empathy-framework 4.7.0__py3-none-any.whl → 4.8.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (86) hide show
  1. empathy_framework-4.8.0.dist-info/METADATA +753 -0
  2. {empathy_framework-4.7.0.dist-info → empathy_framework-4.8.0.dist-info}/RECORD +83 -37
  3. {empathy_framework-4.7.0.dist-info → empathy_framework-4.8.0.dist-info}/WHEEL +1 -1
  4. {empathy_framework-4.7.0.dist-info → empathy_framework-4.8.0.dist-info}/entry_points.txt +2 -1
  5. empathy_os/__init__.py +2 -0
  6. empathy_os/cache/hash_only.py +6 -3
  7. empathy_os/cache/hybrid.py +6 -3
  8. empathy_os/cli/__init__.py +128 -238
  9. empathy_os/cli/__main__.py +5 -33
  10. empathy_os/cli/commands/__init__.py +1 -8
  11. empathy_os/cli/commands/help.py +331 -0
  12. empathy_os/cli/commands/info.py +140 -0
  13. empathy_os/cli/commands/inspect.py +437 -0
  14. empathy_os/cli/commands/metrics.py +92 -0
  15. empathy_os/cli/commands/orchestrate.py +184 -0
  16. empathy_os/cli/commands/patterns.py +207 -0
  17. empathy_os/cli/commands/provider.py +93 -81
  18. empathy_os/cli/commands/setup.py +96 -0
  19. empathy_os/cli/commands/status.py +235 -0
  20. empathy_os/cli/commands/sync.py +166 -0
  21. empathy_os/cli/commands/tier.py +121 -0
  22. empathy_os/cli/commands/workflow.py +574 -0
  23. empathy_os/cli/parsers/__init__.py +62 -0
  24. empathy_os/cli/parsers/help.py +41 -0
  25. empathy_os/cli/parsers/info.py +26 -0
  26. empathy_os/cli/parsers/inspect.py +66 -0
  27. empathy_os/cli/parsers/metrics.py +42 -0
  28. empathy_os/cli/parsers/orchestrate.py +61 -0
  29. empathy_os/cli/parsers/patterns.py +54 -0
  30. empathy_os/cli/parsers/provider.py +40 -0
  31. empathy_os/cli/parsers/setup.py +42 -0
  32. empathy_os/cli/parsers/status.py +47 -0
  33. empathy_os/cli/parsers/sync.py +31 -0
  34. empathy_os/cli/parsers/tier.py +33 -0
  35. empathy_os/cli/parsers/workflow.py +77 -0
  36. empathy_os/cli/utils/__init__.py +1 -0
  37. empathy_os/cli/utils/data.py +242 -0
  38. empathy_os/cli/utils/helpers.py +68 -0
  39. empathy_os/{cli.py → cli_legacy.py} +27 -27
  40. empathy_os/cli_minimal.py +662 -0
  41. empathy_os/cli_router.py +384 -0
  42. empathy_os/cli_unified.py +38 -2
  43. empathy_os/memory/__init__.py +19 -5
  44. empathy_os/memory/short_term.py +14 -404
  45. empathy_os/memory/types.py +437 -0
  46. empathy_os/memory/unified.py +61 -48
  47. empathy_os/models/fallback.py +1 -1
  48. empathy_os/models/provider_config.py +59 -344
  49. empathy_os/models/registry.py +31 -180
  50. empathy_os/monitoring/alerts.py +14 -20
  51. empathy_os/monitoring/alerts_cli.py +24 -7
  52. empathy_os/project_index/__init__.py +2 -0
  53. empathy_os/project_index/index.py +210 -5
  54. empathy_os/project_index/scanner.py +45 -14
  55. empathy_os/project_index/scanner_parallel.py +291 -0
  56. empathy_os/socratic/ab_testing.py +1 -1
  57. empathy_os/vscode_bridge 2.py +173 -0
  58. empathy_os/workflows/__init__.py +31 -2
  59. empathy_os/workflows/base.py +349 -325
  60. empathy_os/workflows/bug_predict.py +8 -0
  61. empathy_os/workflows/builder.py +273 -0
  62. empathy_os/workflows/caching.py +253 -0
  63. empathy_os/workflows/code_review_pipeline.py +1 -0
  64. empathy_os/workflows/history.py +510 -0
  65. empathy_os/workflows/output.py +410 -0
  66. empathy_os/workflows/perf_audit.py +125 -19
  67. empathy_os/workflows/progress.py +324 -22
  68. empathy_os/workflows/progressive/README 2.md +454 -0
  69. empathy_os/workflows/progressive/__init__ 2.py +92 -0
  70. empathy_os/workflows/progressive/cli 2.py +242 -0
  71. empathy_os/workflows/progressive/core 2.py +488 -0
  72. empathy_os/workflows/progressive/orchestrator 2.py +701 -0
  73. empathy_os/workflows/progressive/reports 2.py +528 -0
  74. empathy_os/workflows/progressive/telemetry 2.py +280 -0
  75. empathy_os/workflows/progressive/test_gen 2.py +514 -0
  76. empathy_os/workflows/progressive/workflow 2.py +628 -0
  77. empathy_os/workflows/routing.py +168 -0
  78. empathy_os/workflows/secure_release.py +1 -0
  79. empathy_os/workflows/security_audit.py +190 -0
  80. empathy_os/workflows/security_audit_phase3.py +328 -0
  81. empathy_os/workflows/telemetry_mixin.py +269 -0
  82. empathy_framework-4.7.0.dist-info/METADATA +0 -1598
  83. empathy_os/dashboard/__init__.py +0 -15
  84. empathy_os/dashboard/server.py +0 -941
  85. {empathy_framework-4.7.0.dist-info → empathy_framework-4.8.0.dist-info}/licenses/LICENSE +0 -0
  86. {empathy_framework-4.7.0.dist-info → empathy_framework-4.8.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,168 @@
1
+ """Tier routing strategies for workflow execution.
2
+
3
+ Provides pluggable routing algorithms to determine which model tier
4
+ should handle each workflow stage.
5
+
6
+ Copyright 2025 Smart-AI-Memory
7
+ Licensed under Fair Source License 0.9
8
+ """
9
+
10
+ from __future__ import annotations
11
+
12
+ from abc import ABC, abstractmethod
13
+ from dataclasses import dataclass
14
+ from typing import TYPE_CHECKING
15
+
16
+ if TYPE_CHECKING:
17
+ from empathy_os.workflows.base import ModelTier
18
+
19
+
20
+ @dataclass
21
+ class RoutingContext:
22
+ """Context information for routing decisions.
23
+
24
+ Attributes:
25
+ task_type: Type of task (analyze, generate, review, etc.)
26
+ input_size: Estimated input tokens
27
+ complexity: Task complexity (simple, moderate, complex)
28
+ budget_remaining: Remaining budget in USD
29
+ latency_sensitivity: Latency requirements (low, medium, high)
30
+ """
31
+
32
+ task_type: str
33
+ input_size: int
34
+ complexity: str # "simple" | "moderate" | "complex"
35
+ budget_remaining: float
36
+ latency_sensitivity: str # "low" | "medium" | "high"
37
+
38
+
39
+ class TierRoutingStrategy(ABC):
40
+ """Abstract base class for tier routing strategies.
41
+
42
+ Subclasses implement different routing algorithms:
43
+ - CostOptimizedRouting: Minimize cost
44
+ - PerformanceOptimizedRouting: Minimize latency
45
+ - BalancedRouting: Balance cost and performance
46
+ - HybridRouting: User-configured tier mappings
47
+ """
48
+
49
+ @abstractmethod
50
+ def route(self, context: RoutingContext) -> ModelTier:
51
+ """Route task to appropriate tier.
52
+
53
+ Args:
54
+ context: Routing context with task information
55
+
56
+ Returns:
57
+ ModelTier to use for this task
58
+ """
59
+ pass
60
+
61
+ @abstractmethod
62
+ def can_fallback(self, tier: ModelTier) -> bool:
63
+ """Whether fallback to cheaper tier is allowed.
64
+
65
+ Args:
66
+ tier: The tier that failed or exceeded budget
67
+
68
+ Returns:
69
+ True if fallback is allowed, False otherwise
70
+ """
71
+ pass
72
+
73
+
74
+ class CostOptimizedRouting(TierRoutingStrategy):
75
+ """Route to cheapest tier that can handle the task.
76
+
77
+ Default strategy. Prioritizes cost savings over speed.
78
+
79
+ Example:
80
+ >>> strategy = CostOptimizedRouting()
81
+ >>> tier = strategy.route(context) # CHEAP for simple tasks
82
+ """
83
+
84
+ def route(self, context: RoutingContext) -> ModelTier:
85
+ """Route based on task complexity, preferring cheaper tiers."""
86
+ from empathy_os.workflows.base import ModelTier
87
+
88
+ if context.complexity == "simple":
89
+ return ModelTier.CHEAP
90
+ elif context.complexity == "complex":
91
+ return ModelTier.PREMIUM
92
+ return ModelTier.CAPABLE
93
+
94
+ def can_fallback(self, tier: ModelTier) -> bool:
95
+ """Allow fallback except for CHEAP tier."""
96
+ from empathy_os.workflows.base import ModelTier
97
+
98
+ return tier != ModelTier.CHEAP
99
+
100
+
101
+ class PerformanceOptimizedRouting(TierRoutingStrategy):
102
+ """Route to fastest tier regardless of cost.
103
+
104
+ Use for latency-sensitive workflows like interactive tools.
105
+
106
+ Example:
107
+ >>> strategy = PerformanceOptimizedRouting()
108
+ >>> tier = strategy.route(context) # PREMIUM for high latency sensitivity
109
+ """
110
+
111
+ def route(self, context: RoutingContext) -> ModelTier:
112
+ """Route based on latency requirements."""
113
+ from empathy_os.workflows.base import ModelTier
114
+
115
+ if context.latency_sensitivity == "high":
116
+ return ModelTier.PREMIUM
117
+ return ModelTier.CAPABLE
118
+
119
+ def can_fallback(self, tier: ModelTier) -> bool:
120
+ """Never fallback - performance is priority."""
121
+ return False
122
+
123
+
124
+ class BalancedRouting(TierRoutingStrategy):
125
+ """Balance cost and performance with budget awareness.
126
+
127
+ Adjusts tier selection based on remaining budget and task complexity.
128
+
129
+ Example:
130
+ >>> strategy = BalancedRouting(total_budget=50.0)
131
+ >>> tier = strategy.route(context) # Adapts based on budget
132
+ """
133
+
134
+ def __init__(self, total_budget: float):
135
+ """Initialize with total budget.
136
+
137
+ Args:
138
+ total_budget: Total budget in USD for this workflow execution
139
+
140
+ Raises:
141
+ ValueError: If total_budget is not positive
142
+ """
143
+ if total_budget <= 0:
144
+ raise ValueError("total_budget must be positive")
145
+ self.total_budget = total_budget
146
+
147
+ def route(self, context: RoutingContext) -> ModelTier:
148
+ """Route based on budget ratio and complexity."""
149
+ from empathy_os.workflows.base import ModelTier
150
+
151
+ budget_ratio = context.budget_remaining / self.total_budget
152
+
153
+ # Low budget - use cheap tier
154
+ if budget_ratio < 0.2:
155
+ return ModelTier.CHEAP
156
+
157
+ # High budget + complex task - use premium
158
+ if budget_ratio > 0.7 and context.complexity == "complex":
159
+ return ModelTier.PREMIUM
160
+
161
+ # Default to capable
162
+ return ModelTier.CAPABLE
163
+
164
+ def can_fallback(self, tier: ModelTier) -> bool:
165
+ """Allow fallback when budget-constrained."""
166
+ return True
167
+
168
+
@@ -166,6 +166,7 @@ class SecureReleasePipeline:
166
166
  _get_crew_audit,
167
167
  crew_report_to_workflow_format,
168
168
  )
169
+
169
170
  adapters_available = True
170
171
  except ImportError:
171
172
  adapters_available = False
@@ -342,11 +342,29 @@ class SecurityAuditWorkflow(BaseWorkflow):
342
342
  if self._is_detection_code(line_content, match.group()):
343
343
  continue
344
344
 
345
+ # Phase 2: Skip safe SQL parameterization patterns
346
+ if vuln_type == "sql_injection":
347
+ if self._is_safe_sql_parameterization(
348
+ line_content,
349
+ match.group(),
350
+ content,
351
+ ):
352
+ continue
353
+
345
354
  # Skip fake/test credentials
346
355
  if vuln_type == "hardcoded_secret":
347
356
  if self._is_fake_credential(match.group()):
348
357
  continue
349
358
 
359
+ # Phase 2: Skip safe random usage (tests, demos, documented)
360
+ if vuln_type == "insecure_random":
361
+ if self._is_safe_random_usage(
362
+ line_content,
363
+ file_name,
364
+ content,
365
+ ):
366
+ continue
367
+
350
368
  # Skip command_injection in documentation strings
351
369
  if vuln_type == "command_injection":
352
370
  if self._is_documentation_or_string(
@@ -380,6 +398,29 @@ class SecurityAuditWorkflow(BaseWorkflow):
380
398
  except OSError:
381
399
  continue
382
400
 
401
+ # Phase 3: Apply AST-based filtering for command injection
402
+ try:
403
+ from .security_audit_phase3 import apply_phase3_filtering
404
+
405
+ # Separate command injection findings
406
+ cmd_findings = [f for f in findings if f["type"] == "command_injection"]
407
+ other_findings = [f for f in findings if f["type"] != "command_injection"]
408
+
409
+ # Apply Phase 3 filtering to command injection
410
+ filtered_cmd = apply_phase3_filtering(cmd_findings)
411
+
412
+ # Combine back
413
+ findings = other_findings + filtered_cmd
414
+
415
+ logger.info(
416
+ f"Phase 3: Filtered command_injection from {len(cmd_findings)} to {len(filtered_cmd)} "
417
+ f"({len(cmd_findings) - len(filtered_cmd)} false positives removed)"
418
+ )
419
+ except ImportError:
420
+ logger.debug("Phase 3 module not available, skipping AST-based filtering")
421
+ except Exception as e:
422
+ logger.warning(f"Phase 3 filtering failed: {e}")
423
+
383
424
  input_tokens = len(str(input_data)) // 4
384
425
  output_tokens = len(str(findings)) // 4
385
426
 
@@ -541,6 +582,154 @@ class SecurityAuditWorkflow(BaseWorkflow):
541
582
 
542
583
  return False
543
584
 
585
+ def _is_safe_sql_parameterization(self, line_content: str, match_text: str, file_content: str) -> bool:
586
+ """Check if SQL query uses safe parameterization despite f-string usage.
587
+
588
+ Phase 2 Enhancement: Detects safe patterns like:
589
+ - placeholders = ",".join("?" * len(ids))
590
+ - cursor.execute(f"... IN ({placeholders})", ids)
591
+
592
+ This prevents false positives for the SQLite-recommended pattern
593
+ of building dynamic placeholder strings.
594
+
595
+ Args:
596
+ line_content: The line containing the match (may be incomplete for multi-line)
597
+ match_text: The matched text
598
+ file_content: Full file content for context analysis
599
+
600
+ Returns:
601
+ True if this is safe parameterized SQL, False otherwise
602
+ """
603
+ # Get the position of the match in the full file content
604
+ match_pos = file_content.find(match_text)
605
+ if match_pos == -1:
606
+ # Try to find cursor.execute
607
+ match_pos = file_content.find("cursor.execute")
608
+ if match_pos == -1:
609
+ return False
610
+
611
+ # Extract a larger context (next 200 chars after match)
612
+ context = file_content[match_pos:match_pos + 200]
613
+
614
+ # Also get lines before the match for placeholder detection
615
+ lines_before = file_content[:match_pos].split("\n")
616
+ recent_lines = lines_before[-10:] if len(lines_before) > 10 else lines_before
617
+
618
+ # Pattern 1: Check if this is a placeholder-based parameterized query
619
+ # Look for: cursor.execute(f"... IN ({placeholders})", params)
620
+ if "placeholders" in context or any("placeholders" in line for line in recent_lines[-5:]):
621
+ # Check if context has both f-string and separate parameters
622
+ # Pattern: f"...{placeholders}..." followed by comma and params
623
+ if re.search(r'f["\'][^"\']*\{placeholders\}[^"\']*["\']\s*,\s*\w+', context):
624
+ return True # Safe - has separate parameters
625
+
626
+ # Also check if recent lines built the placeholders
627
+ for prev_line in reversed(recent_lines):
628
+ if "placeholders" in prev_line and '"?"' in prev_line and "join" in prev_line:
629
+ # Found placeholder construction
630
+ # Now check if the execute has separate parameters
631
+ if "," in context and any(param in context for param in ["run_ids", "ids", "params", "values", ")"]):
632
+ return True
633
+
634
+ # Pattern 2: Check if f-string only builds SQL structure with constants
635
+ # Example: f"SELECT * FROM {TABLE_NAME}" where TABLE_NAME is a constant
636
+ f_string_vars = re.findall(r'\{(\w+)\}', context)
637
+ if f_string_vars:
638
+ # Check if all variables are constants (UPPERCASE or table/column names)
639
+ all_constants = all(
640
+ var.isupper() or "TABLE" in var.upper() or "COLUMN" in var.upper()
641
+ for var in f_string_vars
642
+ )
643
+ if all_constants:
644
+ return True # Safe - using constants, not user data
645
+
646
+ # Pattern 3: Check for security note comments nearby
647
+ # If developers added security notes, it's likely safe
648
+ for prev_line in reversed(recent_lines[-3:]):
649
+ if "security note" in prev_line.lower() and "safe" in prev_line.lower():
650
+ return True
651
+
652
+ return False
653
+
654
+ def _is_safe_random_usage(self, line_content: str, file_path: str, file_content: str) -> bool:
655
+ """Check if random usage is in a safe context (tests, simulations, non-crypto).
656
+
657
+ Phase 2 Enhancement: Reduces false positives for random module usage
658
+ in test fixtures, A/B testing simulations, and demo code.
659
+
660
+ Args:
661
+ line_content: The line containing the match
662
+ file_path: Path to the file being scanned
663
+ file_content: Full file content for context analysis
664
+
665
+ Returns:
666
+ True if random usage is safe/documented, False if potentially insecure
667
+ """
668
+ # Check if file is a test file
669
+ is_test = any(pattern in file_path.lower() for pattern in ["/test", "test_", "conftest"])
670
+
671
+ # Check for explicit security notes nearby
672
+ lines = file_content.split("\n")
673
+ line_index = None
674
+ for i, line in enumerate(lines):
675
+ if line_content.strip() in line:
676
+ line_index = i
677
+ break
678
+
679
+ if line_index is not None:
680
+ # Check 5 lines before and after for security notes
681
+ context_start = max(0, line_index - 5)
682
+ context_end = min(len(lines), line_index + 5)
683
+ context = "\n".join(lines[context_start:context_end]).lower()
684
+
685
+ # Look for clarifying comments
686
+ safe_indicators = [
687
+ "security note",
688
+ "not cryptographic",
689
+ "not for crypto",
690
+ "test data",
691
+ "demo data",
692
+ "simulation",
693
+ "reproducible",
694
+ "deterministic",
695
+ "fixed seed",
696
+ "not used for security",
697
+ "not used for secrets",
698
+ "not used for tokens",
699
+ ]
700
+
701
+ if any(indicator in context for indicator in safe_indicators):
702
+ return True # Documented as safe
703
+
704
+ # Check for common safe random patterns
705
+ line_lower = line_content.lower()
706
+
707
+ # Pattern 1: Fixed seed (reproducible tests)
708
+ if "random.seed(" in line_lower:
709
+ return True # Fixed seed is for reproducibility, not security
710
+
711
+ # Pattern 2: A/B testing, simulations, demos
712
+ safe_contexts = [
713
+ "simulation",
714
+ "demo",
715
+ "a/b test",
716
+ "ab_test",
717
+ "fixture",
718
+ "mock",
719
+ "example",
720
+ "sample",
721
+ ]
722
+ if any(context in file_path.lower() for context in safe_contexts):
723
+ return True
724
+
725
+ # If it's a test file without crypto indicators, it's probably safe
726
+ if is_test:
727
+ crypto_indicators = ["password", "secret", "token", "key", "crypto", "auth"]
728
+ if not any(indicator in file_path.lower() for indicator in crypto_indicators):
729
+ return True
730
+
731
+ return False
732
+
544
733
  async def _assess(self, input_data: dict, tier: ModelTier) -> tuple[dict, int, int]:
545
734
  """Risk scoring and severity classification.
546
735
 
@@ -674,6 +863,7 @@ class SecurityAuditWorkflow(BaseWorkflow):
674
863
  """
675
864
  try:
676
865
  from .security_adapters import _check_crew_available
866
+
677
867
  adapters_available = True
678
868
  except ImportError:
679
869
  adapters_available = False