erosolar-cli 2.1.242 → 2.1.244
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/capabilities/iMessageVerificationCapability.d.ts +31 -0
- package/dist/capabilities/iMessageVerificationCapability.d.ts.map +1 -0
- package/dist/capabilities/iMessageVerificationCapability.js +56 -0
- package/dist/capabilities/iMessageVerificationCapability.js.map +1 -0
- package/dist/capabilities/index.d.ts +2 -0
- package/dist/capabilities/index.d.ts.map +1 -1
- package/dist/capabilities/index.js +2 -0
- package/dist/capabilities/index.js.map +1 -1
- package/dist/capabilities/unifiedInvestigationCapability.d.ts +22 -0
- package/dist/capabilities/unifiedInvestigationCapability.d.ts.map +1 -0
- package/dist/capabilities/unifiedInvestigationCapability.js +41 -0
- package/dist/capabilities/unifiedInvestigationCapability.js.map +1 -0
- package/dist/core/agentOrchestrator.d.ts +161 -1
- package/dist/core/agentOrchestrator.d.ts.map +1 -1
- package/dist/core/agentOrchestrator.js +880 -0
- package/dist/core/agentOrchestrator.js.map +1 -1
- package/dist/core/iMessageVerification.d.ts +408 -0
- package/dist/core/iMessageVerification.d.ts.map +1 -0
- package/dist/core/iMessageVerification.js +883 -0
- package/dist/core/iMessageVerification.js.map +1 -0
- package/dist/core/techFraudInvestigator.d.ts +131 -0
- package/dist/core/techFraudInvestigator.d.ts.map +1 -0
- package/dist/core/techFraudInvestigator.js +992 -0
- package/dist/core/techFraudInvestigator.js.map +1 -0
- package/dist/core/unifiedFraudOrchestrator.d.ts +542 -0
- package/dist/core/unifiedFraudOrchestrator.d.ts.map +1 -0
- package/dist/core/unifiedFraudOrchestrator.js +1449 -0
- package/dist/core/unifiedFraudOrchestrator.js.map +1 -0
- package/dist/plugins/tools/imessageVerification/iMessageVerificationPlugin.d.ts +3 -0
- package/dist/plugins/tools/imessageVerification/iMessageVerificationPlugin.d.ts.map +1 -0
- package/dist/plugins/tools/imessageVerification/iMessageVerificationPlugin.js +14 -0
- package/dist/plugins/tools/imessageVerification/iMessageVerificationPlugin.js.map +1 -0
- package/dist/plugins/tools/nodeDefaults.d.ts.map +1 -1
- package/dist/plugins/tools/nodeDefaults.js +4 -0
- package/dist/plugins/tools/nodeDefaults.js.map +1 -1
- package/dist/plugins/tools/unifiedInvestigation/unifiedInvestigationPlugin.d.ts +3 -0
- package/dist/plugins/tools/unifiedInvestigation/unifiedInvestigationPlugin.d.ts.map +1 -0
- package/dist/plugins/tools/unifiedInvestigation/unifiedInvestigationPlugin.js +14 -0
- package/dist/plugins/tools/unifiedInvestigation/unifiedInvestigationPlugin.js.map +1 -0
- package/dist/tools/iMessageVerificationTools.d.ts +17 -0
- package/dist/tools/iMessageVerificationTools.d.ts.map +1 -0
- package/dist/tools/iMessageVerificationTools.js +842 -0
- package/dist/tools/iMessageVerificationTools.js.map +1 -0
- package/dist/tools/taoTools.d.ts.map +1 -1
- package/dist/tools/taoTools.js +2063 -1
- package/dist/tools/taoTools.js.map +1 -1
- package/dist/tools/unifiedInvestigationTools.d.ts +19 -0
- package/dist/tools/unifiedInvestigationTools.d.ts.map +1 -0
- package/dist/tools/unifiedInvestigationTools.js +851 -0
- package/dist/tools/unifiedInvestigationTools.js.map +1 -0
- package/package.json +1 -1
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* iMessage Verification Capability
|
|
3
|
+
*
|
|
4
|
+
* Provides cryptographic verification of Apple's iMessage PQ3 implementation.
|
|
5
|
+
* This capability enables users to:
|
|
6
|
+
*
|
|
7
|
+
* 1. Monitor IDS key directory for unauthorized changes
|
|
8
|
+
* 2. Perform out-of-band key verification (like Signal safety numbers)
|
|
9
|
+
* 3. Audit Apple's Key Transparency log independently
|
|
10
|
+
* 4. Analyze network traffic for MITM indicators
|
|
11
|
+
* 5. Generate legal evidence of dishonest implementation
|
|
12
|
+
*
|
|
13
|
+
* This fills the gap that Apple refuses to fill:
|
|
14
|
+
* - No public third-party KT auditors
|
|
15
|
+
* - Closed source clients
|
|
16
|
+
* - No independent verification tools
|
|
17
|
+
*/
|
|
18
|
+
import type { CapabilityContribution, CapabilityContext, CapabilityModule } from '../runtime/agentHost.js';
|
|
19
|
+
export interface iMessageVerificationCapabilityOptions {
|
|
20
|
+
workingDir?: string;
|
|
21
|
+
id?: string;
|
|
22
|
+
description?: string;
|
|
23
|
+
}
|
|
24
|
+
export declare class iMessageVerificationCapabilityModule implements CapabilityModule {
|
|
25
|
+
readonly id = "capability.imessage-verification";
|
|
26
|
+
private readonly options;
|
|
27
|
+
constructor(options?: iMessageVerificationCapabilityOptions);
|
|
28
|
+
create(context: CapabilityContext): Promise<CapabilityContribution>;
|
|
29
|
+
}
|
|
30
|
+
export declare const iMessageVerificationCapability: typeof iMessageVerificationCapabilityModule;
|
|
31
|
+
//# sourceMappingURL=iMessageVerificationCapability.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"iMessageVerificationCapability.d.ts","sourceRoot":"","sources":["../../src/capabilities/iMessageVerificationCapability.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;AAEH,OAAO,KAAK,EAAE,sBAAsB,EAAE,iBAAiB,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAG3G,MAAM,WAAW,qCAAqC;IACpD,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,EAAE,CAAC,EAAE,MAAM,CAAC;IACZ,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,qBAAa,oCAAqC,YAAW,gBAAgB;IAC3E,QAAQ,CAAC,EAAE,sCAAsC;IACjD,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAwC;gBAEpD,OAAO,GAAE,qCAA0C;IAIzD,MAAM,CAAC,OAAO,EAAE,iBAAiB,GAAG,OAAO,CAAC,sBAAsB,CAAC;CA4B1E;AAGD,eAAO,MAAM,8BAA8B,6CAAuC,CAAC"}
|
|
@@ -0,0 +1,56 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* iMessage Verification Capability
|
|
3
|
+
*
|
|
4
|
+
* Provides cryptographic verification of Apple's iMessage PQ3 implementation.
|
|
5
|
+
* This capability enables users to:
|
|
6
|
+
*
|
|
7
|
+
* 1. Monitor IDS key directory for unauthorized changes
|
|
8
|
+
* 2. Perform out-of-band key verification (like Signal safety numbers)
|
|
9
|
+
* 3. Audit Apple's Key Transparency log independently
|
|
10
|
+
* 4. Analyze network traffic for MITM indicators
|
|
11
|
+
* 5. Generate legal evidence of dishonest implementation
|
|
12
|
+
*
|
|
13
|
+
* This fills the gap that Apple refuses to fill:
|
|
14
|
+
* - No public third-party KT auditors
|
|
15
|
+
* - Closed source clients
|
|
16
|
+
* - No independent verification tools
|
|
17
|
+
*/
|
|
18
|
+
import { createiMessageVerificationTools } from '../tools/iMessageVerificationTools.js';
|
|
19
|
+
export class iMessageVerificationCapabilityModule {
|
|
20
|
+
id = 'capability.imessage-verification';
|
|
21
|
+
options;
|
|
22
|
+
constructor(options = {}) {
|
|
23
|
+
this.options = options;
|
|
24
|
+
}
|
|
25
|
+
async create(context) {
|
|
26
|
+
const workingDir = this.options.workingDir ?? context.workingDir;
|
|
27
|
+
return {
|
|
28
|
+
id: this.options.id ?? 'imessage-verification.tools.core',
|
|
29
|
+
description: this.options.description ?? `Cryptographic verification of Apple's iMessage end-to-end encryption claims.
|
|
30
|
+
|
|
31
|
+
Provides tools to independently verify whether Apple's iMessage PQ3 implementation
|
|
32
|
+
is honest, or if Apple is capable of/actively performing man-in-the-middle attacks
|
|
33
|
+
despite their E2E encryption claims.
|
|
34
|
+
|
|
35
|
+
Key capabilities:
|
|
36
|
+
• Monitor IDS key directory changes over time
|
|
37
|
+
• Out-of-band key verification (safety number style)
|
|
38
|
+
• Independent Key Transparency log auditing
|
|
39
|
+
• Network traffic analysis for MITM detection
|
|
40
|
+
• Legal evidence generation for fraud claims
|
|
41
|
+
|
|
42
|
+
This capability exists because Apple:
|
|
43
|
+
1. Has no public third-party Key Transparency auditors
|
|
44
|
+
2. Provides closed-source clients (cannot verify implementation)
|
|
45
|
+
3. Controls the key directory (can substitute keys at will)
|
|
46
|
+
4. Markets unverifiable security claims as fact`,
|
|
47
|
+
toolSuite: createiMessageVerificationTools(workingDir),
|
|
48
|
+
metadata: {
|
|
49
|
+
workingDir,
|
|
50
|
+
},
|
|
51
|
+
};
|
|
52
|
+
}
|
|
53
|
+
}
|
|
54
|
+
// Also export as iMessageVerificationCapability for compatibility
|
|
55
|
+
export const iMessageVerificationCapability = iMessageVerificationCapabilityModule;
|
|
56
|
+
//# sourceMappingURL=iMessageVerificationCapability.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"iMessageVerificationCapability.js","sourceRoot":"","sources":["../../src/capabilities/iMessageVerificationCapability.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;AAGH,OAAO,EAAE,+BAA+B,EAAE,MAAM,uCAAuC,CAAC;AAQxF,MAAM,OAAO,oCAAoC;IACtC,EAAE,GAAG,kCAAkC,CAAC;IAChC,OAAO,CAAwC;IAEhE,YAAY,UAAiD,EAAE;QAC7D,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;IACzB,CAAC;IAED,KAAK,CAAC,MAAM,CAAC,OAA0B;QACrC,MAAM,UAAU,GAAG,IAAI,CAAC,OAAO,CAAC,UAAU,IAAI,OAAO,CAAC,UAAU,CAAC;QACjE,OAAO;YACL,EAAE,EAAE,IAAI,CAAC,OAAO,CAAC,EAAE,IAAI,kCAAkC;YACzD,WAAW,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW,IAAI;;;;;;;;;;;;;;;;;gDAiBC;YAC1C,SAAS,EAAE,+BAA+B,CAAC,UAAU,CAAC;YACtD,QAAQ,EAAE;gBACR,UAAU;aACX;SACF,CAAC;IACJ,CAAC;CACF;AAED,kEAAkE;AAClE,MAAM,CAAC,MAAM,8BAA8B,GAAG,oCAAoC,CAAC"}
|
|
@@ -25,4 +25,6 @@ export { ValidationCapabilityModule, type ValidationCapabilityOptions, } from '.
|
|
|
25
25
|
export { BuildCapabilityModule, type BuildCapabilityOptions, } from './buildCapability.js';
|
|
26
26
|
export { TaoCapabilityModule, type TaoCapabilityOptions, } from './taoCapability.js';
|
|
27
27
|
export { IntegrityCapabilityModule, type IntegrityCapabilityOptions, } from './integrityCapability.js';
|
|
28
|
+
export { iMessageVerificationCapabilityModule, type iMessageVerificationCapabilityOptions, } from './iMessageVerificationCapability.js';
|
|
29
|
+
export { UnifiedInvestigationCapabilityModule, type UnifiedInvestigationCapabilityOptions, } from './unifiedInvestigationCapability.js';
|
|
28
30
|
//# sourceMappingURL=index.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/capabilities/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,0BAA0B,EAAE,KAAK,2BAA2B,EAAE,MAAM,2BAA2B,CAAC;AACzG,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EAAE,wBAAwB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,EAAE,oBAAoB,EAAE,KAAK,qBAAqB,EAAE,MAAM,qBAAqB,CAAC;AACvF,OAAO,EAAE,sBAAsB,EAAE,KAAK,uBAAuB,EAAE,MAAM,uBAAuB,CAAC;AAC7F,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EACL,4BAA4B,EAC5B,KAAK,6BAA6B,GACnC,MAAM,6BAA6B,CAAC;AACrC,OAAO,EACL,mBAAmB,EACnB,KAAK,oBAAoB,GAC1B,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,2BAA2B,EAC3B,KAAK,4BAA4B,GAClC,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,2BAA2B,EAC3B,KAAK,4BAA4B,GAClC,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,kCAAkC,EAClC,KAAK,mCAAmC,GACzC,MAAM,mCAAmC,CAAC;AAC3C,OAAO,EACL,uBAAuB,EACvB,KAAK,wBAAwB,GAC9B,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,wBAAwB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AACvD,OAAO,EAAE,mBAAmB,EAAE,MAAM,oBAAoB,CAAC;AACzD,OAAO,EACL,wCAAwC,EACxC,KAAK,yCAAyC,GAC/C,MAAM,yCAAyC,CAAC;AACjD,OAAO,EACL,sCAAsC,EACtC,KAAK,uCAAuC,GAC7C,MAAM,uCAAuC,CAAC;AAC/C,OAAO,EACL,mCAAmC,EACnC,KAAK,oCAAoC,GAC1C,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,qBAAqB,EACrB,KAAK,sBAAsB,GAC5B,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,mBAAmB,EACnB,KAAK,oBAAoB,GAC1B,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,qBAAqB,EACrB,KAAK,sBAAsB,GAC5B,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,+BAA+B,EAC/B,KAAK,gCAAgC,GACtC,MAAM,gCAAgC,CAAC;AACxC,OAAO,EACL,iCAAiC,EACjC,KAAK,kCAAkC,GACxC,MAAM,kCAAkC,CAAC;AAC1C,OAAO,EACL,0BAA0B,EAC1B,KAAK,2BAA2B,GACjC,MAAM,2BAA2B,CAAC;AACnC,OAAO,EACL,qBAAqB,EACrB,KAAK,sBAAsB,GAC5B,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,mBAAmB,EACnB,KAAK,oBAAoB,GAC1B,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,yBAAyB,EACzB,KAAK,0BAA0B,GAChC,MAAM,0BAA0B,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/capabilities/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,0BAA0B,EAAE,KAAK,2BAA2B,EAAE,MAAM,2BAA2B,CAAC;AACzG,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EAAE,wBAAwB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,EAAE,oBAAoB,EAAE,KAAK,qBAAqB,EAAE,MAAM,qBAAqB,CAAC;AACvF,OAAO,EAAE,sBAAsB,EAAE,KAAK,uBAAuB,EAAE,MAAM,uBAAuB,CAAC;AAC7F,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EACL,4BAA4B,EAC5B,KAAK,6BAA6B,GACnC,MAAM,6BAA6B,CAAC;AACrC,OAAO,EACL,mBAAmB,EACnB,KAAK,oBAAoB,GAC1B,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,2BAA2B,EAC3B,KAAK,4BAA4B,GAClC,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,2BAA2B,EAC3B,KAAK,4BAA4B,GAClC,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,kCAAkC,EAClC,KAAK,mCAAmC,GACzC,MAAM,mCAAmC,CAAC;AAC3C,OAAO,EACL,uBAAuB,EACvB,KAAK,wBAAwB,GAC9B,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,wBAAwB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AACvD,OAAO,EAAE,mBAAmB,EAAE,MAAM,oBAAoB,CAAC;AACzD,OAAO,EACL,wCAAwC,EACxC,KAAK,yCAAyC,GAC/C,MAAM,yCAAyC,CAAC;AACjD,OAAO,EACL,sCAAsC,EACtC,KAAK,uCAAuC,GAC7C,MAAM,uCAAuC,CAAC;AAC/C,OAAO,EACL,mCAAmC,EACnC,KAAK,oCAAoC,GAC1C,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,qBAAqB,EACrB,KAAK,sBAAsB,GAC5B,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,mBAAmB,EACnB,KAAK,oBAAoB,GAC1B,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,qBAAqB,EACrB,KAAK,sBAAsB,GAC5B,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,+BAA+B,EAC/B,KAAK,gCAAgC,GACtC,MAAM,gCAAgC,CAAC;AACxC,OAAO,EACL,iCAAiC,EACjC,KAAK,kCAAkC,GACxC,MAAM,kCAAkC,CAAC;AAC1C,OAAO,EACL,0BAA0B,EAC1B,KAAK,2BAA2B,GACjC,MAAM,2BAA2B,CAAC;AACnC,OAAO,EACL,qBAAqB,EACrB,KAAK,sBAAsB,GAC5B,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,mBAAmB,EACnB,KAAK,oBAAoB,GAC1B,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,yBAAyB,EACzB,KAAK,0BAA0B,GAChC,MAAM,0BAA0B,CAAC;AAClC,OAAO,EACL,oCAAoC,EACpC,KAAK,qCAAqC,GAC3C,MAAM,qCAAqC,CAAC;AAC7C,OAAO,EACL,oCAAoC,EACpC,KAAK,qCAAqC,GAC3C,MAAM,qCAAqC,CAAC"}
|
|
@@ -25,4 +25,6 @@ export { ValidationCapabilityModule, } from './validationCapability.js';
|
|
|
25
25
|
export { BuildCapabilityModule, } from './buildCapability.js';
|
|
26
26
|
export { TaoCapabilityModule, } from './taoCapability.js';
|
|
27
27
|
export { IntegrityCapabilityModule, } from './integrityCapability.js';
|
|
28
|
+
export { iMessageVerificationCapabilityModule, } from './iMessageVerificationCapability.js';
|
|
29
|
+
export { UnifiedInvestigationCapabilityModule, } from './unifiedInvestigationCapability.js';
|
|
28
30
|
//# sourceMappingURL=index.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/capabilities/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,0BAA0B,EAAoC,MAAM,2BAA2B,CAAC;AACzG,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EAAE,wBAAwB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,EAAE,oBAAoB,EAA8B,MAAM,qBAAqB,CAAC;AACvF,OAAO,EAAE,sBAAsB,EAAgC,MAAM,uBAAuB,CAAC;AAC7F,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EACL,4BAA4B,GAE7B,MAAM,6BAA6B,CAAC;AACrC,OAAO,EACL,mBAAmB,GAEpB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,2BAA2B,GAE5B,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,2BAA2B,GAE5B,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,kCAAkC,GAEnC,MAAM,mCAAmC,CAAC;AAC3C,OAAO,EACL,uBAAuB,GAExB,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,wBAAwB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AACvD,OAAO,EAAE,mBAAmB,EAAE,MAAM,oBAAoB,CAAC;AACzD,OAAO,EACL,wCAAwC,GAEzC,MAAM,yCAAyC,CAAC;AACjD,OAAO,EACL,sCAAsC,GAEvC,MAAM,uCAAuC,CAAC;AAC/C,OAAO,EACL,mCAAmC,GAEpC,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,qBAAqB,GAEtB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,mBAAmB,GAEpB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,qBAAqB,GAEtB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,+BAA+B,GAEhC,MAAM,gCAAgC,CAAC;AACxC,OAAO,EACL,iCAAiC,GAElC,MAAM,kCAAkC,CAAC;AAC1C,OAAO,EACL,0BAA0B,GAE3B,MAAM,2BAA2B,CAAC;AACnC,OAAO,EACL,qBAAqB,GAEtB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,mBAAmB,GAEpB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,yBAAyB,GAE1B,MAAM,0BAA0B,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/capabilities/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,0BAA0B,EAAoC,MAAM,2BAA2B,CAAC;AACzG,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EAAE,wBAAwB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,EAAE,oBAAoB,EAA8B,MAAM,qBAAqB,CAAC;AACvF,OAAO,EAAE,sBAAsB,EAAgC,MAAM,uBAAuB,CAAC;AAC7F,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EACL,4BAA4B,GAE7B,MAAM,6BAA6B,CAAC;AACrC,OAAO,EACL,mBAAmB,GAEpB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,2BAA2B,GAE5B,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,2BAA2B,GAE5B,MAAM,4BAA4B,CAAC;AACpC,OAAO,EACL,kCAAkC,GAEnC,MAAM,mCAAmC,CAAC;AAC3C,OAAO,EACL,uBAAuB,GAExB,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,wBAAwB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AACvD,OAAO,EAAE,mBAAmB,EAAE,MAAM,oBAAoB,CAAC;AACzD,OAAO,EACL,wCAAwC,GAEzC,MAAM,yCAAyC,CAAC;AACjD,OAAO,EACL,sCAAsC,GAEvC,MAAM,uCAAuC,CAAC;AAC/C,OAAO,EACL,mCAAmC,GAEpC,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,qBAAqB,GAEtB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,mBAAmB,GAEpB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,qBAAqB,GAEtB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,+BAA+B,GAEhC,MAAM,gCAAgC,CAAC;AACxC,OAAO,EACL,iCAAiC,GAElC,MAAM,kCAAkC,CAAC;AAC1C,OAAO,EACL,0BAA0B,GAE3B,MAAM,2BAA2B,CAAC;AACnC,OAAO,EACL,qBAAqB,GAEtB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,mBAAmB,GAEpB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,yBAAyB,GAE1B,MAAM,0BAA0B,CAAC;AAClC,OAAO,EACL,oCAAoC,GAErC,MAAM,qCAAqC,CAAC;AAC7C,OAAO,EACL,oCAAoC,GAErC,MAAM,qCAAqC,CAAC"}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Unified Investigation Capability
|
|
3
|
+
*
|
|
4
|
+
* Provides unified tech fraud investigation across multiple platforms:
|
|
5
|
+
* - Apple iMessage (key substitution, false E2E claims)
|
|
6
|
+
* - Google Gmail (hidden threads, draft manipulation, unauthorized access)
|
|
7
|
+
* - Google Chrome (unauthorized launches, session hijacking)
|
|
8
|
+
* - Cross-platform correlation
|
|
9
|
+
*/
|
|
10
|
+
import type { CapabilityContribution, CapabilityContext, CapabilityModule } from '../runtime/agentHost.js';
|
|
11
|
+
export interface UnifiedInvestigationCapabilityOptions {
|
|
12
|
+
workingDir?: string;
|
|
13
|
+
id?: string;
|
|
14
|
+
description?: string;
|
|
15
|
+
}
|
|
16
|
+
export declare class UnifiedInvestigationCapabilityModule implements CapabilityModule {
|
|
17
|
+
readonly id = "capability.unified-investigation";
|
|
18
|
+
private readonly options;
|
|
19
|
+
constructor(options?: UnifiedInvestigationCapabilityOptions);
|
|
20
|
+
create(context: CapabilityContext): Promise<CapabilityContribution>;
|
|
21
|
+
}
|
|
22
|
+
//# sourceMappingURL=unifiedInvestigationCapability.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"unifiedInvestigationCapability.d.ts","sourceRoot":"","sources":["../../src/capabilities/unifiedInvestigationCapability.ts"],"names":[],"mappings":"AAAA;;;;;;;;GAQG;AAEH,OAAO,KAAK,EAAE,sBAAsB,EAAE,iBAAiB,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAG3G,MAAM,WAAW,qCAAqC;IACpD,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,EAAE,CAAC,EAAE,MAAM,CAAC;IACZ,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,qBAAa,oCAAqC,YAAW,gBAAgB;IAC3E,QAAQ,CAAC,EAAE,sCAAsC;IACjD,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAwC;gBAEpD,OAAO,GAAE,qCAA0C;IAIzD,MAAM,CAAC,OAAO,EAAE,iBAAiB,GAAG,OAAO,CAAC,sBAAsB,CAAC;CAuB1E"}
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Unified Investigation Capability
|
|
3
|
+
*
|
|
4
|
+
* Provides unified tech fraud investigation across multiple platforms:
|
|
5
|
+
* - Apple iMessage (key substitution, false E2E claims)
|
|
6
|
+
* - Google Gmail (hidden threads, draft manipulation, unauthorized access)
|
|
7
|
+
* - Google Chrome (unauthorized launches, session hijacking)
|
|
8
|
+
* - Cross-platform correlation
|
|
9
|
+
*/
|
|
10
|
+
import { createUnifiedInvestigationTools } from '../tools/unifiedInvestigationTools.js';
|
|
11
|
+
export class UnifiedInvestigationCapabilityModule {
|
|
12
|
+
id = 'capability.unified-investigation';
|
|
13
|
+
options;
|
|
14
|
+
constructor(options = {}) {
|
|
15
|
+
this.options = options;
|
|
16
|
+
}
|
|
17
|
+
async create(context) {
|
|
18
|
+
const workingDir = this.options.workingDir ?? context.workingDir;
|
|
19
|
+
return {
|
|
20
|
+
id: this.options.id ?? 'unified-investigation.tools.core',
|
|
21
|
+
description: this.options.description ?? `Unified tech fraud investigation across Apple, Google, and other platforms.
|
|
22
|
+
|
|
23
|
+
Investigates:
|
|
24
|
+
• Apple iMessage: Key substitution, false E2E encryption claims
|
|
25
|
+
• Google Gmail: Hidden threads, draft manipulation, unauthorized access, filter tampering
|
|
26
|
+
• Google Chrome: Unauthorized launches, session hijacking, history manipulation
|
|
27
|
+
• Cross-platform: Coordinated manipulation patterns
|
|
28
|
+
|
|
29
|
+
Features:
|
|
30
|
+
• Investigation management with evidence chains
|
|
31
|
+
• Cross-vector correlation detection
|
|
32
|
+
• Legal evidence export
|
|
33
|
+
• Company claims vs reality analysis`,
|
|
34
|
+
toolSuite: createUnifiedInvestigationTools(workingDir),
|
|
35
|
+
metadata: {
|
|
36
|
+
workingDir,
|
|
37
|
+
},
|
|
38
|
+
};
|
|
39
|
+
}
|
|
40
|
+
}
|
|
41
|
+
//# sourceMappingURL=unifiedInvestigationCapability.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"unifiedInvestigationCapability.js","sourceRoot":"","sources":["../../src/capabilities/unifiedInvestigationCapability.ts"],"names":[],"mappings":"AAAA;;;;;;;;GAQG;AAGH,OAAO,EAAE,+BAA+B,EAAE,MAAM,uCAAuC,CAAC;AAQxF,MAAM,OAAO,oCAAoC;IACtC,EAAE,GAAG,kCAAkC,CAAC;IAChC,OAAO,CAAwC;IAEhE,YAAY,UAAiD,EAAE;QAC7D,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;IACzB,CAAC;IAED,KAAK,CAAC,MAAM,CAAC,OAA0B;QACrC,MAAM,UAAU,GAAG,IAAI,CAAC,OAAO,CAAC,UAAU,IAAI,OAAO,CAAC,UAAU,CAAC;QACjE,OAAO;YACL,EAAE,EAAE,IAAI,CAAC,OAAO,CAAC,EAAE,IAAI,kCAAkC;YACzD,WAAW,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW,IAAI;;;;;;;;;;;;qCAYV;YAC/B,SAAS,EAAE,+BAA+B,CAAC,UAAU,CAAC;YACtD,QAAQ,EAAE;gBACR,UAAU;aACX;SACF,CAAC;IACJ,CAAC;CACF"}
|
|
@@ -1,7 +1,13 @@
|
|
|
1
1
|
import type { AgentRuntime } from './agent.js';
|
|
2
2
|
import { type CompletionAnalysis } from './taskCompletionDetector.js';
|
|
3
3
|
import { type AttackChain, type TechniqueResult, type KillChainPhase } from '../tools/tao/index.js';
|
|
4
|
+
import { type OperationalRegion, type InfrastructureStack } from './infrastructureTemplates.js';
|
|
5
|
+
import { type AgencyType } from './governmentProcedures.js';
|
|
4
6
|
export type OrchestratorExitReason = 'complete' | 'verification-needed' | 'no-action' | 'empty-response' | 'blocked' | 'refusal' | 'incomplete' | 'attack-chain-complete' | 'attack-chain-aborted';
|
|
7
|
+
/** Unified orchestration mode - determines execution strategy */
|
|
8
|
+
export type UnifiedMode = 'standard' | 'attack-chain' | 'apt-simulation' | 'infrastructure' | 'red-team' | 'intel-collection' | 'compliance';
|
|
9
|
+
/** APT Goals for goal-oriented execution */
|
|
10
|
+
export type APTGoal = 'reconnaissance' | 'access' | 'persistence' | 'privilege' | 'lateral' | 'collection' | 'exfiltration' | 'impact' | 'stealth' | 'all';
|
|
5
11
|
export interface OrchestratorOptions {
|
|
6
12
|
/** Whether to stream provider responses */
|
|
7
13
|
streaming?: boolean;
|
|
@@ -13,6 +19,8 @@ export interface OrchestratorOptions {
|
|
|
13
19
|
singlePassFocus?: boolean;
|
|
14
20
|
/** Maximum orchestration attempts before stopping. Defaults to Infinity for relentless pursuit. */
|
|
15
21
|
maxAttempts?: number;
|
|
22
|
+
/** Unified orchestration mode */
|
|
23
|
+
unifiedMode?: UnifiedMode;
|
|
16
24
|
/** Attack chain execution mode - enables TAO technique chains */
|
|
17
25
|
attackChainMode?: 'auto' | 'disabled' | 'forced';
|
|
18
26
|
/** Targets for attack chain operations */
|
|
@@ -23,8 +31,60 @@ export interface OrchestratorOptions {
|
|
|
23
31
|
stealthMode?: boolean;
|
|
24
32
|
/** Authorization context for security operations */
|
|
25
33
|
authorizationContext?: string;
|
|
26
|
-
/**
|
|
34
|
+
/** Primary APT goal */
|
|
35
|
+
goal?: APTGoal;
|
|
36
|
+
/** Multiple goals for complex operations */
|
|
37
|
+
goals?: APTGoal[];
|
|
38
|
+
/** Maintain persistent access after completion */
|
|
39
|
+
maintainAccess?: boolean;
|
|
40
|
+
/** Collect all available intelligence */
|
|
41
|
+
collectIntel?: boolean;
|
|
42
|
+
/** Minimize detection footprint */
|
|
43
|
+
minimizeFootprint?: boolean;
|
|
44
|
+
/** Operational region for infrastructure */
|
|
45
|
+
region?: OperationalRegion;
|
|
46
|
+
/** Generate infrastructure deployment scripts */
|
|
47
|
+
generateInfrastructure?: boolean;
|
|
48
|
+
/** Agency types for compliance frameworks */
|
|
49
|
+
agencyTypes?: AgencyType[];
|
|
50
|
+
/** Callback for attack chain progress */
|
|
27
51
|
onAttackChainProgress?: (chain: AttackChain, techniqueId: string, result: TechniqueResult) => void;
|
|
52
|
+
/** Callback when technique starts */
|
|
53
|
+
onTechniqueStart?: (techniqueId: string, target: string) => void;
|
|
54
|
+
/** Callback when technique completes */
|
|
55
|
+
onTechniqueComplete?: (result: RealExecutionResult) => void;
|
|
56
|
+
/** Callback when APT goal is achieved */
|
|
57
|
+
onGoalAchieved?: (goal: APTGoal, artifacts: Array<{
|
|
58
|
+
type: string;
|
|
59
|
+
data: string;
|
|
60
|
+
}>) => void;
|
|
61
|
+
/** Callback for infrastructure stack */
|
|
62
|
+
onInfrastructure?: (stack: InfrastructureStack) => void;
|
|
63
|
+
}
|
|
64
|
+
/** Real technique execution result */
|
|
65
|
+
export interface RealExecutionResult {
|
|
66
|
+
techniqueId: string;
|
|
67
|
+
techniqueName: string;
|
|
68
|
+
phase: KillChainPhase;
|
|
69
|
+
success: boolean;
|
|
70
|
+
duration: number;
|
|
71
|
+
artifacts: Array<{
|
|
72
|
+
type: string;
|
|
73
|
+
data: string;
|
|
74
|
+
}>;
|
|
75
|
+
detectionRisk: number;
|
|
76
|
+
nextTechniques: string[];
|
|
77
|
+
}
|
|
78
|
+
/** Real-time execution metrics */
|
|
79
|
+
export interface RealExecutionMetrics {
|
|
80
|
+
totalTechniquesExecuted: number;
|
|
81
|
+
successfulTechniques: number;
|
|
82
|
+
failedTechniques: number;
|
|
83
|
+
totalDuration: number;
|
|
84
|
+
averageDetectionRisk: number;
|
|
85
|
+
phasesCompleted: KillChainPhase[];
|
|
86
|
+
artifactsCollected: number;
|
|
87
|
+
rlRewardAverage: number;
|
|
28
88
|
}
|
|
29
89
|
/** Result from attack chain execution */
|
|
30
90
|
export interface AttackChainResult {
|
|
@@ -44,6 +104,7 @@ export interface AttackChainResult {
|
|
|
44
104
|
successRate: number;
|
|
45
105
|
phasesCompleted: KillChainPhase[];
|
|
46
106
|
}
|
|
107
|
+
/** Unified orchestrator result - includes all possible outputs */
|
|
47
108
|
export interface OrchestratorResult {
|
|
48
109
|
finalResponse: string;
|
|
49
110
|
toolsUsed: string[];
|
|
@@ -56,6 +117,29 @@ export interface OrchestratorResult {
|
|
|
56
117
|
recommendations: string[];
|
|
57
118
|
/** Attack chain results when attack chain mode is enabled */
|
|
58
119
|
attackChainResult?: AttackChainResult;
|
|
120
|
+
/** Real technique execution results */
|
|
121
|
+
realExecutions?: RealExecutionResult[];
|
|
122
|
+
/** Real execution metrics */
|
|
123
|
+
realMetrics?: RealExecutionMetrics;
|
|
124
|
+
/** Active attack chains */
|
|
125
|
+
attackChains?: AttackChain[];
|
|
126
|
+
/** Completed kill-chain phases */
|
|
127
|
+
attackChainPhases?: string[];
|
|
128
|
+
/** Infrastructure stack when infrastructure mode is used */
|
|
129
|
+
infrastructureStack?: InfrastructureStack;
|
|
130
|
+
/** Deployment script */
|
|
131
|
+
deploymentScript?: string;
|
|
132
|
+
/** Teardown script */
|
|
133
|
+
teardownScript?: string;
|
|
134
|
+
/** OPSEC checklist */
|
|
135
|
+
opsecChecklist?: string;
|
|
136
|
+
/** Goals achieved during execution */
|
|
137
|
+
achievedGoals?: APTGoal[];
|
|
138
|
+
/** All collected artifacts */
|
|
139
|
+
collectedArtifacts?: Array<{
|
|
140
|
+
type: string;
|
|
141
|
+
data: string;
|
|
142
|
+
}>;
|
|
59
143
|
}
|
|
60
144
|
/**
|
|
61
145
|
* Single-pass orchestration: drive the agent to finish as much as possible
|
|
@@ -121,5 +205,81 @@ export declare class AgentOrchestrator {
|
|
|
121
205
|
* preventing wasted compute and infinite "thinking" loops.
|
|
122
206
|
*/
|
|
123
207
|
private checkForHarmfulRequest;
|
|
208
|
+
/**
|
|
209
|
+
* Detect if a request should trigger attack chain execution.
|
|
210
|
+
* Uses natural language parsing to identify security operation intents.
|
|
211
|
+
*/
|
|
212
|
+
private shouldExecuteAttackChain;
|
|
213
|
+
/**
|
|
214
|
+
* Validate authorization context for attack chain execution.
|
|
215
|
+
* Ensures proper authorization before executing security techniques.
|
|
216
|
+
*/
|
|
217
|
+
private validateAttackAuthorization;
|
|
218
|
+
/**
|
|
219
|
+
* Execute an attack chain with TAO techniques.
|
|
220
|
+
* Returns results including all executed techniques and artifacts.
|
|
221
|
+
*/
|
|
222
|
+
executeAttackChain(request: string, options?: {
|
|
223
|
+
targets?: string[];
|
|
224
|
+
depth?: 'quick' | 'standard' | 'deep';
|
|
225
|
+
stealth?: boolean;
|
|
226
|
+
authContext?: string;
|
|
227
|
+
onProgress?: (chain: AttackChain, techniqueId: string, result: TechniqueResult) => void;
|
|
228
|
+
}): Promise<AttackChainResult>;
|
|
229
|
+
/**
|
|
230
|
+
* Run orchestration with optional attack chain integration.
|
|
231
|
+
* When attack chain mode is enabled, security operations are executed
|
|
232
|
+
* directly through TAO techniques rather than relying on LLM tool calls.
|
|
233
|
+
*/
|
|
234
|
+
runWithAttackChain(request: string, options?: OrchestratorOptions): Promise<OrchestratorResult>;
|
|
235
|
+
/**
|
|
236
|
+
* Build a human-readable summary of attack chain execution.
|
|
237
|
+
*/
|
|
238
|
+
private buildAttackChainSummary;
|
|
239
|
+
/** Goal-to-technique mapping for goal-oriented execution */
|
|
240
|
+
private readonly goalTechniques;
|
|
241
|
+
/**
|
|
242
|
+
* Unified orchestration entry point.
|
|
243
|
+
* Routes to appropriate execution strategy based on mode and options.
|
|
244
|
+
*
|
|
245
|
+
* This is the primary method for full-stack unified orchestration that
|
|
246
|
+
* combines LLM-driven orchestration with direct TAO technique execution,
|
|
247
|
+
* infrastructure deployment, and goal-oriented APT simulation.
|
|
248
|
+
*/
|
|
249
|
+
runUnified(request: string, options?: OrchestratorOptions): Promise<OrchestratorResult>;
|
|
250
|
+
/**
|
|
251
|
+
* Auto-detect the appropriate orchestration mode from request content.
|
|
252
|
+
*/
|
|
253
|
+
private detectMode;
|
|
254
|
+
/**
|
|
255
|
+
* Run full APT simulation with all kill-chain phases.
|
|
256
|
+
*/
|
|
257
|
+
private runAPTSimulation;
|
|
258
|
+
/**
|
|
259
|
+
* Run infrastructure deployment mode.
|
|
260
|
+
*/
|
|
261
|
+
private runInfrastructureMode;
|
|
262
|
+
/**
|
|
263
|
+
* Run combined red team mode.
|
|
264
|
+
*/
|
|
265
|
+
private runRedTeamMode;
|
|
266
|
+
/**
|
|
267
|
+
* Run intelligence collection mode.
|
|
268
|
+
*/
|
|
269
|
+
private runIntelCollectionMode;
|
|
270
|
+
/**
|
|
271
|
+
* Run compliance mode with legal frameworks.
|
|
272
|
+
*/
|
|
273
|
+
private runComplianceMode;
|
|
274
|
+
/**
|
|
275
|
+
* Run goal-oriented APT execution.
|
|
276
|
+
*/
|
|
277
|
+
private runGoalOriented;
|
|
278
|
+
private normalizeDepth;
|
|
279
|
+
private computeMetrics;
|
|
280
|
+
private buildCompletionAnalysis;
|
|
281
|
+
private buildAuthorizationError;
|
|
282
|
+
private buildExecutionSummary;
|
|
283
|
+
private buildRecommendations;
|
|
124
284
|
}
|
|
125
285
|
//# sourceMappingURL=agentOrchestrator.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"agentOrchestrator.d.ts","sourceRoot":"","sources":["../../src/core/agentOrchestrator.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,YAAY,EAAuB,MAAM,YAAY,CAAC;AAEpE,OAAO,EAA0B,KAAK,kBAAkB,EAAE,MAAM,6BAA6B,CAAC;AAC9F,OAAO,
|
|
1
|
+
{"version":3,"file":"agentOrchestrator.d.ts","sourceRoot":"","sources":["../../src/core/agentOrchestrator.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,YAAY,EAAuB,MAAM,YAAY,CAAC;AAEpE,OAAO,EAA0B,KAAK,kBAAkB,EAAE,MAAM,6BAA6B,CAAC;AAC9F,OAAO,EASL,KAAK,WAAW,EAEhB,KAAK,eAAe,EACpB,KAAK,cAAc,EAEpB,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EAKL,KAAK,iBAAiB,EACtB,KAAK,mBAAmB,EACzB,MAAM,8BAA8B,CAAC;AACtC,OAAO,EAGL,KAAK,UAAU,EAChB,MAAM,2BAA2B,CAAC;AAEnC,MAAM,MAAM,sBAAsB,GAC9B,UAAU,GACV,qBAAqB,GACrB,WAAW,GACX,gBAAgB,GAChB,SAAS,GACT,SAAS,GACT,YAAY,GACZ,uBAAuB,GACvB,sBAAsB,CAAC;AAE3B,iEAAiE;AACjE,MAAM,MAAM,WAAW,GACnB,UAAU,GACV,cAAc,GACd,gBAAgB,GAChB,gBAAgB,GAChB,UAAU,GACV,kBAAkB,GAClB,YAAY,CAAC;AAEjB,4CAA4C;AAC5C,MAAM,MAAM,OAAO,GACf,gBAAgB,GAChB,QAAQ,GACR,aAAa,GACb,WAAW,GACX,SAAS,GACT,YAAY,GACZ,cAAc,GACd,QAAQ,GACR,SAAS,GACT,KAAK,CAAC;AAEV,MAAM,WAAW,mBAAmB;IAClC,2CAA2C;IAC3C,SAAS,CAAC,EAAE,OAAO,CAAC;IACpB,gFAAgF;IAChF,cAAc,CAAC,EAAE,OAAO,CAAC;IACzB,yEAAyE;IACzE,gBAAgB,CAAC,EAAE,MAAM,GAAG,UAAU,CAAC;IACvC,gEAAgE;IAChE,eAAe,CAAC,EAAE,OAAO,CAAC;IAC1B,mGAAmG;IACnG,WAAW,CAAC,EAAE,MAAM,CAAC;IAMrB,iCAAiC;IACjC,WAAW,CAAC,EAAE,WAAW,CAAC;IAC1B,iEAAiE;IACjE,eAAe,CAAC,EAAE,MAAM,GAAG,UAAU,GAAG,QAAQ,CAAC;IACjD,0CAA0C;IAC1C,aAAa,CAAC,EAAE,MAAM,EAAE,CAAC;IACzB,sCAAsC;IACtC,WAAW,CAAC,EAAE,OAAO,GAAG,UAAU,GAAG,MAAM,CAAC;IAC5C,mDAAmD;IACnD,WAAW,CAAC,EAAE,OAAO,CAAC;IACtB,oDAAoD;IACpD,oBAAoB,CAAC,EAAE,MAAM,CAAC;IAM9B,uBAAuB;IACvB,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,4CAA4C;IAC5C,KAAK,CAAC,EAAE,OAAO,EAAE,CAAC;IAClB,kDAAkD;IAClD,cAAc,CAAC,EAAE,OAAO,CAAC;IACzB,yCAAyC;IACzC,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,mCAAmC;IACnC,iBAAiB,CAAC,EAAE,OAAO,CAAC;IAM5B,4CAA4C;IAC5C,MAAM,CAAC,EAAE,iBAAiB,CAAC;IAC3B,iDAAiD;IACjD,sBAAsB,CAAC,EAAE,OAAO,CAAC;IAMjC,6CAA6C;IAC7C,WAAW,CAAC,EAAE,UAAU,EAAE,CAAC;IAM3B,yCAAyC;IACzC,qBAAqB,CAAC,EAAE,CAAC,KAAK,EAAE,WAAW,EAAE,WAAW,EAAE,MAAM,EAAE,MAAM,EAAE,eAAe,KAAK,IAAI,CAAC;IACnG,qCAAqC;IACrC,gBAAgB,CAAC,EAAE,CAAC,WAAW,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,KAAK,IAAI,CAAC;IACjE,wCAAwC;IACxC,mBAAmB,CAAC,EAAE,CAAC,MAAM,EAAE,mBAAmB,KAAK,IAAI,CAAC;IAC5D,yCAAyC;IACzC,cAAc,CAAC,EAAE,CAAC,IAAI,EAAE,OAAO,EAAE,SAAS,EAAE,KAAK,CAAC;QAAE,IAAI,EAAE,MAAM,CAAC;QAAC,IAAI,EAAE,MAAM,CAAA;KAAE,CAAC,KAAK,IAAI,CAAC;IAC3F,wCAAwC;IACxC,gBAAgB,CAAC,EAAE,CAAC,KAAK,EAAE,mBAAmB,KAAK,IAAI,CAAC;CACzD;AAED,sCAAsC;AACtC,MAAM,WAAW,mBAAmB;IAClC,WAAW,EAAE,MAAM,CAAC;IACpB,aAAa,EAAE,MAAM,CAAC;IACtB,KAAK,EAAE,cAAc,CAAC;IACtB,OAAO,EAAE,OAAO,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,SAAS,EAAE,KAAK,CAAC;QAAE,IAAI,EAAE,MAAM,CAAC;QAAC,IAAI,EAAE,MAAM,CAAA;KAAE,CAAC,CAAC;IACjD,aAAa,EAAE,MAAM,CAAC;IACtB,cAAc,EAAE,MAAM,EAAE,CAAC;CAC1B;AAED,kCAAkC;AAClC,MAAM,WAAW,oBAAoB;IACnC,uBAAuB,EAAE,MAAM,CAAC;IAChC,oBAAoB,EAAE,MAAM,CAAC;IAC7B,gBAAgB,EAAE,MAAM,CAAC;IACzB,aAAa,EAAE,MAAM,CAAC;IACtB,oBAAoB,EAAE,MAAM,CAAC;IAC7B,eAAe,EAAE,cAAc,EAAE,CAAC;IAClC,kBAAkB,EAAE,MAAM,CAAC;IAC3B,eAAe,EAAE,MAAM,CAAC;CACzB;AAED,yCAAyC;AACzC,MAAM,WAAW,iBAAiB;IAChC,KAAK,EAAE,WAAW,CAAC;IACnB,UAAU,EAAE,KAAK,CAAC;QAChB,EAAE,EAAE,MAAM,CAAC;QACX,IAAI,EAAE,MAAM,CAAC;QACb,KAAK,EAAE,cAAc,CAAC;QACtB,OAAO,EAAE,OAAO,CAAC;QACjB,QAAQ,EAAE,MAAM,CAAC;QACjB,SAAS,EAAE,KAAK,CAAC;YAAE,IAAI,EAAE,MAAM,CAAC;YAAC,IAAI,EAAE,MAAM,CAAA;SAAE,CAAC,CAAC;KAClD,CAAC,CAAC;IACH,aAAa,EAAE,MAAM,CAAC;IACtB,WAAW,EAAE,MAAM,CAAC;IACpB,eAAe,EAAE,cAAc,EAAE,CAAC;CACnC;AAED,kEAAkE;AAClE,MAAM,WAAW,kBAAkB;IACjC,aAAa,EAAE,MAAM,CAAC;IACtB,SAAS,EAAE,MAAM,EAAE,CAAC;IACpB,QAAQ,EAAE,OAAO,CAAC;IAClB,UAAU,EAAE,OAAO,CAAC;IACpB,UAAU,EAAE,kBAAkB,CAAC;IAC/B,UAAU,EAAE,sBAAsB,CAAC;IACnC,aAAa,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,WAAW,EAAE,MAAM,EAAE,CAAC;IACtB,eAAe,EAAE,MAAM,EAAE,CAAC;IAM1B,6DAA6D;IAC7D,iBAAiB,CAAC,EAAE,iBAAiB,CAAC;IACtC,uCAAuC;IACvC,cAAc,CAAC,EAAE,mBAAmB,EAAE,CAAC;IACvC,6BAA6B;IAC7B,WAAW,CAAC,EAAE,oBAAoB,CAAC;IACnC,2BAA2B;IAC3B,YAAY,CAAC,EAAE,WAAW,EAAE,CAAC;IAC7B,kCAAkC;IAClC,iBAAiB,CAAC,EAAE,MAAM,EAAE,CAAC;IAM7B,4DAA4D;IAC5D,mBAAmB,CAAC,EAAE,mBAAmB,CAAC;IAC1C,wBAAwB;IACxB,gBAAgB,CAAC,EAAE,MAAM,CAAC;IAC1B,sBAAsB;IACtB,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,sBAAsB;IACtB,cAAc,CAAC,EAAE,MAAM,CAAC;IAMxB,sCAAsC;IACtC,aAAa,CAAC,EAAE,OAAO,EAAE,CAAC;IAC1B,8BAA8B;IAC9B,kBAAkB,CAAC,EAAE,KAAK,CAAC;QAAE,IAAI,EAAE,MAAM,CAAC;QAAC,IAAI,EAAE,MAAM,CAAA;KAAE,CAAC,CAAC;CAC5D;AAWD;;;GAGG;AACH,qBAAa,iBAAiB;IAC5B,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAe;gBAEzB,KAAK,EAAE,YAAY;IAIzB,eAAe,CAAC,OAAO,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,mBAAmB,GAAG,OAAO,CAAC,kBAAkB,CAAC;IAiLlG,OAAO,CAAC,iBAAiB;YA6BX,kBAAkB;IA2ChC;;;OAGG;YACW,sBAAsB;IAgGpC;;;OAGG;IACH,OAAO,CAAC,4BAA4B;IA2IpC,OAAO,CAAC,qBAAqB;IAsB7B,OAAO,CAAC,cAAc;IAqEtB,OAAO,CAAC,uBAAuB;IA8B/B,OAAO,CAAC,qBAAqB;IAmC7B,OAAO,CAAC,uBAAuB;IAgD/B,OAAO,CAAC,wBAAwB;IAMhC,OAAO,CAAC,sBAAsB;IAa9B,OAAO,CAAC,UAAU;IAOlB,OAAO,CAAC,gBAAgB;IAOxB,OAAO,CAAC,qBAAqB;IAa7B,OAAO,CAAC,0BAA0B;IAsBlC,OAAO,CAAC,eAAe;IA0CvB,OAAO,CAAC,UAAU;IAsBlB,OAAO,CAAC,qBAAqB;IAa7B,OAAO,CAAC,0BAA0B;IAmBlC,OAAO,CAAC,iBAAiB;IAwBzB,OAAO,CAAC,mBAAmB;IAY3B,OAAO,CAAC,iBAAiB;IAczB;;;OAGG;IACH,OAAO,CAAC,iBAAiB;IAsBzB,OAAO,CAAC,SAAS;IAKjB;;;;OAIG;IACH,OAAO,CAAC,0BAA0B;IAWlC;;;;OAIG;IACH,OAAO,CAAC,oBAAoB;IAoB5B;;;;;;OAMG;IACH,OAAO,CAAC,sBAAsB;IA+E9B;;;OAGG;IACH,OAAO,CAAC,wBAAwB;IA0BhC;;;OAGG;IACH,OAAO,CAAC,2BAA2B;IAkDnC;;;OAGG;IACG,kBAAkB,CACtB,OAAO,EAAE,MAAM,EACf,OAAO,GAAE;QACP,OAAO,CAAC,EAAE,MAAM,EAAE,CAAC;QACnB,KAAK,CAAC,EAAE,OAAO,GAAG,UAAU,GAAG,MAAM,CAAC;QACtC,OAAO,CAAC,EAAE,OAAO,CAAC;QAClB,WAAW,CAAC,EAAE,MAAM,CAAC;QACrB,UAAU,CAAC,EAAE,CAAC,KAAK,EAAE,WAAW,EAAE,WAAW,EAAE,MAAM,EAAE,MAAM,EAAE,eAAe,KAAK,IAAI,CAAC;KACpF,GACL,OAAO,CAAC,iBAAiB,CAAC;IAwF7B;;;;OAIG;IACG,kBAAkB,CACtB,OAAO,EAAE,MAAM,EACf,OAAO,GAAE,mBAAwB,GAChC,OAAO,CAAC,kBAAkB,CAAC;IA4I9B;;OAEG;IACH,OAAO,CAAC,uBAAuB;IAoD/B,4DAA4D;IAC5D,OAAO,CAAC,QAAQ,CAAC,cAAc,CAiC7B;IAEF;;;;;;;OAOG;IACG,UAAU,CACd,OAAO,EAAE,MAAM,EACf,OAAO,GAAE,mBAAwB,GAChC,OAAO,CAAC,kBAAkB,CAAC;IAgC9B;;OAEG;IACH,OAAO,CAAC,UAAU;IA+ClB;;OAEG;YACW,gBAAgB;IA8G9B;;OAEG;YACW,qBAAqB;IAkDnC;;OAEG;YACW,cAAc;IAwB5B;;OAEG;YACW,sBAAsB;IAYpC;;OAEG;YACW,iBAAiB;IA2B/B;;OAEG;YACW,eAAe;IAyH7B,OAAO,CAAC,cAAc;IAOtB,OAAO,CAAC,cAAc;IAqBtB,OAAO,CAAC,uBAAuB;IA6B/B,OAAO,CAAC,uBAAuB;IAuC/B,OAAO,CAAC,qBAAqB;IAgC7B,OAAO,CAAC,oBAAoB;CAoB7B"}
|