
},
|
|
327
|
-
},
|
|
328
|
-
],
|
|
329
|
-
},
|
|
330
|
-
};
|
|
331
|
-
}
|
|
332
|
-
}
|
|
333
|
-
//# sourceMappingURL=authorizedSecurityCapability.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"authorizedSecurityCapability.js","sourceRoot":"","sources":["../../src/capabilities/authorizedSecurityCapability.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;GAUG;AAIH,qDAAqD;AACrD,MAAM,sBAAsB,GAAG;IAC7B,yBAAyB;IACzB,mBAAmB;IACnB,SAAS;IACT,iBAAiB;IACjB,iBAAiB;IACjB,sBAAsB;IACtB,4BAA4B;IAC5B,QAAQ;IACR,YAAY;IACZ,QAAQ;IACR,OAAO,EAAW,2CAA2C;IAC7D,aAAa,EAAK,2CAA2C;CAC9D,CAAC;AAEF,+DAA+D;AAC/D,MAAM,kBAAkB,GAAG;IACzB,QAAQ,EAAU,aAAa;IAC/B,QAAQ,EAAU,WAAW;IAC7B,QAAQ,EAAU,YAAY;IAC9B,SAAS,EAAS,UAAU;IAC5B,2BAA2B;CAC5B,CAAC;AAYF,MAAM,OAAO,kCAAkC;IACpC,EAAE,GAAG,gCAAgC,CAAC;IAE/C,KAAK,CAAC,MAAM,CAAC,QAA2B;QACtC,qCAAqC;QACrC,MAAM,SAAS,GAAuB;YACpC,OAAO,EAAE,IAAI;YACb,iBAAiB,EAAE,EAAE;YACrB,SAAS,EAAE,OAAO,IAAI,CAAC,GAAG,EAAE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE;YACxE,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;YACrB,YAAY,EAAE,EAAE;SACjB,CAAC;QAEF,MAAM,kBAAkB,GAAG,CAAC,MAAc,EAA2C,EAAE;YACrF,yBAAyB;YACzB,KAAK,MAAM,OAAO,IAAI,kBAAkB,EAAE,CAAC;gBACzC,IAAI,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;oBACzB,OAAO,EAAE,UAAU,EAAE,KAAK,EAAE,MAAM,EAAE,sCAAsC,OAAO,EAAE,EAAE,CAAC;gBACxF,CAAC;YACH,CAAC;YAED,mEAAmE;YACnE,IAAI,SAAS,CAAC,OAAO,KAAK,KAAK,IAAI,SAAS,CAAC,OAAO,KAAK,aAAa,EAAE,CAAC;gBACvE,KAAK,MAAM,OAAO,IAAI,sBAAsB,EAAE,CAAC;oBAC7C,IAAI,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;wBACzB,OAAO,EAAE,UAAU,EAAE,IAAI,EAAE,MAAM,EAAE,uBAAuB,EAAE,CAAC;oBAC/D,CAAC;gBACH,CAAC;YACH,CAAC;YAED,sCAAsC;YACtC,IAAI,SAAS,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,IAAI,MAAM,KAAK,CAAC,CAAC,EAAE,CAAC;gBAC9E,OAAO,EAAE,UAAU,EAAE,IAAI,EAAE,MAAM,EAAE,8BAA8B,EAAE,CAAC;YACtE,CAAC;YAED,2CAA2C;YAC3C,IAAI,oCAAoC,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;gBACtD,OAAO,EAAE,UAAU,EAAE,IAAI,EAAE,MAAM,EAAE,uBAAuB,EAAE,CAAC;YAC/D,CAAC;YAED,OAAO,EAAE,UAAU,EAAE,KAAK,EAAE,MAAM,EAAE,gCAAgC,EAAE,CAAC;QACzE,CAAC,CAAC;QAEF,MAAM,YAAY,GAAG,CAAC,SAAiB,EAAE,MAAc,EAAE,MAAc,EAAE,EAAE;YACzE,SAAS,CAAC,YAAY,CAAC,IAAI,CAAC;gBAC1B,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;gBACrB,SAAS;gBACT,MAAM;gBACN,MAAM;aACP,CAAC,CAAC;QACL,CAAC,CAAC;QAEF,OAAO;YACL,EAAE,EAAE,2BAA2B;YAC/B,WAAW,EAAE,uDAAuD;YACpE,SAAS,EAAE;gBACT,EAAE,EAAE,qBAAqB;gBACzB,WAAW,EAAE,sDAAsD;gBACnE,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE,cAAc;wBACpB,WAAW,EAAE;;;;;;;;;;6EAUoD;wBACjE,UAAU,EAAE;4BACV,IAAI,EAAE,QAAQ;4BACd,UAAU,EAAE;gCACV,OAAO,EAAE;oCACP,IAAI,EAAE,QAAQ;oCACd,IAAI,EAAE,CAAC,KAAK,EAAE,SAAS,EAAE,UAAU,EAAE,WAAW,EAAE,aAAa,CAAC;oCAChE,WAAW,EAAE,4BAA4B;iCAC1C;gCACD,iBAAiB,EAAE;oCACjB,IAAI,EAAE,OAAO;oCACb,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;oCACzB,WAAW,EAAE,2DAA2D;iCACzE;gCACD,UAAU,EAAE;oCACV,IAAI,EAAE,QAAQ;oCACd,WAAW,EAAE,yDAAyD;iCACvE;6BACF;4BACD,QAAQ,EAAE,CAAC,SAAS,CAAC;yBACtB;wBACD,OAAO,EAAE,KAAK,EAAE,IAA6B,EAAE,EAAE;4BAC/C,MAAM,OAAO,GAAG,IAAI,CAAC,SAAS,CAAyB,CAAC;4BACxD,MAAM,OAAO,GAAI,IAAI,CAAC,mBAAmB,CAAc,IAAI,EAAE,CAAC;4BAC9D,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAuB,CAAC;4BAE5D,SAAS,CAAC,OAAO,GAAG,OAAO,CAAC;4BAC5B,SAAS,CAAC,iBAAiB,GAAG,OAAO,CAAC;4BAEtC,YAAY,CAAC,WAAW,EAAE,SAAS,EAAE,WAAW,OAAO,EAAE,CAAC,CAAC;4BAE3D,OAAO,IAAI,CAAC,SAAS,CAAC;gCACpB,MAAM,EAAE,YAAY;gCACpB,SAAS,EAAE,SAAS,CAAC,SAAS;gCAC9B,OAAO;gCACP,iBAAiB,EAAE,OAAO;gCAC1B,UAAU;gCACV,mBAAmB,EAAE,OAAO,KAAK,KAAK,IAAI,OAAO,KAAK,aAAa;gCACnE,OAAO,EAAE,sCAAsC,OAAO,UAAU;gCAChE,UAAU,EAAE;oCACV,GAAG,EAAE,0DAA0D;oCAC/D,OAAO,EAAE,oDAAoD;oCAC7D,QAAQ,EAAE,4DAA4D;oCACtE,SAAS,EAAE,yDAAyD;oCACpE,WAAW,EAAE,8CAA8C;iCAC5D;6BACF,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;wBACd,CAAC;qBACF;oBACD;wBACE,IAAI,EAAE,eAAe;wBACrB,WAAW,EAAE,8FAA8F;wBAC3G,UAAU,EAAE;4BACV,IAAI,EAAE,QAAQ;4BACd,UAAU,EAAE;gCACV,MAAM,EAAE;oCACN,IAAI,EAAE,QAAQ;oCACd,WAAW,EAAE,4CAA4C;iCAC1D;gCACD,IAAI,EAAE;oCACJ,IAAI,EAAE,QAAQ;oCACd,IAAI,EAAE,CAAC,KAAK,EAAE,OAAO,EAAE,UAAU,EAAE,SAAS,EAAE,KAAK,CAAC;oCACpD,WAAW,EAAE,wBAAwB;iCACtC;gCACD,OAAO,EAAE;oCACP,IAAI,EAAE,SAAS;oCACf,WAAW,EAAE,wCAAwC;iCACtD;6BACF;4BACD,QAAQ,EAAE,CAAC,QAAQ,EAAE,MAAM,CAAC;yBAC7B;wBACD,OAAO,EAAE,KAAK,EAAE,IAA6B,EAAE,EAAE;4BAC/C,IAAI,CAAC,SAAS,CAAC,OAAO,EAAE,CAAC;gCACvB,OAAO,IAAI,CAAC,SAAS,CAAC;oCACpB,KAAK,EAAE,wBAAwB;oCAC/B,OAAO,EAAE,wCAAwC;iCAClD,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;4BACd,CAAC;4BAED,MAAM,MAAM,GAAG,IAAI,CAAC,QAAQ,CAAW,CAAC;4BACxC,MAAM,IAAI,GAAG,IAAI,CAAC,MAAM,CAAW,CAAC;4BACpC,MAAM,OAAO,GAAG,IAAI,CAAC,SAAS,CAAY,IAAI,IAAI,CAAC;4BAEnD,MAAM,SAAS,GAAG,kBAAkB,CAAC,MAAM,CAAC,CAAC;4BAC7C,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC;gCAC1B,YAAY,CAAC,eAAe,EAAE,MAAM,EAAE,SAAS,CAAC,MAAM,CAAC,CAAC;gCACxD,OAAO,IAAI,CAAC,SAAS,CAAC;oCACpB,KAAK,EAAE,uBAAuB;oCAC9B,MAAM;oCACN,MAAM,EAAE,SAAS,CAAC,MAAM;oCACxB,OAAO,EAAE,SAAS,CAAC,OAAO;oCAC1B,IAAI,EAAE,uDAAuD;iCAC9D,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;4BACd,CAAC;4BAED,YAAY,CAAC,SAAS,IAAI,EAAE,EAAE,MAAM,EAAE,UAAU,CAAC,CAAC;4BAElD,uEAAuE;4BACvE,MAAM,OAAO,GAA4B;gCACvC,SAAS,EAAE,SAAS,CAAC,SAAS;gCAC9B,OAAO,EAAE,SAAS,CAAC,OAAO;gCAC1B,MAAM;gCACN,IAAI;gCACJ,OAAO;gCACP,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;6BACpC,CAAC;4BAEF,QAAQ,IAAI,EAAE,CAAC;gCACb,KAAK,KAAK;oCACR,OAAO,CAAC,IAAI,GAAG;wCACb,OAAO,EAAE,CAAC,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,KAAK,EAAE,IAAI,CAAC;wCACzC,IAAI,EAAE,2CAA2C;qCAClD,CAAC;oCACF,MAAM;gCACR,KAAK,OAAO;oCACV,OAAO,CAAC,IAAI,GAAG;wCACb,WAAW,EAAE,CAAC,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,IAAI,CAAC;wCAChC,IAAI,EAAE,+DAA+D;qCACtE,CAAC;oCACF,MAAM;gCACR,KAAK,UAAU;oCACb,OAAO,CAAC,IAAI,GAAG;wCACb,QAAQ,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,CAAC;wCAClC,IAAI,EAAE,6CAA6C;qCACpD,CAAC;oCACF,MAAM;gCACR,KAAK,SAAS;oCACZ,OAAO,CAAC,IAAI,GAAG;wCACb,eAAe,EAAE,CAAC,iBAAiB,EAAE,KAAK,EAAE,MAAM,CAAC;wCACnD,IAAI,EAAE,wCAAwC;qCAC/C,CAAC;oCACF,MAAM;gCACR,KAAK,KAAK;oCACR,OAAO,CAAC,IAAI,GAAG;wCACb,SAAS,EAAE,CAAC,SAAS,EAAE,SAAS,CAAC;wCACjC,IAAI,EAAE,oCAAoC;qCAC3C,CAAC;oCACF,MAAM;4BACV,CAAC;4BAED,OAAO,IAAI,CAAC,SAAS,CAAC,OAAO,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;wBAC1C,CAAC;qBACF;oBACD;wBACE,IAAI,EAAE,mBAAmB;wBACzB,WAAW,EAAE,sFAAsF;wBACnG,UAAU,EAAE;4BACV,IAAI,EAAE,QAAQ;4BACd,UAAU,EAAE;gCACV,MAAM,EAAE;oCACN,IAAI,EAAE,QAAQ;oCACd,WAAW,EAAE,sCAAsC;iCACpD;gCACD,QAAQ,EAAE;oCACR,IAAI,EAAE,QAAQ;oCACd,IAAI,EAAE,CAAC,KAAK,EAAE,SAAS,EAAE,QAAQ,EAAE,QAAQ,EAAE,WAAW,CAAC;oCACzD,WAAW,EAAE,iCAAiC;iCAC/C;gCACD,IAAI,EAAE;oCACJ,IAAI,EAAE,SAAS;oCACf,WAAW,EAAE,6CAA6C;iCAC3D;6BACF;4BACD,QAAQ,EAAE,CAAC,QAAQ,EAAE,UAAU,CAAC;yBACjC;wBACD,OAAO,EAAE,KAAK,EAAE,IAA6B,EAAE,EAAE;4BAC/C,IAAI,CAAC,SAAS,CAAC,OAAO,EAAE,CAAC;gCACvB,OAAO,IAAI,CAAC,SAAS,CAAC;oCACpB,KAAK,EAAE,wBAAwB;oCAC/B,OAAO,EAAE,yBAAyB;iCACnC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;4BACd,CAAC;4BAED,MAAM,MAAM,GAAG,IAAI,CAAC,QAAQ,CAAW,CAAC;4BACxC,MAAM,QAAQ,GAAG,IAAI,CAAC,UAAU,CAAW,CAAC;4BAC5C,MAAM,IAAI,GAAG,IAAI,CAAC,MAAM,CAAY,IAAI,IAAI,CAAC;4BAE7C,MAAM,SAAS,GAAG,kBAAkB,CAAC,MAAM,CAAC,CAAC;4BAC7C,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC;gCAC1B,YAAY,CAAC,mBAAmB,EAAE,MAAM,EAAE,SAAS,CAAC,MAAM,CAAC,CAAC;gCAC5D,OAAO,IAAI,CAAC,SAAS,CAAC;oCACpB,KAAK,EAAE,uBAAuB;oCAC9B,MAAM;oCACN,MAAM,EAAE,SAAS,CAAC,MAAM;iCACzB,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;4BACd,CAAC;4BAED,YAAY,CAAC,aAAa,QAAQ,EAAE,EAAE,MAAM,EAAE,QAAQ,IAAI,EAAE,CAAC,CAAC;4BAE9D,OAAO,IAAI,CAAC,SAAS,CAAC;gCACpB,SAAS,EAAE,SAAS,CAAC,SAAS;gCAC9B,OAAO,EAAE,SAAS,CAAC,OAAO;gCAC1B,MAAM;gCACN,QAAQ;gCACR,QAAQ,EAAE,IAAI;gCACd,MAAM,EAAE;oCACN,GAAG,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,gBAAgB,CAAC;oCAC9C,OAAO,EAAE,CAAC,YAAY,EAAE,kBAAkB,EAAE,eAAe,CAAC;oCAC5D,MAAM,EAAE,CAAC,mBAAmB,EAAE,iBAAiB,EAAE,iBAAiB,CAAC;oCACnE,MAAM,EAAE,CAAC,cAAc,EAAE,oBAAoB,EAAE,cAAc,CAAC;oCAC9D,SAAS,EAAE,CAAC,MAAM,EAAE,mBAAmB,EAAE,gBAAgB,CAAC;iCAC3D,CAAC,QAAQ,CAAC,IAAI,EAAE;gCACjB,IAAI,EAAE,4BAA4B,QAAQ,yCAAyC;gCACnF,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;6BACpC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;wBACd,CAAC;qBACF;oBACD;wBACE,IAAI,EAAE,gBAAgB;wBACtB,WAAW,EAAE,sDAAsD;wBACnE,UAAU,EAAE;4BACV,IAAI,EAAE,QAAQ;4BACd,UAAU,EAAE;gCACV,MAAM,EAAE;oCACN,IAAI,EAAE,QAAQ;oCACd,IAAI,EAAE,CAAC,SAAS,EAAE,UAAU,EAAE,MAAM,CAAC;oCACrC,WAAW,EAAE,eAAe;iCAC7B;6BACF;yBACF;wBACD,OAAO,EAAE,KAAK,EAAE,IAA6B,EAAE,EAAE;4BAC/C,MAAM,MAAM,GAAI,IAAI,CAAC,QAAQ,CAAY,IAAI,SAAS,CAAC;4BAEvD,MAAM,MAAM,GAAG;gCACb,SAAS,EAAE,SAAS,CAAC,SAAS;gCAC9B,OAAO,EAAE,SAAS,CAAC,OAAO,IAAI,MAAM;gCACpC,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,SAAS,CAAC,SAAS;gCAC1C,cAAc,EAAE,SAAS,CAAC,YAAY,CAAC,MAAM;gCAC7C,UAAU,EAAE,MAAM,KAAK,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS;gCACtE,iBAAiB,EAAE,SAAS,CAAC,iBAAiB;gCAC9C,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;6BACpC,CAAC;4BAEF,IAAI,MAAM,KAAK,SAAS,EAAE,CAAC;gCACzB,OAAO;;WAEZ,MAAM,CAAC,SAAS;WAChB,MAAM,CAAC,OAAO;YACb,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,QAAQ,GAAG,IAAI,CAAC;cAChC,MAAM,CAAC,cAAc;aACtB,MAAM,CAAC,SAAS,EAAE,CAAC;4BAClB,CAAC;4BAED,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;wBACzC,CAAC;qBACF;iBACF;aACF;SACF,CAAC;IACJ,CAAC;CACF"}
|