empathy-framework 5.3.0__py3-none-any.whl → 5.4.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (458) hide show
  1. empathy_framework-5.4.0.dist-info/METADATA +47 -0
  2. empathy_framework-5.4.0.dist-info/RECORD +8 -0
  3. {empathy_framework-5.3.0.dist-info → empathy_framework-5.4.0.dist-info}/top_level.txt +0 -1
  4. empathy_healthcare_plugin/__init__.py +12 -11
  5. empathy_llm_toolkit/__init__.py +12 -26
  6. empathy_os/__init__.py +12 -356
  7. empathy_software_plugin/__init__.py +12 -11
  8. empathy_framework-5.3.0.dist-info/METADATA +0 -1026
  9. empathy_framework-5.3.0.dist-info/RECORD +0 -456
  10. empathy_framework-5.3.0.dist-info/entry_points.txt +0 -26
  11. empathy_framework-5.3.0.dist-info/licenses/LICENSE +0 -201
  12. empathy_framework-5.3.0.dist-info/licenses/LICENSE_CHANGE_ANNOUNCEMENT.md +0 -101
  13. empathy_healthcare_plugin/monitors/__init__.py +0 -9
  14. empathy_healthcare_plugin/monitors/clinical_protocol_monitor.py +0 -315
  15. empathy_healthcare_plugin/monitors/monitoring/__init__.py +0 -44
  16. empathy_healthcare_plugin/monitors/monitoring/protocol_checker.py +0 -300
  17. empathy_healthcare_plugin/monitors/monitoring/protocol_loader.py +0 -214
  18. empathy_healthcare_plugin/monitors/monitoring/sensor_parsers.py +0 -306
  19. empathy_healthcare_plugin/monitors/monitoring/trajectory_analyzer.py +0 -389
  20. empathy_healthcare_plugin/protocols/cardiac.json +0 -93
  21. empathy_healthcare_plugin/protocols/post_operative.json +0 -92
  22. empathy_healthcare_plugin/protocols/respiratory.json +0 -92
  23. empathy_healthcare_plugin/protocols/sepsis.json +0 -141
  24. empathy_llm_toolkit/README.md +0 -553
  25. empathy_llm_toolkit/agent_factory/__init__.py +0 -53
  26. empathy_llm_toolkit/agent_factory/adapters/__init__.py +0 -85
  27. empathy_llm_toolkit/agent_factory/adapters/autogen_adapter.py +0 -312
  28. empathy_llm_toolkit/agent_factory/adapters/crewai_adapter.py +0 -483
  29. empathy_llm_toolkit/agent_factory/adapters/haystack_adapter.py +0 -298
  30. empathy_llm_toolkit/agent_factory/adapters/langchain_adapter.py +0 -362
  31. empathy_llm_toolkit/agent_factory/adapters/langgraph_adapter.py +0 -333
  32. empathy_llm_toolkit/agent_factory/adapters/native.py +0 -228
  33. empathy_llm_toolkit/agent_factory/adapters/wizard_adapter.py +0 -423
  34. empathy_llm_toolkit/agent_factory/base.py +0 -305
  35. empathy_llm_toolkit/agent_factory/crews/__init__.py +0 -67
  36. empathy_llm_toolkit/agent_factory/crews/code_review.py +0 -1113
  37. empathy_llm_toolkit/agent_factory/crews/health_check.py +0 -1262
  38. empathy_llm_toolkit/agent_factory/crews/refactoring.py +0 -1128
  39. empathy_llm_toolkit/agent_factory/crews/security_audit.py +0 -1018
  40. empathy_llm_toolkit/agent_factory/decorators.py +0 -287
  41. empathy_llm_toolkit/agent_factory/factory.py +0 -558
  42. empathy_llm_toolkit/agent_factory/framework.py +0 -193
  43. empathy_llm_toolkit/agent_factory/memory_integration.py +0 -328
  44. empathy_llm_toolkit/agent_factory/resilient.py +0 -320
  45. empathy_llm_toolkit/agents_md/__init__.py +0 -22
  46. empathy_llm_toolkit/agents_md/loader.py +0 -218
  47. empathy_llm_toolkit/agents_md/parser.py +0 -271
  48. empathy_llm_toolkit/agents_md/registry.py +0 -307
  49. empathy_llm_toolkit/claude_memory.py +0 -466
  50. empathy_llm_toolkit/cli/__init__.py +0 -8
  51. empathy_llm_toolkit/cli/sync_claude.py +0 -487
  52. empathy_llm_toolkit/code_health.py +0 -1313
  53. empathy_llm_toolkit/commands/__init__.py +0 -51
  54. empathy_llm_toolkit/commands/context.py +0 -375
  55. empathy_llm_toolkit/commands/loader.py +0 -301
  56. empathy_llm_toolkit/commands/models.py +0 -231
  57. empathy_llm_toolkit/commands/parser.py +0 -371
  58. empathy_llm_toolkit/commands/registry.py +0 -429
  59. empathy_llm_toolkit/config/__init__.py +0 -29
  60. empathy_llm_toolkit/config/unified.py +0 -291
  61. empathy_llm_toolkit/context/__init__.py +0 -22
  62. empathy_llm_toolkit/context/compaction.py +0 -455
  63. empathy_llm_toolkit/context/manager.py +0 -434
  64. empathy_llm_toolkit/contextual_patterns.py +0 -361
  65. empathy_llm_toolkit/core.py +0 -907
  66. empathy_llm_toolkit/git_pattern_extractor.py +0 -435
  67. empathy_llm_toolkit/hooks/__init__.py +0 -24
  68. empathy_llm_toolkit/hooks/config.py +0 -306
  69. empathy_llm_toolkit/hooks/executor.py +0 -289
  70. empathy_llm_toolkit/hooks/registry.py +0 -302
  71. empathy_llm_toolkit/hooks/scripts/__init__.py +0 -39
  72. empathy_llm_toolkit/hooks/scripts/evaluate_session.py +0 -201
  73. empathy_llm_toolkit/hooks/scripts/first_time_init.py +0 -285
  74. empathy_llm_toolkit/hooks/scripts/pre_compact.py +0 -207
  75. empathy_llm_toolkit/hooks/scripts/session_end.py +0 -183
  76. empathy_llm_toolkit/hooks/scripts/session_start.py +0 -163
  77. empathy_llm_toolkit/hooks/scripts/suggest_compact.py +0 -225
  78. empathy_llm_toolkit/learning/__init__.py +0 -30
  79. empathy_llm_toolkit/learning/evaluator.py +0 -438
  80. empathy_llm_toolkit/learning/extractor.py +0 -514
  81. empathy_llm_toolkit/learning/storage.py +0 -560
  82. empathy_llm_toolkit/levels.py +0 -227
  83. empathy_llm_toolkit/pattern_confidence.py +0 -414
  84. empathy_llm_toolkit/pattern_resolver.py +0 -272
  85. empathy_llm_toolkit/pattern_summary.py +0 -350
  86. empathy_llm_toolkit/providers.py +0 -967
  87. empathy_llm_toolkit/routing/__init__.py +0 -32
  88. empathy_llm_toolkit/routing/model_router.py +0 -362
  89. empathy_llm_toolkit/security/IMPLEMENTATION_SUMMARY.md +0 -413
  90. empathy_llm_toolkit/security/PHASE2_COMPLETE.md +0 -384
  91. empathy_llm_toolkit/security/PHASE2_SECRETS_DETECTOR_COMPLETE.md +0 -271
  92. empathy_llm_toolkit/security/QUICK_REFERENCE.md +0 -316
  93. empathy_llm_toolkit/security/README.md +0 -262
  94. empathy_llm_toolkit/security/__init__.py +0 -62
  95. empathy_llm_toolkit/security/audit_logger.py +0 -929
  96. empathy_llm_toolkit/security/audit_logger_example.py +0 -152
  97. empathy_llm_toolkit/security/pii_scrubber.py +0 -640
  98. empathy_llm_toolkit/security/secrets_detector.py +0 -678
  99. empathy_llm_toolkit/security/secrets_detector_example.py +0 -304
  100. empathy_llm_toolkit/security/secure_memdocs.py +0 -1192
  101. empathy_llm_toolkit/security/secure_memdocs_example.py +0 -278
  102. empathy_llm_toolkit/session_status.py +0 -745
  103. empathy_llm_toolkit/state.py +0 -246
  104. empathy_llm_toolkit/utils/__init__.py +0 -5
  105. empathy_llm_toolkit/utils/tokens.py +0 -349
  106. empathy_os/adaptive/__init__.py +0 -13
  107. empathy_os/adaptive/task_complexity.py +0 -127
  108. empathy_os/agent_monitoring.py +0 -414
  109. empathy_os/cache/__init__.py +0 -117
  110. empathy_os/cache/base.py +0 -166
  111. empathy_os/cache/dependency_manager.py +0 -256
  112. empathy_os/cache/hash_only.py +0 -251
  113. empathy_os/cache/hybrid.py +0 -457
  114. empathy_os/cache/storage.py +0 -285
  115. empathy_os/cache_monitor.py +0 -356
  116. empathy_os/cache_stats.py +0 -298
  117. empathy_os/cli/__init__.py +0 -152
  118. empathy_os/cli/__main__.py +0 -12
  119. empathy_os/cli/commands/__init__.py +0 -1
  120. empathy_os/cli/commands/batch.py +0 -264
  121. empathy_os/cli/commands/cache.py +0 -248
  122. empathy_os/cli/commands/help.py +0 -331
  123. empathy_os/cli/commands/info.py +0 -140
  124. empathy_os/cli/commands/inspect.py +0 -436
  125. empathy_os/cli/commands/inspection.py +0 -57
  126. empathy_os/cli/commands/memory.py +0 -48
  127. empathy_os/cli/commands/metrics.py +0 -92
  128. empathy_os/cli/commands/orchestrate.py +0 -184
  129. empathy_os/cli/commands/patterns.py +0 -207
  130. empathy_os/cli/commands/profiling.py +0 -202
  131. empathy_os/cli/commands/provider.py +0 -98
  132. empathy_os/cli/commands/routing.py +0 -285
  133. empathy_os/cli/commands/setup.py +0 -96
  134. empathy_os/cli/commands/status.py +0 -235
  135. empathy_os/cli/commands/sync.py +0 -166
  136. empathy_os/cli/commands/tier.py +0 -121
  137. empathy_os/cli/commands/utilities.py +0 -114
  138. empathy_os/cli/commands/workflow.py +0 -579
  139. empathy_os/cli/core.py +0 -32
  140. empathy_os/cli/parsers/__init__.py +0 -68
  141. empathy_os/cli/parsers/batch.py +0 -118
  142. empathy_os/cli/parsers/cache.py +0 -65
  143. empathy_os/cli/parsers/help.py +0 -41
  144. empathy_os/cli/parsers/info.py +0 -26
  145. empathy_os/cli/parsers/inspect.py +0 -66
  146. empathy_os/cli/parsers/metrics.py +0 -42
  147. empathy_os/cli/parsers/orchestrate.py +0 -61
  148. empathy_os/cli/parsers/patterns.py +0 -54
  149. empathy_os/cli/parsers/provider.py +0 -40
  150. empathy_os/cli/parsers/routing.py +0 -110
  151. empathy_os/cli/parsers/setup.py +0 -42
  152. empathy_os/cli/parsers/status.py +0 -47
  153. empathy_os/cli/parsers/sync.py +0 -31
  154. empathy_os/cli/parsers/tier.py +0 -33
  155. empathy_os/cli/parsers/workflow.py +0 -77
  156. empathy_os/cli/utils/__init__.py +0 -1
  157. empathy_os/cli/utils/data.py +0 -242
  158. empathy_os/cli/utils/helpers.py +0 -68
  159. empathy_os/cli_legacy.py +0 -3957
  160. empathy_os/cli_minimal.py +0 -1159
  161. empathy_os/cli_router.py +0 -437
  162. empathy_os/cli_unified.py +0 -814
  163. empathy_os/config/__init__.py +0 -66
  164. empathy_os/config/xml_config.py +0 -286
  165. empathy_os/config.py +0 -545
  166. empathy_os/coordination.py +0 -870
  167. empathy_os/core.py +0 -1511
  168. empathy_os/core_modules/__init__.py +0 -15
  169. empathy_os/cost_tracker.py +0 -626
  170. empathy_os/dashboard/__init__.py +0 -41
  171. empathy_os/dashboard/app.py +0 -512
  172. empathy_os/dashboard/simple_server.py +0 -435
  173. empathy_os/dashboard/standalone_server.py +0 -547
  174. empathy_os/discovery.py +0 -306
  175. empathy_os/emergence.py +0 -306
  176. empathy_os/exceptions.py +0 -123
  177. empathy_os/feedback_loops.py +0 -373
  178. empathy_os/hot_reload/README.md +0 -473
  179. empathy_os/hot_reload/__init__.py +0 -62
  180. empathy_os/hot_reload/config.py +0 -83
  181. empathy_os/hot_reload/integration.py +0 -229
  182. empathy_os/hot_reload/reloader.py +0 -298
  183. empathy_os/hot_reload/watcher.py +0 -183
  184. empathy_os/hot_reload/websocket.py +0 -177
  185. empathy_os/levels.py +0 -577
  186. empathy_os/leverage_points.py +0 -441
  187. empathy_os/logging_config.py +0 -261
  188. empathy_os/mcp/__init__.py +0 -10
  189. empathy_os/mcp/server.py +0 -506
  190. empathy_os/memory/__init__.py +0 -237
  191. empathy_os/memory/claude_memory.py +0 -469
  192. empathy_os/memory/config.py +0 -224
  193. empathy_os/memory/control_panel.py +0 -1290
  194. empathy_os/memory/control_panel_support.py +0 -145
  195. empathy_os/memory/cross_session.py +0 -845
  196. empathy_os/memory/edges.py +0 -179
  197. empathy_os/memory/encryption.py +0 -159
  198. empathy_os/memory/file_session.py +0 -770
  199. empathy_os/memory/graph.py +0 -570
  200. empathy_os/memory/long_term.py +0 -913
  201. empathy_os/memory/long_term_types.py +0 -99
  202. empathy_os/memory/mixins/__init__.py +0 -25
  203. empathy_os/memory/mixins/backend_init_mixin.py +0 -249
  204. empathy_os/memory/mixins/capabilities_mixin.py +0 -208
  205. empathy_os/memory/mixins/handoff_mixin.py +0 -208
  206. empathy_os/memory/mixins/lifecycle_mixin.py +0 -49
  207. empathy_os/memory/mixins/long_term_mixin.py +0 -352
  208. empathy_os/memory/mixins/promotion_mixin.py +0 -109
  209. empathy_os/memory/mixins/short_term_mixin.py +0 -182
  210. empathy_os/memory/nodes.py +0 -179
  211. empathy_os/memory/redis_bootstrap.py +0 -540
  212. empathy_os/memory/security/__init__.py +0 -31
  213. empathy_os/memory/security/audit_logger.py +0 -932
  214. empathy_os/memory/security/pii_scrubber.py +0 -640
  215. empathy_os/memory/security/secrets_detector.py +0 -678
  216. empathy_os/memory/short_term.py +0 -2192
  217. empathy_os/memory/simple_storage.py +0 -302
  218. empathy_os/memory/storage/__init__.py +0 -15
  219. empathy_os/memory/storage_backend.py +0 -167
  220. empathy_os/memory/summary_index.py +0 -583
  221. empathy_os/memory/types.py +0 -446
  222. empathy_os/memory/unified.py +0 -182
  223. empathy_os/meta_workflows/__init__.py +0 -74
  224. empathy_os/meta_workflows/agent_creator.py +0 -248
  225. empathy_os/meta_workflows/builtin_templates.py +0 -567
  226. empathy_os/meta_workflows/cli_commands/__init__.py +0 -56
  227. empathy_os/meta_workflows/cli_commands/agent_commands.py +0 -321
  228. empathy_os/meta_workflows/cli_commands/analytics_commands.py +0 -442
  229. empathy_os/meta_workflows/cli_commands/config_commands.py +0 -232
  230. empathy_os/meta_workflows/cli_commands/memory_commands.py +0 -182
  231. empathy_os/meta_workflows/cli_commands/template_commands.py +0 -354
  232. empathy_os/meta_workflows/cli_commands/workflow_commands.py +0 -382
  233. empathy_os/meta_workflows/cli_meta_workflows.py +0 -59
  234. empathy_os/meta_workflows/form_engine.py +0 -292
  235. empathy_os/meta_workflows/intent_detector.py +0 -409
  236. empathy_os/meta_workflows/models.py +0 -569
  237. empathy_os/meta_workflows/pattern_learner.py +0 -738
  238. empathy_os/meta_workflows/plan_generator.py +0 -384
  239. empathy_os/meta_workflows/session_context.py +0 -397
  240. empathy_os/meta_workflows/template_registry.py +0 -229
  241. empathy_os/meta_workflows/workflow.py +0 -984
  242. empathy_os/metrics/__init__.py +0 -12
  243. empathy_os/metrics/collector.py +0 -31
  244. empathy_os/metrics/prompt_metrics.py +0 -194
  245. empathy_os/models/__init__.py +0 -172
  246. empathy_os/models/__main__.py +0 -13
  247. empathy_os/models/adaptive_routing.py +0 -437
  248. empathy_os/models/auth_cli.py +0 -444
  249. empathy_os/models/auth_strategy.py +0 -450
  250. empathy_os/models/cli.py +0 -655
  251. empathy_os/models/empathy_executor.py +0 -354
  252. empathy_os/models/executor.py +0 -257
  253. empathy_os/models/fallback.py +0 -762
  254. empathy_os/models/provider_config.py +0 -282
  255. empathy_os/models/registry.py +0 -472
  256. empathy_os/models/tasks.py +0 -359
  257. empathy_os/models/telemetry/__init__.py +0 -71
  258. empathy_os/models/telemetry/analytics.py +0 -594
  259. empathy_os/models/telemetry/backend.py +0 -196
  260. empathy_os/models/telemetry/data_models.py +0 -431
  261. empathy_os/models/telemetry/storage.py +0 -489
  262. empathy_os/models/token_estimator.py +0 -420
  263. empathy_os/models/validation.py +0 -280
  264. empathy_os/monitoring/__init__.py +0 -52
  265. empathy_os/monitoring/alerts.py +0 -946
  266. empathy_os/monitoring/alerts_cli.py +0 -448
  267. empathy_os/monitoring/multi_backend.py +0 -271
  268. empathy_os/monitoring/otel_backend.py +0 -362
  269. empathy_os/optimization/__init__.py +0 -19
  270. empathy_os/optimization/context_optimizer.py +0 -272
  271. empathy_os/orchestration/__init__.py +0 -67
  272. empathy_os/orchestration/agent_templates.py +0 -707
  273. empathy_os/orchestration/config_store.py +0 -499
  274. empathy_os/orchestration/execution_strategies.py +0 -2111
  275. empathy_os/orchestration/meta_orchestrator.py +0 -1168
  276. empathy_os/orchestration/pattern_learner.py +0 -696
  277. empathy_os/orchestration/real_tools.py +0 -931
  278. empathy_os/pattern_cache.py +0 -187
  279. empathy_os/pattern_library.py +0 -542
  280. empathy_os/patterns/debugging/all_patterns.json +0 -81
  281. empathy_os/patterns/debugging/workflow_20260107_1770825e.json +0 -77
  282. empathy_os/patterns/refactoring_memory.json +0 -89
  283. empathy_os/persistence.py +0 -564
  284. empathy_os/platform_utils.py +0 -265
  285. empathy_os/plugins/__init__.py +0 -28
  286. empathy_os/plugins/base.py +0 -361
  287. empathy_os/plugins/registry.py +0 -268
  288. empathy_os/project_index/__init__.py +0 -32
  289. empathy_os/project_index/cli.py +0 -335
  290. empathy_os/project_index/index.py +0 -667
  291. empathy_os/project_index/models.py +0 -504
  292. empathy_os/project_index/reports.py +0 -474
  293. empathy_os/project_index/scanner.py +0 -777
  294. empathy_os/project_index/scanner_parallel.py +0 -291
  295. empathy_os/prompts/__init__.py +0 -61
  296. empathy_os/prompts/config.py +0 -77
  297. empathy_os/prompts/context.py +0 -177
  298. empathy_os/prompts/parser.py +0 -285
  299. empathy_os/prompts/registry.py +0 -313
  300. empathy_os/prompts/templates.py +0 -208
  301. empathy_os/redis_config.py +0 -302
  302. empathy_os/redis_memory.py +0 -799
  303. empathy_os/resilience/__init__.py +0 -56
  304. empathy_os/resilience/circuit_breaker.py +0 -256
  305. empathy_os/resilience/fallback.py +0 -179
  306. empathy_os/resilience/health.py +0 -300
  307. empathy_os/resilience/retry.py +0 -209
  308. empathy_os/resilience/timeout.py +0 -135
  309. empathy_os/routing/__init__.py +0 -43
  310. empathy_os/routing/chain_executor.py +0 -433
  311. empathy_os/routing/classifier.py +0 -217
  312. empathy_os/routing/smart_router.py +0 -234
  313. empathy_os/routing/workflow_registry.py +0 -343
  314. empathy_os/scaffolding/README.md +0 -589
  315. empathy_os/scaffolding/__init__.py +0 -35
  316. empathy_os/scaffolding/__main__.py +0 -14
  317. empathy_os/scaffolding/cli.py +0 -240
  318. empathy_os/socratic/__init__.py +0 -256
  319. empathy_os/socratic/ab_testing.py +0 -958
  320. empathy_os/socratic/blueprint.py +0 -533
  321. empathy_os/socratic/cli.py +0 -703
  322. empathy_os/socratic/collaboration.py +0 -1114
  323. empathy_os/socratic/domain_templates.py +0 -924
  324. empathy_os/socratic/embeddings.py +0 -738
  325. empathy_os/socratic/engine.py +0 -794
  326. empathy_os/socratic/explainer.py +0 -682
  327. empathy_os/socratic/feedback.py +0 -772
  328. empathy_os/socratic/forms.py +0 -629
  329. empathy_os/socratic/generator.py +0 -732
  330. empathy_os/socratic/llm_analyzer.py +0 -637
  331. empathy_os/socratic/mcp_server.py +0 -702
  332. empathy_os/socratic/session.py +0 -312
  333. empathy_os/socratic/storage.py +0 -667
  334. empathy_os/socratic/success.py +0 -730
  335. empathy_os/socratic/visual_editor.py +0 -860
  336. empathy_os/socratic/web_ui.py +0 -958
  337. empathy_os/telemetry/__init__.py +0 -39
  338. empathy_os/telemetry/agent_coordination.py +0 -475
  339. empathy_os/telemetry/agent_tracking.py +0 -367
  340. empathy_os/telemetry/approval_gates.py +0 -545
  341. empathy_os/telemetry/cli.py +0 -1231
  342. empathy_os/telemetry/commands/__init__.py +0 -14
  343. empathy_os/telemetry/commands/dashboard_commands.py +0 -696
  344. empathy_os/telemetry/event_streaming.py +0 -409
  345. empathy_os/telemetry/feedback_loop.py +0 -567
  346. empathy_os/telemetry/usage_tracker.py +0 -591
  347. empathy_os/templates.py +0 -754
  348. empathy_os/test_generator/__init__.py +0 -38
  349. empathy_os/test_generator/__main__.py +0 -14
  350. empathy_os/test_generator/cli.py +0 -234
  351. empathy_os/test_generator/generator.py +0 -355
  352. empathy_os/test_generator/risk_analyzer.py +0 -216
  353. empathy_os/tier_recommender.py +0 -384
  354. empathy_os/tools.py +0 -183
  355. empathy_os/trust/__init__.py +0 -28
  356. empathy_os/trust/circuit_breaker.py +0 -579
  357. empathy_os/trust_building.py +0 -527
  358. empathy_os/validation/__init__.py +0 -19
  359. empathy_os/validation/xml_validator.py +0 -281
  360. empathy_os/vscode_bridge.py +0 -173
  361. empathy_os/workflow_commands.py +0 -780
  362. empathy_os/workflow_patterns/__init__.py +0 -33
  363. empathy_os/workflow_patterns/behavior.py +0 -249
  364. empathy_os/workflow_patterns/core.py +0 -76
  365. empathy_os/workflow_patterns/output.py +0 -99
  366. empathy_os/workflow_patterns/registry.py +0 -255
  367. empathy_os/workflow_patterns/structural.py +0 -288
  368. empathy_os/workflows/__init__.py +0 -539
  369. empathy_os/workflows/autonomous_test_gen.py +0 -1268
  370. empathy_os/workflows/base.py +0 -2667
  371. empathy_os/workflows/batch_processing.py +0 -342
  372. empathy_os/workflows/bug_predict.py +0 -1084
  373. empathy_os/workflows/builder.py +0 -273
  374. empathy_os/workflows/caching.py +0 -253
  375. empathy_os/workflows/code_review.py +0 -1048
  376. empathy_os/workflows/code_review_adapters.py +0 -312
  377. empathy_os/workflows/code_review_pipeline.py +0 -722
  378. empathy_os/workflows/config.py +0 -645
  379. empathy_os/workflows/dependency_check.py +0 -644
  380. empathy_os/workflows/document_gen/__init__.py +0 -25
  381. empathy_os/workflows/document_gen/config.py +0 -30
  382. empathy_os/workflows/document_gen/report_formatter.py +0 -162
  383. empathy_os/workflows/document_gen/workflow.py +0 -1426
  384. empathy_os/workflows/document_manager.py +0 -216
  385. empathy_os/workflows/document_manager_README.md +0 -134
  386. empathy_os/workflows/documentation_orchestrator.py +0 -1205
  387. empathy_os/workflows/history.py +0 -510
  388. empathy_os/workflows/keyboard_shortcuts/__init__.py +0 -39
  389. empathy_os/workflows/keyboard_shortcuts/generators.py +0 -391
  390. empathy_os/workflows/keyboard_shortcuts/parsers.py +0 -416
  391. empathy_os/workflows/keyboard_shortcuts/prompts.py +0 -295
  392. empathy_os/workflows/keyboard_shortcuts/schema.py +0 -193
  393. empathy_os/workflows/keyboard_shortcuts/workflow.py +0 -509
  394. empathy_os/workflows/llm_base.py +0 -363
  395. empathy_os/workflows/manage_docs.py +0 -87
  396. empathy_os/workflows/manage_docs_README.md +0 -134
  397. empathy_os/workflows/manage_documentation.py +0 -821
  398. empathy_os/workflows/new_sample_workflow1.py +0 -149
  399. empathy_os/workflows/new_sample_workflow1_README.md +0 -150
  400. empathy_os/workflows/orchestrated_health_check.py +0 -849
  401. empathy_os/workflows/orchestrated_release_prep.py +0 -600
  402. empathy_os/workflows/output.py +0 -413
  403. empathy_os/workflows/perf_audit.py +0 -863
  404. empathy_os/workflows/pr_review.py +0 -762
  405. empathy_os/workflows/progress.py +0 -785
  406. empathy_os/workflows/progress_server.py +0 -322
  407. empathy_os/workflows/progressive/README 2.md +0 -454
  408. empathy_os/workflows/progressive/README.md +0 -454
  409. empathy_os/workflows/progressive/__init__.py +0 -82
  410. empathy_os/workflows/progressive/cli.py +0 -219
  411. empathy_os/workflows/progressive/core.py +0 -488
  412. empathy_os/workflows/progressive/orchestrator.py +0 -723
  413. empathy_os/workflows/progressive/reports.py +0 -520
  414. empathy_os/workflows/progressive/telemetry.py +0 -274
  415. empathy_os/workflows/progressive/test_gen.py +0 -495
  416. empathy_os/workflows/progressive/workflow.py +0 -589
  417. empathy_os/workflows/refactor_plan.py +0 -694
  418. empathy_os/workflows/release_prep.py +0 -895
  419. empathy_os/workflows/release_prep_crew.py +0 -969
  420. empathy_os/workflows/research_synthesis.py +0 -404
  421. empathy_os/workflows/routing.py +0 -168
  422. empathy_os/workflows/secure_release.py +0 -593
  423. empathy_os/workflows/security_adapters.py +0 -297
  424. empathy_os/workflows/security_audit.py +0 -1329
  425. empathy_os/workflows/security_audit_phase3.py +0 -355
  426. empathy_os/workflows/seo_optimization.py +0 -633
  427. empathy_os/workflows/step_config.py +0 -234
  428. empathy_os/workflows/telemetry_mixin.py +0 -269
  429. empathy_os/workflows/test5.py +0 -125
  430. empathy_os/workflows/test5_README.md +0 -158
  431. empathy_os/workflows/test_coverage_boost_crew.py +0 -849
  432. empathy_os/workflows/test_gen/__init__.py +0 -52
  433. empathy_os/workflows/test_gen/ast_analyzer.py +0 -249
  434. empathy_os/workflows/test_gen/config.py +0 -88
  435. empathy_os/workflows/test_gen/data_models.py +0 -38
  436. empathy_os/workflows/test_gen/report_formatter.py +0 -289
  437. empathy_os/workflows/test_gen/test_templates.py +0 -381
  438. empathy_os/workflows/test_gen/workflow.py +0 -655
  439. empathy_os/workflows/test_gen.py +0 -54
  440. empathy_os/workflows/test_gen_behavioral.py +0 -477
  441. empathy_os/workflows/test_gen_parallel.py +0 -341
  442. empathy_os/workflows/test_lifecycle.py +0 -526
  443. empathy_os/workflows/test_maintenance.py +0 -627
  444. empathy_os/workflows/test_maintenance_cli.py +0 -590
  445. empathy_os/workflows/test_maintenance_crew.py +0 -840
  446. empathy_os/workflows/test_runner.py +0 -622
  447. empathy_os/workflows/tier_tracking.py +0 -531
  448. empathy_os/workflows/xml_enhanced_crew.py +0 -285
  449. empathy_software_plugin/SOFTWARE_PLUGIN_README.md +0 -57
  450. empathy_software_plugin/cli/__init__.py +0 -120
  451. empathy_software_plugin/cli/inspect.py +0 -362
  452. empathy_software_plugin/cli.py +0 -574
  453. empathy_software_plugin/plugin.py +0 -188
  454. workflow_scaffolding/__init__.py +0 -11
  455. workflow_scaffolding/__main__.py +0 -12
  456. workflow_scaffolding/cli.py +0 -206
  457. workflow_scaffolding/generator.py +0 -265
  458. {empathy_framework-5.3.0.dist-info → empathy_framework-5.4.0.dist-info}/WHEEL +0 -0
@@ -1,932 +0,0 @@
1
- """Audit Logging Framework for Empathy Framework
2
-
3
- Comprehensive audit logging for SOC2, HIPAA, and GDPR compliance.
4
- Implements tamper-evident, append-only logging with structured JSON format.
5
-
6
- Key Features:
7
- - JSON Lines format (one event per line)
8
- - ISO-8601 timestamps (UTC)
9
- - Unique event IDs (UUID)
10
- - Tamper-evident (append-only)
11
- - Query/search capability
12
- - Log rotation support
13
-
14
- Reference:
15
- - SECURE_MEMORY_ARCHITECTURE.md: Audit Trail Implementation
16
- - SOC2 CC7.2: System Monitoring
17
- - HIPAA 164.312(b): Audit Controls
18
- - GDPR Article 30: Records of Processing
19
-
20
- Copyright 2025 Smart AI Memory, LLC
21
- Licensed under Fair Source 0.9
22
- """
23
-
24
- import json
25
- import logging
26
- import os
27
- import uuid
28
- from dataclasses import asdict, dataclass, field
29
- from datetime import datetime, timedelta
30
- from pathlib import Path
31
- from typing import Any
32
-
33
- logger = logging.getLogger(__name__)
34
-
35
-
36
- @dataclass
37
- class AuditEvent:
38
- """Represents a single audit event.
39
-
40
- All audit events share these core fields for compliance tracking.
41
- """
42
-
43
- # Core identification
44
- event_id: str = field(default_factory=lambda: f"evt_{uuid.uuid4().hex[:12]}")
45
- timestamp: str = field(default_factory=lambda: datetime.utcnow().isoformat() + "Z")
46
- version: str = "1.0"
47
-
48
- # Event classification
49
- event_type: str = "" # llm_request, store_pattern, retrieve_pattern, security_violation
50
- user_id: str = ""
51
- session_id: str = ""
52
-
53
- # Status tracking
54
- status: str = "success" # success, failed, blocked
55
- error: str = ""
56
-
57
- # Custom fields (populated by specific event types)
58
- data: dict[str, Any] = field(default_factory=dict)
59
-
60
- def to_dict(self) -> dict[str, Any]:
61
- """Convert to dictionary for JSON serialization"""
62
- result = asdict(self)
63
- # Flatten data dict into top level for easier querying
64
- data = result.pop("data", {})
65
- result.update(data)
66
- return result
67
-
68
-
69
- @dataclass
70
- class SecurityViolation:
71
- """Represents a security policy violation.
72
-
73
- Used for tracking and alerting on security issues.
74
- """
75
-
76
- violation_type: str # secrets_detected, pii_in_storage, classification_error, etc.
77
- severity: str # LOW, MEDIUM, HIGH, CRITICAL
78
- details: dict[str, Any] = field(default_factory=dict)
79
- user_notified: bool = False
80
- manager_notified: bool = False
81
- security_team_notified: bool = False
82
-
83
-
84
- class AuditLogger:
85
- """Comprehensive audit logging for Empathy Framework.
86
-
87
- Implements SOC2, HIPAA, and GDPR compliant audit trails with:
88
- - Tamper-evident append-only logging
89
- - Structured JSON Lines format
90
- - Comprehensive event tracking
91
- - Query and search capabilities
92
- - Log rotation support
93
-
94
- Example:
95
- >>> logger = AuditLogger() # Uses platform-appropriate default
96
- >>> logger.log_llm_request(
97
- ... user_id="user@company.com",
98
- ... empathy_level=3,
99
- ... provider="anthropic",
100
- ... model="claude-sonnet-4",
101
- ... memory_sources=["enterprise", "user", "project"],
102
- ... pii_count=0,
103
- ... secrets_count=0
104
- ... )
105
-
106
- Log Format:
107
- Each line is a complete JSON object representing one event.
108
- Format: JSON Lines (.jsonl) - one event per line, append-only.
109
-
110
- Compliance:
111
- - SOC2 CC7.2: System Monitoring and Logging
112
- - HIPAA 164.312(b): Audit Controls
113
- - GDPR Article 30: Records of Processing Activities
114
-
115
- """
116
-
117
- def __init__(
118
- self,
119
- log_dir: str | None = None, # Uses platform-appropriate default if None
120
- log_filename: str = "audit.jsonl",
121
- max_file_size_mb: int = 100,
122
- retention_days: int = 365,
123
- enable_rotation: bool = True,
124
- enable_console_logging: bool = False,
125
- ):
126
- """Initialize the audit logger.
127
-
128
- Args:
129
- log_dir: Directory for audit logs
130
- log_filename: Name of the audit log file
131
- max_file_size_mb: Maximum file size before rotation (if enabled)
132
- retention_days: Number of days to retain audit logs
133
- enable_rotation: Whether to enable automatic log rotation
134
- enable_console_logging: Whether to also log to console (for development)
135
-
136
- """
137
- # Use platform-appropriate default if log_dir not specified
138
- if log_dir is None:
139
- from empathy_os.platform_utils import get_default_log_dir
140
-
141
- self.log_dir = get_default_log_dir()
142
- else:
143
- self.log_dir = Path(log_dir)
144
- self.log_filename = log_filename
145
- self.log_path = self.log_dir / log_filename
146
- self.max_file_size_bytes = max_file_size_mb * 1024 * 1024
147
- self.retention_days = retention_days
148
- self.enable_rotation = enable_rotation
149
- self.enable_console_logging = enable_console_logging
150
-
151
- # Track security violations for alerting
152
- self._violation_counts: dict[str, int] = {}
153
-
154
- # Initialize log directory
155
- self._initialize_log_directory()
156
-
157
- def _initialize_log_directory(self):
158
- """Create log directory if it doesn't exist"""
159
- try:
160
- self.log_dir.mkdir(parents=True, exist_ok=True)
161
- # Set restrictive permissions (owner read/write only)
162
- os.chmod(self.log_dir, 0o700)
163
- logger.info(f"Audit log directory initialized: {self.log_dir}")
164
- except Exception as e:
165
- logger.error(f"Failed to initialize audit log directory: {e}")
166
- # Fallback to local directory
167
- self.log_dir = Path("./logs")
168
- self.log_dir.mkdir(parents=True, exist_ok=True)
169
- self.log_path = self.log_dir / self.log_filename
170
- logger.warning(f"Using fallback log directory: {self.log_dir}")
171
-
172
- def _write_event(self, event: AuditEvent):
173
- """Write an audit event to the log file.
174
-
175
- Uses append-only mode for tamper-evidence.
176
- """
177
- try:
178
- # Check if rotation is needed
179
- if self.enable_rotation and self.log_path.exists():
180
- if self.log_path.stat().st_size > self.max_file_size_bytes:
181
- self._rotate_log()
182
-
183
- # Write event as single line JSON
184
- with open(self.log_path, "a", encoding="utf-8") as f:
185
- json.dump(event.to_dict(), f, ensure_ascii=False)
186
- f.write("\n")
187
-
188
- # Optional console logging for development
189
- if self.enable_console_logging:
190
- logger.debug(f"Audit event: {event.event_type} - {event.status}")
191
-
192
- except Exception as e:
193
- logger.error(f"Failed to write audit event: {e}")
194
- # Critical: audit logging failure should be visible
195
- if self.enable_console_logging:
196
- print(f"AUDIT LOG FAILURE: {e}", flush=True)
197
-
198
- def _rotate_log(self):
199
- """Rotate the audit log file.
200
-
201
- Renames current log with timestamp and creates new file.
202
- """
203
- try:
204
- timestamp = datetime.utcnow().strftime("%Y%m%d_%H%M%S")
205
- rotated_name = f"{self.log_filename}.{timestamp}"
206
- rotated_path = self.log_dir / rotated_name
207
-
208
- self.log_path.rename(rotated_path)
209
- logger.info(f"Audit log rotated: {rotated_path}")
210
-
211
- # Clean up old logs beyond retention period
212
- self._cleanup_old_logs()
213
-
214
- except Exception as e:
215
- logger.error(f"Failed to rotate audit log: {e}")
216
-
217
- def _cleanup_old_logs(self):
218
- """Remove audit logs older than retention period"""
219
- try:
220
- cutoff_date = datetime.utcnow() - timedelta(days=self.retention_days)
221
-
222
- for log_file in self.log_dir.glob(f"{self.log_filename}.*"):
223
- # Extract timestamp from filename
224
- try:
225
- timestamp_str = log_file.suffix[1:] # Remove leading dot
226
- file_date = datetime.strptime(timestamp_str, "%Y%m%d_%H%M%S")
227
-
228
- if file_date < cutoff_date:
229
- log_file.unlink()
230
- logger.info(f"Removed old audit log: {log_file}")
231
- except (ValueError, IndexError):
232
- # Skip files that don't match expected format
233
- continue
234
-
235
- except Exception as e:
236
- logger.error(f"Failed to cleanup old audit logs: {e}")
237
-
238
- def log_llm_request(
239
- self,
240
- user_id: str,
241
- empathy_level: int,
242
- provider: str,
243
- model: str,
244
- memory_sources: list[str],
245
- pii_count: int = 0,
246
- secrets_count: int = 0,
247
- request_size_bytes: int = 0,
248
- response_size_bytes: int = 0,
249
- duration_ms: int = 0,
250
- memdocs_patterns_used: list[str] | None = None,
251
- sanitization_applied: bool = True,
252
- classification_verified: bool = True,
253
- session_id: str = "",
254
- ip_address: str = "",
255
- temperature: float = 0.7,
256
- status: str = "success",
257
- error: str = "",
258
- **kwargs,
259
- ):
260
- """Log an LLM API request.
261
-
262
- Tracks all LLM interactions for compliance and monitoring.
263
-
264
- Args:
265
- user_id: User or service account making the request
266
- empathy_level: Empathy level (1-5) used for this request
267
- provider: LLM provider (anthropic, openai, local)
268
- model: Specific model used
269
- memory_sources: Which memory sources were loaded (enterprise, user, project)
270
- pii_count: Number of PII items detected (not the items themselves)
271
- secrets_count: Number of secrets detected
272
- request_size_bytes: Size of the request payload
273
- response_size_bytes: Size of the response payload
274
- duration_ms: Request duration in milliseconds
275
- memdocs_patterns_used: List of MemDocs pattern IDs used
276
- sanitization_applied: Whether PII sanitization was applied
277
- classification_verified: Whether data classification was verified
278
- session_id: Session identifier
279
- ip_address: Anonymized IP address (e.g., first 3 octets only)
280
- temperature: LLM temperature setting
281
- status: success, failed, or blocked
282
- error: Error message if failed
283
- **kwargs: Additional custom fields
284
-
285
- Example:
286
- >>> logger.log_llm_request(
287
- ... user_id="user@company.com",
288
- ... empathy_level=3,
289
- ... provider="anthropic",
290
- ... model="claude-sonnet-4",
291
- ... memory_sources=["enterprise", "user"],
292
- ... pii_count=0,
293
- ... secrets_count=0
294
- ... )
295
-
296
- """
297
- event = AuditEvent(
298
- event_type="llm_request",
299
- user_id=user_id,
300
- session_id=session_id,
301
- status=status,
302
- error=error,
303
- data={
304
- "llm": {
305
- "provider": provider,
306
- "model": model,
307
- "empathy_level": empathy_level,
308
- "temperature": temperature,
309
- },
310
- "memory": {
311
- "sources": memory_sources,
312
- "total_sources": len(memory_sources),
313
- "security_policies_applied": "enterprise" in memory_sources,
314
- },
315
- "memdocs": {
316
- "patterns_used": memdocs_patterns_used or [],
317
- "pattern_count": len(memdocs_patterns_used or []),
318
- },
319
- "security": {
320
- "pii_detected": pii_count,
321
- "secrets_detected": secrets_count,
322
- "sanitization_applied": sanitization_applied,
323
- "classification_verified": classification_verified,
324
- },
325
- "request": {
326
- "size_bytes": request_size_bytes,
327
- "duration_ms": duration_ms,
328
- "ip_address": ip_address,
329
- },
330
- "response": {
331
- "size_bytes": response_size_bytes,
332
- },
333
- "compliance": {
334
- "gdpr_compliant": pii_count == 0 or sanitization_applied,
335
- "hipaa_compliant": secrets_count == 0 and sanitization_applied,
336
- "soc2_compliant": True,
337
- },
338
- **kwargs,
339
- },
340
- )
341
-
342
- self._write_event(event)
343
-
344
- # Check for security violations
345
- if secrets_count > 0:
346
- self._handle_security_violation(
347
- user_id=user_id,
348
- violation_type="secrets_detected",
349
- severity="HIGH",
350
- details={"secrets_count": secrets_count, "event_type": "llm_request"},
351
- )
352
-
353
- def log_pattern_store(
354
- self,
355
- user_id: str,
356
- pattern_id: str,
357
- pattern_type: str,
358
- classification: str,
359
- pii_scrubbed: int = 0,
360
- secrets_detected: int = 0,
361
- retention_days: int = 180,
362
- encrypted: bool = False,
363
- session_id: str = "",
364
- status: str = "success",
365
- error: str = "",
366
- **kwargs,
367
- ):
368
- """Log MemDocs pattern storage.
369
-
370
- Tracks pattern creation for compliance and data governance.
371
-
372
- Args:
373
- user_id: User storing the pattern
374
- pattern_id: Unique identifier for the pattern
375
- pattern_type: Type of pattern (code, architecture, workflow, etc.)
376
- classification: PUBLIC, INTERNAL, or SENSITIVE
377
- pii_scrubbed: Number of PII items scrubbed before storage
378
- secrets_detected: Number of secrets found (should be 0 for storage)
379
- retention_days: Retention period in days
380
- encrypted: Whether pattern is encrypted at rest
381
- session_id: Session identifier
382
- status: success, failed, or blocked
383
- error: Error message if failed
384
- **kwargs: Additional custom fields
385
-
386
- Example:
387
- >>> logger.log_pattern_store(
388
- ... user_id="user@company.com",
389
- ... pattern_id="pattern_abc123",
390
- ... pattern_type="architecture",
391
- ... classification="INTERNAL",
392
- ... pii_scrubbed=2,
393
- ... retention_days=180
394
- ... )
395
-
396
- """
397
- event = AuditEvent(
398
- event_type="store_pattern",
399
- user_id=user_id,
400
- session_id=session_id,
401
- status=status,
402
- error=error,
403
- data={
404
- "pattern": {
405
- "pattern_id": pattern_id,
406
- "pattern_type": pattern_type,
407
- "classification": classification,
408
- "encrypted": encrypted,
409
- "retention_days": retention_days,
410
- },
411
- "security": {
412
- "pii_scrubbed": pii_scrubbed,
413
- "secrets_detected": secrets_detected,
414
- "sanitization_applied": pii_scrubbed > 0,
415
- },
416
- "compliance": {
417
- "gdpr_compliant": secrets_detected == 0,
418
- "hipaa_compliant": (classification == "SENSITIVE" and encrypted)
419
- or classification != "SENSITIVE",
420
- "soc2_compliant": secrets_detected == 0
421
- and classification in ["PUBLIC", "INTERNAL", "SENSITIVE"],
422
- "classification_verified": classification
423
- in ["PUBLIC", "INTERNAL", "SENSITIVE"],
424
- },
425
- **kwargs,
426
- },
427
- )
428
-
429
- self._write_event(event)
430
-
431
- # Check for security violations
432
- if secrets_detected > 0:
433
- self._handle_security_violation(
434
- user_id=user_id,
435
- violation_type="secrets_in_storage",
436
- severity="CRITICAL",
437
- details={
438
- "secrets_detected": secrets_detected,
439
- "pattern_id": pattern_id,
440
- "event_type": "store_pattern",
441
- },
442
- )
443
-
444
- if classification == "SENSITIVE" and not encrypted:
445
- self._handle_security_violation(
446
- user_id=user_id,
447
- violation_type="sensitive_not_encrypted",
448
- severity="HIGH",
449
- details={
450
- "pattern_id": pattern_id,
451
- "classification": classification,
452
- "event_type": "store_pattern",
453
- },
454
- )
455
-
456
- def log_pattern_retrieve(
457
- self,
458
- user_id: str,
459
- pattern_id: str,
460
- classification: str,
461
- access_granted: bool = True,
462
- permission_level: str = "",
463
- session_id: str = "",
464
- status: str = "success",
465
- error: str = "",
466
- **kwargs,
467
- ):
468
- """Log MemDocs pattern retrieval.
469
-
470
- Tracks pattern access for compliance and security monitoring.
471
-
472
- Args:
473
- user_id: User retrieving the pattern
474
- pattern_id: Unique identifier for the pattern
475
- classification: PUBLIC, INTERNAL, or SENSITIVE
476
- access_granted: Whether access was granted
477
- permission_level: Permission level used for access decision
478
- session_id: Session identifier
479
- status: success, failed, or blocked
480
- error: Error message if failed
481
- **kwargs: Additional custom fields
482
-
483
- Example:
484
- >>> logger.log_pattern_retrieve(
485
- ... user_id="user@company.com",
486
- ... pattern_id="pattern_abc123",
487
- ... classification="SENSITIVE",
488
- ... access_granted=True,
489
- ... permission_level="explicit"
490
- ... )
491
-
492
- """
493
- event = AuditEvent(
494
- event_type="retrieve_pattern",
495
- user_id=user_id,
496
- session_id=session_id,
497
- status="success" if access_granted else "blocked",
498
- error=error,
499
- data={
500
- "pattern": {
501
- "pattern_id": pattern_id,
502
- "classification": classification,
503
- },
504
- "access": {
505
- "granted": access_granted,
506
- "permission_level": permission_level,
507
- "audit_required": classification == "SENSITIVE",
508
- },
509
- "compliance": {
510
- "access_logged": True,
511
- "hipaa_compliant": classification == "SENSITIVE",
512
- },
513
- **kwargs,
514
- },
515
- )
516
-
517
- self._write_event(event)
518
-
519
- # Log unauthorized access attempts
520
- if not access_granted:
521
- self._handle_security_violation(
522
- user_id=user_id,
523
- violation_type="unauthorized_access",
524
- severity="MEDIUM" if classification == "INTERNAL" else "HIGH",
525
- details={
526
- "pattern_id": pattern_id,
527
- "classification": classification,
528
- "event_type": "retrieve_pattern",
529
- },
530
- )
531
-
532
- def log_security_violation(
533
- self,
534
- user_id: str,
535
- violation_type: str,
536
- severity: str,
537
- details: dict[str, Any],
538
- session_id: str = "",
539
- blocked: bool = True,
540
- **kwargs,
541
- ):
542
- """Log a security policy violation.
543
-
544
- Tracks security incidents for monitoring and response.
545
-
546
- Args:
547
- user_id: User who triggered the violation
548
- violation_type: Type of violation (secrets_detected, pii_in_storage, etc.)
549
- severity: LOW, MEDIUM, HIGH, or CRITICAL
550
- details: Additional details about the violation
551
- session_id: Session identifier
552
- blocked: Whether the action was blocked
553
- **kwargs: Additional custom fields
554
-
555
- Example:
556
- >>> logger.log_security_violation(
557
- ... user_id="user@company.com",
558
- ... violation_type="secrets_detected",
559
- ... severity="HIGH",
560
- ... details={"secret_type": "api_key", "action": "llm_request"}, # pragma: allowlist secret
561
- ... blocked=True
562
- ... )
563
-
564
- """
565
- violation = SecurityViolation(
566
- violation_type=violation_type,
567
- severity=severity,
568
- details=details,
569
- )
570
-
571
- event = AuditEvent(
572
- event_type="security_violation",
573
- user_id=user_id,
574
- session_id=session_id,
575
- status="blocked" if blocked else "logged",
576
- data={
577
- "violation": {
578
- "type": violation_type,
579
- "severity": severity,
580
- "details": details,
581
- "blocked": blocked,
582
- },
583
- "response": {
584
- "user_notified": violation.user_notified,
585
- "manager_notified": violation.manager_notified,
586
- "security_team_notified": violation.security_team_notified,
587
- },
588
- "compliance": {
589
- "gdpr_compliant": blocked,
590
- "hipaa_compliant": blocked,
591
- "soc2_compliant": blocked,
592
- },
593
- **kwargs,
594
- },
595
- )
596
-
597
- self._write_event(event)
598
-
599
- def _handle_security_violation(
600
- self,
601
- user_id: str,
602
- violation_type: str,
603
- severity: str,
604
- details: dict[str, Any],
605
- ):
606
- """Internal handler for security violations.
607
-
608
- Tracks violation counts and triggers alerts.
609
- """
610
- # Track violations per user
611
- key = f"{user_id}:{violation_type}"
612
- self._violation_counts[key] = self._violation_counts.get(key, 0) + 1
613
-
614
- # Log the violation
615
- self.log_security_violation(
616
- user_id=user_id,
617
- violation_type=violation_type,
618
- severity=severity,
619
- details=details,
620
- )
621
-
622
- # Alert logic
623
- count = self._violation_counts[key]
624
- if severity == "CRITICAL" or count >= 3:
625
- logger.warning(
626
- f"Security violation threshold reached: {user_id} - "
627
- f"{violation_type} (count: {count}, severity: {severity})",
628
- )
629
-
630
- def query(
631
- self,
632
- event_type: str | None = None,
633
- user_id: str | None = None,
634
- status: str | None = None,
635
- start_date: datetime | None = None,
636
- end_date: datetime | None = None,
637
- limit: int = 1000,
638
- **filters,
639
- ) -> list[dict]:
640
- """Query audit logs with filters.
641
-
642
- Provides search and analysis capabilities for audit data.
643
-
644
- Args:
645
- event_type: Filter by event type (llm_request, store_pattern, etc.)
646
- user_id: Filter by user ID
647
- status: Filter by status (success, failed, blocked)
648
- start_date: Filter events after this date
649
- end_date: Filter events before this date
650
- limit: Maximum number of events to return
651
- **filters: Additional key-value filters (supports nested keys with __)
652
-
653
- Returns:
654
- List of matching audit events as dictionaries
655
-
656
- Example:
657
- >>> # Find all failed LLM requests
658
- >>> events = logger.query(event_type="llm_request", status="failed")
659
- >>>
660
- >>> # Find security violations in last 24 hours
661
- >>> from datetime import datetime, timedelta
662
- >>> events = logger.query(
663
- ... event_type="security_violation",
664
- ... start_date=datetime.utcnow() - timedelta(days=1)
665
- ... )
666
- >>>
667
- >>> # Find patterns with high PII counts (nested filter)
668
- >>> events = logger.query(security__pii_detected__gt=5)
669
-
670
- """
671
- results: list[dict[str, object]] = []
672
-
673
- try:
674
- if not self.log_path.exists():
675
- return results
676
-
677
- with open(self.log_path, encoding="utf-8") as f:
678
- for line in f:
679
- if len(results) >= limit:
680
- break
681
-
682
- try:
683
- event = json.loads(line.strip())
684
-
685
- # Apply filters
686
- if event_type and event.get("event_type") != event_type:
687
- continue
688
- if user_id and event.get("user_id") != user_id:
689
- continue
690
- if status and event.get("status") != status:
691
- continue
692
-
693
- # Date range filtering
694
- if start_date or end_date:
695
- event_time = datetime.fromisoformat(
696
- event.get("timestamp", "").rstrip("Z"),
697
- )
698
- if start_date and event_time < start_date:
699
- continue
700
- if end_date and event_time > end_date:
701
- continue
702
-
703
- # Custom filters (supports nested keys with __)
704
- if filters and not self._apply_custom_filters(event, filters):
705
- continue
706
-
707
- results.append(event)
708
-
709
- except json.JSONDecodeError:
710
- logger.warning("Skipping malformed audit log line")
711
- continue
712
-
713
- except Exception as e:
714
- logger.error(f"Failed to query audit logs: {e}")
715
-
716
- return results
717
-
718
- def _apply_custom_filters(self, event: dict, filters: dict) -> bool:
719
- """Apply custom filters to an event.
720
-
721
- Supports nested key access with __ separator and comparison operators.
722
- """
723
- for key, value in filters.items():
724
- # Handle comparison operators (e.g., security__pii_detected__gt=5)
725
- parts = key.split("__")
726
- operator = None
727
-
728
- # Optimization: Use set for O(1) membership testing (vs O(n) with list)
729
- valid_operators = {"gt", "gte", "lt", "lte", "ne"}
730
- if len(parts) > 1 and parts[-1] in valid_operators:
731
- operator = parts[-1]
732
- parts = parts[:-1]
733
-
734
- # Navigate nested dictionary
735
- current = event
736
- for part in parts:
737
- if isinstance(current, dict) and part in current:
738
- current = current[part]
739
- else:
740
- return False
741
-
742
- # Apply comparison
743
- if (
744
- operator == "gt" and not (isinstance(current, int | float) and current > value)
745
- ) or (
746
- operator == "gte" and not (isinstance(current, int | float) and current >= value)
747
- ):
748
- return False
749
- if (
750
- (operator == "lt" and not (isinstance(current, int | float) and current < value))
751
- or (
752
- operator == "lte"
753
- and not (isinstance(current, int | float) and current <= value)
754
- )
755
- or (operator == "ne" and current == value)
756
- or (operator is None and current != value)
757
- ):
758
- return False
759
-
760
- return True
761
-
762
- def get_violation_summary(self, user_id: str | None = None) -> dict[str, Any]:
763
- """Get summary of security violations.
764
-
765
- Args:
766
- user_id: Optional user ID to filter by
767
-
768
- Returns:
769
- Dictionary with violation statistics
770
-
771
- Example:
772
- >>> summary = logger.get_violation_summary(user_id="user@company.com")
773
- >>> print(f"Total violations: {summary['total_violations']}")
774
-
775
- """
776
- violations = self.query(event_type="security_violation", user_id=user_id)
777
-
778
- by_type: dict[str, int] = {}
779
- by_severity: dict[str, int] = {}
780
- by_user: dict[str, int] = {}
781
-
782
- for violation in violations:
783
- vtype = str(violation.get("violation", {}).get("type", "unknown"))
784
- severity = str(violation.get("violation", {}).get("severity", "unknown"))
785
- vid = str(violation.get("user_id", "unknown"))
786
-
787
- by_type[vtype] = by_type.get(vtype, 0) + 1
788
- by_severity[severity] = by_severity.get(severity, 0) + 1
789
- by_user[vid] = by_user.get(vid, 0) + 1
790
-
791
- summary: dict[str, int | dict[str, int]] = {
792
- "total_violations": len(violations),
793
- "by_type": by_type,
794
- "by_severity": by_severity,
795
- "by_user": by_user,
796
- }
797
-
798
- return summary
799
-
800
- def get_compliance_report(
801
- self,
802
- start_date: datetime | None = None,
803
- end_date: datetime | None = None,
804
- ) -> dict[str, Any]:
805
- """Generate compliance report for audit period.
806
-
807
- Provides statistics for compliance audits (SOC2, HIPAA, GDPR).
808
-
809
- Args:
810
- start_date: Start of audit period
811
- end_date: End of audit period
812
-
813
- Returns:
814
- Dictionary with compliance statistics
815
-
816
- Example:
817
- >>> from datetime import datetime, timedelta
818
- >>> report = logger.get_compliance_report(
819
- ... start_date=datetime.utcnow() - timedelta(days=30)
820
- ... )
821
- >>> print(f"Total LLM requests: {report['llm_requests']['total']}")
822
-
823
- """
824
- # Query all events in period
825
- all_events = self.query(start_date=start_date, end_date=end_date, limit=100000)
826
-
827
- report: dict[str, Any] = {
828
- "period": {
829
- "start": start_date.isoformat() if start_date else "all_time",
830
- "end": end_date.isoformat() if end_date else "now",
831
- },
832
- "llm_requests": {
833
- "total": 0,
834
- "with_pii_detected": 0,
835
- "with_secrets_detected": 0,
836
- "sanitization_applied": 0,
837
- },
838
- "pattern_storage": {
839
- "total": 0,
840
- "by_classification": {"PUBLIC": 0, "INTERNAL": 0, "SENSITIVE": 0},
841
- "with_pii_scrubbed": 0,
842
- "encrypted": 0,
843
- },
844
- "pattern_retrieval": {
845
- "total": 0,
846
- "by_classification": {"PUBLIC": 0, "INTERNAL": 0, "SENSITIVE": 0},
847
- "access_denied": 0,
848
- },
849
- "security_violations": {"total": 0, "by_severity": {}, "by_type": {}},
850
- "compliance_metrics": {
851
- "gdpr_compliant_rate": 0.0,
852
- "hipaa_compliant_rate": 0.0,
853
- "soc2_compliant_rate": 0.0,
854
- },
855
- }
856
-
857
- total_compliance_checks = 0
858
- gdpr_compliant = 0
859
- hipaa_compliant = 0
860
- soc2_compliant = 0
861
-
862
- for event in all_events:
863
- event_type = event.get("event_type")
864
-
865
- if event_type == "llm_request":
866
- report["llm_requests"]["total"] += 1
867
- security = event.get("security", {})
868
- if security.get("pii_detected", 0) > 0:
869
- report["llm_requests"]["with_pii_detected"] += 1
870
- if security.get("secrets_detected", 0) > 0:
871
- report["llm_requests"]["with_secrets_detected"] += 1
872
- if security.get("sanitization_applied"):
873
- report["llm_requests"]["sanitization_applied"] += 1
874
-
875
- elif event_type == "store_pattern":
876
- report["pattern_storage"]["total"] += 1
877
- pattern = event.get("pattern", {})
878
- classification = pattern.get("classification", "INTERNAL")
879
- report["pattern_storage"]["by_classification"][classification] = (
880
- report["pattern_storage"]["by_classification"].get(classification, 0) + 1
881
- )
882
- if event.get("security", {}).get("pii_scrubbed", 0) > 0:
883
- report["pattern_storage"]["with_pii_scrubbed"] += 1
884
- if pattern.get("encrypted"):
885
- report["pattern_storage"]["encrypted"] += 1
886
-
887
- elif event_type == "retrieve_pattern":
888
- report["pattern_retrieval"]["total"] += 1
889
- pattern = event.get("pattern", {})
890
- classification = pattern.get("classification", "INTERNAL")
891
- report["pattern_retrieval"]["by_classification"][classification] = (
892
- report["pattern_retrieval"]["by_classification"].get(classification, 0) + 1
893
- )
894
- if not event.get("access", {}).get("granted", True):
895
- report["pattern_retrieval"]["access_denied"] += 1
896
-
897
- elif event_type == "security_violation":
898
- report["security_violations"]["total"] += 1
899
- violation = event.get("violation", {})
900
- vtype = violation.get("type", "unknown")
901
- severity = violation.get("severity", "unknown")
902
- report["security_violations"]["by_type"][vtype] = (
903
- report["security_violations"]["by_type"].get(vtype, 0) + 1
904
- )
905
- report["security_violations"]["by_severity"][severity] = (
906
- report["security_violations"]["by_severity"].get(severity, 0) + 1
907
- )
908
-
909
- # Track compliance rates
910
- compliance = event.get("compliance", {})
911
- if compliance:
912
- total_compliance_checks += 1
913
- if compliance.get("gdpr_compliant"):
914
- gdpr_compliant += 1
915
- if compliance.get("hipaa_compliant"):
916
- hipaa_compliant += 1
917
- if compliance.get("soc2_compliant"):
918
- soc2_compliant += 1
919
-
920
- # Calculate compliance rates
921
- if total_compliance_checks > 0:
922
- report["compliance_metrics"]["gdpr_compliant_rate"] = (
923
- gdpr_compliant / total_compliance_checks
924
- )
925
- report["compliance_metrics"]["hipaa_compliant_rate"] = (
926
- hipaa_compliant / total_compliance_checks
927
- )
928
- report["compliance_metrics"]["soc2_compliant_rate"] = (
929
- soc2_compliant / total_compliance_checks
930
- )
931
-
932
- return report