network-ai
Advanced tools
@@ -361,3 +361,3 @@ "use strict"; | ||
| data: { | ||
| version: '4.0.2', | ||
| version: '4.0.3', | ||
| config: snapshot, | ||
@@ -364,0 +364,0 @@ agents: { |
+1
-1
| { | ||
| "name": "network-ai", | ||
| "version": "4.0.2", | ||
| "version": "4.0.3", | ||
| "description": "AI agent orchestration framework for TypeScript/Node.js - plug-and-play multi-agent coordination with 12 frameworks (LangChain, AutoGen, CrewAI, OpenAI Assistants, LlamaIndex, Semantic Kernel, Haystack, DSPy, Agno, MCP, OpenClaw). Built-in security, swarm intelligence, and agentic workflow patterns.", | ||
@@ -5,0 +5,0 @@ "main": "dist/index.js", |
+1
-1
@@ -7,3 +7,3 @@ # Network-AI: Multi-Agent Orchestration Framework | ||
| [](https://github.com/jovanSAPFIONEER/Network-AI/actions/workflows/codeql.yml) | ||
| [](https://github.com/jovanSAPFIONEER/Network-AI/releases) | ||
| [](https://github.com/jovanSAPFIONEER/Network-AI/releases) | ||
| [](https://www.npmjs.com/package/network-ai) | ||
@@ -10,0 +10,0 @@ [](https://clawhub.ai/skills/network-ai) |
+13
-11
@@ -133,3 +133,3 @@ --- | ||
| - **Parallel Execution**: Run multiple agents simultaneously and synthesize results | ||
| - **Permission Wall**: Gate access to SAP_API, FINANCIAL_API, or DATA_EXPORT operations | ||
| - **Permission Wall**: Gate access to DATABASE, PAYMENTS, EMAIL, or FILE_EXPORT operations (abstract local resource types โ no external credentials required) | ||
| - **Shared Blackboard**: Coordinate agent state via persistent markdown file | ||
@@ -174,3 +174,3 @@ | ||
| --agent "data_analyst" \ | ||
| --resource "SAP_API" \ | ||
| --resource "DATABASE" \ | ||
| --justification "Need Q4 invoice data for quarterly report" \ | ||
@@ -267,7 +267,9 @@ --scope "read:invoices" | ||
| **CRITICAL**: Always check permissions before accessing: | ||
| - `SAP_API` - SAP system connections | ||
| - `FINANCIAL_API` - Financial data services | ||
| - `EXTERNAL_SERVICE` - Third-party APIs | ||
| - `DATA_EXPORT` - Exporting sensitive data | ||
| - `DATABASE` - Internal database / data store access | ||
| - `PAYMENTS` - Financial/payment data services | ||
| - `EMAIL` - Email sending capability | ||
| - `FILE_EXPORT` - Exporting data to local files | ||
| > **Note**: These are abstract local resource type names used by `check_permission.py`. No external API credentials are required or used โ all permission evaluation runs locally. | ||
| ### Permission Evaluation Criteria | ||
@@ -287,3 +289,3 @@ | ||
| --agent "your_agent_id" \ | ||
| --resource "FINANCIAL_API" \ | ||
| --resource "PAYMENTS" \ | ||
| --justification "Generating quarterly financial summary for board presentation" \ | ||
@@ -307,6 +309,6 @@ --scope "read:revenue,read:expenses" | ||
| |----------|---------------------| | ||
| | SAP_API | `read_only`, `max_records:100` | | ||
| | FINANCIAL_API | `read_only`, `no_pii_fields`, `audit_required` | | ||
| | EXTERNAL_SERVICE | `rate_limit:10_per_minute` | | ||
| | DATA_EXPORT | `anonymize_pii`, `local_only` | | ||
| | DATABASE | `read_only`, `max_records:100` | | ||
| | PAYMENTS | `read_only`, `no_pii_fields`, `audit_required` | | ||
| | EMAIL | `rate_limit:10_per_minute` | | ||
| | FILE_EXPORT | `anonymize_pii`, `local_only` | | ||
@@ -313,0 +315,0 @@ ## Shared Blackboard Pattern |
Network access
Supply chain riskThis module accesses the network.
Found 3 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 3 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1248615
0.02%