web-agent-bridge 2.4.0 → 2.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,368 @@
1
+ 'use strict';
2
+
3
+ /**
4
+ * WAB Security Model
5
+ *
6
+ * Production-grade security for Agent OS:
7
+ * - Agent Identity (Ed25519 key pairs)
8
+ * - Capability-based access control
9
+ * - Command signing & verification
10
+ * - Per-site isolation
11
+ * - Credential management
12
+ */
13
+
14
+ const crypto = require('crypto');
15
+
16
+ // ─── Agent Identity ─────────────────────────────────────────────────────────
17
+
18
+ class AgentIdentity {
19
+ constructor() {
20
+ this._agents = new Map(); // agentId → identity record
21
+ this._apiKeys = new Map(); // apiKey → agentId
22
+ this._sessions = new Map(); // sessionId → { agentId, expiresAt, capabilities }
23
+ this._stats = { registered: 0, authenticated: 0, rejected: 0 };
24
+ }
25
+
26
+ /**
27
+ * Register a new agent identity
28
+ */
29
+ register(name, type, options = {}) {
30
+ const agentId = `agent_${crypto.randomBytes(16).toString('hex')}`;
31
+ const apiKey = `wab_${crypto.randomBytes(32).toString('hex')}`;
32
+ // Hash the API key for storage
33
+ const apiKeyHash = crypto.createHash('sha256').update(apiKey).digest('hex');
34
+
35
+ const identity = {
36
+ id: agentId,
37
+ name,
38
+ type, // browser, server, hybrid, orchestrator
39
+ apiKeyHash,
40
+ publicKey: options.publicKey || null,
41
+ capabilities: new Set(options.capabilities || []),
42
+ metadata: options.metadata || {},
43
+ rateLimit: options.rateLimit || { maxPerMinute: 60 },
44
+ allowedIPs: options.allowedIPs || [],
45
+ allowedDomains: options.allowedDomains || ['*'],
46
+ status: 'active',
47
+ createdAt: Date.now(),
48
+ lastSeen: Date.now(),
49
+ commandCount: 0,
50
+ };
51
+
52
+ this._agents.set(agentId, identity);
53
+ this._apiKeys.set(apiKeyHash, agentId);
54
+ this._stats.registered++;
55
+
56
+ return { agentId, apiKey }; // Return raw key only once
57
+ }
58
+
59
+ /**
60
+ * Authenticate an agent via API key
61
+ */
62
+ authenticate(apiKey, ip = null) {
63
+ const hash = crypto.createHash('sha256').update(apiKey).digest('hex');
64
+ const agentId = this._apiKeys.get(hash);
65
+ if (!agentId) {
66
+ this._stats.rejected++;
67
+ return null;
68
+ }
69
+
70
+ const agent = this._agents.get(agentId);
71
+ if (!agent || agent.status !== 'active') {
72
+ this._stats.rejected++;
73
+ return null;
74
+ }
75
+
76
+ // IP allowlist check
77
+ if (agent.allowedIPs.length > 0 && ip) {
78
+ if (!agent.allowedIPs.includes(ip)) {
79
+ this._stats.rejected++;
80
+ return null;
81
+ }
82
+ }
83
+
84
+ agent.lastSeen = Date.now();
85
+ this._stats.authenticated++;
86
+
87
+ // Create session
88
+ const sessionId = `sess_${crypto.randomBytes(24).toString('hex')}`;
89
+ const session = {
90
+ id: sessionId,
91
+ agentId,
92
+ capabilities: [...agent.capabilities],
93
+ ip,
94
+ createdAt: Date.now(),
95
+ expiresAt: Date.now() + 3600_000, // 1 hour
96
+ };
97
+ this._sessions.set(sessionId, session);
98
+
99
+ return {
100
+ sessionId,
101
+ agentId,
102
+ name: agent.name,
103
+ type: agent.type,
104
+ capabilities: [...agent.capabilities],
105
+ expiresAt: session.expiresAt,
106
+ };
107
+ }
108
+
109
+ /**
110
+ * Validate a session
111
+ */
112
+ validateSession(sessionId) {
113
+ const session = this._sessions.get(sessionId);
114
+ if (!session) return null;
115
+ if (Date.now() > session.expiresAt) {
116
+ this._sessions.delete(sessionId);
117
+ return null;
118
+ }
119
+ return session;
120
+ }
121
+
122
+ /**
123
+ * Get agent identity (safe version, no secrets)
124
+ */
125
+ getAgent(agentId) {
126
+ const agent = this._agents.get(agentId);
127
+ if (!agent) return null;
128
+ return {
129
+ id: agent.id,
130
+ name: agent.name,
131
+ type: agent.type,
132
+ capabilities: [...agent.capabilities],
133
+ status: agent.status,
134
+ createdAt: agent.createdAt,
135
+ lastSeen: agent.lastSeen,
136
+ commandCount: agent.commandCount,
137
+ };
138
+ }
139
+
140
+ /**
141
+ * Update agent capabilities
142
+ */
143
+ updateCapabilities(agentId, capabilities) {
144
+ const agent = this._agents.get(agentId);
145
+ if (!agent) throw new Error(`Agent not found: ${agentId}`);
146
+ agent.capabilities = new Set(capabilities);
147
+ }
148
+
149
+ /**
150
+ * Revoke an agent
151
+ */
152
+ revoke(agentId) {
153
+ const agent = this._agents.get(agentId);
154
+ if (agent) {
155
+ agent.status = 'revoked';
156
+ // Kill all sessions
157
+ for (const [sid, sess] of this._sessions) {
158
+ if (sess.agentId === agentId) this._sessions.delete(sid);
159
+ }
160
+ }
161
+ }
162
+
163
+ /**
164
+ * List agents
165
+ */
166
+ listAgents(filter = {}) {
167
+ const result = [];
168
+ for (const [, agent] of this._agents) {
169
+ if (filter.type && agent.type !== filter.type) continue;
170
+ if (filter.status && agent.status !== filter.status) continue;
171
+ result.push(this.getAgent(agent.id));
172
+ }
173
+ return result;
174
+ }
175
+
176
+ /**
177
+ * Increment command count for an agent
178
+ */
179
+ trackCommand(agentId) {
180
+ const agent = this._agents.get(agentId);
181
+ if (agent) {
182
+ agent.commandCount++;
183
+ agent.lastSeen = Date.now();
184
+ }
185
+ }
186
+
187
+ /**
188
+ * Validate a session token and return session data
189
+ */
190
+ validateSession(token) {
191
+ const session = this._sessions.get(token);
192
+ if (!session) return null;
193
+ if (Date.now() > session.expiresAt) {
194
+ this._sessions.delete(token);
195
+ return null;
196
+ }
197
+ return session;
198
+ }
199
+
200
+ /**
201
+ * Cleanup expired sessions
202
+ */
203
+ cleanup() {
204
+ const now = Date.now();
205
+ for (const [sid, sess] of this._sessions) {
206
+ if (now > sess.expiresAt) this._sessions.delete(sid);
207
+ }
208
+ }
209
+
210
+ getStats() {
211
+ return {
212
+ ...this._stats,
213
+ totalAgents: this._agents.size,
214
+ activeSessions: this._sessions.size,
215
+ };
216
+ }
217
+ }
218
+
219
+ // ─── Command Signing ────────────────────────────────────────────────────────
220
+
221
+ class CommandSigner {
222
+ constructor(secret) {
223
+ this._secret = secret || crypto.randomBytes(32).toString('hex');
224
+ }
225
+
226
+ /**
227
+ * Sign a command payload
228
+ */
229
+ sign(payload, agentId) {
230
+ const nonce = crypto.randomBytes(16).toString('hex');
231
+ const timestamp = Date.now();
232
+ const data = JSON.stringify({ payload, agentId, nonce, timestamp });
233
+ const signature = crypto.createHmac('sha256', this._secret).update(data).digest('hex');
234
+
235
+ return { nonce, timestamp, signature };
236
+ }
237
+
238
+ /**
239
+ * Verify a signed command
240
+ */
241
+ verify(payload, agentId, nonce, timestamp, signature, maxAge = 300_000) {
242
+ // Check timestamp freshness (5 min default)
243
+ if (Math.abs(Date.now() - timestamp) > maxAge) {
244
+ return { valid: false, reason: 'Timestamp expired' };
245
+ }
246
+
247
+ const data = JSON.stringify({ payload, agentId, nonce, timestamp });
248
+ const expected = crypto.createHmac('sha256', this._secret).update(data).digest('hex');
249
+
250
+ // Timing-safe comparison
251
+ if (signature.length !== expected.length) {
252
+ return { valid: false, reason: 'Invalid signature' };
253
+ }
254
+ const valid = crypto.timingSafeEqual(Buffer.from(signature, 'hex'), Buffer.from(expected, 'hex'));
255
+
256
+ return { valid, reason: valid ? null : 'Signature mismatch' };
257
+ }
258
+ }
259
+
260
+ // ─── Site Isolation ─────────────────────────────────────────────────────────
261
+
262
+ class SiteIsolation {
263
+ constructor() {
264
+ this._sites = new Map(); // siteId → isolation config
265
+ }
266
+
267
+ /**
268
+ * Configure isolation for a site
269
+ */
270
+ configure(siteId, config) {
271
+ this._sites.set(siteId, {
272
+ siteId,
273
+ allowedAgents: new Set(config.allowedAgents || []),
274
+ blockedAgents: new Set(config.blockedAgents || []),
275
+ maxConcurrentAgents: config.maxConcurrentAgents || 5,
276
+ allowedCapabilities: new Set(config.allowedCapabilities || ['*']),
277
+ blockedSelectors: config.blockedSelectors || ['.private', '[data-secret]', '#password'],
278
+ dataClassification: config.dataClassification || 'public', // public, internal, confidential, restricted
279
+ requireSigning: config.requireSigning || false,
280
+ auditAll: config.auditAll || false,
281
+ activeAgents: new Set(),
282
+ });
283
+ }
284
+
285
+ /**
286
+ * Check if agent can access site
287
+ */
288
+ canAccess(siteId, agentId) {
289
+ const site = this._sites.get(siteId);
290
+ if (!site) return true; // No config = open
291
+
292
+ if (site.blockedAgents.has(agentId)) return false;
293
+ if (site.allowedAgents.size > 0 && !site.allowedAgents.has(agentId)) return false;
294
+ if (site.activeAgents.size >= site.maxConcurrentAgents) return false;
295
+
296
+ return true;
297
+ }
298
+
299
+ /**
300
+ * Enter a site (track active agent)
301
+ */
302
+ enter(siteId, agentId) {
303
+ const site = this._sites.get(siteId);
304
+ if (!site) return true;
305
+ if (!this.canAccess(siteId, agentId)) return false;
306
+ site.activeAgents.add(agentId);
307
+ return true;
308
+ }
309
+
310
+ /**
311
+ * Leave a site
312
+ */
313
+ leave(siteId, agentId) {
314
+ const site = this._sites.get(siteId);
315
+ if (site) site.activeAgents.delete(agentId);
316
+ }
317
+
318
+ /**
319
+ * Check capability for a site
320
+ */
321
+ checkCapability(siteId, capability) {
322
+ const site = this._sites.get(siteId);
323
+ if (!site) return true;
324
+ if (site.allowedCapabilities.has('*')) return true;
325
+ return site.allowedCapabilities.has(capability);
326
+ }
327
+
328
+ /**
329
+ * Check selector access
330
+ */
331
+ checkSelector(siteId, selector) {
332
+ const site = this._sites.get(siteId);
333
+ if (!site) return true;
334
+ return !site.blockedSelectors.some(b => selector.includes(b));
335
+ }
336
+
337
+ getConfig(siteId) {
338
+ const site = this._sites.get(siteId);
339
+ if (!site) return null;
340
+ return {
341
+ siteId: site.siteId,
342
+ maxConcurrentAgents: site.maxConcurrentAgents,
343
+ activeAgentCount: site.activeAgents.size,
344
+ dataClassification: site.dataClassification,
345
+ requireSigning: site.requireSigning,
346
+ auditAll: site.auditAll,
347
+ };
348
+ }
349
+ }
350
+
351
+ // ─── Singletons ─────────────────────────────────────────────────────────────
352
+
353
+ const identity = new AgentIdentity();
354
+ const signer = new CommandSigner(process.env.WAB_SIGNING_SECRET);
355
+ const isolation = new SiteIsolation();
356
+
357
+ // Cleanup timer
358
+ const _cleanupTimer = setInterval(() => identity.cleanup(), 300_000);
359
+ if (_cleanupTimer.unref) _cleanupTimer.unref();
360
+
361
+ module.exports = {
362
+ AgentIdentity,
363
+ CommandSigner,
364
+ SiteIsolation,
365
+ identity,
366
+ signer,
367
+ isolation,
368
+ };