web-agent-bridge 3.0.0 → 3.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +72 -21
- package/README.ar.md +1286 -1073
- package/README.md +1764 -1535
- package/bin/agent-runner.js +474 -474
- package/bin/cli.js +237 -138
- package/bin/wab.js +80 -80
- package/examples/bidi-agent.js +119 -119
- package/examples/cross-site-agent.js +91 -91
- package/examples/mcp-agent.js +94 -94
- package/examples/next-app-router/README.md +44 -44
- package/examples/puppeteer-agent.js +108 -108
- package/examples/saas-dashboard/README.md +55 -55
- package/examples/shopify-hydrogen/README.md +74 -74
- package/examples/vision-agent.js +171 -171
- package/examples/wordpress-elementor/README.md +77 -77
- package/package.json +17 -3
- package/public/.well-known/agent-tools.json +180 -180
- package/public/.well-known/ai-assets.json +59 -59
- package/public/.well-known/ai-plugin.json +28 -0
- package/public/.well-known/security.txt +8 -0
- package/public/agent-workspace.html +349 -347
- package/public/ai.html +198 -196
- package/public/api.html +413 -0
- package/public/browser.html +486 -484
- package/public/commander-dashboard.html +243 -243
- package/public/cookies.html +210 -208
- package/public/css/agent-workspace.css +1713 -1713
- package/public/css/premium.css +317 -317
- package/public/css/styles.css +1235 -1235
- package/public/dashboard.html +706 -704
- package/public/demo.html +1770 -1
- package/public/dns.html +507 -0
- package/public/docs.html +587 -585
- package/public/feed.xml +89 -89
- package/public/growth.html +463 -0
- package/public/index.html +341 -9
- package/public/integrations.html +556 -0
- package/public/js/agent-workspace.js +1740 -1740
- package/public/js/auth-nav.js +31 -31
- package/public/js/auth-redirect.js +12 -12
- package/public/js/cookie-consent.js +56 -56
- package/public/js/wab-demo-page.js +721 -721
- package/public/js/ws-client.js +74 -74
- package/public/llms-full.txt +360 -309
- package/public/llms.txt +125 -86
- package/public/login.html +85 -83
- package/public/mesh-dashboard.html +328 -328
- package/public/openapi.json +580 -580
- package/public/phone-shield.html +281 -0
- package/public/premium-dashboard.html +2489 -2487
- package/public/premium.html +793 -791
- package/public/privacy.html +297 -295
- package/public/register.html +105 -103
- package/public/robots.txt +87 -87
- package/public/script/wab-consent.d.ts +36 -36
- package/public/script/wab-consent.js +104 -104
- package/public/script/wab-schema.js +131 -131
- package/public/script/wab.d.ts +108 -108
- package/public/script/wab.min.js +580 -580
- package/public/security.txt +8 -0
- package/public/terms.html +256 -254
- package/script/ai-agent-bridge.js +1754 -1754
- package/sdk/README.md +99 -99
- package/sdk/agent-mesh.js +449 -449
- package/sdk/commander.js +262 -262
- package/sdk/index.d.ts +464 -464
- package/sdk/index.js +18 -1
- package/sdk/multi-agent.js +318 -318
- package/sdk/package.json +12 -1
- package/sdk/safety-shield.js +219 -0
- package/sdk/schema-discovery.js +83 -83
- package/server/adapters/index.js +520 -520
- package/server/config/plans.js +367 -367
- package/server/config/secrets.js +102 -102
- package/server/control-plane/index.js +301 -301
- package/server/data-plane/index.js +354 -354
- package/server/index.js +175 -19
- package/server/llm/index.js +404 -404
- package/server/middleware/adminAuth.js +35 -35
- package/server/middleware/auth.js +50 -50
- package/server/middleware/featureGate.js +88 -88
- package/server/middleware/rateLimits.js +100 -100
- package/server/middleware/sensitiveAction.js +157 -0
- package/server/migrations/001_add_analytics_indexes.sql +7 -7
- package/server/migrations/002_premium_features.sql +418 -418
- package/server/migrations/003_ads_integer_cents.sql +33 -33
- package/server/migrations/004_agent_os.sql +158 -158
- package/server/migrations/005_marketplace_metering.sql +126 -126
- package/server/models/adapters/index.js +33 -33
- package/server/models/adapters/mysql.js +183 -183
- package/server/models/adapters/postgresql.js +172 -172
- package/server/models/adapters/sqlite.js +7 -7
- package/server/models/db.js +681 -681
- package/server/observability/failure-analysis.js +337 -337
- package/server/observability/index.js +394 -394
- package/server/protocol/capabilities.js +223 -223
- package/server/protocol/index.js +243 -243
- package/server/protocol/schema.js +584 -584
- package/server/registry/certification.js +271 -271
- package/server/registry/index.js +326 -326
- package/server/routes/admin-premium.js +671 -671
- package/server/routes/admin.js +261 -261
- package/server/routes/ads.js +130 -130
- package/server/routes/agent-workspace.js +540 -378
- package/server/routes/api.js +150 -150
- package/server/routes/auth.js +71 -71
- package/server/routes/billing.js +45 -45
- package/server/routes/commander.js +316 -316
- package/server/routes/demo-showcase.js +332 -0
- package/server/routes/demo-store.js +154 -0
- package/server/routes/discovery.js +417 -406
- package/server/routes/gateway.js +173 -0
- package/server/routes/license.js +251 -240
- package/server/routes/mesh.js +469 -469
- package/server/routes/noscript.js +543 -543
- package/server/routes/premium-v2.js +686 -686
- package/server/routes/premium.js +724 -724
- package/server/routes/runtime.js +2148 -2147
- package/server/routes/sovereign.js +465 -385
- package/server/routes/universal.js +200 -177
- package/server/routes/wab-api.js +850 -491
- package/server/runtime/container-worker.js +111 -111
- package/server/runtime/container.js +448 -448
- package/server/runtime/distributed-worker.js +362 -362
- package/server/runtime/event-bus.js +210 -210
- package/server/runtime/index.js +253 -253
- package/server/runtime/queue.js +599 -599
- package/server/runtime/replay.js +666 -666
- package/server/runtime/sandbox.js +266 -266
- package/server/runtime/scheduler.js +534 -534
- package/server/runtime/session-engine.js +293 -293
- package/server/runtime/state-manager.js +188 -188
- package/server/security/cross-site-redactor.js +196 -0
- package/server/security/dry-run.js +180 -0
- package/server/security/human-gate-rate-limit.js +147 -0
- package/server/security/human-gate-transports.js +178 -0
- package/server/security/human-gate.js +281 -0
- package/server/security/index.js +368 -368
- package/server/security/intent-engine.js +245 -0
- package/server/security/reward-guard.js +171 -0
- package/server/security/rollback-store.js +239 -0
- package/server/security/token-scope.js +404 -0
- package/server/security/url-policy.js +139 -0
- package/server/services/agent-chat.js +506 -506
- package/server/services/agent-learning.js +601 -575
- package/server/services/agent-memory.js +625 -625
- package/server/services/agent-mesh.js +555 -539
- package/server/services/agent-symphony.js +717 -717
- package/server/services/agent-tasks.js +1807 -1807
- package/server/services/api-key-engine.js +292 -0
- package/server/services/cluster.js +894 -894
- package/server/services/commander.js +738 -738
- package/server/services/edge-compute.js +440 -440
- package/server/services/email.js +204 -204
- package/server/services/hosted-runtime.js +205 -205
- package/server/services/lfd.js +635 -616
- package/server/services/local-ai.js +389 -389
- package/server/services/marketplace.js +270 -270
- package/server/services/metering.js +182 -182
- package/server/services/modules/affiliate-intelligence.js +93 -0
- package/server/services/modules/agent-firewall.js +90 -0
- package/server/services/modules/bounty.js +89 -0
- package/server/services/modules/collective-bargaining.js +92 -0
- package/server/services/modules/dark-pattern.js +66 -0
- package/server/services/modules/gov-intelligence.js +45 -0
- package/server/services/modules/neural.js +55 -0
- package/server/services/modules/notary.js +49 -0
- package/server/services/modules/price-time-machine.js +86 -0
- package/server/services/modules/protocol.js +104 -0
- package/server/services/negotiation.js +439 -439
- package/server/services/plugins.js +771 -771
- package/server/services/premium.js +1 -1
- package/server/services/price-intelligence.js +566 -565
- package/server/services/price-shield.js +1137 -1137
- package/server/services/reputation.js +465 -465
- package/server/services/search-engine.js +357 -357
- package/server/services/security.js +513 -513
- package/server/services/self-healing.js +843 -843
- package/server/services/sovereign-shield.js +542 -0
- package/server/services/stripe.js +192 -192
- package/server/services/swarm.js +788 -788
- package/server/services/universal-scraper.js +662 -661
- package/server/services/verification.js +481 -481
- package/server/services/vision.js +1163 -1163
- package/server/utils/cache.js +125 -125
- package/server/utils/migrate.js +81 -81
- package/server/utils/safe-fetch.js +228 -0
- package/server/utils/secureFields.js +50 -50
- package/server/ws.js +161 -161
- package/templates/artisan-marketplace.yaml +104 -104
- package/templates/book-price-scout.yaml +98 -98
- package/templates/electronics-price-tracker.yaml +108 -108
- package/templates/flight-deal-hunter.yaml +113 -113
- package/templates/freelancer-direct.yaml +116 -116
- package/templates/grocery-price-compare.yaml +93 -93
- package/templates/hotel-direct-booking.yaml +113 -113
- package/templates/local-services.yaml +98 -98
- package/templates/olive-oil-tunisia.yaml +88 -88
- package/templates/organic-farm-fresh.yaml +101 -101
- package/templates/restaurant-direct.yaml +97 -97
- package/server/services/fairness-engine.js +0 -409
- package/server/services/fairness.js +0 -420
|
@@ -0,0 +1,180 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* WAB Safety Shield — Mandatory Dry-Run
|
|
5
|
+
*
|
|
6
|
+
* Implements WAB SPEC §8.10. For commands the site classifies as
|
|
7
|
+
* destructive (or which match the SPEC default destructive verb list,
|
|
8
|
+
* see token-scope.js), the Bridge MUST refuse `dry_run: false` until a
|
|
9
|
+
* preceding `dry_run: true` plan has been produced AND has not expired.
|
|
10
|
+
*
|
|
11
|
+
* Wire format:
|
|
12
|
+
* - Request: body.dry_run === true | false (default: undefined)
|
|
13
|
+
* body.plan_id (required when dry_run === false)
|
|
14
|
+
* - Response (dry_run=true):
|
|
15
|
+
* { type:'success', result:{ dry_run:true, plan_id, expires_at,
|
|
16
|
+
* simulated:{ would_affect:[...], side_effects:[...], reversible:bool }}}
|
|
17
|
+
*
|
|
18
|
+
* Plan expiry:
|
|
19
|
+
* - Plans are short-lived (default 5 min, max 60 min) so an attacker
|
|
20
|
+
* who steals a session cannot replay an old plan against a changed
|
|
21
|
+
* target.
|
|
22
|
+
* - Plans are bound to (sessionToken, siteId, actionName, paramsHash)
|
|
23
|
+
* — any drift invalidates them.
|
|
24
|
+
*
|
|
25
|
+
* Errors:
|
|
26
|
+
* DRY_RUN_REQUIRED — destructive action invoked without a plan
|
|
27
|
+
* DRY_RUN_PLAN_NOT_FOUND — plan_id supplied but unknown / expired
|
|
28
|
+
* DRY_RUN_PLAN_MISMATCH — plan exists but params/action drifted
|
|
29
|
+
* DRY_RUN_PLAN_EXPIRED — plan past TTL
|
|
30
|
+
*
|
|
31
|
+
* The simulator is a pluggable function passed by the caller — this
|
|
32
|
+
* module only owns the policy + plan-store. Sites/adapters provide the
|
|
33
|
+
* actual "what would this do" answer.
|
|
34
|
+
*/
|
|
35
|
+
|
|
36
|
+
const crypto = require('crypto');
|
|
37
|
+
const { isDestructiveAction } = require('./token-scope');
|
|
38
|
+
|
|
39
|
+
const DEFAULT_TTL_MS = 5 * 60 * 1000; // 5 min
|
|
40
|
+
const MAX_TTL_MS = 60 * 60 * 1000; // 60 min hard cap
|
|
41
|
+
const PLAN_STORE_MAX = 5000; // LRU bound
|
|
42
|
+
|
|
43
|
+
// ─── Plan store (in-memory, single-process) ──────────────────────────
|
|
44
|
+
// In a multi-process deployment this should be backed by Redis; the
|
|
45
|
+
// interface is intentionally minimal so swap-out is trivial.
|
|
46
|
+
|
|
47
|
+
const _plans = new Map(); // plan_id -> entry
|
|
48
|
+
|
|
49
|
+
function _evictIfFull() {
|
|
50
|
+
if (_plans.size <= PLAN_STORE_MAX) return;
|
|
51
|
+
// Evict ~10% of oldest entries.
|
|
52
|
+
const drop = Math.ceil(PLAN_STORE_MAX * 0.1);
|
|
53
|
+
let i = 0;
|
|
54
|
+
for (const k of _plans.keys()) {
|
|
55
|
+
if (i++ >= drop) break;
|
|
56
|
+
_plans.delete(k);
|
|
57
|
+
}
|
|
58
|
+
}
|
|
59
|
+
|
|
60
|
+
function _hashParams(params) {
|
|
61
|
+
const canon = JSON.stringify(_canonicalize(params || {}));
|
|
62
|
+
return crypto.createHash('sha256').update(canon).digest('hex').slice(0, 24);
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
function _canonicalize(value) {
|
|
66
|
+
if (value === null || typeof value !== 'object') return value;
|
|
67
|
+
if (Array.isArray(value)) return value.map(_canonicalize);
|
|
68
|
+
const out = {};
|
|
69
|
+
for (const k of Object.keys(value).sort()) out[k] = _canonicalize(value[k]);
|
|
70
|
+
return out;
|
|
71
|
+
}
|
|
72
|
+
|
|
73
|
+
// ─── Public API ──────────────────────────────────────────────────────
|
|
74
|
+
|
|
75
|
+
/**
|
|
76
|
+
* Decide whether `actionName` requires dry-run. Site config may EXPAND
|
|
77
|
+
* the default destructive list (token-scope.DEFAULT_DESTRUCTIVE_VERBS)
|
|
78
|
+
* via `destructiveActions[]` and may SUPPRESS via `nonDestructiveActions[]`.
|
|
79
|
+
*
|
|
80
|
+
* Sites can also explicitly opt OUT (rare, usually only for read-only
|
|
81
|
+
* mirror/staging sandboxes) by setting `dryRunPolicy: "off"`.
|
|
82
|
+
* They can opt IN universally with `dryRunPolicy: "always"`.
|
|
83
|
+
*/
|
|
84
|
+
function requiresDryRun(actionName, siteConfig = {}) {
|
|
85
|
+
const policy = String(siteConfig.dryRunPolicy || 'auto').toLowerCase();
|
|
86
|
+
if (policy === 'off') return false;
|
|
87
|
+
if (policy === 'always') return true;
|
|
88
|
+
// auto = use destructive-verb classification.
|
|
89
|
+
return isDestructiveAction(actionName, siteConfig);
|
|
90
|
+
}
|
|
91
|
+
|
|
92
|
+
/**
|
|
93
|
+
* Create a plan. Returns the plan envelope to be sent back to the agent.
|
|
94
|
+
*
|
|
95
|
+
* @param {object} ctx { sessionToken, siteId, actionName, params }
|
|
96
|
+
* @param {object} simulation { would_affect, side_effects, reversible, summary? }
|
|
97
|
+
* @param {object} opts { ttlMs }
|
|
98
|
+
*/
|
|
99
|
+
function createPlan(ctx, simulation, opts = {}) {
|
|
100
|
+
const ttl = Math.min(Math.max(opts.ttlMs || DEFAULT_TTL_MS, 1_000), MAX_TTL_MS);
|
|
101
|
+
const plan_id = 'wabp_' + crypto.randomBytes(16).toString('hex');
|
|
102
|
+
const now = Date.now();
|
|
103
|
+
const params_hash = _hashParams(ctx.params);
|
|
104
|
+
const entry = {
|
|
105
|
+
plan_id,
|
|
106
|
+
session_fingerprint: _sessionFingerprint(ctx.sessionToken),
|
|
107
|
+
site_id: ctx.siteId,
|
|
108
|
+
action_name: ctx.actionName,
|
|
109
|
+
params_hash,
|
|
110
|
+
simulation: {
|
|
111
|
+
would_affect: simulation.would_affect || [],
|
|
112
|
+
side_effects: simulation.side_effects || [],
|
|
113
|
+
reversible: simulation.reversible !== false,
|
|
114
|
+
summary: simulation.summary || null,
|
|
115
|
+
},
|
|
116
|
+
created_at: now,
|
|
117
|
+
expires_at: now + ttl,
|
|
118
|
+
};
|
|
119
|
+
_plans.set(plan_id, entry);
|
|
120
|
+
_evictIfFull();
|
|
121
|
+
return {
|
|
122
|
+
dry_run: true,
|
|
123
|
+
plan_id,
|
|
124
|
+
expires_at: new Date(entry.expires_at).toISOString(),
|
|
125
|
+
simulated: entry.simulation,
|
|
126
|
+
};
|
|
127
|
+
}
|
|
128
|
+
|
|
129
|
+
/**
|
|
130
|
+
* Validate a plan against a real (dry_run=false) request.
|
|
131
|
+
*
|
|
132
|
+
* Returns { ok: true, plan } on success; otherwise
|
|
133
|
+
* { ok: false, code, message }.
|
|
134
|
+
*/
|
|
135
|
+
function consumePlan(planId, ctx) {
|
|
136
|
+
if (!planId) return { ok: false, code: 'DRY_RUN_REQUIRED', message: 'destructive action requires a prior dry_run plan' };
|
|
137
|
+
const entry = _plans.get(planId);
|
|
138
|
+
if (!entry) return { ok: false, code: 'DRY_RUN_PLAN_NOT_FOUND', message: 'plan_id unknown or already consumed' };
|
|
139
|
+
const now = Date.now();
|
|
140
|
+
if (now > entry.expires_at) {
|
|
141
|
+
_plans.delete(planId);
|
|
142
|
+
return { ok: false, code: 'DRY_RUN_PLAN_EXPIRED', message: 'plan expired, please re-run dry_run' };
|
|
143
|
+
}
|
|
144
|
+
if (entry.session_fingerprint !== _sessionFingerprint(ctx.sessionToken)) {
|
|
145
|
+
return { ok: false, code: 'DRY_RUN_PLAN_MISMATCH', message: 'plan was issued to a different session' };
|
|
146
|
+
}
|
|
147
|
+
if (entry.site_id !== ctx.siteId) {
|
|
148
|
+
return { ok: false, code: 'DRY_RUN_PLAN_MISMATCH', message: 'plan was issued for a different site' };
|
|
149
|
+
}
|
|
150
|
+
if (entry.action_name !== ctx.actionName) {
|
|
151
|
+
return { ok: false, code: 'DRY_RUN_PLAN_MISMATCH', message: 'plan was issued for a different action' };
|
|
152
|
+
}
|
|
153
|
+
if (entry.params_hash !== _hashParams(ctx.params)) {
|
|
154
|
+
return { ok: false, code: 'DRY_RUN_PLAN_MISMATCH', message: 'parameters changed since plan was generated' };
|
|
155
|
+
}
|
|
156
|
+
// Single-use: consume.
|
|
157
|
+
_plans.delete(planId);
|
|
158
|
+
return { ok: true, plan: entry };
|
|
159
|
+
}
|
|
160
|
+
|
|
161
|
+
/** Test helper. */
|
|
162
|
+
function _resetForTests() {
|
|
163
|
+
_plans.clear();
|
|
164
|
+
}
|
|
165
|
+
|
|
166
|
+
function _sessionFingerprint(token) {
|
|
167
|
+
if (!token) return null;
|
|
168
|
+
return crypto.createHash('sha256').update(String(token)).digest('hex').slice(0, 16);
|
|
169
|
+
}
|
|
170
|
+
|
|
171
|
+
module.exports = {
|
|
172
|
+
requiresDryRun,
|
|
173
|
+
createPlan,
|
|
174
|
+
consumePlan,
|
|
175
|
+
// helpers exposed for tests
|
|
176
|
+
_resetForTests,
|
|
177
|
+
_hashParams,
|
|
178
|
+
DEFAULT_TTL_MS,
|
|
179
|
+
MAX_TTL_MS,
|
|
180
|
+
};
|
|
@@ -0,0 +1,147 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* WAB Safety Shield — IP rate-limiter for /human-gate/approve (SPEC §8.11)
|
|
5
|
+
*
|
|
6
|
+
* Module 1's per-challenge 5-attempt lockout is sufficient against a
|
|
7
|
+
* single attacker spamming one challenge_id. But it does NOT prevent an
|
|
8
|
+
* attacker from rotating across many challenge_ids (or guessing on
|
|
9
|
+
* leaked ones) at high rate. This sliding-window IP limiter caps the
|
|
10
|
+
* approval rate per-IP across all challenges.
|
|
11
|
+
*
|
|
12
|
+
* Defaults — tuned for human use:
|
|
13
|
+
* • 30 attempts per 10 minutes per IP (≈1 every 20s)
|
|
14
|
+
* • 5 approvals per 10 minutes per IP (success-only sub-cap)
|
|
15
|
+
*
|
|
16
|
+
* Pure in-memory; safe for single-process pm2 deployment we use today.
|
|
17
|
+
* For multi-process scale-out, swap the store for Redis ZSET (TODO).
|
|
18
|
+
*/
|
|
19
|
+
|
|
20
|
+
const DEFAULT_ATTEMPT_WINDOW_MS = 10 * 60 * 1000;
|
|
21
|
+
const DEFAULT_ATTEMPT_LIMIT = 30;
|
|
22
|
+
const DEFAULT_SUCCESS_LIMIT = 5;
|
|
23
|
+
const STORE_MAX_IPS = 10_000;
|
|
24
|
+
|
|
25
|
+
const _attempts = new Map(); // ip -> [timestamps]
|
|
26
|
+
const _successes = new Map(); // ip -> [timestamps]
|
|
27
|
+
|
|
28
|
+
let _config = {
|
|
29
|
+
windowMs: DEFAULT_ATTEMPT_WINDOW_MS,
|
|
30
|
+
attemptLimit: DEFAULT_ATTEMPT_LIMIT,
|
|
31
|
+
successLimit: DEFAULT_SUCCESS_LIMIT,
|
|
32
|
+
};
|
|
33
|
+
|
|
34
|
+
function configure(opts = {}) {
|
|
35
|
+
const w = Number.isFinite(opts.windowMs) ? opts.windowMs : _config.windowMs;
|
|
36
|
+
const a = Number.isFinite(opts.attemptLimit) ? opts.attemptLimit : _config.attemptLimit;
|
|
37
|
+
const s = Number.isFinite(opts.successLimit) ? opts.successLimit : _config.successLimit;
|
|
38
|
+
_config = {
|
|
39
|
+
windowMs: Math.max(10, Math.min(60 * 60 * 1000, w)),
|
|
40
|
+
attemptLimit: Math.max(1, a),
|
|
41
|
+
successLimit: Math.max(1, s),
|
|
42
|
+
};
|
|
43
|
+
}
|
|
44
|
+
|
|
45
|
+
function _prune(map, ip, windowMs, now) {
|
|
46
|
+
const arr = map.get(ip);
|
|
47
|
+
if (!arr) return [];
|
|
48
|
+
const cutoff = now - windowMs;
|
|
49
|
+
const fresh = arr.filter((t) => t > cutoff);
|
|
50
|
+
if (fresh.length === 0) map.delete(ip);
|
|
51
|
+
else map.set(ip, fresh);
|
|
52
|
+
return fresh;
|
|
53
|
+
}
|
|
54
|
+
|
|
55
|
+
function _evictIfFull(map) {
|
|
56
|
+
if (map.size <= STORE_MAX_IPS) return;
|
|
57
|
+
const drop = Math.ceil(STORE_MAX_IPS * 0.1);
|
|
58
|
+
let i = 0;
|
|
59
|
+
for (const k of map.keys()) {
|
|
60
|
+
if (i++ >= drop) break;
|
|
61
|
+
map.delete(k);
|
|
62
|
+
}
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
/**
|
|
66
|
+
* Returns one of:
|
|
67
|
+
* { allowed: true, remaining_attempts, remaining_successes }
|
|
68
|
+
* { allowed: false, code: 'RATE_LIMIT_TOO_MANY_ATTEMPTS', retry_after_ms }
|
|
69
|
+
* { allowed: false, code: 'RATE_LIMIT_TOO_MANY_APPROVALS', retry_after_ms }
|
|
70
|
+
*
|
|
71
|
+
* Call BEFORE attempting humanGate.approveChallenge().
|
|
72
|
+
*/
|
|
73
|
+
function checkBeforeAttempt(ip) {
|
|
74
|
+
if (!ip) return { allowed: true, remaining_attempts: _config.attemptLimit, remaining_successes: _config.successLimit };
|
|
75
|
+
const now = Date.now();
|
|
76
|
+
const attempts = _prune(_attempts, ip, _config.windowMs, now);
|
|
77
|
+
const successes = _prune(_successes, ip, _config.windowMs, now);
|
|
78
|
+
|
|
79
|
+
if (successes.length >= _config.successLimit) {
|
|
80
|
+
return {
|
|
81
|
+
allowed: false,
|
|
82
|
+
code: 'RATE_LIMIT_TOO_MANY_APPROVALS',
|
|
83
|
+
retry_after_ms: _config.windowMs - (now - successes[0]),
|
|
84
|
+
};
|
|
85
|
+
}
|
|
86
|
+
if (attempts.length >= _config.attemptLimit) {
|
|
87
|
+
return {
|
|
88
|
+
allowed: false,
|
|
89
|
+
code: 'RATE_LIMIT_TOO_MANY_ATTEMPTS',
|
|
90
|
+
retry_after_ms: _config.windowMs - (now - attempts[0]),
|
|
91
|
+
};
|
|
92
|
+
}
|
|
93
|
+
return {
|
|
94
|
+
allowed: true,
|
|
95
|
+
remaining_attempts: _config.attemptLimit - attempts.length,
|
|
96
|
+
remaining_successes: _config.successLimit - successes.length,
|
|
97
|
+
};
|
|
98
|
+
}
|
|
99
|
+
|
|
100
|
+
/**
|
|
101
|
+
* Record an attempt outcome AFTER calling approveChallenge.
|
|
102
|
+
* - Always records the attempt timestamp.
|
|
103
|
+
* - Additionally records a success timestamp when ok===true.
|
|
104
|
+
*/
|
|
105
|
+
function recordAttempt(ip, ok) {
|
|
106
|
+
if (!ip) return;
|
|
107
|
+
const now = Date.now();
|
|
108
|
+
const arr = _attempts.get(ip) || [];
|
|
109
|
+
arr.push(now);
|
|
110
|
+
_attempts.set(ip, arr);
|
|
111
|
+
_evictIfFull(_attempts);
|
|
112
|
+
if (ok) {
|
|
113
|
+
const sarr = _successes.get(ip) || [];
|
|
114
|
+
sarr.push(now);
|
|
115
|
+
_successes.set(ip, sarr);
|
|
116
|
+
_evictIfFull(_successes);
|
|
117
|
+
}
|
|
118
|
+
}
|
|
119
|
+
|
|
120
|
+
function _resetForTests() {
|
|
121
|
+
_attempts.clear();
|
|
122
|
+
_successes.clear();
|
|
123
|
+
_config = {
|
|
124
|
+
windowMs: DEFAULT_ATTEMPT_WINDOW_MS,
|
|
125
|
+
attemptLimit: DEFAULT_ATTEMPT_LIMIT,
|
|
126
|
+
successLimit: DEFAULT_SUCCESS_LIMIT,
|
|
127
|
+
};
|
|
128
|
+
}
|
|
129
|
+
|
|
130
|
+
function _stats() {
|
|
131
|
+
return {
|
|
132
|
+
config: { ..._config },
|
|
133
|
+
ips_with_attempts: _attempts.size,
|
|
134
|
+
ips_with_successes: _successes.size,
|
|
135
|
+
};
|
|
136
|
+
}
|
|
137
|
+
|
|
138
|
+
module.exports = {
|
|
139
|
+
configure,
|
|
140
|
+
checkBeforeAttempt,
|
|
141
|
+
recordAttempt,
|
|
142
|
+
_resetForTests,
|
|
143
|
+
_stats,
|
|
144
|
+
DEFAULT_ATTEMPT_WINDOW_MS,
|
|
145
|
+
DEFAULT_ATTEMPT_LIMIT,
|
|
146
|
+
DEFAULT_SUCCESS_LIMIT,
|
|
147
|
+
};
|
|
@@ -0,0 +1,178 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* WAB Safety Shield — Human-Gate Transports (SPEC §8.11)
|
|
5
|
+
*
|
|
6
|
+
* Real-world delivery channels for the 6-digit confirmation code.
|
|
7
|
+
*
|
|
8
|
+
* Each transport is a pure async function:
|
|
9
|
+
* (challenge) => Promise<{ ok: boolean, channel: string, error?: string }>
|
|
10
|
+
*
|
|
11
|
+
* Where `challenge` is:
|
|
12
|
+
* {
|
|
13
|
+
* challenge_id, code, site_id, action_name, actor_id,
|
|
14
|
+
* expires_at, siteConfig
|
|
15
|
+
* }
|
|
16
|
+
*
|
|
17
|
+
* The `siteConfig.humanGate` object configures the transport. Available
|
|
18
|
+
* built-in transports:
|
|
19
|
+
*
|
|
20
|
+
* • null — no-op (default; tests + offline)
|
|
21
|
+
* • webhook — POST signed JSON to siteConfig.humanGate.webhook.url
|
|
22
|
+
* • email — minimal SMTP via nodemailer (lazy-required)
|
|
23
|
+
* • console — stderr log (development convenience)
|
|
24
|
+
*
|
|
25
|
+
* Custom transports can still be registered with humanGate.setTransport.
|
|
26
|
+
* Transports must NEVER log the plaintext code anywhere persistent.
|
|
27
|
+
*/
|
|
28
|
+
|
|
29
|
+
const crypto = require('crypto');
|
|
30
|
+
|
|
31
|
+
// ────────────────────────────────────────────────────────────────────
|
|
32
|
+
// webhook transport
|
|
33
|
+
// ────────────────────────────────────────────────────────────────────
|
|
34
|
+
|
|
35
|
+
/**
|
|
36
|
+
* Sign the JSON body with HMAC-SHA256(secret, body) and POST it.
|
|
37
|
+
* Receivers verify with the X-WAB-Signature header.
|
|
38
|
+
*
|
|
39
|
+
* Required: siteConfig.humanGate.webhook.url
|
|
40
|
+
* Optional: siteConfig.humanGate.webhook.secret (HMAC key; recommended)
|
|
41
|
+
* siteConfig.humanGate.webhook.headers (extra static headers)
|
|
42
|
+
* siteConfig.humanGate.webhook.timeoutMs (default 5000)
|
|
43
|
+
*/
|
|
44
|
+
async function webhookTransport(challenge) {
|
|
45
|
+
const cfg = challenge.siteConfig?.humanGate?.webhook || {};
|
|
46
|
+
if (!cfg.url || !/^https?:\/\//i.test(cfg.url)) {
|
|
47
|
+
return { ok: false, channel: 'webhook', error: 'missing_or_invalid_webhook_url' };
|
|
48
|
+
}
|
|
49
|
+
const fetchImpl = globalThis.fetch;
|
|
50
|
+
if (typeof fetchImpl !== 'function') {
|
|
51
|
+
return { ok: false, channel: 'webhook', error: 'no_fetch_available' };
|
|
52
|
+
}
|
|
53
|
+
|
|
54
|
+
const payload = {
|
|
55
|
+
type: 'wab.human_gate.challenge',
|
|
56
|
+
spec: '8.11',
|
|
57
|
+
challenge_id: challenge.challenge_id,
|
|
58
|
+
code: challenge.code,
|
|
59
|
+
site_id: challenge.site_id,
|
|
60
|
+
action_name: challenge.action_name,
|
|
61
|
+
actor_id: challenge.actor_id || null,
|
|
62
|
+
expires_at: challenge.expires_at,
|
|
63
|
+
issued_at: new Date().toISOString(),
|
|
64
|
+
};
|
|
65
|
+
const body = JSON.stringify(payload);
|
|
66
|
+
const headers = { 'Content-Type': 'application/json', ...(cfg.headers || {}) };
|
|
67
|
+
if (cfg.secret) {
|
|
68
|
+
const sig = crypto.createHmac('sha256', cfg.secret).update(body).digest('hex');
|
|
69
|
+
headers['X-WAB-Signature'] = `sha256=${sig}`;
|
|
70
|
+
}
|
|
71
|
+
|
|
72
|
+
const timeoutMs = Math.max(500, Math.min(30000, cfg.timeoutMs || 5000));
|
|
73
|
+
const ctrl = typeof AbortController === 'function' ? new AbortController() : null;
|
|
74
|
+
const timer = ctrl ? setTimeout(() => ctrl.abort(), timeoutMs) : null;
|
|
75
|
+
try {
|
|
76
|
+
const res = await fetchImpl(cfg.url, {
|
|
77
|
+
method: 'POST',
|
|
78
|
+
headers,
|
|
79
|
+
body,
|
|
80
|
+
signal: ctrl ? ctrl.signal : undefined,
|
|
81
|
+
});
|
|
82
|
+
if (!res.ok) {
|
|
83
|
+
return { ok: false, channel: 'webhook', error: `http_${res.status}` };
|
|
84
|
+
}
|
|
85
|
+
return { ok: true, channel: 'webhook' };
|
|
86
|
+
} catch (err) {
|
|
87
|
+
return { ok: false, channel: 'webhook', error: err.name === 'AbortError' ? 'timeout' : (err.message || 'network_error') };
|
|
88
|
+
} finally {
|
|
89
|
+
if (timer) clearTimeout(timer);
|
|
90
|
+
}
|
|
91
|
+
}
|
|
92
|
+
|
|
93
|
+
// ────────────────────────────────────────────────────────────────────
|
|
94
|
+
// email transport (lazy nodemailer)
|
|
95
|
+
// ────────────────────────────────────────────────────────────────────
|
|
96
|
+
|
|
97
|
+
/**
|
|
98
|
+
* Send the code via SMTP. Requires `nodemailer` to be installed.
|
|
99
|
+
*
|
|
100
|
+
* Required: siteConfig.humanGate.email.to
|
|
101
|
+
* Optional: siteConfig.humanGate.email.from (default: WAB_HUMAN_GATE_FROM env or 'noreply@wab.local')
|
|
102
|
+
* siteConfig.humanGate.email.smtp ({ host, port, secure, auth: { user, pass } })
|
|
103
|
+
*
|
|
104
|
+
* If smtp is omitted, falls back to env-based config:
|
|
105
|
+
* SMTP_HOST / SMTP_PORT / SMTP_SECURE / SMTP_USER / SMTP_PASS
|
|
106
|
+
*/
|
|
107
|
+
async function emailTransport(challenge) {
|
|
108
|
+
const cfg = challenge.siteConfig?.humanGate?.email || {};
|
|
109
|
+
if (!cfg.to) return { ok: false, channel: 'email', error: 'missing_email_to' };
|
|
110
|
+
|
|
111
|
+
let nodemailer;
|
|
112
|
+
try {
|
|
113
|
+
nodemailer = require('nodemailer');
|
|
114
|
+
} catch {
|
|
115
|
+
return { ok: false, channel: 'email', error: 'nodemailer_not_installed' };
|
|
116
|
+
}
|
|
117
|
+
|
|
118
|
+
const smtp = cfg.smtp || {
|
|
119
|
+
host: process.env.SMTP_HOST,
|
|
120
|
+
port: Number(process.env.SMTP_PORT || 587),
|
|
121
|
+
secure: String(process.env.SMTP_SECURE || '').toLowerCase() === 'true',
|
|
122
|
+
auth: process.env.SMTP_USER ? {
|
|
123
|
+
user: process.env.SMTP_USER,
|
|
124
|
+
pass: process.env.SMTP_PASS,
|
|
125
|
+
} : undefined,
|
|
126
|
+
};
|
|
127
|
+
if (!smtp.host) return { ok: false, channel: 'email', error: 'no_smtp_host' };
|
|
128
|
+
|
|
129
|
+
try {
|
|
130
|
+
const transporter = nodemailer.createTransport(smtp);
|
|
131
|
+
const from = cfg.from || process.env.WAB_HUMAN_GATE_FROM || 'noreply@wab.local';
|
|
132
|
+
const subject = `[WAB] Approval needed: ${challenge.action_name}`;
|
|
133
|
+
const text =
|
|
134
|
+
`An AI agent is requesting a high-risk action on your site.\n\n` +
|
|
135
|
+
` Site: ${challenge.site_id}\n` +
|
|
136
|
+
` Action: ${challenge.action_name}\n` +
|
|
137
|
+
` Actor: ${challenge.actor_id || '(unknown)'}\n` +
|
|
138
|
+
` Expires: ${challenge.expires_at}\n\n` +
|
|
139
|
+
`Approval code: ${challenge.code}\n\n` +
|
|
140
|
+
`If you did NOT initiate this, do nothing — the request will expire.\n` +
|
|
141
|
+
`Do not share this code. SPEC: https://webagentbridge.com/docs/SPEC.md#811-out-of-band-human-gate\n`;
|
|
142
|
+
await transporter.sendMail({ from, to: cfg.to, subject, text });
|
|
143
|
+
return { ok: true, channel: 'email' };
|
|
144
|
+
} catch (err) {
|
|
145
|
+
return { ok: false, channel: 'email', error: err.message || 'smtp_error' };
|
|
146
|
+
}
|
|
147
|
+
}
|
|
148
|
+
|
|
149
|
+
// ────────────────────────────────────────────────────────────────────
|
|
150
|
+
// console transport (dev convenience)
|
|
151
|
+
// ────────────────────────────────────────────────────────────────────
|
|
152
|
+
|
|
153
|
+
async function consoleTransport(challenge) {
|
|
154
|
+
// Intentionally writes to stderr only; never to a log file or audit row.
|
|
155
|
+
process.stderr.write(
|
|
156
|
+
`[wab:human-gate] challenge=${challenge.challenge_id} ` +
|
|
157
|
+
`site=${challenge.site_id} action=${challenge.action_name} ` +
|
|
158
|
+
`code=${challenge.code} expires=${challenge.expires_at}\n`
|
|
159
|
+
);
|
|
160
|
+
return { ok: true, channel: 'console' };
|
|
161
|
+
}
|
|
162
|
+
|
|
163
|
+
// ────────────────────────────────────────────────────────────────────
|
|
164
|
+
// public surface — register all on a humanGate instance
|
|
165
|
+
// ────────────────────────────────────────────────────────────────────
|
|
166
|
+
|
|
167
|
+
function registerAll(humanGate) {
|
|
168
|
+
humanGate.setTransport('webhook', webhookTransport);
|
|
169
|
+
humanGate.setTransport('email', emailTransport);
|
|
170
|
+
humanGate.setTransport('console', consoleTransport);
|
|
171
|
+
}
|
|
172
|
+
|
|
173
|
+
module.exports = {
|
|
174
|
+
webhookTransport,
|
|
175
|
+
emailTransport,
|
|
176
|
+
consoleTransport,
|
|
177
|
+
registerAll,
|
|
178
|
+
};
|