web-agent-bridge 3.0.0 → 3.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (202) hide show
  1. package/LICENSE +72 -21
  2. package/README.ar.md +1286 -1073
  3. package/README.md +1764 -1535
  4. package/bin/agent-runner.js +474 -474
  5. package/bin/cli.js +237 -138
  6. package/bin/wab.js +80 -80
  7. package/examples/bidi-agent.js +119 -119
  8. package/examples/cross-site-agent.js +91 -91
  9. package/examples/mcp-agent.js +94 -94
  10. package/examples/next-app-router/README.md +44 -44
  11. package/examples/puppeteer-agent.js +108 -108
  12. package/examples/saas-dashboard/README.md +55 -55
  13. package/examples/shopify-hydrogen/README.md +74 -74
  14. package/examples/vision-agent.js +171 -171
  15. package/examples/wordpress-elementor/README.md +77 -77
  16. package/package.json +17 -3
  17. package/public/.well-known/agent-tools.json +180 -180
  18. package/public/.well-known/ai-assets.json +59 -59
  19. package/public/.well-known/ai-plugin.json +28 -0
  20. package/public/.well-known/security.txt +8 -0
  21. package/public/agent-workspace.html +349 -347
  22. package/public/ai.html +198 -196
  23. package/public/api.html +413 -0
  24. package/public/browser.html +486 -484
  25. package/public/commander-dashboard.html +243 -243
  26. package/public/cookies.html +210 -208
  27. package/public/css/agent-workspace.css +1713 -1713
  28. package/public/css/premium.css +317 -317
  29. package/public/css/styles.css +1235 -1235
  30. package/public/dashboard.html +706 -704
  31. package/public/demo.html +1770 -1
  32. package/public/dns.html +507 -0
  33. package/public/docs.html +587 -585
  34. package/public/feed.xml +89 -89
  35. package/public/growth.html +463 -0
  36. package/public/index.html +341 -9
  37. package/public/integrations.html +556 -0
  38. package/public/js/agent-workspace.js +1740 -1740
  39. package/public/js/auth-nav.js +31 -31
  40. package/public/js/auth-redirect.js +12 -12
  41. package/public/js/cookie-consent.js +56 -56
  42. package/public/js/wab-demo-page.js +721 -721
  43. package/public/js/ws-client.js +74 -74
  44. package/public/llms-full.txt +360 -309
  45. package/public/llms.txt +125 -86
  46. package/public/login.html +85 -83
  47. package/public/mesh-dashboard.html +328 -328
  48. package/public/openapi.json +580 -580
  49. package/public/phone-shield.html +281 -0
  50. package/public/premium-dashboard.html +2489 -2487
  51. package/public/premium.html +793 -791
  52. package/public/privacy.html +297 -295
  53. package/public/register.html +105 -103
  54. package/public/robots.txt +87 -87
  55. package/public/script/wab-consent.d.ts +36 -36
  56. package/public/script/wab-consent.js +104 -104
  57. package/public/script/wab-schema.js +131 -131
  58. package/public/script/wab.d.ts +108 -108
  59. package/public/script/wab.min.js +580 -580
  60. package/public/security.txt +8 -0
  61. package/public/terms.html +256 -254
  62. package/script/ai-agent-bridge.js +1754 -1754
  63. package/sdk/README.md +99 -99
  64. package/sdk/agent-mesh.js +449 -449
  65. package/sdk/commander.js +262 -262
  66. package/sdk/index.d.ts +464 -464
  67. package/sdk/index.js +18 -1
  68. package/sdk/multi-agent.js +318 -318
  69. package/sdk/package.json +12 -1
  70. package/sdk/safety-shield.js +219 -0
  71. package/sdk/schema-discovery.js +83 -83
  72. package/server/adapters/index.js +520 -520
  73. package/server/config/plans.js +367 -367
  74. package/server/config/secrets.js +102 -102
  75. package/server/control-plane/index.js +301 -301
  76. package/server/data-plane/index.js +354 -354
  77. package/server/index.js +175 -19
  78. package/server/llm/index.js +404 -404
  79. package/server/middleware/adminAuth.js +35 -35
  80. package/server/middleware/auth.js +50 -50
  81. package/server/middleware/featureGate.js +88 -88
  82. package/server/middleware/rateLimits.js +100 -100
  83. package/server/middleware/sensitiveAction.js +157 -0
  84. package/server/migrations/001_add_analytics_indexes.sql +7 -7
  85. package/server/migrations/002_premium_features.sql +418 -418
  86. package/server/migrations/003_ads_integer_cents.sql +33 -33
  87. package/server/migrations/004_agent_os.sql +158 -158
  88. package/server/migrations/005_marketplace_metering.sql +126 -126
  89. package/server/models/adapters/index.js +33 -33
  90. package/server/models/adapters/mysql.js +183 -183
  91. package/server/models/adapters/postgresql.js +172 -172
  92. package/server/models/adapters/sqlite.js +7 -7
  93. package/server/models/db.js +681 -681
  94. package/server/observability/failure-analysis.js +337 -337
  95. package/server/observability/index.js +394 -394
  96. package/server/protocol/capabilities.js +223 -223
  97. package/server/protocol/index.js +243 -243
  98. package/server/protocol/schema.js +584 -584
  99. package/server/registry/certification.js +271 -271
  100. package/server/registry/index.js +326 -326
  101. package/server/routes/admin-premium.js +671 -671
  102. package/server/routes/admin.js +261 -261
  103. package/server/routes/ads.js +130 -130
  104. package/server/routes/agent-workspace.js +540 -378
  105. package/server/routes/api.js +150 -150
  106. package/server/routes/auth.js +71 -71
  107. package/server/routes/billing.js +45 -45
  108. package/server/routes/commander.js +316 -316
  109. package/server/routes/demo-showcase.js +332 -0
  110. package/server/routes/demo-store.js +154 -0
  111. package/server/routes/discovery.js +417 -406
  112. package/server/routes/gateway.js +173 -0
  113. package/server/routes/license.js +251 -240
  114. package/server/routes/mesh.js +469 -469
  115. package/server/routes/noscript.js +543 -543
  116. package/server/routes/premium-v2.js +686 -686
  117. package/server/routes/premium.js +724 -724
  118. package/server/routes/runtime.js +2148 -2147
  119. package/server/routes/sovereign.js +465 -385
  120. package/server/routes/universal.js +200 -177
  121. package/server/routes/wab-api.js +850 -491
  122. package/server/runtime/container-worker.js +111 -111
  123. package/server/runtime/container.js +448 -448
  124. package/server/runtime/distributed-worker.js +362 -362
  125. package/server/runtime/event-bus.js +210 -210
  126. package/server/runtime/index.js +253 -253
  127. package/server/runtime/queue.js +599 -599
  128. package/server/runtime/replay.js +666 -666
  129. package/server/runtime/sandbox.js +266 -266
  130. package/server/runtime/scheduler.js +534 -534
  131. package/server/runtime/session-engine.js +293 -293
  132. package/server/runtime/state-manager.js +188 -188
  133. package/server/security/cross-site-redactor.js +196 -0
  134. package/server/security/dry-run.js +180 -0
  135. package/server/security/human-gate-rate-limit.js +147 -0
  136. package/server/security/human-gate-transports.js +178 -0
  137. package/server/security/human-gate.js +281 -0
  138. package/server/security/index.js +368 -368
  139. package/server/security/intent-engine.js +245 -0
  140. package/server/security/reward-guard.js +171 -0
  141. package/server/security/rollback-store.js +239 -0
  142. package/server/security/token-scope.js +404 -0
  143. package/server/security/url-policy.js +139 -0
  144. package/server/services/agent-chat.js +506 -506
  145. package/server/services/agent-learning.js +601 -575
  146. package/server/services/agent-memory.js +625 -625
  147. package/server/services/agent-mesh.js +555 -539
  148. package/server/services/agent-symphony.js +717 -717
  149. package/server/services/agent-tasks.js +1807 -1807
  150. package/server/services/api-key-engine.js +292 -0
  151. package/server/services/cluster.js +894 -894
  152. package/server/services/commander.js +738 -738
  153. package/server/services/edge-compute.js +440 -440
  154. package/server/services/email.js +204 -204
  155. package/server/services/hosted-runtime.js +205 -205
  156. package/server/services/lfd.js +635 -616
  157. package/server/services/local-ai.js +389 -389
  158. package/server/services/marketplace.js +270 -270
  159. package/server/services/metering.js +182 -182
  160. package/server/services/modules/affiliate-intelligence.js +93 -0
  161. package/server/services/modules/agent-firewall.js +90 -0
  162. package/server/services/modules/bounty.js +89 -0
  163. package/server/services/modules/collective-bargaining.js +92 -0
  164. package/server/services/modules/dark-pattern.js +66 -0
  165. package/server/services/modules/gov-intelligence.js +45 -0
  166. package/server/services/modules/neural.js +55 -0
  167. package/server/services/modules/notary.js +49 -0
  168. package/server/services/modules/price-time-machine.js +86 -0
  169. package/server/services/modules/protocol.js +104 -0
  170. package/server/services/negotiation.js +439 -439
  171. package/server/services/plugins.js +771 -771
  172. package/server/services/premium.js +1 -1
  173. package/server/services/price-intelligence.js +566 -565
  174. package/server/services/price-shield.js +1137 -1137
  175. package/server/services/reputation.js +465 -465
  176. package/server/services/search-engine.js +357 -357
  177. package/server/services/security.js +513 -513
  178. package/server/services/self-healing.js +843 -843
  179. package/server/services/sovereign-shield.js +542 -0
  180. package/server/services/stripe.js +192 -192
  181. package/server/services/swarm.js +788 -788
  182. package/server/services/universal-scraper.js +662 -661
  183. package/server/services/verification.js +481 -481
  184. package/server/services/vision.js +1163 -1163
  185. package/server/utils/cache.js +125 -125
  186. package/server/utils/migrate.js +81 -81
  187. package/server/utils/safe-fetch.js +228 -0
  188. package/server/utils/secureFields.js +50 -50
  189. package/server/ws.js +161 -161
  190. package/templates/artisan-marketplace.yaml +104 -104
  191. package/templates/book-price-scout.yaml +98 -98
  192. package/templates/electronics-price-tracker.yaml +108 -108
  193. package/templates/flight-deal-hunter.yaml +113 -113
  194. package/templates/freelancer-direct.yaml +116 -116
  195. package/templates/grocery-price-compare.yaml +93 -93
  196. package/templates/hotel-direct-booking.yaml +113 -113
  197. package/templates/local-services.yaml +98 -98
  198. package/templates/olive-oil-tunisia.yaml +88 -88
  199. package/templates/organic-farm-fresh.yaml +101 -101
  200. package/templates/restaurant-direct.yaml +97 -97
  201. package/server/services/fairness-engine.js +0 -409
  202. package/server/services/fairness.js +0 -420
@@ -0,0 +1,180 @@
1
+ 'use strict';
2
+
3
+ /**
4
+ * WAB Safety Shield — Mandatory Dry-Run
5
+ *
6
+ * Implements WAB SPEC §8.10. For commands the site classifies as
7
+ * destructive (or which match the SPEC default destructive verb list,
8
+ * see token-scope.js), the Bridge MUST refuse `dry_run: false` until a
9
+ * preceding `dry_run: true` plan has been produced AND has not expired.
10
+ *
11
+ * Wire format:
12
+ * - Request: body.dry_run === true | false (default: undefined)
13
+ * body.plan_id (required when dry_run === false)
14
+ * - Response (dry_run=true):
15
+ * { type:'success', result:{ dry_run:true, plan_id, expires_at,
16
+ * simulated:{ would_affect:[...], side_effects:[...], reversible:bool }}}
17
+ *
18
+ * Plan expiry:
19
+ * - Plans are short-lived (default 5 min, max 60 min) so an attacker
20
+ * who steals a session cannot replay an old plan against a changed
21
+ * target.
22
+ * - Plans are bound to (sessionToken, siteId, actionName, paramsHash)
23
+ * — any drift invalidates them.
24
+ *
25
+ * Errors:
26
+ * DRY_RUN_REQUIRED — destructive action invoked without a plan
27
+ * DRY_RUN_PLAN_NOT_FOUND — plan_id supplied but unknown / expired
28
+ * DRY_RUN_PLAN_MISMATCH — plan exists but params/action drifted
29
+ * DRY_RUN_PLAN_EXPIRED — plan past TTL
30
+ *
31
+ * The simulator is a pluggable function passed by the caller — this
32
+ * module only owns the policy + plan-store. Sites/adapters provide the
33
+ * actual "what would this do" answer.
34
+ */
35
+
36
+ const crypto = require('crypto');
37
+ const { isDestructiveAction } = require('./token-scope');
38
+
39
+ const DEFAULT_TTL_MS = 5 * 60 * 1000; // 5 min
40
+ const MAX_TTL_MS = 60 * 60 * 1000; // 60 min hard cap
41
+ const PLAN_STORE_MAX = 5000; // LRU bound
42
+
43
+ // ─── Plan store (in-memory, single-process) ──────────────────────────
44
+ // In a multi-process deployment this should be backed by Redis; the
45
+ // interface is intentionally minimal so swap-out is trivial.
46
+
47
+ const _plans = new Map(); // plan_id -> entry
48
+
49
+ function _evictIfFull() {
50
+ if (_plans.size <= PLAN_STORE_MAX) return;
51
+ // Evict ~10% of oldest entries.
52
+ const drop = Math.ceil(PLAN_STORE_MAX * 0.1);
53
+ let i = 0;
54
+ for (const k of _plans.keys()) {
55
+ if (i++ >= drop) break;
56
+ _plans.delete(k);
57
+ }
58
+ }
59
+
60
+ function _hashParams(params) {
61
+ const canon = JSON.stringify(_canonicalize(params || {}));
62
+ return crypto.createHash('sha256').update(canon).digest('hex').slice(0, 24);
63
+ }
64
+
65
+ function _canonicalize(value) {
66
+ if (value === null || typeof value !== 'object') return value;
67
+ if (Array.isArray(value)) return value.map(_canonicalize);
68
+ const out = {};
69
+ for (const k of Object.keys(value).sort()) out[k] = _canonicalize(value[k]);
70
+ return out;
71
+ }
72
+
73
+ // ─── Public API ──────────────────────────────────────────────────────
74
+
75
+ /**
76
+ * Decide whether `actionName` requires dry-run. Site config may EXPAND
77
+ * the default destructive list (token-scope.DEFAULT_DESTRUCTIVE_VERBS)
78
+ * via `destructiveActions[]` and may SUPPRESS via `nonDestructiveActions[]`.
79
+ *
80
+ * Sites can also explicitly opt OUT (rare, usually only for read-only
81
+ * mirror/staging sandboxes) by setting `dryRunPolicy: "off"`.
82
+ * They can opt IN universally with `dryRunPolicy: "always"`.
83
+ */
84
+ function requiresDryRun(actionName, siteConfig = {}) {
85
+ const policy = String(siteConfig.dryRunPolicy || 'auto').toLowerCase();
86
+ if (policy === 'off') return false;
87
+ if (policy === 'always') return true;
88
+ // auto = use destructive-verb classification.
89
+ return isDestructiveAction(actionName, siteConfig);
90
+ }
91
+
92
+ /**
93
+ * Create a plan. Returns the plan envelope to be sent back to the agent.
94
+ *
95
+ * @param {object} ctx { sessionToken, siteId, actionName, params }
96
+ * @param {object} simulation { would_affect, side_effects, reversible, summary? }
97
+ * @param {object} opts { ttlMs }
98
+ */
99
+ function createPlan(ctx, simulation, opts = {}) {
100
+ const ttl = Math.min(Math.max(opts.ttlMs || DEFAULT_TTL_MS, 1_000), MAX_TTL_MS);
101
+ const plan_id = 'wabp_' + crypto.randomBytes(16).toString('hex');
102
+ const now = Date.now();
103
+ const params_hash = _hashParams(ctx.params);
104
+ const entry = {
105
+ plan_id,
106
+ session_fingerprint: _sessionFingerprint(ctx.sessionToken),
107
+ site_id: ctx.siteId,
108
+ action_name: ctx.actionName,
109
+ params_hash,
110
+ simulation: {
111
+ would_affect: simulation.would_affect || [],
112
+ side_effects: simulation.side_effects || [],
113
+ reversible: simulation.reversible !== false,
114
+ summary: simulation.summary || null,
115
+ },
116
+ created_at: now,
117
+ expires_at: now + ttl,
118
+ };
119
+ _plans.set(plan_id, entry);
120
+ _evictIfFull();
121
+ return {
122
+ dry_run: true,
123
+ plan_id,
124
+ expires_at: new Date(entry.expires_at).toISOString(),
125
+ simulated: entry.simulation,
126
+ };
127
+ }
128
+
129
+ /**
130
+ * Validate a plan against a real (dry_run=false) request.
131
+ *
132
+ * Returns { ok: true, plan } on success; otherwise
133
+ * { ok: false, code, message }.
134
+ */
135
+ function consumePlan(planId, ctx) {
136
+ if (!planId) return { ok: false, code: 'DRY_RUN_REQUIRED', message: 'destructive action requires a prior dry_run plan' };
137
+ const entry = _plans.get(planId);
138
+ if (!entry) return { ok: false, code: 'DRY_RUN_PLAN_NOT_FOUND', message: 'plan_id unknown or already consumed' };
139
+ const now = Date.now();
140
+ if (now > entry.expires_at) {
141
+ _plans.delete(planId);
142
+ return { ok: false, code: 'DRY_RUN_PLAN_EXPIRED', message: 'plan expired, please re-run dry_run' };
143
+ }
144
+ if (entry.session_fingerprint !== _sessionFingerprint(ctx.sessionToken)) {
145
+ return { ok: false, code: 'DRY_RUN_PLAN_MISMATCH', message: 'plan was issued to a different session' };
146
+ }
147
+ if (entry.site_id !== ctx.siteId) {
148
+ return { ok: false, code: 'DRY_RUN_PLAN_MISMATCH', message: 'plan was issued for a different site' };
149
+ }
150
+ if (entry.action_name !== ctx.actionName) {
151
+ return { ok: false, code: 'DRY_RUN_PLAN_MISMATCH', message: 'plan was issued for a different action' };
152
+ }
153
+ if (entry.params_hash !== _hashParams(ctx.params)) {
154
+ return { ok: false, code: 'DRY_RUN_PLAN_MISMATCH', message: 'parameters changed since plan was generated' };
155
+ }
156
+ // Single-use: consume.
157
+ _plans.delete(planId);
158
+ return { ok: true, plan: entry };
159
+ }
160
+
161
+ /** Test helper. */
162
+ function _resetForTests() {
163
+ _plans.clear();
164
+ }
165
+
166
+ function _sessionFingerprint(token) {
167
+ if (!token) return null;
168
+ return crypto.createHash('sha256').update(String(token)).digest('hex').slice(0, 16);
169
+ }
170
+
171
+ module.exports = {
172
+ requiresDryRun,
173
+ createPlan,
174
+ consumePlan,
175
+ // helpers exposed for tests
176
+ _resetForTests,
177
+ _hashParams,
178
+ DEFAULT_TTL_MS,
179
+ MAX_TTL_MS,
180
+ };
@@ -0,0 +1,147 @@
1
+ 'use strict';
2
+
3
+ /**
4
+ * WAB Safety Shield — IP rate-limiter for /human-gate/approve (SPEC §8.11)
5
+ *
6
+ * Module 1's per-challenge 5-attempt lockout is sufficient against a
7
+ * single attacker spamming one challenge_id. But it does NOT prevent an
8
+ * attacker from rotating across many challenge_ids (or guessing on
9
+ * leaked ones) at high rate. This sliding-window IP limiter caps the
10
+ * approval rate per-IP across all challenges.
11
+ *
12
+ * Defaults — tuned for human use:
13
+ * • 30 attempts per 10 minutes per IP (≈1 every 20s)
14
+ * • 5 approvals per 10 minutes per IP (success-only sub-cap)
15
+ *
16
+ * Pure in-memory; safe for single-process pm2 deployment we use today.
17
+ * For multi-process scale-out, swap the store for Redis ZSET (TODO).
18
+ */
19
+
20
+ const DEFAULT_ATTEMPT_WINDOW_MS = 10 * 60 * 1000;
21
+ const DEFAULT_ATTEMPT_LIMIT = 30;
22
+ const DEFAULT_SUCCESS_LIMIT = 5;
23
+ const STORE_MAX_IPS = 10_000;
24
+
25
+ const _attempts = new Map(); // ip -> [timestamps]
26
+ const _successes = new Map(); // ip -> [timestamps]
27
+
28
+ let _config = {
29
+ windowMs: DEFAULT_ATTEMPT_WINDOW_MS,
30
+ attemptLimit: DEFAULT_ATTEMPT_LIMIT,
31
+ successLimit: DEFAULT_SUCCESS_LIMIT,
32
+ };
33
+
34
+ function configure(opts = {}) {
35
+ const w = Number.isFinite(opts.windowMs) ? opts.windowMs : _config.windowMs;
36
+ const a = Number.isFinite(opts.attemptLimit) ? opts.attemptLimit : _config.attemptLimit;
37
+ const s = Number.isFinite(opts.successLimit) ? opts.successLimit : _config.successLimit;
38
+ _config = {
39
+ windowMs: Math.max(10, Math.min(60 * 60 * 1000, w)),
40
+ attemptLimit: Math.max(1, a),
41
+ successLimit: Math.max(1, s),
42
+ };
43
+ }
44
+
45
+ function _prune(map, ip, windowMs, now) {
46
+ const arr = map.get(ip);
47
+ if (!arr) return [];
48
+ const cutoff = now - windowMs;
49
+ const fresh = arr.filter((t) => t > cutoff);
50
+ if (fresh.length === 0) map.delete(ip);
51
+ else map.set(ip, fresh);
52
+ return fresh;
53
+ }
54
+
55
+ function _evictIfFull(map) {
56
+ if (map.size <= STORE_MAX_IPS) return;
57
+ const drop = Math.ceil(STORE_MAX_IPS * 0.1);
58
+ let i = 0;
59
+ for (const k of map.keys()) {
60
+ if (i++ >= drop) break;
61
+ map.delete(k);
62
+ }
63
+ }
64
+
65
+ /**
66
+ * Returns one of:
67
+ * { allowed: true, remaining_attempts, remaining_successes }
68
+ * { allowed: false, code: 'RATE_LIMIT_TOO_MANY_ATTEMPTS', retry_after_ms }
69
+ * { allowed: false, code: 'RATE_LIMIT_TOO_MANY_APPROVALS', retry_after_ms }
70
+ *
71
+ * Call BEFORE attempting humanGate.approveChallenge().
72
+ */
73
+ function checkBeforeAttempt(ip) {
74
+ if (!ip) return { allowed: true, remaining_attempts: _config.attemptLimit, remaining_successes: _config.successLimit };
75
+ const now = Date.now();
76
+ const attempts = _prune(_attempts, ip, _config.windowMs, now);
77
+ const successes = _prune(_successes, ip, _config.windowMs, now);
78
+
79
+ if (successes.length >= _config.successLimit) {
80
+ return {
81
+ allowed: false,
82
+ code: 'RATE_LIMIT_TOO_MANY_APPROVALS',
83
+ retry_after_ms: _config.windowMs - (now - successes[0]),
84
+ };
85
+ }
86
+ if (attempts.length >= _config.attemptLimit) {
87
+ return {
88
+ allowed: false,
89
+ code: 'RATE_LIMIT_TOO_MANY_ATTEMPTS',
90
+ retry_after_ms: _config.windowMs - (now - attempts[0]),
91
+ };
92
+ }
93
+ return {
94
+ allowed: true,
95
+ remaining_attempts: _config.attemptLimit - attempts.length,
96
+ remaining_successes: _config.successLimit - successes.length,
97
+ };
98
+ }
99
+
100
+ /**
101
+ * Record an attempt outcome AFTER calling approveChallenge.
102
+ * - Always records the attempt timestamp.
103
+ * - Additionally records a success timestamp when ok===true.
104
+ */
105
+ function recordAttempt(ip, ok) {
106
+ if (!ip) return;
107
+ const now = Date.now();
108
+ const arr = _attempts.get(ip) || [];
109
+ arr.push(now);
110
+ _attempts.set(ip, arr);
111
+ _evictIfFull(_attempts);
112
+ if (ok) {
113
+ const sarr = _successes.get(ip) || [];
114
+ sarr.push(now);
115
+ _successes.set(ip, sarr);
116
+ _evictIfFull(_successes);
117
+ }
118
+ }
119
+
120
+ function _resetForTests() {
121
+ _attempts.clear();
122
+ _successes.clear();
123
+ _config = {
124
+ windowMs: DEFAULT_ATTEMPT_WINDOW_MS,
125
+ attemptLimit: DEFAULT_ATTEMPT_LIMIT,
126
+ successLimit: DEFAULT_SUCCESS_LIMIT,
127
+ };
128
+ }
129
+
130
+ function _stats() {
131
+ return {
132
+ config: { ..._config },
133
+ ips_with_attempts: _attempts.size,
134
+ ips_with_successes: _successes.size,
135
+ };
136
+ }
137
+
138
+ module.exports = {
139
+ configure,
140
+ checkBeforeAttempt,
141
+ recordAttempt,
142
+ _resetForTests,
143
+ _stats,
144
+ DEFAULT_ATTEMPT_WINDOW_MS,
145
+ DEFAULT_ATTEMPT_LIMIT,
146
+ DEFAULT_SUCCESS_LIMIT,
147
+ };
@@ -0,0 +1,178 @@
1
+ 'use strict';
2
+
3
+ /**
4
+ * WAB Safety Shield — Human-Gate Transports (SPEC §8.11)
5
+ *
6
+ * Real-world delivery channels for the 6-digit confirmation code.
7
+ *
8
+ * Each transport is a pure async function:
9
+ * (challenge) => Promise<{ ok: boolean, channel: string, error?: string }>
10
+ *
11
+ * Where `challenge` is:
12
+ * {
13
+ * challenge_id, code, site_id, action_name, actor_id,
14
+ * expires_at, siteConfig
15
+ * }
16
+ *
17
+ * The `siteConfig.humanGate` object configures the transport. Available
18
+ * built-in transports:
19
+ *
20
+ * • null — no-op (default; tests + offline)
21
+ * • webhook — POST signed JSON to siteConfig.humanGate.webhook.url
22
+ * • email — minimal SMTP via nodemailer (lazy-required)
23
+ * • console — stderr log (development convenience)
24
+ *
25
+ * Custom transports can still be registered with humanGate.setTransport.
26
+ * Transports must NEVER log the plaintext code anywhere persistent.
27
+ */
28
+
29
+ const crypto = require('crypto');
30
+
31
+ // ────────────────────────────────────────────────────────────────────
32
+ // webhook transport
33
+ // ────────────────────────────────────────────────────────────────────
34
+
35
+ /**
36
+ * Sign the JSON body with HMAC-SHA256(secret, body) and POST it.
37
+ * Receivers verify with the X-WAB-Signature header.
38
+ *
39
+ * Required: siteConfig.humanGate.webhook.url
40
+ * Optional: siteConfig.humanGate.webhook.secret (HMAC key; recommended)
41
+ * siteConfig.humanGate.webhook.headers (extra static headers)
42
+ * siteConfig.humanGate.webhook.timeoutMs (default 5000)
43
+ */
44
+ async function webhookTransport(challenge) {
45
+ const cfg = challenge.siteConfig?.humanGate?.webhook || {};
46
+ if (!cfg.url || !/^https?:\/\//i.test(cfg.url)) {
47
+ return { ok: false, channel: 'webhook', error: 'missing_or_invalid_webhook_url' };
48
+ }
49
+ const fetchImpl = globalThis.fetch;
50
+ if (typeof fetchImpl !== 'function') {
51
+ return { ok: false, channel: 'webhook', error: 'no_fetch_available' };
52
+ }
53
+
54
+ const payload = {
55
+ type: 'wab.human_gate.challenge',
56
+ spec: '8.11',
57
+ challenge_id: challenge.challenge_id,
58
+ code: challenge.code,
59
+ site_id: challenge.site_id,
60
+ action_name: challenge.action_name,
61
+ actor_id: challenge.actor_id || null,
62
+ expires_at: challenge.expires_at,
63
+ issued_at: new Date().toISOString(),
64
+ };
65
+ const body = JSON.stringify(payload);
66
+ const headers = { 'Content-Type': 'application/json', ...(cfg.headers || {}) };
67
+ if (cfg.secret) {
68
+ const sig = crypto.createHmac('sha256', cfg.secret).update(body).digest('hex');
69
+ headers['X-WAB-Signature'] = `sha256=${sig}`;
70
+ }
71
+
72
+ const timeoutMs = Math.max(500, Math.min(30000, cfg.timeoutMs || 5000));
73
+ const ctrl = typeof AbortController === 'function' ? new AbortController() : null;
74
+ const timer = ctrl ? setTimeout(() => ctrl.abort(), timeoutMs) : null;
75
+ try {
76
+ const res = await fetchImpl(cfg.url, {
77
+ method: 'POST',
78
+ headers,
79
+ body,
80
+ signal: ctrl ? ctrl.signal : undefined,
81
+ });
82
+ if (!res.ok) {
83
+ return { ok: false, channel: 'webhook', error: `http_${res.status}` };
84
+ }
85
+ return { ok: true, channel: 'webhook' };
86
+ } catch (err) {
87
+ return { ok: false, channel: 'webhook', error: err.name === 'AbortError' ? 'timeout' : (err.message || 'network_error') };
88
+ } finally {
89
+ if (timer) clearTimeout(timer);
90
+ }
91
+ }
92
+
93
+ // ────────────────────────────────────────────────────────────────────
94
+ // email transport (lazy nodemailer)
95
+ // ────────────────────────────────────────────────────────────────────
96
+
97
+ /**
98
+ * Send the code via SMTP. Requires `nodemailer` to be installed.
99
+ *
100
+ * Required: siteConfig.humanGate.email.to
101
+ * Optional: siteConfig.humanGate.email.from (default: WAB_HUMAN_GATE_FROM env or 'noreply@wab.local')
102
+ * siteConfig.humanGate.email.smtp ({ host, port, secure, auth: { user, pass } })
103
+ *
104
+ * If smtp is omitted, falls back to env-based config:
105
+ * SMTP_HOST / SMTP_PORT / SMTP_SECURE / SMTP_USER / SMTP_PASS
106
+ */
107
+ async function emailTransport(challenge) {
108
+ const cfg = challenge.siteConfig?.humanGate?.email || {};
109
+ if (!cfg.to) return { ok: false, channel: 'email', error: 'missing_email_to' };
110
+
111
+ let nodemailer;
112
+ try {
113
+ nodemailer = require('nodemailer');
114
+ } catch {
115
+ return { ok: false, channel: 'email', error: 'nodemailer_not_installed' };
116
+ }
117
+
118
+ const smtp = cfg.smtp || {
119
+ host: process.env.SMTP_HOST,
120
+ port: Number(process.env.SMTP_PORT || 587),
121
+ secure: String(process.env.SMTP_SECURE || '').toLowerCase() === 'true',
122
+ auth: process.env.SMTP_USER ? {
123
+ user: process.env.SMTP_USER,
124
+ pass: process.env.SMTP_PASS,
125
+ } : undefined,
126
+ };
127
+ if (!smtp.host) return { ok: false, channel: 'email', error: 'no_smtp_host' };
128
+
129
+ try {
130
+ const transporter = nodemailer.createTransport(smtp);
131
+ const from = cfg.from || process.env.WAB_HUMAN_GATE_FROM || 'noreply@wab.local';
132
+ const subject = `[WAB] Approval needed: ${challenge.action_name}`;
133
+ const text =
134
+ `An AI agent is requesting a high-risk action on your site.\n\n` +
135
+ ` Site: ${challenge.site_id}\n` +
136
+ ` Action: ${challenge.action_name}\n` +
137
+ ` Actor: ${challenge.actor_id || '(unknown)'}\n` +
138
+ ` Expires: ${challenge.expires_at}\n\n` +
139
+ `Approval code: ${challenge.code}\n\n` +
140
+ `If you did NOT initiate this, do nothing — the request will expire.\n` +
141
+ `Do not share this code. SPEC: https://webagentbridge.com/docs/SPEC.md#811-out-of-band-human-gate\n`;
142
+ await transporter.sendMail({ from, to: cfg.to, subject, text });
143
+ return { ok: true, channel: 'email' };
144
+ } catch (err) {
145
+ return { ok: false, channel: 'email', error: err.message || 'smtp_error' };
146
+ }
147
+ }
148
+
149
+ // ────────────────────────────────────────────────────────────────────
150
+ // console transport (dev convenience)
151
+ // ────────────────────────────────────────────────────────────────────
152
+
153
+ async function consoleTransport(challenge) {
154
+ // Intentionally writes to stderr only; never to a log file or audit row.
155
+ process.stderr.write(
156
+ `[wab:human-gate] challenge=${challenge.challenge_id} ` +
157
+ `site=${challenge.site_id} action=${challenge.action_name} ` +
158
+ `code=${challenge.code} expires=${challenge.expires_at}\n`
159
+ );
160
+ return { ok: true, channel: 'console' };
161
+ }
162
+
163
+ // ────────────────────────────────────────────────────────────────────
164
+ // public surface — register all on a humanGate instance
165
+ // ────────────────────────────────────────────────────────────────────
166
+
167
+ function registerAll(humanGate) {
168
+ humanGate.setTransport('webhook', webhookTransport);
169
+ humanGate.setTransport('email', emailTransport);
170
+ humanGate.setTransport('console', consoleTransport);
171
+ }
172
+
173
+ module.exports = {
174
+ webhookTransport,
175
+ emailTransport,
176
+ consoleTransport,
177
+ registerAll,
178
+ };