mindforge-cc 3.0.0-rc1 → 4.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,23 +1,32 @@
1
- # MindForge Governance Guide
1
+ # MindForge Governance Guide (v4.2.5)
2
2
 
3
3
  ## Goal
4
- Explain how change classification, approvals, compliance gates, and milestone
5
- governance work in Day 4.
4
+ Explain how change classification, approvals, compliance gates, and trust-based identity enforcement work in the MindForge ecosystem.
6
5
 
7
- ## Governance flow
8
- 1. Classify the change before plan execution
9
- 2. Apply Tier 3 signals first
10
- 3. Request approval when required
11
- 4. Enforce compliance gates before completion or release
12
- 5. Log decisions and approvals to AUDIT
6
+ ## Trust Tier Architecture (ZTAI)
7
+ MindForge enforces a 4-tier trust model to govern agentic actions and code modifications.
13
8
 
14
- ## Key guarantees
15
- - Tier 3 can be triggered by code content, not just file paths
16
- - GDPR/PII gate runs independently of skill loading
17
- - emergency override requires explicit `--emergency` and listed approver identity
18
- - approval expiry is session-detected and config-driven
9
+ | Tier | Name | Role | Verification Requirement |
10
+ | :--- | :--- | :--- | :--- |
11
+ | **0** | Informational | Research/Query agents. | No signing required. |
12
+ | **1** | Verified | Standard implementation agents. | DID-signed audit entries. |
13
+ | **2** | Specialized | Security, UI, and Data specialists. | Multi-agent peer review + DID signing. |
14
+ | **3** | Principal | Architects and Core Engine agents. | **Secure Enclave (HSM) Signing** + Principal Approval. |
19
15
 
20
- ## Team operation
21
- - multi-developer sessions coordinate via shared `HANDOFF.json`
22
- - stale active developers expire after 4 hours
23
- - shared state merges happen through git conflict resolution, not silent overwrite
16
+ ## Governance Flow
17
+ 1. **Classify**: Automated classification of intent before planning.
18
+ 2. **Tier Mapping**: Assigning a Trust Tier based on persona and scope.
19
+ 3. **Cryptographic Signing**:
20
+ - T1/T2: Standard Ed25519 signing via ZTAIManager.
21
+ - T3: Hardware-enclave (simulated) signing for critical engine/security paths.
22
+ 4. **Compliance Gates**: Enforce non-bypassable gates (Secrets, SQLi, PII) before release.
23
+ 5. **Non-Repudiation**: Finalize audit blocks with Merkle-root manifests for integrity verification.
24
+
25
+ ## Key Guarantees
26
+ - **Identity Integrity**: Agents cannot spoof identities; every block in `AUDIT.jsonl` is cryptographically tied to a DID.
27
+ - **Ghost Pattern Mitigation**: Planning is gated by the Global Intelligence Mesh to prevent repeating organizational anti-patterns.
28
+ - **Emergency Override**: Requires explicit `--emergency` flag and authorized DID signing.
29
+
30
+ ## Team Operation
31
+ - **Handoff Continuity**: Multi-developer sessions coordinate via `HANDOFF.json`.
32
+ - **Global Mesh Sync**: Project memory is automatically bubbled up to the organizational `~/.mindforge` store for cross-repo awareness.
@@ -14,6 +14,9 @@ Each line is a JSON object with a required `event` type and a `session_id`.
14
14
  - `agent` (string)
15
15
  - `phase` (number or null)
16
16
  - `session_id` (string)
17
+ - `trace_id` (string, v4.1+) - UUID linking multiple related spans.
18
+ - `span_id` (string, v4.1+) - ID for the current execution unit.
19
+ - `parent_span_id` (string, v4.1+) - Link to the calling span.
17
20
 
18
21
  ## Common event types
19
22
  ### `project_initialised`
@@ -46,6 +49,9 @@ Fields: `plugin_name`, `version`, `permissions`
46
49
  ### `plugin_uninstalled`
47
50
  Fields: `plugin_name`
48
51
 
52
+ ### `reasoning_trace` (v4.1+)
53
+ Fields: `trace_id`, `span_id`, `persona`, `thought_chain`, `decision_point`, `adversarial_critique` (optional)
54
+
49
55
  ## Rotation
50
56
  Rotate when file exceeds 10,000 lines. Archive into `.planning/audit-archive/`.
51
57
 
@@ -29,14 +29,25 @@
29
29
  - Crediting researchers in the security advisory (with their permission)
30
30
  - Maintaining confidentiality until a fix is released
31
31
 
32
+ ## ZTAI Identity Model (v4.2)
33
+
34
+ MindForge enforces **Zero-Trust Agentic Identity (ZTAI)** for all actions. Every agent is assigned a cryptographically unique asymmetric key pair (Ed25519) in the format `did:mf:<key-fingerprint>`.
35
+
36
+ - **Asymmetric Signing**: All high-tier (T1-T3) agent actions are cryptographically signed.
37
+ - **Secure Enclave (HSM)**: Tier 3 principal agents utilize simulated hardware-secured enclave signing.
38
+ - **Audit Non-Repudiation**: The `AUDIT.jsonl` log is finalized with **Merkle-root integrity manifests** to prevent tampering.
39
+ - **See also:** [ZTAI Overview](file:///Users/sairamugge/Desktop/MindForge/docs/security/ZTAI-OVERVIEW.md)
40
+
32
41
  ## Known security model limitations
33
42
 
34
43
  See `docs/security/threat-model.md` for the full threat model.
35
44
 
36
45
  Key acknowledged limitations:
37
- 1. Plugin permission model is advisory (not OS-enforced) — see TA7 in threat model
38
- 2. The SSE event stream is localhost-only but any local process can connect — see TA6
39
- 3. Approver identity uses `git config user.email` which is user-controlled see TA5
40
- 4. Agent instruction injection via SKILL.md requires review beyond pattern matching — see TA1
46
+ 1. Plugin permission model is advisory (not OS-enforced) — see TA7 in threat model.
47
+ 2. The SSE event stream is localhost-only but any local process can connect — see TA6.
48
+ 3. Cryptographic identity is local-first; remote anchor validation is a planned v4.5 feature.
49
+ 4. Agent instruction injection via SKILL.md requires review beyond pattern matching — see TA1.
50
+
51
+ *Note: The previous limitation on approver identity (TA5) has been mitigated by the ZTAI DID-based signing model in v4.2.*
41
52
 
42
53
  These are known trade-offs, not bugs. They are documented in ADR-020.
@@ -0,0 +1,37 @@
1
+ # Zero-Trust Agentic Identity (ZTAI) Overview
2
+
3
+ MindForge v4.2 introduces **ZTAI Beast Mode**, an enterprise-grade identity layer that ensures every agent action is cryptographically signed and non-repudiable.
4
+
5
+ ## 1. Asymmetric Identity Model
6
+ Every MindForge persona in the 32+ agent library is assigned a unique asymmetric key pair (Ed25519) upon project initialization or agent spawning.
7
+
8
+ - **Private Key**: Stored securely in the local `.mindforge/identity` vault (never exposed).
9
+ - **Public Key / DID**: Represented as a **Decentralized Identifier (DID)** in the format `did:mf:<key-fingerprint>`.
10
+
11
+ ## 2. Trust Tiers & Signing Requirements
12
+ MindForge enforces tiered signing based on the risk level of the persona's actions.
13
+
14
+ | Tier | Persona Examples | Signing Tech | Integrity Proof |
15
+ | :--- | :--- | :--- | :--- |
16
+ | **T0** | `mf-researcher`, `mf-query` | None | Audit log entry only. |
17
+ | **T1** | `mf-executor`, `mf-coder` | Ed25519 (Software) | Signed JSON payload. |
18
+ | **T2** | `security-auditor`, `ui-specialist` | Ed25519 (Software) | Signed Block + Peer Review. |
19
+ | **T3** | `mf-planner`, `system-architect` | **Secure Enclave (HSM)** | Enclave-attested signature. |
20
+
21
+ *Note: T3 agents utilize a simulated hardware-secured enclave (HSM) to ensure principal-level accountability.*
22
+
23
+ ## 3. Non-Repudiable Audit Manifests
24
+ The `ZTAIArchiver` generates high-fidelity integrity proofs for the session history.
25
+
26
+ - **Merkle-Root Chain**: Every 50 audit entries trigger the generation of a Merkle-root.
27
+ - **Manifest Finalization**: The cumulative root of all audit entries is signed by the **Principal Agent (T3)**.
28
+ - **Tamper Detection**: Any modification to the `AUDIT.jsonl` file will invalidate the Merkle-proof, triggering an immediate security alert.
29
+
30
+ ## 4. Key Provider Abstraction
31
+ The `ZTAIManager` uses a pluggable `KeyProvider` architecture:
32
+ - `FileSystemProvider`: Standard key storage for T1/T2 agents.
33
+ - `SecureEnclaveProvider`: Simulates hardware-backed signing for T3 agents.
34
+ - `KMSProvider` (Future): Integration with AWS/GCP/Azure Key Management Services.
35
+
36
+ ## 5. Governance Integration
37
+ ZTAI identities are verified during the `/mindforge:verify-phase` and `/mindforge:ship` processes. High-tier changes will be BLOCKED if the cryptographic signatures are missing or invalid.
@@ -1,6 +1,6 @@
1
- # MindForge v3.0.0 — Unique Selling Points, Features, and Best Practices (v3.0.0)
1
+ # MindForge v4.2.5 — Unique Selling Points, Features, and Best Practices (v4.2.5)
2
2
 
3
- This document summarizes what makes MindForge v2.0.0 distinct, what features
3
+ This document summarizes what makes MindForge v4.1.0 distinct, what features
4
4
  are included in the official release, and how to use them effectively.
5
5
 
6
6
  ---
@@ -58,6 +58,18 @@ are included in the official release, and how to use them effectively.
58
58
  16. **Temporal Vision (v3)**
59
59
  - Full-fidelity history navigation, hindsight injection, and automated state repair across the execution wave.
60
60
 
61
+ 17. **Dynamic Swarm Orchestration (v4)**
62
+ - Parallel "Agentic Mesh" with shared state (`SWARM-STATE.json`) and leader-led synthesis of specialist outcomes.
63
+
64
+ 18. **Zero-Trust Agentic Identity "Beast Mode" (v4.2)**
65
+ - Non-repudiable audit trails signed by unique Decentralized Identifiers (DIDs) for every swarm action. Tier 3 agents use simulated **Secure Enclave (HSM)** signing.
66
+
67
+ 19. **MindForge Nexus: Agentic Reasoning Tracing (v4.1)**
68
+ - High-fidelity **ART** spans embedded in the execution engine, providing deep visibility into agentic "thought chains" and parallel mesh reasoning.
69
+
70
+ 20. **Global Intelligence Mesh (v4.2)**
71
+ - Cross-repository knowledge sharing via the **Semantic Hub**. Proactive **Ghost Pattern Detection** identifies and prevents repeating past organizational failures.
72
+
61
73
  ---
62
74
 
63
75
  ## Feature Set (v2.0.0)
@@ -247,6 +259,67 @@ preserving scope (local vs global).
247
259
 
248
260
  ---
249
261
 
262
+ ### 21. Dynamic Swarm Mesh (v4)
263
+ **What it does:** Orchestrates parallel specialist clusters (e.g., Security, UI, Data) with automated state coordination.
264
+
265
+ **How to use:**
266
+ ```bash
267
+ /mindforge:swarm spawn --template [NAME]
268
+ /mindforge:swarm status --mesh
269
+ ```
270
+
271
+ ---
272
+
273
+ ### 22. ZTAI Governance & Beast Mode (v4.2)
274
+ **What it does:** Enforces cryptographic signing and trust-tier validation for all autonomous agent actions. Tier 3 agents utilize simulated Secure Enclaves for principal-level non-repudiation.
275
+
276
+ **How to use:**
277
+ ```bash
278
+ /mindforge:identity verify [AGENT_ID]
279
+ /mindforge:identity sign --did
280
+ /mindforge:identity audit --manifest # Generates Merkle-root integrity proof
281
+ ```
282
+
283
+ ---
284
+
285
+ ### 23. Global Intelligence Mesh (v4.2)
286
+ **What it does:** Synchronizes local repo memory with a global organizational store. Includes Ghost Pattern Detection to flag architectural anti-patterns from past failures.
287
+
288
+ **How to use:**
289
+ ```bash
290
+ /mindforge:memory sync --global
291
+ /mindforge:memory status --mesh
292
+ /mindforge:plan-phase --detect-ghosts # Automated during planning
293
+ ```
294
+ ---
295
+
296
+ ### 24. Autonomous FinOps Hub (v4.3)
297
+ **What it does:** Enterprise-grade economics engine that treats compute as a first-class resource. The `ModelBroker` utilizes a **Confidence-to-Cost (C2C)** engine to dynamically route tasks based on complexity and trust tier.
298
+
299
+ **How to use:**
300
+ ```bash
301
+ /mindforge:finops status # View consumption and budget profile
302
+ /mindforge:costs --roi # Detailed Agentic ROI analysis
303
+ /mindforge:finops budget 500 # Set project-level budget ($500)
304
+ ```
305
+
306
+ ---
307
+
308
+ ### 25. Proactive Equilibrium (Self-Healing) (v4.3)
309
+ **What it does:** Achieves autonomous reliability via a `WaveFeedbackLoop`. If execution divergence exceeds 20%, the system performs **Temporal Hindsight** analysis and automatically rewrites the plan to recover.
310
+
311
+ **How to use:**
312
+ - Automated: Triggers during `/mindforge:execute-phase` when divergence is detected.
313
+ - Manual: `/mindforge:temporal analyze` to run RCA on the last wave.
314
+ **What it does:** High-fidelity Agentic Reasoning Tracing (ART) for the agentic mesh. Logs spans, parent-trace IDs, and granular reasoning traces.
315
+
316
+ **How to use:**
317
+ - Automated: Every wave/task execution triggers Nexus Tracer spans.
318
+ - Manual: Query `.planning/AUDIT.jsonl` for `trace_id` and `span_id` chains.
319
+ - Dashboard: Real-time visualization of mesh traces and reasoning heatmaps.
320
+
321
+ ---
322
+
250
323
  ### 15. SDK (TypeScript)
251
324
  **What it does:** Programmatic access to health, audit log, event stream, and commands.
252
325
 
@@ -304,6 +377,4 @@ const report = await client.health();
304
377
  ---
305
378
 
306
379
  ## Summary
307
- MindForge v2.0.0 combines governance, observability, and autonomous execution rigor into a
308
- single workflow engine that works across 6 major AI runtimes. Its core
309
- value is consistent, repeatable quality in long‑running AI development sessions.
380
+ MindForge v4.3.0 combines governance, observability, and autonomous execution rigor with **enterprise-grade economics (FinOps)** and **self-healing reliability**. Its core value is providing a non-repudiable, cost-optimized, and resilient AI development engine for the most demanding software projects.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "mindforge-cc",
3
- "version": "3.0.0-rc1",
3
+ "version": "4.3.0",
4
4
  "description": "MindForge - Enterprise Agentic Framework for Claude Code and Antigravity",
5
5
  "bin": {
6
6
  "mindforge-cc": "bin/install.js"