empathy-framework 5.2.1__py3-none-any.whl → 5.4.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (480) hide show
  1. empathy_framework-5.4.0.dist-info/METADATA +47 -0
  2. empathy_framework-5.4.0.dist-info/RECORD +8 -0
  3. {empathy_framework-5.2.1.dist-info → empathy_framework-5.4.0.dist-info}/top_level.txt +0 -1
  4. empathy_healthcare_plugin/__init__.py +12 -11
  5. empathy_llm_toolkit/__init__.py +12 -26
  6. empathy_os/__init__.py +12 -356
  7. empathy_software_plugin/__init__.py +12 -11
  8. empathy_framework-5.2.1.dist-info/METADATA +0 -1002
  9. empathy_framework-5.2.1.dist-info/RECORD +0 -478
  10. empathy_framework-5.2.1.dist-info/entry_points.txt +0 -26
  11. empathy_framework-5.2.1.dist-info/licenses/LICENSE +0 -201
  12. empathy_framework-5.2.1.dist-info/licenses/LICENSE_CHANGE_ANNOUNCEMENT.md +0 -101
  13. empathy_healthcare_plugin/monitors/__init__.py +0 -9
  14. empathy_healthcare_plugin/monitors/clinical_protocol_monitor.py +0 -315
  15. empathy_healthcare_plugin/monitors/monitoring/__init__.py +0 -44
  16. empathy_healthcare_plugin/monitors/monitoring/protocol_checker.py +0 -300
  17. empathy_healthcare_plugin/monitors/monitoring/protocol_loader.py +0 -214
  18. empathy_healthcare_plugin/monitors/monitoring/sensor_parsers.py +0 -306
  19. empathy_healthcare_plugin/monitors/monitoring/trajectory_analyzer.py +0 -389
  20. empathy_healthcare_plugin/protocols/cardiac.json +0 -93
  21. empathy_healthcare_plugin/protocols/post_operative.json +0 -92
  22. empathy_healthcare_plugin/protocols/respiratory.json +0 -92
  23. empathy_healthcare_plugin/protocols/sepsis.json +0 -141
  24. empathy_llm_toolkit/README.md +0 -553
  25. empathy_llm_toolkit/agent_factory/__init__.py +0 -53
  26. empathy_llm_toolkit/agent_factory/adapters/__init__.py +0 -85
  27. empathy_llm_toolkit/agent_factory/adapters/autogen_adapter.py +0 -312
  28. empathy_llm_toolkit/agent_factory/adapters/crewai_adapter.py +0 -483
  29. empathy_llm_toolkit/agent_factory/adapters/haystack_adapter.py +0 -298
  30. empathy_llm_toolkit/agent_factory/adapters/langchain_adapter.py +0 -362
  31. empathy_llm_toolkit/agent_factory/adapters/langgraph_adapter.py +0 -333
  32. empathy_llm_toolkit/agent_factory/adapters/native.py +0 -228
  33. empathy_llm_toolkit/agent_factory/adapters/wizard_adapter.py +0 -423
  34. empathy_llm_toolkit/agent_factory/base.py +0 -305
  35. empathy_llm_toolkit/agent_factory/crews/__init__.py +0 -67
  36. empathy_llm_toolkit/agent_factory/crews/code_review.py +0 -1113
  37. empathy_llm_toolkit/agent_factory/crews/health_check.py +0 -1262
  38. empathy_llm_toolkit/agent_factory/crews/refactoring.py +0 -1128
  39. empathy_llm_toolkit/agent_factory/crews/security_audit.py +0 -1018
  40. empathy_llm_toolkit/agent_factory/decorators.py +0 -287
  41. empathy_llm_toolkit/agent_factory/factory.py +0 -558
  42. empathy_llm_toolkit/agent_factory/framework.py +0 -193
  43. empathy_llm_toolkit/agent_factory/memory_integration.py +0 -328
  44. empathy_llm_toolkit/agent_factory/resilient.py +0 -320
  45. empathy_llm_toolkit/agents_md/__init__.py +0 -22
  46. empathy_llm_toolkit/agents_md/loader.py +0 -218
  47. empathy_llm_toolkit/agents_md/parser.py +0 -271
  48. empathy_llm_toolkit/agents_md/registry.py +0 -307
  49. empathy_llm_toolkit/claude_memory.py +0 -466
  50. empathy_llm_toolkit/cli/__init__.py +0 -8
  51. empathy_llm_toolkit/cli/sync_claude.py +0 -487
  52. empathy_llm_toolkit/code_health.py +0 -1313
  53. empathy_llm_toolkit/commands/__init__.py +0 -51
  54. empathy_llm_toolkit/commands/context.py +0 -375
  55. empathy_llm_toolkit/commands/loader.py +0 -301
  56. empathy_llm_toolkit/commands/models.py +0 -231
  57. empathy_llm_toolkit/commands/parser.py +0 -371
  58. empathy_llm_toolkit/commands/registry.py +0 -429
  59. empathy_llm_toolkit/config/__init__.py +0 -29
  60. empathy_llm_toolkit/config/unified.py +0 -291
  61. empathy_llm_toolkit/context/__init__.py +0 -22
  62. empathy_llm_toolkit/context/compaction.py +0 -455
  63. empathy_llm_toolkit/context/manager.py +0 -434
  64. empathy_llm_toolkit/contextual_patterns.py +0 -361
  65. empathy_llm_toolkit/core.py +0 -907
  66. empathy_llm_toolkit/git_pattern_extractor.py +0 -435
  67. empathy_llm_toolkit/hooks/__init__.py +0 -24
  68. empathy_llm_toolkit/hooks/config.py +0 -306
  69. empathy_llm_toolkit/hooks/executor.py +0 -289
  70. empathy_llm_toolkit/hooks/registry.py +0 -302
  71. empathy_llm_toolkit/hooks/scripts/__init__.py +0 -39
  72. empathy_llm_toolkit/hooks/scripts/evaluate_session.py +0 -201
  73. empathy_llm_toolkit/hooks/scripts/first_time_init.py +0 -285
  74. empathy_llm_toolkit/hooks/scripts/pre_compact.py +0 -207
  75. empathy_llm_toolkit/hooks/scripts/session_end.py +0 -183
  76. empathy_llm_toolkit/hooks/scripts/session_start.py +0 -163
  77. empathy_llm_toolkit/hooks/scripts/suggest_compact.py +0 -225
  78. empathy_llm_toolkit/learning/__init__.py +0 -30
  79. empathy_llm_toolkit/learning/evaluator.py +0 -438
  80. empathy_llm_toolkit/learning/extractor.py +0 -514
  81. empathy_llm_toolkit/learning/storage.py +0 -560
  82. empathy_llm_toolkit/levels.py +0 -227
  83. empathy_llm_toolkit/pattern_confidence.py +0 -414
  84. empathy_llm_toolkit/pattern_resolver.py +0 -272
  85. empathy_llm_toolkit/pattern_summary.py +0 -350
  86. empathy_llm_toolkit/providers.py +0 -967
  87. empathy_llm_toolkit/routing/__init__.py +0 -32
  88. empathy_llm_toolkit/routing/model_router.py +0 -362
  89. empathy_llm_toolkit/security/IMPLEMENTATION_SUMMARY.md +0 -413
  90. empathy_llm_toolkit/security/PHASE2_COMPLETE.md +0 -384
  91. empathy_llm_toolkit/security/PHASE2_SECRETS_DETECTOR_COMPLETE.md +0 -271
  92. empathy_llm_toolkit/security/QUICK_REFERENCE.md +0 -316
  93. empathy_llm_toolkit/security/README.md +0 -262
  94. empathy_llm_toolkit/security/__init__.py +0 -62
  95. empathy_llm_toolkit/security/audit_logger.py +0 -929
  96. empathy_llm_toolkit/security/audit_logger_example.py +0 -152
  97. empathy_llm_toolkit/security/pii_scrubber.py +0 -640
  98. empathy_llm_toolkit/security/secrets_detector.py +0 -678
  99. empathy_llm_toolkit/security/secrets_detector_example.py +0 -304
  100. empathy_llm_toolkit/security/secure_memdocs.py +0 -1192
  101. empathy_llm_toolkit/security/secure_memdocs_example.py +0 -278
  102. empathy_llm_toolkit/session_status.py +0 -745
  103. empathy_llm_toolkit/state.py +0 -246
  104. empathy_llm_toolkit/utils/__init__.py +0 -5
  105. empathy_llm_toolkit/utils/tokens.py +0 -349
  106. empathy_os/adaptive/__init__.py +0 -13
  107. empathy_os/adaptive/task_complexity.py +0 -127
  108. empathy_os/agent_monitoring.py +0 -414
  109. empathy_os/cache/__init__.py +0 -117
  110. empathy_os/cache/base.py +0 -166
  111. empathy_os/cache/dependency_manager.py +0 -256
  112. empathy_os/cache/hash_only.py +0 -251
  113. empathy_os/cache/hybrid.py +0 -453
  114. empathy_os/cache/storage.py +0 -285
  115. empathy_os/cache_monitor.py +0 -356
  116. empathy_os/cache_stats.py +0 -298
  117. empathy_os/cli/__init__.py +0 -152
  118. empathy_os/cli/__main__.py +0 -12
  119. empathy_os/cli/commands/__init__.py +0 -1
  120. empathy_os/cli/commands/batch.py +0 -256
  121. empathy_os/cli/commands/cache.py +0 -248
  122. empathy_os/cli/commands/help.py +0 -331
  123. empathy_os/cli/commands/info.py +0 -140
  124. empathy_os/cli/commands/inspect.py +0 -436
  125. empathy_os/cli/commands/inspection.py +0 -57
  126. empathy_os/cli/commands/memory.py +0 -48
  127. empathy_os/cli/commands/metrics.py +0 -92
  128. empathy_os/cli/commands/orchestrate.py +0 -184
  129. empathy_os/cli/commands/patterns.py +0 -207
  130. empathy_os/cli/commands/profiling.py +0 -198
  131. empathy_os/cli/commands/provider.py +0 -98
  132. empathy_os/cli/commands/routing.py +0 -285
  133. empathy_os/cli/commands/setup.py +0 -96
  134. empathy_os/cli/commands/status.py +0 -235
  135. empathy_os/cli/commands/sync.py +0 -166
  136. empathy_os/cli/commands/tier.py +0 -121
  137. empathy_os/cli/commands/utilities.py +0 -114
  138. empathy_os/cli/commands/workflow.py +0 -575
  139. empathy_os/cli/core.py +0 -32
  140. empathy_os/cli/parsers/__init__.py +0 -68
  141. empathy_os/cli/parsers/batch.py +0 -118
  142. empathy_os/cli/parsers/cache 2.py +0 -65
  143. empathy_os/cli/parsers/cache.py +0 -65
  144. empathy_os/cli/parsers/help.py +0 -41
  145. empathy_os/cli/parsers/info.py +0 -26
  146. empathy_os/cli/parsers/inspect.py +0 -66
  147. empathy_os/cli/parsers/metrics.py +0 -42
  148. empathy_os/cli/parsers/orchestrate.py +0 -61
  149. empathy_os/cli/parsers/patterns.py +0 -54
  150. empathy_os/cli/parsers/provider.py +0 -40
  151. empathy_os/cli/parsers/routing.py +0 -110
  152. empathy_os/cli/parsers/setup.py +0 -42
  153. empathy_os/cli/parsers/status.py +0 -47
  154. empathy_os/cli/parsers/sync.py +0 -31
  155. empathy_os/cli/parsers/tier.py +0 -33
  156. empathy_os/cli/parsers/workflow.py +0 -77
  157. empathy_os/cli/utils/__init__.py +0 -1
  158. empathy_os/cli/utils/data.py +0 -242
  159. empathy_os/cli/utils/helpers.py +0 -68
  160. empathy_os/cli_legacy.py +0 -3957
  161. empathy_os/cli_minimal.py +0 -1159
  162. empathy_os/cli_router 2.py +0 -416
  163. empathy_os/cli_router.py +0 -437
  164. empathy_os/cli_unified.py +0 -814
  165. empathy_os/config/__init__.py +0 -66
  166. empathy_os/config/xml_config.py +0 -286
  167. empathy_os/config.py +0 -532
  168. empathy_os/coordination.py +0 -870
  169. empathy_os/core.py +0 -1511
  170. empathy_os/core_modules/__init__.py +0 -15
  171. empathy_os/cost_tracker.py +0 -626
  172. empathy_os/dashboard/__init__.py +0 -41
  173. empathy_os/dashboard/app 2.py +0 -512
  174. empathy_os/dashboard/app.py +0 -512
  175. empathy_os/dashboard/simple_server 2.py +0 -403
  176. empathy_os/dashboard/simple_server.py +0 -403
  177. empathy_os/dashboard/standalone_server 2.py +0 -536
  178. empathy_os/dashboard/standalone_server.py +0 -547
  179. empathy_os/discovery.py +0 -306
  180. empathy_os/emergence.py +0 -306
  181. empathy_os/exceptions.py +0 -123
  182. empathy_os/feedback_loops.py +0 -373
  183. empathy_os/hot_reload/README.md +0 -473
  184. empathy_os/hot_reload/__init__.py +0 -62
  185. empathy_os/hot_reload/config.py +0 -83
  186. empathy_os/hot_reload/integration.py +0 -229
  187. empathy_os/hot_reload/reloader.py +0 -298
  188. empathy_os/hot_reload/watcher.py +0 -183
  189. empathy_os/hot_reload/websocket.py +0 -177
  190. empathy_os/levels.py +0 -577
  191. empathy_os/leverage_points.py +0 -441
  192. empathy_os/logging_config.py +0 -261
  193. empathy_os/mcp/__init__.py +0 -10
  194. empathy_os/mcp/server.py +0 -506
  195. empathy_os/memory/__init__.py +0 -237
  196. empathy_os/memory/claude_memory.py +0 -469
  197. empathy_os/memory/config.py +0 -224
  198. empathy_os/memory/control_panel.py +0 -1290
  199. empathy_os/memory/control_panel_support.py +0 -145
  200. empathy_os/memory/cross_session.py +0 -845
  201. empathy_os/memory/edges.py +0 -179
  202. empathy_os/memory/encryption.py +0 -159
  203. empathy_os/memory/file_session.py +0 -770
  204. empathy_os/memory/graph.py +0 -570
  205. empathy_os/memory/long_term.py +0 -913
  206. empathy_os/memory/long_term_types.py +0 -99
  207. empathy_os/memory/mixins/__init__.py +0 -25
  208. empathy_os/memory/mixins/backend_init_mixin.py +0 -244
  209. empathy_os/memory/mixins/capabilities_mixin.py +0 -199
  210. empathy_os/memory/mixins/handoff_mixin.py +0 -208
  211. empathy_os/memory/mixins/lifecycle_mixin.py +0 -49
  212. empathy_os/memory/mixins/long_term_mixin.py +0 -352
  213. empathy_os/memory/mixins/promotion_mixin.py +0 -109
  214. empathy_os/memory/mixins/short_term_mixin.py +0 -182
  215. empathy_os/memory/nodes.py +0 -179
  216. empathy_os/memory/redis_bootstrap.py +0 -540
  217. empathy_os/memory/security/__init__.py +0 -31
  218. empathy_os/memory/security/audit_logger.py +0 -932
  219. empathy_os/memory/security/pii_scrubber.py +0 -640
  220. empathy_os/memory/security/secrets_detector.py +0 -678
  221. empathy_os/memory/short_term.py +0 -2150
  222. empathy_os/memory/simple_storage.py +0 -302
  223. empathy_os/memory/storage/__init__.py +0 -15
  224. empathy_os/memory/storage_backend.py +0 -167
  225. empathy_os/memory/summary_index.py +0 -583
  226. empathy_os/memory/types.py +0 -441
  227. empathy_os/memory/unified.py +0 -182
  228. empathy_os/meta_workflows/__init__.py +0 -74
  229. empathy_os/meta_workflows/agent_creator.py +0 -248
  230. empathy_os/meta_workflows/builtin_templates.py +0 -567
  231. empathy_os/meta_workflows/cli_commands/__init__.py +0 -56
  232. empathy_os/meta_workflows/cli_commands/agent_commands.py +0 -321
  233. empathy_os/meta_workflows/cli_commands/analytics_commands.py +0 -442
  234. empathy_os/meta_workflows/cli_commands/config_commands.py +0 -232
  235. empathy_os/meta_workflows/cli_commands/memory_commands.py +0 -182
  236. empathy_os/meta_workflows/cli_commands/template_commands.py +0 -354
  237. empathy_os/meta_workflows/cli_commands/workflow_commands.py +0 -382
  238. empathy_os/meta_workflows/cli_meta_workflows.py +0 -59
  239. empathy_os/meta_workflows/form_engine.py +0 -292
  240. empathy_os/meta_workflows/intent_detector.py +0 -409
  241. empathy_os/meta_workflows/models.py +0 -569
  242. empathy_os/meta_workflows/pattern_learner.py +0 -738
  243. empathy_os/meta_workflows/plan_generator.py +0 -384
  244. empathy_os/meta_workflows/session_context.py +0 -397
  245. empathy_os/meta_workflows/template_registry.py +0 -229
  246. empathy_os/meta_workflows/workflow.py +0 -984
  247. empathy_os/metrics/__init__.py +0 -12
  248. empathy_os/metrics/collector.py +0 -31
  249. empathy_os/metrics/prompt_metrics.py +0 -194
  250. empathy_os/models/__init__.py +0 -172
  251. empathy_os/models/__main__.py +0 -13
  252. empathy_os/models/adaptive_routing 2.py +0 -437
  253. empathy_os/models/adaptive_routing.py +0 -437
  254. empathy_os/models/auth_cli.py +0 -444
  255. empathy_os/models/auth_strategy.py +0 -450
  256. empathy_os/models/cli.py +0 -655
  257. empathy_os/models/empathy_executor.py +0 -354
  258. empathy_os/models/executor.py +0 -257
  259. empathy_os/models/fallback.py +0 -762
  260. empathy_os/models/provider_config.py +0 -282
  261. empathy_os/models/registry.py +0 -472
  262. empathy_os/models/tasks.py +0 -359
  263. empathy_os/models/telemetry/__init__.py +0 -71
  264. empathy_os/models/telemetry/analytics.py +0 -594
  265. empathy_os/models/telemetry/backend.py +0 -196
  266. empathy_os/models/telemetry/data_models.py +0 -431
  267. empathy_os/models/telemetry/storage.py +0 -489
  268. empathy_os/models/token_estimator.py +0 -420
  269. empathy_os/models/validation.py +0 -280
  270. empathy_os/monitoring/__init__.py +0 -52
  271. empathy_os/monitoring/alerts.py +0 -946
  272. empathy_os/monitoring/alerts_cli.py +0 -448
  273. empathy_os/monitoring/multi_backend.py +0 -271
  274. empathy_os/monitoring/otel_backend.py +0 -362
  275. empathy_os/optimization/__init__.py +0 -19
  276. empathy_os/optimization/context_optimizer.py +0 -272
  277. empathy_os/orchestration/__init__.py +0 -67
  278. empathy_os/orchestration/agent_templates.py +0 -707
  279. empathy_os/orchestration/config_store.py +0 -499
  280. empathy_os/orchestration/execution_strategies.py +0 -2111
  281. empathy_os/orchestration/meta_orchestrator.py +0 -1168
  282. empathy_os/orchestration/pattern_learner.py +0 -696
  283. empathy_os/orchestration/real_tools.py +0 -931
  284. empathy_os/pattern_cache.py +0 -187
  285. empathy_os/pattern_library.py +0 -542
  286. empathy_os/patterns/debugging/all_patterns.json +0 -81
  287. empathy_os/patterns/debugging/workflow_20260107_1770825e.json +0 -77
  288. empathy_os/patterns/refactoring_memory.json +0 -89
  289. empathy_os/persistence.py +0 -564
  290. empathy_os/platform_utils.py +0 -265
  291. empathy_os/plugins/__init__.py +0 -28
  292. empathy_os/plugins/base.py +0 -361
  293. empathy_os/plugins/registry.py +0 -268
  294. empathy_os/project_index/__init__.py +0 -32
  295. empathy_os/project_index/cli.py +0 -335
  296. empathy_os/project_index/index.py +0 -667
  297. empathy_os/project_index/models.py +0 -504
  298. empathy_os/project_index/reports.py +0 -474
  299. empathy_os/project_index/scanner.py +0 -777
  300. empathy_os/project_index/scanner_parallel 2.py +0 -291
  301. empathy_os/project_index/scanner_parallel.py +0 -291
  302. empathy_os/prompts/__init__.py +0 -61
  303. empathy_os/prompts/config.py +0 -77
  304. empathy_os/prompts/context.py +0 -177
  305. empathy_os/prompts/parser.py +0 -285
  306. empathy_os/prompts/registry.py +0 -313
  307. empathy_os/prompts/templates.py +0 -208
  308. empathy_os/redis_config.py +0 -302
  309. empathy_os/redis_memory.py +0 -799
  310. empathy_os/resilience/__init__.py +0 -56
  311. empathy_os/resilience/circuit_breaker.py +0 -256
  312. empathy_os/resilience/fallback.py +0 -179
  313. empathy_os/resilience/health.py +0 -300
  314. empathy_os/resilience/retry.py +0 -209
  315. empathy_os/resilience/timeout.py +0 -135
  316. empathy_os/routing/__init__.py +0 -43
  317. empathy_os/routing/chain_executor.py +0 -433
  318. empathy_os/routing/classifier.py +0 -217
  319. empathy_os/routing/smart_router.py +0 -234
  320. empathy_os/routing/workflow_registry.py +0 -343
  321. empathy_os/scaffolding/README.md +0 -589
  322. empathy_os/scaffolding/__init__.py +0 -35
  323. empathy_os/scaffolding/__main__.py +0 -14
  324. empathy_os/scaffolding/cli.py +0 -240
  325. empathy_os/socratic/__init__.py +0 -256
  326. empathy_os/socratic/ab_testing.py +0 -958
  327. empathy_os/socratic/blueprint.py +0 -533
  328. empathy_os/socratic/cli.py +0 -703
  329. empathy_os/socratic/collaboration.py +0 -1114
  330. empathy_os/socratic/domain_templates.py +0 -924
  331. empathy_os/socratic/embeddings.py +0 -738
  332. empathy_os/socratic/engine.py +0 -794
  333. empathy_os/socratic/explainer.py +0 -682
  334. empathy_os/socratic/feedback.py +0 -772
  335. empathy_os/socratic/forms.py +0 -629
  336. empathy_os/socratic/generator.py +0 -732
  337. empathy_os/socratic/llm_analyzer.py +0 -637
  338. empathy_os/socratic/mcp_server.py +0 -702
  339. empathy_os/socratic/session.py +0 -312
  340. empathy_os/socratic/storage.py +0 -667
  341. empathy_os/socratic/success.py +0 -730
  342. empathy_os/socratic/visual_editor.py +0 -860
  343. empathy_os/socratic/web_ui.py +0 -958
  344. empathy_os/telemetry/__init__.py +0 -39
  345. empathy_os/telemetry/agent_coordination 2.py +0 -478
  346. empathy_os/telemetry/agent_coordination.py +0 -476
  347. empathy_os/telemetry/agent_tracking 2.py +0 -350
  348. empathy_os/telemetry/agent_tracking.py +0 -348
  349. empathy_os/telemetry/approval_gates 2.py +0 -563
  350. empathy_os/telemetry/approval_gates.py +0 -551
  351. empathy_os/telemetry/cli.py +0 -1231
  352. empathy_os/telemetry/commands/__init__.py +0 -14
  353. empathy_os/telemetry/commands/dashboard_commands.py +0 -696
  354. empathy_os/telemetry/event_streaming 2.py +0 -405
  355. empathy_os/telemetry/event_streaming.py +0 -405
  356. empathy_os/telemetry/feedback_loop 2.py +0 -557
  357. empathy_os/telemetry/feedback_loop.py +0 -554
  358. empathy_os/telemetry/usage_tracker.py +0 -591
  359. empathy_os/templates.py +0 -754
  360. empathy_os/test_generator/__init__.py +0 -38
  361. empathy_os/test_generator/__main__.py +0 -14
  362. empathy_os/test_generator/cli.py +0 -234
  363. empathy_os/test_generator/generator.py +0 -355
  364. empathy_os/test_generator/risk_analyzer.py +0 -216
  365. empathy_os/tier_recommender.py +0 -384
  366. empathy_os/tools.py +0 -183
  367. empathy_os/trust/__init__.py +0 -28
  368. empathy_os/trust/circuit_breaker.py +0 -579
  369. empathy_os/trust_building.py +0 -527
  370. empathy_os/validation/__init__.py +0 -19
  371. empathy_os/validation/xml_validator.py +0 -281
  372. empathy_os/vscode_bridge 2.py +0 -173
  373. empathy_os/vscode_bridge.py +0 -173
  374. empathy_os/workflow_commands.py +0 -780
  375. empathy_os/workflow_patterns/__init__.py +0 -33
  376. empathy_os/workflow_patterns/behavior.py +0 -249
  377. empathy_os/workflow_patterns/core.py +0 -76
  378. empathy_os/workflow_patterns/output.py +0 -99
  379. empathy_os/workflow_patterns/registry.py +0 -255
  380. empathy_os/workflow_patterns/structural.py +0 -288
  381. empathy_os/workflows/__init__.py +0 -539
  382. empathy_os/workflows/autonomous_test_gen.py +0 -1268
  383. empathy_os/workflows/base.py +0 -2667
  384. empathy_os/workflows/batch_processing.py +0 -342
  385. empathy_os/workflows/bug_predict.py +0 -1084
  386. empathy_os/workflows/builder.py +0 -273
  387. empathy_os/workflows/caching.py +0 -253
  388. empathy_os/workflows/code_review.py +0 -1048
  389. empathy_os/workflows/code_review_adapters.py +0 -312
  390. empathy_os/workflows/code_review_pipeline.py +0 -722
  391. empathy_os/workflows/config.py +0 -645
  392. empathy_os/workflows/dependency_check.py +0 -644
  393. empathy_os/workflows/document_gen/__init__.py +0 -25
  394. empathy_os/workflows/document_gen/config.py +0 -30
  395. empathy_os/workflows/document_gen/report_formatter.py +0 -162
  396. empathy_os/workflows/document_gen/workflow.py +0 -1426
  397. empathy_os/workflows/document_gen.py +0 -29
  398. empathy_os/workflows/document_manager.py +0 -216
  399. empathy_os/workflows/document_manager_README.md +0 -134
  400. empathy_os/workflows/documentation_orchestrator.py +0 -1205
  401. empathy_os/workflows/history.py +0 -510
  402. empathy_os/workflows/keyboard_shortcuts/__init__.py +0 -39
  403. empathy_os/workflows/keyboard_shortcuts/generators.py +0 -391
  404. empathy_os/workflows/keyboard_shortcuts/parsers.py +0 -416
  405. empathy_os/workflows/keyboard_shortcuts/prompts.py +0 -295
  406. empathy_os/workflows/keyboard_shortcuts/schema.py +0 -193
  407. empathy_os/workflows/keyboard_shortcuts/workflow.py +0 -509
  408. empathy_os/workflows/llm_base.py +0 -363
  409. empathy_os/workflows/manage_docs.py +0 -87
  410. empathy_os/workflows/manage_docs_README.md +0 -134
  411. empathy_os/workflows/manage_documentation.py +0 -821
  412. empathy_os/workflows/new_sample_workflow1.py +0 -149
  413. empathy_os/workflows/new_sample_workflow1_README.md +0 -150
  414. empathy_os/workflows/orchestrated_health_check.py +0 -849
  415. empathy_os/workflows/orchestrated_release_prep.py +0 -600
  416. empathy_os/workflows/output.py +0 -410
  417. empathy_os/workflows/perf_audit.py +0 -863
  418. empathy_os/workflows/pr_review.py +0 -762
  419. empathy_os/workflows/progress.py +0 -779
  420. empathy_os/workflows/progress_server.py +0 -322
  421. empathy_os/workflows/progressive/README 2.md +0 -454
  422. empathy_os/workflows/progressive/README.md +0 -454
  423. empathy_os/workflows/progressive/__init__ 2.py +0 -92
  424. empathy_os/workflows/progressive/__init__.py +0 -82
  425. empathy_os/workflows/progressive/cli 2.py +0 -242
  426. empathy_os/workflows/progressive/cli.py +0 -219
  427. empathy_os/workflows/progressive/core 2.py +0 -488
  428. empathy_os/workflows/progressive/core.py +0 -488
  429. empathy_os/workflows/progressive/orchestrator 2.py +0 -701
  430. empathy_os/workflows/progressive/orchestrator.py +0 -723
  431. empathy_os/workflows/progressive/reports 2.py +0 -528
  432. empathy_os/workflows/progressive/reports.py +0 -520
  433. empathy_os/workflows/progressive/telemetry 2.py +0 -280
  434. empathy_os/workflows/progressive/telemetry.py +0 -274
  435. empathy_os/workflows/progressive/test_gen 2.py +0 -514
  436. empathy_os/workflows/progressive/test_gen.py +0 -495
  437. empathy_os/workflows/progressive/workflow 2.py +0 -628
  438. empathy_os/workflows/progressive/workflow.py +0 -589
  439. empathy_os/workflows/refactor_plan.py +0 -694
  440. empathy_os/workflows/release_prep.py +0 -895
  441. empathy_os/workflows/release_prep_crew.py +0 -969
  442. empathy_os/workflows/research_synthesis.py +0 -404
  443. empathy_os/workflows/routing.py +0 -168
  444. empathy_os/workflows/secure_release.py +0 -593
  445. empathy_os/workflows/security_adapters.py +0 -297
  446. empathy_os/workflows/security_audit.py +0 -1329
  447. empathy_os/workflows/security_audit_phase3.py +0 -355
  448. empathy_os/workflows/seo_optimization.py +0 -633
  449. empathy_os/workflows/step_config.py +0 -234
  450. empathy_os/workflows/telemetry_mixin.py +0 -269
  451. empathy_os/workflows/test5.py +0 -125
  452. empathy_os/workflows/test5_README.md +0 -158
  453. empathy_os/workflows/test_coverage_boost_crew.py +0 -849
  454. empathy_os/workflows/test_gen/__init__.py +0 -52
  455. empathy_os/workflows/test_gen/ast_analyzer.py +0 -249
  456. empathy_os/workflows/test_gen/config.py +0 -88
  457. empathy_os/workflows/test_gen/data_models.py +0 -38
  458. empathy_os/workflows/test_gen/report_formatter.py +0 -289
  459. empathy_os/workflows/test_gen/test_templates.py +0 -381
  460. empathy_os/workflows/test_gen/workflow.py +0 -655
  461. empathy_os/workflows/test_gen.py +0 -54
  462. empathy_os/workflows/test_gen_behavioral.py +0 -477
  463. empathy_os/workflows/test_gen_parallel.py +0 -341
  464. empathy_os/workflows/test_lifecycle.py +0 -526
  465. empathy_os/workflows/test_maintenance.py +0 -627
  466. empathy_os/workflows/test_maintenance_cli.py +0 -590
  467. empathy_os/workflows/test_maintenance_crew.py +0 -840
  468. empathy_os/workflows/test_runner.py +0 -622
  469. empathy_os/workflows/tier_tracking.py +0 -531
  470. empathy_os/workflows/xml_enhanced_crew.py +0 -285
  471. empathy_software_plugin/SOFTWARE_PLUGIN_README.md +0 -57
  472. empathy_software_plugin/cli/__init__.py +0 -120
  473. empathy_software_plugin/cli/inspect.py +0 -362
  474. empathy_software_plugin/cli.py +0 -574
  475. empathy_software_plugin/plugin.py +0 -188
  476. workflow_scaffolding/__init__.py +0 -11
  477. workflow_scaffolding/__main__.py +0 -12
  478. workflow_scaffolding/cli.py +0 -206
  479. workflow_scaffolding/generator.py +0 -265
  480. {empathy_framework-5.2.1.dist-info → empathy_framework-5.4.0.dist-info}/WHEEL +0 -0
@@ -1,1192 +0,0 @@
1
- """Secure MemDocs Integration for Enterprise Privacy
2
-
3
- Combines PII scrubbing, secrets detection, and audit logging with MemDocs pattern storage.
4
- Implements three-tier classification (PUBLIC/INTERNAL/SENSITIVE) with encryption support.
5
-
6
- This module provides the complete security pipeline for storing and retrieving
7
- patterns with full compliance for GDPR, HIPAA, and SOC2 requirements.
8
-
9
- Key Features:
10
- - Automatic PII scrubbing before storage
11
- - Secrets detection with blocking
12
- - Three-tier classification system
13
- - AES-256-GCM encryption for SENSITIVE patterns
14
- - Comprehensive audit logging
15
- - Access control enforcement
16
- - Retention policy management
17
-
18
- Architecture:
19
- User Input → [PII Scrubbing + Secrets Detection (PARALLEL)] → Classification
20
- → Encryption (if SENSITIVE) → MemDocs Storage → Audit Logging
21
-
22
- Reference:
23
- - SECURE_MEMORY_ARCHITECTURE.md: MemDocs Integration Patterns
24
- - ENTERPRISE_PRIVACY_INTEGRATION.md: Phase 2 Implementation
25
-
26
- Copyright 2025 Smart AI Memory, LLC
27
- Licensed under Fair Source 0.9
28
- """
29
-
30
- import base64
31
- import concurrent.futures
32
- import hashlib
33
- import json
34
- import os
35
- from dataclasses import dataclass, field
36
- from datetime import datetime, timedelta
37
- from enum import Enum
38
- from pathlib import Path
39
- from typing import Any
40
-
41
- import structlog
42
-
43
- from .audit_logger import AuditEvent, AuditLogger
44
- from .pii_scrubber import PIIScrubber
45
- from .secrets_detector import SecretsDetector
46
-
47
- logger = structlog.get_logger(__name__)
48
-
49
- # Check for cryptography library
50
- try:
51
- from cryptography.hazmat.primitives.ciphers.aead import AESGCM
52
-
53
- HAS_ENCRYPTION = True
54
- except ImportError:
55
- HAS_ENCRYPTION = False
56
- logger.warning("cryptography library not available - encryption disabled")
57
-
58
-
59
- class Classification(Enum):
60
- """Three-tier classification system for MemDocs patterns"""
61
-
62
- PUBLIC = "PUBLIC" # Shareable across organization, anonymized
63
- INTERNAL = "INTERNAL" # Team/project only, no PII or secrets
64
- SENSITIVE = "SENSITIVE" # Encrypted at rest, access-controlled (HIPAA, finance)
65
-
66
-
67
- @dataclass
68
- class ClassificationRules:
69
- """Security rules for each classification level"""
70
-
71
- classification: Classification
72
- encryption_required: bool
73
- retention_days: int
74
- access_level: str # "all_users", "project_team", "explicit_permission"
75
- audit_all_access: bool = False
76
-
77
-
78
- # Default classification rules based on enterprise security policy
79
- DEFAULT_CLASSIFICATION_RULES: dict[Classification, ClassificationRules] = {
80
- Classification.PUBLIC: ClassificationRules(
81
- classification=Classification.PUBLIC,
82
- encryption_required=False,
83
- retention_days=365,
84
- access_level="all_users",
85
- audit_all_access=False,
86
- ),
87
- Classification.INTERNAL: ClassificationRules(
88
- classification=Classification.INTERNAL,
89
- encryption_required=False,
90
- retention_days=180,
91
- access_level="project_team",
92
- audit_all_access=False,
93
- ),
94
- Classification.SENSITIVE: ClassificationRules(
95
- classification=Classification.SENSITIVE,
96
- encryption_required=True,
97
- retention_days=90,
98
- access_level="explicit_permission",
99
- audit_all_access=True,
100
- ),
101
- }
102
-
103
-
104
- @dataclass
105
- class PatternMetadata:
106
- """Metadata for stored MemDocs patterns"""
107
-
108
- pattern_id: str
109
- created_by: str
110
- created_at: str
111
- classification: str
112
- retention_days: int
113
- encrypted: bool
114
- pattern_type: str
115
- sanitization_applied: bool
116
- pii_removed: int
117
- secrets_detected: int
118
- access_control: dict[str, Any] = field(default_factory=dict)
119
- custom_metadata: dict[str, Any] = field(default_factory=dict)
120
-
121
-
122
- @dataclass
123
- class SecurePattern:
124
- """Represents a securely stored pattern"""
125
-
126
- pattern_id: str
127
- content: str
128
- metadata: PatternMetadata
129
-
130
-
131
- class SecurityError(Exception):
132
- """Raised when security policy is violated"""
133
-
134
-
135
- class PermissionError(Exception):
136
- """Raised when access is denied"""
137
-
138
-
139
- class EncryptionManager:
140
- """Manages encryption/decryption for SENSITIVE patterns.
141
-
142
- Uses AES-256-GCM (Galois/Counter Mode) for authenticated encryption.
143
- Keys are derived from a master key using HKDF.
144
- """
145
-
146
- def __init__(self, master_key: bytes | None = None):
147
- """Initialize encryption manager.
148
-
149
- Args:
150
- master_key: 32-byte master key (or None to generate/load)
151
-
152
- """
153
- if not HAS_ENCRYPTION:
154
- logger.warning("Encryption not available - install cryptography library")
155
- self.enabled = False
156
- return
157
-
158
- self.enabled = True
159
- self.master_key = master_key or self._load_or_generate_key()
160
-
161
- def _load_or_generate_key(self) -> bytes:
162
- """Load master key from environment or generate new one.
163
-
164
- Production: Set EMPATHY_MASTER_KEY environment variable
165
- Development: Generates ephemeral key (warning logged)
166
- """
167
- # Check environment variable first
168
- if env_key := os.getenv("EMPATHY_MASTER_KEY"):
169
- try:
170
- return base64.b64decode(env_key)
171
- except Exception as e:
172
- logger.error("invalid_master_key_in_env", error=str(e))
173
- raise ValueError("Invalid EMPATHY_MASTER_KEY format") from e
174
-
175
- # Check key file
176
- key_file = Path.home() / ".empathy" / "master.key"
177
- if key_file.exists():
178
- try:
179
- return key_file.read_bytes()
180
- except Exception as e:
181
- logger.error("failed_to_load_key_file", error=str(e))
182
-
183
- # Generate ephemeral key (NOT for production)
184
- logger.warning(
185
- "no_master_key_found",
186
- message="Generating ephemeral encryption key - set EMPATHY_MASTER_KEY for production",
187
- )
188
- return AESGCM.generate_key(bit_length=256)
189
-
190
- def encrypt(self, plaintext: str) -> str:
191
- """Encrypt plaintext using AES-256-GCM.
192
-
193
- Args:
194
- plaintext: Content to encrypt
195
-
196
- Returns:
197
- Base64-encoded ciphertext with format: nonce||ciphertext||tag
198
-
199
- Raises:
200
- SecurityError: If encryption fails
201
-
202
- """
203
- if not self.enabled:
204
- raise SecurityError("Encryption not available - install cryptography library")
205
-
206
- try:
207
- # Generate random 96-bit nonce (12 bytes)
208
- nonce = os.urandom(12)
209
-
210
- # Create AESGCM cipher
211
- aesgcm = AESGCM(self.master_key)
212
-
213
- # Encrypt and authenticate
214
- ciphertext = aesgcm.encrypt(nonce, plaintext.encode("utf-8"), None)
215
-
216
- # Combine nonce + ciphertext for storage
217
- encrypted_data = nonce + ciphertext
218
-
219
- # Return base64-encoded
220
- return base64.b64encode(encrypted_data).decode("utf-8")
221
-
222
- except Exception as e:
223
- logger.error("encryption_failed", error=str(e))
224
- raise SecurityError(f"Encryption failed: {e}") from e
225
-
226
- def decrypt(self, ciphertext_b64: str) -> str:
227
- """Decrypt ciphertext using AES-256-GCM.
228
-
229
- Args:
230
- ciphertext_b64: Base64-encoded encrypted data
231
-
232
- Returns:
233
- Decrypted plaintext
234
-
235
- Raises:
236
- SecurityError: If decryption fails (invalid key, corrupted data, etc.)
237
-
238
- """
239
- if not self.enabled:
240
- raise SecurityError("Encryption not available - install cryptography library")
241
-
242
- try:
243
- # Decode from base64
244
- encrypted_data = base64.b64decode(ciphertext_b64)
245
-
246
- # Extract nonce (first 12 bytes) and ciphertext (rest)
247
- nonce = encrypted_data[:12]
248
- ciphertext = encrypted_data[12:]
249
-
250
- # Create AESGCM cipher
251
- aesgcm = AESGCM(self.master_key)
252
-
253
- # Decrypt and verify
254
- plaintext_bytes = aesgcm.decrypt(nonce, ciphertext, None)
255
-
256
- return plaintext_bytes.decode("utf-8")
257
-
258
- except Exception as e:
259
- logger.error("decryption_failed", error=str(e))
260
- raise SecurityError(f"Decryption failed: {e}") from e
261
-
262
-
263
- class MemDocsStorage:
264
- """Mock/Simple MemDocs storage backend.
265
-
266
- In production, this would integrate with the actual MemDocs library.
267
- For now, provides a simple file-based storage for testing.
268
- """
269
-
270
- def __init__(self, storage_dir: str = "./memdocs_storage"):
271
- """Initialize storage backend.
272
-
273
- Args:
274
- storage_dir: Directory for pattern storage
275
-
276
- """
277
- self.storage_dir = Path(storage_dir)
278
- self.storage_dir.mkdir(parents=True, exist_ok=True)
279
- logger.info("memdocs_storage_initialized", storage_dir=str(self.storage_dir))
280
-
281
- def store(self, pattern_id: str, content: str, metadata: dict[str, Any]) -> bool:
282
- """Store a pattern.
283
-
284
- Args:
285
- pattern_id: Unique pattern identifier
286
- content: Pattern content (may be encrypted)
287
- metadata: Pattern metadata
288
-
289
- Returns:
290
- True if successful
291
-
292
- Raises:
293
- IOError: If storage fails
294
-
295
- """
296
- try:
297
- pattern_file = self.storage_dir / f"{pattern_id}.json"
298
-
299
- # Ensure parent directory exists
300
- pattern_file.parent.mkdir(parents=True, exist_ok=True)
301
-
302
- pattern_data = {"pattern_id": pattern_id, "content": content, "metadata": metadata}
303
-
304
- with open(pattern_file, "w", encoding="utf-8") as f:
305
- json.dump(pattern_data, f, indent=2)
306
-
307
- logger.debug("pattern_stored", pattern_id=pattern_id)
308
- return True
309
-
310
- except Exception as e:
311
- logger.error("pattern_storage_failed", pattern_id=pattern_id, error=str(e))
312
- raise
313
-
314
- def retrieve(self, pattern_id: str) -> dict[str, Any] | None:
315
- """Retrieve a pattern.
316
-
317
- Args:
318
- pattern_id: Unique pattern identifier
319
-
320
- Returns:
321
- Pattern data dictionary or None if not found
322
-
323
- """
324
- try:
325
- pattern_file = self.storage_dir / f"{pattern_id}.json"
326
-
327
- if not pattern_file.exists():
328
- logger.warning("pattern_not_found", pattern_id=pattern_id)
329
- return None
330
-
331
- with open(pattern_file, encoding="utf-8") as f:
332
- pattern_data: dict[str, Any] = json.load(f)
333
-
334
- logger.debug("pattern_retrieved", pattern_id=pattern_id)
335
- return pattern_data
336
-
337
- except Exception as e:
338
- logger.error("pattern_retrieval_failed", pattern_id=pattern_id, error=str(e))
339
- return None
340
-
341
- def delete(self, pattern_id: str) -> bool:
342
- """Delete a pattern.
343
-
344
- Args:
345
- pattern_id: Unique pattern identifier
346
-
347
- Returns:
348
- True if deleted, False if not found
349
-
350
- """
351
- try:
352
- pattern_file = self.storage_dir / f"{pattern_id}.json"
353
-
354
- if not pattern_file.exists():
355
- return False
356
-
357
- pattern_file.unlink()
358
- logger.info("pattern_deleted", pattern_id=pattern_id)
359
- return True
360
-
361
- except Exception as e:
362
- logger.error("pattern_deletion_failed", pattern_id=pattern_id, error=str(e))
363
- return False
364
-
365
- def list_patterns(
366
- self,
367
- classification: str | None = None,
368
- created_by: str | None = None,
369
- ) -> list[str]:
370
- """List pattern IDs matching criteria.
371
-
372
- Args:
373
- classification: Filter by classification
374
- created_by: Filter by creator
375
-
376
- Returns:
377
- List of pattern IDs
378
-
379
- """
380
- pattern_ids = []
381
-
382
- for pattern_file in self.storage_dir.glob("*.json"):
383
- try:
384
- with open(pattern_file, encoding="utf-8") as f:
385
- data = json.load(f)
386
- metadata = data.get("metadata", {})
387
-
388
- # Apply filters
389
- if classification and metadata.get("classification") != classification:
390
- continue
391
- if created_by and metadata.get("created_by") != created_by:
392
- continue
393
-
394
- pattern_ids.append(data.get("pattern_id"))
395
-
396
- except Exception:
397
- continue
398
-
399
- return pattern_ids
400
-
401
-
402
- class SecureMemDocsIntegration:
403
- """Secure integration between Claude Memory and MemDocs.
404
-
405
- Enforces enterprise security policies from CLAUDE.md with:
406
- - Automatic PII scrubbing
407
- - Secrets detection and blocking
408
- - Three-tier classification
409
- - Encryption for SENSITIVE data
410
- - Comprehensive audit logging
411
- - Access control enforcement
412
-
413
- Example:
414
- >>> from empathy_llm_toolkit.claude_memory import ClaudeMemoryConfig
415
- >>> config = ClaudeMemoryConfig(enabled=True, load_enterprise=True)
416
- >>> integration = SecureMemDocsIntegration(config)
417
- >>>
418
- >>> # Store pattern with full security pipeline
419
- >>> result = integration.store_pattern(
420
- ... content="Patient diagnosis: diabetes type 2",
421
- ... pattern_type="clinical_protocol",
422
- ... user_id="doctor@hospital.com"
423
- ... )
424
- >>> # Automatically: PII scrubbed, classified as SENSITIVE, encrypted
425
- >>>
426
- >>> # Retrieve with access control
427
- >>> pattern = integration.retrieve_pattern(
428
- ... pattern_id=result["pattern_id"],
429
- ... user_id="doctor@hospital.com"
430
- ... )
431
-
432
- """
433
-
434
- def __init__(
435
- self,
436
- claude_memory_config=None,
437
- storage_dir: str = "./memdocs_storage",
438
- audit_log_dir: str = "/var/log/empathy",
439
- classification_rules: dict[Classification, ClassificationRules] | None = None,
440
- enable_encryption: bool = True,
441
- master_key: bytes | None = None,
442
- ):
443
- """Initialize Secure MemDocs Integration.
444
-
445
- Args:
446
- claude_memory_config: Configuration for Claude memory integration
447
- storage_dir: Directory for MemDocs storage
448
- audit_log_dir: Directory for audit logs
449
- classification_rules: Custom classification rules (uses defaults if None)
450
- enable_encryption: Enable encryption for SENSITIVE patterns
451
- master_key: Encryption master key (auto-generated if None)
452
-
453
- """
454
- self.claude_memory_config = claude_memory_config
455
- self.classification_rules = classification_rules or DEFAULT_CLASSIFICATION_RULES
456
-
457
- # Initialize security components
458
- self.pii_scrubber = PIIScrubber()
459
- self.secrets_detector = SecretsDetector()
460
- self.audit_logger = AuditLogger(
461
- log_dir=audit_log_dir,
462
- enable_console_logging=True, # Development mode
463
- )
464
-
465
- # Initialize encryption
466
- self.encryption_enabled = enable_encryption and HAS_ENCRYPTION
467
- self.encryption_manager: EncryptionManager | None = None
468
- if self.encryption_enabled:
469
- self.encryption_manager = EncryptionManager(master_key)
470
- elif enable_encryption:
471
- logger.warning("encryption_disabled", reason="cryptography library not available")
472
-
473
- # Initialize storage backend
474
- self.storage = MemDocsStorage(storage_dir)
475
-
476
- # Load security policies from enterprise CLAUDE.md
477
- self.security_policies = self._load_security_policies()
478
-
479
- logger.info(
480
- "secure_memdocs_initialized",
481
- encryption_enabled=self.encryption_enabled,
482
- storage_dir=storage_dir,
483
- audit_dir=audit_log_dir,
484
- )
485
-
486
- def _load_security_policies(self) -> dict[str, Any]:
487
- """Load security policies from enterprise Claude memory.
488
-
489
- In production, this would parse the enterprise CLAUDE.md file
490
- to extract PII patterns, secret patterns, and classification rules.
491
-
492
- For now, returns default policies that match the architecture spec.
493
- """
494
- policies = {
495
- "pii_scrubbing_enabled": True,
496
- "secrets_detection_enabled": True,
497
- "classification_required": True,
498
- "audit_logging_enabled": True,
499
- "retention_enforcement_enabled": True,
500
- }
501
-
502
- logger.debug("security_policies_loaded", policies=policies)
503
- return policies
504
-
505
- def store_pattern(
506
- self,
507
- content: str,
508
- pattern_type: str,
509
- user_id: str,
510
- auto_classify: bool = True,
511
- explicit_classification: Classification | None = None,
512
- session_id: str = "",
513
- custom_metadata: dict[str, Any] | None = None,
514
- ) -> dict[str, Any]:
515
- """Store a pattern with full security pipeline.
516
-
517
- Pipeline:
518
- 1. PII scrubbing
519
- 2. Secrets detection (blocks if found)
520
- 3. Classification (auto or explicit)
521
- 4. Encryption (if SENSITIVE)
522
- 5. MemDocs storage
523
- 6. Audit logging
524
-
525
- Args:
526
- content: Pattern content to store
527
- pattern_type: Type of pattern (code, architecture, clinical, etc.)
528
- user_id: User storing the pattern
529
- auto_classify: Enable automatic classification
530
- explicit_classification: Override auto-classification
531
- session_id: Session identifier for audit
532
- custom_metadata: Additional metadata
533
-
534
- Returns:
535
- Dictionary with:
536
- - pattern_id: Unique identifier
537
- - classification: Applied classification
538
- - sanitization_report: PII and secrets detection results
539
-
540
- Raises:
541
- SecurityError: If secrets detected or security policy violated
542
- ValueError: If invalid classification specified
543
-
544
- Example:
545
- >>> result = integration.store_pattern(
546
- ... content="Patient vital signs protocol",
547
- ... pattern_type="clinical_protocol",
548
- ... user_id="nurse@hospital.com"
549
- ... )
550
- >>> print(f"Stored as {result['classification']}")
551
-
552
- """
553
- logger.info(
554
- "store_pattern_started",
555
- user_id=user_id,
556
- pattern_type=pattern_type,
557
- auto_classify=auto_classify,
558
- )
559
-
560
- try:
561
- # Validate content
562
- if not content or not content.strip():
563
- raise ValueError("Content cannot be empty")
564
-
565
- # Step 1 & 2: PII Scrubbing + Secrets Detection (PARALLEL for performance)
566
- # Run both operations in parallel since they're independent
567
- # Secrets detection runs on original content to catch secrets before PII scrubbing
568
- with concurrent.futures.ThreadPoolExecutor(max_workers=2) as executor:
569
- # Submit both tasks in parallel
570
- pii_future = executor.submit(self.pii_scrubber.scrub, content)
571
- secrets_future = executor.submit(self.secrets_detector.detect, content)
572
-
573
- # Wait for both to complete
574
- sanitized_content, pii_detections = pii_future.result()
575
- secrets_found = secrets_future.result()
576
-
577
- pii_count = len(pii_detections)
578
-
579
- if pii_count > 0:
580
- logger.info(
581
- "pii_scrubbed",
582
- user_id=user_id,
583
- pii_count=pii_count,
584
- types=[d.pii_type for d in pii_detections],
585
- )
586
-
587
- if secrets_found:
588
- # CRITICAL: Block storage if secrets detected
589
- secret_types = [s.secret_type.value for s in secrets_found]
590
- logger.error(
591
- "secrets_detected_blocking_storage",
592
- user_id=user_id,
593
- secret_count=len(secrets_found),
594
- types=secret_types,
595
- )
596
-
597
- # Log to audit trail
598
- self.audit_logger.log_security_violation(
599
- user_id=user_id,
600
- violation_type="secrets_in_storage_attempt",
601
- severity="CRITICAL",
602
- details={
603
- "secret_count": len(secrets_found),
604
- "secret_types": secret_types,
605
- "pattern_type": pattern_type,
606
- },
607
- session_id=session_id,
608
- blocked=True,
609
- )
610
-
611
- raise SecurityError(
612
- f"Secrets detected in pattern. Cannot store. Found: {secret_types}",
613
- )
614
-
615
- # Step 3: Classification
616
- if explicit_classification:
617
- classification = explicit_classification
618
- logger.info("explicit_classification", classification=classification.value)
619
- elif auto_classify:
620
- classification = self._classify_pattern(sanitized_content, pattern_type)
621
- logger.info("auto_classification", classification=classification.value)
622
- else:
623
- # Default to INTERNAL if not specified
624
- classification = Classification.INTERNAL
625
- logger.info("default_classification", classification=classification.value)
626
-
627
- # Step 4: Apply classification-specific controls
628
- rules = self.classification_rules[classification]
629
-
630
- # Encrypt if required
631
- final_content = sanitized_content
632
- encrypted = False
633
-
634
- if rules.encryption_required and self.encryption_enabled and self.encryption_manager:
635
- final_content = self.encryption_manager.encrypt(sanitized_content)
636
- encrypted = True
637
- logger.info("pattern_encrypted", classification=classification.value)
638
- elif rules.encryption_required and not self.encryption_enabled:
639
- logger.warning(
640
- "encryption_required_but_unavailable",
641
- classification=classification.value,
642
- action="storing_unencrypted",
643
- )
644
-
645
- # Generate pattern ID
646
- pattern_id = self._generate_pattern_id(user_id, pattern_type)
647
-
648
- # Step 5: Store in MemDocs with metadata
649
- metadata = PatternMetadata(
650
- pattern_id=pattern_id,
651
- created_by=user_id,
652
- created_at=datetime.utcnow().isoformat() + "Z",
653
- classification=classification.value,
654
- retention_days=rules.retention_days,
655
- encrypted=encrypted,
656
- pattern_type=pattern_type,
657
- sanitization_applied=True,
658
- pii_removed=pii_count,
659
- secrets_detected=0,
660
- access_control={
661
- "access_level": rules.access_level,
662
- "audit_required": rules.audit_all_access,
663
- },
664
- custom_metadata=custom_metadata or {},
665
- )
666
-
667
- self.storage.store(
668
- pattern_id=pattern_id,
669
- content=final_content,
670
- metadata=metadata.__dict__,
671
- )
672
-
673
- # Step 6: Audit logging
674
- self.audit_logger.log_pattern_store(
675
- user_id=user_id,
676
- pattern_id=pattern_id,
677
- pattern_type=pattern_type,
678
- classification=classification.value,
679
- pii_scrubbed=pii_count,
680
- secrets_detected=0,
681
- retention_days=rules.retention_days,
682
- encrypted=encrypted,
683
- session_id=session_id,
684
- status="success",
685
- )
686
-
687
- logger.info(
688
- "pattern_stored_successfully",
689
- pattern_id=pattern_id,
690
- classification=classification.value,
691
- encrypted=encrypted,
692
- )
693
-
694
- return {
695
- "pattern_id": pattern_id,
696
- "classification": classification.value,
697
- "sanitization_report": {
698
- "pii_removed": [{"type": d.pii_type, "count": 1} for d in pii_detections],
699
- "pii_count": pii_count,
700
- "secrets_detected": 0,
701
- },
702
- "metadata": {
703
- "encrypted": encrypted,
704
- "retention_days": rules.retention_days,
705
- "created_at": metadata.created_at,
706
- },
707
- }
708
-
709
- except SecurityError:
710
- # Re-raise security errors
711
- raise
712
- except Exception as e:
713
- # Log unexpected errors
714
- logger.error("pattern_storage_failed", user_id=user_id, error=str(e))
715
-
716
- self.audit_logger.log_pattern_store(
717
- user_id=user_id,
718
- pattern_id="",
719
- pattern_type=pattern_type,
720
- classification="UNKNOWN",
721
- pii_scrubbed=0,
722
- secrets_detected=0,
723
- retention_days=0,
724
- encrypted=False,
725
- session_id=session_id,
726
- status="failed",
727
- error=str(e),
728
- )
729
-
730
- raise
731
-
732
- def retrieve_pattern(
733
- self,
734
- pattern_id: str,
735
- user_id: str,
736
- check_permissions: bool = True,
737
- session_id: str = "",
738
- ) -> dict[str, Any]:
739
- """Retrieve a pattern with access control and decryption.
740
-
741
- Pipeline:
742
- 1. Retrieve from MemDocs
743
- 2. Check access permissions
744
- 3. Decrypt (if SENSITIVE)
745
- 4. Check retention policy
746
- 5. Audit logging
747
-
748
- Args:
749
- pattern_id: Unique pattern identifier
750
- user_id: User retrieving the pattern
751
- check_permissions: Enforce access control
752
- session_id: Session identifier for audit
753
-
754
- Returns:
755
- Dictionary with:
756
- - content: Pattern content (decrypted if needed)
757
- - metadata: Pattern metadata
758
-
759
- Raises:
760
- PermissionError: If access denied
761
- ValueError: If pattern not found or retention expired
762
- SecurityError: If decryption fails
763
-
764
- Example:
765
- >>> pattern = integration.retrieve_pattern(
766
- ... pattern_id="pat_abc123",
767
- ... user_id="user@company.com"
768
- ... )
769
- >>> print(pattern["content"])
770
-
771
- """
772
- logger.info(
773
- "retrieve_pattern_started",
774
- pattern_id=pattern_id,
775
- user_id=user_id,
776
- check_permissions=check_permissions,
777
- )
778
-
779
- try:
780
- # Step 1: Retrieve from MemDocs
781
- pattern_data = self.storage.retrieve(pattern_id)
782
-
783
- if not pattern_data:
784
- logger.warning("pattern_not_found", pattern_id=pattern_id)
785
- raise ValueError(f"Pattern {pattern_id} not found")
786
-
787
- content = pattern_data["content"]
788
- metadata = pattern_data["metadata"]
789
- classification = Classification[metadata["classification"]]
790
-
791
- # Step 2: Check access permissions
792
- access_granted = True
793
- if check_permissions:
794
- access_granted = self._check_access(
795
- user_id=user_id,
796
- classification=classification,
797
- metadata=metadata,
798
- )
799
-
800
- if not access_granted:
801
- logger.warning(
802
- "access_denied",
803
- pattern_id=pattern_id,
804
- user_id=user_id,
805
- classification=classification.value,
806
- )
807
-
808
- # Log access denial
809
- self.audit_logger.log_pattern_retrieve(
810
- user_id=user_id,
811
- pattern_id=pattern_id,
812
- classification=classification.value,
813
- access_granted=False,
814
- session_id=session_id,
815
- status="blocked",
816
- error="Access denied",
817
- )
818
-
819
- raise PermissionError(
820
- f"User {user_id} does not have access to {classification.value} pattern",
821
- )
822
-
823
- # Step 3: Decrypt if needed
824
- if metadata.get("encrypted", False):
825
- if not self.encryption_enabled or not self.encryption_manager:
826
- logger.error("decryption_required_but_unavailable", pattern_id=pattern_id)
827
- raise SecurityError("Encryption not available for decryption")
828
-
829
- content = self.encryption_manager.decrypt(content)
830
- logger.debug("pattern_decrypted", pattern_id=pattern_id)
831
-
832
- # Step 4: Check retention policy
833
- created_at = datetime.fromisoformat(metadata["created_at"].rstrip("Z"))
834
- retention_days = metadata["retention_days"]
835
- expiration_date = created_at + timedelta(days=retention_days)
836
-
837
- if datetime.utcnow() > expiration_date:
838
- logger.warning(
839
- "pattern_retention_expired",
840
- pattern_id=pattern_id,
841
- created_at=metadata["created_at"],
842
- retention_days=retention_days,
843
- )
844
- raise ValueError(
845
- f"Pattern {pattern_id} has expired retention period "
846
- f"(created: {metadata['created_at']}, retention: {retention_days} days)",
847
- )
848
-
849
- # Step 5: Audit logging
850
- self.audit_logger.log_pattern_retrieve(
851
- user_id=user_id,
852
- pattern_id=pattern_id,
853
- classification=classification.value,
854
- access_granted=True,
855
- permission_level=metadata["access_control"]["access_level"],
856
- session_id=session_id,
857
- status="success",
858
- )
859
-
860
- logger.info(
861
- "pattern_retrieved_successfully",
862
- pattern_id=pattern_id,
863
- classification=classification.value,
864
- )
865
-
866
- return {"content": content, "metadata": metadata}
867
-
868
- except (PermissionError, ValueError, SecurityError):
869
- # Re-raise expected errors
870
- raise
871
- except Exception as e:
872
- # Log unexpected errors
873
- logger.error("pattern_retrieval_failed", pattern_id=pattern_id, error=str(e))
874
-
875
- self.audit_logger.log_pattern_retrieve(
876
- user_id=user_id,
877
- pattern_id=pattern_id,
878
- classification="UNKNOWN",
879
- access_granted=False,
880
- session_id=session_id,
881
- status="failed",
882
- error=str(e),
883
- )
884
-
885
- raise
886
-
887
- def _classify_pattern(self, content: str, pattern_type: str) -> Classification:
888
- """Auto-classify pattern based on content and type.
889
-
890
- Classification heuristics:
891
- - SENSITIVE: Healthcare, financial, regulated data keywords
892
- - INTERNAL: Proprietary, confidential, internal keywords
893
- - PUBLIC: Everything else (general patterns)
894
-
895
- Args:
896
- content: Pattern content (already PII-scrubbed)
897
- pattern_type: Type of pattern
898
-
899
- Returns:
900
- Classification level
901
-
902
- """
903
- content_lower = content.lower()
904
-
905
- # SENSITIVE: Healthcare keywords (HIPAA)
906
- healthcare_keywords = [
907
- "patient",
908
- "medical",
909
- "diagnosis",
910
- "treatment",
911
- "healthcare",
912
- "clinical",
913
- "hipaa",
914
- "phi",
915
- "medical record",
916
- "prescription",
917
- ]
918
-
919
- # SENSITIVE: Financial keywords
920
- financial_keywords = [
921
- "financial",
922
- "payment",
923
- "credit card",
924
- "banking",
925
- "transaction",
926
- "pci dss",
927
- "payment card",
928
- ]
929
-
930
- # INTERNAL: Proprietary keywords
931
- proprietary_keywords = [
932
- "proprietary",
933
- "confidential",
934
- "internal",
935
- "trade secret",
936
- "company confidential",
937
- "restricted",
938
- ]
939
-
940
- # Check for SENSITIVE indicators
941
- if any(keyword in content_lower for keyword in healthcare_keywords):
942
- return Classification.SENSITIVE
943
-
944
- if any(keyword in content_lower for keyword in financial_keywords):
945
- return Classification.SENSITIVE
946
-
947
- # Pattern type based classification
948
- if pattern_type in [
949
- "clinical_protocol",
950
- "medical_guideline",
951
- "patient_workflow",
952
- "financial_procedure",
953
- ]:
954
- return Classification.SENSITIVE
955
-
956
- # Check for INTERNAL indicators
957
- if any(keyword in content_lower for keyword in proprietary_keywords):
958
- return Classification.INTERNAL
959
-
960
- if pattern_type in ["architecture", "business_logic", "company_process"]:
961
- return Classification.INTERNAL
962
-
963
- # Default to PUBLIC for general patterns
964
- return Classification.PUBLIC
965
-
966
- def _check_access(
967
- self,
968
- user_id: str,
969
- classification: Classification,
970
- metadata: dict[str, Any],
971
- ) -> bool:
972
- """Check if user has access to pattern based on classification.
973
-
974
- Access rules:
975
- - PUBLIC: All users
976
- - INTERNAL: Users on project team (simplified: always granted for demo)
977
- - SENSITIVE: Explicit permission required (simplified: creator only)
978
-
979
- Args:
980
- user_id: User requesting access
981
- classification: Pattern classification
982
- metadata: Pattern metadata
983
-
984
- Returns:
985
- True if access granted, False otherwise
986
-
987
- """
988
- # PUBLIC: Everyone has access
989
- if classification == Classification.PUBLIC:
990
- return True
991
-
992
- # INTERNAL: Check project team membership
993
- # Simplified: Grant access (production would check team membership)
994
- if classification == Classification.INTERNAL:
995
- logger.debug("internal_access_check", user_id=user_id, granted=True)
996
- return True
997
-
998
- # SENSITIVE: Require explicit permission
999
- # Simplified: Only pattern creator has access
1000
- if classification == Classification.SENSITIVE:
1001
- created_by = str(metadata.get("created_by", ""))
1002
- granted = user_id == created_by
1003
-
1004
- logger.debug(
1005
- "sensitive_access_check",
1006
- user_id=user_id,
1007
- created_by=created_by,
1008
- granted=granted,
1009
- )
1010
-
1011
- return bool(granted)
1012
-
1013
- # Default deny
1014
- return False
1015
-
1016
- def _generate_pattern_id(self, user_id: str, pattern_type: str) -> str:
1017
- """Generate unique pattern ID.
1018
-
1019
- Format: pat_{timestamp}_{hash}
1020
-
1021
- Args:
1022
- user_id: User creating the pattern
1023
- pattern_type: Type of pattern
1024
-
1025
- Returns:
1026
- Unique pattern identifier
1027
-
1028
- """
1029
- timestamp = datetime.utcnow().strftime("%Y%m%d%H%M%S")
1030
-
1031
- # Create hash from user_id, pattern_type, and random component
1032
- hash_input = f"{user_id}:{pattern_type}:{timestamp}:{os.urandom(8).hex()}"
1033
- hash_digest = hashlib.sha256(hash_input.encode()).hexdigest()[:12]
1034
-
1035
- return f"pat_{timestamp}_{hash_digest}"
1036
-
1037
- def list_patterns(
1038
- self,
1039
- user_id: str,
1040
- classification: Classification | None = None,
1041
- pattern_type: str | None = None,
1042
- ) -> list[dict[str, Any]]:
1043
- """List patterns accessible to user.
1044
-
1045
- Args:
1046
- user_id: User listing patterns
1047
- classification: Filter by classification
1048
- pattern_type: Filter by pattern type
1049
-
1050
- Returns:
1051
- List of pattern summaries
1052
-
1053
- """
1054
- all_pattern_ids = self.storage.list_patterns()
1055
- accessible_patterns = []
1056
-
1057
- for pattern_id in all_pattern_ids:
1058
- try:
1059
- pattern_data = self.storage.retrieve(pattern_id)
1060
- if not pattern_data:
1061
- continue
1062
-
1063
- metadata = pattern_data["metadata"]
1064
- pat_classification = Classification[metadata["classification"]]
1065
-
1066
- # Apply filters
1067
- if classification and pat_classification != classification:
1068
- continue
1069
-
1070
- if pattern_type and metadata.get("pattern_type") != pattern_type:
1071
- continue
1072
-
1073
- # Check access
1074
- if self._check_access(user_id, pat_classification, metadata):
1075
- accessible_patterns.append(
1076
- {
1077
- "pattern_id": pattern_id,
1078
- "pattern_type": metadata.get("pattern_type"),
1079
- "classification": metadata["classification"],
1080
- "created_by": metadata.get("created_by"),
1081
- "created_at": metadata.get("created_at"),
1082
- "encrypted": metadata.get("encrypted", False),
1083
- },
1084
- )
1085
-
1086
- except Exception as e:
1087
- logger.warning(
1088
- "failed_to_load_pattern_metadata",
1089
- pattern_id=pattern_id,
1090
- error=str(e),
1091
- )
1092
- continue
1093
-
1094
- return accessible_patterns
1095
-
1096
- def delete_pattern(self, pattern_id: str, user_id: str, session_id: str = "") -> bool:
1097
- """Delete a pattern (with access control).
1098
-
1099
- Args:
1100
- pattern_id: Pattern to delete
1101
- user_id: User requesting deletion
1102
- session_id: Session identifier
1103
-
1104
- Returns:
1105
- True if deleted successfully
1106
-
1107
- Raises:
1108
- PermissionError: If user doesn't have permission to delete
1109
-
1110
- """
1111
- # Retrieve pattern to check permissions
1112
- pattern_data = self.storage.retrieve(pattern_id)
1113
-
1114
- if not pattern_data:
1115
- logger.warning("pattern_not_found_for_deletion", pattern_id=pattern_id)
1116
- return False
1117
-
1118
- metadata = pattern_data["metadata"]
1119
-
1120
- # Only creator can delete (simplified access control)
1121
- if metadata.get("created_by") != user_id:
1122
- logger.warning(
1123
- "delete_permission_denied",
1124
- pattern_id=pattern_id,
1125
- user_id=user_id,
1126
- created_by=metadata.get("created_by"),
1127
- )
1128
- raise PermissionError(f"User {user_id} cannot delete pattern {pattern_id}")
1129
-
1130
- # Delete pattern
1131
- deleted = self.storage.delete(pattern_id)
1132
-
1133
- if deleted:
1134
- # Log deletion
1135
- self.audit_logger._write_event(
1136
- AuditEvent(
1137
- event_type="delete_pattern",
1138
- user_id=user_id,
1139
- session_id=session_id,
1140
- status="success",
1141
- data={
1142
- "pattern_id": pattern_id,
1143
- "classification": metadata["classification"],
1144
- },
1145
- ),
1146
- )
1147
-
1148
- logger.info("pattern_deleted", pattern_id=pattern_id, user_id=user_id)
1149
-
1150
- return deleted
1151
-
1152
- def get_statistics(self) -> dict[str, Any]:
1153
- """Get statistics about stored patterns.
1154
-
1155
- Returns:
1156
- Dictionary with pattern statistics
1157
-
1158
- """
1159
- all_patterns = self.storage.list_patterns()
1160
-
1161
- stats: dict[str, Any] = {
1162
- "total_patterns": len(all_patterns),
1163
- "by_classification": {
1164
- "PUBLIC": 0,
1165
- "INTERNAL": 0,
1166
- "SENSITIVE": 0,
1167
- },
1168
- "encrypted_count": 0,
1169
- "with_pii_scrubbed": 0,
1170
- }
1171
-
1172
- for pattern_id in all_patterns:
1173
- try:
1174
- pattern_data = self.storage.retrieve(pattern_id)
1175
- if not pattern_data:
1176
- continue
1177
-
1178
- metadata = pattern_data["metadata"]
1179
- classification = metadata.get("classification", "INTERNAL")
1180
-
1181
- stats["by_classification"][classification] += 1
1182
-
1183
- if metadata.get("encrypted", False):
1184
- stats["encrypted_count"] += 1
1185
-
1186
- if metadata.get("pii_removed", 0) > 0:
1187
- stats["with_pii_scrubbed"] += 1
1188
-
1189
- except Exception:
1190
- continue
1191
-
1192
- return stats