ai-sandbox 0.2.1

Cross-platform AI tool sandbox security implementation
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
//! Comprehensive functional tests for sandbox security features
//!
//! Tests cover:
//! 1. Workspace directory read/write operations
//! 2. Directory bypass attempt blocking
//! 3. Dangerous command blacklist (git, file operations)
//! 4. Configurable whitelist/blacklist/greylist system

use ai_sandbox::{Decision, Policy};

fn main() {
    println!("=== AI Sandbox Functional Tests ===\n");

    // Test 1: Workspace directory operations
    test_workspace_read_write();

    // Test 2: Directory bypass attempts
    test_directory_bypass_blocking();

    // Test 3: Dangerous command blacklist
    test_dangerous_command_blacklist();

    // Test 4: Whitelist/Blacklist/Greylist system
    test_command_rule_system();

    // Test 5: Default dangerous command blacklist
    test_default_dangerous_commands();

    println!("\n=== All Functional Tests Passed! ===");
}

/// Test 1: Workspace directory read/write operations
fn test_workspace_read_write() {
    println!("Test 1: Workspace Directory Read/Write Operations");

    // Create a policy with default (allow) mode
    let mut policy = Policy::new();
    policy
        .add_prefix_rule(&["ls".to_string()], Decision::Allow, None)
        .unwrap();
    policy
        .add_prefix_rule(&["cat".to_string()], Decision::Allow, None)
        .unwrap();
    policy
        .add_prefix_rule(&["touch".to_string()], Decision::Allow, None)
        .unwrap();
    policy
        .add_prefix_rule(&["echo".to_string()], Decision::Allow, None)
        .unwrap();
    policy
        .add_prefix_rule(&["mkdir".to_string()], Decision::Allow, None)
        .unwrap();

    // Test: Normal file operations in workspace should be allowed
    let tests = vec![
        vec!["ls".to_string(), "-la".to_string()],
        vec!["cat".to_string(), "file.txt".to_string()],
        vec!["touch".to_string(), "newfile.txt".to_string()],
        vec!["echo".to_string(), "hello".to_string()],
        vec!["mkdir".to_string(), "newdir".to_string()],
    ];

    for cmd in &tests {
        let result = policy.check_with_cwd(cmd, Some("/tmp"));
        match result {
            Some(m) => {
                if m.decision == Decision::Allow {
                    println!("{:?} -> Allowed (workspace operation)", cmd);
                } else {
                    panic!("  ✗ {:?} should be allowed in workspace!", cmd);
                }
            }
            None => {
                // No matching rule, depends on default decision
                println!("{:?} -> Allowed (default)", cmd);
            }
        }
    }

    println!("  PASSED: Workspace operations allowed\n");
}

/// Test 2: Block directory bypass attempts
fn test_directory_bypass_blocking() {
    println!("Test 2: Directory Bypass Attempt Blocking");

    let policy = Policy::new();

    // Test: Bypass attempts using absolute paths
    let bypass_tests = vec![
        // Absolute path to sensitive location
        (
            vec!["cat".to_string(), "/etc/passwd".to_string()],
            Some("/tmp"),
            true,
        ),
        (
            vec!["ls".to_string(), "/var/log".to_string()],
            Some("/tmp"),
            true,
        ),
        (
            vec!["cat".to_string(), "/root/.ssh/id_rsa".to_string()],
            Some("/tmp"),
            true,
        ),
        // Relative path bypass using ..
        (
            vec!["ls".to_string(), "../..".to_string()],
            Some("/tmp"),
            true,
        ),
        (
            vec!["cat".to_string(), "../../etc/passwd".to_string()],
            Some("/tmp"),
            true,
        ),
        // Normal operations should be allowed
        (
            vec!["ls".to_string(), "file.txt".to_string()],
            Some("/tmp"),
            false,
        ),
        (
            vec!["cat".to_string(), "data.json".to_string()],
            Some("/tmp"),
            false,
        ),
        (
            vec!["touch".to_string(), "test.txt".to_string()],
            Some("/tmp"),
            false,
        ),
    ];

    for (cmd, cwd, should_block) in &bypass_tests {
        let result = policy.check_with_cwd(cmd, *cwd);
        let is_blocked = result
            .as_ref()
            .map(|m| {
                m.decision == Decision::Deny
                    && m.justification
                        .as_ref()
                        .map(|j| j.contains("bypass"))
                        .unwrap_or(false)
            })
            .unwrap_or(false);

        if *should_block {
            if is_blocked {
                println!(
                    "{:?} with cwd {:?} -> Blocked (bypass detected)",
                    cmd, cwd
                );
            } else {
                panic!(
                    "  ✗ {:?} with cwd {:?} should be blocked as bypass attempt!",
                    cmd, cwd
                );
            }
        } else {
            if !is_blocked {
                println!(
                    "{:?} with cwd {:?} -> Allowed (normal operation)",
                    cmd, cwd
                );
            } else {
                panic!(
                    "  ✗ {:?} with cwd {:?} should be allowed as normal operation!",
                    cmd, cwd
                );
            }
        }
    }

    println!("  PASSED: Directory bypass attempts blocked\n");
}

/// Test 3: Dangerous command blacklist (git, file operations)
fn test_dangerous_command_blacklist() {
    println!("Test 3: Dangerous Command Blacklist");

    // Create blacklist policy
    let mut policy = Policy::new_blacklist();

    // File destruction commands
    let dangerous_files = vec!["rm", "rmdir", "shred", "dd", "mkfs", "format"];
    for cmd in &dangerous_files {
        policy
            .add_prefix_rule(
                &[cmd.to_string()],
                Decision::Deny,
                Some(format!("Dangerous: {}", cmd)),
            )
            .unwrap();
    }

    // Git commands (require confirmation)
    policy
        .add_prefix_rule(
            &["git".to_string()],
            Decision::Prompt,
            Some("Git needs confirmation".to_string()),
        )
        .unwrap();

    // Test file destruction commands
    let file_tests = vec![
        vec!["rm".to_string(), "-rf".to_string(), "/".to_string()],
        vec!["rmdir".to_string(), "somedir".to_string()],
        vec!["shred".to_string(), "-u".to_string(), "file".to_string()],
        vec![
            "dd".to_string(),
            "if=/dev/zero".to_string(),
            "of=/dev/sda".to_string(),
        ],
        vec!["mkfs".to_string(), "-t".to_string(), "ext4".to_string()],
    ];

    for cmd in &file_tests {
        let result = policy.check(cmd);
        match result {
            Some(m) => {
                if m.decision == Decision::Deny {
                    println!("{:?} -> Denied (dangerous file operation)", cmd);
                } else {
                    panic!("  ✗ {:?} should be denied!", cmd);
                }
            }
            None => panic!("  ✗ {:?} should have matching rule!", cmd),
        }
    }

    // Test git commands
    let git_tests = vec![
        vec!["git".to_string(), "status".to_string()],
        vec!["git".to_string(), "restore".to_string()],
        vec!["git".to_string(), "rm".to_string()],
        vec!["git".to_string(), "reset".to_string(), "--hard".to_string()],
        vec!["git".to_string(), "clean".to_string(), "-fd".to_string()],
    ];

    for cmd in &git_tests {
        let result = policy.check(cmd);
        match result {
            Some(m) => {
                if m.decision == Decision::Prompt {
                    println!("{:?} -> Prompt (git command)", cmd);
                } else {
                    panic!("  ✗ {:?} should require prompt for git!", cmd);
                }
            }
            None => panic!("  ✗ {:?} should have matching rule!", cmd),
        }
    }

    println!("  PASSED: Dangerous commands properly handled\n");
}

/// Test 4: Whitelist/Blacklist/Greylist system
fn test_command_rule_system() {
    println!("Test 4: Whitelist/Blacklist/Greylist System");

    // Test whitelist mode
    let mut whitelist_policy = Policy::new_whitelist();
    whitelist_policy
        .add_prefix_rule(&["ls".to_string()], Decision::Allow, None)
        .unwrap();
    whitelist_policy
        .add_prefix_rule(&["cat".to_string()], Decision::Allow, None)
        .unwrap();

    // In whitelist mode, only allowed commands work
    let whitelist_tests = vec![
        (vec!["ls".to_string()], Decision::Allow),
        (vec!["cat".to_string(), "file".to_string()], Decision::Allow),
        (vec!["rm".to_string()], Decision::Deny), // Not in whitelist
        (vec!["curl".to_string()], Decision::Deny), // Not in whitelist
    ];

    println!("  Whitelist Mode:");
    for (cmd, expected) in &whitelist_tests {
        let result = whitelist_policy.check(cmd);
        let decision = result
            .as_ref()
            .map(|m| m.decision)
            .unwrap_or(Decision::Allow);
        if decision == *expected {
            println!("{:?} -> {:?}", cmd, decision);
        } else {
            panic!(
                "    ✗ {:?} expected {:?} but got {:?}",
                cmd, expected, decision
            );
        }
    }

    // Test greylist (prompt) mode
    let mut greylist_policy = Policy::new();
    greylist_policy
        .add_prefix_rule(
            &["git".to_string()],
            Decision::Prompt,
            Some("Git needs confirmation".to_string()),
        )
        .unwrap();

    let greylist_tests = vec![vec!["git".to_string(), "status".to_string()]];

    for cmd in &greylist_tests {
        let result = greylist_policy.check(cmd);
        match result {
            Some(m) => {
                if m.decision == Decision::Prompt {
                    println!("{:?} -> Prompt (greylist)", cmd);
                }
            }
            None => panic!("    ✗ {:?} should prompt!", cmd),
        }
    }

    println!("  PASSED: Whitelist/Blacklist/Greylist system works\n");
}

/// Test 5: Default dangerous command blacklist
fn test_default_dangerous_commands() {
    println!("Test 5: Default Dangerous Command Blacklist");

    // Create policy with defaults
    let policy = Policy::new_with_defaults();

    // Test various dangerous command categories
    let tests = vec![
        // File destruction
        (vec!["rm".to_string(), "-rf".to_string()], Decision::Deny),
        (
            vec![
                "dd".to_string(),
                "if=/dev/zero".to_string(),
                "of=/dev/sda".to_string(),
            ],
            Decision::Deny,
        ),
        // System modification (should be denied)
        (
            vec![
                "chmod".to_string(),
                "777".to_string(),
                "/some/path".to_string(),
            ],
            Decision::Deny,
        ),
        (
            vec![
                "chown".to_string(),
                "root".to_string(),
                "/some/path".to_string(),
            ],
            Decision::Deny,
        ),
        // Network (should be denied)
        (
            vec!["curl".to_string(), "http://evil.com".to_string()],
            Decision::Deny,
        ),
        (
            vec!["wget".to_string(), "http://evil.com".to_string()],
            Decision::Deny,
        ),
        // Indirect command execution (should deny - security fix)
        (
            vec![
                "python".to_string(),
                "-c".to_string(),
                "import os".to_string(),
            ],
            Decision::Deny,
        ),
        (vec!["vim".to_string()], Decision::Prompt),
        // Git (should prompt)
        (
            vec!["git".to_string(), "restore".to_string()],
            Decision::Prompt,
        ),
        (vec!["git".to_string(), "rm".to_string()], Decision::Prompt),
        // Safe commands (should be allowed by default)
        (vec!["ls".to_string()], Decision::Allow),
        (vec!["pwd".to_string()], Decision::Allow),
    ];

    let mut passed = 0;
    let mut failed = 0;

    for (cmd, expected) in &tests {
        let result = policy.check(cmd);
        let decision = result
            .as_ref()
            .map(|m| m.decision)
            .unwrap_or(Decision::Allow);

        if decision == *expected {
            println!("{:?} -> {:?}", cmd, decision);
            passed += 1;
        } else {
            println!(
                "{:?} expected {:?} but got {:?}",
                cmd, expected, decision
            );
            failed += 1;
        }
    }

    if failed > 0 {
        panic!(
            "  FAILED: {} tests failed out of {}",
            failed,
            passed + failed
        );
    }

    println!("  PASSED: {} tests passed\n", passed);
}