opc-agent 1.2.1 → 1.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (152) hide show
  1. package/CONTRIBUTING.md +75 -75
  2. package/README.md +235 -358
  3. package/README.zh-CN.md +415 -415
  4. package/dist/channels/web.js +256 -256
  5. package/dist/core/knowledge.d.ts +5 -0
  6. package/dist/core/knowledge.js +39 -2
  7. package/dist/deploy/hermes.js +22 -22
  8. package/dist/deploy/openclaw.js +31 -31
  9. package/dist/index.d.ts +0 -4
  10. package/dist/index.js +1 -7
  11. package/dist/providers/index.d.ts +1 -1
  12. package/dist/providers/index.js +158 -14
  13. package/dist/schema/oad.d.ts +3 -3
  14. package/dist/templates/code-reviewer.js +5 -5
  15. package/dist/templates/customer-service.js +2 -2
  16. package/dist/templates/data-analyst.js +5 -5
  17. package/dist/templates/knowledge-base.js +2 -2
  18. package/dist/templates/sales-assistant.js +4 -4
  19. package/dist/templates/teacher.js +6 -6
  20. package/docs/.vitepress/config.ts +103 -103
  21. package/docs/api/cli.md +48 -48
  22. package/docs/api/oad-schema.md +64 -64
  23. package/docs/api/sdk.md +80 -80
  24. package/docs/guide/concepts.md +51 -51
  25. package/docs/guide/configuration.md +79 -79
  26. package/docs/guide/deployment.md +42 -42
  27. package/docs/guide/getting-started.md +44 -44
  28. package/docs/guide/templates.md +28 -28
  29. package/docs/guide/testing.md +84 -84
  30. package/docs/index.md +27 -27
  31. package/docs/zh/api/cli.md +54 -54
  32. package/docs/zh/api/oad-schema.md +87 -87
  33. package/docs/zh/api/sdk.md +102 -102
  34. package/docs/zh/guide/concepts.md +104 -104
  35. package/docs/zh/guide/configuration.md +135 -135
  36. package/docs/zh/guide/deployment.md +81 -81
  37. package/docs/zh/guide/getting-started.md +82 -82
  38. package/docs/zh/guide/templates.md +84 -84
  39. package/docs/zh/guide/testing.md +88 -88
  40. package/docs/zh/index.md +27 -27
  41. package/examples/customer-service-demo/README.md +90 -90
  42. package/examples/customer-service-demo/oad.yaml +107 -107
  43. package/package.json +50 -50
  44. package/src/analytics/index.ts +66 -66
  45. package/src/channels/discord.ts +192 -192
  46. package/src/channels/email.ts +177 -177
  47. package/src/channels/feishu.ts +236 -236
  48. package/src/channels/index.ts +15 -15
  49. package/src/channels/slack.ts +160 -160
  50. package/src/channels/telegram.ts +90 -90
  51. package/src/channels/voice.ts +106 -106
  52. package/src/channels/webhook.ts +199 -199
  53. package/src/channels/websocket.ts +87 -87
  54. package/src/channels/wechat.ts +149 -149
  55. package/src/cli.ts +119 -1
  56. package/src/core/a2a.ts +143 -143
  57. package/src/core/agent.ts +152 -152
  58. package/src/core/analytics-engine.ts +186 -186
  59. package/src/core/auth.ts +57 -57
  60. package/src/core/cache.ts +141 -141
  61. package/src/core/compose.ts +77 -77
  62. package/src/core/config.ts +14 -14
  63. package/src/core/errors.ts +148 -148
  64. package/src/core/hitl.ts +138 -138
  65. package/src/core/logger.ts +57 -57
  66. package/src/core/orchestrator.ts +215 -215
  67. package/src/core/performance.ts +187 -187
  68. package/src/core/rate-limiter.ts +128 -128
  69. package/src/core/room.ts +109 -109
  70. package/src/core/runtime.ts +152 -152
  71. package/src/core/sandbox.ts +101 -101
  72. package/src/core/security.ts +171 -171
  73. package/src/core/types.ts +68 -68
  74. package/src/core/versioning.ts +106 -106
  75. package/src/core/watch.ts +178 -178
  76. package/src/core/workflow.ts +235 -235
  77. package/src/deploy/hermes.ts +156 -156
  78. package/src/deploy/openclaw.ts +200 -200
  79. package/src/i18n/index.ts +216 -216
  80. package/src/index.ts +6 -2
  81. package/src/memory/deepbrain.ts +108 -108
  82. package/src/memory/index.ts +34 -34
  83. package/src/plugins/index.ts +208 -208
  84. package/src/schema/oad.ts +154 -155
  85. package/src/skills/base.ts +16 -16
  86. package/src/skills/document.ts +100 -100
  87. package/src/skills/http.ts +35 -35
  88. package/src/skills/index.ts +27 -27
  89. package/src/skills/scheduler.ts +80 -80
  90. package/src/skills/webhook-trigger.ts +59 -59
  91. package/src/templates/code-reviewer.ts +30 -34
  92. package/src/templates/customer-service.ts +76 -80
  93. package/src/templates/data-analyst.ts +66 -70
  94. package/src/templates/executive-assistant.ts +71 -71
  95. package/src/templates/financial-advisor.ts +60 -60
  96. package/src/templates/knowledge-base.ts +27 -31
  97. package/src/templates/legal-assistant.ts +71 -71
  98. package/src/templates/sales-assistant.ts +75 -79
  99. package/src/templates/teacher.ts +75 -79
  100. package/src/testing/index.ts +181 -181
  101. package/src/tools/calculator.ts +73 -73
  102. package/src/tools/datetime.ts +149 -149
  103. package/src/tools/json-transform.ts +187 -187
  104. package/src/tools/mcp.ts +76 -76
  105. package/src/tools/text-analysis.ts +116 -116
  106. package/src/traces/index.ts +132 -0
  107. package/templates/Dockerfile +15 -15
  108. package/templates/code-reviewer/README.md +27 -27
  109. package/templates/code-reviewer/oad.yaml +41 -41
  110. package/templates/customer-service/README.md +22 -22
  111. package/templates/customer-service/oad.yaml +36 -36
  112. package/templates/docker-compose.yml +21 -21
  113. package/templates/ecommerce-assistant/README.md +45 -45
  114. package/templates/ecommerce-assistant/oad.yaml +47 -47
  115. package/templates/knowledge-base/README.md +28 -28
  116. package/templates/knowledge-base/oad.yaml +38 -38
  117. package/templates/sales-assistant/README.md +26 -26
  118. package/templates/sales-assistant/oad.yaml +43 -43
  119. package/templates/tech-support/README.md +43 -43
  120. package/templates/tech-support/oad.yaml +45 -45
  121. package/tests/a2a.test.ts +66 -66
  122. package/tests/agent.test.ts +72 -72
  123. package/tests/analytics.test.ts +50 -50
  124. package/tests/channel.test.ts +39 -39
  125. package/tests/e2e.test.ts +134 -134
  126. package/tests/errors.test.ts +83 -83
  127. package/tests/hitl.test.ts +71 -71
  128. package/tests/i18n.test.ts +41 -41
  129. package/tests/mcp.test.ts +54 -54
  130. package/tests/oad.test.ts +68 -68
  131. package/tests/performance.test.ts +115 -115
  132. package/tests/plugin.test.ts +74 -74
  133. package/tests/room.test.ts +106 -106
  134. package/tests/runtime.test.ts +42 -42
  135. package/tests/sandbox.test.ts +46 -46
  136. package/tests/security.test.ts +60 -60
  137. package/tests/templates.test.ts +77 -77
  138. package/tests/v070.test.ts +76 -76
  139. package/tests/versioning.test.ts +75 -75
  140. package/tests/voice.test.ts +61 -61
  141. package/tests/webhook.test.ts +29 -29
  142. package/tests/workflow.test.ts +143 -143
  143. package/tsconfig.json +19 -19
  144. package/vitest.config.ts +9 -9
  145. package/dist/core/streaming.d.ts +0 -56
  146. package/dist/core/streaming.js +0 -160
  147. package/dist/tools/gateway.d.ts +0 -28
  148. package/dist/tools/gateway.js +0 -177
  149. package/src/dtv/data.ts +0 -29
  150. package/src/dtv/trust.ts +0 -43
  151. package/src/dtv/value.ts +0 -47
  152. package/src/marketplace/index.ts +0 -223
@@ -1,101 +1,101 @@
1
- import type { TrustLevelType } from '../schema/oad';
2
- import * as path from 'path';
3
-
4
- export interface SandboxConfig {
5
- trustLevel: TrustLevelType;
6
- agentDir: string;
7
- networkAllowlist?: string[];
8
- shellAllowed?: boolean;
9
- }
10
-
11
- export interface SandboxRestrictions {
12
- fileSystem: { read: string[]; write: string[] };
13
- network: { allowed: string[] };
14
- shell: boolean;
15
- }
16
-
17
- const TRUST_RESTRICTIONS: Record<string, SandboxRestrictions> = {
18
- sandbox: {
19
- fileSystem: { read: ['.'], write: ['.'] },
20
- network: { allowed: [] },
21
- shell: false,
22
- },
23
- verified: {
24
- fileSystem: { read: ['.', '..'], write: ['.'] },
25
- network: { allowed: ['*.deepleaper.com', 'api.openai.com', 'api.deepseek.com'] },
26
- shell: false,
27
- },
28
- certified: {
29
- fileSystem: { read: ['*'], write: ['.', '..'] },
30
- network: { allowed: ['*'] },
31
- shell: true,
32
- },
33
- listed: {
34
- fileSystem: { read: ['*'], write: ['*'] },
35
- network: { allowed: ['*'] },
36
- shell: true,
37
- },
38
- };
39
-
40
- export class Sandbox {
41
- private config: SandboxConfig;
42
- private restrictions: SandboxRestrictions;
43
-
44
- constructor(config: SandboxConfig) {
45
- this.config = config;
46
- this.restrictions = {
47
- ...TRUST_RESTRICTIONS[config.trustLevel] ?? TRUST_RESTRICTIONS.sandbox,
48
- };
49
- if (config.networkAllowlist) {
50
- this.restrictions.network.allowed = config.networkAllowlist;
51
- }
52
- if (config.shellAllowed !== undefined) {
53
- this.restrictions.shell = config.shellAllowed;
54
- }
55
- }
56
-
57
- get trustLevel(): TrustLevelType {
58
- return this.config.trustLevel;
59
- }
60
-
61
- getRestrictions(): SandboxRestrictions {
62
- return { ...this.restrictions };
63
- }
64
-
65
- checkFileAccess(filePath: string, mode: 'read' | 'write'): boolean {
66
- const resolved = path.resolve(filePath);
67
- const agentDir = path.resolve(this.config.agentDir);
68
- const allowedPaths = mode === 'read' ? this.restrictions.fileSystem.read : this.restrictions.fileSystem.write;
69
-
70
- if (allowedPaths.includes('*')) return true;
71
-
72
- for (const allowed of allowedPaths) {
73
- const allowedResolved = path.resolve(this.config.agentDir, allowed);
74
- if (resolved.startsWith(allowedResolved)) return true;
75
- }
76
-
77
- // Always allow access within agent's own directory
78
- return resolved.startsWith(agentDir);
79
- }
80
-
81
- checkNetworkAccess(url: string): boolean {
82
- if (this.restrictions.network.allowed.includes('*')) return true;
83
- if (this.restrictions.network.allowed.length === 0) return false;
84
-
85
- try {
86
- const hostname = new URL(url).hostname;
87
- return this.restrictions.network.allowed.some((pattern) => {
88
- if (pattern.startsWith('*.')) {
89
- return hostname.endsWith(pattern.slice(1));
90
- }
91
- return hostname === pattern;
92
- });
93
- } catch {
94
- return false;
95
- }
96
- }
97
-
98
- checkShellAccess(): boolean {
99
- return this.restrictions.shell;
100
- }
101
- }
1
+ import type { TrustLevelType } from '../schema/oad';
2
+ import * as path from 'path';
3
+
4
+ export interface SandboxConfig {
5
+ trustLevel: TrustLevelType;
6
+ agentDir: string;
7
+ networkAllowlist?: string[];
8
+ shellAllowed?: boolean;
9
+ }
10
+
11
+ export interface SandboxRestrictions {
12
+ fileSystem: { read: string[]; write: string[] };
13
+ network: { allowed: string[] };
14
+ shell: boolean;
15
+ }
16
+
17
+ const TRUST_RESTRICTIONS: Record<string, SandboxRestrictions> = {
18
+ sandbox: {
19
+ fileSystem: { read: ['.'], write: ['.'] },
20
+ network: { allowed: [] },
21
+ shell: false,
22
+ },
23
+ verified: {
24
+ fileSystem: { read: ['.', '..'], write: ['.'] },
25
+ network: { allowed: ['*.deepleaper.com', 'api.openai.com', 'api.deepseek.com'] },
26
+ shell: false,
27
+ },
28
+ certified: {
29
+ fileSystem: { read: ['*'], write: ['.', '..'] },
30
+ network: { allowed: ['*'] },
31
+ shell: true,
32
+ },
33
+ listed: {
34
+ fileSystem: { read: ['*'], write: ['*'] },
35
+ network: { allowed: ['*'] },
36
+ shell: true,
37
+ },
38
+ };
39
+
40
+ export class Sandbox {
41
+ private config: SandboxConfig;
42
+ private restrictions: SandboxRestrictions;
43
+
44
+ constructor(config: SandboxConfig) {
45
+ this.config = config;
46
+ this.restrictions = {
47
+ ...TRUST_RESTRICTIONS[config.trustLevel] ?? TRUST_RESTRICTIONS.sandbox,
48
+ };
49
+ if (config.networkAllowlist) {
50
+ this.restrictions.network.allowed = config.networkAllowlist;
51
+ }
52
+ if (config.shellAllowed !== undefined) {
53
+ this.restrictions.shell = config.shellAllowed;
54
+ }
55
+ }
56
+
57
+ get trustLevel(): TrustLevelType {
58
+ return this.config.trustLevel;
59
+ }
60
+
61
+ getRestrictions(): SandboxRestrictions {
62
+ return { ...this.restrictions };
63
+ }
64
+
65
+ checkFileAccess(filePath: string, mode: 'read' | 'write'): boolean {
66
+ const resolved = path.resolve(filePath);
67
+ const agentDir = path.resolve(this.config.agentDir);
68
+ const allowedPaths = mode === 'read' ? this.restrictions.fileSystem.read : this.restrictions.fileSystem.write;
69
+
70
+ if (allowedPaths.includes('*')) return true;
71
+
72
+ for (const allowed of allowedPaths) {
73
+ const allowedResolved = path.resolve(this.config.agentDir, allowed);
74
+ if (resolved.startsWith(allowedResolved)) return true;
75
+ }
76
+
77
+ // Always allow access within agent's own directory
78
+ return resolved.startsWith(agentDir);
79
+ }
80
+
81
+ checkNetworkAccess(url: string): boolean {
82
+ if (this.restrictions.network.allowed.includes('*')) return true;
83
+ if (this.restrictions.network.allowed.length === 0) return false;
84
+
85
+ try {
86
+ const hostname = new URL(url).hostname;
87
+ return this.restrictions.network.allowed.some((pattern) => {
88
+ if (pattern.startsWith('*.')) {
89
+ return hostname.endsWith(pattern.slice(1));
90
+ }
91
+ return hostname === pattern;
92
+ });
93
+ } catch {
94
+ return false;
95
+ }
96
+ }
97
+
98
+ checkShellAccess(): boolean {
99
+ return this.restrictions.shell;
100
+ }
101
+ }
@@ -1,171 +1,171 @@
1
- /**
2
- * Security Hardening Module - v1.0.0
3
- * Input sanitization, CORS, security headers, API key rotation.
4
- */
5
-
6
- import type { Request, Response, NextFunction } from 'express';
7
-
8
- // ── Input Sanitization ──────────────────────────────────────
9
-
10
- const XSS_PATTERNS = [
11
- /<script\b[^>]*>[\s\S]*?<\/script>/gi,
12
- /javascript:/gi,
13
- /on\w+\s*=/gi,
14
- /<iframe\b/gi,
15
- /<object\b/gi,
16
- /<embed\b/gi,
17
- /<form\b/gi,
18
- ];
19
-
20
- const SQL_PATTERNS = [
21
- /(\b(SELECT|INSERT|UPDATE|DELETE|DROP|UNION|ALTER|CREATE|EXEC)\b.*\b(FROM|INTO|TABLE|SET|WHERE|ALL)\b)/gi,
22
- /(--|;)\s*(DROP|ALTER|DELETE)/gi,
23
- ];
24
-
25
- export function sanitizeInput(input: string): string {
26
- let clean = input;
27
- for (const pattern of XSS_PATTERNS) {
28
- clean = clean.replace(pattern, '');
29
- }
30
- // Encode dangerous HTML entities
31
- clean = clean.replace(/&/g, '&amp;').replace(/</g, '&lt;').replace(/>/g, '&gt;');
32
- return clean;
33
- }
34
-
35
- export function detectInjection(input: string): { safe: boolean; threats: string[] } {
36
- const threats: string[] = [];
37
- for (const pattern of XSS_PATTERNS) {
38
- if (pattern.test(input)) threats.push('xss');
39
- pattern.lastIndex = 0;
40
- }
41
- for (const pattern of SQL_PATTERNS) {
42
- if (pattern.test(input)) threats.push('sql_injection');
43
- pattern.lastIndex = 0;
44
- }
45
- return { safe: threats.length === 0, threats: [...new Set(threats)] };
46
- }
47
-
48
- // ── Security Headers (Helmet-style) ────────────────────────
49
-
50
- export interface SecurityHeadersConfig {
51
- contentSecurityPolicy?: string;
52
- enableHSTS?: boolean;
53
- frameDeny?: boolean;
54
- xssProtection?: boolean;
55
- noSniff?: boolean;
56
- referrerPolicy?: string;
57
- }
58
-
59
- export function securityHeaders(config?: SecurityHeadersConfig) {
60
- const csp = config?.contentSecurityPolicy ?? "default-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; img-src 'self' data:; connect-src 'self'";
61
- return (_req: Request, res: Response, next: NextFunction): void => {
62
- res.setHeader('Content-Security-Policy', csp);
63
- res.setHeader('X-Content-Type-Options', 'nosniff');
64
- res.setHeader('X-Frame-Options', config?.frameDeny !== false ? 'DENY' : 'SAMEORIGIN');
65
- res.setHeader('X-XSS-Protection', '1; mode=block');
66
- res.setHeader('Referrer-Policy', config?.referrerPolicy ?? 'strict-origin-when-cross-origin');
67
- if (config?.enableHSTS !== false) {
68
- res.setHeader('Strict-Transport-Security', 'max-age=31536000; includeSubDomains');
69
- }
70
- res.removeHeader('X-Powered-By');
71
- next();
72
- };
73
- }
74
-
75
- // ── CORS Configuration ──────────────────────────────────────
76
-
77
- export interface CORSConfig {
78
- origins?: string[];
79
- methods?: string[];
80
- allowHeaders?: string[];
81
- credentials?: boolean;
82
- maxAge?: number;
83
- }
84
-
85
- export function corsMiddleware(config?: CORSConfig) {
86
- const origins = config?.origins ?? ['*'];
87
- const methods = config?.methods ?? ['GET', 'POST', 'OPTIONS'];
88
- const headers = config?.allowHeaders ?? ['Content-Type', 'Authorization'];
89
-
90
- return (req: Request, res: Response, next: NextFunction): void => {
91
- const origin = req.headers.origin ?? '';
92
- if (origins.includes('*') || origins.includes(origin)) {
93
- res.setHeader('Access-Control-Allow-Origin', origins.includes('*') ? '*' : origin);
94
- }
95
- res.setHeader('Access-Control-Allow-Methods', methods.join(', '));
96
- res.setHeader('Access-Control-Allow-Headers', headers.join(', '));
97
- if (config?.credentials) res.setHeader('Access-Control-Allow-Credentials', 'true');
98
- if (config?.maxAge) res.setHeader('Access-Control-Max-Age', String(config.maxAge));
99
- if (req.method === 'OPTIONS') { res.status(204).end(); return; }
100
- next();
101
- };
102
- }
103
-
104
- // ── API Key Rotation ────────────────────────────────────────
105
-
106
- export interface APIKeyEntry {
107
- key: string;
108
- label?: string;
109
- createdAt: number;
110
- expiresAt?: number;
111
- active: boolean;
112
- }
113
-
114
- export class APIKeyManager {
115
- private keys: APIKeyEntry[] = [];
116
-
117
- addKey(key: string, opts?: { label?: string; expiresAt?: number }): void {
118
- this.keys.push({ key, label: opts?.label, createdAt: Date.now(), expiresAt: opts?.expiresAt, active: true });
119
- }
120
-
121
- revokeKey(key: string): boolean {
122
- const entry = this.keys.find(k => k.key === key);
123
- if (entry) { entry.active = false; return true; }
124
- return false;
125
- }
126
-
127
- isValid(key: string): boolean {
128
- const entry = this.keys.find(k => k.key === key);
129
- if (!entry || !entry.active) return false;
130
- if (entry.expiresAt && Date.now() > entry.expiresAt) { entry.active = false; return false; }
131
- return true;
132
- }
133
-
134
- rotateKey(oldKey: string, newKey: string): boolean {
135
- const entry = this.keys.find(k => k.key === oldKey && k.active);
136
- if (!entry) return false;
137
- entry.active = false;
138
- this.addKey(newKey, { label: entry.label });
139
- return true;
140
- }
141
-
142
- listActive(): APIKeyEntry[] {
143
- return this.keys.filter(k => k.active && (!k.expiresAt || Date.now() <= k.expiresAt));
144
- }
145
-
146
- cleanup(): number {
147
- const before = this.keys.length;
148
- this.keys = this.keys.filter(k => k.active && (!k.expiresAt || Date.now() <= k.expiresAt));
149
- return before - this.keys.length;
150
- }
151
- }
152
-
153
- // ── Input Validation Middleware ──────────────────────────────
154
-
155
- export function inputValidation() {
156
- return (req: Request, res: Response, next: NextFunction): void => {
157
- if (req.body?.message && typeof req.body.message === 'string') {
158
- const check = detectInjection(req.body.message);
159
- if (!check.safe) {
160
- res.status(400).json({ error: 'Input contains potentially unsafe content', threats: check.threats });
161
- return;
162
- }
163
- // Limit message size
164
- if (req.body.message.length > 100_000) {
165
- res.status(413).json({ error: 'Message too large (max 100KB)' });
166
- return;
167
- }
168
- }
169
- next();
170
- };
171
- }
1
+ /**
2
+ * Security Hardening Module - v1.0.0
3
+ * Input sanitization, CORS, security headers, API key rotation.
4
+ */
5
+
6
+ import type { Request, Response, NextFunction } from 'express';
7
+
8
+ // ── Input Sanitization ──────────────────────────────────────
9
+
10
+ const XSS_PATTERNS = [
11
+ /<script\b[^>]*>[\s\S]*?<\/script>/gi,
12
+ /javascript:/gi,
13
+ /on\w+\s*=/gi,
14
+ /<iframe\b/gi,
15
+ /<object\b/gi,
16
+ /<embed\b/gi,
17
+ /<form\b/gi,
18
+ ];
19
+
20
+ const SQL_PATTERNS = [
21
+ /(\b(SELECT|INSERT|UPDATE|DELETE|DROP|UNION|ALTER|CREATE|EXEC)\b.*\b(FROM|INTO|TABLE|SET|WHERE|ALL)\b)/gi,
22
+ /(--|;)\s*(DROP|ALTER|DELETE)/gi,
23
+ ];
24
+
25
+ export function sanitizeInput(input: string): string {
26
+ let clean = input;
27
+ for (const pattern of XSS_PATTERNS) {
28
+ clean = clean.replace(pattern, '');
29
+ }
30
+ // Encode dangerous HTML entities
31
+ clean = clean.replace(/&/g, '&amp;').replace(/</g, '&lt;').replace(/>/g, '&gt;');
32
+ return clean;
33
+ }
34
+
35
+ export function detectInjection(input: string): { safe: boolean; threats: string[] } {
36
+ const threats: string[] = [];
37
+ for (const pattern of XSS_PATTERNS) {
38
+ if (pattern.test(input)) threats.push('xss');
39
+ pattern.lastIndex = 0;
40
+ }
41
+ for (const pattern of SQL_PATTERNS) {
42
+ if (pattern.test(input)) threats.push('sql_injection');
43
+ pattern.lastIndex = 0;
44
+ }
45
+ return { safe: threats.length === 0, threats: [...new Set(threats)] };
46
+ }
47
+
48
+ // ── Security Headers (Helmet-style) ────────────────────────
49
+
50
+ export interface SecurityHeadersConfig {
51
+ contentSecurityPolicy?: string;
52
+ enableHSTS?: boolean;
53
+ frameDeny?: boolean;
54
+ xssProtection?: boolean;
55
+ noSniff?: boolean;
56
+ referrerPolicy?: string;
57
+ }
58
+
59
+ export function securityHeaders(config?: SecurityHeadersConfig) {
60
+ const csp = config?.contentSecurityPolicy ?? "default-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; img-src 'self' data:; connect-src 'self'";
61
+ return (_req: Request, res: Response, next: NextFunction): void => {
62
+ res.setHeader('Content-Security-Policy', csp);
63
+ res.setHeader('X-Content-Type-Options', 'nosniff');
64
+ res.setHeader('X-Frame-Options', config?.frameDeny !== false ? 'DENY' : 'SAMEORIGIN');
65
+ res.setHeader('X-XSS-Protection', '1; mode=block');
66
+ res.setHeader('Referrer-Policy', config?.referrerPolicy ?? 'strict-origin-when-cross-origin');
67
+ if (config?.enableHSTS !== false) {
68
+ res.setHeader('Strict-Transport-Security', 'max-age=31536000; includeSubDomains');
69
+ }
70
+ res.removeHeader('X-Powered-By');
71
+ next();
72
+ };
73
+ }
74
+
75
+ // ── CORS Configuration ──────────────────────────────────────
76
+
77
+ export interface CORSConfig {
78
+ origins?: string[];
79
+ methods?: string[];
80
+ allowHeaders?: string[];
81
+ credentials?: boolean;
82
+ maxAge?: number;
83
+ }
84
+
85
+ export function corsMiddleware(config?: CORSConfig) {
86
+ const origins = config?.origins ?? ['*'];
87
+ const methods = config?.methods ?? ['GET', 'POST', 'OPTIONS'];
88
+ const headers = config?.allowHeaders ?? ['Content-Type', 'Authorization'];
89
+
90
+ return (req: Request, res: Response, next: NextFunction): void => {
91
+ const origin = req.headers.origin ?? '';
92
+ if (origins.includes('*') || origins.includes(origin)) {
93
+ res.setHeader('Access-Control-Allow-Origin', origins.includes('*') ? '*' : origin);
94
+ }
95
+ res.setHeader('Access-Control-Allow-Methods', methods.join(', '));
96
+ res.setHeader('Access-Control-Allow-Headers', headers.join(', '));
97
+ if (config?.credentials) res.setHeader('Access-Control-Allow-Credentials', 'true');
98
+ if (config?.maxAge) res.setHeader('Access-Control-Max-Age', String(config.maxAge));
99
+ if (req.method === 'OPTIONS') { res.status(204).end(); return; }
100
+ next();
101
+ };
102
+ }
103
+
104
+ // ── API Key Rotation ────────────────────────────────────────
105
+
106
+ export interface APIKeyEntry {
107
+ key: string;
108
+ label?: string;
109
+ createdAt: number;
110
+ expiresAt?: number;
111
+ active: boolean;
112
+ }
113
+
114
+ export class APIKeyManager {
115
+ private keys: APIKeyEntry[] = [];
116
+
117
+ addKey(key: string, opts?: { label?: string; expiresAt?: number }): void {
118
+ this.keys.push({ key, label: opts?.label, createdAt: Date.now(), expiresAt: opts?.expiresAt, active: true });
119
+ }
120
+
121
+ revokeKey(key: string): boolean {
122
+ const entry = this.keys.find(k => k.key === key);
123
+ if (entry) { entry.active = false; return true; }
124
+ return false;
125
+ }
126
+
127
+ isValid(key: string): boolean {
128
+ const entry = this.keys.find(k => k.key === key);
129
+ if (!entry || !entry.active) return false;
130
+ if (entry.expiresAt && Date.now() > entry.expiresAt) { entry.active = false; return false; }
131
+ return true;
132
+ }
133
+
134
+ rotateKey(oldKey: string, newKey: string): boolean {
135
+ const entry = this.keys.find(k => k.key === oldKey && k.active);
136
+ if (!entry) return false;
137
+ entry.active = false;
138
+ this.addKey(newKey, { label: entry.label });
139
+ return true;
140
+ }
141
+
142
+ listActive(): APIKeyEntry[] {
143
+ return this.keys.filter(k => k.active && (!k.expiresAt || Date.now() <= k.expiresAt));
144
+ }
145
+
146
+ cleanup(): number {
147
+ const before = this.keys.length;
148
+ this.keys = this.keys.filter(k => k.active && (!k.expiresAt || Date.now() <= k.expiresAt));
149
+ return before - this.keys.length;
150
+ }
151
+ }
152
+
153
+ // ── Input Validation Middleware ──────────────────────────────
154
+
155
+ export function inputValidation() {
156
+ return (req: Request, res: Response, next: NextFunction): void => {
157
+ if (req.body?.message && typeof req.body.message === 'string') {
158
+ const check = detectInjection(req.body.message);
159
+ if (!check.safe) {
160
+ res.status(400).json({ error: 'Input contains potentially unsafe content', threats: check.threats });
161
+ return;
162
+ }
163
+ // Limit message size
164
+ if (req.body.message.length > 100_000) {
165
+ res.status(413).json({ error: 'Message too large (max 100KB)' });
166
+ return;
167
+ }
168
+ }
169
+ next();
170
+ };
171
+ }