empathy-framework 4.7.0__py3-none-any.whl → 4.8.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- empathy_framework-4.8.0.dist-info/METADATA +753 -0
- {empathy_framework-4.7.0.dist-info → empathy_framework-4.8.0.dist-info}/RECORD +83 -37
- {empathy_framework-4.7.0.dist-info → empathy_framework-4.8.0.dist-info}/WHEEL +1 -1
- {empathy_framework-4.7.0.dist-info → empathy_framework-4.8.0.dist-info}/entry_points.txt +2 -1
- empathy_os/__init__.py +2 -0
- empathy_os/cache/hash_only.py +6 -3
- empathy_os/cache/hybrid.py +6 -3
- empathy_os/cli/__init__.py +128 -238
- empathy_os/cli/__main__.py +5 -33
- empathy_os/cli/commands/__init__.py +1 -8
- empathy_os/cli/commands/help.py +331 -0
- empathy_os/cli/commands/info.py +140 -0
- empathy_os/cli/commands/inspect.py +437 -0
- empathy_os/cli/commands/metrics.py +92 -0
- empathy_os/cli/commands/orchestrate.py +184 -0
- empathy_os/cli/commands/patterns.py +207 -0
- empathy_os/cli/commands/provider.py +93 -81
- empathy_os/cli/commands/setup.py +96 -0
- empathy_os/cli/commands/status.py +235 -0
- empathy_os/cli/commands/sync.py +166 -0
- empathy_os/cli/commands/tier.py +121 -0
- empathy_os/cli/commands/workflow.py +574 -0
- empathy_os/cli/parsers/__init__.py +62 -0
- empathy_os/cli/parsers/help.py +41 -0
- empathy_os/cli/parsers/info.py +26 -0
- empathy_os/cli/parsers/inspect.py +66 -0
- empathy_os/cli/parsers/metrics.py +42 -0
- empathy_os/cli/parsers/orchestrate.py +61 -0
- empathy_os/cli/parsers/patterns.py +54 -0
- empathy_os/cli/parsers/provider.py +40 -0
- empathy_os/cli/parsers/setup.py +42 -0
- empathy_os/cli/parsers/status.py +47 -0
- empathy_os/cli/parsers/sync.py +31 -0
- empathy_os/cli/parsers/tier.py +33 -0
- empathy_os/cli/parsers/workflow.py +77 -0
- empathy_os/cli/utils/__init__.py +1 -0
- empathy_os/cli/utils/data.py +242 -0
- empathy_os/cli/utils/helpers.py +68 -0
- empathy_os/{cli.py → cli_legacy.py} +27 -27
- empathy_os/cli_minimal.py +662 -0
- empathy_os/cli_router.py +384 -0
- empathy_os/cli_unified.py +38 -2
- empathy_os/memory/__init__.py +19 -5
- empathy_os/memory/short_term.py +14 -404
- empathy_os/memory/types.py +437 -0
- empathy_os/memory/unified.py +61 -48
- empathy_os/models/fallback.py +1 -1
- empathy_os/models/provider_config.py +59 -344
- empathy_os/models/registry.py +31 -180
- empathy_os/monitoring/alerts.py +14 -20
- empathy_os/monitoring/alerts_cli.py +24 -7
- empathy_os/project_index/__init__.py +2 -0
- empathy_os/project_index/index.py +210 -5
- empathy_os/project_index/scanner.py +45 -14
- empathy_os/project_index/scanner_parallel.py +291 -0
- empathy_os/socratic/ab_testing.py +1 -1
- empathy_os/vscode_bridge 2.py +173 -0
- empathy_os/workflows/__init__.py +31 -2
- empathy_os/workflows/base.py +349 -325
- empathy_os/workflows/bug_predict.py +8 -0
- empathy_os/workflows/builder.py +273 -0
- empathy_os/workflows/caching.py +253 -0
- empathy_os/workflows/code_review_pipeline.py +1 -0
- empathy_os/workflows/history.py +510 -0
- empathy_os/workflows/output.py +410 -0
- empathy_os/workflows/perf_audit.py +125 -19
- empathy_os/workflows/progress.py +324 -22
- empathy_os/workflows/progressive/README 2.md +454 -0
- empathy_os/workflows/progressive/__init__ 2.py +92 -0
- empathy_os/workflows/progressive/cli 2.py +242 -0
- empathy_os/workflows/progressive/core 2.py +488 -0
- empathy_os/workflows/progressive/orchestrator 2.py +701 -0
- empathy_os/workflows/progressive/reports 2.py +528 -0
- empathy_os/workflows/progressive/telemetry 2.py +280 -0
- empathy_os/workflows/progressive/test_gen 2.py +514 -0
- empathy_os/workflows/progressive/workflow 2.py +628 -0
- empathy_os/workflows/routing.py +168 -0
- empathy_os/workflows/secure_release.py +1 -0
- empathy_os/workflows/security_audit.py +190 -0
- empathy_os/workflows/security_audit_phase3.py +328 -0
- empathy_os/workflows/telemetry_mixin.py +269 -0
- empathy_framework-4.7.0.dist-info/METADATA +0 -1598
- empathy_os/dashboard/__init__.py +0 -15
- empathy_os/dashboard/server.py +0 -941
- {empathy_framework-4.7.0.dist-info → empathy_framework-4.8.0.dist-info}/licenses/LICENSE +0 -0
- {empathy_framework-4.7.0.dist-info → empathy_framework-4.8.0.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,168 @@
|
|
|
1
|
+
"""Tier routing strategies for workflow execution.
|
|
2
|
+
|
|
3
|
+
Provides pluggable routing algorithms to determine which model tier
|
|
4
|
+
should handle each workflow stage.
|
|
5
|
+
|
|
6
|
+
Copyright 2025 Smart-AI-Memory
|
|
7
|
+
Licensed under Fair Source License 0.9
|
|
8
|
+
"""
|
|
9
|
+
|
|
10
|
+
from __future__ import annotations
|
|
11
|
+
|
|
12
|
+
from abc import ABC, abstractmethod
|
|
13
|
+
from dataclasses import dataclass
|
|
14
|
+
from typing import TYPE_CHECKING
|
|
15
|
+
|
|
16
|
+
if TYPE_CHECKING:
|
|
17
|
+
from empathy_os.workflows.base import ModelTier
|
|
18
|
+
|
|
19
|
+
|
|
20
|
+
@dataclass
|
|
21
|
+
class RoutingContext:
|
|
22
|
+
"""Context information for routing decisions.
|
|
23
|
+
|
|
24
|
+
Attributes:
|
|
25
|
+
task_type: Type of task (analyze, generate, review, etc.)
|
|
26
|
+
input_size: Estimated input tokens
|
|
27
|
+
complexity: Task complexity (simple, moderate, complex)
|
|
28
|
+
budget_remaining: Remaining budget in USD
|
|
29
|
+
latency_sensitivity: Latency requirements (low, medium, high)
|
|
30
|
+
"""
|
|
31
|
+
|
|
32
|
+
task_type: str
|
|
33
|
+
input_size: int
|
|
34
|
+
complexity: str # "simple" | "moderate" | "complex"
|
|
35
|
+
budget_remaining: float
|
|
36
|
+
latency_sensitivity: str # "low" | "medium" | "high"
|
|
37
|
+
|
|
38
|
+
|
|
39
|
+
class TierRoutingStrategy(ABC):
|
|
40
|
+
"""Abstract base class for tier routing strategies.
|
|
41
|
+
|
|
42
|
+
Subclasses implement different routing algorithms:
|
|
43
|
+
- CostOptimizedRouting: Minimize cost
|
|
44
|
+
- PerformanceOptimizedRouting: Minimize latency
|
|
45
|
+
- BalancedRouting: Balance cost and performance
|
|
46
|
+
- HybridRouting: User-configured tier mappings
|
|
47
|
+
"""
|
|
48
|
+
|
|
49
|
+
@abstractmethod
|
|
50
|
+
def route(self, context: RoutingContext) -> ModelTier:
|
|
51
|
+
"""Route task to appropriate tier.
|
|
52
|
+
|
|
53
|
+
Args:
|
|
54
|
+
context: Routing context with task information
|
|
55
|
+
|
|
56
|
+
Returns:
|
|
57
|
+
ModelTier to use for this task
|
|
58
|
+
"""
|
|
59
|
+
pass
|
|
60
|
+
|
|
61
|
+
@abstractmethod
|
|
62
|
+
def can_fallback(self, tier: ModelTier) -> bool:
|
|
63
|
+
"""Whether fallback to cheaper tier is allowed.
|
|
64
|
+
|
|
65
|
+
Args:
|
|
66
|
+
tier: The tier that failed or exceeded budget
|
|
67
|
+
|
|
68
|
+
Returns:
|
|
69
|
+
True if fallback is allowed, False otherwise
|
|
70
|
+
"""
|
|
71
|
+
pass
|
|
72
|
+
|
|
73
|
+
|
|
74
|
+
class CostOptimizedRouting(TierRoutingStrategy):
|
|
75
|
+
"""Route to cheapest tier that can handle the task.
|
|
76
|
+
|
|
77
|
+
Default strategy. Prioritizes cost savings over speed.
|
|
78
|
+
|
|
79
|
+
Example:
|
|
80
|
+
>>> strategy = CostOptimizedRouting()
|
|
81
|
+
>>> tier = strategy.route(context) # CHEAP for simple tasks
|
|
82
|
+
"""
|
|
83
|
+
|
|
84
|
+
def route(self, context: RoutingContext) -> ModelTier:
|
|
85
|
+
"""Route based on task complexity, preferring cheaper tiers."""
|
|
86
|
+
from empathy_os.workflows.base import ModelTier
|
|
87
|
+
|
|
88
|
+
if context.complexity == "simple":
|
|
89
|
+
return ModelTier.CHEAP
|
|
90
|
+
elif context.complexity == "complex":
|
|
91
|
+
return ModelTier.PREMIUM
|
|
92
|
+
return ModelTier.CAPABLE
|
|
93
|
+
|
|
94
|
+
def can_fallback(self, tier: ModelTier) -> bool:
|
|
95
|
+
"""Allow fallback except for CHEAP tier."""
|
|
96
|
+
from empathy_os.workflows.base import ModelTier
|
|
97
|
+
|
|
98
|
+
return tier != ModelTier.CHEAP
|
|
99
|
+
|
|
100
|
+
|
|
101
|
+
class PerformanceOptimizedRouting(TierRoutingStrategy):
|
|
102
|
+
"""Route to fastest tier regardless of cost.
|
|
103
|
+
|
|
104
|
+
Use for latency-sensitive workflows like interactive tools.
|
|
105
|
+
|
|
106
|
+
Example:
|
|
107
|
+
>>> strategy = PerformanceOptimizedRouting()
|
|
108
|
+
>>> tier = strategy.route(context) # PREMIUM for high latency sensitivity
|
|
109
|
+
"""
|
|
110
|
+
|
|
111
|
+
def route(self, context: RoutingContext) -> ModelTier:
|
|
112
|
+
"""Route based on latency requirements."""
|
|
113
|
+
from empathy_os.workflows.base import ModelTier
|
|
114
|
+
|
|
115
|
+
if context.latency_sensitivity == "high":
|
|
116
|
+
return ModelTier.PREMIUM
|
|
117
|
+
return ModelTier.CAPABLE
|
|
118
|
+
|
|
119
|
+
def can_fallback(self, tier: ModelTier) -> bool:
|
|
120
|
+
"""Never fallback - performance is priority."""
|
|
121
|
+
return False
|
|
122
|
+
|
|
123
|
+
|
|
124
|
+
class BalancedRouting(TierRoutingStrategy):
|
|
125
|
+
"""Balance cost and performance with budget awareness.
|
|
126
|
+
|
|
127
|
+
Adjusts tier selection based on remaining budget and task complexity.
|
|
128
|
+
|
|
129
|
+
Example:
|
|
130
|
+
>>> strategy = BalancedRouting(total_budget=50.0)
|
|
131
|
+
>>> tier = strategy.route(context) # Adapts based on budget
|
|
132
|
+
"""
|
|
133
|
+
|
|
134
|
+
def __init__(self, total_budget: float):
|
|
135
|
+
"""Initialize with total budget.
|
|
136
|
+
|
|
137
|
+
Args:
|
|
138
|
+
total_budget: Total budget in USD for this workflow execution
|
|
139
|
+
|
|
140
|
+
Raises:
|
|
141
|
+
ValueError: If total_budget is not positive
|
|
142
|
+
"""
|
|
143
|
+
if total_budget <= 0:
|
|
144
|
+
raise ValueError("total_budget must be positive")
|
|
145
|
+
self.total_budget = total_budget
|
|
146
|
+
|
|
147
|
+
def route(self, context: RoutingContext) -> ModelTier:
|
|
148
|
+
"""Route based on budget ratio and complexity."""
|
|
149
|
+
from empathy_os.workflows.base import ModelTier
|
|
150
|
+
|
|
151
|
+
budget_ratio = context.budget_remaining / self.total_budget
|
|
152
|
+
|
|
153
|
+
# Low budget - use cheap tier
|
|
154
|
+
if budget_ratio < 0.2:
|
|
155
|
+
return ModelTier.CHEAP
|
|
156
|
+
|
|
157
|
+
# High budget + complex task - use premium
|
|
158
|
+
if budget_ratio > 0.7 and context.complexity == "complex":
|
|
159
|
+
return ModelTier.PREMIUM
|
|
160
|
+
|
|
161
|
+
# Default to capable
|
|
162
|
+
return ModelTier.CAPABLE
|
|
163
|
+
|
|
164
|
+
def can_fallback(self, tier: ModelTier) -> bool:
|
|
165
|
+
"""Allow fallback when budget-constrained."""
|
|
166
|
+
return True
|
|
167
|
+
|
|
168
|
+
|
|
@@ -342,11 +342,29 @@ class SecurityAuditWorkflow(BaseWorkflow):
|
|
|
342
342
|
if self._is_detection_code(line_content, match.group()):
|
|
343
343
|
continue
|
|
344
344
|
|
|
345
|
+
# Phase 2: Skip safe SQL parameterization patterns
|
|
346
|
+
if vuln_type == "sql_injection":
|
|
347
|
+
if self._is_safe_sql_parameterization(
|
|
348
|
+
line_content,
|
|
349
|
+
match.group(),
|
|
350
|
+
content,
|
|
351
|
+
):
|
|
352
|
+
continue
|
|
353
|
+
|
|
345
354
|
# Skip fake/test credentials
|
|
346
355
|
if vuln_type == "hardcoded_secret":
|
|
347
356
|
if self._is_fake_credential(match.group()):
|
|
348
357
|
continue
|
|
349
358
|
|
|
359
|
+
# Phase 2: Skip safe random usage (tests, demos, documented)
|
|
360
|
+
if vuln_type == "insecure_random":
|
|
361
|
+
if self._is_safe_random_usage(
|
|
362
|
+
line_content,
|
|
363
|
+
file_name,
|
|
364
|
+
content,
|
|
365
|
+
):
|
|
366
|
+
continue
|
|
367
|
+
|
|
350
368
|
# Skip command_injection in documentation strings
|
|
351
369
|
if vuln_type == "command_injection":
|
|
352
370
|
if self._is_documentation_or_string(
|
|
@@ -380,6 +398,29 @@ class SecurityAuditWorkflow(BaseWorkflow):
|
|
|
380
398
|
except OSError:
|
|
381
399
|
continue
|
|
382
400
|
|
|
401
|
+
# Phase 3: Apply AST-based filtering for command injection
|
|
402
|
+
try:
|
|
403
|
+
from .security_audit_phase3 import apply_phase3_filtering
|
|
404
|
+
|
|
405
|
+
# Separate command injection findings
|
|
406
|
+
cmd_findings = [f for f in findings if f["type"] == "command_injection"]
|
|
407
|
+
other_findings = [f for f in findings if f["type"] != "command_injection"]
|
|
408
|
+
|
|
409
|
+
# Apply Phase 3 filtering to command injection
|
|
410
|
+
filtered_cmd = apply_phase3_filtering(cmd_findings)
|
|
411
|
+
|
|
412
|
+
# Combine back
|
|
413
|
+
findings = other_findings + filtered_cmd
|
|
414
|
+
|
|
415
|
+
logger.info(
|
|
416
|
+
f"Phase 3: Filtered command_injection from {len(cmd_findings)} to {len(filtered_cmd)} "
|
|
417
|
+
f"({len(cmd_findings) - len(filtered_cmd)} false positives removed)"
|
|
418
|
+
)
|
|
419
|
+
except ImportError:
|
|
420
|
+
logger.debug("Phase 3 module not available, skipping AST-based filtering")
|
|
421
|
+
except Exception as e:
|
|
422
|
+
logger.warning(f"Phase 3 filtering failed: {e}")
|
|
423
|
+
|
|
383
424
|
input_tokens = len(str(input_data)) // 4
|
|
384
425
|
output_tokens = len(str(findings)) // 4
|
|
385
426
|
|
|
@@ -541,6 +582,154 @@ class SecurityAuditWorkflow(BaseWorkflow):
|
|
|
541
582
|
|
|
542
583
|
return False
|
|
543
584
|
|
|
585
|
+
def _is_safe_sql_parameterization(self, line_content: str, match_text: str, file_content: str) -> bool:
|
|
586
|
+
"""Check if SQL query uses safe parameterization despite f-string usage.
|
|
587
|
+
|
|
588
|
+
Phase 2 Enhancement: Detects safe patterns like:
|
|
589
|
+
- placeholders = ",".join("?" * len(ids))
|
|
590
|
+
- cursor.execute(f"... IN ({placeholders})", ids)
|
|
591
|
+
|
|
592
|
+
This prevents false positives for the SQLite-recommended pattern
|
|
593
|
+
of building dynamic placeholder strings.
|
|
594
|
+
|
|
595
|
+
Args:
|
|
596
|
+
line_content: The line containing the match (may be incomplete for multi-line)
|
|
597
|
+
match_text: The matched text
|
|
598
|
+
file_content: Full file content for context analysis
|
|
599
|
+
|
|
600
|
+
Returns:
|
|
601
|
+
True if this is safe parameterized SQL, False otherwise
|
|
602
|
+
"""
|
|
603
|
+
# Get the position of the match in the full file content
|
|
604
|
+
match_pos = file_content.find(match_text)
|
|
605
|
+
if match_pos == -1:
|
|
606
|
+
# Try to find cursor.execute
|
|
607
|
+
match_pos = file_content.find("cursor.execute")
|
|
608
|
+
if match_pos == -1:
|
|
609
|
+
return False
|
|
610
|
+
|
|
611
|
+
# Extract a larger context (next 200 chars after match)
|
|
612
|
+
context = file_content[match_pos:match_pos + 200]
|
|
613
|
+
|
|
614
|
+
# Also get lines before the match for placeholder detection
|
|
615
|
+
lines_before = file_content[:match_pos].split("\n")
|
|
616
|
+
recent_lines = lines_before[-10:] if len(lines_before) > 10 else lines_before
|
|
617
|
+
|
|
618
|
+
# Pattern 1: Check if this is a placeholder-based parameterized query
|
|
619
|
+
# Look for: cursor.execute(f"... IN ({placeholders})", params)
|
|
620
|
+
if "placeholders" in context or any("placeholders" in line for line in recent_lines[-5:]):
|
|
621
|
+
# Check if context has both f-string and separate parameters
|
|
622
|
+
# Pattern: f"...{placeholders}..." followed by comma and params
|
|
623
|
+
if re.search(r'f["\'][^"\']*\{placeholders\}[^"\']*["\']\s*,\s*\w+', context):
|
|
624
|
+
return True # Safe - has separate parameters
|
|
625
|
+
|
|
626
|
+
# Also check if recent lines built the placeholders
|
|
627
|
+
for prev_line in reversed(recent_lines):
|
|
628
|
+
if "placeholders" in prev_line and '"?"' in prev_line and "join" in prev_line:
|
|
629
|
+
# Found placeholder construction
|
|
630
|
+
# Now check if the execute has separate parameters
|
|
631
|
+
if "," in context and any(param in context for param in ["run_ids", "ids", "params", "values", ")"]):
|
|
632
|
+
return True
|
|
633
|
+
|
|
634
|
+
# Pattern 2: Check if f-string only builds SQL structure with constants
|
|
635
|
+
# Example: f"SELECT * FROM {TABLE_NAME}" where TABLE_NAME is a constant
|
|
636
|
+
f_string_vars = re.findall(r'\{(\w+)\}', context)
|
|
637
|
+
if f_string_vars:
|
|
638
|
+
# Check if all variables are constants (UPPERCASE or table/column names)
|
|
639
|
+
all_constants = all(
|
|
640
|
+
var.isupper() or "TABLE" in var.upper() or "COLUMN" in var.upper()
|
|
641
|
+
for var in f_string_vars
|
|
642
|
+
)
|
|
643
|
+
if all_constants:
|
|
644
|
+
return True # Safe - using constants, not user data
|
|
645
|
+
|
|
646
|
+
# Pattern 3: Check for security note comments nearby
|
|
647
|
+
# If developers added security notes, it's likely safe
|
|
648
|
+
for prev_line in reversed(recent_lines[-3:]):
|
|
649
|
+
if "security note" in prev_line.lower() and "safe" in prev_line.lower():
|
|
650
|
+
return True
|
|
651
|
+
|
|
652
|
+
return False
|
|
653
|
+
|
|
654
|
+
def _is_safe_random_usage(self, line_content: str, file_path: str, file_content: str) -> bool:
|
|
655
|
+
"""Check if random usage is in a safe context (tests, simulations, non-crypto).
|
|
656
|
+
|
|
657
|
+
Phase 2 Enhancement: Reduces false positives for random module usage
|
|
658
|
+
in test fixtures, A/B testing simulations, and demo code.
|
|
659
|
+
|
|
660
|
+
Args:
|
|
661
|
+
line_content: The line containing the match
|
|
662
|
+
file_path: Path to the file being scanned
|
|
663
|
+
file_content: Full file content for context analysis
|
|
664
|
+
|
|
665
|
+
Returns:
|
|
666
|
+
True if random usage is safe/documented, False if potentially insecure
|
|
667
|
+
"""
|
|
668
|
+
# Check if file is a test file
|
|
669
|
+
is_test = any(pattern in file_path.lower() for pattern in ["/test", "test_", "conftest"])
|
|
670
|
+
|
|
671
|
+
# Check for explicit security notes nearby
|
|
672
|
+
lines = file_content.split("\n")
|
|
673
|
+
line_index = None
|
|
674
|
+
for i, line in enumerate(lines):
|
|
675
|
+
if line_content.strip() in line:
|
|
676
|
+
line_index = i
|
|
677
|
+
break
|
|
678
|
+
|
|
679
|
+
if line_index is not None:
|
|
680
|
+
# Check 5 lines before and after for security notes
|
|
681
|
+
context_start = max(0, line_index - 5)
|
|
682
|
+
context_end = min(len(lines), line_index + 5)
|
|
683
|
+
context = "\n".join(lines[context_start:context_end]).lower()
|
|
684
|
+
|
|
685
|
+
# Look for clarifying comments
|
|
686
|
+
safe_indicators = [
|
|
687
|
+
"security note",
|
|
688
|
+
"not cryptographic",
|
|
689
|
+
"not for crypto",
|
|
690
|
+
"test data",
|
|
691
|
+
"demo data",
|
|
692
|
+
"simulation",
|
|
693
|
+
"reproducible",
|
|
694
|
+
"deterministic",
|
|
695
|
+
"fixed seed",
|
|
696
|
+
"not used for security",
|
|
697
|
+
"not used for secrets",
|
|
698
|
+
"not used for tokens",
|
|
699
|
+
]
|
|
700
|
+
|
|
701
|
+
if any(indicator in context for indicator in safe_indicators):
|
|
702
|
+
return True # Documented as safe
|
|
703
|
+
|
|
704
|
+
# Check for common safe random patterns
|
|
705
|
+
line_lower = line_content.lower()
|
|
706
|
+
|
|
707
|
+
# Pattern 1: Fixed seed (reproducible tests)
|
|
708
|
+
if "random.seed(" in line_lower:
|
|
709
|
+
return True # Fixed seed is for reproducibility, not security
|
|
710
|
+
|
|
711
|
+
# Pattern 2: A/B testing, simulations, demos
|
|
712
|
+
safe_contexts = [
|
|
713
|
+
"simulation",
|
|
714
|
+
"demo",
|
|
715
|
+
"a/b test",
|
|
716
|
+
"ab_test",
|
|
717
|
+
"fixture",
|
|
718
|
+
"mock",
|
|
719
|
+
"example",
|
|
720
|
+
"sample",
|
|
721
|
+
]
|
|
722
|
+
if any(context in file_path.lower() for context in safe_contexts):
|
|
723
|
+
return True
|
|
724
|
+
|
|
725
|
+
# If it's a test file without crypto indicators, it's probably safe
|
|
726
|
+
if is_test:
|
|
727
|
+
crypto_indicators = ["password", "secret", "token", "key", "crypto", "auth"]
|
|
728
|
+
if not any(indicator in file_path.lower() for indicator in crypto_indicators):
|
|
729
|
+
return True
|
|
730
|
+
|
|
731
|
+
return False
|
|
732
|
+
|
|
544
733
|
async def _assess(self, input_data: dict, tier: ModelTier) -> tuple[dict, int, int]:
|
|
545
734
|
"""Risk scoring and severity classification.
|
|
546
735
|
|
|
@@ -674,6 +863,7 @@ class SecurityAuditWorkflow(BaseWorkflow):
|
|
|
674
863
|
"""
|
|
675
864
|
try:
|
|
676
865
|
from .security_adapters import _check_crew_available
|
|
866
|
+
|
|
677
867
|
adapters_available = True
|
|
678
868
|
except ImportError:
|
|
679
869
|
adapters_available = False
|