web-agent-bridge 3.2.0 → 3.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (256) hide show
  1. package/LICENSE +84 -72
  2. package/README.ar.md +1304 -1152
  3. package/README.md +298 -1635
  4. package/bin/agent-runner.js +474 -474
  5. package/bin/cli.js +237 -138
  6. package/bin/wab-init.js +223 -0
  7. package/bin/wab.js +80 -80
  8. package/examples/azure-dns-wab.js +83 -0
  9. package/examples/bidi-agent.js +119 -119
  10. package/examples/cloudflare-wab-dns.js +121 -0
  11. package/examples/cpanel-wab-dns.js +114 -0
  12. package/examples/cross-site-agent.js +91 -91
  13. package/examples/dns-discovery-agent.js +166 -0
  14. package/examples/gcp-dns-wab.js +76 -0
  15. package/examples/governance-agent.js +169 -0
  16. package/examples/mcp-agent.js +94 -94
  17. package/examples/next-app-router/README.md +44 -44
  18. package/examples/plesk-wab-dns.js +103 -0
  19. package/examples/puppeteer-agent.js +108 -108
  20. package/examples/route53-wab-dns.js +144 -0
  21. package/examples/saas-dashboard/README.md +55 -55
  22. package/examples/safe-mode-agent.js +96 -0
  23. package/examples/shopify-hydrogen/README.md +74 -74
  24. package/examples/vision-agent.js +171 -171
  25. package/examples/wab-sign.js +74 -0
  26. package/examples/wab-verify.js +60 -0
  27. package/examples/wordpress-elementor/README.md +77 -77
  28. package/package.json +19 -6
  29. package/public/.well-known/agent-tools.json +180 -180
  30. package/public/.well-known/ai-assets.json +59 -59
  31. package/public/.well-known/security.txt +8 -0
  32. package/public/.well-known/wab.json +28 -0
  33. package/public/activate.html +368 -0
  34. package/public/adoption-metrics.html +188 -0
  35. package/public/agent-workspace.html +349 -349
  36. package/public/ai.html +198 -198
  37. package/public/api.html +413 -412
  38. package/public/azure-dns-integration.html +289 -0
  39. package/public/browser.html +486 -486
  40. package/public/cloudflare-integration.html +380 -0
  41. package/public/commander-dashboard.html +243 -243
  42. package/public/cookies.html +210 -210
  43. package/public/cpanel-integration.html +398 -0
  44. package/public/css/agent-workspace.css +1713 -1713
  45. package/public/css/premium.css +317 -317
  46. package/public/css/styles.css +1263 -1235
  47. package/public/dashboard.html +707 -706
  48. package/public/dns.html +436 -0
  49. package/public/docs.html +588 -587
  50. package/public/feed.xml +89 -89
  51. package/public/gcp-dns-integration.html +318 -0
  52. package/public/growth.html +465 -463
  53. package/public/index.html +1266 -982
  54. package/public/integrations.html +556 -0
  55. package/public/js/activate.js +145 -0
  56. package/public/js/agent-workspace.js +1740 -1740
  57. package/public/js/auth-nav.js +65 -31
  58. package/public/js/auth-redirect.js +12 -12
  59. package/public/js/cookie-consent.js +56 -56
  60. package/public/js/dns.js +438 -0
  61. package/public/js/wab-demo-page.js +721 -721
  62. package/public/js/ws-client.js +74 -74
  63. package/public/llms-full.txt +360 -360
  64. package/public/llms.txt +125 -125
  65. package/public/login.html +85 -85
  66. package/public/mesh-dashboard.html +328 -328
  67. package/public/openapi.json +669 -580
  68. package/public/phone-shield.html +281 -0
  69. package/public/plesk-integration.html +375 -0
  70. package/public/premium-dashboard.html +2489 -2489
  71. package/public/premium.html +793 -793
  72. package/public/privacy.html +297 -297
  73. package/public/provider-onboarding.html +172 -0
  74. package/public/provider-sandbox.html +134 -0
  75. package/public/providers.html +359 -0
  76. package/public/register.html +105 -105
  77. package/public/registrar-integrations.html +141 -0
  78. package/public/robots.txt +99 -87
  79. package/public/route53-integration.html +531 -0
  80. package/public/script/wab-consent.d.ts +36 -36
  81. package/public/script/wab-consent.js +104 -104
  82. package/public/script/wab-schema.js +131 -131
  83. package/public/script/wab.d.ts +108 -108
  84. package/public/script/wab.min.js +580 -580
  85. package/public/security.txt +8 -0
  86. package/public/shieldqr.html +231 -0
  87. package/public/sitemap.xml +6 -0
  88. package/public/terms.html +256 -256
  89. package/public/wab-trust.html +200 -0
  90. package/public/wab-vs-protocols.html +210 -0
  91. package/public/whitepaper.html +449 -0
  92. package/script/ai-agent-bridge.js +1754 -1754
  93. package/sdk/README.md +99 -99
  94. package/sdk/agent-mesh.js +449 -449
  95. package/sdk/auto-discovery.js +288 -0
  96. package/sdk/commander.js +262 -262
  97. package/sdk/governance.js +262 -0
  98. package/sdk/index.d.ts +464 -464
  99. package/sdk/index.js +25 -1
  100. package/sdk/multi-agent.js +318 -318
  101. package/sdk/package.json +2 -2
  102. package/sdk/safe-mode.js +221 -0
  103. package/sdk/safety-shield.js +219 -0
  104. package/sdk/schema-discovery.js +83 -83
  105. package/server/adapters/index.js +520 -520
  106. package/server/config/plans.js +367 -367
  107. package/server/config/secrets.js +102 -102
  108. package/server/control-plane/index.js +301 -301
  109. package/server/data-plane/index.js +354 -354
  110. package/server/index.js +670 -427
  111. package/server/llm/index.js +404 -404
  112. package/server/middleware/adminAuth.js +35 -35
  113. package/server/middleware/auth.js +50 -50
  114. package/server/middleware/featureGate.js +88 -88
  115. package/server/middleware/rateLimits.js +100 -100
  116. package/server/middleware/sensitiveAction.js +157 -0
  117. package/server/migrations/001_add_analytics_indexes.sql +7 -7
  118. package/server/migrations/002_premium_features.sql +418 -418
  119. package/server/migrations/003_ads_integer_cents.sql +33 -33
  120. package/server/migrations/004_agent_os.sql +158 -158
  121. package/server/migrations/005_marketplace_metering.sql +126 -126
  122. package/server/migrations/007_governance.sql +106 -0
  123. package/server/migrations/008_plans.sql +144 -0
  124. package/server/migrations/009_shieldqr.sql +30 -0
  125. package/server/migrations/010_extended_trust.sql +33 -0
  126. package/server/models/adapters/index.js +33 -33
  127. package/server/models/adapters/mysql.js +183 -183
  128. package/server/models/adapters/postgresql.js +172 -172
  129. package/server/models/adapters/sqlite.js +7 -7
  130. package/server/models/db.js +740 -681
  131. package/server/observability/failure-analysis.js +337 -337
  132. package/server/observability/index.js +394 -394
  133. package/server/protocol/capabilities.js +223 -223
  134. package/server/protocol/index.js +243 -243
  135. package/server/protocol/schema.js +584 -584
  136. package/server/registry/certification.js +271 -271
  137. package/server/registry/index.js +326 -326
  138. package/server/routes/admin-plans.js +76 -0
  139. package/server/routes/admin-premium.js +673 -671
  140. package/server/routes/admin-shieldqr.js +90 -0
  141. package/server/routes/admin-trust-monitor.js +83 -0
  142. package/server/routes/admin.js +549 -261
  143. package/server/routes/ads.js +130 -130
  144. package/server/routes/agent-workspace.js +540 -540
  145. package/server/routes/api.js +150 -150
  146. package/server/routes/auth.js +71 -71
  147. package/server/routes/billing.js +57 -45
  148. package/server/routes/commander.js +316 -316
  149. package/server/routes/demo-showcase.js +332 -332
  150. package/server/routes/demo-store.js +154 -0
  151. package/server/routes/discovery.js +2348 -417
  152. package/server/routes/gateway.js +173 -157
  153. package/server/routes/governance.js +208 -0
  154. package/server/routes/license.js +251 -240
  155. package/server/routes/mesh.js +469 -469
  156. package/server/routes/noscript.js +543 -543
  157. package/server/routes/plans.js +33 -0
  158. package/server/routes/premium-v2.js +686 -686
  159. package/server/routes/premium.js +724 -724
  160. package/server/routes/providers.js +650 -0
  161. package/server/routes/runtime.js +2148 -2147
  162. package/server/routes/shieldqr.js +88 -0
  163. package/server/routes/sovereign.js +465 -385
  164. package/server/routes/universal.js +200 -185
  165. package/server/routes/wab-api.js +850 -501
  166. package/server/runtime/container-worker.js +111 -111
  167. package/server/runtime/container.js +448 -448
  168. package/server/runtime/distributed-worker.js +362 -362
  169. package/server/runtime/event-bus.js +210 -210
  170. package/server/runtime/index.js +253 -253
  171. package/server/runtime/queue.js +599 -599
  172. package/server/runtime/replay.js +666 -666
  173. package/server/runtime/sandbox.js +266 -266
  174. package/server/runtime/scheduler.js +534 -534
  175. package/server/runtime/session-engine.js +293 -293
  176. package/server/runtime/state-manager.js +188 -188
  177. package/server/security/cross-site-redactor.js +196 -0
  178. package/server/security/dry-run.js +180 -0
  179. package/server/security/human-gate-rate-limit.js +147 -0
  180. package/server/security/human-gate-transports.js +178 -0
  181. package/server/security/human-gate.js +281 -0
  182. package/server/security/index.js +368 -368
  183. package/server/security/intent-engine.js +245 -0
  184. package/server/security/reward-guard.js +171 -0
  185. package/server/security/rollback-store.js +239 -0
  186. package/server/security/token-scope.js +404 -0
  187. package/server/security/url-policy.js +139 -0
  188. package/server/services/agent-chat.js +506 -506
  189. package/server/services/agent-learning.js +601 -575
  190. package/server/services/agent-memory.js +625 -625
  191. package/server/services/agent-mesh.js +555 -539
  192. package/server/services/agent-symphony.js +717 -717
  193. package/server/services/agent-tasks.js +1807 -1807
  194. package/server/services/api-key-engine.js +292 -261
  195. package/server/services/cluster.js +894 -894
  196. package/server/services/commander.js +738 -738
  197. package/server/services/edge-compute.js +440 -440
  198. package/server/services/email.js +233 -204
  199. package/server/services/governance.js +466 -0
  200. package/server/services/hosted-runtime.js +205 -205
  201. package/server/services/lfd.js +635 -635
  202. package/server/services/local-ai.js +389 -389
  203. package/server/services/marketplace.js +270 -270
  204. package/server/services/metering.js +182 -182
  205. package/server/services/modules/affiliate-intelligence.js +93 -93
  206. package/server/services/modules/agent-firewall.js +90 -90
  207. package/server/services/modules/bounty.js +89 -89
  208. package/server/services/modules/collective-bargaining.js +92 -92
  209. package/server/services/modules/dark-pattern.js +66 -66
  210. package/server/services/modules/gov-intelligence.js +45 -45
  211. package/server/services/modules/neural.js +55 -55
  212. package/server/services/modules/notary.js +49 -49
  213. package/server/services/modules/price-time-machine.js +86 -86
  214. package/server/services/modules/protocol.js +104 -104
  215. package/server/services/negotiation.js +439 -439
  216. package/server/services/plans.js +214 -0
  217. package/server/services/plugins.js +771 -771
  218. package/server/services/premium.js +1 -1
  219. package/server/services/price-intelligence.js +566 -566
  220. package/server/services/price-shield.js +1137 -1137
  221. package/server/services/provider-clients.js +740 -0
  222. package/server/services/reputation.js +465 -465
  223. package/server/services/search-engine.js +357 -357
  224. package/server/services/security.js +513 -513
  225. package/server/services/self-healing.js +843 -843
  226. package/server/services/shieldqr.js +322 -0
  227. package/server/services/sovereign-shield.js +542 -0
  228. package/server/services/ssl-inspector.js +42 -0
  229. package/server/services/ssl-monitor.js +167 -0
  230. package/server/services/stripe.js +205 -192
  231. package/server/services/swarm.js +788 -788
  232. package/server/services/universal-scraper.js +662 -661
  233. package/server/services/verification.js +481 -481
  234. package/server/services/vision.js +1163 -1163
  235. package/server/services/wab-crypto.js +178 -0
  236. package/server/utils/cache.js +125 -125
  237. package/server/utils/migrate.js +81 -81
  238. package/server/utils/safe-fetch.js +228 -0
  239. package/server/utils/secureFields.js +50 -50
  240. package/server/ws.js +161 -161
  241. package/templates/artisan-marketplace.yaml +104 -104
  242. package/templates/book-price-scout.yaml +98 -98
  243. package/templates/electronics-price-tracker.yaml +108 -108
  244. package/templates/flight-deal-hunter.yaml +113 -113
  245. package/templates/freelancer-direct.yaml +116 -116
  246. package/templates/grocery-price-compare.yaml +93 -93
  247. package/templates/hotel-direct-booking.yaml +113 -113
  248. package/templates/local-services.yaml +98 -98
  249. package/templates/olive-oil-tunisia.yaml +88 -88
  250. package/templates/organic-farm-fresh.yaml +101 -101
  251. package/templates/restaurant-direct.yaml +97 -97
  252. package/public/score.html +0 -263
  253. package/server/migrations/006_growth_suite.sql +0 -138
  254. package/server/routes/growth.js +0 -962
  255. package/server/services/fairness-engine.js +0 -409
  256. package/server/services/fairness.js +0 -420
@@ -0,0 +1,228 @@
1
+ 'use strict';
2
+
3
+ /**
4
+ * Safe Fetch — SSRF-resistant HTTP client.
5
+ *
6
+ * Mitigations applied:
7
+ * 1. Scheme allow-list (http/https only).
8
+ * 2. Optional domain allow-list (string globs or "*").
9
+ * 3. DNS resolution + private/reserved/loopback/link-local CIDR block.
10
+ * 4. Re-validation on EVERY redirect hop (manual redirect handling).
11
+ * 5. Hard timeout via AbortController.
12
+ * 6. Max response body size (default 5 MB) — drains and aborts.
13
+ * 7. Optional Content-Type allow-list.
14
+ *
15
+ * NEVER call native `fetch(url)` directly with user-supplied URLs anywhere
16
+ * inside this server process. Use this helper.
17
+ */
18
+
19
+ const dns = require('node:dns').promises;
20
+ const net = require('node:net');
21
+
22
+ const PRIVATE_V4_CIDRS = [
23
+ ['10.0.0.0', 8],
24
+ ['172.16.0.0', 12],
25
+ ['192.168.0.0', 16],
26
+ ['127.0.0.0', 8],
27
+ ['169.254.0.0', 16], // link-local (AWS metadata 169.254.169.254 lives here)
28
+ ['100.64.0.0', 10], // CGNAT
29
+ ['0.0.0.0', 8],
30
+ ['224.0.0.0', 4], // multicast
31
+ ['240.0.0.0', 4], // reserved
32
+ ['198.18.0.0', 15], // benchmarking
33
+ ['192.0.0.0', 24],
34
+ ['192.0.2.0', 24], // TEST-NET-1
35
+ ['198.51.100.0', 24], // TEST-NET-2
36
+ ['203.0.113.0', 24], // TEST-NET-3
37
+ ];
38
+
39
+ const PRIVATE_V6_PREFIXES = ['::1', 'fc', 'fd', 'fe80', 'ff', '::ffff:127.', '::ffff:10.', '::ffff:192.168.', '::ffff:172.', '::', '64:ff9b::'];
40
+
41
+ function _ipToInt(ip) {
42
+ return ip.split('.').reduce((acc, oct) => (acc << 8) + parseInt(oct, 10), 0) >>> 0;
43
+ }
44
+
45
+ function _isPrivateV4(ip) {
46
+ const ipInt = _ipToInt(ip);
47
+ return PRIVATE_V4_CIDRS.some(([base, bits]) => {
48
+ const baseInt = _ipToInt(base);
49
+ const mask = bits === 0 ? 0 : (~0 << (32 - bits)) >>> 0;
50
+ return (ipInt & mask) === (baseInt & mask);
51
+ });
52
+ }
53
+
54
+ function _isPrivateV6(ip) {
55
+ const lower = ip.toLowerCase();
56
+ return PRIVATE_V6_PREFIXES.some((p) => lower === p || lower.startsWith(p));
57
+ }
58
+
59
+ function isPrivateAddress(ip) {
60
+ if (!ip) return true;
61
+ if (net.isIPv4(ip)) return _isPrivateV4(ip);
62
+ if (net.isIPv6(ip)) return _isPrivateV6(ip);
63
+ return true; // unknown → treat as private
64
+ }
65
+
66
+ function _matchesGlob(host, pattern) {
67
+ if (pattern === '*') return true;
68
+ if (pattern.startsWith('*.')) {
69
+ const suffix = pattern.slice(2).toLowerCase();
70
+ return host === suffix || host.endsWith('.' + suffix);
71
+ }
72
+ return host.toLowerCase() === pattern.toLowerCase();
73
+ }
74
+
75
+ function _allowedHost(host, allowList) {
76
+ if (!allowList || allowList.length === 0) return true; // no list = allow public
77
+ return allowList.some((p) => _matchesGlob(host, p));
78
+ }
79
+
80
+ async function _assertSafeHost(hostname) {
81
+ // If it's already an IP literal, validate directly.
82
+ if (net.isIP(hostname)) {
83
+ if (isPrivateAddress(hostname)) {
84
+ throw new Error(`SSRF blocked: private/reserved IP ${hostname}`);
85
+ }
86
+ return;
87
+ }
88
+ let records;
89
+ try {
90
+ records = await dns.lookup(hostname, { all: true, verbatim: true });
91
+ } catch (err) {
92
+ throw new Error(`DNS resolution failed for ${hostname}: ${err.code || err.message}`);
93
+ }
94
+ if (!records || records.length === 0) {
95
+ throw new Error(`DNS returned no records for ${hostname}`);
96
+ }
97
+ for (const r of records) {
98
+ if (isPrivateAddress(r.address)) {
99
+ throw new Error(`SSRF blocked: ${hostname} resolves to private/reserved address ${r.address}`);
100
+ }
101
+ }
102
+ }
103
+
104
+ /**
105
+ * Validate a URL string against the SSRF policy.
106
+ * @returns {URL} parsed URL
107
+ */
108
+ async function validateUrl(rawUrl, options = {}) {
109
+ let parsed;
110
+ try {
111
+ parsed = new URL(rawUrl);
112
+ } catch (e) {
113
+ throw new Error('Invalid URL');
114
+ }
115
+ const allowedSchemes = options.allowedSchemes || ['http:', 'https:'];
116
+ if (!allowedSchemes.includes(parsed.protocol)) {
117
+ throw new Error(`Scheme ${parsed.protocol} not allowed`);
118
+ }
119
+ if (options.requireHttps && parsed.protocol !== 'https:') {
120
+ throw new Error('HTTPS required');
121
+ }
122
+ // Block credentials in URLs (defeats some auth-smuggling attacks).
123
+ if (parsed.username || parsed.password) {
124
+ throw new Error('Credentials in URLs are not allowed');
125
+ }
126
+ // Restrict ports to defaults unless explicitly allowed.
127
+ const allowedPorts = options.allowedPorts || [80, 443];
128
+ const port = parsed.port ? parseInt(parsed.port, 10) : (parsed.protocol === 'https:' ? 443 : 80);
129
+ if (!allowedPorts.includes(port)) {
130
+ throw new Error(`Port ${port} not allowed`);
131
+ }
132
+ if (!_allowedHost(parsed.hostname, options.allowList)) {
133
+ throw new Error(`Host ${parsed.hostname} not in allow-list`);
134
+ }
135
+ await _assertSafeHost(parsed.hostname);
136
+ return parsed;
137
+ }
138
+
139
+ /**
140
+ * SSRF-resistant fetch.
141
+ * Manually follows redirects so each hop is re-validated.
142
+ */
143
+ async function safeFetch(rawUrl, init = {}, opts = {}) {
144
+ const maxRedirects = opts.maxRedirects ?? 3;
145
+ const maxBytes = opts.maxBytes ?? 5 * 1024 * 1024; // 5 MB
146
+ const timeoutMs = opts.timeoutMs ?? 10000;
147
+ const allowList = opts.allowList;
148
+ const allowedContentTypes = opts.allowedContentTypes; // e.g. ['text/html','application/json']
149
+
150
+ let currentUrl = rawUrl;
151
+ for (let hop = 0; hop <= maxRedirects; hop++) {
152
+ await validateUrl(currentUrl, { allowList, allowedSchemes: opts.allowedSchemes, requireHttps: opts.requireHttps, allowedPorts: opts.allowedPorts });
153
+
154
+ const controller = new AbortController();
155
+ const timer = setTimeout(() => controller.abort(), timeoutMs);
156
+
157
+ let res;
158
+ try {
159
+ res = await fetch(currentUrl, {
160
+ ...init,
161
+ redirect: 'manual',
162
+ signal: controller.signal,
163
+ });
164
+ } finally {
165
+ clearTimeout(timer);
166
+ }
167
+
168
+ if (res.status >= 300 && res.status < 400) {
169
+ const loc = res.headers.get('location');
170
+ if (!loc) return _enforceBody(res, maxBytes, allowedContentTypes);
171
+ if (hop === maxRedirects) throw new Error('Too many redirects');
172
+ currentUrl = new URL(loc, currentUrl).toString();
173
+ continue;
174
+ }
175
+
176
+ return _enforceBody(res, maxBytes, allowedContentTypes);
177
+ }
178
+ throw new Error('Redirect loop');
179
+ }
180
+
181
+ async function _enforceBody(res, maxBytes, allowedContentTypes) {
182
+ const ct = (res.headers.get('content-type') || '').toLowerCase();
183
+ if (allowedContentTypes && !allowedContentTypes.some((t) => ct.startsWith(t))) {
184
+ res.body?.cancel?.().catch(() => {});
185
+ throw new Error(`Content-Type ${ct || 'unknown'} not allowed`);
186
+ }
187
+ const declared = parseInt(res.headers.get('content-length') || '0', 10);
188
+ if (declared && declared > maxBytes) {
189
+ res.body?.cancel?.().catch(() => {});
190
+ throw new Error(`Response too large (${declared} bytes, max ${maxBytes})`);
191
+ }
192
+ if (!res.body) return res;
193
+
194
+ // Buffer the response while enforcing size.
195
+ const reader = res.body.getReader();
196
+ const chunks = [];
197
+ let total = 0;
198
+ while (true) {
199
+ const { done, value } = await reader.read();
200
+ if (done) break;
201
+ total += value.byteLength;
202
+ if (total > maxBytes) {
203
+ reader.cancel().catch(() => {});
204
+ throw new Error(`Response exceeded ${maxBytes} bytes`);
205
+ }
206
+ chunks.push(value);
207
+ }
208
+ const buf = Buffer.concat(chunks.map((c) => Buffer.from(c)));
209
+ // Return a Response-like wrapper matching the parts callers actually use.
210
+ return {
211
+ ok: res.ok,
212
+ status: res.status,
213
+ statusText: res.statusText,
214
+ headers: res.headers,
215
+ url: res.url,
216
+ redirected: res.redirected,
217
+ async text() { return buf.toString('utf8'); },
218
+ async json() { return JSON.parse(buf.toString('utf8')); },
219
+ async arrayBuffer() { return buf.buffer.slice(buf.byteOffset, buf.byteOffset + buf.byteLength); },
220
+ async buffer() { return buf; },
221
+ };
222
+ }
223
+
224
+ module.exports = {
225
+ safeFetch,
226
+ validateUrl,
227
+ isPrivateAddress,
228
+ };
@@ -1,50 +1,50 @@
1
- /**
2
- * Optional AES-256-GCM encryption for sensitive DB fields (e.g. SMTP password).
3
- * Set CREDENTIALS_ENCRYPTION_KEY (any long random string) to enable at-rest encryption.
4
- */
5
-
6
- const crypto = require('crypto');
7
-
8
- const PREFIX = 'enc:v1:';
9
-
10
- function getKey() {
11
- const raw = process.env.CREDENTIALS_ENCRYPTION_KEY;
12
- if (!raw || String(raw).length < 8) return null;
13
- return crypto.createHash('sha256').update(String(raw)).digest();
14
- }
15
-
16
- function encryptOptional(plain) {
17
- if (plain == null || plain === '') return plain;
18
- const key = getKey();
19
- if (!key) return plain;
20
- const iv = crypto.randomBytes(12);
21
- const cipher = crypto.createCipheriv('aes-256-gcm', key, iv);
22
- const enc = Buffer.concat([cipher.update(String(plain), 'utf8'), cipher.final()]);
23
- const tag = cipher.getAuthTag();
24
- return `${PREFIX}${iv.toString('hex')}:${tag.toString('hex')}:${enc.toString('hex')}`;
25
- }
26
-
27
- function decryptOptional(stored) {
28
- if (stored == null || stored === '') return stored;
29
- if (typeof stored !== 'string' || !stored.startsWith(PREFIX)) return stored;
30
- const key = getKey();
31
- if (!key) {
32
- console.warn('[WAB] CREDENTIALS_ENCRYPTION_KEY missing; cannot decrypt stored credential');
33
- return null;
34
- }
35
- try {
36
- const rest = stored.slice(PREFIX.length);
37
- const [ivHex, tagHex, dataHex] = rest.split(':');
38
- const iv = Buffer.from(ivHex, 'hex');
39
- const tag = Buffer.from(tagHex, 'hex');
40
- const data = Buffer.from(dataHex, 'hex');
41
- const decipher = crypto.createDecipheriv('aes-256-gcm', key, iv);
42
- decipher.setAuthTag(tag);
43
- return Buffer.concat([decipher.update(data), decipher.final()]).toString('utf8');
44
- } catch (e) {
45
- console.error('[WAB] Decrypt failed:', e.message);
46
- return null;
47
- }
48
- }
49
-
50
- module.exports = { encryptOptional, decryptOptional };
1
+ /**
2
+ * Optional AES-256-GCM encryption for sensitive DB fields (e.g. SMTP password).
3
+ * Set CREDENTIALS_ENCRYPTION_KEY (any long random string) to enable at-rest encryption.
4
+ */
5
+
6
+ const crypto = require('crypto');
7
+
8
+ const PREFIX = 'enc:v1:';
9
+
10
+ function getKey() {
11
+ const raw = process.env.CREDENTIALS_ENCRYPTION_KEY;
12
+ if (!raw || String(raw).length < 8) return null;
13
+ return crypto.createHash('sha256').update(String(raw)).digest();
14
+ }
15
+
16
+ function encryptOptional(plain) {
17
+ if (plain == null || plain === '') return plain;
18
+ const key = getKey();
19
+ if (!key) return plain;
20
+ const iv = crypto.randomBytes(12);
21
+ const cipher = crypto.createCipheriv('aes-256-gcm', key, iv);
22
+ const enc = Buffer.concat([cipher.update(String(plain), 'utf8'), cipher.final()]);
23
+ const tag = cipher.getAuthTag();
24
+ return `${PREFIX}${iv.toString('hex')}:${tag.toString('hex')}:${enc.toString('hex')}`;
25
+ }
26
+
27
+ function decryptOptional(stored) {
28
+ if (stored == null || stored === '') return stored;
29
+ if (typeof stored !== 'string' || !stored.startsWith(PREFIX)) return stored;
30
+ const key = getKey();
31
+ if (!key) {
32
+ console.warn('[WAB] CREDENTIALS_ENCRYPTION_KEY missing; cannot decrypt stored credential');
33
+ return null;
34
+ }
35
+ try {
36
+ const rest = stored.slice(PREFIX.length);
37
+ const [ivHex, tagHex, dataHex] = rest.split(':');
38
+ const iv = Buffer.from(ivHex, 'hex');
39
+ const tag = Buffer.from(tagHex, 'hex');
40
+ const data = Buffer.from(dataHex, 'hex');
41
+ const decipher = crypto.createDecipheriv('aes-256-gcm', key, iv);
42
+ decipher.setAuthTag(tag);
43
+ return Buffer.concat([decipher.update(data), decipher.final()]).toString('utf8');
44
+ } catch (e) {
45
+ console.error('[WAB] Decrypt failed:', e.message);
46
+ return null;
47
+ }
48
+ }
49
+
50
+ module.exports = { encryptOptional, decryptOptional };
package/server/ws.js CHANGED
@@ -1,161 +1,161 @@
1
- const WebSocket = require('ws');
2
- const { verifyUserToken, verifyAdminToken } = require('./config/secrets');
3
- const { findSiteById } = require('./models/db');
4
- const { isJWTRevoked, auditLog } = require('./services/security');
5
-
6
- // Map of siteId → Set of WebSocket clients
7
- const siteClients = new Map();
8
- // Per-IP connection tracking
9
- const ipConnections = new Map();
10
- const MAX_CONNECTIONS_PER_IP = 10;
11
- const AUTH_TIMEOUT_MS = 10_000;
12
- const MAX_MESSAGE_SIZE = 4096;
13
- const MSG_RATE_WINDOW = 60_000;
14
- const MSG_RATE_MAX = 30;
15
-
16
- function setupWebSocket(server) {
17
- const wss = new WebSocket.Server({ server, path: '/ws/analytics', maxPayload: MAX_MESSAGE_SIZE });
18
-
19
- wss.on('connection', (ws, req) => {
20
- let authenticatedSiteId = null;
21
- const clientIP = req.headers['x-forwarded-for']?.split(',')[0]?.trim() || req.socket.remoteAddress || 'unknown';
22
-
23
- // ── Per-IP connection limit ──
24
- const currentCount = ipConnections.get(clientIP) || 0;
25
- if (currentCount >= MAX_CONNECTIONS_PER_IP) {
26
- ws.close(1013, 'Too many connections');
27
- return;
28
- }
29
- ipConnections.set(clientIP, currentCount + 1);
30
-
31
- // ── Auth timeout — close if not authenticated within 10s ──
32
- const authTimer = setTimeout(() => {
33
- if (!authenticatedSiteId) {
34
- ws.close(4001, 'Authentication timeout');
35
- }
36
- }, AUTH_TIMEOUT_MS);
37
-
38
- // ── Message rate limiter ──
39
- const msgTimestamps = [];
40
-
41
- ws.isAlive = true;
42
- ws.on('pong', () => { ws.isAlive = true; });
43
-
44
- ws.on('message', (data) => {
45
- // Rate limit messages
46
- const now = Date.now();
47
- msgTimestamps.push(now);
48
- while (msgTimestamps.length > 0 && msgTimestamps[0] < now - MSG_RATE_WINDOW) {
49
- msgTimestamps.shift();
50
- }
51
- if (msgTimestamps.length > MSG_RATE_MAX) {
52
- ws.close(4008, 'Message rate limit exceeded');
53
- return;
54
- }
55
-
56
- try {
57
- const msg = JSON.parse(data);
58
-
59
- if (msg.type === 'auth') {
60
- if (!msg.token || !msg.siteId) {
61
- ws.send(JSON.stringify({ type: 'error', message: 'token and siteId required' }));
62
- return;
63
- }
64
-
65
- // Check JWT revocation before verifying
66
- if (isJWTRevoked(msg.token)) {
67
- ws.send(JSON.stringify({ type: 'error', message: 'Token has been revoked' }));
68
- ws.close(4003, 'Token revoked');
69
- return;
70
- }
71
-
72
- let decoded;
73
- let isAdmin = false;
74
- try {
75
- decoded = verifyUserToken(msg.token);
76
- } catch {
77
- try {
78
- decoded = verifyAdminToken(msg.token);
79
- isAdmin = decoded.isAdmin === true;
80
- } catch {
81
- ws.send(JSON.stringify({ type: 'error', message: 'Invalid message or auth failed' }));
82
- auditLog({ actorType: 'system', action: 'ws_auth_failed', ip: clientIP, outcome: 'denied', severity: 'warning' });
83
- return;
84
- }
85
- }
86
-
87
- if (!isAdmin) {
88
- const site = findSiteById.get(msg.siteId);
89
- if (!site || site.user_id !== decoded.id) {
90
- ws.send(JSON.stringify({ type: 'error', message: 'Forbidden: not your site' }));
91
- return;
92
- }
93
- }
94
-
95
- clearTimeout(authTimer);
96
- authenticatedSiteId = msg.siteId;
97
- if (!siteClients.has(msg.siteId)) {
98
- siteClients.set(msg.siteId, new Set());
99
- }
100
- siteClients.get(msg.siteId).add(ws);
101
- ws.send(JSON.stringify({ type: 'auth:success', siteId: msg.siteId }));
102
- } else if (!authenticatedSiteId) {
103
- // Reject all non-auth messages before authentication
104
- ws.send(JSON.stringify({ type: 'error', message: 'Authentication required' }));
105
- }
106
- } catch (e) {
107
- ws.send(JSON.stringify({ type: 'error', message: 'Invalid message or auth failed' }));
108
- }
109
- });
110
-
111
- ws.on('close', () => {
112
- clearTimeout(authTimer);
113
- // Decrement IP connection count
114
- const count = ipConnections.get(clientIP) || 1;
115
- if (count <= 1) ipConnections.delete(clientIP);
116
- else ipConnections.set(clientIP, count - 1);
117
-
118
- if (authenticatedSiteId && siteClients.has(authenticatedSiteId)) {
119
- siteClients.get(authenticatedSiteId).delete(ws);
120
- if (siteClients.get(authenticatedSiteId).size === 0) {
121
- siteClients.delete(authenticatedSiteId);
122
- }
123
- }
124
- });
125
-
126
- ws.on('error', () => {
127
- clearTimeout(authTimer);
128
- });
129
- });
130
-
131
- const interval = setInterval(() => {
132
- wss.clients.forEach((ws) => {
133
- if (!ws.isAlive) return ws.terminate();
134
- ws.isAlive = false;
135
- ws.ping();
136
- });
137
- }, 30000);
138
-
139
- wss.on('close', () => clearInterval(interval));
140
-
141
- return wss;
142
- }
143
-
144
- function broadcastAnalytic(siteId, eventData) {
145
- const clients = siteClients.get(siteId);
146
- if (!clients || clients.size === 0) return;
147
-
148
- const message = JSON.stringify({
149
- type: 'analytic',
150
- timestamp: new Date().toISOString(),
151
- ...eventData
152
- });
153
-
154
- clients.forEach((ws) => {
155
- if (ws.readyState === WebSocket.OPEN) {
156
- ws.send(message);
157
- }
158
- });
159
- }
160
-
161
- module.exports = { setupWebSocket, broadcastAnalytic };
1
+ const WebSocket = require('ws');
2
+ const { verifyUserToken, verifyAdminToken } = require('./config/secrets');
3
+ const { findSiteById } = require('./models/db');
4
+ const { isJWTRevoked, auditLog } = require('./services/security');
5
+
6
+ // Map of siteId → Set of WebSocket clients
7
+ const siteClients = new Map();
8
+ // Per-IP connection tracking
9
+ const ipConnections = new Map();
10
+ const MAX_CONNECTIONS_PER_IP = 10;
11
+ const AUTH_TIMEOUT_MS = 10_000;
12
+ const MAX_MESSAGE_SIZE = 4096;
13
+ const MSG_RATE_WINDOW = 60_000;
14
+ const MSG_RATE_MAX = 30;
15
+
16
+ function setupWebSocket(server) {
17
+ const wss = new WebSocket.Server({ server, path: '/ws/analytics', maxPayload: MAX_MESSAGE_SIZE });
18
+
19
+ wss.on('connection', (ws, req) => {
20
+ let authenticatedSiteId = null;
21
+ const clientIP = req.headers['x-forwarded-for']?.split(',')[0]?.trim() || req.socket.remoteAddress || 'unknown';
22
+
23
+ // ── Per-IP connection limit ──
24
+ const currentCount = ipConnections.get(clientIP) || 0;
25
+ if (currentCount >= MAX_CONNECTIONS_PER_IP) {
26
+ ws.close(1013, 'Too many connections');
27
+ return;
28
+ }
29
+ ipConnections.set(clientIP, currentCount + 1);
30
+
31
+ // ── Auth timeout — close if not authenticated within 10s ──
32
+ const authTimer = setTimeout(() => {
33
+ if (!authenticatedSiteId) {
34
+ ws.close(4001, 'Authentication timeout');
35
+ }
36
+ }, AUTH_TIMEOUT_MS);
37
+
38
+ // ── Message rate limiter ──
39
+ const msgTimestamps = [];
40
+
41
+ ws.isAlive = true;
42
+ ws.on('pong', () => { ws.isAlive = true; });
43
+
44
+ ws.on('message', (data) => {
45
+ // Rate limit messages
46
+ const now = Date.now();
47
+ msgTimestamps.push(now);
48
+ while (msgTimestamps.length > 0 && msgTimestamps[0] < now - MSG_RATE_WINDOW) {
49
+ msgTimestamps.shift();
50
+ }
51
+ if (msgTimestamps.length > MSG_RATE_MAX) {
52
+ ws.close(4008, 'Message rate limit exceeded');
53
+ return;
54
+ }
55
+
56
+ try {
57
+ const msg = JSON.parse(data);
58
+
59
+ if (msg.type === 'auth') {
60
+ if (!msg.token || !msg.siteId) {
61
+ ws.send(JSON.stringify({ type: 'error', message: 'token and siteId required' }));
62
+ return;
63
+ }
64
+
65
+ // Check JWT revocation before verifying
66
+ if (isJWTRevoked(msg.token)) {
67
+ ws.send(JSON.stringify({ type: 'error', message: 'Token has been revoked' }));
68
+ ws.close(4003, 'Token revoked');
69
+ return;
70
+ }
71
+
72
+ let decoded;
73
+ let isAdmin = false;
74
+ try {
75
+ decoded = verifyUserToken(msg.token);
76
+ } catch {
77
+ try {
78
+ decoded = verifyAdminToken(msg.token);
79
+ isAdmin = decoded.isAdmin === true;
80
+ } catch {
81
+ ws.send(JSON.stringify({ type: 'error', message: 'Invalid message or auth failed' }));
82
+ auditLog({ actorType: 'system', action: 'ws_auth_failed', ip: clientIP, outcome: 'denied', severity: 'warning' });
83
+ return;
84
+ }
85
+ }
86
+
87
+ if (!isAdmin) {
88
+ const site = findSiteById.get(msg.siteId);
89
+ if (!site || site.user_id !== decoded.id) {
90
+ ws.send(JSON.stringify({ type: 'error', message: 'Forbidden: not your site' }));
91
+ return;
92
+ }
93
+ }
94
+
95
+ clearTimeout(authTimer);
96
+ authenticatedSiteId = msg.siteId;
97
+ if (!siteClients.has(msg.siteId)) {
98
+ siteClients.set(msg.siteId, new Set());
99
+ }
100
+ siteClients.get(msg.siteId).add(ws);
101
+ ws.send(JSON.stringify({ type: 'auth:success', siteId: msg.siteId }));
102
+ } else if (!authenticatedSiteId) {
103
+ // Reject all non-auth messages before authentication
104
+ ws.send(JSON.stringify({ type: 'error', message: 'Authentication required' }));
105
+ }
106
+ } catch (e) {
107
+ ws.send(JSON.stringify({ type: 'error', message: 'Invalid message or auth failed' }));
108
+ }
109
+ });
110
+
111
+ ws.on('close', () => {
112
+ clearTimeout(authTimer);
113
+ // Decrement IP connection count
114
+ const count = ipConnections.get(clientIP) || 1;
115
+ if (count <= 1) ipConnections.delete(clientIP);
116
+ else ipConnections.set(clientIP, count - 1);
117
+
118
+ if (authenticatedSiteId && siteClients.has(authenticatedSiteId)) {
119
+ siteClients.get(authenticatedSiteId).delete(ws);
120
+ if (siteClients.get(authenticatedSiteId).size === 0) {
121
+ siteClients.delete(authenticatedSiteId);
122
+ }
123
+ }
124
+ });
125
+
126
+ ws.on('error', () => {
127
+ clearTimeout(authTimer);
128
+ });
129
+ });
130
+
131
+ const interval = setInterval(() => {
132
+ wss.clients.forEach((ws) => {
133
+ if (!ws.isAlive) return ws.terminate();
134
+ ws.isAlive = false;
135
+ ws.ping();
136
+ });
137
+ }, 30000);
138
+
139
+ wss.on('close', () => clearInterval(interval));
140
+
141
+ return wss;
142
+ }
143
+
144
+ function broadcastAnalytic(siteId, eventData) {
145
+ const clients = siteClients.get(siteId);
146
+ if (!clients || clients.size === 0) return;
147
+
148
+ const message = JSON.stringify({
149
+ type: 'analytic',
150
+ timestamp: new Date().toISOString(),
151
+ ...eventData
152
+ });
153
+
154
+ clients.forEach((ws) => {
155
+ if (ws.readyState === WebSocket.OPEN) {
156
+ ws.send(message);
157
+ }
158
+ });
159
+ }
160
+
161
+ module.exports = { setupWebSocket, broadcastAnalytic };