
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
@llm-dev-ops/contracts
Advanced tools
Authoritative, enforceable contract layer for the Agentics platform
The Authoritative Contract Layer for the Agentics Platform
Enforceable · Versioned · Strongly Typed · Zero Bypass
Getting Started · Domains · Lifecycle Specs · Enforcement · Licensing
This package requires a valid license for use in production environments.
| Use Case | License Required | Contact |
|---|---|---|
| 🔍 Evaluation & Development | ✅ Free | — |
| 🏢 Commercial / Production | 💼 Commercial License | sales@globalbusinessadvisors.co |
| 🎓 Academic / Research | 📄 Academic License | sales@globalbusinessadvisors.co |
| 🤝 Open Source Integration | 📄 OSS License | sales@globalbusinessadvisors.co |
By installing or using this package, you agree to the License Terms. Unauthorized use in production without a valid license is prohibited.
This repository is the single source of truth for all request/response contracts in the Agentics platform. Every service, CLI tool, and agent MUST validate against these contracts.
| Principle | Guarantee |
|---|---|
| 🔒 Authoritative | Contracts define what is valid — no other source |
| ⚖️ Enforceable | Validation is mandatory, not optional |
| 🏷️ Versioned | Breaking changes require new major versions |
| 🚫 No Bypass | Requests failing validation MUST be rejected |
| # | Section | Description |
|---|---|---|
| 1 | 🚀 Getting Started | Installation and basic usage |
| 2 | 🏗️ Platform Architecture | Layer overview and service map |
| 3 | 📦 Contract Domains | All schema domains and their purpose |
| 4 | 🔄 Lifecycle Specs | Canonical lifecycle state machines |
| 5 | 🏷️ Versioning Rules | Semver policy and breaking change rules |
| 6 | 🖥️ CLI Consumption | CLI integration patterns |
| 7 | ⚙️ Service Consumption | Service-side validation patterns |
| 8 | 🔗 Execution Graph Proof | Cryptographic layer-traversal proof |
| 9 | 🛡️ Enforcement Model | Failure modes and enforcement points |
| 10 | 📐 Schema Design Rules | What belongs (and doesn't) in this repo |
| 11 | 🤝 Contributing | How to add or modify contracts |
| 12 | 📄 Licensing | Full license terms |
npm install @llm-dev-ops/contracts
const contracts = require('@llm-dev-ops/contracts');
const Ajv = require('ajv');
const addFormats = require('ajv-formats');
const ajv = new Ajv({ allErrors: true });
addFormats(ajv);
// 📌 Load any schema by domain / version / name
const schemaPath = contracts.getSchema('simulation', 'v1', 'request');
const validate = ajv.compile(require(schemaPath));
// ✅ Validate before sending
const valid = validate(payload);
if (!valid) throw new Error(JSON.stringify(validate.errors));
import contracts = require('@llm-dev-ops/contracts');
const path: string | undefined = contracts.getSchema('lifecycle', 'v1', 'simulationLifecycle');
const domains: string[] = contracts.getDomains();
// Import schemas directly via package exports
const schema = require('@llm-dev-ops/contracts/lifecycle/v1/simulation-lifecycle');
const policy = require('@llm-dev-ops/contracts/governance/v1/policy');
The Agentics platform is organized into distinct layers. Every layer MUST validate against contracts defined in this repository.
┌──────────────────────────────────────────────────────────────────┐
│ 🔺 APEX LAYER │
│ Dev Platform · CLI · Console · API Gateway · Agent Runtime │
├──────────────────────────────────────────────────────────────────┤
│ 🧩 LAYER 3 — CORE BUNDLES │
│ Intelligence · Security · Automation · Governance · Data · ... │
├──────────────────────────────────────────────────────────────────┤
│ 🧠 LAYER 2 — INTELLIGENCE SERVICES │
│ CoPilot · Simulator · Benchmark · Gateway · Vault · Research │
├──────────────────────────────────────────────────────────────────┤
│ 🔧 LAYER 1 — FOUNDATIONAL SERVICES │
│ Test-Bench · Observatory · Shield · Sentinel · Memory-Graph │
│ Latency-Lens · Forge · Edge-Agent · Optimizer · Incident · ... │
├──────────────────────────────────────────────────────────────────┤
│ 📜 @llm-dev-ops/contracts — THIS REPOSITORY (SOURCE OF TRUTH) │
└──────────────────────────────────────────────────────────────────┘
| Service | Purpose |
|---|---|
| LLM-Test-Bench | Automated testing framework for LLM behaviors |
| LLM-Observatory | Real-time monitoring and observability |
| LLM-Shield | Prompt injection & jailbreak prevention |
| LLM-Sentinel | Continuous security monitoring & threat detection |
| LLM-Memory-Graph | Persistent memory and context management |
| LLM-Latency-Lens | Performance profiling and latency analysis |
| LLM-Forge | Model fine-tuning and customization pipeline |
| LLM-Edge-Agent | Edge deployment and local inference |
| LLM-Auto-Optimizer | Automatic prompt and config optimization |
| LLM-Incident-Manager | Incident detection, escalation, and resolution |
| LLM-Orchestrator | Multi-agent coordination and workflow management |
| LLM-CostOps | Cost tracking, budgeting, and optimization |
| LLM-Governance-Dashboard | Visual governance and compliance monitoring |
| LLM-Policy-Engine | Policy evaluation and enforcement runtime |
| LLM-Registry | Service discovery and model registry |
| LLM-Marketplace | Model and plugin marketplace |
| LLM-Analytics-Hub | Analytics aggregation and reporting |
| LLM-Config-Manager | Configuration management and distribution |
| LLM-Schema-Registry | Schema versioning and compatibility checking |
| LLM-Connector-Hub | Integration connectors for external systems |
| Service | Purpose |
|---|---|
| LLM-CoPilot-Agent | Interactive AI assistant with multi-modal capabilities |
| LLM-Simulator | Simulation engine for what-if scenarios |
| LLM-Benchmark-Exchange | Benchmark sharing and comparison platform |
| LLM-Inference-Gateway | Unified inference API with routing & load balancing |
| LLM-Data-Vault | Secure data storage with encryption & access control |
| LLM-Research-Lab | Experimental features and research integrations |
| Bundle | Services | Purpose |
|---|---|---|
| Intelligence-Core | CoPilot, Simulator, Auto-Optimizer | Primary intelligence |
| Security-Core | Shield, Sentinel, Data-Vault | Security & protection |
| Automation-Core | Orchestrator, Config-Manager, Forge | Automation |
| Governance-Core | Policy-Engine, Governance-Dashboard | Compliance |
| Data-Core | Memory-Graph, Analytics-Hub, Data-Vault | Data management |
| Ecosystem-Core | Registry, Marketplace, Connector-Hub | Integrations |
| Research-Core | Research-Lab, Benchmark-Exchange | Research |
| Interface-Core | Gateway, Edge-Agent, CoPilot | User-facing |
| Component | Purpose |
|---|---|
| Agentics Dev Platform | Unified development environment & SDK |
| Agentics CLI | Command-line interface for all platform operations |
| Agentics Console | Web-based management console |
| Agentics API Gateway | Unified API surface for external consumers |
| Agentics Agent Runtime | Production runtime for deployed agents |
| Domain | Directory | Schemas | Purpose |
|---|---|---|---|
| 🔗 Execution | execution/v1/ | 3 | Execution graphs, metadata, telemetry |
| 🧪 Simulation | simulation/v1/ | 3 | Simulation requests, responses, errors |
| 🎯 Intent | intent/v1/ | 1 | User intent parsing and routing |
| 📤 Exporters | exporters/v1/ | 1 | Data export request formats |
| ✅ Diligence | diligence/v1/ | 1 | Compliance and due diligence checks |
| 💰 ROI | roi/v1/ | 1 | ROI calculation and reporting |
| ⚖️ Governance | governance/v1/ | 2 | Policy definitions and enforcement |
| 🔄 Lifecycle | lifecycle/v1/ | 5 | Canonical lifecycle state machines |
execution/v1/execution-graph.schema.jsonCryptographic proof that a request traversed all required layers.
{
"executionId": "uuid",
"timestamp": "ISO-8601",
"layers": [
{
"layerId": "layer-1",
"service": "LLM-Shield",
"entryTime": "ISO-8601",
"exitTime": "ISO-8601",
"status": "completed",
"hash": "sha256-of-input-output"
}
],
"rootHash": "merkle-root-of-all-layer-hashes"
}
execution/v1/execution-metadata.schema.jsonExecution context and environment metadata.
execution/v1/telemetry-envelope.schema.jsonStandard envelope for all telemetry data emitted during execution.
simulation/v1/request.schema.json{
"simulationId": "uuid",
"scenario": { "name": "string", "parameters": {}, "constraints": [] },
"executionMetadata": {}
}
simulation/v1/response.schema.jsonSimulation results including outcomes, metrics, and recommendations.
simulation/v1/errors.schema.jsonStandardized error format for simulation failures.
Each domain provides a request.schema.json governing the input contract for its respective service. See individual schema files for full property definitions.
governance/v1/policy.schema.jsonPolicy definitions with rules, conditions, enforcement modes.
governance/v1/definitions.schema.jsonShared type definitions: UUIDs, semver, timestamps, layer enums, principals, resources.
New in v1.1.0 — Canonical lifecycle state machines consumed by all downstream repos.
Every lifecycle spec defines 10 ordered stages, each tracked by a uniform stage_record:
{
"status": "pending | in_progress | completed | failed | skipped",
"entered_at": "ISO-8601",
"completed_at": "ISO-8601",
"initiated_by": "principal-or-service",
"error": { "code": "...", "message": "...", "recoverable": true },
"artifacts": [{ "artifact_type": "...", "artifact_id": "uuid", "uri": "..." }]
}
📄 lifecycle/v1/simulation-lifecycle.schema.json
| # | Stage | Description |
|---|---|---|
| 1 | simulation_requested | Simulation run formally requested |
| 2 | plan_created | Simulation plan generated from request |
| 3 | plan_evaluated | Plan evaluated for feasibility and risk |
| 4 | plan_approved | Required approvals obtained |
| 5 | execution_started | Simulation execution begins |
| 6 | execution_completed | Execution finishes (success or failure) |
| 7 | telemetry_recorded | Telemetry data persisted |
| 8 | cost_recorded | Resource and financial costs captured |
| 9 | governance_recorded | Compliance artifacts recorded |
| 10 | results_indexed | Results indexed for querying and analysis |
📄 lifecycle/v1/deployment-lifecycle.schema.json
| # | Stage | Description |
|---|---|---|
| 1 | intent_received | Deployment intent received and validated |
| 2 | pre_checks_passed | Health, capacity, and policy checks passed |
| 3 | artifacts_resolved | Images, configs, and secrets resolved |
| 4 | approval_granted | Human or automated approvals obtained |
| 5 | rollout_started | Deployment rollout begins |
| 6 | rollout_completed | Rollout finished across all targets |
| 7 | verification_passed | Smoke tests and health checks passed |
| 8 | traffic_shifted | Traffic shifted to new deployment |
| 9 | telemetry_recorded | Deployment telemetry persisted |
| 10 | governance_recorded | Compliance records filed |
Includes a
rollbackblock for tracking rollback triggers, timestamps, and target versions.
📄 lifecycle/v1/policy-lifecycle.schema.json
| # | Stage | Description |
|---|---|---|
| 1 | policy_drafted | Policy authored in draft form |
| 2 | policy_reviewed | Peer or compliance review completed |
| 3 | policy_approved | Required approvals for activation |
| 4 | policy_published | Published to governance registry |
| 5 | enforcement_started | Enforcement activated across services |
| 6 | compliance_verified | Initial compliance verification |
| 7 | audit_recorded | Audit trail persisted |
| 8 | review_scheduled | Periodic review cycle scheduled |
| 9 | policy_expired | Reached expiration or superseded |
| 10 | policy_archived | Archived for historical reference |
Metadata includes
enforcement_level,compliance_frameworks(SOC2, HIPAA, GDPR, etc.), andtarget_layers.
📄 lifecycle/v1/roi-lifecycle.schema.json
| # | Stage | Description |
|---|---|---|
| 1 | analysis_requested | ROI analysis formally requested |
| 2 | baseline_captured | Current-state baselines captured |
| 3 | cost_data_collected | Compute, license, labor costs gathered |
| 4 | benefit_data_collected | Throughput, savings, quality metrics gathered |
| 5 | projection_calculated | ROI projections and payback period calculated |
| 6 | projection_validated | Projections validated against actuals/benchmarks |
| 7 | report_generated | ROI report generated |
| 8 | stakeholder_reviewed | Stakeholders reviewed and acknowledged |
| 9 | governance_recorded | Governance artifacts filed |
| 10 | results_indexed | Results indexed for trend analysis |
Metadata includes
time_horizon_months,currency(ISO 4217), andanalysis_type.
📄 lifecycle/v1/erp-lifecycle.schema.json
| # | Stage | Description |
|---|---|---|
| 1 | sync_requested | ERP sync operation requested |
| 2 | connection_established | Connection to external ERP established |
| 3 | schema_validated | Source/target schemas validated for compatibility |
| 4 | data_extracted | Data extracted from source system |
| 5 | data_transformed | Data transformed to match target schema |
| 6 | data_loaded | Transformed data loaded into target |
| 7 | reconciliation_completed | Source and target data reconciled |
| 8 | telemetry_recorded | Sync telemetry (rows, latency, errors) persisted |
| 9 | governance_recorded | Data lineage and compliance records filed |
| 10 | sync_finalized | Operation finalized, connections released |
Supports: SAP S/4HANA, Oracle Fusion, Microsoft Dynamics 365, NetSuite, Workday, Sage Intacct, Custom. Metadata includes
erp_system,sync_direction(inbound/outbound/bidirectional), andrecord_count.
All contracts follow Semantic Versioning 2.0.0:
| Change Type | Version Bump | Example |
|---|---|---|
| 🔴 Breaking (remove field, change type) | MAJOR | v1 → v2 |
| 🟢 Additive (new optional field, new schema) | MINOR | v1.0 → v1.1 |
| 🔵 Fix (description, constraint widening) | PATCH | v1.0.0 → v1.0.1 |
A change is BREAKING if it:
A change is NON-BREAKING if it:
Schema files MUST NOT be modified after publication without a version increment. Every change requires:
The Agentics CLI validates all requests against contracts before making network calls.
┌──────────────┐ ┌──────────────┐ ┌──────────────┐
│ 📝 User │ ──→ │ 📜 Load │ ──→ │ ✅ Validate │
│ Command │ │ Contract │ │ Request │
└──────────────┘ └──────────────┘ └──────┬───────┘
│
┌──────────────┐ │ only if valid
│ 🌐 Network │ ←───────────┘
│ Call │
└──────────────┘
const contracts = require('@llm-dev-ops/contracts');
const Ajv = require('ajv');
const ajv = new Ajv();
const schemaPath = contracts.getSchema('simulation', 'v1', 'request');
const validate = ajv.compile(require(schemaPath));
function sendSimulationRequest(request) {
if (!validate(request)) {
console.error('❌ Contract validation failed:', validate.errors);
process.exit(1); // HARD FAILURE — no bypass
}
return fetch('/api/simulation', { method: 'POST', body: JSON.stringify(request) });
}
# Validate a request payload against a contract
agentics validate --schema simulation/v1/request --file request.json
# List all available contracts
agentics contracts list
# Show contract schema
agentics contracts show lifecycle/v1/simulation-lifecycle
Every service MUST validate incoming requests and outgoing responses.
const contracts = require('@llm-dev-ops/contracts');
const Ajv = require('ajv');
const addFormats = require('ajv-formats');
const ajv = new Ajv({ allErrors: true });
addFormats(ajv);
function contractMiddleware(domain, version, schemaName) {
const schemaPath = contracts.getSchema(domain, version, schemaName);
const validate = ajv.compile(require(schemaPath));
return (req, res, next) => {
if (!validate(req.body)) {
return res.status(400).json({
error: 'CONTRACT_VALIDATION_FAILED',
contract: `${domain}/${version}/${schemaName}`,
violations: validate.errors
});
}
next();
};
}
app.post('/api/simulation',
contractMiddleware('simulation', 'v1', 'request'),
async (req, res) => { /* ✅ Request is guaranteed valid */ }
);
import json
from pathlib import Path
from jsonschema import validate, ValidationError
from fastapi import Request, HTTPException
class ContractValidator:
def __init__(self, contracts_path: str):
self.base = Path(contracts_path)
self._cache = {}
def get_schema(self, domain: str, version: str, name: str) -> dict:
key = f"{domain}/{version}/{name}"
if key not in self._cache:
path = self.base / domain / version / f"{name}.schema.json"
self._cache[key] = json.loads(path.read_text())
return self._cache[key]
def validate(self, domain: str, version: str, name: str, data: dict):
validate(instance=data, schema=self.get_schema(domain, version, name))
The execution graph is the cryptographic proof that a request traversed all required layers.
| Guarantee | How |
|---|---|
| 🔒 All required layers participated | Layer entries are mandatory |
| 📊 Correct execution order | Entry/exit timestamps enforce sequence |
| 🔐 Data integrity | SHA-256 hash chain between layers |
| ⏱️ Timing accountability | Per-layer execution time recorded |
{
"executionId": "550e8400-e29b-41d4-a716-446655440000",
"timestamp": "2024-01-15T10:30:00.000Z",
"layers": [
{
"layerId": "layer-1-shield",
"service": "LLM-Shield",
"version": "2.3.1",
"entryTime": "2024-01-15T10:30:00.100Z",
"exitTime": "2024-01-15T10:30:00.150Z",
"status": "completed",
"inputHash": "sha256:abc123...",
"outputHash": "sha256:def456..."
}
],
"rootHash": "sha256:merkle-root",
"valid": true
}
Every API response MUST include an execution graph proving layer participation.
Every layer defined in the architecture MUST participate. There is no concept of "degraded mode."
| Scenario | HTTP | Recovery |
|---|---|---|
| Request fails validation | 400 | Fix request format |
| Required layer unreachable | 503 | Retry with backoff |
| Layer rejects (policy violation) | 403 | Address policy issue |
| Layer times out | 504 | Retry or escalate |
| Response fails validation | 500 | Service bug — escalate |
| Execution graph missing layers | 502 | Infrastructure issue |
IT IS STRICTLY FORBIDDEN TO BYPASS CONTRACT VALIDATION.
| Attempted Justification | Response |
|---|---|
| "It's just for testing" | Use test contracts or mock data |
| "The schema is too strict" | Fix the schema or fix your data |
| "Performance is critical" | Validation is measured in microseconds |
| "It's an emergency" | Emergencies don't justify invalid data |
| "My team doesn't have time" | Invalid data costs more time to debug |
Detected bypass attempts trigger: immediate rejection → incident creation → audit logging → escalation.
$ref dependenciesdescription for all fields{domain}/v1/{name}.schema.json$id, $schema, title, and descriptionindex.js to register the schemaindex.d.ts with type declarationsnpm run validate to verify{
"$schema": "http://json-schema.org/draft-07/schema#",
"$id": "https://agentics.org/schemas/{domain}/v1/{name}.schema.json",
"title": "{Schema Title}",
"description": "Detailed description of what this schema validates",
"type": "object",
"properties": {
"example_field": {
"type": "string",
"description": "Description of this field"
}
},
"required": ["example_field"],
"additionalProperties": false
}
Copyright © 2025 Global Business Advisors. All rights reserved.
This software and associated documentation files (the "Software") are the proprietary property of Global Business Advisors.
$id URIs or authorship metadataContact sales@globalbusinessadvisors.co to obtain a commercial, academic, or open-source integration license.
Use of this package constitutes acceptance of these terms.
📜 These contracts are LAW. No bypass. No exceptions. No excuses.
FAQs
Authoritative, enforceable contract layer for the Agentics platform
We found that @llm-dev-ops/contracts demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.