Features: - 30+ Custom Skills (cognitive, development, UI/UX, autonomous agents) - RalphLoop autonomous agent integration - Multi-AI consultation (Qwen) - Agent management system with sync capabilities - Custom hooks for session management - MCP servers integration - Plugin marketplace setup - Comprehensive installation script Components: - Skills: always-use-superpowers, ralph, brainstorming, ui-ux-pro-max, etc. - Agents: 100+ agents across engineering, marketing, product, etc. - Hooks: session-start-superpowers, qwen-consult, ralph-auto-trigger - Commands: /brainstorm, /write-plan, /execute-plan - MCP Servers: zai-mcp-server, web-search-prime, web-reader, zread - Binaries: ralphloop wrapper Installation: ./supercharge.sh
85 lines
2.1 KiB
TypeScript
85 lines
2.1 KiB
TypeScript
import { analyzeCommand, loadConfig } from '../core/analyze.ts';
|
|
import { redactSecrets, writeAuditLog } from '../core/audit.ts';
|
|
import { envTruthy } from '../core/env.ts';
|
|
import { formatBlockedMessage } from '../core/format.ts';
|
|
import type { GeminiHookInput, GeminiHookOutput } from '../types.ts';
|
|
|
|
function outputGeminiDeny(reason: string, command?: string, segment?: string): void {
|
|
const message = formatBlockedMessage({
|
|
reason,
|
|
command,
|
|
segment,
|
|
redact: redactSecrets,
|
|
});
|
|
|
|
// Gemini CLI expects exit code 0 with JSON for policy blocks; exit 2 is for hook errors.
|
|
const output: GeminiHookOutput = {
|
|
decision: 'deny',
|
|
reason: message,
|
|
systemMessage: message,
|
|
};
|
|
|
|
console.log(JSON.stringify(output));
|
|
}
|
|
|
|
export async function runGeminiCLIHook(): Promise<void> {
|
|
const chunks: Buffer[] = [];
|
|
|
|
for await (const chunk of process.stdin) {
|
|
chunks.push(chunk as Buffer);
|
|
}
|
|
|
|
const inputText = Buffer.concat(chunks).toString('utf-8').trim();
|
|
|
|
if (!inputText) {
|
|
return;
|
|
}
|
|
|
|
let input: GeminiHookInput;
|
|
try {
|
|
input = JSON.parse(inputText) as GeminiHookInput;
|
|
} catch {
|
|
if (envTruthy('SAFETY_NET_STRICT')) {
|
|
outputGeminiDeny('Failed to parse hook input JSON (strict mode)');
|
|
}
|
|
return;
|
|
}
|
|
|
|
if (input.hook_event_name !== 'BeforeTool') {
|
|
return;
|
|
}
|
|
|
|
if (input.tool_name !== 'run_shell_command') {
|
|
return;
|
|
}
|
|
|
|
const command = input.tool_input?.command;
|
|
if (!command) {
|
|
return;
|
|
}
|
|
|
|
const cwd = input.cwd ?? process.cwd();
|
|
const strict = envTruthy('SAFETY_NET_STRICT');
|
|
const paranoidAll = envTruthy('SAFETY_NET_PARANOID');
|
|
const paranoidRm = paranoidAll || envTruthy('SAFETY_NET_PARANOID_RM');
|
|
const paranoidInterpreters = paranoidAll || envTruthy('SAFETY_NET_PARANOID_INTERPRETERS');
|
|
|
|
const config = loadConfig(cwd);
|
|
|
|
const result = analyzeCommand(command, {
|
|
cwd,
|
|
config,
|
|
strict,
|
|
paranoidRm,
|
|
paranoidInterpreters,
|
|
});
|
|
|
|
if (result) {
|
|
const sessionId = input.session_id;
|
|
if (sessionId) {
|
|
writeAuditLog(sessionId, command, result.segment, result.reason, cwd);
|
|
}
|
|
outputGeminiDeny(result.reason, command, result.segment);
|
|
}
|
|
}
|