nsauditor-ai 0.1.33 → 0.1.34

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -15,6 +15,28 @@ NSAuditor AI is the open-source core of a privacy-first security intelligence pl
15
15
 
16
16
  **Zero Data Exfiltration by design.** NSAuditor AI works fully offline. AI analysis, CVE correlation, and continuous monitoring all happen locally. External calls (to AI APIs, NVD, etc.) are opt-in and use your own API keys. We never see your scan data.
17
17
 
18
+ ## What's New (0.1.34) — list_plugins now embeds CE+EE versions for hallucination detection
19
+
20
+ Companion to the 0.1.33 advisory. The `list_plugins` MCP tool's response now appends the actual installed CE + EE version numbers, so customers can verify a Claude Desktop response in **5 seconds** without log archeology:
21
+
22
+ ```
23
+ ── Installation provenance (verify against your shell) ──
24
+ nsauditor-ai (CE): 0.1.34
25
+ @nsasoft/nsauditor-ai-ee (EE): 0.3.4 (loaded)
26
+ Verify: nsauditor-ai --version && npm list -g @nsasoft/nsauditor-ai-ee
27
+ If versions in this response don't match your shell, the response was
28
+ AI-generated rather than retrieved from the MCP server (see CE 0.1.33 advisory).
29
+ ```
30
+
31
+ How it works as a hallucination detector:
32
+ - The MCP server reads `process.execPath`'s package.json + tries to resolve `@nsasoft/nsauditor-ai-ee/package.json` at request time. Both are real machine-specific values.
33
+ - Claude Desktop fabricated responses in the wild have shown stale version numbers from training data, missing version lines entirely, or different counts each time the same question is asked (observed 32→32→31 plugin counts in three consecutive hallucinations on 2026-05-10).
34
+ - A real tool response will exactly match `nsauditor-ai --version` + `npm list -g @nsasoft/nsauditor-ai-ee`. Mismatch = hallucinated.
35
+
36
+ This is a v1 mitigation — the v2 (Thread L in `tasks/todo.md`) adds per-call cryptographic sentinel UUIDs that the customer can grep against the server log.
37
+
38
+ ---
39
+
18
40
  ## What's New (0.1.33) — ⚠ MCP integration with Claude Desktop is unreliable
19
41
 
20
42
  **Critical advisory for customers using NSAuditor AI through Claude Desktop's MCP integration.** During the maintainer's own integration test on 2026-05-10, we discovered that **Claude Desktop's AI fabricates scan results, plugin lists, vulnerability findings, and tier information without actually invoking the MCP tools** for our specific server. Other MCP servers in the same Claude Desktop config receive real `tools/call` invocations; ours does not.
package/mcp_server.mjs CHANGED
@@ -366,12 +366,49 @@ export function createServer() {
366
366
  try {
367
367
  const result = await handler(args ?? {});
368
368
 
369
- // Append tier info to list_plugins response
369
+ // Append tier info + version provenance to list_plugins response.
370
+ //
371
+ // CE 0.1.34 (Thread L MITIGATION): the response now embeds the
372
+ // ACTUAL versions of CE + EE (when EE is loaded) so customers
373
+ // can detect Claude Desktop hallucinations. Background: Claude
374
+ // Desktop has been observed (2026-05-10) silently fabricating
375
+ // list_plugins responses without invoking the MCP server (per-
376
+ // server log shows zero `tools/call` while Claude reports
377
+ // detailed plugin lists). With version numbers in the response,
378
+ // a hallucinated answer will either omit the version line OR
379
+ // include a stale/wrong version pulled from training data.
380
+ // Customer verification (5 seconds, no log archeology):
381
+ // nsauditor-ai --version
382
+ // npm list -g @nsasoft/nsauditor-ai-ee
383
+ // If the versions in Claude Desktop's output don't match these
384
+ // commands, the response was AI-generated, not a real tool call.
370
385
  if (name === 'list_plugins') {
371
386
  const tierLabel = { ce: 'Community Edition (CE)', pro: 'Pro', enterprise: 'Enterprise' };
387
+
388
+ // Detect EE version (best-effort; absent on CE-only installs).
389
+ let eeVersion = 'not installed';
390
+ try {
391
+ const eeManifest = _require('@nsasoft/nsauditor-ai-ee/package.json');
392
+ eeVersion = eeManifest && eeManifest.version
393
+ ? `${eeManifest.version} (loaded)`
394
+ : 'unknown (loaded)';
395
+ } catch {
396
+ // EE package not installed or not resolvable — common for CE-only customers.
397
+ eeVersion = 'not installed';
398
+ }
399
+
400
+ const versionLines =
401
+ `\n\n── Installation provenance (verify against your shell) ──\n` +
402
+ `nsauditor-ai (CE): ${TOOL_VERSION}\n` +
403
+ `@nsasoft/nsauditor-ai-ee (EE): ${eeVersion}\n` +
404
+ `Verify: nsauditor-ai --version && npm list -g @nsasoft/nsauditor-ai-ee\n` +
405
+ `If versions in this response don't match your shell, the response was\n` +
406
+ `AI-generated rather than retrieved from the MCP server (see CE 0.1.33 advisory).`;
407
+
372
408
  const tierSuffix = `\n\nCurrent tier: ${tierLabel[_tier] ?? _tier}. ${_capabilities.proMCP ? '' : 'Upgrade to Pro for probe_service, get_vulnerabilities, risk_summary, and more.'}`;
409
+
373
410
  return {
374
- content: [{ type: 'text', text: JSON.stringify(result, null, 2) + tierSuffix }],
411
+ content: [{ type: 'text', text: JSON.stringify(result, null, 2) + tierSuffix + versionLines }],
375
412
  };
376
413
  }
377
414
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "nsauditor-ai",
3
- "version": "0.1.33",
3
+ "version": "0.1.34",
4
4
  "description": "Modular AI-assisted network security audit platform — Community Edition",
5
5
  "type": "module",
6
6
  "private": false,