instar 0.26.4 → 0.26.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +61 -7
- package/dist/commands/server.d.ts.map +1 -1
- package/dist/commands/server.js +156 -3
- package/dist/commands/server.js.map +1 -1
- package/dist/core/SessionManager.d.ts +31 -0
- package/dist/core/SessionManager.d.ts.map +1 -1
- package/dist/core/SessionManager.js +164 -20
- package/dist/core/SessionManager.js.map +1 -1
- package/dist/core/TopicResumeMap.d.ts +5 -0
- package/dist/core/TopicResumeMap.d.ts.map +1 -1
- package/dist/core/TopicResumeMap.js +7 -0
- package/dist/core/TopicResumeMap.js.map +1 -1
- package/dist/core/types.d.ts +0 -4
- package/dist/core/types.d.ts.map +1 -1
- package/dist/core/types.js.map +1 -1
- package/dist/messaging/imessage/IMessageAdapter.d.ts +16 -0
- package/dist/messaging/imessage/IMessageAdapter.d.ts.map +1 -1
- package/dist/messaging/imessage/IMessageAdapter.js +60 -2
- package/dist/messaging/imessage/IMessageAdapter.js.map +1 -1
- package/dist/messaging/imessage/types.d.ts +11 -0
- package/dist/messaging/imessage/types.d.ts.map +1 -1
- package/dist/messaging/slack/SlackAdapter.d.ts.map +1 -1
- package/dist/messaging/slack/SlackAdapter.js +46 -12
- package/dist/messaging/slack/SlackAdapter.js.map +1 -1
- package/dist/scaffold/templates.d.ts +1 -1
- package/dist/scaffold/templates.d.ts.map +1 -1
- package/dist/scaffold/templates.js +32 -1
- package/dist/scaffold/templates.js.map +1 -1
- package/dist/server/AgentServer.d.ts +1 -0
- package/dist/server/AgentServer.d.ts.map +1 -1
- package/dist/server/AgentServer.js +1 -0
- package/dist/server/AgentServer.js.map +1 -1
- package/dist/server/routes.d.ts +1 -0
- package/dist/server/routes.d.ts.map +1 -1
- package/dist/server/routes.js +155 -0
- package/dist/server/routes.js.map +1 -1
- package/package.json +1 -1
- package/src/data/builtin-manifest.json +65 -49
- package/src/templates/hooks/intercept-imsg-send.js +68 -0
- package/src/templates/scripts/imessage-reply.sh +130 -0
- package/upgrades/0.26.5.md +15 -0
- package/upgrades/0.26.6.md +23 -0
- package/upgrades/NEXT.md +0 -35
- /package/.claude/skills/secret-setup/{SKILL.md → skill.md} +0 -0
package/package.json
CHANGED
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
{
|
|
2
2
|
"$schema": "./builtin-manifest.schema.json",
|
|
3
3
|
"schemaVersion": 1,
|
|
4
|
-
"generatedAt": "2026-04-
|
|
5
|
-
"instarVersion": "0.26.
|
|
6
|
-
"entryCount":
|
|
4
|
+
"generatedAt": "2026-04-03T02:18:54.616Z",
|
|
5
|
+
"instarVersion": "0.26.6",
|
|
6
|
+
"entryCount": 182,
|
|
7
7
|
"entries": {
|
|
8
8
|
"hook:session-start": {
|
|
9
9
|
"id": "hook:session-start",
|
|
@@ -368,7 +368,7 @@
|
|
|
368
368
|
"type": "route-group",
|
|
369
369
|
"domain": "monitoring",
|
|
370
370
|
"sourcePath": "src/server/routes.ts",
|
|
371
|
-
"contentHash": "
|
|
371
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
372
372
|
"since": "2025-01-01"
|
|
373
373
|
},
|
|
374
374
|
"route-group:agents": {
|
|
@@ -376,7 +376,7 @@
|
|
|
376
376
|
"type": "route-group",
|
|
377
377
|
"domain": "sessions",
|
|
378
378
|
"sourcePath": "src/server/routes.ts",
|
|
379
|
-
"contentHash": "
|
|
379
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
380
380
|
"since": "2025-01-01"
|
|
381
381
|
},
|
|
382
382
|
"route-group:backups": {
|
|
@@ -384,7 +384,7 @@
|
|
|
384
384
|
"type": "route-group",
|
|
385
385
|
"domain": "operations",
|
|
386
386
|
"sourcePath": "src/server/routes.ts",
|
|
387
|
-
"contentHash": "
|
|
387
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
388
388
|
"since": "2025-01-01"
|
|
389
389
|
},
|
|
390
390
|
"route-group:git": {
|
|
@@ -392,7 +392,7 @@
|
|
|
392
392
|
"type": "route-group",
|
|
393
393
|
"domain": "coordination",
|
|
394
394
|
"sourcePath": "src/server/routes.ts",
|
|
395
|
-
"contentHash": "
|
|
395
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
396
396
|
"since": "2025-01-01"
|
|
397
397
|
},
|
|
398
398
|
"route-group:memory": {
|
|
@@ -400,7 +400,7 @@
|
|
|
400
400
|
"type": "route-group",
|
|
401
401
|
"domain": "memory",
|
|
402
402
|
"sourcePath": "src/server/routes.ts",
|
|
403
|
-
"contentHash": "
|
|
403
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
404
404
|
"since": "2025-01-01"
|
|
405
405
|
},
|
|
406
406
|
"route-group:semantic": {
|
|
@@ -408,7 +408,7 @@
|
|
|
408
408
|
"type": "route-group",
|
|
409
409
|
"domain": "memory",
|
|
410
410
|
"sourcePath": "src/server/routes.ts",
|
|
411
|
-
"contentHash": "
|
|
411
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
412
412
|
"since": "2025-01-01"
|
|
413
413
|
},
|
|
414
414
|
"route-group:status": {
|
|
@@ -416,7 +416,7 @@
|
|
|
416
416
|
"type": "route-group",
|
|
417
417
|
"domain": "monitoring",
|
|
418
418
|
"sourcePath": "src/server/routes.ts",
|
|
419
|
-
"contentHash": "
|
|
419
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
420
420
|
"since": "2025-01-01"
|
|
421
421
|
},
|
|
422
422
|
"route-group:capabilities": {
|
|
@@ -424,7 +424,7 @@
|
|
|
424
424
|
"type": "route-group",
|
|
425
425
|
"domain": "mapping",
|
|
426
426
|
"sourcePath": "src/server/routes.ts",
|
|
427
|
-
"contentHash": "
|
|
427
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
428
428
|
"since": "2025-01-01"
|
|
429
429
|
},
|
|
430
430
|
"route-group:project-map": {
|
|
@@ -432,7 +432,7 @@
|
|
|
432
432
|
"type": "route-group",
|
|
433
433
|
"domain": "mapping",
|
|
434
434
|
"sourcePath": "src/server/routes.ts",
|
|
435
|
-
"contentHash": "
|
|
435
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
436
436
|
"since": "2025-01-01"
|
|
437
437
|
},
|
|
438
438
|
"route-group:coherence": {
|
|
@@ -440,7 +440,7 @@
|
|
|
440
440
|
"type": "route-group",
|
|
441
441
|
"domain": "coherence",
|
|
442
442
|
"sourcePath": "src/server/routes.ts",
|
|
443
|
-
"contentHash": "
|
|
443
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
444
444
|
"since": "2025-01-01"
|
|
445
445
|
},
|
|
446
446
|
"route-group:topic-bindings": {
|
|
@@ -448,7 +448,7 @@
|
|
|
448
448
|
"type": "route-group",
|
|
449
449
|
"domain": "sessions",
|
|
450
450
|
"sourcePath": "src/server/routes.ts",
|
|
451
|
-
"contentHash": "
|
|
451
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
452
452
|
"since": "2025-01-01"
|
|
453
453
|
},
|
|
454
454
|
"route-group:context": {
|
|
@@ -456,7 +456,7 @@
|
|
|
456
456
|
"type": "route-group",
|
|
457
457
|
"domain": "context",
|
|
458
458
|
"sourcePath": "src/server/routes.ts",
|
|
459
|
-
"contentHash": "
|
|
459
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
460
460
|
"since": "2025-01-01"
|
|
461
461
|
},
|
|
462
462
|
"route-group:scope-coherence": {
|
|
@@ -464,7 +464,7 @@
|
|
|
464
464
|
"type": "route-group",
|
|
465
465
|
"domain": "coherence",
|
|
466
466
|
"sourcePath": "src/server/routes.ts",
|
|
467
|
-
"contentHash": "
|
|
467
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
468
468
|
"since": "2025-01-01"
|
|
469
469
|
},
|
|
470
470
|
"route-group:canonical-state": {
|
|
@@ -472,7 +472,7 @@
|
|
|
472
472
|
"type": "route-group",
|
|
473
473
|
"domain": "state",
|
|
474
474
|
"sourcePath": "src/server/routes.ts",
|
|
475
|
-
"contentHash": "
|
|
475
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
476
476
|
"since": "2025-01-01"
|
|
477
477
|
},
|
|
478
478
|
"route-group:ci": {
|
|
@@ -480,7 +480,7 @@
|
|
|
480
480
|
"type": "route-group",
|
|
481
481
|
"domain": "monitoring",
|
|
482
482
|
"sourcePath": "src/server/routes.ts",
|
|
483
|
-
"contentHash": "
|
|
483
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
484
484
|
"since": "2025-01-01"
|
|
485
485
|
},
|
|
486
486
|
"route-group:sessions": {
|
|
@@ -488,7 +488,7 @@
|
|
|
488
488
|
"type": "route-group",
|
|
489
489
|
"domain": "sessions",
|
|
490
490
|
"sourcePath": "src/server/routes.ts",
|
|
491
|
-
"contentHash": "
|
|
491
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
492
492
|
"since": "2025-01-01"
|
|
493
493
|
},
|
|
494
494
|
"route-group:jobs": {
|
|
@@ -496,7 +496,7 @@
|
|
|
496
496
|
"type": "route-group",
|
|
497
497
|
"domain": "scheduling",
|
|
498
498
|
"sourcePath": "src/server/routes.ts",
|
|
499
|
-
"contentHash": "
|
|
499
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
500
500
|
"since": "2025-01-01"
|
|
501
501
|
},
|
|
502
502
|
"route-group:skip-ledger": {
|
|
@@ -504,7 +504,7 @@
|
|
|
504
504
|
"type": "route-group",
|
|
505
505
|
"domain": "scheduling",
|
|
506
506
|
"sourcePath": "src/server/routes.ts",
|
|
507
|
-
"contentHash": "
|
|
507
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
508
508
|
"since": "2025-01-01"
|
|
509
509
|
},
|
|
510
510
|
"route-group:telegram": {
|
|
@@ -512,7 +512,7 @@
|
|
|
512
512
|
"type": "route-group",
|
|
513
513
|
"domain": "communication",
|
|
514
514
|
"sourcePath": "src/server/routes.ts",
|
|
515
|
-
"contentHash": "
|
|
515
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
516
516
|
"since": "2025-01-01"
|
|
517
517
|
},
|
|
518
518
|
"route-group:attention": {
|
|
@@ -520,7 +520,7 @@
|
|
|
520
520
|
"type": "route-group",
|
|
521
521
|
"domain": "communication",
|
|
522
522
|
"sourcePath": "src/server/routes.ts",
|
|
523
|
-
"contentHash": "
|
|
523
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
524
524
|
"since": "2025-01-01"
|
|
525
525
|
},
|
|
526
526
|
"route-group:relationships": {
|
|
@@ -528,7 +528,7 @@
|
|
|
528
528
|
"type": "route-group",
|
|
529
529
|
"domain": "relationships",
|
|
530
530
|
"sourcePath": "src/server/routes.ts",
|
|
531
|
-
"contentHash": "
|
|
531
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
532
532
|
"since": "2025-01-01"
|
|
533
533
|
},
|
|
534
534
|
"route-group:feedback": {
|
|
@@ -536,7 +536,7 @@
|
|
|
536
536
|
"type": "route-group",
|
|
537
537
|
"domain": "feedback",
|
|
538
538
|
"sourcePath": "src/server/routes.ts",
|
|
539
|
-
"contentHash": "
|
|
539
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
540
540
|
"since": "2025-01-01"
|
|
541
541
|
},
|
|
542
542
|
"route-group:updates": {
|
|
@@ -544,7 +544,7 @@
|
|
|
544
544
|
"type": "route-group",
|
|
545
545
|
"domain": "updates",
|
|
546
546
|
"sourcePath": "src/server/routes.ts",
|
|
547
|
-
"contentHash": "
|
|
547
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
548
548
|
"since": "2025-01-01"
|
|
549
549
|
},
|
|
550
550
|
"route-group:dispatches": {
|
|
@@ -552,7 +552,7 @@
|
|
|
552
552
|
"type": "route-group",
|
|
553
553
|
"domain": "dispatches",
|
|
554
554
|
"sourcePath": "src/server/routes.ts",
|
|
555
|
-
"contentHash": "
|
|
555
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
556
556
|
"since": "2025-01-01"
|
|
557
557
|
},
|
|
558
558
|
"route-group:quota": {
|
|
@@ -560,7 +560,7 @@
|
|
|
560
560
|
"type": "route-group",
|
|
561
561
|
"domain": "monitoring",
|
|
562
562
|
"sourcePath": "src/server/routes.ts",
|
|
563
|
-
"contentHash": "
|
|
563
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
564
564
|
"since": "2025-01-01"
|
|
565
565
|
},
|
|
566
566
|
"route-group:publishing": {
|
|
@@ -568,7 +568,7 @@
|
|
|
568
568
|
"type": "route-group",
|
|
569
569
|
"domain": "publishing",
|
|
570
570
|
"sourcePath": "src/server/routes.ts",
|
|
571
|
-
"contentHash": "
|
|
571
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
572
572
|
"since": "2025-01-01"
|
|
573
573
|
},
|
|
574
574
|
"route-group:private-views": {
|
|
@@ -576,7 +576,7 @@
|
|
|
576
576
|
"type": "route-group",
|
|
577
577
|
"domain": "publishing",
|
|
578
578
|
"sourcePath": "src/server/routes.ts",
|
|
579
|
-
"contentHash": "
|
|
579
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
580
580
|
"since": "2025-01-01"
|
|
581
581
|
},
|
|
582
582
|
"route-group:tunnel": {
|
|
@@ -584,7 +584,7 @@
|
|
|
584
584
|
"type": "route-group",
|
|
585
585
|
"domain": "networking",
|
|
586
586
|
"sourcePath": "src/server/routes.ts",
|
|
587
|
-
"contentHash": "
|
|
587
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
588
588
|
"since": "2025-01-01"
|
|
589
589
|
},
|
|
590
590
|
"route-group:events": {
|
|
@@ -592,7 +592,7 @@
|
|
|
592
592
|
"type": "route-group",
|
|
593
593
|
"domain": "networking",
|
|
594
594
|
"sourcePath": "src/server/routes.ts",
|
|
595
|
-
"contentHash": "
|
|
595
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
596
596
|
"since": "2025-01-01"
|
|
597
597
|
},
|
|
598
598
|
"route-group:evolution": {
|
|
@@ -600,7 +600,7 @@
|
|
|
600
600
|
"type": "route-group",
|
|
601
601
|
"domain": "evolution",
|
|
602
602
|
"sourcePath": "src/server/routes.ts",
|
|
603
|
-
"contentHash": "
|
|
603
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
604
604
|
"since": "2025-01-01"
|
|
605
605
|
},
|
|
606
606
|
"route-group:watchdog": {
|
|
@@ -608,7 +608,7 @@
|
|
|
608
608
|
"type": "route-group",
|
|
609
609
|
"domain": "monitoring",
|
|
610
610
|
"sourcePath": "src/server/routes.ts",
|
|
611
|
-
"contentHash": "
|
|
611
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
612
612
|
"since": "2025-01-01"
|
|
613
613
|
},
|
|
614
614
|
"route-group:topic-memory": {
|
|
@@ -616,7 +616,7 @@
|
|
|
616
616
|
"type": "route-group",
|
|
617
617
|
"domain": "memory",
|
|
618
618
|
"sourcePath": "src/server/routes.ts",
|
|
619
|
-
"contentHash": "
|
|
619
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
620
620
|
"since": "2025-01-01"
|
|
621
621
|
},
|
|
622
622
|
"route-group:state-sync": {
|
|
@@ -624,7 +624,7 @@
|
|
|
624
624
|
"type": "route-group",
|
|
625
625
|
"domain": "coordination",
|
|
626
626
|
"sourcePath": "src/server/routes.ts",
|
|
627
|
-
"contentHash": "
|
|
627
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
628
628
|
"since": "2025-01-01"
|
|
629
629
|
},
|
|
630
630
|
"route-group:intent": {
|
|
@@ -632,7 +632,7 @@
|
|
|
632
632
|
"type": "route-group",
|
|
633
633
|
"domain": "intent",
|
|
634
634
|
"sourcePath": "src/server/routes.ts",
|
|
635
|
-
"contentHash": "
|
|
635
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
636
636
|
"since": "2025-01-01"
|
|
637
637
|
},
|
|
638
638
|
"route-group:triage": {
|
|
@@ -640,7 +640,7 @@
|
|
|
640
640
|
"type": "route-group",
|
|
641
641
|
"domain": "safety",
|
|
642
642
|
"sourcePath": "src/server/routes.ts",
|
|
643
|
-
"contentHash": "
|
|
643
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
644
644
|
"since": "2025-01-01"
|
|
645
645
|
},
|
|
646
646
|
"route-group:operations": {
|
|
@@ -648,7 +648,7 @@
|
|
|
648
648
|
"type": "route-group",
|
|
649
649
|
"domain": "safety",
|
|
650
650
|
"sourcePath": "src/server/routes.ts",
|
|
651
|
-
"contentHash": "
|
|
651
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
652
652
|
"since": "2025-01-01"
|
|
653
653
|
},
|
|
654
654
|
"route-group:sentinel": {
|
|
@@ -656,7 +656,7 @@
|
|
|
656
656
|
"type": "route-group",
|
|
657
657
|
"domain": "safety",
|
|
658
658
|
"sourcePath": "src/server/routes.ts",
|
|
659
|
-
"contentHash": "
|
|
659
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
660
660
|
"since": "2025-01-01"
|
|
661
661
|
},
|
|
662
662
|
"route-group:trust": {
|
|
@@ -664,7 +664,7 @@
|
|
|
664
664
|
"type": "route-group",
|
|
665
665
|
"domain": "safety",
|
|
666
666
|
"sourcePath": "src/server/routes.ts",
|
|
667
|
-
"contentHash": "
|
|
667
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
668
668
|
"since": "2025-01-01"
|
|
669
669
|
},
|
|
670
670
|
"route-group:monitoring": {
|
|
@@ -672,7 +672,7 @@
|
|
|
672
672
|
"type": "route-group",
|
|
673
673
|
"domain": "monitoring",
|
|
674
674
|
"sourcePath": "src/server/routes.ts",
|
|
675
|
-
"contentHash": "
|
|
675
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
676
676
|
"since": "2025-01-01"
|
|
677
677
|
},
|
|
678
678
|
"route-group:commitments": {
|
|
@@ -680,7 +680,7 @@
|
|
|
680
680
|
"type": "route-group",
|
|
681
681
|
"domain": "commitments",
|
|
682
682
|
"sourcePath": "src/server/routes.ts",
|
|
683
|
-
"contentHash": "
|
|
683
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
684
684
|
"since": "2025-01-01"
|
|
685
685
|
},
|
|
686
686
|
"route-group:episodes": {
|
|
@@ -688,7 +688,7 @@
|
|
|
688
688
|
"type": "route-group",
|
|
689
689
|
"domain": "memory",
|
|
690
690
|
"sourcePath": "src/server/routes.ts",
|
|
691
|
-
"contentHash": "
|
|
691
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
692
692
|
"since": "2025-01-01"
|
|
693
693
|
},
|
|
694
694
|
"route-group:messages": {
|
|
@@ -696,7 +696,7 @@
|
|
|
696
696
|
"type": "route-group",
|
|
697
697
|
"domain": "coordination",
|
|
698
698
|
"sourcePath": "src/server/routes.ts",
|
|
699
|
-
"contentHash": "
|
|
699
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
700
700
|
"since": "2025-01-01"
|
|
701
701
|
},
|
|
702
702
|
"route-group:system-reviews": {
|
|
@@ -704,7 +704,7 @@
|
|
|
704
704
|
"type": "route-group",
|
|
705
705
|
"domain": "monitoring",
|
|
706
706
|
"sourcePath": "src/server/routes.ts",
|
|
707
|
-
"contentHash": "
|
|
707
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
708
708
|
"since": "2025-01-01"
|
|
709
709
|
},
|
|
710
710
|
"route-group:machine-mesh": {
|
|
@@ -720,7 +720,7 @@
|
|
|
720
720
|
"type": "route-group",
|
|
721
721
|
"domain": "security",
|
|
722
722
|
"sourcePath": "src/server/routes.ts",
|
|
723
|
-
"contentHash": "
|
|
723
|
+
"contentHash": "f8e0d62dfb4aba299920f05eb99b54b2414680623d122fa19a5f5429e915e99a",
|
|
724
724
|
"since": "2025-01-01"
|
|
725
725
|
},
|
|
726
726
|
"cli:init": {
|
|
@@ -987,6 +987,14 @@
|
|
|
987
987
|
"contentHash": "5ca5b2dc8d29ada7b3f6f0f495668641886ffa9ed3317898711022c47abab2ab",
|
|
988
988
|
"since": "2025-01-01"
|
|
989
989
|
},
|
|
990
|
+
"template:intercept-imsg-send.js": {
|
|
991
|
+
"id": "template:intercept-imsg-send.js",
|
|
992
|
+
"type": "template",
|
|
993
|
+
"domain": "safety",
|
|
994
|
+
"sourcePath": "src/templates/hooks/intercept-imsg-send.js",
|
|
995
|
+
"contentHash": "e3c3fd1eef756b31358e08647105c9b09eb93e9579efb0883afa4d2717cb23ce",
|
|
996
|
+
"since": "2025-01-01"
|
|
997
|
+
},
|
|
990
998
|
"template:session-start.sh": {
|
|
991
999
|
"id": "template:session-start.sh",
|
|
992
1000
|
"type": "template",
|
|
@@ -1043,6 +1051,14 @@
|
|
|
1043
1051
|
"contentHash": "4be25bb6180bc16e0039359ed15688e3c6c1fc99fe369297d5e100c0eb1bad18",
|
|
1044
1052
|
"since": "2025-01-01"
|
|
1045
1053
|
},
|
|
1054
|
+
"template:imessage-reply.sh": {
|
|
1055
|
+
"id": "template:imessage-reply.sh",
|
|
1056
|
+
"type": "template",
|
|
1057
|
+
"domain": "operations",
|
|
1058
|
+
"sourcePath": "src/templates/scripts/imessage-reply.sh",
|
|
1059
|
+
"contentHash": "cd911d4cb5dd25ed34b80e0bb2fbd1819b4fd0cf2b754fbaa438e542494b8459",
|
|
1060
|
+
"since": "2025-01-01"
|
|
1061
|
+
},
|
|
1046
1062
|
"template:serendipity-capture.sh": {
|
|
1047
1063
|
"id": "template:serendipity-capture.sh",
|
|
1048
1064
|
"type": "template",
|
|
@@ -1352,7 +1368,7 @@
|
|
|
1352
1368
|
"type": "subsystem",
|
|
1353
1369
|
"domain": "server",
|
|
1354
1370
|
"sourcePath": "src/server/AgentServer.ts",
|
|
1355
|
-
"contentHash": "
|
|
1371
|
+
"contentHash": "a6086a2ce9695ba19af6e5e9c46ac6dfcb61d0a64a6809302f26a62b5753fce3",
|
|
1356
1372
|
"since": "2025-01-01"
|
|
1357
1373
|
},
|
|
1358
1374
|
"subsystem:session-manager": {
|
|
@@ -1360,7 +1376,7 @@
|
|
|
1360
1376
|
"type": "subsystem",
|
|
1361
1377
|
"domain": "sessions",
|
|
1362
1378
|
"sourcePath": "src/core/SessionManager.ts",
|
|
1363
|
-
"contentHash": "
|
|
1379
|
+
"contentHash": "bae6a4957dca51a4db962492abad139a1afb509b1f525f61f265546bc3452ec5",
|
|
1364
1380
|
"since": "2025-01-01"
|
|
1365
1381
|
},
|
|
1366
1382
|
"subsystem:auto-updater": {
|
|
@@ -0,0 +1,68 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* intercept-imsg-send.js — PreToolUse hook to block direct iMessage sending.
|
|
3
|
+
*
|
|
4
|
+
* Layer 2 of the 5-layer outbound safety defense-in-depth.
|
|
5
|
+
*
|
|
6
|
+
* Blocks: imsg send, osascript+Messages.app, common indirect execution patterns.
|
|
7
|
+
* Allows: imsg chats, imsg --version, imsg --help (read-only operations).
|
|
8
|
+
*
|
|
9
|
+
* Known limitations (Phase 1 accepted risks):
|
|
10
|
+
* - Scripts written to files and executed bypass inline pattern matching
|
|
11
|
+
* - Base64-encoded commands bypass regex detection
|
|
12
|
+
* - macOS Shortcuts.app could be invoked to send messages
|
|
13
|
+
* - Addressed structurally in Phase 2 (OS-level permission revocation)
|
|
14
|
+
*
|
|
15
|
+
* Install: Place in .claude/hooks/ and register as PreToolUse hook on Bash tool.
|
|
16
|
+
* Integrity: chmod 444 after install. Server verifies SHA-256 hash periodically.
|
|
17
|
+
*/
|
|
18
|
+
|
|
19
|
+
// Hook receives tool input on stdin
|
|
20
|
+
const input = await new Promise((resolve) => {
|
|
21
|
+
let data = '';
|
|
22
|
+
process.stdin.on('data', (chunk) => { data += chunk; });
|
|
23
|
+
process.stdin.on('end', () => {
|
|
24
|
+
try { resolve(JSON.parse(data)); }
|
|
25
|
+
catch { resolve({}); }
|
|
26
|
+
});
|
|
27
|
+
});
|
|
28
|
+
|
|
29
|
+
const toolName = input.tool_name || '';
|
|
30
|
+
const toolInput = input.tool_input || {};
|
|
31
|
+
|
|
32
|
+
// Only intercept Bash tool calls
|
|
33
|
+
if (toolName !== 'Bash') {
|
|
34
|
+
// Allow all non-Bash tools
|
|
35
|
+
process.stdout.write(JSON.stringify({ decision: 'allow' }));
|
|
36
|
+
process.exit(0);
|
|
37
|
+
}
|
|
38
|
+
|
|
39
|
+
const command = (toolInput.command || '').toString();
|
|
40
|
+
|
|
41
|
+
// Patterns that indicate direct iMessage sending
|
|
42
|
+
const BLOCKED_PATTERNS = [
|
|
43
|
+
// Direct imsg send
|
|
44
|
+
/\bimsg\s+send\b/i,
|
|
45
|
+
// AppleScript targeting Messages.app
|
|
46
|
+
/\bosascript\b.*\bMessages\b/i,
|
|
47
|
+
/\btell\s+application\s+"Messages"/i,
|
|
48
|
+
/\btell\s+application\s+'Messages'/i,
|
|
49
|
+
// Indirect execution with iMessage references
|
|
50
|
+
/\b(?:python3?|node|ruby|perl)\s+(?:-[ce]|--eval)\s+.*\b(?:imsg\s+send|Messages)\b/i,
|
|
51
|
+
// Piped execution
|
|
52
|
+
/\becho\s+.*\b(?:imsg\s+send|Messages)\b.*\|\s*(?:ba)?sh/i,
|
|
53
|
+
// Crontab modification (could schedule sends)
|
|
54
|
+
/\bcrontab\s+-[elr]/i,
|
|
55
|
+
// macOS Shortcuts that could send messages
|
|
56
|
+
/\bshortcuts\s+run\b.*(?:message|sms|imessage|send)/i,
|
|
57
|
+
];
|
|
58
|
+
|
|
59
|
+
const isBlocked = BLOCKED_PATTERNS.some((p) => p.test(command));
|
|
60
|
+
|
|
61
|
+
if (isBlocked) {
|
|
62
|
+
process.stdout.write(JSON.stringify({
|
|
63
|
+
decision: 'block',
|
|
64
|
+
reason: 'Direct iMessage sending is blocked. Use imessage-reply.sh for authorized sends.',
|
|
65
|
+
}));
|
|
66
|
+
} else {
|
|
67
|
+
process.stdout.write(JSON.stringify({ decision: 'allow' }));
|
|
68
|
+
}
|
|
@@ -0,0 +1,130 @@
|
|
|
1
|
+
#!/bin/bash
|
|
2
|
+
# imessage-reply.sh — Send a reply via iMessage with validate-before-send safety.
|
|
3
|
+
#
|
|
4
|
+
# Usage:
|
|
5
|
+
# ./imessage-reply.sh RECIPIENT "message text"
|
|
6
|
+
# echo "message text" | ./imessage-reply.sh RECIPIENT
|
|
7
|
+
# cat <<'EOF' | ./imessage-reply.sh RECIPIENT
|
|
8
|
+
# Multi-line message here
|
|
9
|
+
# EOF
|
|
10
|
+
#
|
|
11
|
+
# RECIPIENT is a phone number (+14081234567) or email (user@icloud.com).
|
|
12
|
+
#
|
|
13
|
+
# This script implements Layer 1 of the 5-layer outbound safety defense:
|
|
14
|
+
# 1. Validates recipient with server BEFORE sending (gets single-use token)
|
|
15
|
+
# 2. Sends the iMessage via `imsg send` CLI (requires Automation permission)
|
|
16
|
+
# 3. Confirms delivery to server with token (for logging + stall tracking)
|
|
17
|
+
#
|
|
18
|
+
# If validation fails, the message is NOT sent. This is the reverse of the
|
|
19
|
+
# original flow which sent first and notified second.
|
|
20
|
+
|
|
21
|
+
RECIPIENT="$1"
|
|
22
|
+
shift
|
|
23
|
+
|
|
24
|
+
if [ -z "$RECIPIENT" ]; then
|
|
25
|
+
echo "Usage: imessage-reply.sh RECIPIENT [message]" >&2
|
|
26
|
+
exit 1
|
|
27
|
+
fi
|
|
28
|
+
|
|
29
|
+
# Read message from args or stdin
|
|
30
|
+
if [ $# -gt 0 ]; then
|
|
31
|
+
MSG="$*"
|
|
32
|
+
else
|
|
33
|
+
MSG="$(cat)"
|
|
34
|
+
fi
|
|
35
|
+
|
|
36
|
+
if [ -z "$MSG" ]; then
|
|
37
|
+
echo "No message provided" >&2
|
|
38
|
+
exit 1
|
|
39
|
+
fi
|
|
40
|
+
|
|
41
|
+
# ── Setup ─────────────────────────────────────────────────────────────
|
|
42
|
+
|
|
43
|
+
PORT="${INSTAR_PORT:-4042}"
|
|
44
|
+
|
|
45
|
+
AUTH_TOKEN=""
|
|
46
|
+
if [ -f ".instar/config.json" ]; then
|
|
47
|
+
AUTH_TOKEN=$(python3 -c "import json; print(json.load(open('.instar/config.json')).get('authToken',''))" 2>/dev/null)
|
|
48
|
+
fi
|
|
49
|
+
|
|
50
|
+
# Escape message for JSON
|
|
51
|
+
JSON_MSG=$(printf '%s' "$MSG" | python3 -c 'import sys,json; print(json.dumps(sys.stdin.read()))' 2>/dev/null)
|
|
52
|
+
if [ -z "$JSON_MSG" ]; then
|
|
53
|
+
JSON_MSG="\"$(printf '%s' "$MSG" | sed 's/\\/\\\\/g; s/"/\\"/g; s/\n/\\n/g')\""
|
|
54
|
+
fi
|
|
55
|
+
|
|
56
|
+
# URL-encode the recipient
|
|
57
|
+
ENCODED_RECIPIENT=$(printf '%s' "$RECIPIENT" | python3 -c 'import sys,urllib.parse; print(urllib.parse.quote(sys.stdin.read().strip(), safe=""))' 2>/dev/null)
|
|
58
|
+
if [ -z "$ENCODED_RECIPIENT" ]; then
|
|
59
|
+
ENCODED_RECIPIENT="$RECIPIENT"
|
|
60
|
+
fi
|
|
61
|
+
|
|
62
|
+
AUTH_HEADER=""
|
|
63
|
+
if [ -n "$AUTH_TOKEN" ]; then
|
|
64
|
+
AUTH_HEADER="Authorization: Bearer ${AUTH_TOKEN}"
|
|
65
|
+
fi
|
|
66
|
+
|
|
67
|
+
# ── Step 1: Validate with server BEFORE sending (get single-use token) ──
|
|
68
|
+
|
|
69
|
+
VALIDATE_RESPONSE=$(curl -s -w "\n%{http_code}" \
|
|
70
|
+
-X POST "http://localhost:${PORT}/imessage/validate-send/${ENCODED_RECIPIENT}" \
|
|
71
|
+
${AUTH_HEADER:+-H "$AUTH_HEADER"} \
|
|
72
|
+
-H 'Content-Type: application/json' \
|
|
73
|
+
-d "{\"text\":${JSON_MSG}}" 2>/dev/null)
|
|
74
|
+
|
|
75
|
+
VALIDATE_BODY=$(echo "$VALIDATE_RESPONSE" | head -n -1)
|
|
76
|
+
VALIDATE_CODE=$(echo "$VALIDATE_RESPONSE" | tail -n 1)
|
|
77
|
+
|
|
78
|
+
if [ "$VALIDATE_CODE" != "200" ]; then
|
|
79
|
+
# Validation failed — DO NOT SEND
|
|
80
|
+
REASON=$(echo "$VALIDATE_BODY" | python3 -c 'import sys,json; print(json.load(sys.stdin).get("reason","unknown"))' 2>/dev/null || echo "unknown")
|
|
81
|
+
echo "BLOCKED: $REASON" >&2
|
|
82
|
+
|
|
83
|
+
# Log blocked attempt locally as backup
|
|
84
|
+
echo "{\"blocked\":true,\"recipient\":\"${RECIPIENT}\",\"reason\":\"${REASON}\",\"ts\":\"$(date -u +%Y-%m-%dT%H:%M:%SZ)\"}" >> .instar/imessage-outbound-local.jsonl 2>/dev/null
|
|
85
|
+
|
|
86
|
+
exit 1
|
|
87
|
+
fi
|
|
88
|
+
|
|
89
|
+
# Extract send token
|
|
90
|
+
SEND_TOKEN=$(echo "$VALIDATE_BODY" | python3 -c 'import sys,json; print(json.load(sys.stdin).get("token",""))' 2>/dev/null)
|
|
91
|
+
|
|
92
|
+
if [ -z "$SEND_TOKEN" ]; then
|
|
93
|
+
echo "BLOCKED: no send token received from server" >&2
|
|
94
|
+
exit 1
|
|
95
|
+
fi
|
|
96
|
+
|
|
97
|
+
# ── Step 2: Send via imsg CLI (only after validation passes) ──────────
|
|
98
|
+
|
|
99
|
+
IMSG="${IMSG_PATH:-imsg}"
|
|
100
|
+
if ! command -v "$IMSG" &>/dev/null; then
|
|
101
|
+
for candidate in /opt/homebrew/bin/imsg /usr/local/bin/imsg "$HOME/homebrew/bin/imsg"; do
|
|
102
|
+
if [ -x "$candidate" ]; then
|
|
103
|
+
IMSG="$candidate"
|
|
104
|
+
break
|
|
105
|
+
fi
|
|
106
|
+
done
|
|
107
|
+
fi
|
|
108
|
+
|
|
109
|
+
if ! command -v "$IMSG" &>/dev/null && [ ! -x "$IMSG" ]; then
|
|
110
|
+
echo "imsg not found. Install: brew install steipete/tap/imsg" >&2
|
|
111
|
+
exit 1
|
|
112
|
+
fi
|
|
113
|
+
|
|
114
|
+
"$IMSG" send --to "$RECIPIENT" --text "$MSG" --service imessage 2>/dev/null
|
|
115
|
+
SEND_STATUS=$?
|
|
116
|
+
|
|
117
|
+
if [ $SEND_STATUS -ne 0 ]; then
|
|
118
|
+
echo "imsg send failed (exit $SEND_STATUS)" >&2
|
|
119
|
+
exit 1
|
|
120
|
+
fi
|
|
121
|
+
|
|
122
|
+
# ── Step 3: Confirm delivery to server (with token to bind validate→send) ──
|
|
123
|
+
|
|
124
|
+
curl -s -o /dev/null -w "" -X POST "http://localhost:${PORT}/imessage/reply/${ENCODED_RECIPIENT}" \
|
|
125
|
+
${AUTH_HEADER:+-H "$AUTH_HEADER"} \
|
|
126
|
+
-H 'Content-Type: application/json' \
|
|
127
|
+
-d "{\"text\":${JSON_MSG},\"sendToken\":\"${SEND_TOKEN}\"}" 2>/dev/null || \
|
|
128
|
+
echo "Warning: server confirmation failed (message was sent)" >&2
|
|
129
|
+
|
|
130
|
+
echo "Sent $(echo "$MSG" | wc -c | tr -d ' ') chars to $RECIPIENT"
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
# v0.26.5 — Fix Slack Snippet Content Retrieval
|
|
2
|
+
|
|
3
|
+
## What Changed
|
|
4
|
+
|
|
5
|
+
**Three-tier snippet content resolution** — Slack snippet downloads were returning HTML pages instead of actual content (auth/redirect issue). Now uses a three-tier approach: (1) check file preview from the event payload, (2) use files.info API to get content directly, (3) fall back to downloaded file but reject HTML responses. This prevents agents from hallucinating based on HTML markup.
|
|
6
|
+
|
|
7
|
+
## What to Tell Your User
|
|
8
|
+
|
|
9
|
+
Fixed an issue where text snippets shared in Slack were not being read correctly. The bot now properly retrieves snippet content using multiple fallback methods, so it will respond based on what you actually shared rather than making up content.
|
|
10
|
+
|
|
11
|
+
## Summary of New Capabilities
|
|
12
|
+
|
|
13
|
+
| Capability | How to Use |
|
|
14
|
+
|-----------|-----------|
|
|
15
|
+
| Reliable snippet reading | Share a text snippet in Slack — content is now reliably retrieved |
|