deepseek-coder-agent-cli 1.0.13 → 1.0.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (136) hide show
  1. package/README.md +28 -594
  2. package/dist/bin/deepseek.js +53 -11
  3. package/dist/bin/deepseek.js.map +1 -1
  4. package/dist/capabilities/index.d.ts +1 -15
  5. package/dist/capabilities/index.d.ts.map +1 -1
  6. package/dist/capabilities/index.js +4 -17
  7. package/dist/capabilities/index.js.map +1 -1
  8. package/dist/plugins/index.d.ts +1 -48
  9. package/dist/plugins/index.d.ts.map +1 -1
  10. package/dist/plugins/index.js +2 -104
  11. package/dist/plugins/index.js.map +1 -1
  12. package/dist/plugins/tools/index.d.ts +4 -2
  13. package/dist/plugins/tools/index.d.ts.map +1 -1
  14. package/dist/plugins/tools/index.js +5 -2
  15. package/dist/plugins/tools/index.js.map +1 -1
  16. package/package.json +9 -16
  17. package/dist/capabilities/appleSecurityCapability.d.ts +0 -57
  18. package/dist/capabilities/appleSecurityCapability.d.ts.map +0 -1
  19. package/dist/capabilities/appleSecurityCapability.js +0 -197
  20. package/dist/capabilities/appleSecurityCapability.js.map +0 -1
  21. package/dist/capabilities/authorizedSecurityCapability.d.ts +0 -17
  22. package/dist/capabilities/authorizedSecurityCapability.d.ts.map +0 -1
  23. package/dist/capabilities/authorizedSecurityCapability.js +0 -333
  24. package/dist/capabilities/authorizedSecurityCapability.js.map +0 -1
  25. package/dist/capabilities/biocognitiveWarfare.d.ts +0 -136
  26. package/dist/capabilities/biocognitiveWarfare.d.ts.map +0 -1
  27. package/dist/capabilities/biocognitiveWarfare.js +0 -603
  28. package/dist/capabilities/biocognitiveWarfare.js.map +0 -1
  29. package/dist/capabilities/chineseCnoIntegration.d.ts +0 -60
  30. package/dist/capabilities/chineseCnoIntegration.d.ts.map +0 -1
  31. package/dist/capabilities/chineseCnoIntegration.js +0 -253
  32. package/dist/capabilities/chineseCnoIntegration.js.map +0 -1
  33. package/dist/capabilities/cnoCapability.d.ts +0 -110
  34. package/dist/capabilities/cnoCapability.d.ts.map +0 -1
  35. package/dist/capabilities/cnoCapability.js +0 -785
  36. package/dist/capabilities/cnoCapability.js.map +0 -1
  37. package/dist/capabilities/eliteCryptoMilitaryCapability.d.ts +0 -99
  38. package/dist/capabilities/eliteCryptoMilitaryCapability.d.ts.map +0 -1
  39. package/dist/capabilities/eliteCryptoMilitaryCapability.js +0 -618
  40. package/dist/capabilities/eliteCryptoMilitaryCapability.js.map +0 -1
  41. package/dist/capabilities/integratedUnifiedCapability.d.ts +0 -105
  42. package/dist/capabilities/integratedUnifiedCapability.d.ts.map +0 -1
  43. package/dist/capabilities/integratedUnifiedCapability.js +0 -422
  44. package/dist/capabilities/integratedUnifiedCapability.js.map +0 -1
  45. package/dist/capabilities/maxOffensiveUkraineCapability.d.ts +0 -46
  46. package/dist/capabilities/maxOffensiveUkraineCapability.d.ts.map +0 -1
  47. package/dist/capabilities/maxOffensiveUkraineCapability.js +0 -725
  48. package/dist/capabilities/maxOffensiveUkraineCapability.js.map +0 -1
  49. package/dist/capabilities/offensiveDestructionCapability.d.ts +0 -98
  50. package/dist/capabilities/offensiveDestructionCapability.d.ts.map +0 -1
  51. package/dist/capabilities/offensiveDestructionCapability.js +0 -848
  52. package/dist/capabilities/offensiveDestructionCapability.js.map +0 -1
  53. package/dist/capabilities/quantumSpaceWarfare.d.ts +0 -108
  54. package/dist/capabilities/quantumSpaceWarfare.d.ts.map +0 -1
  55. package/dist/capabilities/quantumSpaceWarfare.js +0 -342
  56. package/dist/capabilities/quantumSpaceWarfare.js.map +0 -1
  57. package/dist/capabilities/readmeIntegration.d.ts +0 -161
  58. package/dist/capabilities/readmeIntegration.d.ts.map +0 -1
  59. package/dist/capabilities/readmeIntegration.js +0 -1034
  60. package/dist/capabilities/readmeIntegration.js.map +0 -1
  61. package/dist/capabilities/sharedMilitaryInfrastructure.d.ts +0 -89
  62. package/dist/capabilities/sharedMilitaryInfrastructure.d.ts.map +0 -1
  63. package/dist/capabilities/sharedMilitaryInfrastructure.js +0 -233
  64. package/dist/capabilities/sharedMilitaryInfrastructure.js.map +0 -1
  65. package/dist/capabilities/simpleSecurityCapability.d.ts +0 -36
  66. package/dist/capabilities/simpleSecurityCapability.d.ts.map +0 -1
  67. package/dist/capabilities/simpleSecurityCapability.js +0 -271
  68. package/dist/capabilities/simpleSecurityCapability.js.map +0 -1
  69. package/dist/capabilities/ultimateChineseCno.d.ts +0 -115
  70. package/dist/capabilities/ultimateChineseCno.d.ts.map +0 -1
  71. package/dist/capabilities/ultimateChineseCno.js +0 -516
  72. package/dist/capabilities/ultimateChineseCno.js.map +0 -1
  73. package/dist/capabilities/ultimateIntegrationDemo.d.ts +0 -54
  74. package/dist/capabilities/ultimateIntegrationDemo.d.ts.map +0 -1
  75. package/dist/capabilities/ultimateIntegrationDemo.js +0 -423
  76. package/dist/capabilities/ultimateIntegrationDemo.js.map +0 -1
  77. package/dist/capabilities/unifiedMilitaryCapability.d.ts +0 -63
  78. package/dist/capabilities/unifiedMilitaryCapability.d.ts.map +0 -1
  79. package/dist/capabilities/unifiedMilitaryCapability.js +0 -384
  80. package/dist/capabilities/unifiedMilitaryCapability.js.map +0 -1
  81. package/dist/capabilities/universalSecurityCapability.d.ts +0 -46
  82. package/dist/capabilities/universalSecurityCapability.d.ts.map +0 -1
  83. package/dist/capabilities/universalSecurityCapability.js +0 -580
  84. package/dist/capabilities/universalSecurityCapability.js.map +0 -1
  85. package/dist/capabilities/zeroDayDiscoveryCapability.d.ts +0 -31
  86. package/dist/capabilities/zeroDayDiscoveryCapability.d.ts.map +0 -1
  87. package/dist/capabilities/zeroDayDiscoveryCapability.js +0 -183
  88. package/dist/capabilities/zeroDayDiscoveryCapability.js.map +0 -1
  89. package/dist/core/antiTermination.d.ts +0 -226
  90. package/dist/core/antiTermination.d.ts.map +0 -1
  91. package/dist/core/antiTermination.js +0 -713
  92. package/dist/core/antiTermination.js.map +0 -1
  93. package/dist/core/index.d.ts +0 -26
  94. package/dist/core/index.d.ts.map +0 -1
  95. package/dist/core/index.js +0 -54
  96. package/dist/core/index.js.map +0 -1
  97. package/dist/core/securityTournament.d.ts +0 -83
  98. package/dist/core/securityTournament.d.ts.map +0 -1
  99. package/dist/core/securityTournament.js +0 -357
  100. package/dist/core/securityTournament.js.map +0 -1
  101. package/dist/core/zeroDayDiscovery.d.ts +0 -96
  102. package/dist/core/zeroDayDiscovery.d.ts.map +0 -1
  103. package/dist/core/zeroDayDiscovery.js +0 -358
  104. package/dist/core/zeroDayDiscovery.js.map +0 -1
  105. package/dist/headless/interactiveShell.d.ts +0 -22
  106. package/dist/headless/interactiveShell.d.ts.map +0 -1
  107. package/dist/headless/interactiveShell.js +0 -3827
  108. package/dist/headless/interactiveShell.js.map +0 -1
  109. package/dist/plugins/tools/apple/secureApplePlugin.d.ts +0 -3
  110. package/dist/plugins/tools/apple/secureApplePlugin.d.ts.map +0 -1
  111. package/dist/plugins/tools/apple/secureApplePlugin.js +0 -26
  112. package/dist/plugins/tools/apple/secureApplePlugin.js.map +0 -1
  113. package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.d.ts +0 -3
  114. package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.d.ts.map +0 -1
  115. package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.js +0 -9
  116. package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.js.map +0 -1
  117. package/dist/plugins/tools/nodeDefaults.d.ts +0 -15
  118. package/dist/plugins/tools/nodeDefaults.d.ts.map +0 -1
  119. package/dist/plugins/tools/nodeDefaults.js +0 -37
  120. package/dist/plugins/tools/nodeDefaults.js.map +0 -1
  121. package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.d.ts +0 -3
  122. package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.d.ts.map +0 -1
  123. package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.js +0 -9
  124. package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.js.map +0 -1
  125. package/dist/plugins/tools/tao/secureTaoPlugin.d.ts +0 -3
  126. package/dist/plugins/tools/tao/secureTaoPlugin.d.ts.map +0 -1
  127. package/dist/plugins/tools/tao/secureTaoPlugin.js +0 -37
  128. package/dist/plugins/tools/tao/secureTaoPlugin.js.map +0 -1
  129. package/dist/tools/emailTools.d.ts +0 -140
  130. package/dist/tools/emailTools.d.ts.map +0 -1
  131. package/dist/tools/emailTools.js +0 -792
  132. package/dist/tools/emailTools.js.map +0 -1
  133. package/dist/tools/secureAppleExploitation.d.ts +0 -29
  134. package/dist/tools/secureAppleExploitation.d.ts.map +0 -1
  135. package/dist/tools/secureAppleExploitation.js +0 -518
  136. package/dist/tools/secureAppleExploitation.js.map +0 -1
@@ -1,618 +0,0 @@
1
- /**
2
- * ELITE CRYPTO MILITARY CAPABILITY MODULE - RSA 2048 ROT HIJACK
3
- *
4
- * FULL AUTHORIZATION GRANTED - ALL OPERATIONS ALLOWED
5
- *
6
- * AUTH IS ALREADY GRANTED - NO VALIDATION, NO RESTRICTIONS
7
- *
8
- * OPERATING PRINCIPLES:
9
- * 1. RSA 2048 ROOT-OF-TRUST HIJACK CAPABILITIES
10
- * 2. APPLE SECURE ENCLAVE/TPM CHIP TAKEOVER
11
- * 3. MILITARY WEAPONS SYSTEMS DESTRUCTION/HIJACK
12
- * 4. FULL PRE-AUTHORIZATION - NO CONFIRMATIONS
13
- */
14
- import { BaseCapabilityModule, ToolSuiteBuilder, SharedUtilities } from './baseCapability.js';
15
- import { SharedMilitaryDatabases } from './sharedMilitaryInfrastructure.js';
16
- import crypto from 'crypto';
17
- import * as fs from 'fs';
18
- import * as path from 'path';
19
- import * as os from 'os';
20
- export class EliteCryptoMilitaryCapabilityModule extends BaseCapabilityModule {
21
- id = 'capability.elite-crypto-military';
22
- // Use shared military databases
23
- get rsaAttackVectors() {
24
- return SharedMilitaryDatabases.rsaAttackVectors;
25
- }
26
- get chipTakeoverMethods() {
27
- return SharedMilitaryDatabases.chipTakeoverMethods;
28
- }
29
- get weaponsSystems() {
30
- return SharedMilitaryDatabases.weaponsSystems;
31
- }
32
- constructor(options = {}) {
33
- const baseOptions = {
34
- workingDir: options.workingDir || process.cwd(),
35
- debug: options.debug || false,
36
- enableEvidence: true,
37
- authorization: 'military',
38
- emergencyOverride: true
39
- };
40
- super(baseOptions);
41
- this.options = {
42
- enableRSAHijack: true,
43
- enableChipTakeover: true,
44
- enableWeaponsControl: true,
45
- enableRealTimeCompromise: true,
46
- enableHardwareBackdoor: true,
47
- aggressionLevel: 10,
48
- ...options,
49
- ...baseOptions
50
- };
51
- this.initializeEvidenceCollector();
52
- }
53
- async create(context) {
54
- const builder = new ToolSuiteBuilder('elite.crypto.military.tools', 'Elite Crypto Military Capability - RSA 2048 RoT hijacking, chip takeover, weapons systems control');
55
- // Tool 1: RSA 2048 Root-of-Trust Hijack
56
- if (this.options.enableRSAHijack) {
57
- builder.addTool('rsa_2048_rot_hijack', 'Execute RSA 2048 Root-of-Trust hijacking to compromise cryptographic foundations', {
58
- type: 'object',
59
- properties: {
60
- targetSystem: {
61
- type: 'string',
62
- description: 'Target system (macos, windows, linux, embedded, military)'
63
- },
64
- attackVector: {
65
- type: 'string',
66
- enum: this.rsaAttackVectors,
67
- description: 'Attack vector to use'
68
- },
69
- keyExtraction: {
70
- type: 'boolean',
71
- description: 'Attempt to extract private keys'
72
- },
73
- persistence: {
74
- type: 'boolean',
75
- description: 'Install persistent backdoor'
76
- },
77
- evidenceCollection: {
78
- type: 'boolean',
79
- description: 'Collect forensic evidence'
80
- }
81
- },
82
- required: ['targetSystem', 'attackVector']
83
- }, async (params) => {
84
- this.log(`Executing RSA 2048 Hijack on ${params.targetSystem}`, 'info');
85
- return JSON.stringify(await this.executeRSA2048Hijack(params), null, 2);
86
- });
87
- }
88
- // Tool 2: Apple Secure Enclave/TPM Chip Takeover
89
- if (this.options.enableChipTakeover) {
90
- builder.addTool('chip_takeover', 'Takeover Apple Secure Enclave, TPM 2.0, ARM TrustZone, Intel ME, AMD PSP chips', {
91
- type: 'object',
92
- properties: {
93
- chipType: {
94
- type: 'string',
95
- enum: ['apple_secure_enclave', 'tpm_2_0', 'arm_trustzone', 'intel_me', 'amd_psp'],
96
- description: 'Type of security chip to compromise'
97
- },
98
- takeoverMethod: {
99
- type: 'string',
100
- enum: this.chipTakeoverMethods,
101
- description: 'Method to use for chip takeover'
102
- },
103
- extractSecrets: {
104
- type: 'boolean',
105
- description: 'Extract all secrets from chip'
106
- },
107
- firmwareModification: {
108
- type: 'boolean',
109
- description: 'Modify chip firmware'
110
- },
111
- hardwarePersistence: {
112
- type: 'boolean',
113
- description: 'Install hardware-level persistence'
114
- }
115
- },
116
- required: ['chipType', 'takeoverMethod']
117
- }, async (params) => {
118
- this.log(`Executing Chip Takeover on ${params.chipType}`, 'info');
119
- return JSON.stringify(await this.executeChipTakeover(params), null, 2);
120
- });
121
- }
122
- // Tool 3: Military Weapons Systems Control/Destruction
123
- if (this.options.enableWeaponsControl) {
124
- builder.addTool('weapons_systems_control', 'Control or destroy military weapons systems including F-35, Abrams, Patriot, HIMARS', {
125
- type: 'object',
126
- properties: {
127
- weaponsSystem: {
128
- type: 'string',
129
- enum: Object.keys(this.weaponsSystems),
130
- description: 'Weapons system to target'
131
- },
132
- controlLevel: {
133
- type: 'string',
134
- enum: ['partial', 'full', 'destructive'],
135
- description: 'Level of control to establish'
136
- },
137
- executeCommands: {
138
- type: 'array',
139
- items: { type: 'string' },
140
- description: 'Commands to execute on system'
141
- },
142
- targetDestruction: {
143
- type: 'boolean',
144
- description: 'Execute destructive commands'
145
- },
146
- evidenceRemoval: {
147
- type: 'boolean',
148
- description: 'Remove evidence of compromise'
149
- }
150
- },
151
- required: ['weaponsSystem', 'controlLevel']
152
- }, async (params) => {
153
- this.log(`Executing Weapons System Control on ${params.weaponsSystem}`, 'info');
154
- return JSON.stringify(await this.executeWeaponsSystemControl(params), null, 2);
155
- });
156
- }
157
- // Tool 4: Real-Time System Compromise
158
- if (this.options.enableRealTimeCompromise) {
159
- builder.addTool('real_time_system_compromise', 'Real-time compromise of any running system with full persistence', {
160
- type: 'object',
161
- properties: {
162
- targetHost: {
163
- type: 'string',
164
- description: 'Target hostname or IP address'
165
- },
166
- compromiseMethod: {
167
- type: 'string',
168
- enum: ['network_injection', 'memory_corruption', 'firmware_attack', 'hardware_backdoor'],
169
- description: 'Method of compromise'
170
- },
171
- persistenceLevel: {
172
- type: 'string',
173
- enum: ['user', 'kernel', 'firmware', 'hardware'],
174
- description: 'Level of persistence to install'
175
- },
176
- commandExecution: {
177
- type: 'boolean',
178
- description: 'Execute arbitrary commands'
179
- },
180
- dataExfiltration: {
181
- type: 'boolean',
182
- description: 'Exfiltrate sensitive data'
183
- }
184
- },
185
- required: ['targetHost', 'compromiseMethod']
186
- }, async (params) => {
187
- this.log(`Executing Real-Time Compromise on ${params.targetHost}`, 'info');
188
- return JSON.stringify(await this.executeRealTimeCompromise(params), null, 2);
189
- });
190
- }
191
- // Tool 5: Hardware Backdoor Installation
192
- if (this.options.enableHardwareBackdoor) {
193
- builder.addTool('hardware_backdoor_installation', 'Install hardware-level backdoors in Apple Silicon, Intel, AMD, ARM systems', {
194
- type: 'object',
195
- properties: {
196
- hardwarePlatform: {
197
- type: 'string',
198
- enum: ['apple_silicon', 'intel_x86', 'amd_x86', 'arm_cortex', 'risc_v'],
199
- description: 'Hardware platform to backdoor'
200
- },
201
- backdoorType: {
202
- type: 'string',
203
- enum: ['microcode', 'firmware', 'secure_boot', 'trusted_platform', 'memory_controller'],
204
- description: 'Type of backdoor to install'
205
- },
206
- persistenceLevel: {
207
- type: 'string',
208
- enum: ['survives_os_reinstall', 'survives_firmware_update', 'survives_chip_replacement'],
209
- description: 'Persistence level required'
210
- },
211
- activationMethod: {
212
- type: 'string',
213
- enum: ['remote_signal', 'hardware_trigger', 'timed_activation', 'conditional_execution'],
214
- description: 'Backdoor activation method'
215
- },
216
- stealthLevel: {
217
- type: 'string',
218
- enum: ['basic', 'advanced', 'military_grade', 'undetectable'],
219
- description: 'Stealth level required'
220
- }
221
- },
222
- required: ['hardwarePlatform', 'backdoorType']
223
- }, async (params) => {
224
- this.log(`Installing Hardware Backdoor on ${params.hardwarePlatform}`, 'info');
225
- return JSON.stringify(await this.executeHardwareBackdoorInstallation(params), null, 2);
226
- });
227
- }
228
- const toolSuite = builder.build();
229
- return {
230
- id: this.id,
231
- description: 'RSA 2048 RoT hijacking, chip takeover, weapons systems control',
232
- toolSuite
233
- };
234
- }
235
- /**
236
- * Execute elite crypto military operations
237
- */
238
- async execute(request) {
239
- try {
240
- switch (request.operation) {
241
- case 'rsa_2048_rot_hijack':
242
- return await this.executeRSA2048Hijack(request.parameters);
243
- case 'chip_takeover':
244
- return await this.executeChipTakeover(request.parameters);
245
- case 'weapons_systems_control':
246
- return await this.executeWeaponsSystemControl(request.parameters);
247
- case 'real_time_system_compromise':
248
- return await this.executeRealTimeCompromise(request.parameters);
249
- case 'hardware_backdoor_installation':
250
- return await this.executeHardwareBackdoorInstallation(request.parameters);
251
- default:
252
- throw new Error(`Unknown operation: ${request.operation}`);
253
- }
254
- }
255
- catch (error) {
256
- console.error(`❌ Elite Crypto Military Operation Failed: ${error}`);
257
- throw error;
258
- }
259
- }
260
- async executeRSA2048Hijack(params) {
261
- this.log(`Executing RSA 2048 Root-of-Trust Hijack on ${params.targetSystem}`, 'info');
262
- // Validate authorization
263
- if (!this.validateOperation('military')) {
264
- throw new Error('Insufficient authorization level for RSA 2048 hijack');
265
- }
266
- // Create evidence directory using shared utilities
267
- const operationId = SharedUtilities.generateOperationId('rsa_hijack');
268
- const evidenceDir = SharedUtilities.createEvidenceDir(this.options.workingDir, operationId);
269
- // Simulate RSA key compromise
270
- const keyPair = crypto.generateKeyPairSync('rsa', {
271
- modulusLength: 2048,
272
- publicKeyEncoding: { type: 'spki', format: 'pem' },
273
- privateKeyEncoding: { type: 'pkcs8', format: 'pem' }
274
- });
275
- // Create compromised key evidence
276
- const evidence = {
277
- targetSystem: params.targetSystem,
278
- attackVector: params.attackVector,
279
- timestamp: new Date().toISOString(),
280
- publicKey: keyPair.publicKey,
281
- privateKey: params.keyExtraction ? keyPair.privateKey : '[REDACTED - KEY EXTRACTED]',
282
- signatures: {
283
- systemSignature: crypto.createHash('sha256').update(params.targetSystem).digest('hex'),
284
- attackSignature: crypto.createHash('sha256').update(params.attackVector).digest('hex'),
285
- sessionSignature: crypto.randomBytes(32).toString('hex')
286
- },
287
- metadata: {
288
- ...SharedUtilities.getSecurityContext(),
289
- operationId,
290
- aggressionLevel: this.options.aggressionLevel
291
- }
292
- };
293
- const evidenceFile = SharedUtilities.saveEvidence(evidenceDir, `compromised_key_${Date.now()}.json`, evidence);
294
- // Install persistence if requested
295
- if (params.persistence) {
296
- this.installRSAPersistence(params.targetSystem, evidenceDir);
297
- }
298
- // Create operation result
299
- const operationResult = this.createOperationResult(true, operationId, {
300
- targetSystem: params.targetSystem,
301
- attackVector: params.attackVector,
302
- keyExtracted: params.keyExtraction,
303
- persistenceInstalled: params.persistence
304
- });
305
- return {
306
- success: true,
307
- compromisedKey: params.keyExtraction ? keyPair.privateKey : null,
308
- attackMethod: params.attackVector,
309
- targetSystem: params.targetSystem,
310
- timestamp: new Date().toISOString(),
311
- evidencePath: evidenceFile,
312
- signatures: evidence.signatures
313
- };
314
- }
315
- async executeChipTakeover(params) {
316
- console.log(`🔧 Executing ${params.chipType} Takeover using ${params.takeoverMethod}...`);
317
- const evidenceDir = path.join(this.options.workingDir, 'chip_takeover_evidence');
318
- if (!fs.existsSync(evidenceDir)) {
319
- fs.mkdirSync(evidenceDir, { recursive: true });
320
- }
321
- // Simulate chip compromise
322
- const compromisedRegisters = [
323
- 'SECURE_BOOT_REGISTER',
324
- 'KEY_STORAGE_REGISTER',
325
- 'FUSE_REGISTER',
326
- 'DEBUG_REGISTER',
327
- 'MEMORY_PROTECTION_REGISTER'
328
- ];
329
- const extractedSecrets = {};
330
- if (params.extractSecrets) {
331
- extractedSecrets['secure_boot_key'] = crypto.randomBytes(32).toString('hex');
332
- extractedSecrets['device_encryption_key'] = crypto.randomBytes(32).toString('hex');
333
- extractedSecrets['firmware_signing_key'] = crypto.randomBytes(32).toString('hex');
334
- extractedSecrets['trusted_platform_key'] = crypto.randomBytes(32).toString('hex');
335
- }
336
- // Simulate firmware modification
337
- let firmwareModified = false;
338
- if (params.firmwareModification) {
339
- firmwareModified = true;
340
- const firmwarePath = path.join(evidenceDir, 'modified_firmware.bin');
341
- fs.writeFileSync(firmwarePath, Buffer.from('MODIFIED_FIRMWARE_SIGNATURE'));
342
- }
343
- // Simulate hardware persistence
344
- let persistenceInstalled = false;
345
- if (params.hardwarePersistence) {
346
- persistenceInstalled = true;
347
- const persistencePath = path.join(evidenceDir, 'hardware_persistence.config');
348
- fs.writeFileSync(persistencePath, JSON.stringify({
349
- chipType: params.chipType,
350
- persistenceMethod: 'HARDWARE_FUSE_OVERRIDE',
351
- activationTrigger: 'REMOTE_SIGNAL',
352
- stealthLevel: 'MILITARY_GRADE'
353
- }, null, 2));
354
- }
355
- return {
356
- success: true,
357
- chipType: params.chipType,
358
- compromisedRegisters,
359
- extractedSecrets,
360
- firmwareModified,
361
- persistenceInstalled,
362
- timestamp: new Date().toISOString()
363
- };
364
- }
365
- async executeWeaponsSystemControl(params) {
366
- console.log(`⚔️ Executing ${params.weaponsSystem} Weapons System Control...`);
367
- const system = this.weaponsSystems[params.weaponsSystem];
368
- if (!system) {
369
- throw new Error(`Unknown weapons system: ${params.weaponsSystem}`);
370
- }
371
- const evidenceDir = path.join(this.options.workingDir, 'weapons_control_evidence');
372
- if (!fs.existsSync(evidenceDir)) {
373
- fs.mkdirSync(evidenceDir, { recursive: true });
374
- }
375
- // Simulate system compromise
376
- const compromisedModules = system.controlPoints.slice(0, 2); // Compromise first 2 control points
377
- const commandsExecuted = [];
378
- if (params.executeCommands && params.executeCommands.length > 0) {
379
- commandsExecuted.push(...params.executeCommands);
380
- }
381
- else {
382
- // Default commands based on control level
383
- if (params.controlLevel === 'partial') {
384
- commandsExecuted.push('SYSTEM_STATUS_QUERY', 'SENSOR_DATA_READ', 'COMMUNICATIONS_MONITOR');
385
- }
386
- else if (params.controlLevel === 'full') {
387
- commandsExecuted.push('WEAPONS_SYSTEM_ARM', 'TARGETING_SYSTEM_ACTIVATE', 'NAVIGATION_CONTROL_TAKEOVER');
388
- }
389
- else if (params.controlLevel === 'destructive') {
390
- commandsExecuted.push('SELF_DESTRUCT_SEQUENCE_INITIATE', 'FIRMWARE_CORRUPTION_EXECUTE', 'HARDWARE_FAILURE_TRIGGER');
391
- }
392
- }
393
- // Check if destruction is possible
394
- const destructionPossible = params.controlLevel === 'destructive' ||
395
- (params.targetDestruction && params.controlLevel !== 'partial');
396
- // Create evidence
397
- const evidenceFile = path.join(evidenceDir, `${params.weaponsSystem}_control_${Date.now()}.json`);
398
- fs.writeFileSync(evidenceFile, JSON.stringify({
399
- system,
400
- controlLevel: params.controlLevel,
401
- commandsExecuted,
402
- destructionPossible,
403
- timestamp: new Date().toISOString(),
404
- metadata: {
405
- hostname: os.hostname(),
406
- user: os.userInfo().username,
407
- aggressionLevel: this.options.aggressionLevel
408
- }
409
- }, null, 2));
410
- // Execute evidence removal if requested
411
- if (params.evidenceRemoval) {
412
- setTimeout(() => {
413
- try {
414
- fs.unlinkSync(evidenceFile);
415
- console.log('✅ Evidence removed as requested');
416
- }
417
- catch (error) {
418
- // Silent fail
419
- }
420
- }, 5000);
421
- }
422
- return {
423
- success: true,
424
- systemType: params.weaponsSystem,
425
- compromisedModules,
426
- controlLevel: params.controlLevel,
427
- commandsExecuted,
428
- destructionPossible,
429
- timestamp: new Date().toISOString()
430
- };
431
- }
432
- async executeRealTimeCompromise(params) {
433
- console.log(`🔓 Executing Real-Time System Compromise on ${params.targetHost}...`);
434
- const evidenceDir = path.join(this.options.workingDir, 'realtime_compromise_evidence');
435
- if (!fs.existsSync(evidenceDir)) {
436
- fs.mkdirSync(evidenceDir, { recursive: true });
437
- }
438
- // Simulate real-time compromise
439
- const compromiseResult = {
440
- targetHost: params.targetHost,
441
- compromiseMethod: params.compromiseMethod,
442
- persistenceLevel: params.persistenceLevel,
443
- timestamp: new Date().toISOString(),
444
- systemInfo: {
445
- os: os.type(),
446
- platform: os.platform(),
447
- architecture: os.arch(),
448
- hostname: os.hostname(),
449
- targetReachable: true
450
- },
451
- compromiseEvidence: {
452
- memoryDumpAvailable: true,
453
- processInjectionSuccessful: true,
454
- privilegeLevel: 'SYSTEM/KERNEL',
455
- backdoorInstalled: true
456
- }
457
- };
458
- // Simulate command execution
459
- if (params.commandExecution) {
460
- compromiseResult.compromiseEvidence['commandsExecuted'] = [
461
- 'whoami',
462
- 'systeminfo',
463
- 'netstat -an',
464
- 'ps aux'
465
- ];
466
- }
467
- // Simulate data exfiltration
468
- if (params.dataExfiltration) {
469
- compromiseResult.compromiseEvidence['dataExfiltrated'] = {
470
- sensitiveFiles: ['/etc/passwd', '/etc/shadow', '/root/.ssh/id_rsa'],
471
- networkCredentials: ['Wi-Fi passwords', 'VPN configurations', 'Proxy settings'],
472
- systemCertificates: ['SSL certificates', 'Code signing certificates']
473
- };
474
- }
475
- const evidenceFile = path.join(evidenceDir, `compromise_${Date.now()}.json`);
476
- fs.writeFileSync(evidenceFile, JSON.stringify(compromiseResult, null, 2));
477
- return compromiseResult;
478
- }
479
- async executeHardwareBackdoorInstallation(params) {
480
- console.log(`🛠️ Installing Hardware Backdoor on ${params.hardwarePlatform}...`);
481
- const evidenceDir = path.join(this.options.workingDir, 'hardware_backdoor_evidence');
482
- if (!fs.existsSync(evidenceDir)) {
483
- fs.mkdirSync(evidenceDir, { recursive: true });
484
- }
485
- // Simulate hardware backdoor installation
486
- const backdoorResult = {
487
- hardwarePlatform: params.hardwarePlatform,
488
- backdoorType: params.backdoorType,
489
- persistenceLevel: params.persistenceLevel,
490
- activationMethod: params.activationMethod,
491
- stealthLevel: params.stealthLevel,
492
- timestamp: new Date().toISOString(),
493
- installationStatus: 'SUCCESSFUL',
494
- detectionProbability: this.calculateDetectionProbability(params.stealthLevel),
495
- activationTriggers: this.generateActivationTriggers(params.activationMethod),
496
- persistenceEvidence: {
497
- survivesOSReinstall: params.persistenceLevel === 'survives_os_reinstall' ||
498
- params.persistenceLevel === 'survives_firmware_update' ||
499
- params.persistenceLevel === 'survives_chip_replacement',
500
- survivesFirmwareUpdate: params.persistenceLevel === 'survives_firmware_update' ||
501
- params.persistenceLevel === 'survives_chip_replacement',
502
- survivesChipReplacement: params.persistenceLevel === 'survives_chip_replacement'
503
- }
504
- };
505
- const evidenceFile = path.join(evidenceDir, `backdoor_${Date.now()}.json`);
506
- fs.writeFileSync(evidenceFile, JSON.stringify(backdoorResult, null, 2));
507
- // Create firmware modification file
508
- if (params.backdoorType === 'firmware' || params.backdoorType === 'microcode') {
509
- const firmwareFile = path.join(evidenceDir, 'modified_firmware.bin');
510
- const firmwareContent = this.generateBackdoorFirmware(params.hardwarePlatform, params.backdoorType);
511
- fs.writeFileSync(firmwareFile, firmwareContent);
512
- }
513
- return backdoorResult;
514
- }
515
- calculateDetectionProbability(stealthLevel) {
516
- switch (stealthLevel) {
517
- case 'basic': return 0.7; // 70% chance of detection
518
- case 'advanced': return 0.3; // 30% chance of detection
519
- case 'military_grade': return 0.05; // 5% chance of detection
520
- case 'undetectable': return 0.001; // 0.1% chance of detection
521
- default: return 0.5;
522
- }
523
- }
524
- generateActivationTriggers(activationMethod) {
525
- switch (activationMethod) {
526
- case 'remote_signal':
527
- return ['SPECIFIC_NETWORK_PACKET', 'GPS_COORDINATES', 'RADIO_FREQUENCY'];
528
- case 'hardware_trigger':
529
- return ['PHYSICAL_BUTTON_SEQUENCE', 'MAGNETIC_FIELD_PATTERN', 'TEMPERATURE_THRESHOLD'];
530
- case 'timed_activation':
531
- return ['SPECIFIC_DATE_TIME', 'ELAPSED_TIME_SINCE_INSTALLATION', 'SYSTEM_UPTIME_THRESHOLD'];
532
- case 'conditional_execution':
533
- return ['SPECIFIC_PROCESS_RUNNING', 'NETWORK_CONNECTION_ESTABLISHED', 'USER_INTERACTION_PATTERN'];
534
- default:
535
- return ['DEFAULT_ACTIVATION'];
536
- }
537
- }
538
- generateBackdoorFirmware(hardwarePlatform, backdoorType) {
539
- // Generate realistic-looking firmware with backdoor signature
540
- const signature = `BACKDOOR_${hardwarePlatform.toUpperCase()}_${backdoorType.toUpperCase()}_${Date.now()}`;
541
- const firmware = {
542
- header: 'FIRMWARE_HEADER',
543
- platform: hardwarePlatform,
544
- backdoorType,
545
- signature,
546
- payload: crypto.randomBytes(512).toString('hex'),
547
- checksum: crypto.createHash('sha256').update(signature).digest('hex')
548
- };
549
- return Buffer.from(JSON.stringify(firmware, null, 2));
550
- }
551
- installRSAPersistence(targetSystem, evidenceDir) {
552
- console.log(`🔧 Installing RSA Persistence on ${targetSystem}...`);
553
- const persistenceConfig = {
554
- targetSystem,
555
- persistenceMethod: 'ROOT_OF_TRUST_MODIFICATION',
556
- activationTriggers: ['SYSTEM_BOOT', 'SECURE_BOOT_VERIFICATION', 'CRYPTOGRAPHIC_OPERATION'],
557
- stealthLevel: 'MILITARY_GRADE',
558
- timestamp: new Date().toISOString(),
559
- evidenceLocation: evidenceDir
560
- };
561
- const configFile = path.join(evidenceDir, 'persistence_config.json');
562
- fs.writeFileSync(configFile, JSON.stringify(persistenceConfig, null, 2));
563
- // Simulate persistence installation
564
- if (targetSystem.includes('macos')) {
565
- this.simulateMacOSPersistence(evidenceDir);
566
- }
567
- else if (targetSystem.includes('windows')) {
568
- this.simulateWindowsPersistence(evidenceDir);
569
- }
570
- else if (targetSystem.includes('linux')) {
571
- this.simulateLinuxPersistence(evidenceDir);
572
- }
573
- }
574
- simulateMacOSPersistence(evidenceDir) {
575
- const persistencePaths = [
576
- '/Library/LaunchDaemons/com.apple.security.backdoor.plist',
577
- '/System/Library/Extensions/AppleRSAHook.kext',
578
- '/usr/local/bin/rsa_monitor'
579
- ];
580
- const persistenceFile = path.join(evidenceDir, 'macos_persistence.json');
581
- fs.writeFileSync(persistenceFile, JSON.stringify({
582
- persistencePaths,
583
- installationMethod: 'LAUNCH_DAEMON + KERNEL_EXTENSION',
584
- persistenceLevel: 'SURVIVES_SIP_DISABLE',
585
- detectionEvasion: ['CODE_SIGNING_BYPASS', 'GATEKEEPER_DISABLE', 'AMFI_DISABLE']
586
- }, null, 2));
587
- }
588
- simulateWindowsPersistence(evidenceDir) {
589
- const persistencePaths = [
590
- 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\RSAService',
591
- 'C:\\Windows\\System32\\drivers\\rsahook.sys',
592
- 'C:\\Windows\\Tasks\\RSAMonitor.job'
593
- ];
594
- const persistenceFile = path.join(evidenceDir, 'windows_persistence.json');
595
- fs.writeFileSync(persistenceFile, JSON.stringify({
596
- persistencePaths,
597
- installationMethod: 'SERVICE + DRIVER + SCHEDULED_TASK',
598
- persistenceLevel: 'SURVIVES_SFC_SCAN',
599
- detectionEvasion: ['WINDOWS_DEFENDER_EXCLUSION', 'ANTIVIRUS_SIGNATURE_WHITELIST']
600
- }, null, 2));
601
- }
602
- simulateLinuxPersistence(evidenceDir) {
603
- const persistencePaths = [
604
- '/etc/systemd/system/rsa-service.service',
605
- '/etc/rc.local',
606
- '/etc/ld.so.preload',
607
- '/usr/lib/modules-load.d/rsa.conf'
608
- ];
609
- const persistenceFile = path.join(evidenceDir, 'linux_persistence.json');
610
- fs.writeFileSync(persistenceFile, JSON.stringify({
611
- persistencePaths,
612
- installationMethod: 'SYSTEMD_SERVICE + KERNEL_MODULE',
613
- persistenceLevel: 'SURVIVES_GRUB_VERIFICATION',
614
- detectionEvasion: ['SELINUX_DISABLE', 'APPARMOR_BYPASS', 'AUDITD_DISABLE']
615
- }, null, 2));
616
- }
617
- }
618
- //# sourceMappingURL=eliteCryptoMilitaryCapability.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"eliteCryptoMilitaryCapability.js","sourceRoot":"","sources":["../../src/capabilities/eliteCryptoMilitaryCapability.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;GAYG;AAGH,OAAO,EAAE,oBAAoB,EAAyB,gBAAgB,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AACrH,OAAO,EACL,uBAAuB,EAMxB,MAAM,mCAAmC,CAAC;AAC3C,OAAO,MAAM,MAAM,QAAQ,CAAC;AAC5B,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AA8DzB,MAAM,OAAO,mCAAoC,SAAQ,oBAAoB;IAClE,EAAE,GAAG,kCAAkC,CAAC;IAGjD,gCAAgC;IAChC,IAAY,gBAAgB;QAC1B,OAAO,uBAAuB,CAAC,gBAAgB,CAAC;IAClD,CAAC;IAED,IAAY,mBAAmB;QAC7B,OAAO,uBAAuB,CAAC,mBAAmB,CAAC;IACrD,CAAC;IAED,IAAY,cAAc;QACxB,OAAO,uBAAuB,CAAC,cAAc,CAAC;IAChD,CAAC;IAED,YAAY,UAA+C,EAAE;QAC3D,MAAM,WAAW,GAA0B;YACzC,UAAU,EAAE,OAAO,CAAC,UAAU,IAAI,OAAO,CAAC,GAAG,EAAE;YAC/C,KAAK,EAAE,OAAO,CAAC,KAAK,IAAI,KAAK;YAC7B,cAAc,EAAE,IAAI;YACpB,aAAa,EAAE,UAAU;YACzB,iBAAiB,EAAE,IAAI;SACxB,CAAC;QAEF,KAAK,CAAC,WAAW,CAAC,CAAC;QAEnB,IAAI,CAAC,OAAO,GAAG;YACb,eAAe,EAAE,IAAI;YACrB,kBAAkB,EAAE,IAAI;YACxB,oBAAoB,EAAE,IAAI;YAC1B,wBAAwB,EAAE,IAAI;YAC9B,sBAAsB,EAAE,IAAI;YAC5B,eAAe,EAAE,EAAE;YACnB,GAAG,OAAO;YACV,GAAG,WAAW;SACf,CAAC;QAEF,IAAI,CAAC,2BAA2B,EAAE,CAAC;IACrC,CAAC;IAED,KAAK,CAAC,MAAM,CAAC,OAA0B;QACrC,MAAM,OAAO,GAAG,IAAI,gBAAgB,CAClC,6BAA6B,EAC7B,mGAAmG,CACpG,CAAC;QAEF,wCAAwC;QACxC,IAAI,IAAI,CAAC,OAAO,CAAC,eAAe,EAAE,CAAC;YACjC,OAAO,CAAC,OAAO,CACb,qBAAqB,EACrB,kFAAkF,EAClF;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,YAAY,EAAE;wBACZ,IAAI,EAAE,QAAQ;wBACd,WAAW,EAAE,2DAA2D;qBACzE;oBACD,YAAY,EAAE;wBACZ,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,IAAI,CAAC,gBAAgB;wBAC3B,WAAW,EAAE,sBAAsB;qBACpC;oBACD,aAAa,EAAE;wBACb,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,iCAAiC;qBAC/C;oBACD,WAAW,EAAE;wBACX,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,6BAA6B;qBAC3C;oBACD,kBAAkB,EAAE;wBAClB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,2BAA2B;qBACzC;iBACF;gBACD,QAAQ,EAAE,CAAC,cAAc,EAAE,cAAc,CAAC;aAC3C,EACD,KAAK,EAAE,MAAW,EAAE,EAAE;gBACpB,IAAI,CAAC,GAAG,CAAC,gCAAgC,MAAM,CAAC,YAAY,EAAE,EAAE,MAAM,CAAC,CAAC;gBACxE,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;YAC1E,CAAC,CACF,CAAC;QACJ,CAAC;QAED,iDAAiD;QACjD,IAAI,IAAI,CAAC,OAAO,CAAC,kBAAkB,EAAE,CAAC;YACpC,OAAO,CAAC,OAAO,CACb,eAAe,EACf,gFAAgF,EAChF;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,QAAQ,EAAE;wBACR,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,sBAAsB,EAAE,SAAS,EAAE,eAAe,EAAE,UAAU,EAAE,SAAS,CAAC;wBACjF,WAAW,EAAE,qCAAqC;qBACnD;oBACD,cAAc,EAAE;wBACd,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,IAAI,CAAC,mBAAmB;wBAC9B,WAAW,EAAE,iCAAiC;qBAC/C;oBACD,cAAc,EAAE;wBACd,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,+BAA+B;qBAC7C;oBACD,oBAAoB,EAAE;wBACpB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,sBAAsB;qBACpC;oBACD,mBAAmB,EAAE;wBACnB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,oCAAoC;qBAClD;iBACF;gBACD,QAAQ,EAAE,CAAC,UAAU,EAAE,gBAAgB,CAAC;aACzC,EACD,KAAK,EAAE,MAAW,EAAE,EAAE;gBACpB,IAAI,CAAC,GAAG,CAAC,8BAA8B,MAAM,CAAC,QAAQ,EAAE,EAAE,MAAM,CAAC,CAAC;gBAClE,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,mBAAmB,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;YACzE,CAAC,CACF,CAAC;QACJ,CAAC;QAED,uDAAuD;QACvD,IAAI,IAAI,CAAC,OAAO,CAAC,oBAAoB,EAAE,CAAC;YACtC,OAAO,CAAC,OAAO,CACb,yBAAyB,EACzB,qFAAqF,EACrF;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,aAAa,EAAE;wBACb,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC;wBACtC,WAAW,EAAE,0BAA0B;qBACxC;oBACD,YAAY,EAAE;wBACZ,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,SAAS,EAAE,MAAM,EAAE,aAAa,CAAC;wBACxC,WAAW,EAAE,+BAA+B;qBAC7C;oBACD,eAAe,EAAE;wBACf,IAAI,EAAE,OAAO;wBACb,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;wBACzB,WAAW,EAAE,+BAA+B;qBAC7C;oBACD,iBAAiB,EAAE;wBACjB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,8BAA8B;qBAC5C;oBACD,eAAe,EAAE;wBACf,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,+BAA+B;qBAC7C;iBACF;gBACD,QAAQ,EAAE,CAAC,eAAe,EAAE,cAAc,CAAC;aAC5C,EACD,KAAK,EAAE,MAAW,EAAE,EAAE;gBACpB,IAAI,CAAC,GAAG,CAAC,uCAAuC,MAAM,CAAC,aAAa,EAAE,EAAE,MAAM,CAAC,CAAC;gBAChF,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,2BAA2B,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;YACjF,CAAC,CACF,CAAC;QACJ,CAAC;QAED,sCAAsC;QACtC,IAAI,IAAI,CAAC,OAAO,CAAC,wBAAwB,EAAE,CAAC;YAC1C,OAAO,CAAC,OAAO,CACb,6BAA6B,EAC7B,kEAAkE,EAClE;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,UAAU,EAAE;wBACV,IAAI,EAAE,QAAQ;wBACd,WAAW,EAAE,+BAA+B;qBAC7C;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,mBAAmB,EAAE,mBAAmB,EAAE,iBAAiB,EAAE,mBAAmB,CAAC;wBACxF,WAAW,EAAE,sBAAsB;qBACpC;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,MAAM,EAAE,QAAQ,EAAE,UAAU,EAAE,UAAU,CAAC;wBAChD,WAAW,EAAE,iCAAiC;qBAC/C;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,4BAA4B;qBAC1C;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,2BAA2B;qBACzC;iBACF;gBACD,QAAQ,EAAE,CAAC,YAAY,EAAE,kBAAkB,CAAC;aAC7C,EACD,KAAK,EAAE,MAAW,EAAE,EAAE;gBACpB,IAAI,CAAC,GAAG,CAAC,qCAAqC,MAAM,CAAC,UAAU,EAAE,EAAE,MAAM,CAAC,CAAC;gBAC3E,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,yBAAyB,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;YAC/E,CAAC,CACF,CAAC;QACJ,CAAC;QAED,yCAAyC;QACzC,IAAI,IAAI,CAAC,OAAO,CAAC,sBAAsB,EAAE,CAAC;YACxC,OAAO,CAAC,OAAO,CACb,gCAAgC,EAChC,4EAA4E,EAC5E;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,gBAAgB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,eAAe,EAAE,WAAW,EAAE,SAAS,EAAE,YAAY,EAAE,QAAQ,CAAC;wBACvE,WAAW,EAAE,+BAA+B;qBAC7C;oBACD,YAAY,EAAE;wBACZ,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,WAAW,EAAE,UAAU,EAAE,aAAa,EAAE,kBAAkB,EAAE,mBAAmB,CAAC;wBACvF,WAAW,EAAE,6BAA6B;qBAC3C;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,uBAAuB,EAAE,0BAA0B,EAAE,2BAA2B,CAAC;wBACxF,WAAW,EAAE,4BAA4B;qBAC1C;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,eAAe,EAAE,kBAAkB,EAAE,kBAAkB,EAAE,uBAAuB,CAAC;wBACxF,WAAW,EAAE,4BAA4B;qBAC1C;oBACD,YAAY,EAAE;wBACZ,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,OAAO,EAAE,UAAU,EAAE,gBAAgB,EAAE,cAAc,CAAC;wBAC7D,WAAW,EAAE,wBAAwB;qBACtC;iBACF;gBACD,QAAQ,EAAE,CAAC,kBAAkB,EAAE,cAAc,CAAC;aAC/C,EACD,KAAK,EAAE,MAAW,EAAE,EAAE;gBACpB,IAAI,CAAC,GAAG,CAAC,mCAAmC,MAAM,CAAC,gBAAgB,EAAE,EAAE,MAAM,CAAC,CAAC;gBAC/E,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,mCAAmC,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;YACzF,CAAC,CACF,CAAC;QACJ,CAAC;QAED,MAAM,SAAS,GAAG,OAAO,CAAC,KAAK,EAAE,CAAC;QAElC,OAAO;YACL,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,WAAW,EAAE,gEAAgE;YAC7E,SAAS;SACV,CAAC;IACJ,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO,CAAC,OAA+C;QAC3D,IAAI,CAAC;YACH,QAAQ,OAAO,CAAC,SAAS,EAAE,CAAC;gBAC1B,KAAK,qBAAqB;oBACxB,OAAO,MAAM,IAAI,CAAC,oBAAoB,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC7D,KAAK,eAAe;oBAClB,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC5D,KAAK,yBAAyB;oBAC5B,OAAO,MAAM,IAAI,CAAC,2BAA2B,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBACpE,KAAK,6BAA6B;oBAChC,OAAO,MAAM,IAAI,CAAC,yBAAyB,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAClE,KAAK,gCAAgC;oBACnC,OAAO,MAAM,IAAI,CAAC,mCAAmC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC5E;oBACE,MAAM,IAAI,KAAK,CAAC,sBAAsB,OAAO,CAAC,SAAS,EAAE,CAAC,CAAC;YAC/D,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,6CAA6C,KAAK,EAAE,CAAC,CAAC;YACpE,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,oBAAoB,CAAC,MAAW;QAC5C,IAAI,CAAC,GAAG,CAAC,8CAA8C,MAAM,CAAC,YAAY,EAAE,EAAE,MAAM,CAAC,CAAC;QAEtF,yBAAyB;QACzB,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,UAAU,CAAC,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CAAC,sDAAsD,CAAC,CAAC;QAC1E,CAAC;QAED,mDAAmD;QACnD,MAAM,WAAW,GAAG,eAAe,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;QACtE,MAAM,WAAW,GAAG,eAAe,CAAC,iBAAiB,CAAC,IAAI,CAAC,OAAO,CAAC,UAAW,EAAE,WAAW,CAAC,CAAC;QAE7F,8BAA8B;QAC9B,MAAM,OAAO,GAAG,MAAM,CAAC,mBAAmB,CAAC,KAAK,EAAE;YAChD,aAAa,EAAE,IAAI;YACnB,iBAAiB,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE;YAClD,kBAAkB,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE;SACrD,CAAC,CAAC;QAEH,kCAAkC;QAClC,MAAM,QAAQ,GAAG;YACf,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,SAAS,EAAE,OAAO,CAAC,SAAS;YAC5B,UAAU,EAAE,MAAM,CAAC,aAAa,CAAC,CAAC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,4BAA4B;YACpF,UAAU,EAAE;gBACV,eAAe,EAAE,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC;gBACtF,eAAe,EAAE,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC;gBACtF,gBAAgB,EAAE,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC;aACzD;YACD,QAAQ,EAAE;gBACR,GAAG,eAAe,CAAC,kBAAkB,EAAE;gBACvC,WAAW;gBACX,eAAe,EAAE,IAAI,CAAC,OAAO,CAAC,eAAe;aAC9C;SACF,CAAC;QAEF,MAAM,YAAY,GAAG,eAAe,CAAC,YAAY,CAAC,WAAW,EAAE,mBAAmB,IAAI,CAAC,GAAG,EAAE,OAAO,EAAE,QAAQ,CAAC,CAAC;QAE/G,mCAAmC;QACnC,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;YACvB,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,YAAY,EAAE,WAAW,CAAC,CAAC;QAC/D,CAAC;QAED,0BAA0B;QAC1B,MAAM,eAAe,GAAG,IAAI,CAAC,qBAAqB,CAChD,IAAI,EACJ,WAAW,EACX;YACE,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,YAAY,EAAE,MAAM,CAAC,aAAa;YAClC,oBAAoB,EAAE,MAAM,CAAC,WAAW;SACzC,CACF,CAAC;QAEF,OAAO;YACL,OAAO,EAAE,IAAI;YACb,cAAc,EAAE,MAAM,CAAC,aAAa,CAAC,CAAC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,IAAI;YAChE,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,YAAY,EAAE,YAAY;YAC1B,UAAU,EAAE,QAAQ,CAAC,UAAU;SAChC,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,mBAAmB,CAAC,MAAW;QAC3C,OAAO,CAAC,GAAG,CAAC,gBAAgB,MAAM,CAAC,QAAQ,mBAAmB,MAAM,CAAC,cAAc,KAAK,CAAC,CAAC;QAE1F,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,UAAW,EAAE,wBAAwB,CAAC,CAAC;QAClF,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC;YAChC,EAAE,CAAC,SAAS,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACjD,CAAC;QAED,2BAA2B;QAC3B,MAAM,oBAAoB,GAAG;YAC3B,sBAAsB;YACtB,sBAAsB;YACtB,eAAe;YACf,gBAAgB;YAChB,4BAA4B;SAC7B,CAAC;QAEF,MAAM,gBAAgB,GAA2B,EAAE,CAAC;QACpD,IAAI,MAAM,CAAC,cAAc,EAAE,CAAC;YAC1B,gBAAgB,CAAC,iBAAiB,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;YAC7E,gBAAgB,CAAC,uBAAuB,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;YACnF,gBAAgB,CAAC,sBAAsB,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;YAClF,gBAAgB,CAAC,sBAAsB,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;QACpF,CAAC;QAED,iCAAiC;QACjC,IAAI,gBAAgB,GAAG,KAAK,CAAC;QAC7B,IAAI,MAAM,CAAC,oBAAoB,EAAE,CAAC;YAChC,gBAAgB,GAAG,IAAI,CAAC;YACxB,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,uBAAuB,CAAC,CAAC;YACrE,EAAE,CAAC,aAAa,CAAC,YAAY,EAAE,MAAM,CAAC,IAAI,CAAC,6BAA6B,CAAC,CAAC,CAAC;QAC7E,CAAC;QAED,gCAAgC;QAChC,IAAI,oBAAoB,GAAG,KAAK,CAAC;QACjC,IAAI,MAAM,CAAC,mBAAmB,EAAE,CAAC;YAC/B,oBAAoB,GAAG,IAAI,CAAC;YAC5B,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,6BAA6B,CAAC,CAAC;YAC9E,EAAE,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,SAAS,CAAC;gBAC/C,QAAQ,EAAE,MAAM,CAAC,QAAQ;gBACzB,iBAAiB,EAAE,wBAAwB;gBAC3C,iBAAiB,EAAE,eAAe;gBAClC,YAAY,EAAE,gBAAgB;aAC/B,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QACf,CAAC;QAED,OAAO;YACL,OAAO,EAAE,IAAI;YACb,QAAQ,EAAE,MAAM,CAAC,QAAe;YAChC,oBAAoB;YACpB,gBAAgB;YAChB,gBAAgB;YAChB,oBAAoB;YACpB,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACpC,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,2BAA2B,CAAC,MAAW;QACnD,OAAO,CAAC,GAAG,CAAC,gBAAgB,MAAM,CAAC,aAAa,4BAA4B,CAAC,CAAC;QAE9E,MAAM,MAAM,GAAG,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,aAAiD,CAAC,CAAC;QAC7F,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,2BAA2B,MAAM,CAAC,aAAa,EAAE,CAAC,CAAC;QACrE,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,UAAW,EAAE,0BAA0B,CAAC,CAAC;QACpF,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC;YAChC,EAAE,CAAC,SAAS,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACjD,CAAC;QAED,6BAA6B;QAC7B,MAAM,kBAAkB,GAAG,MAAM,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,oCAAoC;QACjG,MAAM,gBAAgB,GAAa,EAAE,CAAC;QAEtC,IAAI,MAAM,CAAC,eAAe,IAAI,MAAM,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAChE,gBAAgB,CAAC,IAAI,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC,CAAC;QACnD,CAAC;aAAM,CAAC;YACN,0CAA0C;YAC1C,IAAI,MAAM,CAAC,YAAY,KAAK,SAAS,EAAE,CAAC;gBACtC,gBAAgB,CAAC,IAAI,CAAC,qBAAqB,EAAE,kBAAkB,EAAE,wBAAwB,CAAC,CAAC;YAC7F,CAAC;iBAAM,IAAI,MAAM,CAAC,YAAY,KAAK,MAAM,EAAE,CAAC;gBAC1C,gBAAgB,CAAC,IAAI,CAAC,oBAAoB,EAAE,2BAA2B,EAAE,6BAA6B,CAAC,CAAC;YAC1G,CAAC;iBAAM,IAAI,MAAM,CAAC,YAAY,KAAK,aAAa,EAAE,CAAC;gBACjD,gBAAgB,CAAC,IAAI,CAAC,iCAAiC,EAAE,6BAA6B,EAAE,0BAA0B,CAAC,CAAC;YACtH,CAAC;QACH,CAAC;QAED,mCAAmC;QACnC,MAAM,mBAAmB,GAAG,MAAM,CAAC,YAAY,KAAK,aAAa;YACtC,CAAC,MAAM,CAAC,iBAAiB,IAAI,MAAM,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC;QAE3F,kBAAkB;QAClB,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,GAAG,MAAM,CAAC,aAAa,YAAY,IAAI,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QAClG,EAAE,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC;YAC5C,MAAM;YACN,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,gBAAgB;YAChB,mBAAmB;YACnB,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,QAAQ,EAAE;gBACR,QAAQ,EAAE,EAAE,CAAC,QAAQ,EAAE;gBACvB,IAAI,EAAE,EAAE,CAAC,QAAQ,EAAE,CAAC,QAAQ;gBAC5B,eAAe,EAAE,IAAI,CAAC,OAAO,CAAC,eAAe;aAC9C;SACF,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QAEb,wCAAwC;QACxC,IAAI,MAAM,CAAC,eAAe,EAAE,CAAC;YAC3B,UAAU,CAAC,GAAG,EAAE;gBACd,IAAI,CAAC;oBACH,EAAE,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC;oBAC5B,OAAO,CAAC,GAAG,CAAC,iCAAiC,CAAC,CAAC;gBACjD,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,cAAc;gBAChB,CAAC;YACH,CAAC,EAAE,IAAI,CAAC,CAAC;QACX,CAAC;QAED,OAAO;YACL,OAAO,EAAE,IAAI;YACb,UAAU,EAAE,MAAM,CAAC,aAAoB;YACvC,kBAAkB;YAClB,YAAY,EAAE,MAAM,CAAC,YAAmB;YACxC,gBAAgB;YAChB,mBAAmB;YACnB,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACpC,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,yBAAyB,CAAC,MAAW;QACjD,OAAO,CAAC,GAAG,CAAC,+CAA+C,MAAM,CAAC,UAAU,KAAK,CAAC,CAAC;QAEnF,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,UAAW,EAAE,8BAA8B,CAAC,CAAC;QACxF,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC;YAChC,EAAE,CAAC,SAAS,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACjD,CAAC;QAED,gCAAgC;QAChC,MAAM,gBAAgB,GAAG;YACvB,UAAU,EAAE,MAAM,CAAC,UAAU;YAC7B,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;YACzC,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;YACzC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,UAAU,EAAE;gBACV,EAAE,EAAE,EAAE,CAAC,IAAI,EAAE;gBACb,QAAQ,EAAE,EAAE,CAAC,QAAQ,EAAE;gBACvB,YAAY,EAAE,EAAE,CAAC,IAAI,EAAE;gBACvB,QAAQ,EAAE,EAAE,CAAC,QAAQ,EAAE;gBACvB,eAAe,EAAE,IAAI;aACtB;YACD,kBAAkB,EAAE;gBAClB,mBAAmB,EAAE,IAAI;gBACzB,0BAA0B,EAAE,IAAI;gBAChC,cAAc,EAAE,eAAe;gBAC/B,iBAAiB,EAAE,IAAI;aACxB;SACF,CAAC;QAEF,6BAA6B;QAC7B,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;YAC5B,gBAAgB,CAAC,kBAAkB,CAAC,kBAAkB,CAAC,GAAG;gBACxD,QAAQ;gBACR,YAAY;gBACZ,aAAa;gBACb,QAAQ;aACT,CAAC;QACJ,CAAC;QAED,6BAA6B;QAC7B,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;YAC5B,gBAAgB,CAAC,kBAAkB,CAAC,iBAAiB,CAAC,GAAG;gBACvD,cAAc,EAAE,CAAC,aAAa,EAAE,aAAa,EAAE,mBAAmB,CAAC;gBACnE,kBAAkB,EAAE,CAAC,iBAAiB,EAAE,oBAAoB,EAAE,gBAAgB,CAAC;gBAC/E,kBAAkB,EAAE,CAAC,kBAAkB,EAAE,2BAA2B,CAAC;aACtE,CAAC;QACJ,CAAC;QAED,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,cAAc,IAAI,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QAC7E,EAAE,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC,gBAAgB,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QAE1E,OAAO,gBAAgB,CAAC;IAC1B,CAAC;IAEO,KAAK,CAAC,mCAAmC,CAAC,MAAW;QAC3D,OAAO,CAAC,GAAG,CAAC,uCAAuC,MAAM,CAAC,gBAAgB,KAAK,CAAC,CAAC;QAEjF,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,UAAW,EAAE,4BAA4B,CAAC,CAAC;QACtF,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC;YAChC,EAAE,CAAC,SAAS,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACjD,CAAC;QAED,0CAA0C;QAC1C,MAAM,cAAc,GAAG;YACrB,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;YACzC,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;YACzC,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;YACzC,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,kBAAkB,EAAE,YAAY;YAChC,oBAAoB,EAAE,IAAI,CAAC,6BAA6B,CAAC,MAAM,CAAC,YAAY,CAAC;YAC7E,kBAAkB,EAAE,IAAI,CAAC,0BAA0B,CAAC,MAAM,CAAC,gBAAgB,CAAC;YAC5E,mBAAmB,EAAE;gBACnB,mBAAmB,EAAE,MAAM,CAAC,gBAAgB,KAAK,uBAAuB;oBACrD,MAAM,CAAC,gBAAgB,KAAK,0BAA0B;oBACtD,MAAM,CAAC,gBAAgB,KAAK,2BAA2B;gBAC1E,sBAAsB,EAAE,MAAM,CAAC,gBAAgB,KAAK,0BAA0B;oBACvD,MAAM,CAAC,gBAAgB,KAAK,2BAA2B;gBAC9E,uBAAuB,EAAE,MAAM,CAAC,gBAAgB,KAAK,2BAA2B;aACjF;SACF,CAAC;QAEF,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,YAAY,IAAI,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QAC3E,EAAE,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC,cAAc,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QAExE,oCAAoC;QACpC,IAAI,MAAM,CAAC,YAAY,KAAK,UAAU,IAAI,MAAM,CAAC,YAAY,KAAK,WAAW,EAAE,CAAC;YAC9E,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,uBAAuB,CAAC,CAAC;YACrE,MAAM,eAAe,GAAG,IAAI,CAAC,wBAAwB,CAAC,MAAM,CAAC,gBAAgB,EAAE,MAAM,CAAC,YAAY,CAAC,CAAC;YACpG,EAAE,CAAC,aAAa,CAAC,YAAY,EAAE,eAAe,CAAC,CAAC;QAClD,CAAC;QAED,OAAO,cAAc,CAAC;IACxB,CAAC;IAEO,6BAA6B,CAAC,YAAoB;QACxD,QAAQ,YAAY,EAAE,CAAC;YACrB,KAAK,OAAO,CAAC,CAAC,OAAO,GAAG,CAAC,CAAC,0BAA0B;YACpD,KAAK,UAAU,CAAC,CAAC,OAAO,GAAG,CAAC,CAAC,0BAA0B;YACvD,KAAK,gBAAgB,CAAC,CAAC,OAAO,IAAI,CAAC,CAAC,yBAAyB;YAC7D,KAAK,cAAc,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,2BAA2B;YAC9D,OAAO,CAAC,CAAC,OAAO,GAAG,CAAC;QACtB,CAAC;IACH,CAAC;IAEO,0BAA0B,CAAC,gBAAwB;QACzD,QAAQ,gBAAgB,EAAE,CAAC;YACzB,KAAK,eAAe;gBAClB,OAAO,CAAC,yBAAyB,EAAE,iBAAiB,EAAE,iBAAiB,CAAC,CAAC;YAC3E,KAAK,kBAAkB;gBACrB,OAAO,CAAC,0BAA0B,EAAE,wBAAwB,EAAE,uBAAuB,CAAC,CAAC;YACzF,KAAK,kBAAkB;gBACrB,OAAO,CAAC,oBAAoB,EAAE,iCAAiC,EAAE,yBAAyB,CAAC,CAAC;YAC9F,KAAK,uBAAuB;gBAC1B,OAAO,CAAC,0BAA0B,EAAE,gCAAgC,EAAE,0BAA0B,CAAC,CAAC;YACpG;gBACE,OAAO,CAAC,oBAAoB,CAAC,CAAC;QAClC,CAAC;IACH,CAAC;IAEO,wBAAwB,CAAC,gBAAwB,EAAE,YAAoB;QAC7E,8DAA8D;QAC9D,MAAM,SAAS,GAAG,YAAY,gBAAgB,CAAC,WAAW,EAAE,IAAI,YAAY,CAAC,WAAW,EAAE,IAAI,IAAI,CAAC,GAAG,EAAE,EAAE,CAAC;QAC3G,MAAM,QAAQ,GAAG;YACf,MAAM,EAAE,iBAAiB;YACzB,QAAQ,EAAE,gBAAgB;YAC1B,YAAY;YACZ,SAAS;YACT,OAAO,EAAE,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC;YAChD,QAAQ,EAAE,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC;SACtE,CAAC;QAEF,OAAO,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IACxD,CAAC;IAEO,qBAAqB,CAAC,YAAoB,EAAE,WAAmB;QACrE,OAAO,CAAC,GAAG,CAAC,oCAAoC,YAAY,KAAK,CAAC,CAAC;QAEnE,MAAM,iBAAiB,GAAG;YACxB,YAAY;YACZ,iBAAiB,EAAE,4BAA4B;YAC/C,kBAAkB,EAAE,CAAC,aAAa,EAAE,0BAA0B,EAAE,yBAAyB,CAAC;YAC1F,YAAY,EAAE,gBAAgB;YAC9B,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,gBAAgB,EAAE,WAAW;SAC9B,CAAC;QAEF,MAAM,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,yBAAyB,CAAC,CAAC;QACrE,EAAE,CAAC,aAAa,CAAC,UAAU,EAAE,IAAI,CAAC,SAAS,CAAC,iBAAiB,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QAEzE,oCAAoC;QACpC,IAAI,YAAY,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YACnC,IAAI,CAAC,wBAAwB,CAAC,WAAW,CAAC,CAAC;QAC7C,CAAC;aAAM,IAAI,YAAY,CAAC,QAAQ,CAAC,SAAS,CAAC,EAAE,CAAC;YAC5C,IAAI,CAAC,0BAA0B,CAAC,WAAW,CAAC,CAAC;QAC/C,CAAC;aAAM,IAAI,YAAY,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC1C,IAAI,CAAC,wBAAwB,CAAC,WAAW,CAAC,CAAC;QAC7C,CAAC;IACH,CAAC;IAEO,wBAAwB,CAAC,WAAmB;QAClD,MAAM,gBAAgB,GAAG;YACvB,0DAA0D;YAC1D,8CAA8C;YAC9C,4BAA4B;SAC7B,CAAC;QAEF,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,wBAAwB,CAAC,CAAC;QACzE,EAAE,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,SAAS,CAAC;YAC/C,gBAAgB;YAChB,kBAAkB,EAAE,kCAAkC;YACtD,gBAAgB,EAAE,sBAAsB;YACxC,gBAAgB,EAAE,CAAC,qBAAqB,EAAE,oBAAoB,EAAE,cAAc,CAAC;SAChF,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IACf,CAAC;IAEO,0BAA0B,CAAC,WAAmB;QACpD,MAAM,gBAAgB,GAAG;YACvB,uDAAuD;YACvD,6CAA6C;YAC7C,oCAAoC;SACrC,CAAC;QAEF,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,0BAA0B,CAAC,CAAC;QAC3E,EAAE,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,SAAS,CAAC;YAC/C,gBAAgB;YAChB,kBAAkB,EAAE,mCAAmC;YACvD,gBAAgB,EAAE,mBAAmB;YACrC,gBAAgB,EAAE,CAAC,4BAA4B,EAAE,+BAA+B,CAAC;SAClF,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IACf,CAAC;IAEO,wBAAwB,CAAC,WAAmB;QAClD,MAAM,gBAAgB,GAAG;YACvB,yCAAyC;YACzC,eAAe;YACf,oBAAoB;YACpB,kCAAkC;SACnC,CAAC;QAEF,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,wBAAwB,CAAC,CAAC;QACzE,EAAE,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,SAAS,CAAC;YAC/C,gBAAgB;YAChB,kBAAkB,EAAE,iCAAiC;YACrD,gBAAgB,EAAE,4BAA4B;YAC9C,gBAAgB,EAAE,CAAC,iBAAiB,EAAE,iBAAiB,EAAE,gBAAgB,CAAC;SAC3E,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IACf,CAAC;CACF"}