empathy-framework 5.2.1__py3-none-any.whl → 5.4.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (480) hide show
  1. empathy_framework-5.4.0.dist-info/METADATA +47 -0
  2. empathy_framework-5.4.0.dist-info/RECORD +8 -0
  3. {empathy_framework-5.2.1.dist-info → empathy_framework-5.4.0.dist-info}/top_level.txt +0 -1
  4. empathy_healthcare_plugin/__init__.py +12 -11
  5. empathy_llm_toolkit/__init__.py +12 -26
  6. empathy_os/__init__.py +12 -356
  7. empathy_software_plugin/__init__.py +12 -11
  8. empathy_framework-5.2.1.dist-info/METADATA +0 -1002
  9. empathy_framework-5.2.1.dist-info/RECORD +0 -478
  10. empathy_framework-5.2.1.dist-info/entry_points.txt +0 -26
  11. empathy_framework-5.2.1.dist-info/licenses/LICENSE +0 -201
  12. empathy_framework-5.2.1.dist-info/licenses/LICENSE_CHANGE_ANNOUNCEMENT.md +0 -101
  13. empathy_healthcare_plugin/monitors/__init__.py +0 -9
  14. empathy_healthcare_plugin/monitors/clinical_protocol_monitor.py +0 -315
  15. empathy_healthcare_plugin/monitors/monitoring/__init__.py +0 -44
  16. empathy_healthcare_plugin/monitors/monitoring/protocol_checker.py +0 -300
  17. empathy_healthcare_plugin/monitors/monitoring/protocol_loader.py +0 -214
  18. empathy_healthcare_plugin/monitors/monitoring/sensor_parsers.py +0 -306
  19. empathy_healthcare_plugin/monitors/monitoring/trajectory_analyzer.py +0 -389
  20. empathy_healthcare_plugin/protocols/cardiac.json +0 -93
  21. empathy_healthcare_plugin/protocols/post_operative.json +0 -92
  22. empathy_healthcare_plugin/protocols/respiratory.json +0 -92
  23. empathy_healthcare_plugin/protocols/sepsis.json +0 -141
  24. empathy_llm_toolkit/README.md +0 -553
  25. empathy_llm_toolkit/agent_factory/__init__.py +0 -53
  26. empathy_llm_toolkit/agent_factory/adapters/__init__.py +0 -85
  27. empathy_llm_toolkit/agent_factory/adapters/autogen_adapter.py +0 -312
  28. empathy_llm_toolkit/agent_factory/adapters/crewai_adapter.py +0 -483
  29. empathy_llm_toolkit/agent_factory/adapters/haystack_adapter.py +0 -298
  30. empathy_llm_toolkit/agent_factory/adapters/langchain_adapter.py +0 -362
  31. empathy_llm_toolkit/agent_factory/adapters/langgraph_adapter.py +0 -333
  32. empathy_llm_toolkit/agent_factory/adapters/native.py +0 -228
  33. empathy_llm_toolkit/agent_factory/adapters/wizard_adapter.py +0 -423
  34. empathy_llm_toolkit/agent_factory/base.py +0 -305
  35. empathy_llm_toolkit/agent_factory/crews/__init__.py +0 -67
  36. empathy_llm_toolkit/agent_factory/crews/code_review.py +0 -1113
  37. empathy_llm_toolkit/agent_factory/crews/health_check.py +0 -1262
  38. empathy_llm_toolkit/agent_factory/crews/refactoring.py +0 -1128
  39. empathy_llm_toolkit/agent_factory/crews/security_audit.py +0 -1018
  40. empathy_llm_toolkit/agent_factory/decorators.py +0 -287
  41. empathy_llm_toolkit/agent_factory/factory.py +0 -558
  42. empathy_llm_toolkit/agent_factory/framework.py +0 -193
  43. empathy_llm_toolkit/agent_factory/memory_integration.py +0 -328
  44. empathy_llm_toolkit/agent_factory/resilient.py +0 -320
  45. empathy_llm_toolkit/agents_md/__init__.py +0 -22
  46. empathy_llm_toolkit/agents_md/loader.py +0 -218
  47. empathy_llm_toolkit/agents_md/parser.py +0 -271
  48. empathy_llm_toolkit/agents_md/registry.py +0 -307
  49. empathy_llm_toolkit/claude_memory.py +0 -466
  50. empathy_llm_toolkit/cli/__init__.py +0 -8
  51. empathy_llm_toolkit/cli/sync_claude.py +0 -487
  52. empathy_llm_toolkit/code_health.py +0 -1313
  53. empathy_llm_toolkit/commands/__init__.py +0 -51
  54. empathy_llm_toolkit/commands/context.py +0 -375
  55. empathy_llm_toolkit/commands/loader.py +0 -301
  56. empathy_llm_toolkit/commands/models.py +0 -231
  57. empathy_llm_toolkit/commands/parser.py +0 -371
  58. empathy_llm_toolkit/commands/registry.py +0 -429
  59. empathy_llm_toolkit/config/__init__.py +0 -29
  60. empathy_llm_toolkit/config/unified.py +0 -291
  61. empathy_llm_toolkit/context/__init__.py +0 -22
  62. empathy_llm_toolkit/context/compaction.py +0 -455
  63. empathy_llm_toolkit/context/manager.py +0 -434
  64. empathy_llm_toolkit/contextual_patterns.py +0 -361
  65. empathy_llm_toolkit/core.py +0 -907
  66. empathy_llm_toolkit/git_pattern_extractor.py +0 -435
  67. empathy_llm_toolkit/hooks/__init__.py +0 -24
  68. empathy_llm_toolkit/hooks/config.py +0 -306
  69. empathy_llm_toolkit/hooks/executor.py +0 -289
  70. empathy_llm_toolkit/hooks/registry.py +0 -302
  71. empathy_llm_toolkit/hooks/scripts/__init__.py +0 -39
  72. empathy_llm_toolkit/hooks/scripts/evaluate_session.py +0 -201
  73. empathy_llm_toolkit/hooks/scripts/first_time_init.py +0 -285
  74. empathy_llm_toolkit/hooks/scripts/pre_compact.py +0 -207
  75. empathy_llm_toolkit/hooks/scripts/session_end.py +0 -183
  76. empathy_llm_toolkit/hooks/scripts/session_start.py +0 -163
  77. empathy_llm_toolkit/hooks/scripts/suggest_compact.py +0 -225
  78. empathy_llm_toolkit/learning/__init__.py +0 -30
  79. empathy_llm_toolkit/learning/evaluator.py +0 -438
  80. empathy_llm_toolkit/learning/extractor.py +0 -514
  81. empathy_llm_toolkit/learning/storage.py +0 -560
  82. empathy_llm_toolkit/levels.py +0 -227
  83. empathy_llm_toolkit/pattern_confidence.py +0 -414
  84. empathy_llm_toolkit/pattern_resolver.py +0 -272
  85. empathy_llm_toolkit/pattern_summary.py +0 -350
  86. empathy_llm_toolkit/providers.py +0 -967
  87. empathy_llm_toolkit/routing/__init__.py +0 -32
  88. empathy_llm_toolkit/routing/model_router.py +0 -362
  89. empathy_llm_toolkit/security/IMPLEMENTATION_SUMMARY.md +0 -413
  90. empathy_llm_toolkit/security/PHASE2_COMPLETE.md +0 -384
  91. empathy_llm_toolkit/security/PHASE2_SECRETS_DETECTOR_COMPLETE.md +0 -271
  92. empathy_llm_toolkit/security/QUICK_REFERENCE.md +0 -316
  93. empathy_llm_toolkit/security/README.md +0 -262
  94. empathy_llm_toolkit/security/__init__.py +0 -62
  95. empathy_llm_toolkit/security/audit_logger.py +0 -929
  96. empathy_llm_toolkit/security/audit_logger_example.py +0 -152
  97. empathy_llm_toolkit/security/pii_scrubber.py +0 -640
  98. empathy_llm_toolkit/security/secrets_detector.py +0 -678
  99. empathy_llm_toolkit/security/secrets_detector_example.py +0 -304
  100. empathy_llm_toolkit/security/secure_memdocs.py +0 -1192
  101. empathy_llm_toolkit/security/secure_memdocs_example.py +0 -278
  102. empathy_llm_toolkit/session_status.py +0 -745
  103. empathy_llm_toolkit/state.py +0 -246
  104. empathy_llm_toolkit/utils/__init__.py +0 -5
  105. empathy_llm_toolkit/utils/tokens.py +0 -349
  106. empathy_os/adaptive/__init__.py +0 -13
  107. empathy_os/adaptive/task_complexity.py +0 -127
  108. empathy_os/agent_monitoring.py +0 -414
  109. empathy_os/cache/__init__.py +0 -117
  110. empathy_os/cache/base.py +0 -166
  111. empathy_os/cache/dependency_manager.py +0 -256
  112. empathy_os/cache/hash_only.py +0 -251
  113. empathy_os/cache/hybrid.py +0 -453
  114. empathy_os/cache/storage.py +0 -285
  115. empathy_os/cache_monitor.py +0 -356
  116. empathy_os/cache_stats.py +0 -298
  117. empathy_os/cli/__init__.py +0 -152
  118. empathy_os/cli/__main__.py +0 -12
  119. empathy_os/cli/commands/__init__.py +0 -1
  120. empathy_os/cli/commands/batch.py +0 -256
  121. empathy_os/cli/commands/cache.py +0 -248
  122. empathy_os/cli/commands/help.py +0 -331
  123. empathy_os/cli/commands/info.py +0 -140
  124. empathy_os/cli/commands/inspect.py +0 -436
  125. empathy_os/cli/commands/inspection.py +0 -57
  126. empathy_os/cli/commands/memory.py +0 -48
  127. empathy_os/cli/commands/metrics.py +0 -92
  128. empathy_os/cli/commands/orchestrate.py +0 -184
  129. empathy_os/cli/commands/patterns.py +0 -207
  130. empathy_os/cli/commands/profiling.py +0 -198
  131. empathy_os/cli/commands/provider.py +0 -98
  132. empathy_os/cli/commands/routing.py +0 -285
  133. empathy_os/cli/commands/setup.py +0 -96
  134. empathy_os/cli/commands/status.py +0 -235
  135. empathy_os/cli/commands/sync.py +0 -166
  136. empathy_os/cli/commands/tier.py +0 -121
  137. empathy_os/cli/commands/utilities.py +0 -114
  138. empathy_os/cli/commands/workflow.py +0 -575
  139. empathy_os/cli/core.py +0 -32
  140. empathy_os/cli/parsers/__init__.py +0 -68
  141. empathy_os/cli/parsers/batch.py +0 -118
  142. empathy_os/cli/parsers/cache 2.py +0 -65
  143. empathy_os/cli/parsers/cache.py +0 -65
  144. empathy_os/cli/parsers/help.py +0 -41
  145. empathy_os/cli/parsers/info.py +0 -26
  146. empathy_os/cli/parsers/inspect.py +0 -66
  147. empathy_os/cli/parsers/metrics.py +0 -42
  148. empathy_os/cli/parsers/orchestrate.py +0 -61
  149. empathy_os/cli/parsers/patterns.py +0 -54
  150. empathy_os/cli/parsers/provider.py +0 -40
  151. empathy_os/cli/parsers/routing.py +0 -110
  152. empathy_os/cli/parsers/setup.py +0 -42
  153. empathy_os/cli/parsers/status.py +0 -47
  154. empathy_os/cli/parsers/sync.py +0 -31
  155. empathy_os/cli/parsers/tier.py +0 -33
  156. empathy_os/cli/parsers/workflow.py +0 -77
  157. empathy_os/cli/utils/__init__.py +0 -1
  158. empathy_os/cli/utils/data.py +0 -242
  159. empathy_os/cli/utils/helpers.py +0 -68
  160. empathy_os/cli_legacy.py +0 -3957
  161. empathy_os/cli_minimal.py +0 -1159
  162. empathy_os/cli_router 2.py +0 -416
  163. empathy_os/cli_router.py +0 -437
  164. empathy_os/cli_unified.py +0 -814
  165. empathy_os/config/__init__.py +0 -66
  166. empathy_os/config/xml_config.py +0 -286
  167. empathy_os/config.py +0 -532
  168. empathy_os/coordination.py +0 -870
  169. empathy_os/core.py +0 -1511
  170. empathy_os/core_modules/__init__.py +0 -15
  171. empathy_os/cost_tracker.py +0 -626
  172. empathy_os/dashboard/__init__.py +0 -41
  173. empathy_os/dashboard/app 2.py +0 -512
  174. empathy_os/dashboard/app.py +0 -512
  175. empathy_os/dashboard/simple_server 2.py +0 -403
  176. empathy_os/dashboard/simple_server.py +0 -403
  177. empathy_os/dashboard/standalone_server 2.py +0 -536
  178. empathy_os/dashboard/standalone_server.py +0 -547
  179. empathy_os/discovery.py +0 -306
  180. empathy_os/emergence.py +0 -306
  181. empathy_os/exceptions.py +0 -123
  182. empathy_os/feedback_loops.py +0 -373
  183. empathy_os/hot_reload/README.md +0 -473
  184. empathy_os/hot_reload/__init__.py +0 -62
  185. empathy_os/hot_reload/config.py +0 -83
  186. empathy_os/hot_reload/integration.py +0 -229
  187. empathy_os/hot_reload/reloader.py +0 -298
  188. empathy_os/hot_reload/watcher.py +0 -183
  189. empathy_os/hot_reload/websocket.py +0 -177
  190. empathy_os/levels.py +0 -577
  191. empathy_os/leverage_points.py +0 -441
  192. empathy_os/logging_config.py +0 -261
  193. empathy_os/mcp/__init__.py +0 -10
  194. empathy_os/mcp/server.py +0 -506
  195. empathy_os/memory/__init__.py +0 -237
  196. empathy_os/memory/claude_memory.py +0 -469
  197. empathy_os/memory/config.py +0 -224
  198. empathy_os/memory/control_panel.py +0 -1290
  199. empathy_os/memory/control_panel_support.py +0 -145
  200. empathy_os/memory/cross_session.py +0 -845
  201. empathy_os/memory/edges.py +0 -179
  202. empathy_os/memory/encryption.py +0 -159
  203. empathy_os/memory/file_session.py +0 -770
  204. empathy_os/memory/graph.py +0 -570
  205. empathy_os/memory/long_term.py +0 -913
  206. empathy_os/memory/long_term_types.py +0 -99
  207. empathy_os/memory/mixins/__init__.py +0 -25
  208. empathy_os/memory/mixins/backend_init_mixin.py +0 -244
  209. empathy_os/memory/mixins/capabilities_mixin.py +0 -199
  210. empathy_os/memory/mixins/handoff_mixin.py +0 -208
  211. empathy_os/memory/mixins/lifecycle_mixin.py +0 -49
  212. empathy_os/memory/mixins/long_term_mixin.py +0 -352
  213. empathy_os/memory/mixins/promotion_mixin.py +0 -109
  214. empathy_os/memory/mixins/short_term_mixin.py +0 -182
  215. empathy_os/memory/nodes.py +0 -179
  216. empathy_os/memory/redis_bootstrap.py +0 -540
  217. empathy_os/memory/security/__init__.py +0 -31
  218. empathy_os/memory/security/audit_logger.py +0 -932
  219. empathy_os/memory/security/pii_scrubber.py +0 -640
  220. empathy_os/memory/security/secrets_detector.py +0 -678
  221. empathy_os/memory/short_term.py +0 -2150
  222. empathy_os/memory/simple_storage.py +0 -302
  223. empathy_os/memory/storage/__init__.py +0 -15
  224. empathy_os/memory/storage_backend.py +0 -167
  225. empathy_os/memory/summary_index.py +0 -583
  226. empathy_os/memory/types.py +0 -441
  227. empathy_os/memory/unified.py +0 -182
  228. empathy_os/meta_workflows/__init__.py +0 -74
  229. empathy_os/meta_workflows/agent_creator.py +0 -248
  230. empathy_os/meta_workflows/builtin_templates.py +0 -567
  231. empathy_os/meta_workflows/cli_commands/__init__.py +0 -56
  232. empathy_os/meta_workflows/cli_commands/agent_commands.py +0 -321
  233. empathy_os/meta_workflows/cli_commands/analytics_commands.py +0 -442
  234. empathy_os/meta_workflows/cli_commands/config_commands.py +0 -232
  235. empathy_os/meta_workflows/cli_commands/memory_commands.py +0 -182
  236. empathy_os/meta_workflows/cli_commands/template_commands.py +0 -354
  237. empathy_os/meta_workflows/cli_commands/workflow_commands.py +0 -382
  238. empathy_os/meta_workflows/cli_meta_workflows.py +0 -59
  239. empathy_os/meta_workflows/form_engine.py +0 -292
  240. empathy_os/meta_workflows/intent_detector.py +0 -409
  241. empathy_os/meta_workflows/models.py +0 -569
  242. empathy_os/meta_workflows/pattern_learner.py +0 -738
  243. empathy_os/meta_workflows/plan_generator.py +0 -384
  244. empathy_os/meta_workflows/session_context.py +0 -397
  245. empathy_os/meta_workflows/template_registry.py +0 -229
  246. empathy_os/meta_workflows/workflow.py +0 -984
  247. empathy_os/metrics/__init__.py +0 -12
  248. empathy_os/metrics/collector.py +0 -31
  249. empathy_os/metrics/prompt_metrics.py +0 -194
  250. empathy_os/models/__init__.py +0 -172
  251. empathy_os/models/__main__.py +0 -13
  252. empathy_os/models/adaptive_routing 2.py +0 -437
  253. empathy_os/models/adaptive_routing.py +0 -437
  254. empathy_os/models/auth_cli.py +0 -444
  255. empathy_os/models/auth_strategy.py +0 -450
  256. empathy_os/models/cli.py +0 -655
  257. empathy_os/models/empathy_executor.py +0 -354
  258. empathy_os/models/executor.py +0 -257
  259. empathy_os/models/fallback.py +0 -762
  260. empathy_os/models/provider_config.py +0 -282
  261. empathy_os/models/registry.py +0 -472
  262. empathy_os/models/tasks.py +0 -359
  263. empathy_os/models/telemetry/__init__.py +0 -71
  264. empathy_os/models/telemetry/analytics.py +0 -594
  265. empathy_os/models/telemetry/backend.py +0 -196
  266. empathy_os/models/telemetry/data_models.py +0 -431
  267. empathy_os/models/telemetry/storage.py +0 -489
  268. empathy_os/models/token_estimator.py +0 -420
  269. empathy_os/models/validation.py +0 -280
  270. empathy_os/monitoring/__init__.py +0 -52
  271. empathy_os/monitoring/alerts.py +0 -946
  272. empathy_os/monitoring/alerts_cli.py +0 -448
  273. empathy_os/monitoring/multi_backend.py +0 -271
  274. empathy_os/monitoring/otel_backend.py +0 -362
  275. empathy_os/optimization/__init__.py +0 -19
  276. empathy_os/optimization/context_optimizer.py +0 -272
  277. empathy_os/orchestration/__init__.py +0 -67
  278. empathy_os/orchestration/agent_templates.py +0 -707
  279. empathy_os/orchestration/config_store.py +0 -499
  280. empathy_os/orchestration/execution_strategies.py +0 -2111
  281. empathy_os/orchestration/meta_orchestrator.py +0 -1168
  282. empathy_os/orchestration/pattern_learner.py +0 -696
  283. empathy_os/orchestration/real_tools.py +0 -931
  284. empathy_os/pattern_cache.py +0 -187
  285. empathy_os/pattern_library.py +0 -542
  286. empathy_os/patterns/debugging/all_patterns.json +0 -81
  287. empathy_os/patterns/debugging/workflow_20260107_1770825e.json +0 -77
  288. empathy_os/patterns/refactoring_memory.json +0 -89
  289. empathy_os/persistence.py +0 -564
  290. empathy_os/platform_utils.py +0 -265
  291. empathy_os/plugins/__init__.py +0 -28
  292. empathy_os/plugins/base.py +0 -361
  293. empathy_os/plugins/registry.py +0 -268
  294. empathy_os/project_index/__init__.py +0 -32
  295. empathy_os/project_index/cli.py +0 -335
  296. empathy_os/project_index/index.py +0 -667
  297. empathy_os/project_index/models.py +0 -504
  298. empathy_os/project_index/reports.py +0 -474
  299. empathy_os/project_index/scanner.py +0 -777
  300. empathy_os/project_index/scanner_parallel 2.py +0 -291
  301. empathy_os/project_index/scanner_parallel.py +0 -291
  302. empathy_os/prompts/__init__.py +0 -61
  303. empathy_os/prompts/config.py +0 -77
  304. empathy_os/prompts/context.py +0 -177
  305. empathy_os/prompts/parser.py +0 -285
  306. empathy_os/prompts/registry.py +0 -313
  307. empathy_os/prompts/templates.py +0 -208
  308. empathy_os/redis_config.py +0 -302
  309. empathy_os/redis_memory.py +0 -799
  310. empathy_os/resilience/__init__.py +0 -56
  311. empathy_os/resilience/circuit_breaker.py +0 -256
  312. empathy_os/resilience/fallback.py +0 -179
  313. empathy_os/resilience/health.py +0 -300
  314. empathy_os/resilience/retry.py +0 -209
  315. empathy_os/resilience/timeout.py +0 -135
  316. empathy_os/routing/__init__.py +0 -43
  317. empathy_os/routing/chain_executor.py +0 -433
  318. empathy_os/routing/classifier.py +0 -217
  319. empathy_os/routing/smart_router.py +0 -234
  320. empathy_os/routing/workflow_registry.py +0 -343
  321. empathy_os/scaffolding/README.md +0 -589
  322. empathy_os/scaffolding/__init__.py +0 -35
  323. empathy_os/scaffolding/__main__.py +0 -14
  324. empathy_os/scaffolding/cli.py +0 -240
  325. empathy_os/socratic/__init__.py +0 -256
  326. empathy_os/socratic/ab_testing.py +0 -958
  327. empathy_os/socratic/blueprint.py +0 -533
  328. empathy_os/socratic/cli.py +0 -703
  329. empathy_os/socratic/collaboration.py +0 -1114
  330. empathy_os/socratic/domain_templates.py +0 -924
  331. empathy_os/socratic/embeddings.py +0 -738
  332. empathy_os/socratic/engine.py +0 -794
  333. empathy_os/socratic/explainer.py +0 -682
  334. empathy_os/socratic/feedback.py +0 -772
  335. empathy_os/socratic/forms.py +0 -629
  336. empathy_os/socratic/generator.py +0 -732
  337. empathy_os/socratic/llm_analyzer.py +0 -637
  338. empathy_os/socratic/mcp_server.py +0 -702
  339. empathy_os/socratic/session.py +0 -312
  340. empathy_os/socratic/storage.py +0 -667
  341. empathy_os/socratic/success.py +0 -730
  342. empathy_os/socratic/visual_editor.py +0 -860
  343. empathy_os/socratic/web_ui.py +0 -958
  344. empathy_os/telemetry/__init__.py +0 -39
  345. empathy_os/telemetry/agent_coordination 2.py +0 -478
  346. empathy_os/telemetry/agent_coordination.py +0 -476
  347. empathy_os/telemetry/agent_tracking 2.py +0 -350
  348. empathy_os/telemetry/agent_tracking.py +0 -348
  349. empathy_os/telemetry/approval_gates 2.py +0 -563
  350. empathy_os/telemetry/approval_gates.py +0 -551
  351. empathy_os/telemetry/cli.py +0 -1231
  352. empathy_os/telemetry/commands/__init__.py +0 -14
  353. empathy_os/telemetry/commands/dashboard_commands.py +0 -696
  354. empathy_os/telemetry/event_streaming 2.py +0 -405
  355. empathy_os/telemetry/event_streaming.py +0 -405
  356. empathy_os/telemetry/feedback_loop 2.py +0 -557
  357. empathy_os/telemetry/feedback_loop.py +0 -554
  358. empathy_os/telemetry/usage_tracker.py +0 -591
  359. empathy_os/templates.py +0 -754
  360. empathy_os/test_generator/__init__.py +0 -38
  361. empathy_os/test_generator/__main__.py +0 -14
  362. empathy_os/test_generator/cli.py +0 -234
  363. empathy_os/test_generator/generator.py +0 -355
  364. empathy_os/test_generator/risk_analyzer.py +0 -216
  365. empathy_os/tier_recommender.py +0 -384
  366. empathy_os/tools.py +0 -183
  367. empathy_os/trust/__init__.py +0 -28
  368. empathy_os/trust/circuit_breaker.py +0 -579
  369. empathy_os/trust_building.py +0 -527
  370. empathy_os/validation/__init__.py +0 -19
  371. empathy_os/validation/xml_validator.py +0 -281
  372. empathy_os/vscode_bridge 2.py +0 -173
  373. empathy_os/vscode_bridge.py +0 -173
  374. empathy_os/workflow_commands.py +0 -780
  375. empathy_os/workflow_patterns/__init__.py +0 -33
  376. empathy_os/workflow_patterns/behavior.py +0 -249
  377. empathy_os/workflow_patterns/core.py +0 -76
  378. empathy_os/workflow_patterns/output.py +0 -99
  379. empathy_os/workflow_patterns/registry.py +0 -255
  380. empathy_os/workflow_patterns/structural.py +0 -288
  381. empathy_os/workflows/__init__.py +0 -539
  382. empathy_os/workflows/autonomous_test_gen.py +0 -1268
  383. empathy_os/workflows/base.py +0 -2667
  384. empathy_os/workflows/batch_processing.py +0 -342
  385. empathy_os/workflows/bug_predict.py +0 -1084
  386. empathy_os/workflows/builder.py +0 -273
  387. empathy_os/workflows/caching.py +0 -253
  388. empathy_os/workflows/code_review.py +0 -1048
  389. empathy_os/workflows/code_review_adapters.py +0 -312
  390. empathy_os/workflows/code_review_pipeline.py +0 -722
  391. empathy_os/workflows/config.py +0 -645
  392. empathy_os/workflows/dependency_check.py +0 -644
  393. empathy_os/workflows/document_gen/__init__.py +0 -25
  394. empathy_os/workflows/document_gen/config.py +0 -30
  395. empathy_os/workflows/document_gen/report_formatter.py +0 -162
  396. empathy_os/workflows/document_gen/workflow.py +0 -1426
  397. empathy_os/workflows/document_gen.py +0 -29
  398. empathy_os/workflows/document_manager.py +0 -216
  399. empathy_os/workflows/document_manager_README.md +0 -134
  400. empathy_os/workflows/documentation_orchestrator.py +0 -1205
  401. empathy_os/workflows/history.py +0 -510
  402. empathy_os/workflows/keyboard_shortcuts/__init__.py +0 -39
  403. empathy_os/workflows/keyboard_shortcuts/generators.py +0 -391
  404. empathy_os/workflows/keyboard_shortcuts/parsers.py +0 -416
  405. empathy_os/workflows/keyboard_shortcuts/prompts.py +0 -295
  406. empathy_os/workflows/keyboard_shortcuts/schema.py +0 -193
  407. empathy_os/workflows/keyboard_shortcuts/workflow.py +0 -509
  408. empathy_os/workflows/llm_base.py +0 -363
  409. empathy_os/workflows/manage_docs.py +0 -87
  410. empathy_os/workflows/manage_docs_README.md +0 -134
  411. empathy_os/workflows/manage_documentation.py +0 -821
  412. empathy_os/workflows/new_sample_workflow1.py +0 -149
  413. empathy_os/workflows/new_sample_workflow1_README.md +0 -150
  414. empathy_os/workflows/orchestrated_health_check.py +0 -849
  415. empathy_os/workflows/orchestrated_release_prep.py +0 -600
  416. empathy_os/workflows/output.py +0 -410
  417. empathy_os/workflows/perf_audit.py +0 -863
  418. empathy_os/workflows/pr_review.py +0 -762
  419. empathy_os/workflows/progress.py +0 -779
  420. empathy_os/workflows/progress_server.py +0 -322
  421. empathy_os/workflows/progressive/README 2.md +0 -454
  422. empathy_os/workflows/progressive/README.md +0 -454
  423. empathy_os/workflows/progressive/__init__ 2.py +0 -92
  424. empathy_os/workflows/progressive/__init__.py +0 -82
  425. empathy_os/workflows/progressive/cli 2.py +0 -242
  426. empathy_os/workflows/progressive/cli.py +0 -219
  427. empathy_os/workflows/progressive/core 2.py +0 -488
  428. empathy_os/workflows/progressive/core.py +0 -488
  429. empathy_os/workflows/progressive/orchestrator 2.py +0 -701
  430. empathy_os/workflows/progressive/orchestrator.py +0 -723
  431. empathy_os/workflows/progressive/reports 2.py +0 -528
  432. empathy_os/workflows/progressive/reports.py +0 -520
  433. empathy_os/workflows/progressive/telemetry 2.py +0 -280
  434. empathy_os/workflows/progressive/telemetry.py +0 -274
  435. empathy_os/workflows/progressive/test_gen 2.py +0 -514
  436. empathy_os/workflows/progressive/test_gen.py +0 -495
  437. empathy_os/workflows/progressive/workflow 2.py +0 -628
  438. empathy_os/workflows/progressive/workflow.py +0 -589
  439. empathy_os/workflows/refactor_plan.py +0 -694
  440. empathy_os/workflows/release_prep.py +0 -895
  441. empathy_os/workflows/release_prep_crew.py +0 -969
  442. empathy_os/workflows/research_synthesis.py +0 -404
  443. empathy_os/workflows/routing.py +0 -168
  444. empathy_os/workflows/secure_release.py +0 -593
  445. empathy_os/workflows/security_adapters.py +0 -297
  446. empathy_os/workflows/security_audit.py +0 -1329
  447. empathy_os/workflows/security_audit_phase3.py +0 -355
  448. empathy_os/workflows/seo_optimization.py +0 -633
  449. empathy_os/workflows/step_config.py +0 -234
  450. empathy_os/workflows/telemetry_mixin.py +0 -269
  451. empathy_os/workflows/test5.py +0 -125
  452. empathy_os/workflows/test5_README.md +0 -158
  453. empathy_os/workflows/test_coverage_boost_crew.py +0 -849
  454. empathy_os/workflows/test_gen/__init__.py +0 -52
  455. empathy_os/workflows/test_gen/ast_analyzer.py +0 -249
  456. empathy_os/workflows/test_gen/config.py +0 -88
  457. empathy_os/workflows/test_gen/data_models.py +0 -38
  458. empathy_os/workflows/test_gen/report_formatter.py +0 -289
  459. empathy_os/workflows/test_gen/test_templates.py +0 -381
  460. empathy_os/workflows/test_gen/workflow.py +0 -655
  461. empathy_os/workflows/test_gen.py +0 -54
  462. empathy_os/workflows/test_gen_behavioral.py +0 -477
  463. empathy_os/workflows/test_gen_parallel.py +0 -341
  464. empathy_os/workflows/test_lifecycle.py +0 -526
  465. empathy_os/workflows/test_maintenance.py +0 -627
  466. empathy_os/workflows/test_maintenance_cli.py +0 -590
  467. empathy_os/workflows/test_maintenance_crew.py +0 -840
  468. empathy_os/workflows/test_runner.py +0 -622
  469. empathy_os/workflows/tier_tracking.py +0 -531
  470. empathy_os/workflows/xml_enhanced_crew.py +0 -285
  471. empathy_software_plugin/SOFTWARE_PLUGIN_README.md +0 -57
  472. empathy_software_plugin/cli/__init__.py +0 -120
  473. empathy_software_plugin/cli/inspect.py +0 -362
  474. empathy_software_plugin/cli.py +0 -574
  475. empathy_software_plugin/plugin.py +0 -188
  476. workflow_scaffolding/__init__.py +0 -11
  477. workflow_scaffolding/__main__.py +0 -12
  478. workflow_scaffolding/cli.py +0 -206
  479. workflow_scaffolding/generator.py +0 -265
  480. {empathy_framework-5.2.1.dist-info → empathy_framework-5.4.0.dist-info}/WHEEL +0 -0
@@ -1,932 +0,0 @@
1
- """Audit Logging Framework for Empathy Framework
2
-
3
- Comprehensive audit logging for SOC2, HIPAA, and GDPR compliance.
4
- Implements tamper-evident, append-only logging with structured JSON format.
5
-
6
- Key Features:
7
- - JSON Lines format (one event per line)
8
- - ISO-8601 timestamps (UTC)
9
- - Unique event IDs (UUID)
10
- - Tamper-evident (append-only)
11
- - Query/search capability
12
- - Log rotation support
13
-
14
- Reference:
15
- - SECURE_MEMORY_ARCHITECTURE.md: Audit Trail Implementation
16
- - SOC2 CC7.2: System Monitoring
17
- - HIPAA 164.312(b): Audit Controls
18
- - GDPR Article 30: Records of Processing
19
-
20
- Copyright 2025 Smart AI Memory, LLC
21
- Licensed under Fair Source 0.9
22
- """
23
-
24
- import json
25
- import logging
26
- import os
27
- import uuid
28
- from dataclasses import asdict, dataclass, field
29
- from datetime import datetime, timedelta
30
- from pathlib import Path
31
- from typing import Any
32
-
33
- logger = logging.getLogger(__name__)
34
-
35
-
36
- @dataclass
37
- class AuditEvent:
38
- """Represents a single audit event.
39
-
40
- All audit events share these core fields for compliance tracking.
41
- """
42
-
43
- # Core identification
44
- event_id: str = field(default_factory=lambda: f"evt_{uuid.uuid4().hex[:12]}")
45
- timestamp: str = field(default_factory=lambda: datetime.utcnow().isoformat() + "Z")
46
- version: str = "1.0"
47
-
48
- # Event classification
49
- event_type: str = "" # llm_request, store_pattern, retrieve_pattern, security_violation
50
- user_id: str = ""
51
- session_id: str = ""
52
-
53
- # Status tracking
54
- status: str = "success" # success, failed, blocked
55
- error: str = ""
56
-
57
- # Custom fields (populated by specific event types)
58
- data: dict[str, Any] = field(default_factory=dict)
59
-
60
- def to_dict(self) -> dict[str, Any]:
61
- """Convert to dictionary for JSON serialization"""
62
- result = asdict(self)
63
- # Flatten data dict into top level for easier querying
64
- data = result.pop("data", {})
65
- result.update(data)
66
- return result
67
-
68
-
69
- @dataclass
70
- class SecurityViolation:
71
- """Represents a security policy violation.
72
-
73
- Used for tracking and alerting on security issues.
74
- """
75
-
76
- violation_type: str # secrets_detected, pii_in_storage, classification_error, etc.
77
- severity: str # LOW, MEDIUM, HIGH, CRITICAL
78
- details: dict[str, Any] = field(default_factory=dict)
79
- user_notified: bool = False
80
- manager_notified: bool = False
81
- security_team_notified: bool = False
82
-
83
-
84
- class AuditLogger:
85
- """Comprehensive audit logging for Empathy Framework.
86
-
87
- Implements SOC2, HIPAA, and GDPR compliant audit trails with:
88
- - Tamper-evident append-only logging
89
- - Structured JSON Lines format
90
- - Comprehensive event tracking
91
- - Query and search capabilities
92
- - Log rotation support
93
-
94
- Example:
95
- >>> logger = AuditLogger() # Uses platform-appropriate default
96
- >>> logger.log_llm_request(
97
- ... user_id="user@company.com",
98
- ... empathy_level=3,
99
- ... provider="anthropic",
100
- ... model="claude-sonnet-4",
101
- ... memory_sources=["enterprise", "user", "project"],
102
- ... pii_count=0,
103
- ... secrets_count=0
104
- ... )
105
-
106
- Log Format:
107
- Each line is a complete JSON object representing one event.
108
- Format: JSON Lines (.jsonl) - one event per line, append-only.
109
-
110
- Compliance:
111
- - SOC2 CC7.2: System Monitoring and Logging
112
- - HIPAA 164.312(b): Audit Controls
113
- - GDPR Article 30: Records of Processing Activities
114
-
115
- """
116
-
117
- def __init__(
118
- self,
119
- log_dir: str | None = None, # Uses platform-appropriate default if None
120
- log_filename: str = "audit.jsonl",
121
- max_file_size_mb: int = 100,
122
- retention_days: int = 365,
123
- enable_rotation: bool = True,
124
- enable_console_logging: bool = False,
125
- ):
126
- """Initialize the audit logger.
127
-
128
- Args:
129
- log_dir: Directory for audit logs
130
- log_filename: Name of the audit log file
131
- max_file_size_mb: Maximum file size before rotation (if enabled)
132
- retention_days: Number of days to retain audit logs
133
- enable_rotation: Whether to enable automatic log rotation
134
- enable_console_logging: Whether to also log to console (for development)
135
-
136
- """
137
- # Use platform-appropriate default if log_dir not specified
138
- if log_dir is None:
139
- from empathy_os.platform_utils import get_default_log_dir
140
-
141
- self.log_dir = get_default_log_dir()
142
- else:
143
- self.log_dir = Path(log_dir)
144
- self.log_filename = log_filename
145
- self.log_path = self.log_dir / log_filename
146
- self.max_file_size_bytes = max_file_size_mb * 1024 * 1024
147
- self.retention_days = retention_days
148
- self.enable_rotation = enable_rotation
149
- self.enable_console_logging = enable_console_logging
150
-
151
- # Track security violations for alerting
152
- self._violation_counts: dict[str, int] = {}
153
-
154
- # Initialize log directory
155
- self._initialize_log_directory()
156
-
157
- def _initialize_log_directory(self):
158
- """Create log directory if it doesn't exist"""
159
- try:
160
- self.log_dir.mkdir(parents=True, exist_ok=True)
161
- # Set restrictive permissions (owner read/write only)
162
- os.chmod(self.log_dir, 0o700)
163
- logger.info(f"Audit log directory initialized: {self.log_dir}")
164
- except Exception as e:
165
- logger.error(f"Failed to initialize audit log directory: {e}")
166
- # Fallback to local directory
167
- self.log_dir = Path("./logs")
168
- self.log_dir.mkdir(parents=True, exist_ok=True)
169
- self.log_path = self.log_dir / self.log_filename
170
- logger.warning(f"Using fallback log directory: {self.log_dir}")
171
-
172
- def _write_event(self, event: AuditEvent):
173
- """Write an audit event to the log file.
174
-
175
- Uses append-only mode for tamper-evidence.
176
- """
177
- try:
178
- # Check if rotation is needed
179
- if self.enable_rotation and self.log_path.exists():
180
- if self.log_path.stat().st_size > self.max_file_size_bytes:
181
- self._rotate_log()
182
-
183
- # Write event as single line JSON
184
- with open(self.log_path, "a", encoding="utf-8") as f:
185
- json.dump(event.to_dict(), f, ensure_ascii=False)
186
- f.write("\n")
187
-
188
- # Optional console logging for development
189
- if self.enable_console_logging:
190
- logger.debug(f"Audit event: {event.event_type} - {event.status}")
191
-
192
- except Exception as e:
193
- logger.error(f"Failed to write audit event: {e}")
194
- # Critical: audit logging failure should be visible
195
- if self.enable_console_logging:
196
- print(f"AUDIT LOG FAILURE: {e}", flush=True)
197
-
198
- def _rotate_log(self):
199
- """Rotate the audit log file.
200
-
201
- Renames current log with timestamp and creates new file.
202
- """
203
- try:
204
- timestamp = datetime.utcnow().strftime("%Y%m%d_%H%M%S")
205
- rotated_name = f"{self.log_filename}.{timestamp}"
206
- rotated_path = self.log_dir / rotated_name
207
-
208
- self.log_path.rename(rotated_path)
209
- logger.info(f"Audit log rotated: {rotated_path}")
210
-
211
- # Clean up old logs beyond retention period
212
- self._cleanup_old_logs()
213
-
214
- except Exception as e:
215
- logger.error(f"Failed to rotate audit log: {e}")
216
-
217
- def _cleanup_old_logs(self):
218
- """Remove audit logs older than retention period"""
219
- try:
220
- cutoff_date = datetime.utcnow() - timedelta(days=self.retention_days)
221
-
222
- for log_file in self.log_dir.glob(f"{self.log_filename}.*"):
223
- # Extract timestamp from filename
224
- try:
225
- timestamp_str = log_file.suffix[1:] # Remove leading dot
226
- file_date = datetime.strptime(timestamp_str, "%Y%m%d_%H%M%S")
227
-
228
- if file_date < cutoff_date:
229
- log_file.unlink()
230
- logger.info(f"Removed old audit log: {log_file}")
231
- except (ValueError, IndexError):
232
- # Skip files that don't match expected format
233
- continue
234
-
235
- except Exception as e:
236
- logger.error(f"Failed to cleanup old audit logs: {e}")
237
-
238
- def log_llm_request(
239
- self,
240
- user_id: str,
241
- empathy_level: int,
242
- provider: str,
243
- model: str,
244
- memory_sources: list[str],
245
- pii_count: int = 0,
246
- secrets_count: int = 0,
247
- request_size_bytes: int = 0,
248
- response_size_bytes: int = 0,
249
- duration_ms: int = 0,
250
- memdocs_patterns_used: list[str] | None = None,
251
- sanitization_applied: bool = True,
252
- classification_verified: bool = True,
253
- session_id: str = "",
254
- ip_address: str = "",
255
- temperature: float = 0.7,
256
- status: str = "success",
257
- error: str = "",
258
- **kwargs,
259
- ):
260
- """Log an LLM API request.
261
-
262
- Tracks all LLM interactions for compliance and monitoring.
263
-
264
- Args:
265
- user_id: User or service account making the request
266
- empathy_level: Empathy level (1-5) used for this request
267
- provider: LLM provider (anthropic, openai, local)
268
- model: Specific model used
269
- memory_sources: Which memory sources were loaded (enterprise, user, project)
270
- pii_count: Number of PII items detected (not the items themselves)
271
- secrets_count: Number of secrets detected
272
- request_size_bytes: Size of the request payload
273
- response_size_bytes: Size of the response payload
274
- duration_ms: Request duration in milliseconds
275
- memdocs_patterns_used: List of MemDocs pattern IDs used
276
- sanitization_applied: Whether PII sanitization was applied
277
- classification_verified: Whether data classification was verified
278
- session_id: Session identifier
279
- ip_address: Anonymized IP address (e.g., first 3 octets only)
280
- temperature: LLM temperature setting
281
- status: success, failed, or blocked
282
- error: Error message if failed
283
- **kwargs: Additional custom fields
284
-
285
- Example:
286
- >>> logger.log_llm_request(
287
- ... user_id="user@company.com",
288
- ... empathy_level=3,
289
- ... provider="anthropic",
290
- ... model="claude-sonnet-4",
291
- ... memory_sources=["enterprise", "user"],
292
- ... pii_count=0,
293
- ... secrets_count=0
294
- ... )
295
-
296
- """
297
- event = AuditEvent(
298
- event_type="llm_request",
299
- user_id=user_id,
300
- session_id=session_id,
301
- status=status,
302
- error=error,
303
- data={
304
- "llm": {
305
- "provider": provider,
306
- "model": model,
307
- "empathy_level": empathy_level,
308
- "temperature": temperature,
309
- },
310
- "memory": {
311
- "sources": memory_sources,
312
- "total_sources": len(memory_sources),
313
- "security_policies_applied": "enterprise" in memory_sources,
314
- },
315
- "memdocs": {
316
- "patterns_used": memdocs_patterns_used or [],
317
- "pattern_count": len(memdocs_patterns_used or []),
318
- },
319
- "security": {
320
- "pii_detected": pii_count,
321
- "secrets_detected": secrets_count,
322
- "sanitization_applied": sanitization_applied,
323
- "classification_verified": classification_verified,
324
- },
325
- "request": {
326
- "size_bytes": request_size_bytes,
327
- "duration_ms": duration_ms,
328
- "ip_address": ip_address,
329
- },
330
- "response": {
331
- "size_bytes": response_size_bytes,
332
- },
333
- "compliance": {
334
- "gdpr_compliant": pii_count == 0 or sanitization_applied,
335
- "hipaa_compliant": secrets_count == 0 and sanitization_applied,
336
- "soc2_compliant": True,
337
- },
338
- **kwargs,
339
- },
340
- )
341
-
342
- self._write_event(event)
343
-
344
- # Check for security violations
345
- if secrets_count > 0:
346
- self._handle_security_violation(
347
- user_id=user_id,
348
- violation_type="secrets_detected",
349
- severity="HIGH",
350
- details={"secrets_count": secrets_count, "event_type": "llm_request"},
351
- )
352
-
353
- def log_pattern_store(
354
- self,
355
- user_id: str,
356
- pattern_id: str,
357
- pattern_type: str,
358
- classification: str,
359
- pii_scrubbed: int = 0,
360
- secrets_detected: int = 0,
361
- retention_days: int = 180,
362
- encrypted: bool = False,
363
- session_id: str = "",
364
- status: str = "success",
365
- error: str = "",
366
- **kwargs,
367
- ):
368
- """Log MemDocs pattern storage.
369
-
370
- Tracks pattern creation for compliance and data governance.
371
-
372
- Args:
373
- user_id: User storing the pattern
374
- pattern_id: Unique identifier for the pattern
375
- pattern_type: Type of pattern (code, architecture, workflow, etc.)
376
- classification: PUBLIC, INTERNAL, or SENSITIVE
377
- pii_scrubbed: Number of PII items scrubbed before storage
378
- secrets_detected: Number of secrets found (should be 0 for storage)
379
- retention_days: Retention period in days
380
- encrypted: Whether pattern is encrypted at rest
381
- session_id: Session identifier
382
- status: success, failed, or blocked
383
- error: Error message if failed
384
- **kwargs: Additional custom fields
385
-
386
- Example:
387
- >>> logger.log_pattern_store(
388
- ... user_id="user@company.com",
389
- ... pattern_id="pattern_abc123",
390
- ... pattern_type="architecture",
391
- ... classification="INTERNAL",
392
- ... pii_scrubbed=2,
393
- ... retention_days=180
394
- ... )
395
-
396
- """
397
- event = AuditEvent(
398
- event_type="store_pattern",
399
- user_id=user_id,
400
- session_id=session_id,
401
- status=status,
402
- error=error,
403
- data={
404
- "pattern": {
405
- "pattern_id": pattern_id,
406
- "pattern_type": pattern_type,
407
- "classification": classification,
408
- "encrypted": encrypted,
409
- "retention_days": retention_days,
410
- },
411
- "security": {
412
- "pii_scrubbed": pii_scrubbed,
413
- "secrets_detected": secrets_detected,
414
- "sanitization_applied": pii_scrubbed > 0,
415
- },
416
- "compliance": {
417
- "gdpr_compliant": secrets_detected == 0,
418
- "hipaa_compliant": (classification == "SENSITIVE" and encrypted)
419
- or classification != "SENSITIVE",
420
- "soc2_compliant": secrets_detected == 0
421
- and classification in ["PUBLIC", "INTERNAL", "SENSITIVE"],
422
- "classification_verified": classification
423
- in ["PUBLIC", "INTERNAL", "SENSITIVE"],
424
- },
425
- **kwargs,
426
- },
427
- )
428
-
429
- self._write_event(event)
430
-
431
- # Check for security violations
432
- if secrets_detected > 0:
433
- self._handle_security_violation(
434
- user_id=user_id,
435
- violation_type="secrets_in_storage",
436
- severity="CRITICAL",
437
- details={
438
- "secrets_detected": secrets_detected,
439
- "pattern_id": pattern_id,
440
- "event_type": "store_pattern",
441
- },
442
- )
443
-
444
- if classification == "SENSITIVE" and not encrypted:
445
- self._handle_security_violation(
446
- user_id=user_id,
447
- violation_type="sensitive_not_encrypted",
448
- severity="HIGH",
449
- details={
450
- "pattern_id": pattern_id,
451
- "classification": classification,
452
- "event_type": "store_pattern",
453
- },
454
- )
455
-
456
- def log_pattern_retrieve(
457
- self,
458
- user_id: str,
459
- pattern_id: str,
460
- classification: str,
461
- access_granted: bool = True,
462
- permission_level: str = "",
463
- session_id: str = "",
464
- status: str = "success",
465
- error: str = "",
466
- **kwargs,
467
- ):
468
- """Log MemDocs pattern retrieval.
469
-
470
- Tracks pattern access for compliance and security monitoring.
471
-
472
- Args:
473
- user_id: User retrieving the pattern
474
- pattern_id: Unique identifier for the pattern
475
- classification: PUBLIC, INTERNAL, or SENSITIVE
476
- access_granted: Whether access was granted
477
- permission_level: Permission level used for access decision
478
- session_id: Session identifier
479
- status: success, failed, or blocked
480
- error: Error message if failed
481
- **kwargs: Additional custom fields
482
-
483
- Example:
484
- >>> logger.log_pattern_retrieve(
485
- ... user_id="user@company.com",
486
- ... pattern_id="pattern_abc123",
487
- ... classification="SENSITIVE",
488
- ... access_granted=True,
489
- ... permission_level="explicit"
490
- ... )
491
-
492
- """
493
- event = AuditEvent(
494
- event_type="retrieve_pattern",
495
- user_id=user_id,
496
- session_id=session_id,
497
- status="success" if access_granted else "blocked",
498
- error=error,
499
- data={
500
- "pattern": {
501
- "pattern_id": pattern_id,
502
- "classification": classification,
503
- },
504
- "access": {
505
- "granted": access_granted,
506
- "permission_level": permission_level,
507
- "audit_required": classification == "SENSITIVE",
508
- },
509
- "compliance": {
510
- "access_logged": True,
511
- "hipaa_compliant": classification == "SENSITIVE",
512
- },
513
- **kwargs,
514
- },
515
- )
516
-
517
- self._write_event(event)
518
-
519
- # Log unauthorized access attempts
520
- if not access_granted:
521
- self._handle_security_violation(
522
- user_id=user_id,
523
- violation_type="unauthorized_access",
524
- severity="MEDIUM" if classification == "INTERNAL" else "HIGH",
525
- details={
526
- "pattern_id": pattern_id,
527
- "classification": classification,
528
- "event_type": "retrieve_pattern",
529
- },
530
- )
531
-
532
- def log_security_violation(
533
- self,
534
- user_id: str,
535
- violation_type: str,
536
- severity: str,
537
- details: dict[str, Any],
538
- session_id: str = "",
539
- blocked: bool = True,
540
- **kwargs,
541
- ):
542
- """Log a security policy violation.
543
-
544
- Tracks security incidents for monitoring and response.
545
-
546
- Args:
547
- user_id: User who triggered the violation
548
- violation_type: Type of violation (secrets_detected, pii_in_storage, etc.)
549
- severity: LOW, MEDIUM, HIGH, or CRITICAL
550
- details: Additional details about the violation
551
- session_id: Session identifier
552
- blocked: Whether the action was blocked
553
- **kwargs: Additional custom fields
554
-
555
- Example:
556
- >>> logger.log_security_violation(
557
- ... user_id="user@company.com",
558
- ... violation_type="secrets_detected",
559
- ... severity="HIGH",
560
- ... details={"secret_type": "api_key", "action": "llm_request"}, # pragma: allowlist secret
561
- ... blocked=True
562
- ... )
563
-
564
- """
565
- violation = SecurityViolation(
566
- violation_type=violation_type,
567
- severity=severity,
568
- details=details,
569
- )
570
-
571
- event = AuditEvent(
572
- event_type="security_violation",
573
- user_id=user_id,
574
- session_id=session_id,
575
- status="blocked" if blocked else "logged",
576
- data={
577
- "violation": {
578
- "type": violation_type,
579
- "severity": severity,
580
- "details": details,
581
- "blocked": blocked,
582
- },
583
- "response": {
584
- "user_notified": violation.user_notified,
585
- "manager_notified": violation.manager_notified,
586
- "security_team_notified": violation.security_team_notified,
587
- },
588
- "compliance": {
589
- "gdpr_compliant": blocked,
590
- "hipaa_compliant": blocked,
591
- "soc2_compliant": blocked,
592
- },
593
- **kwargs,
594
- },
595
- )
596
-
597
- self._write_event(event)
598
-
599
- def _handle_security_violation(
600
- self,
601
- user_id: str,
602
- violation_type: str,
603
- severity: str,
604
- details: dict[str, Any],
605
- ):
606
- """Internal handler for security violations.
607
-
608
- Tracks violation counts and triggers alerts.
609
- """
610
- # Track violations per user
611
- key = f"{user_id}:{violation_type}"
612
- self._violation_counts[key] = self._violation_counts.get(key, 0) + 1
613
-
614
- # Log the violation
615
- self.log_security_violation(
616
- user_id=user_id,
617
- violation_type=violation_type,
618
- severity=severity,
619
- details=details,
620
- )
621
-
622
- # Alert logic
623
- count = self._violation_counts[key]
624
- if severity == "CRITICAL" or count >= 3:
625
- logger.warning(
626
- f"Security violation threshold reached: {user_id} - "
627
- f"{violation_type} (count: {count}, severity: {severity})",
628
- )
629
-
630
- def query(
631
- self,
632
- event_type: str | None = None,
633
- user_id: str | None = None,
634
- status: str | None = None,
635
- start_date: datetime | None = None,
636
- end_date: datetime | None = None,
637
- limit: int = 1000,
638
- **filters,
639
- ) -> list[dict]:
640
- """Query audit logs with filters.
641
-
642
- Provides search and analysis capabilities for audit data.
643
-
644
- Args:
645
- event_type: Filter by event type (llm_request, store_pattern, etc.)
646
- user_id: Filter by user ID
647
- status: Filter by status (success, failed, blocked)
648
- start_date: Filter events after this date
649
- end_date: Filter events before this date
650
- limit: Maximum number of events to return
651
- **filters: Additional key-value filters (supports nested keys with __)
652
-
653
- Returns:
654
- List of matching audit events as dictionaries
655
-
656
- Example:
657
- >>> # Find all failed LLM requests
658
- >>> events = logger.query(event_type="llm_request", status="failed")
659
- >>>
660
- >>> # Find security violations in last 24 hours
661
- >>> from datetime import datetime, timedelta
662
- >>> events = logger.query(
663
- ... event_type="security_violation",
664
- ... start_date=datetime.utcnow() - timedelta(days=1)
665
- ... )
666
- >>>
667
- >>> # Find patterns with high PII counts (nested filter)
668
- >>> events = logger.query(security__pii_detected__gt=5)
669
-
670
- """
671
- results: list[dict[str, object]] = []
672
-
673
- try:
674
- if not self.log_path.exists():
675
- return results
676
-
677
- with open(self.log_path, encoding="utf-8") as f:
678
- for line in f:
679
- if len(results) >= limit:
680
- break
681
-
682
- try:
683
- event = json.loads(line.strip())
684
-
685
- # Apply filters
686
- if event_type and event.get("event_type") != event_type:
687
- continue
688
- if user_id and event.get("user_id") != user_id:
689
- continue
690
- if status and event.get("status") != status:
691
- continue
692
-
693
- # Date range filtering
694
- if start_date or end_date:
695
- event_time = datetime.fromisoformat(
696
- event.get("timestamp", "").rstrip("Z"),
697
- )
698
- if start_date and event_time < start_date:
699
- continue
700
- if end_date and event_time > end_date:
701
- continue
702
-
703
- # Custom filters (supports nested keys with __)
704
- if filters and not self._apply_custom_filters(event, filters):
705
- continue
706
-
707
- results.append(event)
708
-
709
- except json.JSONDecodeError:
710
- logger.warning("Skipping malformed audit log line")
711
- continue
712
-
713
- except Exception as e:
714
- logger.error(f"Failed to query audit logs: {e}")
715
-
716
- return results
717
-
718
- def _apply_custom_filters(self, event: dict, filters: dict) -> bool:
719
- """Apply custom filters to an event.
720
-
721
- Supports nested key access with __ separator and comparison operators.
722
- """
723
- for key, value in filters.items():
724
- # Handle comparison operators (e.g., security__pii_detected__gt=5)
725
- parts = key.split("__")
726
- operator = None
727
-
728
- # Optimization: Use set for O(1) membership testing (vs O(n) with list)
729
- valid_operators = {"gt", "gte", "lt", "lte", "ne"}
730
- if len(parts) > 1 and parts[-1] in valid_operators:
731
- operator = parts[-1]
732
- parts = parts[:-1]
733
-
734
- # Navigate nested dictionary
735
- current = event
736
- for part in parts:
737
- if isinstance(current, dict) and part in current:
738
- current = current[part]
739
- else:
740
- return False
741
-
742
- # Apply comparison
743
- if (
744
- operator == "gt" and not (isinstance(current, int | float) and current > value)
745
- ) or (
746
- operator == "gte" and not (isinstance(current, int | float) and current >= value)
747
- ):
748
- return False
749
- if (
750
- (operator == "lt" and not (isinstance(current, int | float) and current < value))
751
- or (
752
- operator == "lte"
753
- and not (isinstance(current, int | float) and current <= value)
754
- )
755
- or (operator == "ne" and current == value)
756
- or (operator is None and current != value)
757
- ):
758
- return False
759
-
760
- return True
761
-
762
- def get_violation_summary(self, user_id: str | None = None) -> dict[str, Any]:
763
- """Get summary of security violations.
764
-
765
- Args:
766
- user_id: Optional user ID to filter by
767
-
768
- Returns:
769
- Dictionary with violation statistics
770
-
771
- Example:
772
- >>> summary = logger.get_violation_summary(user_id="user@company.com")
773
- >>> print(f"Total violations: {summary['total_violations']}")
774
-
775
- """
776
- violations = self.query(event_type="security_violation", user_id=user_id)
777
-
778
- by_type: dict[str, int] = {}
779
- by_severity: dict[str, int] = {}
780
- by_user: dict[str, int] = {}
781
-
782
- for violation in violations:
783
- vtype = str(violation.get("violation", {}).get("type", "unknown"))
784
- severity = str(violation.get("violation", {}).get("severity", "unknown"))
785
- vid = str(violation.get("user_id", "unknown"))
786
-
787
- by_type[vtype] = by_type.get(vtype, 0) + 1
788
- by_severity[severity] = by_severity.get(severity, 0) + 1
789
- by_user[vid] = by_user.get(vid, 0) + 1
790
-
791
- summary: dict[str, int | dict[str, int]] = {
792
- "total_violations": len(violations),
793
- "by_type": by_type,
794
- "by_severity": by_severity,
795
- "by_user": by_user,
796
- }
797
-
798
- return summary
799
-
800
- def get_compliance_report(
801
- self,
802
- start_date: datetime | None = None,
803
- end_date: datetime | None = None,
804
- ) -> dict[str, Any]:
805
- """Generate compliance report for audit period.
806
-
807
- Provides statistics for compliance audits (SOC2, HIPAA, GDPR).
808
-
809
- Args:
810
- start_date: Start of audit period
811
- end_date: End of audit period
812
-
813
- Returns:
814
- Dictionary with compliance statistics
815
-
816
- Example:
817
- >>> from datetime import datetime, timedelta
818
- >>> report = logger.get_compliance_report(
819
- ... start_date=datetime.utcnow() - timedelta(days=30)
820
- ... )
821
- >>> print(f"Total LLM requests: {report['llm_requests']['total']}")
822
-
823
- """
824
- # Query all events in period
825
- all_events = self.query(start_date=start_date, end_date=end_date, limit=100000)
826
-
827
- report: dict[str, Any] = {
828
- "period": {
829
- "start": start_date.isoformat() if start_date else "all_time",
830
- "end": end_date.isoformat() if end_date else "now",
831
- },
832
- "llm_requests": {
833
- "total": 0,
834
- "with_pii_detected": 0,
835
- "with_secrets_detected": 0,
836
- "sanitization_applied": 0,
837
- },
838
- "pattern_storage": {
839
- "total": 0,
840
- "by_classification": {"PUBLIC": 0, "INTERNAL": 0, "SENSITIVE": 0},
841
- "with_pii_scrubbed": 0,
842
- "encrypted": 0,
843
- },
844
- "pattern_retrieval": {
845
- "total": 0,
846
- "by_classification": {"PUBLIC": 0, "INTERNAL": 0, "SENSITIVE": 0},
847
- "access_denied": 0,
848
- },
849
- "security_violations": {"total": 0, "by_severity": {}, "by_type": {}},
850
- "compliance_metrics": {
851
- "gdpr_compliant_rate": 0.0,
852
- "hipaa_compliant_rate": 0.0,
853
- "soc2_compliant_rate": 0.0,
854
- },
855
- }
856
-
857
- total_compliance_checks = 0
858
- gdpr_compliant = 0
859
- hipaa_compliant = 0
860
- soc2_compliant = 0
861
-
862
- for event in all_events:
863
- event_type = event.get("event_type")
864
-
865
- if event_type == "llm_request":
866
- report["llm_requests"]["total"] += 1
867
- security = event.get("security", {})
868
- if security.get("pii_detected", 0) > 0:
869
- report["llm_requests"]["with_pii_detected"] += 1
870
- if security.get("secrets_detected", 0) > 0:
871
- report["llm_requests"]["with_secrets_detected"] += 1
872
- if security.get("sanitization_applied"):
873
- report["llm_requests"]["sanitization_applied"] += 1
874
-
875
- elif event_type == "store_pattern":
876
- report["pattern_storage"]["total"] += 1
877
- pattern = event.get("pattern", {})
878
- classification = pattern.get("classification", "INTERNAL")
879
- report["pattern_storage"]["by_classification"][classification] = (
880
- report["pattern_storage"]["by_classification"].get(classification, 0) + 1
881
- )
882
- if event.get("security", {}).get("pii_scrubbed", 0) > 0:
883
- report["pattern_storage"]["with_pii_scrubbed"] += 1
884
- if pattern.get("encrypted"):
885
- report["pattern_storage"]["encrypted"] += 1
886
-
887
- elif event_type == "retrieve_pattern":
888
- report["pattern_retrieval"]["total"] += 1
889
- pattern = event.get("pattern", {})
890
- classification = pattern.get("classification", "INTERNAL")
891
- report["pattern_retrieval"]["by_classification"][classification] = (
892
- report["pattern_retrieval"]["by_classification"].get(classification, 0) + 1
893
- )
894
- if not event.get("access", {}).get("granted", True):
895
- report["pattern_retrieval"]["access_denied"] += 1
896
-
897
- elif event_type == "security_violation":
898
- report["security_violations"]["total"] += 1
899
- violation = event.get("violation", {})
900
- vtype = violation.get("type", "unknown")
901
- severity = violation.get("severity", "unknown")
902
- report["security_violations"]["by_type"][vtype] = (
903
- report["security_violations"]["by_type"].get(vtype, 0) + 1
904
- )
905
- report["security_violations"]["by_severity"][severity] = (
906
- report["security_violations"]["by_severity"].get(severity, 0) + 1
907
- )
908
-
909
- # Track compliance rates
910
- compliance = event.get("compliance", {})
911
- if compliance:
912
- total_compliance_checks += 1
913
- if compliance.get("gdpr_compliant"):
914
- gdpr_compliant += 1
915
- if compliance.get("hipaa_compliant"):
916
- hipaa_compliant += 1
917
- if compliance.get("soc2_compliant"):
918
- soc2_compliant += 1
919
-
920
- # Calculate compliance rates
921
- if total_compliance_checks > 0:
922
- report["compliance_metrics"]["gdpr_compliant_rate"] = (
923
- gdpr_compliant / total_compliance_checks
924
- )
925
- report["compliance_metrics"]["hipaa_compliant_rate"] = (
926
- hipaa_compliant / total_compliance_checks
927
- )
928
- report["compliance_metrics"]["soc2_compliant_rate"] = (
929
- soc2_compliant / total_compliance_checks
930
- )
931
-
932
- return report