web-agent-bridge 3.2.0 → 3.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (256) hide show
  1. package/LICENSE +84 -72
  2. package/README.ar.md +1304 -1152
  3. package/README.md +298 -1635
  4. package/bin/agent-runner.js +474 -474
  5. package/bin/cli.js +237 -138
  6. package/bin/wab-init.js +223 -0
  7. package/bin/wab.js +80 -80
  8. package/examples/azure-dns-wab.js +83 -0
  9. package/examples/bidi-agent.js +119 -119
  10. package/examples/cloudflare-wab-dns.js +121 -0
  11. package/examples/cpanel-wab-dns.js +114 -0
  12. package/examples/cross-site-agent.js +91 -91
  13. package/examples/dns-discovery-agent.js +166 -0
  14. package/examples/gcp-dns-wab.js +76 -0
  15. package/examples/governance-agent.js +169 -0
  16. package/examples/mcp-agent.js +94 -94
  17. package/examples/next-app-router/README.md +44 -44
  18. package/examples/plesk-wab-dns.js +103 -0
  19. package/examples/puppeteer-agent.js +108 -108
  20. package/examples/route53-wab-dns.js +144 -0
  21. package/examples/saas-dashboard/README.md +55 -55
  22. package/examples/safe-mode-agent.js +96 -0
  23. package/examples/shopify-hydrogen/README.md +74 -74
  24. package/examples/vision-agent.js +171 -171
  25. package/examples/wab-sign.js +74 -0
  26. package/examples/wab-verify.js +60 -0
  27. package/examples/wordpress-elementor/README.md +77 -77
  28. package/package.json +19 -6
  29. package/public/.well-known/agent-tools.json +180 -180
  30. package/public/.well-known/ai-assets.json +59 -59
  31. package/public/.well-known/security.txt +8 -0
  32. package/public/.well-known/wab.json +28 -0
  33. package/public/activate.html +368 -0
  34. package/public/adoption-metrics.html +188 -0
  35. package/public/agent-workspace.html +349 -349
  36. package/public/ai.html +198 -198
  37. package/public/api.html +413 -412
  38. package/public/azure-dns-integration.html +289 -0
  39. package/public/browser.html +486 -486
  40. package/public/cloudflare-integration.html +380 -0
  41. package/public/commander-dashboard.html +243 -243
  42. package/public/cookies.html +210 -210
  43. package/public/cpanel-integration.html +398 -0
  44. package/public/css/agent-workspace.css +1713 -1713
  45. package/public/css/premium.css +317 -317
  46. package/public/css/styles.css +1263 -1235
  47. package/public/dashboard.html +707 -706
  48. package/public/dns.html +436 -0
  49. package/public/docs.html +588 -587
  50. package/public/feed.xml +89 -89
  51. package/public/gcp-dns-integration.html +318 -0
  52. package/public/growth.html +465 -463
  53. package/public/index.html +1266 -982
  54. package/public/integrations.html +556 -0
  55. package/public/js/activate.js +145 -0
  56. package/public/js/agent-workspace.js +1740 -1740
  57. package/public/js/auth-nav.js +65 -31
  58. package/public/js/auth-redirect.js +12 -12
  59. package/public/js/cookie-consent.js +56 -56
  60. package/public/js/dns.js +438 -0
  61. package/public/js/wab-demo-page.js +721 -721
  62. package/public/js/ws-client.js +74 -74
  63. package/public/llms-full.txt +360 -360
  64. package/public/llms.txt +125 -125
  65. package/public/login.html +85 -85
  66. package/public/mesh-dashboard.html +328 -328
  67. package/public/openapi.json +669 -580
  68. package/public/phone-shield.html +281 -0
  69. package/public/plesk-integration.html +375 -0
  70. package/public/premium-dashboard.html +2489 -2489
  71. package/public/premium.html +793 -793
  72. package/public/privacy.html +297 -297
  73. package/public/provider-onboarding.html +172 -0
  74. package/public/provider-sandbox.html +134 -0
  75. package/public/providers.html +359 -0
  76. package/public/register.html +105 -105
  77. package/public/registrar-integrations.html +141 -0
  78. package/public/robots.txt +99 -87
  79. package/public/route53-integration.html +531 -0
  80. package/public/script/wab-consent.d.ts +36 -36
  81. package/public/script/wab-consent.js +104 -104
  82. package/public/script/wab-schema.js +131 -131
  83. package/public/script/wab.d.ts +108 -108
  84. package/public/script/wab.min.js +580 -580
  85. package/public/security.txt +8 -0
  86. package/public/shieldqr.html +231 -0
  87. package/public/sitemap.xml +6 -0
  88. package/public/terms.html +256 -256
  89. package/public/wab-trust.html +200 -0
  90. package/public/wab-vs-protocols.html +210 -0
  91. package/public/whitepaper.html +449 -0
  92. package/script/ai-agent-bridge.js +1754 -1754
  93. package/sdk/README.md +99 -99
  94. package/sdk/agent-mesh.js +449 -449
  95. package/sdk/auto-discovery.js +288 -0
  96. package/sdk/commander.js +262 -262
  97. package/sdk/governance.js +262 -0
  98. package/sdk/index.d.ts +464 -464
  99. package/sdk/index.js +25 -1
  100. package/sdk/multi-agent.js +318 -318
  101. package/sdk/package.json +2 -2
  102. package/sdk/safe-mode.js +221 -0
  103. package/sdk/safety-shield.js +219 -0
  104. package/sdk/schema-discovery.js +83 -83
  105. package/server/adapters/index.js +520 -520
  106. package/server/config/plans.js +367 -367
  107. package/server/config/secrets.js +102 -102
  108. package/server/control-plane/index.js +301 -301
  109. package/server/data-plane/index.js +354 -354
  110. package/server/index.js +670 -427
  111. package/server/llm/index.js +404 -404
  112. package/server/middleware/adminAuth.js +35 -35
  113. package/server/middleware/auth.js +50 -50
  114. package/server/middleware/featureGate.js +88 -88
  115. package/server/middleware/rateLimits.js +100 -100
  116. package/server/middleware/sensitiveAction.js +157 -0
  117. package/server/migrations/001_add_analytics_indexes.sql +7 -7
  118. package/server/migrations/002_premium_features.sql +418 -418
  119. package/server/migrations/003_ads_integer_cents.sql +33 -33
  120. package/server/migrations/004_agent_os.sql +158 -158
  121. package/server/migrations/005_marketplace_metering.sql +126 -126
  122. package/server/migrations/007_governance.sql +106 -0
  123. package/server/migrations/008_plans.sql +144 -0
  124. package/server/migrations/009_shieldqr.sql +30 -0
  125. package/server/migrations/010_extended_trust.sql +33 -0
  126. package/server/models/adapters/index.js +33 -33
  127. package/server/models/adapters/mysql.js +183 -183
  128. package/server/models/adapters/postgresql.js +172 -172
  129. package/server/models/adapters/sqlite.js +7 -7
  130. package/server/models/db.js +740 -681
  131. package/server/observability/failure-analysis.js +337 -337
  132. package/server/observability/index.js +394 -394
  133. package/server/protocol/capabilities.js +223 -223
  134. package/server/protocol/index.js +243 -243
  135. package/server/protocol/schema.js +584 -584
  136. package/server/registry/certification.js +271 -271
  137. package/server/registry/index.js +326 -326
  138. package/server/routes/admin-plans.js +76 -0
  139. package/server/routes/admin-premium.js +673 -671
  140. package/server/routes/admin-shieldqr.js +90 -0
  141. package/server/routes/admin-trust-monitor.js +83 -0
  142. package/server/routes/admin.js +549 -261
  143. package/server/routes/ads.js +130 -130
  144. package/server/routes/agent-workspace.js +540 -540
  145. package/server/routes/api.js +150 -150
  146. package/server/routes/auth.js +71 -71
  147. package/server/routes/billing.js +57 -45
  148. package/server/routes/commander.js +316 -316
  149. package/server/routes/demo-showcase.js +332 -332
  150. package/server/routes/demo-store.js +154 -0
  151. package/server/routes/discovery.js +2348 -417
  152. package/server/routes/gateway.js +173 -157
  153. package/server/routes/governance.js +208 -0
  154. package/server/routes/license.js +251 -240
  155. package/server/routes/mesh.js +469 -469
  156. package/server/routes/noscript.js +543 -543
  157. package/server/routes/plans.js +33 -0
  158. package/server/routes/premium-v2.js +686 -686
  159. package/server/routes/premium.js +724 -724
  160. package/server/routes/providers.js +650 -0
  161. package/server/routes/runtime.js +2148 -2147
  162. package/server/routes/shieldqr.js +88 -0
  163. package/server/routes/sovereign.js +465 -385
  164. package/server/routes/universal.js +200 -185
  165. package/server/routes/wab-api.js +850 -501
  166. package/server/runtime/container-worker.js +111 -111
  167. package/server/runtime/container.js +448 -448
  168. package/server/runtime/distributed-worker.js +362 -362
  169. package/server/runtime/event-bus.js +210 -210
  170. package/server/runtime/index.js +253 -253
  171. package/server/runtime/queue.js +599 -599
  172. package/server/runtime/replay.js +666 -666
  173. package/server/runtime/sandbox.js +266 -266
  174. package/server/runtime/scheduler.js +534 -534
  175. package/server/runtime/session-engine.js +293 -293
  176. package/server/runtime/state-manager.js +188 -188
  177. package/server/security/cross-site-redactor.js +196 -0
  178. package/server/security/dry-run.js +180 -0
  179. package/server/security/human-gate-rate-limit.js +147 -0
  180. package/server/security/human-gate-transports.js +178 -0
  181. package/server/security/human-gate.js +281 -0
  182. package/server/security/index.js +368 -368
  183. package/server/security/intent-engine.js +245 -0
  184. package/server/security/reward-guard.js +171 -0
  185. package/server/security/rollback-store.js +239 -0
  186. package/server/security/token-scope.js +404 -0
  187. package/server/security/url-policy.js +139 -0
  188. package/server/services/agent-chat.js +506 -506
  189. package/server/services/agent-learning.js +601 -575
  190. package/server/services/agent-memory.js +625 -625
  191. package/server/services/agent-mesh.js +555 -539
  192. package/server/services/agent-symphony.js +717 -717
  193. package/server/services/agent-tasks.js +1807 -1807
  194. package/server/services/api-key-engine.js +292 -261
  195. package/server/services/cluster.js +894 -894
  196. package/server/services/commander.js +738 -738
  197. package/server/services/edge-compute.js +440 -440
  198. package/server/services/email.js +233 -204
  199. package/server/services/governance.js +466 -0
  200. package/server/services/hosted-runtime.js +205 -205
  201. package/server/services/lfd.js +635 -635
  202. package/server/services/local-ai.js +389 -389
  203. package/server/services/marketplace.js +270 -270
  204. package/server/services/metering.js +182 -182
  205. package/server/services/modules/affiliate-intelligence.js +93 -93
  206. package/server/services/modules/agent-firewall.js +90 -90
  207. package/server/services/modules/bounty.js +89 -89
  208. package/server/services/modules/collective-bargaining.js +92 -92
  209. package/server/services/modules/dark-pattern.js +66 -66
  210. package/server/services/modules/gov-intelligence.js +45 -45
  211. package/server/services/modules/neural.js +55 -55
  212. package/server/services/modules/notary.js +49 -49
  213. package/server/services/modules/price-time-machine.js +86 -86
  214. package/server/services/modules/protocol.js +104 -104
  215. package/server/services/negotiation.js +439 -439
  216. package/server/services/plans.js +214 -0
  217. package/server/services/plugins.js +771 -771
  218. package/server/services/premium.js +1 -1
  219. package/server/services/price-intelligence.js +566 -566
  220. package/server/services/price-shield.js +1137 -1137
  221. package/server/services/provider-clients.js +740 -0
  222. package/server/services/reputation.js +465 -465
  223. package/server/services/search-engine.js +357 -357
  224. package/server/services/security.js +513 -513
  225. package/server/services/self-healing.js +843 -843
  226. package/server/services/shieldqr.js +322 -0
  227. package/server/services/sovereign-shield.js +542 -0
  228. package/server/services/ssl-inspector.js +42 -0
  229. package/server/services/ssl-monitor.js +167 -0
  230. package/server/services/stripe.js +205 -192
  231. package/server/services/swarm.js +788 -788
  232. package/server/services/universal-scraper.js +662 -661
  233. package/server/services/verification.js +481 -481
  234. package/server/services/vision.js +1163 -1163
  235. package/server/services/wab-crypto.js +178 -0
  236. package/server/utils/cache.js +125 -125
  237. package/server/utils/migrate.js +81 -81
  238. package/server/utils/safe-fetch.js +228 -0
  239. package/server/utils/secureFields.js +50 -50
  240. package/server/ws.js +161 -161
  241. package/templates/artisan-marketplace.yaml +104 -104
  242. package/templates/book-price-scout.yaml +98 -98
  243. package/templates/electronics-price-tracker.yaml +108 -108
  244. package/templates/flight-deal-hunter.yaml +113 -113
  245. package/templates/freelancer-direct.yaml +116 -116
  246. package/templates/grocery-price-compare.yaml +93 -93
  247. package/templates/hotel-direct-booking.yaml +113 -113
  248. package/templates/local-services.yaml +98 -98
  249. package/templates/olive-oil-tunisia.yaml +88 -88
  250. package/templates/organic-farm-fresh.yaml +101 -101
  251. package/templates/restaurant-direct.yaml +97 -97
  252. package/public/score.html +0 -263
  253. package/server/migrations/006_growth_suite.sql +0 -138
  254. package/server/routes/growth.js +0 -962
  255. package/server/services/fairness-engine.js +0 -409
  256. package/server/services/fairness.js +0 -420
@@ -1,513 +1,513 @@
1
- /**
2
- * WAB Security Layer — Command Signing, Audit Logging, and Agent Identity
3
- *
4
- * Implements:
5
- * - HMAC-SHA256 command signatures for non-repudiation
6
- * - Immutable audit log with tamper-evident chaining
7
- * - Agent identity verification (key pair registration)
8
- * - Capability-based tokens for fine-grained access control
9
- * - Timing-safe comparisons for secret validation
10
- */
11
-
12
- const crypto = require('crypto');
13
- const { db } = require('../models/db');
14
-
15
- // ─── Schema ──────────────────────────────────────────────────────────
16
-
17
- db.exec(`
18
- CREATE TABLE IF NOT EXISTS security_audit_log (
19
- id TEXT PRIMARY KEY,
20
- chain_hash TEXT NOT NULL,
21
- prev_hash TEXT,
22
- timestamp TEXT NOT NULL DEFAULT (datetime('now')),
23
- actor_type TEXT NOT NULL CHECK(actor_type IN ('agent','user','admin','system','plugin')),
24
- actor_id TEXT,
25
- action TEXT NOT NULL,
26
- resource TEXT,
27
- resource_id TEXT,
28
- ip_hash TEXT,
29
- signature TEXT,
30
- outcome TEXT DEFAULT 'success' CHECK(outcome IN ('success','denied','error','blocked')),
31
- details TEXT DEFAULT '{}',
32
- severity TEXT DEFAULT 'info' CHECK(severity IN ('info','warning','critical'))
33
- );
34
-
35
- CREATE TABLE IF NOT EXISTS registered_agents (
36
- id TEXT PRIMARY KEY,
37
- site_id TEXT NOT NULL,
38
- agent_name TEXT NOT NULL,
39
- public_key TEXT NOT NULL,
40
- key_algorithm TEXT DEFAULT 'hmac-sha256',
41
- capabilities TEXT DEFAULT '["read"]',
42
- status TEXT DEFAULT 'active' CHECK(status IN ('active','suspended','revoked')),
43
- max_rate INTEGER DEFAULT 60,
44
- ip_allowlist TEXT DEFAULT '[]',
45
- total_commands INTEGER DEFAULT 0,
46
- last_command TEXT,
47
- created_at TEXT DEFAULT (datetime('now')),
48
- revoked_at TEXT,
49
- FOREIGN KEY (site_id) REFERENCES sites(id) ON DELETE CASCADE,
50
- UNIQUE(site_id, agent_name)
51
- );
52
-
53
- CREATE TABLE IF NOT EXISTS capability_tokens (
54
- token_hash TEXT PRIMARY KEY,
55
- agent_id TEXT NOT NULL,
56
- site_id TEXT NOT NULL,
57
- capabilities TEXT NOT NULL DEFAULT '["read"]',
58
- allowed_actions TEXT DEFAULT '["*"]',
59
- selector_scope TEXT DEFAULT '[]',
60
- expires_at TEXT NOT NULL,
61
- revoked INTEGER DEFAULT 0,
62
- created_at TEXT DEFAULT (datetime('now')),
63
- FOREIGN KEY (agent_id) REFERENCES registered_agents(id) ON DELETE CASCADE,
64
- FOREIGN KEY (site_id) REFERENCES sites(id) ON DELETE CASCADE
65
- );
66
-
67
- CREATE TABLE IF NOT EXISTS revoked_tokens (
68
- token_hash TEXT PRIMARY KEY,
69
- revoked_at TEXT DEFAULT (datetime('now')),
70
- reason TEXT
71
- );
72
-
73
- CREATE INDEX IF NOT EXISTS idx_audit_timestamp ON security_audit_log(timestamp);
74
- CREATE INDEX IF NOT EXISTS idx_audit_actor ON security_audit_log(actor_type, actor_id);
75
- CREATE INDEX IF NOT EXISTS idx_audit_action ON security_audit_log(action);
76
- CREATE INDEX IF NOT EXISTS idx_audit_severity ON security_audit_log(severity);
77
- CREATE INDEX IF NOT EXISTS idx_agents_site ON registered_agents(site_id);
78
- CREATE INDEX IF NOT EXISTS idx_cap_tokens_agent ON capability_tokens(agent_id);
79
- CREATE INDEX IF NOT EXISTS idx_cap_tokens_site ON capability_tokens(site_id);
80
- CREATE INDEX IF NOT EXISTS idx_revoked_tokens ON revoked_tokens(token_hash);
81
- `);
82
-
83
- // ─── Prepared Statements ─────────────────────────────────────────────
84
-
85
- const stmts = {
86
- insertAudit: db.prepare(`INSERT INTO security_audit_log
87
- (id, chain_hash, prev_hash, timestamp, actor_type, actor_id, action, resource, resource_id, ip_hash, signature, outcome, details, severity)
88
- VALUES (?, ?, ?, datetime('now'), ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)`),
89
- getLastAudit: db.prepare(`SELECT chain_hash FROM security_audit_log ORDER BY rowid DESC LIMIT 1`),
90
- getAuditRange: db.prepare(`SELECT * FROM security_audit_log WHERE timestamp >= ? AND timestamp <= ? ORDER BY rowid`),
91
- getAuditByActor: db.prepare(`SELECT * FROM security_audit_log WHERE actor_type = ? AND actor_id = ? ORDER BY rowid DESC LIMIT ?`),
92
- getAuditBySeverity: db.prepare(`SELECT * FROM security_audit_log WHERE severity = ? ORDER BY rowid DESC LIMIT ?`),
93
-
94
- insertAgent: db.prepare(`INSERT INTO registered_agents
95
- (id, site_id, agent_name, public_key, key_algorithm, capabilities, max_rate, ip_allowlist)
96
- VALUES (?, ?, ?, ?, ?, ?, ?, ?)`),
97
- getAgent: db.prepare(`SELECT * FROM registered_agents WHERE id = ?`),
98
- getAgentByKey: db.prepare(`SELECT * FROM registered_agents WHERE site_id = ? AND public_key = ? AND status = 'active'`),
99
- getAgentByName: db.prepare(`SELECT * FROM registered_agents WHERE site_id = ? AND agent_name = ? AND status = 'active'`),
100
- getAgentsBySite: db.prepare(`SELECT * FROM registered_agents WHERE site_id = ? ORDER BY created_at DESC`),
101
- updateAgentStats: db.prepare(`UPDATE registered_agents SET total_commands = total_commands + 1, last_command = datetime('now') WHERE id = ?`),
102
- revokeAgent: db.prepare(`UPDATE registered_agents SET status = 'revoked', revoked_at = datetime('now') WHERE id = ?`),
103
- suspendAgent: db.prepare(`UPDATE registered_agents SET status = 'suspended' WHERE id = ?`),
104
-
105
- insertCapToken: db.prepare(`INSERT INTO capability_tokens
106
- (token_hash, agent_id, site_id, capabilities, allowed_actions, selector_scope, expires_at)
107
- VALUES (?, ?, ?, ?, ?, ?, ?)`),
108
- getCapToken: db.prepare(`SELECT ct.*, ra.status as agent_status, ra.public_key
109
- FROM capability_tokens ct
110
- JOIN registered_agents ra ON ct.agent_id = ra.id
111
- WHERE ct.token_hash = ? AND ct.revoked = 0
112
- AND ct.expires_at > datetime('now')
113
- AND ra.status = 'active'`),
114
- revokeCapToken: db.prepare(`UPDATE capability_tokens SET revoked = 1 WHERE token_hash = ?`),
115
-
116
- insertRevokedToken: db.prepare(`INSERT OR IGNORE INTO revoked_tokens (token_hash, reason) VALUES (?, ?)`),
117
- isTokenRevoked: db.prepare(`SELECT 1 FROM revoked_tokens WHERE token_hash = ? LIMIT 1`),
118
- };
119
-
120
- // ─── Audit Logging (Tamper-Evident Chain) ────────────────────────────
121
-
122
- let _lastHash = null;
123
-
124
- function _getLastHash() {
125
- if (_lastHash) return _lastHash;
126
- const row = stmts.getLastAudit.get();
127
- return row ? row.chain_hash : '0'.repeat(64);
128
- }
129
-
130
- /**
131
- * Log a security-critical event with hash chaining for tamper detection.
132
- */
133
- function auditLog(entry) {
134
- const id = crypto.randomUUID();
135
- const prevHash = _getLastHash();
136
- const payload = `${prevHash}|${entry.actorType}|${entry.actorId || ''}|${entry.action}|${entry.resource || ''}|${Date.now()}`;
137
- const chainHash = crypto.createHash('sha256').update(payload).digest('hex');
138
- _lastHash = chainHash;
139
-
140
- const ipHash = entry.ip ? crypto.createHash('sha256').update(entry.ip).digest('hex').slice(0, 16) : null;
141
-
142
- stmts.insertAudit.run(
143
- id, chainHash, prevHash,
144
- entry.actorType || 'system',
145
- entry.actorId || null,
146
- entry.action,
147
- entry.resource || null,
148
- entry.resourceId || null,
149
- ipHash,
150
- entry.signature || null,
151
- entry.outcome || 'success',
152
- JSON.stringify(entry.details || {}),
153
- entry.severity || 'info'
154
- );
155
-
156
- return { id, chainHash };
157
- }
158
-
159
- /**
160
- * Verify audit chain integrity — detect tampering.
161
- */
162
- function verifyAuditChain(startDate, endDate) {
163
- const logs = stmts.getAuditRange.all(startDate, endDate);
164
- if (logs.length === 0) return { valid: true, checked: 0 };
165
-
166
- let valid = true;
167
- let broken = null;
168
-
169
- for (let i = 1; i < logs.length; i++) {
170
- if (logs[i].prev_hash !== logs[i - 1].chain_hash) {
171
- valid = false;
172
- broken = { index: i, id: logs[i].id };
173
- break;
174
- }
175
- }
176
-
177
- return { valid, checked: logs.length, broken };
178
- }
179
-
180
- // ─── Command Signing ─────────────────────────────────────────────────
181
-
182
- /**
183
- * Sign a command payload with HMAC-SHA256.
184
- * @param {string} secretKey - Agent's secret key
185
- * @param {object} payload - { action, params, timestamp, nonce }
186
- * @returns {string} HMAC signature
187
- */
188
- function signCommand(secretKey, payload) {
189
- const canonical = JSON.stringify({
190
- action: payload.action,
191
- params: payload.params || {},
192
- timestamp: payload.timestamp,
193
- nonce: payload.nonce,
194
- });
195
- return crypto.createHmac('sha256', secretKey).update(canonical).digest('hex');
196
- }
197
-
198
- /**
199
- * Verify a command signature with timing-safe comparison.
200
- * Also validates timestamp freshness (< 5 minutes) and nonce uniqueness.
201
- */
202
- const _usedNonces = new Map();
203
- const NONCE_TTL = 5 * 60 * 1000;
204
-
205
- // Purge old nonces every 5 minutes
206
- setInterval(() => {
207
- const cutoff = Date.now() - NONCE_TTL;
208
- for (const [nonce, ts] of _usedNonces) {
209
- if (ts < cutoff) _usedNonces.delete(nonce);
210
- }
211
- }, NONCE_TTL);
212
-
213
- function verifyCommandSignature(publicKey, payload, signature) {
214
- // Check timestamp freshness (±5 minutes)
215
- const ts = payload.timestamp;
216
- if (!ts || Math.abs(Date.now() - ts) > NONCE_TTL) {
217
- return { valid: false, reason: 'timestamp_expired' };
218
- }
219
-
220
- // Check nonce uniqueness (replay protection)
221
- if (!payload.nonce) {
222
- return { valid: false, reason: 'nonce_required' };
223
- }
224
- if (_usedNonces.has(payload.nonce)) {
225
- return { valid: false, reason: 'nonce_reused' };
226
- }
227
-
228
- // Verify HMAC
229
- const expected = signCommand(publicKey, payload);
230
- const sigBuf = Buffer.from(signature, 'hex');
231
- const expBuf = Buffer.from(expected, 'hex');
232
-
233
- if (sigBuf.length !== expBuf.length) {
234
- return { valid: false, reason: 'invalid_signature' };
235
- }
236
-
237
- if (!crypto.timingSafeEqual(sigBuf, expBuf)) {
238
- return { valid: false, reason: 'invalid_signature' };
239
- }
240
-
241
- // Signature valid — record nonce
242
- _usedNonces.set(payload.nonce, Date.now());
243
- return { valid: true };
244
- }
245
-
246
- // ─── Agent Identity ──────────────────────────────────────────────────
247
-
248
- /**
249
- * Register a new agent with a cryptographic key.
250
- * Returns { agentId, secretKey } — the secret must be saved by the caller.
251
- */
252
- function registerAgent(siteId, agentName, options = {}) {
253
- const id = crypto.randomUUID();
254
- const secretKey = crypto.randomBytes(32).toString('hex');
255
- const publicKeyHash = crypto.createHash('sha256').update(secretKey).digest('hex');
256
-
257
- const capabilities = options.capabilities || ['read'];
258
- const validCaps = ['read', 'click', 'fill', 'scroll', 'navigate', 'execute', 'extract', 'api'];
259
- const filtered = capabilities.filter(c => validCaps.includes(c));
260
-
261
- stmts.insertAgent.run(
262
- id, siteId, agentName, publicKeyHash,
263
- 'hmac-sha256',
264
- JSON.stringify(filtered),
265
- options.maxRate || 60,
266
- JSON.stringify(options.ipAllowlist || [])
267
- );
268
-
269
- auditLog({
270
- actorType: 'system',
271
- action: 'agent_registered',
272
- resource: 'agent',
273
- resourceId: id,
274
- details: { agentName, siteId, capabilities: filtered },
275
- });
276
-
277
- return { agentId: id, secretKey };
278
- }
279
-
280
- /**
281
- * Authenticate an agent with its secret key.
282
- * Uses timing-safe comparison against stored public key hash.
283
- */
284
- function authenticateAgent(siteId, secretKey) {
285
- const publicKeyHash = crypto.createHash('sha256').update(secretKey).digest('hex');
286
- const agent = stmts.getAgentByKey.get(siteId, publicKeyHash);
287
-
288
- if (!agent) return null;
289
-
290
- stmts.updateAgentStats.run(agent.id);
291
- return {
292
- agentId: agent.id,
293
- agentName: agent.agent_name,
294
- capabilities: JSON.parse(agent.capabilities || '["read"]'),
295
- maxRate: agent.max_rate,
296
- };
297
- }
298
-
299
- // ─── Capability Tokens ───────────────────────────────────────────────
300
-
301
- /**
302
- * Issue a capability token with restricted scope.
303
- * @param {string} agentId
304
- * @param {string} siteId
305
- * @param {object} scope - { capabilities, allowedActions, selectorScope, ttlSeconds }
306
- */
307
- function issueCapabilityToken(agentId, siteId, scope = {}) {
308
- const rawToken = crypto.randomBytes(32).toString('hex');
309
- const tokenHash = crypto.createHash('sha256').update(rawToken).digest('hex');
310
- const ttl = Math.min(scope.ttlSeconds || 3600, 86400); // max 24h
311
- const expiresAt = new Date(Date.now() + ttl * 1000).toISOString();
312
-
313
- stmts.insertCapToken.run(
314
- tokenHash, agentId, siteId,
315
- JSON.stringify(scope.capabilities || ['read']),
316
- JSON.stringify(scope.allowedActions || ['*']),
317
- JSON.stringify(scope.selectorScope || []),
318
- expiresAt
319
- );
320
-
321
- auditLog({
322
- actorType: 'agent',
323
- actorId: agentId,
324
- action: 'capability_token_issued',
325
- resource: 'token',
326
- details: { siteId, capabilities: scope.capabilities, ttl },
327
- });
328
-
329
- return { token: rawToken, expiresAt };
330
- }
331
-
332
- /**
333
- * Validate a capability token and check if the requested action is allowed.
334
- * @returns {object|null} - Token info with capabilities, or null if invalid
335
- */
336
- function validateCapabilityToken(rawToken, requiredAction) {
337
- const tokenHash = crypto.createHash('sha256').update(rawToken).digest('hex');
338
-
339
- // Check revocation list
340
- if (stmts.isTokenRevoked.get(tokenHash)) return null;
341
-
342
- const token = stmts.getCapToken.get(tokenHash);
343
- if (!token) return null;
344
-
345
- const capabilities = JSON.parse(token.capabilities || '["read"]');
346
- const allowedActions = JSON.parse(token.allowed_actions || '["*"]');
347
-
348
- // Check if action is permitted
349
- if (requiredAction && !allowedActions.includes('*') && !allowedActions.includes(requiredAction)) {
350
- return null;
351
- }
352
-
353
- return {
354
- agentId: token.agent_id,
355
- siteId: token.site_id,
356
- capabilities,
357
- allowedActions,
358
- selectorScope: JSON.parse(token.selector_scope || '[]'),
359
- expiresAt: token.expires_at,
360
- };
361
- }
362
-
363
- /**
364
- * Revoke a specific token.
365
- */
366
- function revokeCapabilityToken(rawToken, reason) {
367
- const tokenHash = crypto.createHash('sha256').update(rawToken).digest('hex');
368
- stmts.revokeCapToken.run(tokenHash);
369
- stmts.insertRevokedToken.run(tokenHash, reason || 'manual_revocation');
370
- }
371
-
372
- // ─── JWT Revocation ──────────────────────────────────────────────────
373
-
374
- /**
375
- * Add a JWT to the revocation list (for logout / compromise).
376
- */
377
- function revokeJWT(token, reason) {
378
- const tokenHash = crypto.createHash('sha256').update(token).digest('hex');
379
- stmts.insertRevokedToken.run(tokenHash, reason || 'manual_revocation');
380
- }
381
-
382
- function isJWTRevoked(token) {
383
- const tokenHash = crypto.createHash('sha256').update(token).digest('hex');
384
- return !!stmts.isTokenRevoked.get(tokenHash);
385
- }
386
-
387
- // ─── Input Sanitizer ─────────────────────────────────────────────────
388
-
389
- const DOMAIN_RE = /^(?:[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?\.)+[a-zA-Z]{2,}$/;
390
- const EMAIL_RE = /^[^\s@]{1,64}@[^\s@]{1,255}$/;
391
-
392
- function validateDomain(domain) {
393
- if (!domain || typeof domain !== 'string') return false;
394
- const clean = domain.replace(/^www\./, '').toLowerCase();
395
- return DOMAIN_RE.test(clean) && clean.length <= 253;
396
- }
397
-
398
- function validateEmail(email) {
399
- if (!email || typeof email !== 'string') return false;
400
- return EMAIL_RE.test(email) && email.length <= 320;
401
- }
402
-
403
- /**
404
- * Sanitize arbitrary string input — strip control characters, limit length.
405
- */
406
- function sanitizeInput(str, maxLength = 1000) {
407
- if (typeof str !== 'string') return '';
408
- // Remove control characters except newlines/tabs
409
- return str.replace(/[\x00-\x08\x0B\x0C\x0E-\x1F\x7F]/g, '').slice(0, maxLength);
410
- }
411
-
412
- /**
413
- * Validate and sanitize site configuration — strict schema enforcement.
414
- */
415
- function validateSiteConfig(config) {
416
- if (!config || typeof config !== 'object') return { valid: false, error: 'Config must be an object' };
417
-
418
- const allowed = {
419
- agentPermissions: 'object',
420
- restrictions: 'object',
421
- logging: 'object',
422
- stealth: 'object',
423
- };
424
-
425
- const validPermissions = ['readContent', 'click', 'fillForms', 'scroll', 'navigate', 'apiAccess', 'automatedLogin', 'extractData'];
426
-
427
- // Strip unknown top-level keys
428
- const cleaned = {};
429
- for (const [key, type] of Object.entries(allowed)) {
430
- if (config[key] !== undefined) {
431
- if (typeof config[key] !== type) {
432
- return { valid: false, error: `${key} must be ${type}` };
433
- }
434
- cleaned[key] = config[key];
435
- }
436
- }
437
-
438
- // Validate permissions — only allow known keys with boolean values
439
- if (cleaned.agentPermissions) {
440
- const perms = {};
441
- for (const [k, v] of Object.entries(cleaned.agentPermissions)) {
442
- if (validPermissions.includes(k) && typeof v === 'boolean') {
443
- perms[k] = v;
444
- }
445
- }
446
- cleaned.agentPermissions = perms;
447
- }
448
-
449
- // Validate restrictions
450
- if (cleaned.restrictions) {
451
- const r = cleaned.restrictions;
452
- if (r.allowedSelectors && !Array.isArray(r.allowedSelectors)) {
453
- return { valid: false, error: 'allowedSelectors must be an array' };
454
- }
455
- if (r.blockedSelectors && !Array.isArray(r.blockedSelectors)) {
456
- return { valid: false, error: 'blockedSelectors must be an array' };
457
- }
458
- }
459
-
460
- // Validate stealth consent requirement
461
- if (cleaned.stealth) {
462
- if (cleaned.stealth.enabled && !cleaned.stealth.consent) {
463
- return { valid: false, error: 'Stealth mode requires explicit consent: true' };
464
- }
465
- }
466
-
467
- // Reject configs > 10KB
468
- const serialized = JSON.stringify(cleaned);
469
- if (serialized.length > 10240) {
470
- return { valid: false, error: 'Config too large (max 10KB)' };
471
- }
472
-
473
- return { valid: true, config: cleaned };
474
- }
475
-
476
- // ─── IP Hashing ──────────────────────────────────────────────────────
477
-
478
- function hashIP(ip) {
479
- if (!ip) return null;
480
- return crypto.createHash('sha256').update(ip).digest('hex').slice(0, 16);
481
- }
482
-
483
- // ─── Exports ─────────────────────────────────────────────────────────
484
-
485
- module.exports = {
486
- // Audit
487
- auditLog,
488
- verifyAuditChain,
489
-
490
- // Command signing
491
- signCommand,
492
- verifyCommandSignature,
493
-
494
- // Agent identity
495
- registerAgent,
496
- authenticateAgent,
497
-
498
- // Capability tokens
499
- issueCapabilityToken,
500
- validateCapabilityToken,
501
- revokeCapabilityToken,
502
-
503
- // JWT revocation
504
- revokeJWT,
505
- isJWTRevoked,
506
-
507
- // Input validation
508
- validateDomain,
509
- validateEmail,
510
- sanitizeInput,
511
- validateSiteConfig,
512
- hashIP,
513
- };
1
+ /**
2
+ * WAB Security Layer — Command Signing, Audit Logging, and Agent Identity
3
+ *
4
+ * Implements:
5
+ * - HMAC-SHA256 command signatures for non-repudiation
6
+ * - Immutable audit log with tamper-evident chaining
7
+ * - Agent identity verification (key pair registration)
8
+ * - Capability-based tokens for fine-grained access control
9
+ * - Timing-safe comparisons for secret validation
10
+ */
11
+
12
+ const crypto = require('crypto');
13
+ const { db } = require('../models/db');
14
+
15
+ // ─── Schema ──────────────────────────────────────────────────────────
16
+
17
+ db.exec(`
18
+ CREATE TABLE IF NOT EXISTS security_audit_log (
19
+ id TEXT PRIMARY KEY,
20
+ chain_hash TEXT NOT NULL,
21
+ prev_hash TEXT,
22
+ timestamp TEXT NOT NULL DEFAULT (datetime('now')),
23
+ actor_type TEXT NOT NULL CHECK(actor_type IN ('agent','user','admin','system','plugin')),
24
+ actor_id TEXT,
25
+ action TEXT NOT NULL,
26
+ resource TEXT,
27
+ resource_id TEXT,
28
+ ip_hash TEXT,
29
+ signature TEXT,
30
+ outcome TEXT DEFAULT 'success' CHECK(outcome IN ('success','denied','error','blocked')),
31
+ details TEXT DEFAULT '{}',
32
+ severity TEXT DEFAULT 'info' CHECK(severity IN ('info','warning','critical'))
33
+ );
34
+
35
+ CREATE TABLE IF NOT EXISTS registered_agents (
36
+ id TEXT PRIMARY KEY,
37
+ site_id TEXT NOT NULL,
38
+ agent_name TEXT NOT NULL,
39
+ public_key TEXT NOT NULL,
40
+ key_algorithm TEXT DEFAULT 'hmac-sha256',
41
+ capabilities TEXT DEFAULT '["read"]',
42
+ status TEXT DEFAULT 'active' CHECK(status IN ('active','suspended','revoked')),
43
+ max_rate INTEGER DEFAULT 60,
44
+ ip_allowlist TEXT DEFAULT '[]',
45
+ total_commands INTEGER DEFAULT 0,
46
+ last_command TEXT,
47
+ created_at TEXT DEFAULT (datetime('now')),
48
+ revoked_at TEXT,
49
+ FOREIGN KEY (site_id) REFERENCES sites(id) ON DELETE CASCADE,
50
+ UNIQUE(site_id, agent_name)
51
+ );
52
+
53
+ CREATE TABLE IF NOT EXISTS capability_tokens (
54
+ token_hash TEXT PRIMARY KEY,
55
+ agent_id TEXT NOT NULL,
56
+ site_id TEXT NOT NULL,
57
+ capabilities TEXT NOT NULL DEFAULT '["read"]',
58
+ allowed_actions TEXT DEFAULT '["*"]',
59
+ selector_scope TEXT DEFAULT '[]',
60
+ expires_at TEXT NOT NULL,
61
+ revoked INTEGER DEFAULT 0,
62
+ created_at TEXT DEFAULT (datetime('now')),
63
+ FOREIGN KEY (agent_id) REFERENCES registered_agents(id) ON DELETE CASCADE,
64
+ FOREIGN KEY (site_id) REFERENCES sites(id) ON DELETE CASCADE
65
+ );
66
+
67
+ CREATE TABLE IF NOT EXISTS revoked_tokens (
68
+ token_hash TEXT PRIMARY KEY,
69
+ revoked_at TEXT DEFAULT (datetime('now')),
70
+ reason TEXT
71
+ );
72
+
73
+ CREATE INDEX IF NOT EXISTS idx_audit_timestamp ON security_audit_log(timestamp);
74
+ CREATE INDEX IF NOT EXISTS idx_audit_actor ON security_audit_log(actor_type, actor_id);
75
+ CREATE INDEX IF NOT EXISTS idx_audit_action ON security_audit_log(action);
76
+ CREATE INDEX IF NOT EXISTS idx_audit_severity ON security_audit_log(severity);
77
+ CREATE INDEX IF NOT EXISTS idx_agents_site ON registered_agents(site_id);
78
+ CREATE INDEX IF NOT EXISTS idx_cap_tokens_agent ON capability_tokens(agent_id);
79
+ CREATE INDEX IF NOT EXISTS idx_cap_tokens_site ON capability_tokens(site_id);
80
+ CREATE INDEX IF NOT EXISTS idx_revoked_tokens ON revoked_tokens(token_hash);
81
+ `);
82
+
83
+ // ─── Prepared Statements ─────────────────────────────────────────────
84
+
85
+ const stmts = {
86
+ insertAudit: db.prepare(`INSERT INTO security_audit_log
87
+ (id, chain_hash, prev_hash, timestamp, actor_type, actor_id, action, resource, resource_id, ip_hash, signature, outcome, details, severity)
88
+ VALUES (?, ?, ?, datetime('now'), ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)`),
89
+ getLastAudit: db.prepare(`SELECT chain_hash FROM security_audit_log ORDER BY rowid DESC LIMIT 1`),
90
+ getAuditRange: db.prepare(`SELECT * FROM security_audit_log WHERE timestamp >= ? AND timestamp <= ? ORDER BY rowid`),
91
+ getAuditByActor: db.prepare(`SELECT * FROM security_audit_log WHERE actor_type = ? AND actor_id = ? ORDER BY rowid DESC LIMIT ?`),
92
+ getAuditBySeverity: db.prepare(`SELECT * FROM security_audit_log WHERE severity = ? ORDER BY rowid DESC LIMIT ?`),
93
+
94
+ insertAgent: db.prepare(`INSERT INTO registered_agents
95
+ (id, site_id, agent_name, public_key, key_algorithm, capabilities, max_rate, ip_allowlist)
96
+ VALUES (?, ?, ?, ?, ?, ?, ?, ?)`),
97
+ getAgent: db.prepare(`SELECT * FROM registered_agents WHERE id = ?`),
98
+ getAgentByKey: db.prepare(`SELECT * FROM registered_agents WHERE site_id = ? AND public_key = ? AND status = 'active'`),
99
+ getAgentByName: db.prepare(`SELECT * FROM registered_agents WHERE site_id = ? AND agent_name = ? AND status = 'active'`),
100
+ getAgentsBySite: db.prepare(`SELECT * FROM registered_agents WHERE site_id = ? ORDER BY created_at DESC`),
101
+ updateAgentStats: db.prepare(`UPDATE registered_agents SET total_commands = total_commands + 1, last_command = datetime('now') WHERE id = ?`),
102
+ revokeAgent: db.prepare(`UPDATE registered_agents SET status = 'revoked', revoked_at = datetime('now') WHERE id = ?`),
103
+ suspendAgent: db.prepare(`UPDATE registered_agents SET status = 'suspended' WHERE id = ?`),
104
+
105
+ insertCapToken: db.prepare(`INSERT INTO capability_tokens
106
+ (token_hash, agent_id, site_id, capabilities, allowed_actions, selector_scope, expires_at)
107
+ VALUES (?, ?, ?, ?, ?, ?, ?)`),
108
+ getCapToken: db.prepare(`SELECT ct.*, ra.status as agent_status, ra.public_key
109
+ FROM capability_tokens ct
110
+ JOIN registered_agents ra ON ct.agent_id = ra.id
111
+ WHERE ct.token_hash = ? AND ct.revoked = 0
112
+ AND ct.expires_at > datetime('now')
113
+ AND ra.status = 'active'`),
114
+ revokeCapToken: db.prepare(`UPDATE capability_tokens SET revoked = 1 WHERE token_hash = ?`),
115
+
116
+ insertRevokedToken: db.prepare(`INSERT OR IGNORE INTO revoked_tokens (token_hash, reason) VALUES (?, ?)`),
117
+ isTokenRevoked: db.prepare(`SELECT 1 FROM revoked_tokens WHERE token_hash = ? LIMIT 1`),
118
+ };
119
+
120
+ // ─── Audit Logging (Tamper-Evident Chain) ────────────────────────────
121
+
122
+ let _lastHash = null;
123
+
124
+ function _getLastHash() {
125
+ if (_lastHash) return _lastHash;
126
+ const row = stmts.getLastAudit.get();
127
+ return row ? row.chain_hash : '0'.repeat(64);
128
+ }
129
+
130
+ /**
131
+ * Log a security-critical event with hash chaining for tamper detection.
132
+ */
133
+ function auditLog(entry) {
134
+ const id = crypto.randomUUID();
135
+ const prevHash = _getLastHash();
136
+ const payload = `${prevHash}|${entry.actorType}|${entry.actorId || ''}|${entry.action}|${entry.resource || ''}|${Date.now()}`;
137
+ const chainHash = crypto.createHash('sha256').update(payload).digest('hex');
138
+ _lastHash = chainHash;
139
+
140
+ const ipHash = entry.ip ? crypto.createHash('sha256').update(entry.ip).digest('hex').slice(0, 16) : null;
141
+
142
+ stmts.insertAudit.run(
143
+ id, chainHash, prevHash,
144
+ entry.actorType || 'system',
145
+ entry.actorId || null,
146
+ entry.action,
147
+ entry.resource || null,
148
+ entry.resourceId || null,
149
+ ipHash,
150
+ entry.signature || null,
151
+ entry.outcome || 'success',
152
+ JSON.stringify(entry.details || {}),
153
+ entry.severity || 'info'
154
+ );
155
+
156
+ return { id, chainHash };
157
+ }
158
+
159
+ /**
160
+ * Verify audit chain integrity — detect tampering.
161
+ */
162
+ function verifyAuditChain(startDate, endDate) {
163
+ const logs = stmts.getAuditRange.all(startDate, endDate);
164
+ if (logs.length === 0) return { valid: true, checked: 0 };
165
+
166
+ let valid = true;
167
+ let broken = null;
168
+
169
+ for (let i = 1; i < logs.length; i++) {
170
+ if (logs[i].prev_hash !== logs[i - 1].chain_hash) {
171
+ valid = false;
172
+ broken = { index: i, id: logs[i].id };
173
+ break;
174
+ }
175
+ }
176
+
177
+ return { valid, checked: logs.length, broken };
178
+ }
179
+
180
+ // ─── Command Signing ─────────────────────────────────────────────────
181
+
182
+ /**
183
+ * Sign a command payload with HMAC-SHA256.
184
+ * @param {string} secretKey - Agent's secret key
185
+ * @param {object} payload - { action, params, timestamp, nonce }
186
+ * @returns {string} HMAC signature
187
+ */
188
+ function signCommand(secretKey, payload) {
189
+ const canonical = JSON.stringify({
190
+ action: payload.action,
191
+ params: payload.params || {},
192
+ timestamp: payload.timestamp,
193
+ nonce: payload.nonce,
194
+ });
195
+ return crypto.createHmac('sha256', secretKey).update(canonical).digest('hex');
196
+ }
197
+
198
+ /**
199
+ * Verify a command signature with timing-safe comparison.
200
+ * Also validates timestamp freshness (< 5 minutes) and nonce uniqueness.
201
+ */
202
+ const _usedNonces = new Map();
203
+ const NONCE_TTL = 5 * 60 * 1000;
204
+
205
+ // Purge old nonces every 5 minutes
206
+ setInterval(() => {
207
+ const cutoff = Date.now() - NONCE_TTL;
208
+ for (const [nonce, ts] of _usedNonces) {
209
+ if (ts < cutoff) _usedNonces.delete(nonce);
210
+ }
211
+ }, NONCE_TTL);
212
+
213
+ function verifyCommandSignature(publicKey, payload, signature) {
214
+ // Check timestamp freshness (±5 minutes)
215
+ const ts = payload.timestamp;
216
+ if (!ts || Math.abs(Date.now() - ts) > NONCE_TTL) {
217
+ return { valid: false, reason: 'timestamp_expired' };
218
+ }
219
+
220
+ // Check nonce uniqueness (replay protection)
221
+ if (!payload.nonce) {
222
+ return { valid: false, reason: 'nonce_required' };
223
+ }
224
+ if (_usedNonces.has(payload.nonce)) {
225
+ return { valid: false, reason: 'nonce_reused' };
226
+ }
227
+
228
+ // Verify HMAC
229
+ const expected = signCommand(publicKey, payload);
230
+ const sigBuf = Buffer.from(signature, 'hex');
231
+ const expBuf = Buffer.from(expected, 'hex');
232
+
233
+ if (sigBuf.length !== expBuf.length) {
234
+ return { valid: false, reason: 'invalid_signature' };
235
+ }
236
+
237
+ if (!crypto.timingSafeEqual(sigBuf, expBuf)) {
238
+ return { valid: false, reason: 'invalid_signature' };
239
+ }
240
+
241
+ // Signature valid — record nonce
242
+ _usedNonces.set(payload.nonce, Date.now());
243
+ return { valid: true };
244
+ }
245
+
246
+ // ─── Agent Identity ──────────────────────────────────────────────────
247
+
248
+ /**
249
+ * Register a new agent with a cryptographic key.
250
+ * Returns { agentId, secretKey } — the secret must be saved by the caller.
251
+ */
252
+ function registerAgent(siteId, agentName, options = {}) {
253
+ const id = crypto.randomUUID();
254
+ const secretKey = crypto.randomBytes(32).toString('hex');
255
+ const publicKeyHash = crypto.createHash('sha256').update(secretKey).digest('hex');
256
+
257
+ const capabilities = options.capabilities || ['read'];
258
+ const validCaps = ['read', 'click', 'fill', 'scroll', 'navigate', 'execute', 'extract', 'api'];
259
+ const filtered = capabilities.filter(c => validCaps.includes(c));
260
+
261
+ stmts.insertAgent.run(
262
+ id, siteId, agentName, publicKeyHash,
263
+ 'hmac-sha256',
264
+ JSON.stringify(filtered),
265
+ options.maxRate || 60,
266
+ JSON.stringify(options.ipAllowlist || [])
267
+ );
268
+
269
+ auditLog({
270
+ actorType: 'system',
271
+ action: 'agent_registered',
272
+ resource: 'agent',
273
+ resourceId: id,
274
+ details: { agentName, siteId, capabilities: filtered },
275
+ });
276
+
277
+ return { agentId: id, secretKey };
278
+ }
279
+
280
+ /**
281
+ * Authenticate an agent with its secret key.
282
+ * Uses timing-safe comparison against stored public key hash.
283
+ */
284
+ function authenticateAgent(siteId, secretKey) {
285
+ const publicKeyHash = crypto.createHash('sha256').update(secretKey).digest('hex');
286
+ const agent = stmts.getAgentByKey.get(siteId, publicKeyHash);
287
+
288
+ if (!agent) return null;
289
+
290
+ stmts.updateAgentStats.run(agent.id);
291
+ return {
292
+ agentId: agent.id,
293
+ agentName: agent.agent_name,
294
+ capabilities: JSON.parse(agent.capabilities || '["read"]'),
295
+ maxRate: agent.max_rate,
296
+ };
297
+ }
298
+
299
+ // ─── Capability Tokens ───────────────────────────────────────────────
300
+
301
+ /**
302
+ * Issue a capability token with restricted scope.
303
+ * @param {string} agentId
304
+ * @param {string} siteId
305
+ * @param {object} scope - { capabilities, allowedActions, selectorScope, ttlSeconds }
306
+ */
307
+ function issueCapabilityToken(agentId, siteId, scope = {}) {
308
+ const rawToken = crypto.randomBytes(32).toString('hex');
309
+ const tokenHash = crypto.createHash('sha256').update(rawToken).digest('hex');
310
+ const ttl = Math.min(scope.ttlSeconds || 3600, 86400); // max 24h
311
+ const expiresAt = new Date(Date.now() + ttl * 1000).toISOString();
312
+
313
+ stmts.insertCapToken.run(
314
+ tokenHash, agentId, siteId,
315
+ JSON.stringify(scope.capabilities || ['read']),
316
+ JSON.stringify(scope.allowedActions || ['*']),
317
+ JSON.stringify(scope.selectorScope || []),
318
+ expiresAt
319
+ );
320
+
321
+ auditLog({
322
+ actorType: 'agent',
323
+ actorId: agentId,
324
+ action: 'capability_token_issued',
325
+ resource: 'token',
326
+ details: { siteId, capabilities: scope.capabilities, ttl },
327
+ });
328
+
329
+ return { token: rawToken, expiresAt };
330
+ }
331
+
332
+ /**
333
+ * Validate a capability token and check if the requested action is allowed.
334
+ * @returns {object|null} - Token info with capabilities, or null if invalid
335
+ */
336
+ function validateCapabilityToken(rawToken, requiredAction) {
337
+ const tokenHash = crypto.createHash('sha256').update(rawToken).digest('hex');
338
+
339
+ // Check revocation list
340
+ if (stmts.isTokenRevoked.get(tokenHash)) return null;
341
+
342
+ const token = stmts.getCapToken.get(tokenHash);
343
+ if (!token) return null;
344
+
345
+ const capabilities = JSON.parse(token.capabilities || '["read"]');
346
+ const allowedActions = JSON.parse(token.allowed_actions || '["*"]');
347
+
348
+ // Check if action is permitted
349
+ if (requiredAction && !allowedActions.includes('*') && !allowedActions.includes(requiredAction)) {
350
+ return null;
351
+ }
352
+
353
+ return {
354
+ agentId: token.agent_id,
355
+ siteId: token.site_id,
356
+ capabilities,
357
+ allowedActions,
358
+ selectorScope: JSON.parse(token.selector_scope || '[]'),
359
+ expiresAt: token.expires_at,
360
+ };
361
+ }
362
+
363
+ /**
364
+ * Revoke a specific token.
365
+ */
366
+ function revokeCapabilityToken(rawToken, reason) {
367
+ const tokenHash = crypto.createHash('sha256').update(rawToken).digest('hex');
368
+ stmts.revokeCapToken.run(tokenHash);
369
+ stmts.insertRevokedToken.run(tokenHash, reason || 'manual_revocation');
370
+ }
371
+
372
+ // ─── JWT Revocation ──────────────────────────────────────────────────
373
+
374
+ /**
375
+ * Add a JWT to the revocation list (for logout / compromise).
376
+ */
377
+ function revokeJWT(token, reason) {
378
+ const tokenHash = crypto.createHash('sha256').update(token).digest('hex');
379
+ stmts.insertRevokedToken.run(tokenHash, reason || 'manual_revocation');
380
+ }
381
+
382
+ function isJWTRevoked(token) {
383
+ const tokenHash = crypto.createHash('sha256').update(token).digest('hex');
384
+ return !!stmts.isTokenRevoked.get(tokenHash);
385
+ }
386
+
387
+ // ─── Input Sanitizer ─────────────────────────────────────────────────
388
+
389
+ const DOMAIN_RE = /^(?:[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?\.)+[a-zA-Z]{2,}$/;
390
+ const EMAIL_RE = /^[^\s@]{1,64}@[^\s@]{1,255}$/;
391
+
392
+ function validateDomain(domain) {
393
+ if (!domain || typeof domain !== 'string') return false;
394
+ const clean = domain.replace(/^www\./, '').toLowerCase();
395
+ return DOMAIN_RE.test(clean) && clean.length <= 253;
396
+ }
397
+
398
+ function validateEmail(email) {
399
+ if (!email || typeof email !== 'string') return false;
400
+ return EMAIL_RE.test(email) && email.length <= 320;
401
+ }
402
+
403
+ /**
404
+ * Sanitize arbitrary string input — strip control characters, limit length.
405
+ */
406
+ function sanitizeInput(str, maxLength = 1000) {
407
+ if (typeof str !== 'string') return '';
408
+ // Remove control characters except newlines/tabs
409
+ return str.replace(/[\x00-\x08\x0B\x0C\x0E-\x1F\x7F]/g, '').slice(0, maxLength);
410
+ }
411
+
412
+ /**
413
+ * Validate and sanitize site configuration — strict schema enforcement.
414
+ */
415
+ function validateSiteConfig(config) {
416
+ if (!config || typeof config !== 'object') return { valid: false, error: 'Config must be an object' };
417
+
418
+ const allowed = {
419
+ agentPermissions: 'object',
420
+ restrictions: 'object',
421
+ logging: 'object',
422
+ stealth: 'object',
423
+ };
424
+
425
+ const validPermissions = ['readContent', 'click', 'fillForms', 'scroll', 'navigate', 'apiAccess', 'automatedLogin', 'extractData'];
426
+
427
+ // Strip unknown top-level keys
428
+ const cleaned = {};
429
+ for (const [key, type] of Object.entries(allowed)) {
430
+ if (config[key] !== undefined) {
431
+ if (typeof config[key] !== type) {
432
+ return { valid: false, error: `${key} must be ${type}` };
433
+ }
434
+ cleaned[key] = config[key];
435
+ }
436
+ }
437
+
438
+ // Validate permissions — only allow known keys with boolean values
439
+ if (cleaned.agentPermissions) {
440
+ const perms = {};
441
+ for (const [k, v] of Object.entries(cleaned.agentPermissions)) {
442
+ if (validPermissions.includes(k) && typeof v === 'boolean') {
443
+ perms[k] = v;
444
+ }
445
+ }
446
+ cleaned.agentPermissions = perms;
447
+ }
448
+
449
+ // Validate restrictions
450
+ if (cleaned.restrictions) {
451
+ const r = cleaned.restrictions;
452
+ if (r.allowedSelectors && !Array.isArray(r.allowedSelectors)) {
453
+ return { valid: false, error: 'allowedSelectors must be an array' };
454
+ }
455
+ if (r.blockedSelectors && !Array.isArray(r.blockedSelectors)) {
456
+ return { valid: false, error: 'blockedSelectors must be an array' };
457
+ }
458
+ }
459
+
460
+ // Validate stealth consent requirement
461
+ if (cleaned.stealth) {
462
+ if (cleaned.stealth.enabled && !cleaned.stealth.consent) {
463
+ return { valid: false, error: 'Stealth mode requires explicit consent: true' };
464
+ }
465
+ }
466
+
467
+ // Reject configs > 10KB
468
+ const serialized = JSON.stringify(cleaned);
469
+ if (serialized.length > 10240) {
470
+ return { valid: false, error: 'Config too large (max 10KB)' };
471
+ }
472
+
473
+ return { valid: true, config: cleaned };
474
+ }
475
+
476
+ // ─── IP Hashing ──────────────────────────────────────────────────────
477
+
478
+ function hashIP(ip) {
479
+ if (!ip) return null;
480
+ return crypto.createHash('sha256').update(ip).digest('hex').slice(0, 16);
481
+ }
482
+
483
+ // ─── Exports ─────────────────────────────────────────────────────────
484
+
485
+ module.exports = {
486
+ // Audit
487
+ auditLog,
488
+ verifyAuditChain,
489
+
490
+ // Command signing
491
+ signCommand,
492
+ verifyCommandSignature,
493
+
494
+ // Agent identity
495
+ registerAgent,
496
+ authenticateAgent,
497
+
498
+ // Capability tokens
499
+ issueCapabilityToken,
500
+ validateCapabilityToken,
501
+ revokeCapabilityToken,
502
+
503
+ // JWT revocation
504
+ revokeJWT,
505
+ isJWTRevoked,
506
+
507
+ // Input validation
508
+ validateDomain,
509
+ validateEmail,
510
+ sanitizeInput,
511
+ validateSiteConfig,
512
+ hashIP,
513
+ };