web-agent-bridge 3.2.0 → 3.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +84 -72
- package/README.ar.md +1304 -1152
- package/README.md +298 -1635
- package/bin/agent-runner.js +474 -474
- package/bin/cli.js +237 -138
- package/bin/wab-init.js +223 -0
- package/bin/wab.js +80 -80
- package/examples/azure-dns-wab.js +83 -0
- package/examples/bidi-agent.js +119 -119
- package/examples/cloudflare-wab-dns.js +121 -0
- package/examples/cpanel-wab-dns.js +114 -0
- package/examples/cross-site-agent.js +91 -91
- package/examples/dns-discovery-agent.js +166 -0
- package/examples/gcp-dns-wab.js +76 -0
- package/examples/governance-agent.js +169 -0
- package/examples/mcp-agent.js +94 -94
- package/examples/next-app-router/README.md +44 -44
- package/examples/plesk-wab-dns.js +103 -0
- package/examples/puppeteer-agent.js +108 -108
- package/examples/route53-wab-dns.js +144 -0
- package/examples/saas-dashboard/README.md +55 -55
- package/examples/safe-mode-agent.js +96 -0
- package/examples/shopify-hydrogen/README.md +74 -74
- package/examples/vision-agent.js +171 -171
- package/examples/wab-sign.js +74 -0
- package/examples/wab-verify.js +60 -0
- package/examples/wordpress-elementor/README.md +77 -77
- package/package.json +19 -6
- package/public/.well-known/agent-tools.json +180 -180
- package/public/.well-known/ai-assets.json +59 -59
- package/public/.well-known/security.txt +8 -0
- package/public/.well-known/wab.json +28 -0
- package/public/activate.html +368 -0
- package/public/adoption-metrics.html +188 -0
- package/public/agent-workspace.html +349 -349
- package/public/ai.html +198 -198
- package/public/api.html +413 -412
- package/public/azure-dns-integration.html +289 -0
- package/public/browser.html +486 -486
- package/public/cloudflare-integration.html +380 -0
- package/public/commander-dashboard.html +243 -243
- package/public/cookies.html +210 -210
- package/public/cpanel-integration.html +398 -0
- package/public/css/agent-workspace.css +1713 -1713
- package/public/css/premium.css +317 -317
- package/public/css/styles.css +1263 -1235
- package/public/dashboard.html +707 -706
- package/public/dns.html +436 -0
- package/public/docs.html +588 -587
- package/public/feed.xml +89 -89
- package/public/gcp-dns-integration.html +318 -0
- package/public/growth.html +465 -463
- package/public/index.html +1266 -982
- package/public/integrations.html +556 -0
- package/public/js/activate.js +145 -0
- package/public/js/agent-workspace.js +1740 -1740
- package/public/js/auth-nav.js +65 -31
- package/public/js/auth-redirect.js +12 -12
- package/public/js/cookie-consent.js +56 -56
- package/public/js/dns.js +438 -0
- package/public/js/wab-demo-page.js +721 -721
- package/public/js/ws-client.js +74 -74
- package/public/llms-full.txt +360 -360
- package/public/llms.txt +125 -125
- package/public/login.html +85 -85
- package/public/mesh-dashboard.html +328 -328
- package/public/openapi.json +669 -580
- package/public/phone-shield.html +281 -0
- package/public/plesk-integration.html +375 -0
- package/public/premium-dashboard.html +2489 -2489
- package/public/premium.html +793 -793
- package/public/privacy.html +297 -297
- package/public/provider-onboarding.html +172 -0
- package/public/provider-sandbox.html +134 -0
- package/public/providers.html +359 -0
- package/public/register.html +105 -105
- package/public/registrar-integrations.html +141 -0
- package/public/robots.txt +99 -87
- package/public/route53-integration.html +531 -0
- package/public/script/wab-consent.d.ts +36 -36
- package/public/script/wab-consent.js +104 -104
- package/public/script/wab-schema.js +131 -131
- package/public/script/wab.d.ts +108 -108
- package/public/script/wab.min.js +580 -580
- package/public/security.txt +8 -0
- package/public/shieldqr.html +231 -0
- package/public/sitemap.xml +6 -0
- package/public/terms.html +256 -256
- package/public/wab-trust.html +200 -0
- package/public/wab-vs-protocols.html +210 -0
- package/public/whitepaper.html +449 -0
- package/script/ai-agent-bridge.js +1754 -1754
- package/sdk/README.md +99 -99
- package/sdk/agent-mesh.js +449 -449
- package/sdk/auto-discovery.js +288 -0
- package/sdk/commander.js +262 -262
- package/sdk/governance.js +262 -0
- package/sdk/index.d.ts +464 -464
- package/sdk/index.js +25 -1
- package/sdk/multi-agent.js +318 -318
- package/sdk/package.json +2 -2
- package/sdk/safe-mode.js +221 -0
- package/sdk/safety-shield.js +219 -0
- package/sdk/schema-discovery.js +83 -83
- package/server/adapters/index.js +520 -520
- package/server/config/plans.js +367 -367
- package/server/config/secrets.js +102 -102
- package/server/control-plane/index.js +301 -301
- package/server/data-plane/index.js +354 -354
- package/server/index.js +670 -427
- package/server/llm/index.js +404 -404
- package/server/middleware/adminAuth.js +35 -35
- package/server/middleware/auth.js +50 -50
- package/server/middleware/featureGate.js +88 -88
- package/server/middleware/rateLimits.js +100 -100
- package/server/middleware/sensitiveAction.js +157 -0
- package/server/migrations/001_add_analytics_indexes.sql +7 -7
- package/server/migrations/002_premium_features.sql +418 -418
- package/server/migrations/003_ads_integer_cents.sql +33 -33
- package/server/migrations/004_agent_os.sql +158 -158
- package/server/migrations/005_marketplace_metering.sql +126 -126
- package/server/migrations/007_governance.sql +106 -0
- package/server/migrations/008_plans.sql +144 -0
- package/server/migrations/009_shieldqr.sql +30 -0
- package/server/migrations/010_extended_trust.sql +33 -0
- package/server/models/adapters/index.js +33 -33
- package/server/models/adapters/mysql.js +183 -183
- package/server/models/adapters/postgresql.js +172 -172
- package/server/models/adapters/sqlite.js +7 -7
- package/server/models/db.js +740 -681
- package/server/observability/failure-analysis.js +337 -337
- package/server/observability/index.js +394 -394
- package/server/protocol/capabilities.js +223 -223
- package/server/protocol/index.js +243 -243
- package/server/protocol/schema.js +584 -584
- package/server/registry/certification.js +271 -271
- package/server/registry/index.js +326 -326
- package/server/routes/admin-plans.js +76 -0
- package/server/routes/admin-premium.js +673 -671
- package/server/routes/admin-shieldqr.js +90 -0
- package/server/routes/admin-trust-monitor.js +83 -0
- package/server/routes/admin.js +549 -261
- package/server/routes/ads.js +130 -130
- package/server/routes/agent-workspace.js +540 -540
- package/server/routes/api.js +150 -150
- package/server/routes/auth.js +71 -71
- package/server/routes/billing.js +57 -45
- package/server/routes/commander.js +316 -316
- package/server/routes/demo-showcase.js +332 -332
- package/server/routes/demo-store.js +154 -0
- package/server/routes/discovery.js +2348 -417
- package/server/routes/gateway.js +173 -157
- package/server/routes/governance.js +208 -0
- package/server/routes/license.js +251 -240
- package/server/routes/mesh.js +469 -469
- package/server/routes/noscript.js +543 -543
- package/server/routes/plans.js +33 -0
- package/server/routes/premium-v2.js +686 -686
- package/server/routes/premium.js +724 -724
- package/server/routes/providers.js +650 -0
- package/server/routes/runtime.js +2148 -2147
- package/server/routes/shieldqr.js +88 -0
- package/server/routes/sovereign.js +465 -385
- package/server/routes/universal.js +200 -185
- package/server/routes/wab-api.js +850 -501
- package/server/runtime/container-worker.js +111 -111
- package/server/runtime/container.js +448 -448
- package/server/runtime/distributed-worker.js +362 -362
- package/server/runtime/event-bus.js +210 -210
- package/server/runtime/index.js +253 -253
- package/server/runtime/queue.js +599 -599
- package/server/runtime/replay.js +666 -666
- package/server/runtime/sandbox.js +266 -266
- package/server/runtime/scheduler.js +534 -534
- package/server/runtime/session-engine.js +293 -293
- package/server/runtime/state-manager.js +188 -188
- package/server/security/cross-site-redactor.js +196 -0
- package/server/security/dry-run.js +180 -0
- package/server/security/human-gate-rate-limit.js +147 -0
- package/server/security/human-gate-transports.js +178 -0
- package/server/security/human-gate.js +281 -0
- package/server/security/index.js +368 -368
- package/server/security/intent-engine.js +245 -0
- package/server/security/reward-guard.js +171 -0
- package/server/security/rollback-store.js +239 -0
- package/server/security/token-scope.js +404 -0
- package/server/security/url-policy.js +139 -0
- package/server/services/agent-chat.js +506 -506
- package/server/services/agent-learning.js +601 -575
- package/server/services/agent-memory.js +625 -625
- package/server/services/agent-mesh.js +555 -539
- package/server/services/agent-symphony.js +717 -717
- package/server/services/agent-tasks.js +1807 -1807
- package/server/services/api-key-engine.js +292 -261
- package/server/services/cluster.js +894 -894
- package/server/services/commander.js +738 -738
- package/server/services/edge-compute.js +440 -440
- package/server/services/email.js +233 -204
- package/server/services/governance.js +466 -0
- package/server/services/hosted-runtime.js +205 -205
- package/server/services/lfd.js +635 -635
- package/server/services/local-ai.js +389 -389
- package/server/services/marketplace.js +270 -270
- package/server/services/metering.js +182 -182
- package/server/services/modules/affiliate-intelligence.js +93 -93
- package/server/services/modules/agent-firewall.js +90 -90
- package/server/services/modules/bounty.js +89 -89
- package/server/services/modules/collective-bargaining.js +92 -92
- package/server/services/modules/dark-pattern.js +66 -66
- package/server/services/modules/gov-intelligence.js +45 -45
- package/server/services/modules/neural.js +55 -55
- package/server/services/modules/notary.js +49 -49
- package/server/services/modules/price-time-machine.js +86 -86
- package/server/services/modules/protocol.js +104 -104
- package/server/services/negotiation.js +439 -439
- package/server/services/plans.js +214 -0
- package/server/services/plugins.js +771 -771
- package/server/services/premium.js +1 -1
- package/server/services/price-intelligence.js +566 -566
- package/server/services/price-shield.js +1137 -1137
- package/server/services/provider-clients.js +740 -0
- package/server/services/reputation.js +465 -465
- package/server/services/search-engine.js +357 -357
- package/server/services/security.js +513 -513
- package/server/services/self-healing.js +843 -843
- package/server/services/shieldqr.js +322 -0
- package/server/services/sovereign-shield.js +542 -0
- package/server/services/ssl-inspector.js +42 -0
- package/server/services/ssl-monitor.js +167 -0
- package/server/services/stripe.js +205 -192
- package/server/services/swarm.js +788 -788
- package/server/services/universal-scraper.js +662 -661
- package/server/services/verification.js +481 -481
- package/server/services/vision.js +1163 -1163
- package/server/services/wab-crypto.js +178 -0
- package/server/utils/cache.js +125 -125
- package/server/utils/migrate.js +81 -81
- package/server/utils/safe-fetch.js +228 -0
- package/server/utils/secureFields.js +50 -50
- package/server/ws.js +161 -161
- package/templates/artisan-marketplace.yaml +104 -104
- package/templates/book-price-scout.yaml +98 -98
- package/templates/electronics-price-tracker.yaml +108 -108
- package/templates/flight-deal-hunter.yaml +113 -113
- package/templates/freelancer-direct.yaml +116 -116
- package/templates/grocery-price-compare.yaml +93 -93
- package/templates/hotel-direct-booking.yaml +113 -113
- package/templates/local-services.yaml +98 -98
- package/templates/olive-oil-tunisia.yaml +88 -88
- package/templates/organic-farm-fresh.yaml +101 -101
- package/templates/restaurant-direct.yaml +97 -97
- package/public/score.html +0 -263
- package/server/migrations/006_growth_suite.sql +0 -138
- package/server/routes/growth.js +0 -962
- package/server/services/fairness-engine.js +0 -409
- package/server/services/fairness.js +0 -420
|
@@ -0,0 +1,322 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* WAB ShieldQR — verification service
|
|
3
|
+
* --------------------------------------------------------------
|
|
4
|
+
* Given a URL extracted from a QR code (or any short link), verify whether
|
|
5
|
+
* it's safe to open. Layered checks:
|
|
6
|
+
*
|
|
7
|
+
* 1. Heuristic risk score (shorteners, brand-new TLDs, IP literals, etc.)
|
|
8
|
+
* 2. DNS Discovery — TXT lookup on _wab.{domain} and _wab-trust.{domain}
|
|
9
|
+
* 3. Cryptographic Trust — fetch /.well-known/wab.json and verify
|
|
10
|
+
* Ed25519 signature against the public key advertised in the TXT record.
|
|
11
|
+
* 4. SSL/TLS health — fetch the cert, compare thumbprint, check expiry.
|
|
12
|
+
*
|
|
13
|
+
* The result is a *level* (green / yellow / red) plus a structured
|
|
14
|
+
* `signals[]` array so a UI can show a human-readable explanation.
|
|
15
|
+
*
|
|
16
|
+
* No third-party deps — only Node built-ins (`dns/promises`, `tls`,
|
|
17
|
+
* `crypto`, `https`).
|
|
18
|
+
*/
|
|
19
|
+
'use strict';
|
|
20
|
+
|
|
21
|
+
const dns = require('node:dns').promises;
|
|
22
|
+
const tls = require('node:tls');
|
|
23
|
+
const crypto = require('node:crypto');
|
|
24
|
+
const https = require('node:https');
|
|
25
|
+
const http = require('node:http');
|
|
26
|
+
|
|
27
|
+
const SHORTENER_HOSTS = new Set([
|
|
28
|
+
'bit.ly', 't.co', 'tinyurl.com', 'goo.gl', 'ow.ly', 'is.gd', 'buff.ly',
|
|
29
|
+
'cutt.ly', 'rebrand.ly', 'shorturl.at', 'tiny.cc', 'rb.gy', 'lnkd.in',
|
|
30
|
+
]);
|
|
31
|
+
|
|
32
|
+
const FETCH_TIMEOUT_MS = 4000;
|
|
33
|
+
const MAX_BODY_BYTES = 64 * 1024;
|
|
34
|
+
|
|
35
|
+
// ─── Public API ───────────────────────────────────────────────────────
|
|
36
|
+
|
|
37
|
+
/**
|
|
38
|
+
* Inspect a single URL. Always resolves; never throws.
|
|
39
|
+
* @param {string} input raw URL or string from a QR scan
|
|
40
|
+
* @returns {Promise<{level:'green'|'yellow'|'red', score:number, url:string|null,
|
|
41
|
+
* host:string|null, signals:Array, dns:any, trust:any, ssl:any, generated_at:string}>}
|
|
42
|
+
*/
|
|
43
|
+
async function scan(input) {
|
|
44
|
+
const t0 = Date.now();
|
|
45
|
+
const out = {
|
|
46
|
+
level: 'yellow',
|
|
47
|
+
score: 50,
|
|
48
|
+
url: null,
|
|
49
|
+
host: null,
|
|
50
|
+
signals: [],
|
|
51
|
+
dns: null,
|
|
52
|
+
trust: null,
|
|
53
|
+
ssl: null,
|
|
54
|
+
generated_at: new Date().toISOString(),
|
|
55
|
+
elapsed_ms: 0,
|
|
56
|
+
};
|
|
57
|
+
|
|
58
|
+
const parsed = parseUrl(input);
|
|
59
|
+
if (!parsed) {
|
|
60
|
+
out.level = 'red';
|
|
61
|
+
out.score = 0;
|
|
62
|
+
out.signals.push({ id: 'invalid_url', severity: 'high', message: 'Cannot parse a URL from input' });
|
|
63
|
+
out.elapsed_ms = Date.now() - t0;
|
|
64
|
+
return out;
|
|
65
|
+
}
|
|
66
|
+
out.url = parsed.href;
|
|
67
|
+
out.host = parsed.hostname;
|
|
68
|
+
|
|
69
|
+
// 1. Static heuristics
|
|
70
|
+
applyHeuristics(parsed, out);
|
|
71
|
+
|
|
72
|
+
// 2. DNS Discovery (parallel TXT lookups)
|
|
73
|
+
const [discovery, trust] = await Promise.all([
|
|
74
|
+
safeTxt(`_wab.${parsed.hostname}`),
|
|
75
|
+
safeTxt(`_wab-trust.${parsed.hostname}`),
|
|
76
|
+
]);
|
|
77
|
+
out.dns = { discovery, trust };
|
|
78
|
+
if (discovery.records.length) {
|
|
79
|
+
out.signals.push({ id: 'wab_dns', severity: 'good', message: `_wab TXT record found at ${parsed.hostname}` });
|
|
80
|
+
}
|
|
81
|
+
if (trust.records.length) {
|
|
82
|
+
out.signals.push({ id: 'wab_trust_dns', severity: 'good', message: `_wab-trust TXT record found` });
|
|
83
|
+
}
|
|
84
|
+
|
|
85
|
+
// 3. Cryptographic trust (only if DNS announced a key)
|
|
86
|
+
const wabFields = parseWabTxt(discovery.records.concat(trust.records));
|
|
87
|
+
if (wabFields.pk || wabFields.endpoint) {
|
|
88
|
+
out.trust = await verifyTrust(parsed, wabFields).catch((e) => ({ ok: false, error: String(e?.message || e) }));
|
|
89
|
+
if (out.trust.ok) {
|
|
90
|
+
out.signals.push({ id: 'signature_ok', severity: 'good', message: 'Ed25519 signature verified against DNS public key' });
|
|
91
|
+
} else if (out.trust && out.trust.error) {
|
|
92
|
+
out.signals.push({ id: 'signature_fail', severity: 'high', message: `Trust check failed: ${out.trust.error}` });
|
|
93
|
+
}
|
|
94
|
+
}
|
|
95
|
+
|
|
96
|
+
// 4. SSL/TLS — only over HTTPS hosts
|
|
97
|
+
if (parsed.protocol === 'https:') {
|
|
98
|
+
out.ssl = await inspectSsl(parsed.hostname, parsed.port ? Number(parsed.port) : 443).catch((e) => ({ ok: false, error: String(e?.message || e) }));
|
|
99
|
+
if (out.ssl.ok) {
|
|
100
|
+
const daysLeft = out.ssl.days_until_expiry;
|
|
101
|
+
if (daysLeft != null && daysLeft < 0) {
|
|
102
|
+
out.signals.push({ id: 'ssl_expired', severity: 'high', message: `SSL certificate expired ${-daysLeft}d ago` });
|
|
103
|
+
} else if (daysLeft != null && daysLeft < 7) {
|
|
104
|
+
out.signals.push({ id: 'ssl_expiring', severity: 'medium', message: `SSL certificate expires in ${daysLeft} days` });
|
|
105
|
+
}
|
|
106
|
+
if (wabFields.ssl_thumbprint && out.ssl.fingerprint_sha256 &&
|
|
107
|
+
wabFields.ssl_thumbprint.toLowerCase() !== out.ssl.fingerprint_sha256.toLowerCase()) {
|
|
108
|
+
out.signals.push({ id: 'ssl_thumbprint_mismatch', severity: 'high',
|
|
109
|
+
message: 'SSL fingerprint does not match the value advertised via _wab DNS' });
|
|
110
|
+
}
|
|
111
|
+
}
|
|
112
|
+
}
|
|
113
|
+
|
|
114
|
+
// 4b. Extended Trust — Fallback mode.
|
|
115
|
+
// If SSL is degraded (expired / expiring / mismatch) BUT we have a
|
|
116
|
+
// cryptographically verified Ed25519 signature, surface a "partial trust"
|
|
117
|
+
// signal so the verdict stays yellow instead of crashing to red.
|
|
118
|
+
const sslDegraded = out.signals.some((s) =>
|
|
119
|
+
['ssl_expired', 'ssl_expiring', 'ssl_thumbprint_mismatch'].includes(s.id));
|
|
120
|
+
if (sslDegraded && out.trust && out.trust.ok) {
|
|
121
|
+
out.signals.push({ id: 'fallback_trust', severity: 'good',
|
|
122
|
+
message: 'Partial trust — SSL is degraded but the WAB Ed25519 signature is valid' });
|
|
123
|
+
out.fallback_trust = true;
|
|
124
|
+
}
|
|
125
|
+
|
|
126
|
+
// 5. Final level — combine signals
|
|
127
|
+
const verdict = computeLevel(out.signals, !!out.trust?.ok);
|
|
128
|
+
out.level = verdict.level;
|
|
129
|
+
out.score = verdict.score;
|
|
130
|
+
out.elapsed_ms = Date.now() - t0;
|
|
131
|
+
return out;
|
|
132
|
+
}
|
|
133
|
+
|
|
134
|
+
// ─── Helpers ──────────────────────────────────────────────────────────
|
|
135
|
+
|
|
136
|
+
function parseUrl(input) {
|
|
137
|
+
if (!input || typeof input !== 'string') { return null; }
|
|
138
|
+
let s = input.trim();
|
|
139
|
+
if (!/^[a-z][a-z0-9+.-]*:\/\//i.test(s)) { s = 'https://' + s; }
|
|
140
|
+
try { return new URL(s); } catch { return null; }
|
|
141
|
+
}
|
|
142
|
+
|
|
143
|
+
function applyHeuristics(parsed, out) {
|
|
144
|
+
const host = parsed.hostname.toLowerCase();
|
|
145
|
+
// IP-literal hosts are suspicious
|
|
146
|
+
if (/^\d+\.\d+\.\d+\.\d+$/.test(host) || host.includes(':')) {
|
|
147
|
+
out.signals.push({ id: 'ip_literal_host', severity: 'high', message: 'URL points to a raw IP address' });
|
|
148
|
+
}
|
|
149
|
+
if (SHORTENER_HOSTS.has(host)) {
|
|
150
|
+
out.signals.push({ id: 'shortener', severity: 'medium', message: `URL uses a shortener domain (${host})` });
|
|
151
|
+
}
|
|
152
|
+
if (parsed.protocol === 'http:') {
|
|
153
|
+
out.signals.push({ id: 'plain_http', severity: 'medium', message: 'URL uses plain HTTP (no TLS)' });
|
|
154
|
+
}
|
|
155
|
+
// Punycode / homoglyph hint
|
|
156
|
+
if (host.includes('xn--')) {
|
|
157
|
+
out.signals.push({ id: 'punycode', severity: 'medium', message: 'Hostname uses Punycode (possible homoglyph attack)' });
|
|
158
|
+
}
|
|
159
|
+
// Excessive subdomains
|
|
160
|
+
if (host.split('.').length > 5) {
|
|
161
|
+
out.signals.push({ id: 'deep_subdomain', severity: 'low', message: 'Hostname has unusually many subdomain levels' });
|
|
162
|
+
}
|
|
163
|
+
}
|
|
164
|
+
|
|
165
|
+
async function safeTxt(name) {
|
|
166
|
+
try {
|
|
167
|
+
const records = await dns.resolveTxt(name);
|
|
168
|
+
return { name, records: records.map((parts) => parts.join('')), error: null };
|
|
169
|
+
} catch (err) {
|
|
170
|
+
return { name, records: [], error: err.code || String(err.message || err) };
|
|
171
|
+
}
|
|
172
|
+
}
|
|
173
|
+
|
|
174
|
+
/**
|
|
175
|
+
* Parse `key=value;` style fields out of TXT records that begin with `v=wab1`.
|
|
176
|
+
* Returns merged object with at least:
|
|
177
|
+
* v, endpoint, pk, ssl_thumbprint, ssl_expires, shieldqr
|
|
178
|
+
*/
|
|
179
|
+
function parseWabTxt(rawRecords) {
|
|
180
|
+
const out = {};
|
|
181
|
+
for (const rec of rawRecords) {
|
|
182
|
+
if (!/v\s*=\s*wab1/i.test(rec)) { continue; }
|
|
183
|
+
const parts = rec.split(';').map((p) => p.trim()).filter(Boolean);
|
|
184
|
+
for (const p of parts) {
|
|
185
|
+
const eq = p.indexOf('=');
|
|
186
|
+
if (eq < 0) { continue; }
|
|
187
|
+
const k = p.slice(0, eq).trim().toLowerCase();
|
|
188
|
+
const v = p.slice(eq + 1).trim();
|
|
189
|
+
if (k && v && !out[k]) { out[k] = v; }
|
|
190
|
+
}
|
|
191
|
+
}
|
|
192
|
+
return out;
|
|
193
|
+
}
|
|
194
|
+
|
|
195
|
+
async function verifyTrust(parsed, wabFields) {
|
|
196
|
+
const base = wabFields.endpoint && /^https?:\/\//i.test(wabFields.endpoint)
|
|
197
|
+
? wabFields.endpoint
|
|
198
|
+
: `${parsed.origin}/.well-known/wab.json`;
|
|
199
|
+
const wabJsonUrl = wabFields.endpoint && wabFields.endpoint.endsWith('.json')
|
|
200
|
+
? wabFields.endpoint
|
|
201
|
+
: (base.endsWith('/') ? base + '.well-known/wab.json' : base + '/.well-known/wab.json');
|
|
202
|
+
|
|
203
|
+
const fetched = await fetchSmall(wabJsonUrl);
|
|
204
|
+
if (!fetched.ok) { return { ok: false, error: `cannot fetch wab.json (${fetched.error || fetched.status})` }; }
|
|
205
|
+
|
|
206
|
+
let doc;
|
|
207
|
+
try { doc = JSON.parse(fetched.body); } catch { return { ok: false, error: 'wab.json is not valid JSON' }; }
|
|
208
|
+
|
|
209
|
+
// signature is over the canonical JSON of `doc.payload`
|
|
210
|
+
const sig = doc.signature;
|
|
211
|
+
const pkRaw = wabFields.pk || (doc.trust && doc.trust.pk);
|
|
212
|
+
if (!sig || !pkRaw || !doc.payload) {
|
|
213
|
+
return { ok: false, error: 'wab.json missing payload/signature/pk' };
|
|
214
|
+
}
|
|
215
|
+
const pk = pkRaw.replace(/^ed25519:/i, '');
|
|
216
|
+
|
|
217
|
+
let pkBytes;
|
|
218
|
+
try { pkBytes = Buffer.from(pk, 'base64'); } catch { return { ok: false, error: 'invalid base64 pk' }; }
|
|
219
|
+
if (pkBytes.length !== 32) { return { ok: false, error: `pk has wrong length (${pkBytes.length} bytes, want 32)` }; }
|
|
220
|
+
let sigBytes;
|
|
221
|
+
try { sigBytes = Buffer.from(sig.replace(/^ed25519:/i, ''), 'base64'); } catch { return { ok: false, error: 'invalid base64 signature' }; }
|
|
222
|
+
|
|
223
|
+
// Wrap raw 32-byte Ed25519 public key in DER (SubjectPublicKeyInfo)
|
|
224
|
+
const der = Buffer.concat([
|
|
225
|
+
Buffer.from('302a300506032b6570032100', 'hex'),
|
|
226
|
+
pkBytes,
|
|
227
|
+
]);
|
|
228
|
+
let pubKey;
|
|
229
|
+
try { pubKey = crypto.createPublicKey({ key: der, format: 'der', type: 'spki' }); }
|
|
230
|
+
catch (e) { return { ok: false, error: 'cannot import Ed25519 pk: ' + e.message }; }
|
|
231
|
+
|
|
232
|
+
const message = Buffer.from(canonicalJson(doc.payload), 'utf8');
|
|
233
|
+
const ok = crypto.verify(null, message, pubKey, sigBytes);
|
|
234
|
+
|
|
235
|
+
return { ok, payload: doc.payload, signed_with: pk };
|
|
236
|
+
}
|
|
237
|
+
|
|
238
|
+
function canonicalJson(obj) {
|
|
239
|
+
if (obj === null || typeof obj !== 'object') { return JSON.stringify(obj); }
|
|
240
|
+
if (Array.isArray(obj)) { return '[' + obj.map(canonicalJson).join(',') + ']'; }
|
|
241
|
+
const keys = Object.keys(obj).sort();
|
|
242
|
+
return '{' + keys.map((k) => JSON.stringify(k) + ':' + canonicalJson(obj[k])).join(',') + '}';
|
|
243
|
+
}
|
|
244
|
+
|
|
245
|
+
function fetchSmall(url) {
|
|
246
|
+
return new Promise((resolve) => {
|
|
247
|
+
let mod;
|
|
248
|
+
try { mod = url.startsWith('https:') ? https : http; } catch { return resolve({ ok: false, error: 'bad url' }); }
|
|
249
|
+
const req = mod.get(url, { timeout: FETCH_TIMEOUT_MS, headers: { 'User-Agent': 'WAB-ShieldQR/1.0' } }, (res) => {
|
|
250
|
+
if (res.statusCode && res.statusCode >= 300 && res.statusCode < 400 && res.headers.location) {
|
|
251
|
+
res.resume();
|
|
252
|
+
return resolve({ ok: false, status: res.statusCode, error: 'redirect_not_followed' });
|
|
253
|
+
}
|
|
254
|
+
let bytes = 0;
|
|
255
|
+
const chunks = [];
|
|
256
|
+
res.on('data', (c) => {
|
|
257
|
+
bytes += c.length;
|
|
258
|
+
if (bytes > MAX_BODY_BYTES) { req.destroy(); return; }
|
|
259
|
+
chunks.push(c);
|
|
260
|
+
});
|
|
261
|
+
res.on('end', () => resolve({
|
|
262
|
+
ok: (res.statusCode || 0) >= 200 && (res.statusCode || 0) < 300,
|
|
263
|
+
status: res.statusCode,
|
|
264
|
+
body: Buffer.concat(chunks).toString('utf8'),
|
|
265
|
+
}));
|
|
266
|
+
});
|
|
267
|
+
req.on('timeout', () => { req.destroy(); resolve({ ok: false, error: 'timeout' }); });
|
|
268
|
+
req.on('error', (e) => resolve({ ok: false, error: e.message }));
|
|
269
|
+
});
|
|
270
|
+
}
|
|
271
|
+
|
|
272
|
+
function inspectSsl(host, port) {
|
|
273
|
+
return new Promise((resolve) => {
|
|
274
|
+
const socket = tls.connect({ host, port, servername: host, timeout: FETCH_TIMEOUT_MS, rejectUnauthorized: false }, () => {
|
|
275
|
+
const cert = socket.getPeerCertificate(true);
|
|
276
|
+
socket.end();
|
|
277
|
+
if (!cert || !cert.valid_to) { return resolve({ ok: false, error: 'no certificate returned' }); }
|
|
278
|
+
const expiry = new Date(cert.valid_to);
|
|
279
|
+
const days = Math.floor((expiry.getTime() - Date.now()) / 86400000);
|
|
280
|
+
const fp = (cert.fingerprint256 || '').replace(/:/g, '').toLowerCase();
|
|
281
|
+
resolve({
|
|
282
|
+
ok: true,
|
|
283
|
+
issuer: cert.issuer && (cert.issuer.O || cert.issuer.CN) || null,
|
|
284
|
+
subject: cert.subject && cert.subject.CN || null,
|
|
285
|
+
valid_to: cert.valid_to,
|
|
286
|
+
valid_from: cert.valid_from,
|
|
287
|
+
days_until_expiry: days,
|
|
288
|
+
fingerprint_sha256: fp,
|
|
289
|
+
authorized: socket.authorized,
|
|
290
|
+
protocol: socket.getProtocol && socket.getProtocol(),
|
|
291
|
+
});
|
|
292
|
+
});
|
|
293
|
+
socket.on('error', (e) => resolve({ ok: false, error: e.message }));
|
|
294
|
+
socket.on('timeout', () => { socket.destroy(); resolve({ ok: false, error: 'timeout' }); });
|
|
295
|
+
});
|
|
296
|
+
}
|
|
297
|
+
|
|
298
|
+
function computeLevel(signals, signedOk) {
|
|
299
|
+
let score = 60; // neutral start
|
|
300
|
+
for (const s of signals) {
|
|
301
|
+
if (s.severity === 'good') { score += 20; }
|
|
302
|
+
else if (s.severity === 'low') { score -= 5; }
|
|
303
|
+
else if (s.severity === 'medium') { score -= 18; }
|
|
304
|
+
else if (s.severity === 'high') { score -= 40; }
|
|
305
|
+
}
|
|
306
|
+
if (signedOk) { score = Math.max(score, 90); }
|
|
307
|
+
score = Math.max(0, Math.min(100, score));
|
|
308
|
+
const fallback = signals.some((s) => s.id === 'fallback_trust');
|
|
309
|
+
let level = 'yellow';
|
|
310
|
+
if (score >= 75 && signedOk && !fallback) { level = 'green'; }
|
|
311
|
+
else if (score >= 65) { level = 'yellow'; }
|
|
312
|
+
else if (score < 35) { level = 'red'; }
|
|
313
|
+
else { level = 'yellow'; }
|
|
314
|
+
// Hard-fail on any high-severity signal unless we have a verified signature
|
|
315
|
+
// (Extended Trust Layer: signature acts as fallback authority when SSL fails).
|
|
316
|
+
if (signals.some((s) => s.severity === 'high') && !signedOk) { level = 'red'; }
|
|
317
|
+
// With signed fallback, never drop below yellow.
|
|
318
|
+
if (fallback && level === 'red') { level = 'yellow'; }
|
|
319
|
+
return { level, score };
|
|
320
|
+
}
|
|
321
|
+
|
|
322
|
+
module.exports = { scan, parseWabTxt, canonicalJson };
|