web-agent-bridge 2.5.0 → 2.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +14 -0
- package/package.json +1 -1
- package/public/.well-known/agent-tools.json +180 -0
- package/sdk/package.json +1 -1
- package/server/adapters/index.js +520 -0
- package/server/index.js +4 -0
- package/server/migrations/004_agent_os.sql +158 -0
- package/server/observability/failure-analysis.js +337 -0
- package/server/registry/certification.js +271 -0
- package/server/routes/runtime.js +411 -0
- package/server/runtime/replay.js +264 -0
- package/server/runtime/session-engine.js +293 -0
- package/server/security/index.js +13 -0
|
@@ -0,0 +1,337 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* Failure Analysis & Classification
|
|
5
|
+
*
|
|
6
|
+
* Classifies failures, detects patterns, and provides root cause analysis.
|
|
7
|
+
*/
|
|
8
|
+
|
|
9
|
+
const { bus } = require('../runtime/event-bus');
|
|
10
|
+
|
|
11
|
+
const FailureClass = {
|
|
12
|
+
NETWORK: 'network',
|
|
13
|
+
TIMEOUT: 'timeout',
|
|
14
|
+
PERMISSION: 'permission',
|
|
15
|
+
VALIDATION: 'validation',
|
|
16
|
+
EXECUTION: 'execution',
|
|
17
|
+
RATE_LIMIT: 'rate_limit',
|
|
18
|
+
RESOURCE: 'resource',
|
|
19
|
+
DEPENDENCY: 'dependency',
|
|
20
|
+
UNKNOWN: 'unknown',
|
|
21
|
+
};
|
|
22
|
+
|
|
23
|
+
const Severity = {
|
|
24
|
+
LOW: 'low',
|
|
25
|
+
MEDIUM: 'medium',
|
|
26
|
+
HIGH: 'high',
|
|
27
|
+
CRITICAL: 'critical',
|
|
28
|
+
};
|
|
29
|
+
|
|
30
|
+
class FailureAnalyzer {
|
|
31
|
+
constructor() {
|
|
32
|
+
this._history = []; // All failures
|
|
33
|
+
this._patterns = new Map(); // pattern key → PatternInfo
|
|
34
|
+
this._maxHistory = 10000;
|
|
35
|
+
this._classifiers = this._defaultClassifiers();
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
/**
|
|
39
|
+
* Classify a failure
|
|
40
|
+
*/
|
|
41
|
+
classify(error, context = {}) {
|
|
42
|
+
const failure = {
|
|
43
|
+
id: `fail_${Date.now()}_${Math.random().toString(36).slice(2, 8)}`,
|
|
44
|
+
timestamp: Date.now(),
|
|
45
|
+
error: {
|
|
46
|
+
message: error.message || String(error),
|
|
47
|
+
code: error.code || error.statusCode || null,
|
|
48
|
+
stack: error.stack?.split('\n').slice(0, 5).join('\n') || null,
|
|
49
|
+
},
|
|
50
|
+
context: {
|
|
51
|
+
taskId: context.taskId || null,
|
|
52
|
+
agentId: context.agentId || null,
|
|
53
|
+
action: context.action || null,
|
|
54
|
+
domain: context.domain || null,
|
|
55
|
+
siteId: context.siteId || null,
|
|
56
|
+
},
|
|
57
|
+
classification: null,
|
|
58
|
+
severity: null,
|
|
59
|
+
rootCause: null,
|
|
60
|
+
retryable: false,
|
|
61
|
+
suggestedFix: null,
|
|
62
|
+
};
|
|
63
|
+
|
|
64
|
+
// Run classifiers
|
|
65
|
+
for (const classifier of this._classifiers) {
|
|
66
|
+
const match = classifier.test(error, context);
|
|
67
|
+
if (match) {
|
|
68
|
+
failure.classification = match.class;
|
|
69
|
+
failure.severity = match.severity;
|
|
70
|
+
failure.rootCause = match.rootCause;
|
|
71
|
+
failure.retryable = match.retryable;
|
|
72
|
+
failure.suggestedFix = match.suggestedFix;
|
|
73
|
+
break;
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
|
|
77
|
+
// Fallback
|
|
78
|
+
if (!failure.classification) {
|
|
79
|
+
failure.classification = FailureClass.UNKNOWN;
|
|
80
|
+
failure.severity = Severity.MEDIUM;
|
|
81
|
+
failure.retryable = false;
|
|
82
|
+
}
|
|
83
|
+
|
|
84
|
+
// Record & detect pattern
|
|
85
|
+
this._history.push(failure);
|
|
86
|
+
this._evict();
|
|
87
|
+
this._detectPattern(failure);
|
|
88
|
+
|
|
89
|
+
bus.emit('failure.classified', {
|
|
90
|
+
id: failure.id,
|
|
91
|
+
classification: failure.classification,
|
|
92
|
+
severity: failure.severity,
|
|
93
|
+
retryable: failure.retryable,
|
|
94
|
+
});
|
|
95
|
+
|
|
96
|
+
return failure;
|
|
97
|
+
}
|
|
98
|
+
|
|
99
|
+
/**
|
|
100
|
+
* Get failure by ID
|
|
101
|
+
*/
|
|
102
|
+
getFailure(id) {
|
|
103
|
+
return this._history.find(f => f.id === id) || null;
|
|
104
|
+
}
|
|
105
|
+
|
|
106
|
+
/**
|
|
107
|
+
* Query failure history
|
|
108
|
+
*/
|
|
109
|
+
query(filters = {}, limit = 50) {
|
|
110
|
+
let results = this._history;
|
|
111
|
+
|
|
112
|
+
if (filters.classification) {
|
|
113
|
+
results = results.filter(f => f.classification === filters.classification);
|
|
114
|
+
}
|
|
115
|
+
if (filters.severity) {
|
|
116
|
+
results = results.filter(f => f.severity === filters.severity);
|
|
117
|
+
}
|
|
118
|
+
if (filters.agentId) {
|
|
119
|
+
results = results.filter(f => f.context.agentId === filters.agentId);
|
|
120
|
+
}
|
|
121
|
+
if (filters.taskId) {
|
|
122
|
+
results = results.filter(f => f.context.taskId === filters.taskId);
|
|
123
|
+
}
|
|
124
|
+
if (filters.retryable !== undefined) {
|
|
125
|
+
results = results.filter(f => f.retryable === filters.retryable);
|
|
126
|
+
}
|
|
127
|
+
if (filters.since) {
|
|
128
|
+
results = results.filter(f => f.timestamp >= filters.since);
|
|
129
|
+
}
|
|
130
|
+
|
|
131
|
+
return results.slice(-limit).reverse();
|
|
132
|
+
}
|
|
133
|
+
|
|
134
|
+
/**
|
|
135
|
+
* Get failure patterns
|
|
136
|
+
*/
|
|
137
|
+
getPatterns() {
|
|
138
|
+
return Array.from(this._patterns.values())
|
|
139
|
+
.filter(p => p.count >= 3)
|
|
140
|
+
.sort((a, b) => b.count - a.count)
|
|
141
|
+
.map(p => ({
|
|
142
|
+
key: p.key,
|
|
143
|
+
classification: p.classification,
|
|
144
|
+
count: p.count,
|
|
145
|
+
firstSeen: p.firstSeen,
|
|
146
|
+
lastSeen: p.lastSeen,
|
|
147
|
+
frequency: p.count / ((p.lastSeen - p.firstSeen) / 60000 || 1),
|
|
148
|
+
sample: p.sample,
|
|
149
|
+
}));
|
|
150
|
+
}
|
|
151
|
+
|
|
152
|
+
/**
|
|
153
|
+
* Get summary statistics
|
|
154
|
+
*/
|
|
155
|
+
getSummary(since = 0) {
|
|
156
|
+
const relevant = since ? this._history.filter(f => f.timestamp >= since) : this._history;
|
|
157
|
+
|
|
158
|
+
const byClass = {};
|
|
159
|
+
const bySeverity = {};
|
|
160
|
+
let retryable = 0;
|
|
161
|
+
|
|
162
|
+
for (const f of relevant) {
|
|
163
|
+
byClass[f.classification] = (byClass[f.classification] || 0) + 1;
|
|
164
|
+
bySeverity[f.severity] = (bySeverity[f.severity] || 0) + 1;
|
|
165
|
+
if (f.retryable) retryable++;
|
|
166
|
+
}
|
|
167
|
+
|
|
168
|
+
return {
|
|
169
|
+
total: relevant.length,
|
|
170
|
+
byClassification: byClass,
|
|
171
|
+
bySeverity: bySeverity,
|
|
172
|
+
retryable,
|
|
173
|
+
patternsDetected: this._patterns.size,
|
|
174
|
+
activePatterns: Array.from(this._patterns.values()).filter(p => p.count >= 3).length,
|
|
175
|
+
};
|
|
176
|
+
}
|
|
177
|
+
|
|
178
|
+
getStats() {
|
|
179
|
+
return {
|
|
180
|
+
totalFailures: this._history.length,
|
|
181
|
+
patterns: this._patterns.size,
|
|
182
|
+
classifiers: this._classifiers.length,
|
|
183
|
+
};
|
|
184
|
+
}
|
|
185
|
+
|
|
186
|
+
// ── Internal ──
|
|
187
|
+
|
|
188
|
+
_defaultClassifiers() {
|
|
189
|
+
return [
|
|
190
|
+
// Network errors
|
|
191
|
+
{
|
|
192
|
+
test: (err) => {
|
|
193
|
+
const msg = (err.message || '').toLowerCase();
|
|
194
|
+
if (err.code === 'ECONNREFUSED' || err.code === 'ENOTFOUND' || err.code === 'ECONNRESET' ||
|
|
195
|
+
msg.includes('network') || msg.includes('dns') || msg.includes('socket') ||
|
|
196
|
+
msg.includes('fetch failed') || msg.includes('econnaborted')) {
|
|
197
|
+
return {
|
|
198
|
+
class: FailureClass.NETWORK,
|
|
199
|
+
severity: Severity.MEDIUM,
|
|
200
|
+
rootCause: `Network error: ${err.code || err.message}`,
|
|
201
|
+
retryable: true,
|
|
202
|
+
suggestedFix: 'Retry with exponential backoff. Check network connectivity.',
|
|
203
|
+
};
|
|
204
|
+
}
|
|
205
|
+
},
|
|
206
|
+
},
|
|
207
|
+
// Timeout
|
|
208
|
+
{
|
|
209
|
+
test: (err) => {
|
|
210
|
+
const msg = (err.message || '').toLowerCase();
|
|
211
|
+
if (err.code === 'ETIMEDOUT' || msg.includes('timeout') || msg.includes('timed out') ||
|
|
212
|
+
msg.includes('aborted')) {
|
|
213
|
+
return {
|
|
214
|
+
class: FailureClass.TIMEOUT,
|
|
215
|
+
severity: Severity.MEDIUM,
|
|
216
|
+
rootCause: `Operation timed out: ${err.message}`,
|
|
217
|
+
retryable: true,
|
|
218
|
+
suggestedFix: 'Increase timeout or reduce payload size.',
|
|
219
|
+
};
|
|
220
|
+
}
|
|
221
|
+
},
|
|
222
|
+
},
|
|
223
|
+
// Rate limit
|
|
224
|
+
{
|
|
225
|
+
test: (err) => {
|
|
226
|
+
if (err.statusCode === 429 || err.code === 429 ||
|
|
227
|
+
(err.message || '').toLowerCase().includes('rate limit')) {
|
|
228
|
+
return {
|
|
229
|
+
class: FailureClass.RATE_LIMIT,
|
|
230
|
+
severity: Severity.LOW,
|
|
231
|
+
rootCause: 'Rate limit exceeded',
|
|
232
|
+
retryable: true,
|
|
233
|
+
suggestedFix: 'Wait for rate limit window to reset. Reduce request frequency.',
|
|
234
|
+
};
|
|
235
|
+
}
|
|
236
|
+
},
|
|
237
|
+
},
|
|
238
|
+
// Permission
|
|
239
|
+
{
|
|
240
|
+
test: (err) => {
|
|
241
|
+
const code = err.statusCode || err.code;
|
|
242
|
+
const msg = (err.message || '').toLowerCase();
|
|
243
|
+
if (code === 401 || code === 403 || msg.includes('unauthorized') ||
|
|
244
|
+
msg.includes('forbidden') || msg.includes('permission') || msg.includes('not allowed')) {
|
|
245
|
+
return {
|
|
246
|
+
class: FailureClass.PERMISSION,
|
|
247
|
+
severity: Severity.HIGH,
|
|
248
|
+
rootCause: `Permission denied: ${err.message}`,
|
|
249
|
+
retryable: false,
|
|
250
|
+
suggestedFix: 'Request required capabilities via capability negotiation.',
|
|
251
|
+
};
|
|
252
|
+
}
|
|
253
|
+
},
|
|
254
|
+
},
|
|
255
|
+
// Validation
|
|
256
|
+
{
|
|
257
|
+
test: (err) => {
|
|
258
|
+
const code = err.statusCode || err.code;
|
|
259
|
+
const msg = (err.message || '').toLowerCase();
|
|
260
|
+
if (code === 400 || code === 422 || msg.includes('valid') || msg.includes('required') ||
|
|
261
|
+
msg.includes('schema') || msg.includes('missing')) {
|
|
262
|
+
return {
|
|
263
|
+
class: FailureClass.VALIDATION,
|
|
264
|
+
severity: Severity.LOW,
|
|
265
|
+
rootCause: `Validation error: ${err.message}`,
|
|
266
|
+
retryable: false,
|
|
267
|
+
suggestedFix: 'Check input schema. Ensure all required fields are present.',
|
|
268
|
+
};
|
|
269
|
+
}
|
|
270
|
+
},
|
|
271
|
+
},
|
|
272
|
+
// Resource
|
|
273
|
+
{
|
|
274
|
+
test: (err) => {
|
|
275
|
+
const code = err.statusCode || err.code;
|
|
276
|
+
const msg = (err.message || '').toLowerCase();
|
|
277
|
+
if (code === 404 || msg.includes('not found') || msg.includes('no such') ||
|
|
278
|
+
msg.includes('does not exist')) {
|
|
279
|
+
return {
|
|
280
|
+
class: FailureClass.RESOURCE,
|
|
281
|
+
severity: Severity.LOW,
|
|
282
|
+
rootCause: `Resource not found: ${err.message}`,
|
|
283
|
+
retryable: false,
|
|
284
|
+
suggestedFix: 'Verify resource ID or path. Use discovery endpoint first.',
|
|
285
|
+
};
|
|
286
|
+
}
|
|
287
|
+
},
|
|
288
|
+
},
|
|
289
|
+
// Dependency
|
|
290
|
+
{
|
|
291
|
+
test: (err) => {
|
|
292
|
+
const msg = (err.message || '').toLowerCase();
|
|
293
|
+
if (msg.includes('dependency') || msg.includes('upstream') || msg.includes('service unavailable') ||
|
|
294
|
+
(err.statusCode || err.code) === 503) {
|
|
295
|
+
return {
|
|
296
|
+
class: FailureClass.DEPENDENCY,
|
|
297
|
+
severity: Severity.HIGH,
|
|
298
|
+
rootCause: `Dependency failure: ${err.message}`,
|
|
299
|
+
retryable: true,
|
|
300
|
+
suggestedFix: 'Check upstream service health. Use fallback provider if available.',
|
|
301
|
+
};
|
|
302
|
+
}
|
|
303
|
+
},
|
|
304
|
+
},
|
|
305
|
+
];
|
|
306
|
+
}
|
|
307
|
+
|
|
308
|
+
_detectPattern(failure) {
|
|
309
|
+
const key = `${failure.classification}:${failure.context.action || 'unknown'}:${failure.context.domain || '*'}`;
|
|
310
|
+
const existing = this._patterns.get(key);
|
|
311
|
+
|
|
312
|
+
if (existing) {
|
|
313
|
+
existing.count++;
|
|
314
|
+
existing.lastSeen = failure.timestamp;
|
|
315
|
+
existing.sample = failure.error.message;
|
|
316
|
+
} else {
|
|
317
|
+
this._patterns.set(key, {
|
|
318
|
+
key,
|
|
319
|
+
classification: failure.classification,
|
|
320
|
+
count: 1,
|
|
321
|
+
firstSeen: failure.timestamp,
|
|
322
|
+
lastSeen: failure.timestamp,
|
|
323
|
+
sample: failure.error.message,
|
|
324
|
+
});
|
|
325
|
+
}
|
|
326
|
+
}
|
|
327
|
+
|
|
328
|
+
_evict() {
|
|
329
|
+
if (this._history.length > this._maxHistory) {
|
|
330
|
+
this._history = this._history.slice(-this._maxHistory);
|
|
331
|
+
}
|
|
332
|
+
}
|
|
333
|
+
}
|
|
334
|
+
|
|
335
|
+
const failureAnalyzer = new FailureAnalyzer();
|
|
336
|
+
|
|
337
|
+
module.exports = { FailureAnalyzer, FailureClass, Severity, failureAnalyzer };
|
|
@@ -0,0 +1,271 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* Agent Certification System
|
|
5
|
+
*
|
|
6
|
+
* Verifies that sites are agent-compatible, issues badges/certificates,
|
|
7
|
+
* and enforces compliance checks for the WAP ecosystem.
|
|
8
|
+
*/
|
|
9
|
+
|
|
10
|
+
const crypto = require('crypto');
|
|
11
|
+
const { bus } = require('../runtime/event-bus');
|
|
12
|
+
|
|
13
|
+
const CertLevel = {
|
|
14
|
+
NONE: 'none',
|
|
15
|
+
BASIC: 'basic', // Has WAB script, basic commands exposed
|
|
16
|
+
STANDARD: 'standard', // Structured data, capability negotiation
|
|
17
|
+
PREMIUM: 'premium', // Full WAP support, semantic actions, discovery
|
|
18
|
+
SOVEREIGN: 'sovereign', // P2P, no intermediary, full protocol
|
|
19
|
+
};
|
|
20
|
+
|
|
21
|
+
class CertificationEngine {
|
|
22
|
+
constructor() {
|
|
23
|
+
this._certificates = new Map(); // domain → Certificate
|
|
24
|
+
this._checks = this._defaultChecks();
|
|
25
|
+
}
|
|
26
|
+
|
|
27
|
+
/**
|
|
28
|
+
* Verify a site's agent compatibility
|
|
29
|
+
*/
|
|
30
|
+
async verify(domain, probeData = {}) {
|
|
31
|
+
const result = {
|
|
32
|
+
domain,
|
|
33
|
+
timestamp: Date.now(),
|
|
34
|
+
level: CertLevel.NONE,
|
|
35
|
+
checks: [],
|
|
36
|
+
score: 0,
|
|
37
|
+
maxScore: 0,
|
|
38
|
+
badge: null,
|
|
39
|
+
expiresAt: null,
|
|
40
|
+
};
|
|
41
|
+
|
|
42
|
+
// Run all checks
|
|
43
|
+
for (const check of this._checks) {
|
|
44
|
+
result.maxScore += check.weight;
|
|
45
|
+
const checkResult = {
|
|
46
|
+
name: check.name,
|
|
47
|
+
category: check.category,
|
|
48
|
+
weight: check.weight,
|
|
49
|
+
passed: false,
|
|
50
|
+
details: null,
|
|
51
|
+
};
|
|
52
|
+
|
|
53
|
+
try {
|
|
54
|
+
const passed = check.test(probeData);
|
|
55
|
+
checkResult.passed = passed;
|
|
56
|
+
if (passed) result.score += check.weight;
|
|
57
|
+
} catch (err) {
|
|
58
|
+
checkResult.details = err.message;
|
|
59
|
+
}
|
|
60
|
+
|
|
61
|
+
result.checks.push(checkResult);
|
|
62
|
+
}
|
|
63
|
+
|
|
64
|
+
// Determine certification level
|
|
65
|
+
const ratio = result.maxScore > 0 ? result.score / result.maxScore : 0;
|
|
66
|
+
if (ratio >= 0.9) result.level = CertLevel.SOVEREIGN;
|
|
67
|
+
else if (ratio >= 0.7) result.level = CertLevel.PREMIUM;
|
|
68
|
+
else if (ratio >= 0.5) result.level = CertLevel.STANDARD;
|
|
69
|
+
else if (ratio >= 0.25) result.level = CertLevel.BASIC;
|
|
70
|
+
|
|
71
|
+
// Generate certificate if passes basic
|
|
72
|
+
if (result.level !== CertLevel.NONE) {
|
|
73
|
+
const cert = this._issueCertificate(domain, result);
|
|
74
|
+
result.badge = cert.badge;
|
|
75
|
+
result.expiresAt = cert.expiresAt;
|
|
76
|
+
result.certificateId = cert.id;
|
|
77
|
+
}
|
|
78
|
+
|
|
79
|
+
bus.emit('certification.verified', {
|
|
80
|
+
domain,
|
|
81
|
+
level: result.level,
|
|
82
|
+
score: result.score,
|
|
83
|
+
maxScore: result.maxScore,
|
|
84
|
+
});
|
|
85
|
+
|
|
86
|
+
return result;
|
|
87
|
+
}
|
|
88
|
+
|
|
89
|
+
/**
|
|
90
|
+
* Get certificate for a domain
|
|
91
|
+
*/
|
|
92
|
+
getCertificate(domain) {
|
|
93
|
+
const cert = this._certificates.get(domain);
|
|
94
|
+
if (!cert) return null;
|
|
95
|
+
if (cert.expiresAt < Date.now()) {
|
|
96
|
+
this._certificates.delete(domain);
|
|
97
|
+
return null;
|
|
98
|
+
}
|
|
99
|
+
return cert;
|
|
100
|
+
}
|
|
101
|
+
|
|
102
|
+
/**
|
|
103
|
+
* List all active certificates
|
|
104
|
+
*/
|
|
105
|
+
listCertificates(filters = {}, limit = 50) {
|
|
106
|
+
const now = Date.now();
|
|
107
|
+
let certs = Array.from(this._certificates.values()).filter(c => c.expiresAt >= now);
|
|
108
|
+
|
|
109
|
+
if (filters.level) certs = certs.filter(c => c.level === filters.level);
|
|
110
|
+
if (filters.minScore) certs = certs.filter(c => c.score >= filters.minScore);
|
|
111
|
+
|
|
112
|
+
return certs.slice(0, limit).map(c => ({
|
|
113
|
+
id: c.id,
|
|
114
|
+
domain: c.domain,
|
|
115
|
+
level: c.level,
|
|
116
|
+
score: c.score,
|
|
117
|
+
maxScore: c.maxScore,
|
|
118
|
+
issuedAt: c.issuedAt,
|
|
119
|
+
expiresAt: c.expiresAt,
|
|
120
|
+
badge: c.badge,
|
|
121
|
+
}));
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
/**
|
|
125
|
+
* Revoke a certificate
|
|
126
|
+
*/
|
|
127
|
+
revoke(domain) {
|
|
128
|
+
this._certificates.delete(domain);
|
|
129
|
+
bus.emit('certification.revoked', { domain });
|
|
130
|
+
}
|
|
131
|
+
|
|
132
|
+
/**
|
|
133
|
+
* Get badge URL for a certification level
|
|
134
|
+
*/
|
|
135
|
+
getBadge(level) {
|
|
136
|
+
return `/badge/agent-${level}.svg`;
|
|
137
|
+
}
|
|
138
|
+
|
|
139
|
+
getStats() {
|
|
140
|
+
return {
|
|
141
|
+
totalCertificates: this._certificates.size,
|
|
142
|
+
byLevel: this._countByLevel(),
|
|
143
|
+
checks: this._checks.length,
|
|
144
|
+
};
|
|
145
|
+
}
|
|
146
|
+
|
|
147
|
+
// ── Internal ──
|
|
148
|
+
|
|
149
|
+
_issueCertificate(domain, result) {
|
|
150
|
+
const id = `cert_${crypto.randomBytes(8).toString('hex')}`;
|
|
151
|
+
const cert = {
|
|
152
|
+
id,
|
|
153
|
+
domain,
|
|
154
|
+
level: result.level,
|
|
155
|
+
score: result.score,
|
|
156
|
+
maxScore: result.maxScore,
|
|
157
|
+
checks: result.checks.map(c => ({ name: c.name, passed: c.passed })),
|
|
158
|
+
issuedAt: Date.now(),
|
|
159
|
+
expiresAt: Date.now() + 90 * 24 * 3600_000, // 90 days
|
|
160
|
+
badge: this.getBadge(result.level),
|
|
161
|
+
signature: this._signCertificate(id, domain, result.level),
|
|
162
|
+
};
|
|
163
|
+
|
|
164
|
+
this._certificates.set(domain, cert);
|
|
165
|
+
return cert;
|
|
166
|
+
}
|
|
167
|
+
|
|
168
|
+
_signCertificate(id, domain, level) {
|
|
169
|
+
const secret = process.env.WAB_CERT_SECRET || 'wab-certification-key';
|
|
170
|
+
return crypto
|
|
171
|
+
.createHmac('sha256', secret)
|
|
172
|
+
.update(`${id}:${domain}:${level}`)
|
|
173
|
+
.digest('hex')
|
|
174
|
+
.slice(0, 32);
|
|
175
|
+
}
|
|
176
|
+
|
|
177
|
+
_countByLevel() {
|
|
178
|
+
const counts = {};
|
|
179
|
+
for (const cert of this._certificates.values()) {
|
|
180
|
+
counts[cert.level] = (counts[cert.level] || 0) + 1;
|
|
181
|
+
}
|
|
182
|
+
return counts;
|
|
183
|
+
}
|
|
184
|
+
|
|
185
|
+
_defaultChecks() {
|
|
186
|
+
return [
|
|
187
|
+
{
|
|
188
|
+
name: 'wab_script_present',
|
|
189
|
+
category: 'integration',
|
|
190
|
+
weight: 10,
|
|
191
|
+
test: (data) => !!(data.hasWABScript || data.wabVersion),
|
|
192
|
+
},
|
|
193
|
+
{
|
|
194
|
+
name: 'well_known_discovery',
|
|
195
|
+
category: 'protocol',
|
|
196
|
+
weight: 10,
|
|
197
|
+
test: (data) => !!(data.wellKnown || data.agentToolsJson),
|
|
198
|
+
},
|
|
199
|
+
{
|
|
200
|
+
name: 'structured_metadata',
|
|
201
|
+
category: 'data',
|
|
202
|
+
weight: 8,
|
|
203
|
+
test: (data) => !!(data.jsonLd || data.structuredData || data.openGraph),
|
|
204
|
+
},
|
|
205
|
+
{
|
|
206
|
+
name: 'semantic_actions',
|
|
207
|
+
category: 'protocol',
|
|
208
|
+
weight: 10,
|
|
209
|
+
test: (data) => !!(data.semanticActions && data.semanticActions.length > 0),
|
|
210
|
+
},
|
|
211
|
+
{
|
|
212
|
+
name: 'capability_negotiation',
|
|
213
|
+
category: 'security',
|
|
214
|
+
weight: 10,
|
|
215
|
+
test: (data) => !!data.capabilityNegotiation,
|
|
216
|
+
},
|
|
217
|
+
{
|
|
218
|
+
name: 'command_schema',
|
|
219
|
+
category: 'protocol',
|
|
220
|
+
weight: 8,
|
|
221
|
+
test: (data) => !!(data.commands && data.commands.length > 0),
|
|
222
|
+
},
|
|
223
|
+
{
|
|
224
|
+
name: 'https_enabled',
|
|
225
|
+
category: 'security',
|
|
226
|
+
weight: 5,
|
|
227
|
+
test: (data) => data.https !== false,
|
|
228
|
+
},
|
|
229
|
+
{
|
|
230
|
+
name: 'cors_agent_friendly',
|
|
231
|
+
category: 'security',
|
|
232
|
+
weight: 5,
|
|
233
|
+
test: (data) => !!data.corsAllowsAgents,
|
|
234
|
+
},
|
|
235
|
+
{
|
|
236
|
+
name: 'rate_limit_info',
|
|
237
|
+
category: 'fairness',
|
|
238
|
+
weight: 5,
|
|
239
|
+
test: (data) => !!data.rateLimitInfo,
|
|
240
|
+
},
|
|
241
|
+
{
|
|
242
|
+
name: 'error_handling',
|
|
243
|
+
category: 'reliability',
|
|
244
|
+
weight: 5,
|
|
245
|
+
test: (data) => !!data.errorSchemaProvided,
|
|
246
|
+
},
|
|
247
|
+
{
|
|
248
|
+
name: 'data_privacy_declaration',
|
|
249
|
+
category: 'compliance',
|
|
250
|
+
weight: 7,
|
|
251
|
+
test: (data) => !!(data.privacyPolicy || data.dataUsagePolicy),
|
|
252
|
+
},
|
|
253
|
+
{
|
|
254
|
+
name: 'agent_terms_of_service',
|
|
255
|
+
category: 'compliance',
|
|
256
|
+
weight: 7,
|
|
257
|
+
test: (data) => !!data.agentTOS,
|
|
258
|
+
},
|
|
259
|
+
{
|
|
260
|
+
name: 'p2p_sovereign_support',
|
|
261
|
+
category: 'sovereignty',
|
|
262
|
+
weight: 10,
|
|
263
|
+
test: (data) => !!data.sovereignMode,
|
|
264
|
+
},
|
|
265
|
+
];
|
|
266
|
+
}
|
|
267
|
+
}
|
|
268
|
+
|
|
269
|
+
const certificationEngine = new CertificationEngine();
|
|
270
|
+
|
|
271
|
+
module.exports = { CertificationEngine, CertLevel, certificationEngine };
|