web-agent-bridge 3.2.0 → 3.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +84 -72
- package/README.ar.md +1304 -1152
- package/README.md +298 -1635
- package/bin/agent-runner.js +474 -474
- package/bin/cli.js +237 -138
- package/bin/wab-init.js +223 -0
- package/bin/wab.js +80 -80
- package/examples/azure-dns-wab.js +83 -0
- package/examples/bidi-agent.js +119 -119
- package/examples/cloudflare-wab-dns.js +121 -0
- package/examples/cpanel-wab-dns.js +114 -0
- package/examples/cross-site-agent.js +91 -91
- package/examples/dns-discovery-agent.js +166 -0
- package/examples/gcp-dns-wab.js +76 -0
- package/examples/governance-agent.js +169 -0
- package/examples/mcp-agent.js +94 -94
- package/examples/next-app-router/README.md +44 -44
- package/examples/plesk-wab-dns.js +103 -0
- package/examples/puppeteer-agent.js +108 -108
- package/examples/route53-wab-dns.js +144 -0
- package/examples/saas-dashboard/README.md +55 -55
- package/examples/safe-mode-agent.js +96 -0
- package/examples/shopify-hydrogen/README.md +74 -74
- package/examples/vision-agent.js +171 -171
- package/examples/wab-sign.js +74 -0
- package/examples/wab-verify.js +60 -0
- package/examples/wordpress-elementor/README.md +77 -77
- package/package.json +19 -6
- package/public/.well-known/agent-tools.json +180 -180
- package/public/.well-known/ai-assets.json +59 -59
- package/public/.well-known/security.txt +8 -0
- package/public/.well-known/wab.json +28 -0
- package/public/activate.html +368 -0
- package/public/adoption-metrics.html +188 -0
- package/public/agent-workspace.html +349 -349
- package/public/ai.html +198 -198
- package/public/api.html +413 -412
- package/public/azure-dns-integration.html +289 -0
- package/public/browser.html +486 -486
- package/public/cloudflare-integration.html +380 -0
- package/public/commander-dashboard.html +243 -243
- package/public/cookies.html +210 -210
- package/public/cpanel-integration.html +398 -0
- package/public/css/agent-workspace.css +1713 -1713
- package/public/css/premium.css +317 -317
- package/public/css/styles.css +1263 -1235
- package/public/dashboard.html +707 -706
- package/public/dns.html +436 -0
- package/public/docs.html +588 -587
- package/public/feed.xml +89 -89
- package/public/gcp-dns-integration.html +318 -0
- package/public/growth.html +465 -463
- package/public/index.html +1266 -982
- package/public/integrations.html +556 -0
- package/public/js/activate.js +145 -0
- package/public/js/agent-workspace.js +1740 -1740
- package/public/js/auth-nav.js +65 -31
- package/public/js/auth-redirect.js +12 -12
- package/public/js/cookie-consent.js +56 -56
- package/public/js/dns.js +438 -0
- package/public/js/wab-demo-page.js +721 -721
- package/public/js/ws-client.js +74 -74
- package/public/llms-full.txt +360 -360
- package/public/llms.txt +125 -125
- package/public/login.html +85 -85
- package/public/mesh-dashboard.html +328 -328
- package/public/openapi.json +669 -580
- package/public/phone-shield.html +281 -0
- package/public/plesk-integration.html +375 -0
- package/public/premium-dashboard.html +2489 -2489
- package/public/premium.html +793 -793
- package/public/privacy.html +297 -297
- package/public/provider-onboarding.html +172 -0
- package/public/provider-sandbox.html +134 -0
- package/public/providers.html +359 -0
- package/public/register.html +105 -105
- package/public/registrar-integrations.html +141 -0
- package/public/robots.txt +99 -87
- package/public/route53-integration.html +531 -0
- package/public/script/wab-consent.d.ts +36 -36
- package/public/script/wab-consent.js +104 -104
- package/public/script/wab-schema.js +131 -131
- package/public/script/wab.d.ts +108 -108
- package/public/script/wab.min.js +580 -580
- package/public/security.txt +8 -0
- package/public/shieldqr.html +231 -0
- package/public/sitemap.xml +6 -0
- package/public/terms.html +256 -256
- package/public/wab-trust.html +200 -0
- package/public/wab-vs-protocols.html +210 -0
- package/public/whitepaper.html +449 -0
- package/script/ai-agent-bridge.js +1754 -1754
- package/sdk/README.md +99 -99
- package/sdk/agent-mesh.js +449 -449
- package/sdk/auto-discovery.js +288 -0
- package/sdk/commander.js +262 -262
- package/sdk/governance.js +262 -0
- package/sdk/index.d.ts +464 -464
- package/sdk/index.js +25 -1
- package/sdk/multi-agent.js +318 -318
- package/sdk/package.json +2 -2
- package/sdk/safe-mode.js +221 -0
- package/sdk/safety-shield.js +219 -0
- package/sdk/schema-discovery.js +83 -83
- package/server/adapters/index.js +520 -520
- package/server/config/plans.js +367 -367
- package/server/config/secrets.js +102 -102
- package/server/control-plane/index.js +301 -301
- package/server/data-plane/index.js +354 -354
- package/server/index.js +670 -427
- package/server/llm/index.js +404 -404
- package/server/middleware/adminAuth.js +35 -35
- package/server/middleware/auth.js +50 -50
- package/server/middleware/featureGate.js +88 -88
- package/server/middleware/rateLimits.js +100 -100
- package/server/middleware/sensitiveAction.js +157 -0
- package/server/migrations/001_add_analytics_indexes.sql +7 -7
- package/server/migrations/002_premium_features.sql +418 -418
- package/server/migrations/003_ads_integer_cents.sql +33 -33
- package/server/migrations/004_agent_os.sql +158 -158
- package/server/migrations/005_marketplace_metering.sql +126 -126
- package/server/migrations/007_governance.sql +106 -0
- package/server/migrations/008_plans.sql +144 -0
- package/server/migrations/009_shieldqr.sql +30 -0
- package/server/migrations/010_extended_trust.sql +33 -0
- package/server/models/adapters/index.js +33 -33
- package/server/models/adapters/mysql.js +183 -183
- package/server/models/adapters/postgresql.js +172 -172
- package/server/models/adapters/sqlite.js +7 -7
- package/server/models/db.js +740 -681
- package/server/observability/failure-analysis.js +337 -337
- package/server/observability/index.js +394 -394
- package/server/protocol/capabilities.js +223 -223
- package/server/protocol/index.js +243 -243
- package/server/protocol/schema.js +584 -584
- package/server/registry/certification.js +271 -271
- package/server/registry/index.js +326 -326
- package/server/routes/admin-plans.js +76 -0
- package/server/routes/admin-premium.js +673 -671
- package/server/routes/admin-shieldqr.js +90 -0
- package/server/routes/admin-trust-monitor.js +83 -0
- package/server/routes/admin.js +549 -261
- package/server/routes/ads.js +130 -130
- package/server/routes/agent-workspace.js +540 -540
- package/server/routes/api.js +150 -150
- package/server/routes/auth.js +71 -71
- package/server/routes/billing.js +57 -45
- package/server/routes/commander.js +316 -316
- package/server/routes/demo-showcase.js +332 -332
- package/server/routes/demo-store.js +154 -0
- package/server/routes/discovery.js +2348 -417
- package/server/routes/gateway.js +173 -157
- package/server/routes/governance.js +208 -0
- package/server/routes/license.js +251 -240
- package/server/routes/mesh.js +469 -469
- package/server/routes/noscript.js +543 -543
- package/server/routes/plans.js +33 -0
- package/server/routes/premium-v2.js +686 -686
- package/server/routes/premium.js +724 -724
- package/server/routes/providers.js +650 -0
- package/server/routes/runtime.js +2148 -2147
- package/server/routes/shieldqr.js +88 -0
- package/server/routes/sovereign.js +465 -385
- package/server/routes/universal.js +200 -185
- package/server/routes/wab-api.js +850 -501
- package/server/runtime/container-worker.js +111 -111
- package/server/runtime/container.js +448 -448
- package/server/runtime/distributed-worker.js +362 -362
- package/server/runtime/event-bus.js +210 -210
- package/server/runtime/index.js +253 -253
- package/server/runtime/queue.js +599 -599
- package/server/runtime/replay.js +666 -666
- package/server/runtime/sandbox.js +266 -266
- package/server/runtime/scheduler.js +534 -534
- package/server/runtime/session-engine.js +293 -293
- package/server/runtime/state-manager.js +188 -188
- package/server/security/cross-site-redactor.js +196 -0
- package/server/security/dry-run.js +180 -0
- package/server/security/human-gate-rate-limit.js +147 -0
- package/server/security/human-gate-transports.js +178 -0
- package/server/security/human-gate.js +281 -0
- package/server/security/index.js +368 -368
- package/server/security/intent-engine.js +245 -0
- package/server/security/reward-guard.js +171 -0
- package/server/security/rollback-store.js +239 -0
- package/server/security/token-scope.js +404 -0
- package/server/security/url-policy.js +139 -0
- package/server/services/agent-chat.js +506 -506
- package/server/services/agent-learning.js +601 -575
- package/server/services/agent-memory.js +625 -625
- package/server/services/agent-mesh.js +555 -539
- package/server/services/agent-symphony.js +717 -717
- package/server/services/agent-tasks.js +1807 -1807
- package/server/services/api-key-engine.js +292 -261
- package/server/services/cluster.js +894 -894
- package/server/services/commander.js +738 -738
- package/server/services/edge-compute.js +440 -440
- package/server/services/email.js +233 -204
- package/server/services/governance.js +466 -0
- package/server/services/hosted-runtime.js +205 -205
- package/server/services/lfd.js +635 -635
- package/server/services/local-ai.js +389 -389
- package/server/services/marketplace.js +270 -270
- package/server/services/metering.js +182 -182
- package/server/services/modules/affiliate-intelligence.js +93 -93
- package/server/services/modules/agent-firewall.js +90 -90
- package/server/services/modules/bounty.js +89 -89
- package/server/services/modules/collective-bargaining.js +92 -92
- package/server/services/modules/dark-pattern.js +66 -66
- package/server/services/modules/gov-intelligence.js +45 -45
- package/server/services/modules/neural.js +55 -55
- package/server/services/modules/notary.js +49 -49
- package/server/services/modules/price-time-machine.js +86 -86
- package/server/services/modules/protocol.js +104 -104
- package/server/services/negotiation.js +439 -439
- package/server/services/plans.js +214 -0
- package/server/services/plugins.js +771 -771
- package/server/services/premium.js +1 -1
- package/server/services/price-intelligence.js +566 -566
- package/server/services/price-shield.js +1137 -1137
- package/server/services/provider-clients.js +740 -0
- package/server/services/reputation.js +465 -465
- package/server/services/search-engine.js +357 -357
- package/server/services/security.js +513 -513
- package/server/services/self-healing.js +843 -843
- package/server/services/shieldqr.js +322 -0
- package/server/services/sovereign-shield.js +542 -0
- package/server/services/ssl-inspector.js +42 -0
- package/server/services/ssl-monitor.js +167 -0
- package/server/services/stripe.js +205 -192
- package/server/services/swarm.js +788 -788
- package/server/services/universal-scraper.js +662 -661
- package/server/services/verification.js +481 -481
- package/server/services/vision.js +1163 -1163
- package/server/services/wab-crypto.js +178 -0
- package/server/utils/cache.js +125 -125
- package/server/utils/migrate.js +81 -81
- package/server/utils/safe-fetch.js +228 -0
- package/server/utils/secureFields.js +50 -50
- package/server/ws.js +161 -161
- package/templates/artisan-marketplace.yaml +104 -104
- package/templates/book-price-scout.yaml +98 -98
- package/templates/electronics-price-tracker.yaml +108 -108
- package/templates/flight-deal-hunter.yaml +113 -113
- package/templates/freelancer-direct.yaml +116 -116
- package/templates/grocery-price-compare.yaml +93 -93
- package/templates/hotel-direct-booking.yaml +113 -113
- package/templates/local-services.yaml +98 -98
- package/templates/olive-oil-tunisia.yaml +88 -88
- package/templates/organic-farm-fresh.yaml +101 -101
- package/templates/restaurant-direct.yaml +97 -97
- package/public/score.html +0 -263
- package/server/migrations/006_growth_suite.sql +0 -138
- package/server/routes/growth.js +0 -962
- package/server/services/fairness-engine.js +0 -409
- package/server/services/fairness.js +0 -420
|
@@ -0,0 +1,542 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const crypto = require('crypto');
|
|
4
|
+
|
|
5
|
+
const SUSPICIOUS_TLDS = new Set([
|
|
6
|
+
'tk', 'ml', 'ga', 'cf', 'gq', 'top', 'click', 'work', 'bid', 'review', 'stream', 'zip'
|
|
7
|
+
]);
|
|
8
|
+
|
|
9
|
+
// Seed list: high-risk infra patterns + commonly abused domains.
|
|
10
|
+
// This list is intentionally conservative to reduce false positives.
|
|
11
|
+
const SEED_INDICATORS = [
|
|
12
|
+
{ host: 'api.telegram-cdn.com', level: 'high', source: 'research' },
|
|
13
|
+
{ host: 'cdn-whatsapp-secure.com', level: 'high', source: 'research' },
|
|
14
|
+
{ host: 'icloud-security-check.com', level: 'high', source: 'research' },
|
|
15
|
+
{ host: 'appleid-login-secure.com', level: 'high', source: 'research' },
|
|
16
|
+
{ host: 'google-auth-verify.net', level: 'high', source: 'research' },
|
|
17
|
+
{ host: 'meta-business-security.com', level: 'high', source: 'research' }
|
|
18
|
+
];
|
|
19
|
+
|
|
20
|
+
const RISKY_APPS = new Set(['whatsapp', 'messenger', 'telegram', 'signal', 'mail', 'gmail', 'photos', 'gallery']);
|
|
21
|
+
|
|
22
|
+
const state = {
|
|
23
|
+
indicators: new Map(), // host -> { host, level, source, firstSeen, lastSeen, reports, confidence }
|
|
24
|
+
reportsByHost: new Map(), // host -> Map(reporterFingerprint -> timestamp)
|
|
25
|
+
devices: new Map(), // fingerprint -> { platform, appVersion, osVersion, model, firstSeen, lastSeen, telemetryCount, blocks }
|
|
26
|
+
events: [],
|
|
27
|
+
stats: {
|
|
28
|
+
analyzed: 0,
|
|
29
|
+
blocked: 0,
|
|
30
|
+
warned: 0,
|
|
31
|
+
vaultEncryptOps: 0,
|
|
32
|
+
vaultDecryptOps: 0,
|
|
33
|
+
communityReports: 0,
|
|
34
|
+
mobileDeviceRegistrations: 0,
|
|
35
|
+
mobileHeartbeats: 0,
|
|
36
|
+
telemetryBatches: 0,
|
|
37
|
+
telemetryPackets: 0
|
|
38
|
+
},
|
|
39
|
+
version: 1
|
|
40
|
+
};
|
|
41
|
+
|
|
42
|
+
for (const seed of SEED_INDICATORS) {
|
|
43
|
+
const now = Date.now();
|
|
44
|
+
state.indicators.set(seed.host, {
|
|
45
|
+
host: seed.host,
|
|
46
|
+
level: seed.level,
|
|
47
|
+
source: seed.source,
|
|
48
|
+
firstSeen: now,
|
|
49
|
+
lastSeen: now,
|
|
50
|
+
reports: 1,
|
|
51
|
+
confidence: 0.7
|
|
52
|
+
});
|
|
53
|
+
}
|
|
54
|
+
|
|
55
|
+
function recordEvent(type, payload) {
|
|
56
|
+
state.events.unshift({
|
|
57
|
+
id: crypto.randomUUID(),
|
|
58
|
+
type,
|
|
59
|
+
timestamp: new Date().toISOString(),
|
|
60
|
+
payload
|
|
61
|
+
});
|
|
62
|
+
if (state.events.length > 500) state.events.pop();
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
function normalizeHost(value) {
|
|
66
|
+
if (!value || typeof value !== 'string') return '';
|
|
67
|
+
let host = value.trim().toLowerCase();
|
|
68
|
+
if (!host) return '';
|
|
69
|
+
try {
|
|
70
|
+
if (host.startsWith('http://') || host.startsWith('https://')) {
|
|
71
|
+
host = new URL(host).hostname.toLowerCase();
|
|
72
|
+
}
|
|
73
|
+
} catch {
|
|
74
|
+
return '';
|
|
75
|
+
}
|
|
76
|
+
return host.replace(/^www\./, '');
|
|
77
|
+
}
|
|
78
|
+
|
|
79
|
+
function getRootDomain(host) {
|
|
80
|
+
const parts = host.split('.');
|
|
81
|
+
if (parts.length < 2) return host;
|
|
82
|
+
return parts.slice(-2).join('.');
|
|
83
|
+
}
|
|
84
|
+
|
|
85
|
+
function hasKnownIndicator(host) {
|
|
86
|
+
if (!host) return null;
|
|
87
|
+
const root = getRootDomain(host);
|
|
88
|
+
if (state.indicators.has(host)) return state.indicators.get(host);
|
|
89
|
+
if (state.indicators.has(root)) return state.indicators.get(root);
|
|
90
|
+
for (const [indicatorHost, indicator] of state.indicators.entries()) {
|
|
91
|
+
if (host.endsWith('.' + indicatorHost)) return indicator;
|
|
92
|
+
}
|
|
93
|
+
return null;
|
|
94
|
+
}
|
|
95
|
+
|
|
96
|
+
function heuristicScore({ app, host, bytesOut = 0, bytesIn = 0, background = false, micAccess = false, cameraAccess = false, contactsAccess = false }) {
|
|
97
|
+
let score = 0;
|
|
98
|
+
const reasons = [];
|
|
99
|
+
|
|
100
|
+
const tld = host.split('.').pop() || '';
|
|
101
|
+
if (SUSPICIOUS_TLDS.has(tld)) {
|
|
102
|
+
score += 25;
|
|
103
|
+
reasons.push('suspicious_tld');
|
|
104
|
+
}
|
|
105
|
+
|
|
106
|
+
if ((host.match(/-/g) || []).length >= 3) {
|
|
107
|
+
score += 10;
|
|
108
|
+
reasons.push('hyphen_abuse');
|
|
109
|
+
}
|
|
110
|
+
|
|
111
|
+
if (/\d{4,}/.test(host)) {
|
|
112
|
+
score += 10;
|
|
113
|
+
reasons.push('numeric_domain_pattern');
|
|
114
|
+
}
|
|
115
|
+
|
|
116
|
+
const root = getRootDomain(host);
|
|
117
|
+
const trustedBrands = ['apple.com', 'google.com', 'microsoft.com', 'meta.com', 'whatsapp.com'];
|
|
118
|
+
if ((root.includes('apple') || root.includes('google') || root.includes('meta') || root.includes('microsoft'))
|
|
119
|
+
&& !trustedBrands.includes(root)) {
|
|
120
|
+
score += 30;
|
|
121
|
+
reasons.push('possible_brand_impersonation');
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
const appName = String(app || '').toLowerCase();
|
|
125
|
+
const totalBytes = Number(bytesOut || 0) + Number(bytesIn || 0);
|
|
126
|
+
if (background && totalBytes > 2_000_000 && RISKY_APPS.has(appName)) {
|
|
127
|
+
score += 20;
|
|
128
|
+
reasons.push('background_high_transfer');
|
|
129
|
+
}
|
|
130
|
+
|
|
131
|
+
if ((micAccess || cameraAccess || contactsAccess) && background) {
|
|
132
|
+
score += 20;
|
|
133
|
+
reasons.push('sensitive_access_in_background');
|
|
134
|
+
}
|
|
135
|
+
|
|
136
|
+
if (bytesOut > 5_000_000 && bytesIn < 300_000) {
|
|
137
|
+
score += 15;
|
|
138
|
+
reasons.push('possible_exfiltration_pattern');
|
|
139
|
+
}
|
|
140
|
+
|
|
141
|
+
return { score: Math.min(score, 100), reasons };
|
|
142
|
+
}
|
|
143
|
+
|
|
144
|
+
function analyzeConnection(payload) {
|
|
145
|
+
const app = String(payload?.app || payload?.appName || 'unknown').slice(0, 120);
|
|
146
|
+
const host = normalizeHost(payload?.destination || payload?.host || payload?.url || '');
|
|
147
|
+
if (!host) {
|
|
148
|
+
return { error: 'destination/host/url required' };
|
|
149
|
+
}
|
|
150
|
+
|
|
151
|
+
const indicator = hasKnownIndicator(host);
|
|
152
|
+
const heuristic = heuristicScore({
|
|
153
|
+
app,
|
|
154
|
+
host,
|
|
155
|
+
bytesOut: Number(payload?.bytesOut || 0),
|
|
156
|
+
bytesIn: Number(payload?.bytesIn || 0),
|
|
157
|
+
background: Boolean(payload?.background),
|
|
158
|
+
micAccess: Boolean(payload?.micAccess),
|
|
159
|
+
cameraAccess: Boolean(payload?.cameraAccess),
|
|
160
|
+
contactsAccess: Boolean(payload?.contactsAccess)
|
|
161
|
+
});
|
|
162
|
+
|
|
163
|
+
let riskScore = heuristic.score;
|
|
164
|
+
let decision = 'allow';
|
|
165
|
+
const reasons = [...heuristic.reasons];
|
|
166
|
+
|
|
167
|
+
if (indicator) {
|
|
168
|
+
riskScore = Math.max(riskScore, indicator.level === 'high' ? 95 : 80);
|
|
169
|
+
reasons.push('known_indicator_match');
|
|
170
|
+
}
|
|
171
|
+
|
|
172
|
+
if (riskScore >= 85) decision = 'block';
|
|
173
|
+
else if (riskScore >= 45) decision = 'warn';
|
|
174
|
+
|
|
175
|
+
state.stats.analyzed += 1;
|
|
176
|
+
if (decision === 'block') state.stats.blocked += 1;
|
|
177
|
+
if (decision === 'warn') state.stats.warned += 1;
|
|
178
|
+
|
|
179
|
+
const result = {
|
|
180
|
+
app,
|
|
181
|
+
host,
|
|
182
|
+
riskScore,
|
|
183
|
+
decision,
|
|
184
|
+
reasons,
|
|
185
|
+
indicator: indicator ? {
|
|
186
|
+
host: indicator.host,
|
|
187
|
+
level: indicator.level,
|
|
188
|
+
source: indicator.source,
|
|
189
|
+
confidence: indicator.confidence
|
|
190
|
+
} : null,
|
|
191
|
+
analyzedAt: new Date().toISOString()
|
|
192
|
+
};
|
|
193
|
+
|
|
194
|
+
recordEvent('connection_analysis', result);
|
|
195
|
+
return result;
|
|
196
|
+
}
|
|
197
|
+
|
|
198
|
+
function getIntelFeed() {
|
|
199
|
+
return {
|
|
200
|
+
schema: 'wab-sovereign-shield-v1',
|
|
201
|
+
version: state.version,
|
|
202
|
+
generatedAt: new Date().toISOString(),
|
|
203
|
+
indicators: Array.from(state.indicators.values()).map((i) => ({
|
|
204
|
+
host: i.host,
|
|
205
|
+
level: i.level,
|
|
206
|
+
confidence: i.confidence,
|
|
207
|
+
source: i.source,
|
|
208
|
+
lastSeen: new Date(i.lastSeen).toISOString()
|
|
209
|
+
}))
|
|
210
|
+
};
|
|
211
|
+
}
|
|
212
|
+
|
|
213
|
+
function submitThreatReport(payload) {
|
|
214
|
+
const host = normalizeHost(payload?.host || payload?.destination || payload?.url || '');
|
|
215
|
+
const reporter = String(payload?.reporterFingerprint || payload?.deviceFingerprint || payload?.reporter || '').slice(0, 128);
|
|
216
|
+
const severity = String(payload?.severity || 'medium').toLowerCase();
|
|
217
|
+
if (!host || !reporter) return { error: 'host and reporterFingerprint are required' };
|
|
218
|
+
|
|
219
|
+
state.stats.communityReports += 1;
|
|
220
|
+
|
|
221
|
+
if (!state.reportsByHost.has(host)) state.reportsByHost.set(host, new Map());
|
|
222
|
+
state.reportsByHost.get(host).set(reporter, Date.now());
|
|
223
|
+
const uniqueReports = state.reportsByHost.get(host).size;
|
|
224
|
+
|
|
225
|
+
const level = severity === 'critical' ? 'high' : (severity === 'low' ? 'medium' : 'high');
|
|
226
|
+
const now = Date.now();
|
|
227
|
+
const existing = state.indicators.get(host);
|
|
228
|
+
|
|
229
|
+
const next = {
|
|
230
|
+
host,
|
|
231
|
+
level: existing?.level || level,
|
|
232
|
+
source: existing?.source || 'community',
|
|
233
|
+
firstSeen: existing?.firstSeen || now,
|
|
234
|
+
lastSeen: now,
|
|
235
|
+
reports: (existing?.reports || 0) + 1,
|
|
236
|
+
confidence: Math.min(0.4 + uniqueReports * 0.15, 0.98)
|
|
237
|
+
};
|
|
238
|
+
|
|
239
|
+
// Auto-promote to blocklist-grade indicator after 3 independent reports.
|
|
240
|
+
if (uniqueReports >= 3) {
|
|
241
|
+
next.level = 'high';
|
|
242
|
+
next.source = 'community-verified';
|
|
243
|
+
state.version += 1;
|
|
244
|
+
}
|
|
245
|
+
|
|
246
|
+
state.indicators.set(host, next);
|
|
247
|
+
|
|
248
|
+
const result = {
|
|
249
|
+
accepted: true,
|
|
250
|
+
host,
|
|
251
|
+
uniqueReports,
|
|
252
|
+
promoted: uniqueReports >= 3,
|
|
253
|
+
confidence: next.confidence,
|
|
254
|
+
intelVersion: state.version
|
|
255
|
+
};
|
|
256
|
+
|
|
257
|
+
recordEvent('community_report', {
|
|
258
|
+
host,
|
|
259
|
+
uniqueReports,
|
|
260
|
+
promoted: result.promoted,
|
|
261
|
+
severity
|
|
262
|
+
});
|
|
263
|
+
|
|
264
|
+
return result;
|
|
265
|
+
}
|
|
266
|
+
|
|
267
|
+
function normalizeFingerprint(value) {
|
|
268
|
+
if (!value || typeof value !== 'string') return '';
|
|
269
|
+
return value.trim().toLowerCase().slice(0, 128);
|
|
270
|
+
}
|
|
271
|
+
|
|
272
|
+
function registerDevice(payload) {
|
|
273
|
+
const fingerprint = normalizeFingerprint(payload?.deviceFingerprint || payload?.fingerprint || payload?.deviceId || '');
|
|
274
|
+
const platform = String(payload?.platform || '').toLowerCase();
|
|
275
|
+
if (!fingerprint || !platform) return { error: 'deviceFingerprint and platform are required' };
|
|
276
|
+
|
|
277
|
+
const now = Date.now();
|
|
278
|
+
const current = state.devices.get(fingerprint) || {
|
|
279
|
+
deviceFingerprint: fingerprint,
|
|
280
|
+
platform,
|
|
281
|
+
appVersion: '',
|
|
282
|
+
osVersion: '',
|
|
283
|
+
model: '',
|
|
284
|
+
firstSeen: now,
|
|
285
|
+
lastSeen: now,
|
|
286
|
+
telemetryCount: 0,
|
|
287
|
+
blocks: 0,
|
|
288
|
+
warns: 0
|
|
289
|
+
};
|
|
290
|
+
|
|
291
|
+
current.platform = platform;
|
|
292
|
+
current.appVersion = String(payload?.appVersion || current.appVersion || '').slice(0, 50);
|
|
293
|
+
current.osVersion = String(payload?.osVersion || current.osVersion || '').slice(0, 50);
|
|
294
|
+
current.model = String(payload?.model || current.model || '').slice(0, 80);
|
|
295
|
+
current.lastSeen = now;
|
|
296
|
+
|
|
297
|
+
state.devices.set(fingerprint, current);
|
|
298
|
+
state.stats.mobileDeviceRegistrations += 1;
|
|
299
|
+
recordEvent('device_register', {
|
|
300
|
+
deviceFingerprint: fingerprint,
|
|
301
|
+
platform,
|
|
302
|
+
appVersion: current.appVersion,
|
|
303
|
+
osVersion: current.osVersion
|
|
304
|
+
});
|
|
305
|
+
|
|
306
|
+
return {
|
|
307
|
+
registered: true,
|
|
308
|
+
deviceFingerprint: fingerprint,
|
|
309
|
+
platform,
|
|
310
|
+
firstSeen: new Date(current.firstSeen).toISOString(),
|
|
311
|
+
lastSeen: new Date(current.lastSeen).toISOString()
|
|
312
|
+
};
|
|
313
|
+
}
|
|
314
|
+
|
|
315
|
+
function heartbeat(payload) {
|
|
316
|
+
const fingerprint = normalizeFingerprint(payload?.deviceFingerprint || payload?.fingerprint || payload?.deviceId || '');
|
|
317
|
+
if (!fingerprint) return { error: 'deviceFingerprint is required' };
|
|
318
|
+
|
|
319
|
+
const now = Date.now();
|
|
320
|
+
const current = state.devices.get(fingerprint);
|
|
321
|
+
if (!current) {
|
|
322
|
+
const reg = registerDevice({
|
|
323
|
+
deviceFingerprint: fingerprint,
|
|
324
|
+
platform: payload?.platform || 'unknown',
|
|
325
|
+
appVersion: payload?.appVersion,
|
|
326
|
+
osVersion: payload?.osVersion,
|
|
327
|
+
model: payload?.model
|
|
328
|
+
});
|
|
329
|
+
if (reg.error) return reg;
|
|
330
|
+
}
|
|
331
|
+
|
|
332
|
+
const device = state.devices.get(fingerprint);
|
|
333
|
+
device.lastSeen = now;
|
|
334
|
+
state.stats.mobileHeartbeats += 1;
|
|
335
|
+
|
|
336
|
+
recordEvent('device_heartbeat', {
|
|
337
|
+
deviceFingerprint: fingerprint,
|
|
338
|
+
batteryLevel: Number(payload?.batteryLevel || 0),
|
|
339
|
+
networkType: String(payload?.networkType || '').slice(0, 20)
|
|
340
|
+
});
|
|
341
|
+
|
|
342
|
+
return {
|
|
343
|
+
ok: true,
|
|
344
|
+
deviceFingerprint: fingerprint,
|
|
345
|
+
lastSeen: new Date(device.lastSeen).toISOString(),
|
|
346
|
+
intelVersion: state.version,
|
|
347
|
+
indicators: state.indicators.size
|
|
348
|
+
};
|
|
349
|
+
}
|
|
350
|
+
|
|
351
|
+
function ingestTelemetryBatch(payload) {
|
|
352
|
+
const fingerprint = normalizeFingerprint(payload?.deviceFingerprint || payload?.fingerprint || payload?.deviceId || '');
|
|
353
|
+
const connections = Array.isArray(payload?.connections) ? payload.connections : [];
|
|
354
|
+
if (!fingerprint) return { error: 'deviceFingerprint is required' };
|
|
355
|
+
if (!connections.length) return { error: 'connections array is required' };
|
|
356
|
+
|
|
357
|
+
if (!state.devices.has(fingerprint)) {
|
|
358
|
+
const reg = registerDevice({
|
|
359
|
+
deviceFingerprint: fingerprint,
|
|
360
|
+
platform: payload?.platform || 'unknown',
|
|
361
|
+
appVersion: payload?.appVersion,
|
|
362
|
+
osVersion: payload?.osVersion,
|
|
363
|
+
model: payload?.model
|
|
364
|
+
});
|
|
365
|
+
if (reg.error) return reg;
|
|
366
|
+
}
|
|
367
|
+
|
|
368
|
+
const device = state.devices.get(fingerprint);
|
|
369
|
+
device.lastSeen = Date.now();
|
|
370
|
+
|
|
371
|
+
let blocked = 0;
|
|
372
|
+
let warned = 0;
|
|
373
|
+
const results = [];
|
|
374
|
+
|
|
375
|
+
for (const conn of connections.slice(0, 500)) {
|
|
376
|
+
const analyzed = analyzeConnection(conn || {});
|
|
377
|
+
if (analyzed.error) continue;
|
|
378
|
+
if (analyzed.decision === 'block') blocked += 1;
|
|
379
|
+
if (analyzed.decision === 'warn') warned += 1;
|
|
380
|
+
results.push({
|
|
381
|
+
host: analyzed.host,
|
|
382
|
+
decision: analyzed.decision,
|
|
383
|
+
riskScore: analyzed.riskScore,
|
|
384
|
+
reasons: analyzed.reasons
|
|
385
|
+
});
|
|
386
|
+
}
|
|
387
|
+
|
|
388
|
+
device.telemetryCount += results.length;
|
|
389
|
+
device.blocks += blocked;
|
|
390
|
+
device.warns += warned;
|
|
391
|
+
|
|
392
|
+
state.stats.telemetryBatches += 1;
|
|
393
|
+
state.stats.telemetryPackets += results.length;
|
|
394
|
+
|
|
395
|
+
recordEvent('telemetry_batch', {
|
|
396
|
+
deviceFingerprint: fingerprint,
|
|
397
|
+
packets: results.length,
|
|
398
|
+
blocked,
|
|
399
|
+
warned
|
|
400
|
+
});
|
|
401
|
+
|
|
402
|
+
return {
|
|
403
|
+
accepted: true,
|
|
404
|
+
deviceFingerprint: fingerprint,
|
|
405
|
+
packets: results.length,
|
|
406
|
+
blocked,
|
|
407
|
+
warned,
|
|
408
|
+
summary: {
|
|
409
|
+
telemetryCount: device.telemetryCount,
|
|
410
|
+
blocks: device.blocks,
|
|
411
|
+
warns: device.warns
|
|
412
|
+
},
|
|
413
|
+
results: results.slice(0, 50)
|
|
414
|
+
};
|
|
415
|
+
}
|
|
416
|
+
|
|
417
|
+
function getDevices(limit = 100) {
|
|
418
|
+
const n = Math.max(1, Math.min(Number(limit) || 100, 500));
|
|
419
|
+
return Array.from(state.devices.values())
|
|
420
|
+
.sort((a, b) => b.lastSeen - a.lastSeen)
|
|
421
|
+
.slice(0, n)
|
|
422
|
+
.map((d) => ({
|
|
423
|
+
deviceFingerprint: d.deviceFingerprint,
|
|
424
|
+
platform: d.platform,
|
|
425
|
+
appVersion: d.appVersion,
|
|
426
|
+
osVersion: d.osVersion,
|
|
427
|
+
model: d.model,
|
|
428
|
+
firstSeen: new Date(d.firstSeen).toISOString(),
|
|
429
|
+
lastSeen: new Date(d.lastSeen).toISOString(),
|
|
430
|
+
telemetryCount: d.telemetryCount,
|
|
431
|
+
blocks: d.blocks,
|
|
432
|
+
warns: d.warns
|
|
433
|
+
}));
|
|
434
|
+
}
|
|
435
|
+
|
|
436
|
+
function getDevice(deviceFingerprint) {
|
|
437
|
+
const id = normalizeFingerprint(deviceFingerprint || '');
|
|
438
|
+
if (!id) return { error: 'deviceFingerprint is required' };
|
|
439
|
+
const d = state.devices.get(id);
|
|
440
|
+
if (!d) return { error: 'device not found' };
|
|
441
|
+
return {
|
|
442
|
+
deviceFingerprint: d.deviceFingerprint,
|
|
443
|
+
platform: d.platform,
|
|
444
|
+
appVersion: d.appVersion,
|
|
445
|
+
osVersion: d.osVersion,
|
|
446
|
+
model: d.model,
|
|
447
|
+
firstSeen: new Date(d.firstSeen).toISOString(),
|
|
448
|
+
lastSeen: new Date(d.lastSeen).toISOString(),
|
|
449
|
+
telemetryCount: d.telemetryCount,
|
|
450
|
+
blocks: d.blocks,
|
|
451
|
+
warns: d.warns
|
|
452
|
+
};
|
|
453
|
+
}
|
|
454
|
+
|
|
455
|
+
function getStats() {
|
|
456
|
+
const topThreats = Array.from(state.indicators.values())
|
|
457
|
+
.sort((a, b) => (b.reports - a.reports) || (b.confidence - a.confidence))
|
|
458
|
+
.slice(0, 20)
|
|
459
|
+
.map((i) => ({ host: i.host, reports: i.reports, confidence: i.confidence, level: i.level, source: i.source }));
|
|
460
|
+
|
|
461
|
+
return {
|
|
462
|
+
...state.stats,
|
|
463
|
+
indicators: state.indicators.size,
|
|
464
|
+
intelVersion: state.version,
|
|
465
|
+
topThreats
|
|
466
|
+
};
|
|
467
|
+
}
|
|
468
|
+
|
|
469
|
+
function getRecentEvents(limit = 50) {
|
|
470
|
+
const n = Math.max(1, Math.min(Number(limit) || 50, 200));
|
|
471
|
+
return state.events.slice(0, n);
|
|
472
|
+
}
|
|
473
|
+
|
|
474
|
+
function deriveKey(passphrase, salt) {
|
|
475
|
+
return crypto.pbkdf2Sync(passphrase, salt, 250000, 32, 'sha256');
|
|
476
|
+
}
|
|
477
|
+
|
|
478
|
+
function encryptVault(plaintext, passphrase) {
|
|
479
|
+
if (typeof plaintext !== 'string' || !plaintext.length) return { error: 'plaintext is required' };
|
|
480
|
+
if (typeof passphrase !== 'string' || passphrase.length < 10) return { error: 'passphrase must be at least 10 chars' };
|
|
481
|
+
|
|
482
|
+
const salt = crypto.randomBytes(16);
|
|
483
|
+
const iv = crypto.randomBytes(12);
|
|
484
|
+
const key = deriveKey(passphrase, salt);
|
|
485
|
+
const cipher = crypto.createCipheriv('aes-256-gcm', key, iv);
|
|
486
|
+
const encrypted = Buffer.concat([cipher.update(plaintext, 'utf8'), cipher.final()]);
|
|
487
|
+
const tag = cipher.getAuthTag();
|
|
488
|
+
|
|
489
|
+
state.stats.vaultEncryptOps += 1;
|
|
490
|
+
recordEvent('vault_encrypt', { bytes: encrypted.length });
|
|
491
|
+
|
|
492
|
+
return {
|
|
493
|
+
algorithm: 'aes-256-gcm',
|
|
494
|
+
kdf: 'pbkdf2-sha256',
|
|
495
|
+
iterations: 250000,
|
|
496
|
+
payload: {
|
|
497
|
+
salt: salt.toString('base64'),
|
|
498
|
+
iv: iv.toString('base64'),
|
|
499
|
+
tag: tag.toString('base64'),
|
|
500
|
+
data: encrypted.toString('base64')
|
|
501
|
+
}
|
|
502
|
+
};
|
|
503
|
+
}
|
|
504
|
+
|
|
505
|
+
function decryptVault(payload, passphrase) {
|
|
506
|
+
if (!payload || typeof payload !== 'object') return { error: 'payload is required' };
|
|
507
|
+
if (typeof passphrase !== 'string' || !passphrase.length) return { error: 'passphrase is required' };
|
|
508
|
+
|
|
509
|
+
try {
|
|
510
|
+
const salt = Buffer.from(payload.salt, 'base64');
|
|
511
|
+
const iv = Buffer.from(payload.iv, 'base64');
|
|
512
|
+
const tag = Buffer.from(payload.tag, 'base64');
|
|
513
|
+
const data = Buffer.from(payload.data, 'base64');
|
|
514
|
+
|
|
515
|
+
const key = deriveKey(passphrase, salt);
|
|
516
|
+
const decipher = crypto.createDecipheriv('aes-256-gcm', key, iv);
|
|
517
|
+
decipher.setAuthTag(tag);
|
|
518
|
+
const plaintext = Buffer.concat([decipher.update(data), decipher.final()]).toString('utf8');
|
|
519
|
+
|
|
520
|
+
state.stats.vaultDecryptOps += 1;
|
|
521
|
+
recordEvent('vault_decrypt', { bytes: data.length });
|
|
522
|
+
|
|
523
|
+
return { plaintext };
|
|
524
|
+
} catch {
|
|
525
|
+
return { error: 'decrypt_failed' };
|
|
526
|
+
}
|
|
527
|
+
}
|
|
528
|
+
|
|
529
|
+
module.exports = {
|
|
530
|
+
analyzeConnection,
|
|
531
|
+
getIntelFeed,
|
|
532
|
+
submitThreatReport,
|
|
533
|
+
registerDevice,
|
|
534
|
+
heartbeat,
|
|
535
|
+
ingestTelemetryBatch,
|
|
536
|
+
getDevices,
|
|
537
|
+
getDevice,
|
|
538
|
+
getStats,
|
|
539
|
+
getRecentEvents,
|
|
540
|
+
encryptVault,
|
|
541
|
+
decryptVault
|
|
542
|
+
};
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* server/services/ssl-inspector.js
|
|
3
|
+
* Live TLS certificate inspector — used by sign-wab-domain.js, cron monitor,
|
|
4
|
+
* and shieldqr verifier. Returns { ok, fingerprint_sha256, valid_to,
|
|
5
|
+
* days_until_expiry, issuer, subject, fingerprint_b64 }.
|
|
6
|
+
*/
|
|
7
|
+
'use strict';
|
|
8
|
+
|
|
9
|
+
const tls = require('node:tls');
|
|
10
|
+
|
|
11
|
+
function inspect(host, port = 443, timeoutMs = 8000) {
|
|
12
|
+
return new Promise((resolve) => {
|
|
13
|
+
const socket = tls.connect({
|
|
14
|
+
host, port, servername: host, rejectUnauthorized: false, timeout: timeoutMs,
|
|
15
|
+
}, () => {
|
|
16
|
+
try {
|
|
17
|
+
const cert = socket.getPeerCertificate(false);
|
|
18
|
+
if (!cert || !cert.valid_to) { socket.end(); return resolve({ ok: false, error: 'no_cert' }); }
|
|
19
|
+
const validTo = new Date(cert.valid_to);
|
|
20
|
+
const daysLeft = Math.floor((validTo.getTime() - Date.now()) / (24 * 3600 * 1000));
|
|
21
|
+
const fpHex = (cert.fingerprint256 || '').replace(/:/g, '').toLowerCase();
|
|
22
|
+
const fpB64 = fpHex ? Buffer.from(fpHex, 'hex').toString('base64') : null;
|
|
23
|
+
socket.end();
|
|
24
|
+
resolve({
|
|
25
|
+
ok: true,
|
|
26
|
+
fingerprint_sha256: fpHex,
|
|
27
|
+
fingerprint_b64: fpB64,
|
|
28
|
+
valid_to: validTo.toISOString(),
|
|
29
|
+
valid_from: cert.valid_from ? new Date(cert.valid_from).toISOString() : null,
|
|
30
|
+
days_until_expiry: daysLeft,
|
|
31
|
+
issuer: cert.issuer && (cert.issuer.O || cert.issuer.CN) || null,
|
|
32
|
+
subject: cert.subject && cert.subject.CN || null,
|
|
33
|
+
serial: cert.serialNumber || null,
|
|
34
|
+
});
|
|
35
|
+
} catch (e) { try { socket.end(); } catch (_) {} resolve({ ok: false, error: e.message }); }
|
|
36
|
+
});
|
|
37
|
+
socket.on('error', (err) => resolve({ ok: false, error: err.message }));
|
|
38
|
+
socket.on('timeout', () => { try { socket.destroy(); } catch (_) {} resolve({ ok: false, error: 'timeout' }); });
|
|
39
|
+
});
|
|
40
|
+
}
|
|
41
|
+
|
|
42
|
+
module.exports = { inspect };
|