erosolar-cli 2.1.270 → 2.1.272

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (112) hide show
  1. package/dist/capabilities/index.d.ts +0 -1
  2. package/dist/capabilities/index.d.ts.map +1 -1
  3. package/dist/capabilities/index.js +1 -1
  4. package/dist/capabilities/index.js.map +1 -1
  5. package/dist/capabilities/orchestrationCapability.d.ts.map +1 -1
  6. package/dist/capabilities/orchestrationCapability.js +56 -108
  7. package/dist/capabilities/orchestrationCapability.js.map +1 -1
  8. package/dist/core/iMessageVerification.d.ts +1 -1
  9. package/dist/core/infrastructureTemplates.d.ts +1 -1
  10. package/dist/core/infrastructureTemplates.js +5 -5
  11. package/dist/core/infrastructureTemplates.js.map +1 -1
  12. package/dist/core/persistentObjectiveStore.d.ts +13 -1
  13. package/dist/core/persistentObjectiveStore.d.ts.map +1 -1
  14. package/dist/core/persistentObjectiveStore.js.map +1 -1
  15. package/dist/core/securityDeliverableGenerator.d.ts +1 -1
  16. package/dist/core/securityDeliverableGenerator.d.ts.map +1 -1
  17. package/dist/core/securityDeliverableGenerator.js +3 -3
  18. package/dist/core/securityDeliverableGenerator.js.map +1 -1
  19. package/dist/core/toolRuntime.d.ts.map +1 -1
  20. package/dist/core/toolRuntime.js +11 -5
  21. package/dist/core/toolRuntime.js.map +1 -1
  22. package/dist/core/types.js.map +1 -1
  23. package/dist/core/unifiedOrchestrator.d.ts +265 -77
  24. package/dist/core/unifiedOrchestrator.d.ts.map +1 -1
  25. package/dist/core/unifiedOrchestrator.js +911 -254
  26. package/dist/core/unifiedOrchestrator.js.map +1 -1
  27. package/dist/providers/anthropicProvider.d.ts +1 -1
  28. package/dist/shell/interactiveShell.d.ts +1 -1
  29. package/dist/shell/interactiveShell.d.ts.map +1 -1
  30. package/dist/shell/interactiveShell.js +188 -207
  31. package/dist/shell/interactiveShell.js.map +1 -1
  32. package/dist/tools/tao/rl.js +1 -1
  33. package/dist/tools/tao/rl.js.map +1 -1
  34. package/dist/tools/taoTools.js +5 -5
  35. package/dist/tools/taoTools.js.map +1 -1
  36. package/package.json +1 -1
  37. package/dist/capabilities/unifiedInvestigationCapability.d.ts +0 -22
  38. package/dist/capabilities/unifiedInvestigationCapability.d.ts.map +0 -1
  39. package/dist/capabilities/unifiedInvestigationCapability.js +0 -41
  40. package/dist/capabilities/unifiedInvestigationCapability.js.map +0 -1
  41. package/dist/core/agentOrchestrator.d.ts +0 -400
  42. package/dist/core/agentOrchestrator.d.ts.map +0 -1
  43. package/dist/core/agentOrchestrator.js +0 -2133
  44. package/dist/core/agentOrchestrator.js.map +0 -1
  45. package/dist/core/autoExecutionOrchestrator.d.ts +0 -172
  46. package/dist/core/autoExecutionOrchestrator.d.ts.map +0 -1
  47. package/dist/core/autoExecutionOrchestrator.js +0 -591
  48. package/dist/core/autoExecutionOrchestrator.js.map +0 -1
  49. package/dist/core/dualAgentOrchestrator.d.ts +0 -34
  50. package/dist/core/dualAgentOrchestrator.d.ts.map +0 -1
  51. package/dist/core/dualAgentOrchestrator.js +0 -94
  52. package/dist/core/dualAgentOrchestrator.js.map +0 -1
  53. package/dist/core/failureRecovery.d.ts +0 -26
  54. package/dist/core/failureRecovery.d.ts.map +0 -1
  55. package/dist/core/failureRecovery.js +0 -54
  56. package/dist/core/failureRecovery.js.map +0 -1
  57. package/dist/core/intelligentTestFlows.d.ts +0 -45
  58. package/dist/core/intelligentTestFlows.d.ts.map +0 -1
  59. package/dist/core/intelligentTestFlows.js +0 -25
  60. package/dist/core/intelligentTestFlows.js.map +0 -1
  61. package/dist/core/learningPersistence.d.ts +0 -58
  62. package/dist/core/learningPersistence.d.ts.map +0 -1
  63. package/dist/core/learningPersistence.js +0 -46
  64. package/dist/core/learningPersistence.js.map +0 -1
  65. package/dist/core/metricsTracker.d.ts +0 -40
  66. package/dist/core/metricsTracker.d.ts.map +0 -1
  67. package/dist/core/metricsTracker.js +0 -83
  68. package/dist/core/metricsTracker.js.map +0 -1
  69. package/dist/core/orchestration.d.ts +0 -534
  70. package/dist/core/orchestration.d.ts.map +0 -1
  71. package/dist/core/orchestration.js +0 -2009
  72. package/dist/core/orchestration.js.map +0 -1
  73. package/dist/core/performanceMonitor.d.ts +0 -30
  74. package/dist/core/performanceMonitor.d.ts.map +0 -1
  75. package/dist/core/performanceMonitor.js +0 -39
  76. package/dist/core/performanceMonitor.js.map +0 -1
  77. package/dist/core/selfEvolution.d.ts +0 -61
  78. package/dist/core/selfEvolution.d.ts.map +0 -1
  79. package/dist/core/selfEvolution.js +0 -38
  80. package/dist/core/selfEvolution.js.map +0 -1
  81. package/dist/core/selfImprovement.d.ts +0 -82
  82. package/dist/core/selfImprovement.d.ts.map +0 -1
  83. package/dist/core/selfImprovement.js +0 -25
  84. package/dist/core/selfImprovement.js.map +0 -1
  85. package/dist/core/unifiedFraudOrchestrator.d.ts +0 -738
  86. package/dist/core/unifiedFraudOrchestrator.d.ts.map +0 -1
  87. package/dist/core/unifiedFraudOrchestrator.js +0 -3312
  88. package/dist/core/unifiedFraudOrchestrator.js.map +0 -1
  89. package/dist/core/unifiedRealOrchestrator.d.ts +0 -126
  90. package/dist/core/unifiedRealOrchestrator.d.ts.map +0 -1
  91. package/dist/core/unifiedRealOrchestrator.js +0 -558
  92. package/dist/core/unifiedRealOrchestrator.js.map +0 -1
  93. package/dist/core/userDefenseOrchestrator.d.ts +0 -202
  94. package/dist/core/userDefenseOrchestrator.d.ts.map +0 -1
  95. package/dist/core/userDefenseOrchestrator.js +0 -1006
  96. package/dist/core/userDefenseOrchestrator.js.map +0 -1
  97. package/dist/plugins/tools/unifiedInvestigation/unifiedInvestigationPlugin.d.ts +0 -3
  98. package/dist/plugins/tools/unifiedInvestigation/unifiedInvestigationPlugin.d.ts.map +0 -1
  99. package/dist/plugins/tools/unifiedInvestigation/unifiedInvestigationPlugin.js +0 -14
  100. package/dist/plugins/tools/unifiedInvestigation/unifiedInvestigationPlugin.js.map +0 -1
  101. package/dist/tools/frontendTestingTools.d.ts +0 -9
  102. package/dist/tools/frontendTestingTools.d.ts.map +0 -1
  103. package/dist/tools/frontendTestingTools.js +0 -291
  104. package/dist/tools/frontendTestingTools.js.map +0 -1
  105. package/dist/tools/unifiedInvestigationTools.d.ts +0 -19
  106. package/dist/tools/unifiedInvestigationTools.d.ts.map +0 -1
  107. package/dist/tools/unifiedInvestigationTools.js +0 -1163
  108. package/dist/tools/unifiedInvestigationTools.js.map +0 -1
  109. package/scripts/human-verification.mjs +0 -380
  110. package/scripts/isolated-verification-runner.mjs +0 -364
  111. package/scripts/isolated-verification-wrapper.mjs +0 -276
  112. package/scripts/verify-task-completion.mjs +0 -143
@@ -1,738 +0,0 @@
1
- /**
2
- * Unified Tech Fraud Investigation Orchestrator
3
- *
4
- * Purpose: Coordinate investigation of tech company fraud across multiple vectors:
5
- * - Apple iMessage PQ3 (key substitution, false E2E claims)
6
- * - Google Gmail (hidden threads, draft manipulation, unauthorized access)
7
- * - Google Chrome (browser hijacking, session control, surveillance)
8
- * - Cross-platform evidence correlation
9
- *
10
- * This orchestrator:
11
- * 1. Manages investigation workflows across multiple targets
12
- * 2. Correlates evidence across different fraud vectors
13
- * 3. Detects patterns indicating coordinated manipulation
14
- * 4. Generates unified legal evidence packages
15
- * 5. Maintains cryptographic chain of custody
16
- */
17
- import { EventEmitter } from 'node:events';
18
- import { iMessageVerificationEngine, APPLE_PQ3_CLAIMS } from './iMessageVerification.js';
19
- export type InvestigationTarget = 'apple' | 'google' | 'meta' | 'microsoft' | 'amazon';
20
- export type FraudVector = 'imessage_key_substitution' | 'imessage_false_e2e' | 'gmail_hidden_threads' | 'gmail_draft_manipulation' | 'gmail_unauthorized_access' | 'gmail_filter_tampering' | 'chrome_unauthorized_launch' | 'chrome_session_hijacking' | 'chrome_history_manipulation' | 'chrome_extension_injection' | 'cross_platform_surveillance' | 'coordinated_manipulation';
21
- export interface Investigation {
22
- id: string;
23
- name: string;
24
- target: InvestigationTarget;
25
- vectors: FraudVector[];
26
- status: 'planning' | 'active' | 'collecting' | 'analyzing' | 'complete' | 'suspended';
27
- created: string;
28
- lastActivity: string;
29
- evidenceChainId: string;
30
- findings: Finding[];
31
- correlations: EvidenceCorrelation[];
32
- hash: string;
33
- }
34
- export interface Finding {
35
- id: string;
36
- timestamp: string;
37
- vector: FraudVector;
38
- severity: 'low' | 'medium' | 'high' | 'critical';
39
- title: string;
40
- description: string;
41
- technicalDetails: Record<string, unknown>;
42
- evidenceIds: string[];
43
- legalImplications: LegalImplication;
44
- hash: string;
45
- }
46
- export interface LegalImplication {
47
- fraudType: string;
48
- applicableLaws: string[];
49
- potentialDamages: string;
50
- recommendations: string[];
51
- }
52
- export interface EvidenceCorrelation {
53
- id: string;
54
- timestamp: string;
55
- findingIds: string[];
56
- correlationType: 'temporal' | 'behavioral' | 'technical' | 'pattern';
57
- description: string;
58
- confidence: number;
59
- implications: string;
60
- hash: string;
61
- }
62
- export interface GmailThreadObservation {
63
- id: string;
64
- timestamp: string;
65
- threadId: string;
66
- messageIds: string[];
67
- subject: string;
68
- labels: string[];
69
- isVisible: boolean;
70
- isInSearch: boolean;
71
- lastMessageDate: string;
72
- participantCount: number;
73
- captureMethod: 'api' | 'ui_scrape' | 'network_capture' | 'takeout';
74
- rawData?: string;
75
- hash: string;
76
- }
77
- export interface GmailDraftObservation {
78
- id: string;
79
- timestamp: string;
80
- draftId: string;
81
- threadId?: string;
82
- subject: string;
83
- recipientCount: number;
84
- bodyHash: string;
85
- bodyLength: number;
86
- hasAttachments: boolean;
87
- createdAt: string;
88
- modifiedAt: string;
89
- captureMethod: 'api' | 'ui_scrape' | 'network_capture';
90
- previousObservationId?: string;
91
- changes?: DraftChange[];
92
- hash: string;
93
- }
94
- export interface DraftChange {
95
- type: 'created' | 'modified' | 'deleted' | 'sent_without_user' | 'content_changed';
96
- field?: string;
97
- previousValue?: string;
98
- newValue?: string;
99
- userInitiated: boolean;
100
- suspicionLevel: 'normal' | 'suspicious' | 'highly_suspicious';
101
- reason: string;
102
- }
103
- export interface GmailFilterObservation {
104
- id: string;
105
- timestamp: string;
106
- filterId: string;
107
- criteria: {
108
- from?: string;
109
- to?: string;
110
- subject?: string;
111
- hasWords?: string;
112
- excludeWords?: string;
113
- };
114
- actions: {
115
- skipInbox?: boolean;
116
- markRead?: boolean;
117
- archive?: boolean;
118
- delete?: boolean;
119
- forward?: string;
120
- label?: string;
121
- };
122
- createdByUser: boolean;
123
- createdAt?: string;
124
- hash: string;
125
- }
126
- export interface GmailAccessLog {
127
- id: string;
128
- timestamp: string;
129
- accessType: 'login' | 'api_access' | 'imap' | 'pop' | 'oauth_grant' | 'security_event';
130
- ipAddress: string;
131
- location?: string;
132
- userAgent?: string;
133
- deviceType?: string;
134
- wasUser: boolean;
135
- suspicious: boolean;
136
- reason?: string;
137
- hash: string;
138
- }
139
- export interface ChromeProcessObservation {
140
- id: string;
141
- timestamp: string;
142
- pid: number;
143
- parentPid: number;
144
- commandLine: string[];
145
- profilePath?: string;
146
- startTime: string;
147
- userInitiated: boolean;
148
- launchSource?: 'user' | 'system' | 'script' | 'unknown' | 'remote';
149
- suspicionLevel: 'normal' | 'suspicious' | 'highly_suspicious';
150
- reason?: string;
151
- networkConnections?: NetworkConnection[];
152
- hash: string;
153
- }
154
- export interface NetworkConnection {
155
- localPort: number;
156
- remoteIp: string;
157
- remotePort: number;
158
- state: string;
159
- protocol: string;
160
- }
161
- export interface ChromeSessionObservation {
162
- id: string;
163
- timestamp: string;
164
- profileId: string;
165
- tabs: ChromeTabInfo[];
166
- cookies: ChromeCookieInfo[];
167
- localStorage: ChromeStorageInfo[];
168
- syncStatus: 'synced' | 'local_only' | 'sync_disabled';
169
- lastSyncTime?: string;
170
- anomalies: SessionAnomaly[];
171
- hash: string;
172
- }
173
- export interface ChromeTabInfo {
174
- tabId: number;
175
- url: string;
176
- title: string;
177
- active: boolean;
178
- createdAt: string;
179
- lastAccessed: string;
180
- }
181
- export interface ChromeCookieInfo {
182
- domain: string;
183
- name: string;
184
- valueHash: string;
185
- secure: boolean;
186
- httpOnly: boolean;
187
- sameSite: string;
188
- expirationDate?: number;
189
- }
190
- export interface ChromeStorageInfo {
191
- origin: string;
192
- keyCount: number;
193
- totalSize: number;
194
- sensitiveKeys: string[];
195
- }
196
- export interface SessionAnomaly {
197
- type: 'unexpected_tab' | 'cookie_injection' | 'storage_modification' | 'sync_without_user' | 'profile_access' | 'extension_activity';
198
- severity: 'low' | 'medium' | 'high' | 'critical';
199
- description: string;
200
- evidence: string;
201
- }
202
- export interface ChromeHistoryObservation {
203
- id: string;
204
- timestamp: string;
205
- captureMethod: 'sqlite' | 'api' | 'ui_scrape';
206
- entryCount: number;
207
- dateRange: {
208
- start: string;
209
- end: string;
210
- };
211
- deletedEntries?: HistoryDeletion[];
212
- unexpectedEntries?: UnexpectedHistoryEntry[];
213
- hash: string;
214
- }
215
- export interface HistoryDeletion {
216
- approximateTime: string;
217
- entriesAffected: number;
218
- urlPatterns?: string[];
219
- userInitiated: boolean;
220
- }
221
- export interface UnexpectedHistoryEntry {
222
- url: string;
223
- visitTime: string;
224
- transitionType: string;
225
- suspicionReason: string;
226
- }
227
- export declare const GOOGLE_GMAIL_CLAIMS: {
228
- user_control: {
229
- claim: string;
230
- source: string;
231
- verifiable: string;
232
- reason: string;
233
- };
234
- no_email_scanning_for_ads: {
235
- claim: string;
236
- source: string;
237
- verifiable: boolean;
238
- reason: string;
239
- };
240
- confidential_mode: {
241
- claim: string;
242
- source: string;
243
- verifiable: boolean;
244
- reason: string;
245
- };
246
- security_alerts: {
247
- claim: string;
248
- source: string;
249
- verifiable: string;
250
- reason: string;
251
- };
252
- search_accuracy: {
253
- claim: string;
254
- source: string;
255
- verifiable: boolean;
256
- reason: string;
257
- };
258
- draft_integrity: {
259
- claim: string;
260
- source: string;
261
- verifiable: boolean;
262
- reason: string;
263
- };
264
- };
265
- export declare const GOOGLE_CHROME_CLAIMS: {
266
- safe_browsing: {
267
- claim: string;
268
- source: string;
269
- verifiable: string;
270
- reason: string;
271
- };
272
- sync_privacy: {
273
- claim: string;
274
- source: string;
275
- verifiable: boolean;
276
- reason: string;
277
- };
278
- user_control_history: {
279
- claim: string;
280
- source: string;
281
- verifiable: string;
282
- reason: string;
283
- };
284
- no_unauthorized_access: {
285
- claim: string;
286
- source: string;
287
- verifiable: boolean;
288
- reason: string;
289
- };
290
- extension_security: {
291
- claim: string;
292
- source: string;
293
- verifiable: string;
294
- reason: string;
295
- };
296
- };
297
- export declare class GmailInvestigationEngine {
298
- private storageDir;
299
- private threadObservations;
300
- private draftObservations;
301
- private filterObservations;
302
- private accessLogs;
303
- private findings;
304
- constructor(storageDir: string);
305
- initialize(): Promise<void>;
306
- /**
307
- * Record observation of Gmail threads.
308
- * Compare with previous observations to detect hidden threads.
309
- *
310
- * Detection methods:
311
- * 1. Compare UI-visible threads vs API-returned threads
312
- * 2. Compare search results vs direct thread access
313
- * 3. Compare current state vs Google Takeout export
314
- * 4. Monitor for threads that disappear from search but still exist
315
- */
316
- recordThreadObservation(params: {
317
- threadId: string;
318
- messageIds: string[];
319
- subject: string;
320
- labels: string[];
321
- isVisible: boolean;
322
- isInSearch: boolean;
323
- lastMessageDate: string;
324
- participantCount: number;
325
- captureMethod: 'api' | 'ui_scrape' | 'network_capture' | 'takeout';
326
- rawData?: string;
327
- }): Promise<{
328
- observation: GmailThreadObservation;
329
- anomalyDetected: boolean;
330
- finding?: Finding;
331
- }>;
332
- /**
333
- * Compare multiple capture methods to detect discrepancies.
334
- * If API shows different threads than UI or Takeout, that's manipulation.
335
- */
336
- crossReferenceThreadSources(params: {
337
- apiThreadIds: string[];
338
- uiThreadIds: string[];
339
- takeoutThreadIds?: string[];
340
- imapThreadIds?: string[];
341
- }): Promise<{
342
- discrepancies: Array<{
343
- threadId: string;
344
- presentIn: string[];
345
- missingFrom: string[];
346
- implication: string;
347
- }>;
348
- finding?: Finding;
349
- }>;
350
- /**
351
- * Record observation of a draft.
352
- * Detect unauthorized modifications, deletions, or sends.
353
- */
354
- recordDraftObservation(params: {
355
- draftId: string;
356
- threadId?: string;
357
- subject: string;
358
- recipientCount: number;
359
- bodyContent: string;
360
- hasAttachments: boolean;
361
- createdAt: string;
362
- modifiedAt: string;
363
- captureMethod: 'api' | 'ui_scrape' | 'network_capture';
364
- }): Promise<{
365
- observation: GmailDraftObservation;
366
- changes: DraftChange[];
367
- finding?: Finding;
368
- }>;
369
- /**
370
- * Detect drafts that were sent without user action.
371
- * This is a critical fraud indicator.
372
- */
373
- detectUnauthorizedDraftSend(params: {
374
- draftId: string;
375
- sentMessageId: string;
376
- sentAt: string;
377
- userWasActive: boolean;
378
- userLocation?: string;
379
- sendingIp?: string;
380
- }): Promise<Finding>;
381
- /**
382
- * Record account access and detect unauthorized access.
383
- */
384
- recordAccessLog(params: {
385
- accessType: 'login' | 'api_access' | 'imap' | 'pop' | 'oauth_grant' | 'security_event';
386
- ipAddress: string;
387
- location?: string;
388
- userAgent?: string;
389
- deviceType?: string;
390
- wasUser: boolean;
391
- }): Promise<{
392
- log: GmailAccessLog;
393
- finding?: Finding;
394
- }>;
395
- /**
396
- * Record and detect unauthorized Gmail filters.
397
- * Google could add filters to hide specific emails.
398
- */
399
- recordFilterObservation(params: {
400
- filterId: string;
401
- criteria: GmailFilterObservation['criteria'];
402
- actions: GmailFilterObservation['actions'];
403
- createdByUser: boolean;
404
- createdAt?: string;
405
- }): Promise<{
406
- observation: GmailFilterObservation;
407
- finding?: Finding;
408
- }>;
409
- private persistThreadObservation;
410
- private persistDraftObservation;
411
- private persistAccessLog;
412
- private persistFilterObservation;
413
- private createFinding;
414
- private getLegalImplications;
415
- getFindings(): Finding[];
416
- getThreadObservations(threadId: string): GmailThreadObservation[];
417
- getDraftObservations(draftId: string): GmailDraftObservation[];
418
- }
419
- export declare class ChromeInvestigationEngine {
420
- private storageDir;
421
- private processObservations;
422
- private sessionObservations;
423
- private historyObservations;
424
- private findings;
425
- constructor(storageDir: string);
426
- initialize(): Promise<void>;
427
- /**
428
- * Record Chrome process observation.
429
- * Detect unauthorized browser launches.
430
- */
431
- recordProcessObservation(params: {
432
- pid: number;
433
- parentPid: number;
434
- commandLine: string[];
435
- profilePath?: string;
436
- startTime: string;
437
- userInitiated: boolean;
438
- networkConnections?: NetworkConnection[];
439
- }): Promise<{
440
- observation: ChromeProcessObservation;
441
- finding?: Finding;
442
- }>;
443
- /**
444
- * Record Chrome session state.
445
- * Detect session hijacking and unauthorized modifications.
446
- */
447
- recordSessionObservation(params: {
448
- profileId: string;
449
- tabs: ChromeTabInfo[];
450
- cookies: ChromeCookieInfo[];
451
- localStorage: ChromeStorageInfo[];
452
- syncStatus: 'synced' | 'local_only' | 'sync_disabled';
453
- lastSyncTime?: string;
454
- }): Promise<{
455
- observation: ChromeSessionObservation;
456
- anomalies: SessionAnomaly[];
457
- finding?: Finding;
458
- }>;
459
- /**
460
- * Record Chrome history state.
461
- * Detect unauthorized deletions or additions.
462
- */
463
- recordHistoryObservation(params: {
464
- captureMethod: 'sqlite' | 'api' | 'ui_scrape';
465
- entryCount: number;
466
- dateRange: {
467
- start: string;
468
- end: string;
469
- };
470
- entries: Array<{
471
- url: string;
472
- visitTime: string;
473
- transitionType: string;
474
- }>;
475
- }): Promise<{
476
- observation: ChromeHistoryObservation;
477
- finding?: Finding;
478
- }>;
479
- private persistProcessObservation;
480
- private persistSessionObservation;
481
- private persistHistoryObservation;
482
- private createFinding;
483
- private getLegalImplications;
484
- getFindings(): Finding[];
485
- getProcessObservations(): ChromeProcessObservation[];
486
- }
487
- export declare class UnifiedFraudOrchestrator extends EventEmitter {
488
- protected storageDir: string;
489
- private integrityEngine;
490
- private iMessageEngine;
491
- protected gmailEngine: GmailInvestigationEngine;
492
- protected chromeEngine: ChromeInvestigationEngine;
493
- protected investigations: Map<string, Investigation>;
494
- private correlations;
495
- constructor(workingDir?: string);
496
- initialize(): Promise<void>;
497
- createInvestigation(params: {
498
- name: string;
499
- target: InvestigationTarget;
500
- vectors: FraudVector[];
501
- }): Promise<Investigation>;
502
- updateInvestigationStatus(investigationId: string, status: Investigation['status']): Promise<Investigation>;
503
- getIMessageEngine(): iMessageVerificationEngine;
504
- getGmailEngine(): GmailInvestigationEngine;
505
- getChromeEngine(): ChromeInvestigationEngine;
506
- /**
507
- * Correlate findings across different fraud vectors.
508
- * Detect patterns that indicate coordinated manipulation.
509
- */
510
- correlateFindings(investigationId: string): Promise<EvidenceCorrelation[]>;
511
- generateUnifiedReport(investigationId: string): Promise<{
512
- investigation: Investigation;
513
- summary: {
514
- target: InvestigationTarget;
515
- vectorsInvestigated: FraudVector[];
516
- totalFindings: number;
517
- criticalFindings: number;
518
- correlations: number;
519
- };
520
- byVector: Record<FraudVector, {
521
- findings: Finding[];
522
- severity: 'low' | 'medium' | 'high' | 'critical';
523
- }>;
524
- correlations: EvidenceCorrelation[];
525
- legalSummary: {
526
- fraudTypes: string[];
527
- applicableLaws: string[];
528
- recommendations: string[];
529
- };
530
- claims: {
531
- apple?: typeof APPLE_PQ3_CLAIMS;
532
- google_gmail?: typeof GOOGLE_GMAIL_CLAIMS;
533
- google_chrome?: typeof GOOGLE_CHROME_CLAIMS;
534
- };
535
- }>;
536
- exportForLitigation(investigationId: string, outputDir: string): Promise<string>;
537
- private generateLegalDocument;
538
- private persistInvestigation;
539
- loadInvestigation(investigationId: string): Promise<Investigation | null>;
540
- getInvestigations(): Investigation[];
541
- }
542
- /**
543
- * Attack chains model multi-step attack sequences where each step enables the next.
544
- * Detecting partial chains is evidence of an ongoing attack.
545
- * Detecting complete chains is irrefutable evidence of coordinated fraud.
546
- */
547
- export type AttackChainPhase = 'reconnaissance' | 'initial_access' | 'execution' | 'persistence' | 'exfiltration' | 'impact';
548
- export interface AttackChainStep {
549
- id: string;
550
- phase: AttackChainPhase;
551
- name: string;
552
- description: string;
553
- indicators: string[];
554
- requiredPriorSteps: string[];
555
- vectors: FraudVector[];
556
- detectionMethods: string[];
557
- }
558
- export interface AttackChain {
559
- id: string;
560
- name: string;
561
- target: InvestigationTarget;
562
- description: string;
563
- steps: AttackChainStep[];
564
- minimumStepsForEvidence: number;
565
- legalImplications: LegalImplication;
566
- }
567
- export interface AttackChainObservation {
568
- id: string;
569
- timestamp: string;
570
- chainId: string;
571
- stepId: string;
572
- findingId: string;
573
- confidence: number;
574
- evidence: string;
575
- hash: string;
576
- }
577
- export interface AttackChainProgress {
578
- chainId: string;
579
- chainName: string;
580
- target: InvestigationTarget;
581
- observedSteps: AttackChainObservation[];
582
- completionPercentage: number;
583
- currentPhase: AttackChainPhase;
584
- riskLevel: 'low' | 'medium' | 'high' | 'critical';
585
- isComplete: boolean;
586
- nextExpectedSteps: AttackChainStep[];
587
- }
588
- export declare const GOOGLE_SURVEILLANCE_CHAIN: AttackChain;
589
- export declare const GOOGLE_DRAFT_EXPLOITATION_CHAIN: AttackChain;
590
- export declare const APPLE_IMESSAGE_MITM_CHAIN: AttackChain;
591
- export declare const APPLE_CONTACT_KEY_BYPASS_CHAIN: AttackChain;
592
- export declare const CROSS_PLATFORM_SURVEILLANCE_CHAIN: AttackChain;
593
- export declare const ATTACK_CHAIN_REGISTRY: AttackChain[];
594
- export declare class AttackChainDetector {
595
- private storageDir;
596
- private observations;
597
- private progressCache;
598
- constructor(storageDir: string);
599
- initialize(): Promise<void>;
600
- /**
601
- * Record an observation that matches an attack chain step.
602
- */
603
- recordObservation(params: {
604
- chainId: string;
605
- stepId: string;
606
- findingId: string;
607
- confidence: number;
608
- evidence: string;
609
- }): Promise<AttackChainObservation>;
610
- /**
611
- * Automatically detect which attack chain steps match a finding.
612
- */
613
- detectChainSteps(finding: Finding): Promise<AttackChainObservation[]>;
614
- /**
615
- * Get current progress for an attack chain.
616
- */
617
- getChainProgress(chainId: string): Promise<AttackChainProgress>;
618
- /**
619
- * Get all attack chain progress.
620
- */
621
- getAllProgress(): Promise<AttackChainProgress[]>;
622
- /**
623
- * Get chains relevant to a specific target.
624
- */
625
- getChainsForTarget(target: InvestigationTarget): AttackChain[];
626
- /**
627
- * Analyze findings and detect complete or partial attack chains.
628
- */
629
- analyzeFindings(findings: Finding[]): Promise<{
630
- completeChains: AttackChainProgress[];
631
- partialChains: AttackChainProgress[];
632
- activeThreats: AttackChainProgress[];
633
- }>;
634
- /**
635
- * Generate attack chain report.
636
- */
637
- generateChainReport(chainId: string): Promise<{
638
- chain: AttackChain;
639
- progress: AttackChainProgress;
640
- timeline: Array<{
641
- step: AttackChainStep;
642
- observation: AttackChainObservation | null;
643
- }>;
644
- gaps: AttackChainStep[];
645
- evidenceStrength: 'weak' | 'moderate' | 'strong' | 'irrefutable';
646
- legalReadiness: 'insufficient' | 'preliminary' | 'actionable' | 'prosecution_ready';
647
- }>;
648
- private updateProgress;
649
- private persistObservation;
650
- private persistProgress;
651
- }
652
- declare module './unifiedFraudOrchestrator.js' {
653
- interface UnifiedFraudOrchestrator {
654
- attackChainDetector: AttackChainDetector;
655
- initializeAttackChains(): Promise<void>;
656
- detectAttackChains(investigationId: string): Promise<{
657
- completeChains: AttackChainProgress[];
658
- partialChains: AttackChainProgress[];
659
- activeThreats: AttackChainProgress[];
660
- }>;
661
- getAttackChainReport(chainId: string): Promise<ReturnType<AttackChainDetector['generateChainReport']>>;
662
- }
663
- }
664
- /**
665
- * Comprehensive definitions of government and defense products/systems
666
- * offered by major tech companies. Essential for understanding:
667
- * - Attack surface for government targets
668
- * - Data sharing agreements and access points
669
- * - Compliance frameworks and certifications
670
- * - Potential surveillance/backdoor vectors
671
- */
672
- export interface GovDefenseProduct {
673
- id: string;
674
- name: string;
675
- vendor: InvestigationTarget;
676
- category: 'cloud' | 'productivity' | 'security' | 'ai_ml' | 'communications' | 'infrastructure' | 'analytics' | 'identity' | 'hardware' | 'services';
677
- subcategory?: string;
678
- description: string;
679
- targetCustomers: ('federal' | 'dod' | 'ic' | 'state_local' | 'defense_contractors' | 'allied_nations')[];
680
- certifications: string[];
681
- dataResidency: string[];
682
- knownContracts?: string[];
683
- securityConcerns: string[];
684
- accessPoints: string[];
685
- integrations: string[];
686
- }
687
- export interface GovDefenseVendorProfile {
688
- vendor: InvestigationTarget;
689
- govDivision?: string;
690
- annualGovRevenue?: string;
691
- fedRampStatus: string[];
692
- primaryContracts: string[];
693
- products: GovDefenseProduct[];
694
- dataAccessCapabilities: string[];
695
- knownBackdoors: string[];
696
- lawEnforcementCooperation: string;
697
- }
698
- export declare const GOOGLE_GOV_PRODUCTS: GovDefenseProduct[];
699
- export declare const GOOGLE_GOV_PROFILE: GovDefenseVendorProfile;
700
- export declare const APPLE_GOV_PRODUCTS: GovDefenseProduct[];
701
- export declare const APPLE_GOV_PROFILE: GovDefenseVendorProfile;
702
- export declare const MICROSOFT_GOV_PRODUCTS: GovDefenseProduct[];
703
- export declare const MICROSOFT_GOV_PROFILE: GovDefenseVendorProfile;
704
- export declare const AMAZON_GOV_PRODUCTS: GovDefenseProduct[];
705
- export declare const AMAZON_GOV_PROFILE: GovDefenseVendorProfile;
706
- export declare const META_GOV_PRODUCTS: GovDefenseProduct[];
707
- export declare const META_GOV_PROFILE: GovDefenseVendorProfile;
708
- export declare const GOV_DEFENSE_VENDOR_REGISTRY: GovDefenseVendorProfile[];
709
- export declare const ALL_GOV_DEFENSE_PRODUCTS: GovDefenseProduct[];
710
- /**
711
- * Get all government products for a specific vendor.
712
- */
713
- export declare function getGovProductsByVendor(vendor: InvestigationTarget): GovDefenseProduct[];
714
- /**
715
- * Get government vendor profile.
716
- */
717
- export declare function getGovVendorProfile(vendor: InvestigationTarget): GovDefenseVendorProfile | undefined;
718
- /**
719
- * Get all products matching a category.
720
- */
721
- export declare function getGovProductsByCategory(category: GovDefenseProduct['category']): GovDefenseProduct[];
722
- /**
723
- * Get all products with specific certification.
724
- */
725
- export declare function getGovProductsByCertification(certification: string): GovDefenseProduct[];
726
- /**
727
- * Get all products targeting specific customer type.
728
- */
729
- export declare function getGovProductsByCustomerType(customerType: 'federal' | 'dod' | 'ic' | 'state_local' | 'defense_contractors' | 'allied_nations'): GovDefenseProduct[];
730
- /**
731
- * Get security concerns summary across all vendors.
732
- */
733
- export declare function getSecurityConcernsSummary(): Record<string, string[]>;
734
- /**
735
- * Get access points summary - how vendors can access government data.
736
- */
737
- export declare function getAccessPointsSummary(): Record<string, string[]>;
738
- //# sourceMappingURL=unifiedFraudOrchestrator.d.ts.map