1use std::collections::HashMap;
5
6use serde::{Deserialize, Serialize};
7use zeph_common::SkillTrustLevel;
8
9use crate::tools::{AutonomyLevel, PreExecutionVerifierConfig};
10
11use crate::defaults::default_true;
12use crate::vigil::VigilConfig;
13
14#[derive(Debug, Clone, Deserialize, Serialize)]
18pub struct ScannerConfig {
19 #[serde(default = "default_true")]
25 pub injection_patterns: bool,
26 #[serde(default)]
31 pub capability_escalation_check: bool,
32}
33
34impl Default for ScannerConfig {
35 fn default() -> Self {
36 Self {
37 injection_patterns: true,
38 capability_escalation_check: false,
39 }
40 }
41}
42use crate::rate_limit::RateLimitConfig;
43use crate::sanitizer::GuardrailConfig;
44use crate::sanitizer::{
45 CausalIpiConfig, ContentIsolationConfig, ExfiltrationGuardConfig, MemoryWriteValidationConfig,
46 PiiFilterConfig, ResponseVerificationConfig,
47};
48
49fn default_trust_default_level() -> SkillTrustLevel {
50 SkillTrustLevel::Quarantined
51}
52
53fn default_trust_local_level() -> SkillTrustLevel {
54 SkillTrustLevel::Trusted
55}
56
57fn default_trust_hash_mismatch_level() -> SkillTrustLevel {
58 SkillTrustLevel::Quarantined
59}
60
61fn default_trust_bundled_level() -> SkillTrustLevel {
62 SkillTrustLevel::Trusted
63}
64
65fn default_llm_timeout() -> u64 {
66 120
67}
68
69fn default_embedding_timeout() -> u64 {
70 30
71}
72
73fn default_a2a_timeout() -> u64 {
74 30
75}
76
77fn default_max_parallel_tools() -> usize {
78 8
79}
80
81fn default_llm_request_timeout() -> u64 {
82 600
83}
84
85fn default_context_prep_timeout() -> u64 {
86 30
87}
88
89fn default_no_providers_backoff_secs() -> u64 {
90 2
91}
92
93#[derive(Debug, Clone, Deserialize, Serialize)]
107pub struct TrustConfig {
108 #[serde(default = "default_trust_default_level")]
110 pub default_level: SkillTrustLevel,
111 #[serde(default = "default_trust_local_level")]
113 pub local_level: SkillTrustLevel,
114 #[serde(default = "default_trust_hash_mismatch_level")]
117 pub hash_mismatch_level: SkillTrustLevel,
118 #[serde(default = "default_trust_bundled_level")]
120 pub bundled_level: SkillTrustLevel,
121 #[serde(default = "default_true")]
129 pub scan_on_load: bool,
130 #[serde(default)]
132 pub scanner: ScannerConfig,
133}
134
135impl Default for TrustConfig {
136 fn default() -> Self {
137 Self {
138 default_level: default_trust_default_level(),
139 local_level: default_trust_local_level(),
140 hash_mismatch_level: default_trust_hash_mismatch_level(),
141 bundled_level: default_trust_bundled_level(),
142 scan_on_load: true,
143 scanner: ScannerConfig::default(),
144 }
145 }
146}
147
148fn default_decay_per_turn() -> f32 {
151 0.85
152}
153fn default_window_turns() -> u32 {
154 8
155}
156fn default_elevated_at() -> f32 {
157 2.0
158}
159fn default_high_at() -> f32 {
160 4.0
161}
162fn default_critical_at() -> f32 {
163 8.0
164}
165fn default_alert_threshold() -> f32 {
166 4.0
167}
168fn default_auto_recover_after_turns() -> u32 {
169 16
170}
171fn default_subagent_inheritance_factor() -> f32 {
172 0.5
173}
174fn default_high_call_rate_threshold() -> u32 {
175 12
176}
177fn default_unusual_read_threshold() -> u32 {
178 24
179}
180fn default_auto_recover_floor() -> u32 {
181 4
182}
183
184#[derive(Debug, Clone, Deserialize, Serialize)]
201pub struct TrajectorySentinelConfig {
202 #[serde(default = "default_decay_per_turn")]
206 pub decay_per_turn: f32,
207 #[serde(default = "default_window_turns")]
211 pub window_turns: u32,
212 #[serde(default = "default_elevated_at")]
214 pub elevated_at: f32,
215 #[serde(default = "default_high_at")]
217 pub high_at: f32,
218 #[serde(default = "default_critical_at")]
220 pub critical_at: f32,
221 #[serde(default = "default_alert_threshold")]
225 pub alert_threshold: f32,
226 #[serde(default = "default_auto_recover_after_turns")]
228 pub auto_recover_after_turns: u32,
229 #[serde(default = "default_subagent_inheritance_factor")]
234 pub subagent_inheritance_factor: f32,
235 #[serde(default = "default_high_call_rate_threshold")]
237 pub high_call_rate_threshold: u32,
238 #[serde(default = "default_unusual_read_threshold")]
240 pub unusual_read_threshold: u32,
241}
242
243impl Default for TrajectorySentinelConfig {
244 fn default() -> Self {
245 Self {
246 decay_per_turn: default_decay_per_turn(),
247 window_turns: default_window_turns(),
248 elevated_at: default_elevated_at(),
249 high_at: default_high_at(),
250 critical_at: default_critical_at(),
251 alert_threshold: default_alert_threshold(),
252 auto_recover_after_turns: default_auto_recover_after_turns(),
253 subagent_inheritance_factor: default_subagent_inheritance_factor(),
254 high_call_rate_threshold: default_high_call_rate_threshold(),
255 unusual_read_threshold: default_unusual_read_threshold(),
256 }
257 }
258}
259
260impl TrajectorySentinelConfig {
261 pub fn validate(&self) -> Result<(), String> {
267 if self.decay_per_turn <= 0.0 || self.decay_per_turn > 1.0 {
268 return Err(format!(
269 "trajectory.decay_per_turn must be in (0.0, 1.0]; got {}",
270 self.decay_per_turn
271 ));
272 }
273 if self.elevated_at >= self.high_at {
274 return Err(format!(
275 "trajectory: elevated_at ({}) must be < high_at ({})",
276 self.elevated_at, self.high_at
277 ));
278 }
279 if self.high_at >= self.critical_at {
280 return Err(format!(
281 "trajectory: high_at ({}) must be < critical_at ({})",
282 self.high_at, self.critical_at
283 ));
284 }
285 if self.auto_recover_after_turns < default_auto_recover_floor() {
286 return Err(format!(
287 "trajectory.auto_recover_after_turns must be >= {}; got {}",
288 default_auto_recover_floor(),
289 self.auto_recover_after_turns
290 ));
291 }
292 if self.decay_per_turn < 1.0 {
294 let ideal = self
295 .decay_per_turn
296 .powf(0.5_f32.ln() / self.decay_per_turn.ln());
297 if (self.subagent_inheritance_factor - ideal).abs() > 0.1 {
298 tracing::warn!(
300 configured = self.subagent_inheritance_factor,
301 ideal = ideal,
302 decay = self.decay_per_turn,
303 "trajectory.subagent_inheritance_factor deviates from calibrated value by more than 0.1"
304 );
305 }
306 }
307 Ok(())
308 }
309}
310
311#[derive(Debug, Clone, Copy, PartialEq, Eq, Deserialize, Serialize, Default)]
317#[serde(rename_all = "snake_case")]
318pub enum PatternStrictness {
319 Strict,
321 Permissive,
323 #[default]
327 ProvisionalForDynamicNamespaces,
328}
329
330#[derive(Debug, Clone, Deserialize, Serialize)]
340pub struct ScopeConfig {
341 #[serde(default)]
345 pub patterns: Vec<String>,
346}
347
348#[derive(Debug, Clone, Deserialize, Serialize, Default)]
367pub struct CapabilityScopesConfig {
368 #[serde(default = "default_scope_name")]
373 pub default_scope: String,
374 #[serde(default)]
377 pub strict: bool,
378 #[serde(default)]
380 pub pattern_strictness: PatternStrictness,
381 #[serde(default, flatten)]
383 pub scopes: HashMap<String, ScopeConfig>,
384}
385
386fn default_scope_name() -> String {
387 "general".to_owned()
388}
389
390#[derive(Debug, Clone, Deserialize, Serialize)]
410pub struct SecurityConfig {
411 #[serde(default = "default_true")]
414 pub redact_secrets: bool,
415 #[serde(default)]
417 pub autonomy_level: AutonomyLevel,
418 #[serde(default)]
419 pub content_isolation: ContentIsolationConfig,
420 #[serde(default)]
421 pub exfiltration_guard: ExfiltrationGuardConfig,
422 #[serde(default)]
424 pub memory_validation: MemoryWriteValidationConfig,
425 #[serde(default)]
427 pub pii_filter: PiiFilterConfig,
428 #[serde(default)]
430 pub rate_limit: RateLimitConfig,
431 #[serde(default)]
433 pub pre_execution_verify: PreExecutionVerifierConfig,
434 #[serde(default)]
436 pub guardrail: GuardrailConfig,
437 #[serde(default)]
439 pub response_verification: ResponseVerificationConfig,
440 #[serde(default)]
442 pub causal_ipi: CausalIpiConfig,
443 #[serde(default)]
448 pub vigil: VigilConfig,
449 #[serde(default)]
454 pub trajectory: TrajectorySentinelConfig,
455 #[serde(default)]
460 pub capability_scopes: CapabilityScopesConfig,
461}
462
463impl Default for SecurityConfig {
464 fn default() -> Self {
465 Self {
466 redact_secrets: true,
467 autonomy_level: AutonomyLevel::default(),
468 content_isolation: ContentIsolationConfig::default(),
469 exfiltration_guard: ExfiltrationGuardConfig::default(),
470 memory_validation: MemoryWriteValidationConfig::default(),
471 pii_filter: PiiFilterConfig::default(),
472 rate_limit: RateLimitConfig::default(),
473 pre_execution_verify: PreExecutionVerifierConfig::default(),
474 guardrail: GuardrailConfig::default(),
475 response_verification: ResponseVerificationConfig::default(),
476 causal_ipi: CausalIpiConfig::default(),
477 vigil: VigilConfig::default(),
478 trajectory: TrajectorySentinelConfig::default(),
479 capability_scopes: CapabilityScopesConfig::default(),
480 }
481 }
482}
483
484#[derive(Debug, Clone, Copy, Deserialize, Serialize)]
498pub struct TimeoutConfig {
499 #[serde(default = "default_llm_timeout")]
501 pub llm_seconds: u64,
502 #[serde(default = "default_llm_request_timeout")]
505 pub llm_request_timeout_secs: u64,
506 #[serde(default = "default_embedding_timeout")]
508 pub embedding_seconds: u64,
509 #[serde(default = "default_a2a_timeout")]
511 pub a2a_seconds: u64,
512 #[serde(default = "default_max_parallel_tools")]
515 pub max_parallel_tools: usize,
516 #[serde(default = "default_context_prep_timeout")]
523 pub context_prep_timeout_secs: u64,
524 #[serde(default = "default_no_providers_backoff_secs")]
528 pub no_providers_backoff_secs: u64,
529}
530
531impl Default for TimeoutConfig {
532 fn default() -> Self {
533 Self {
534 llm_seconds: default_llm_timeout(),
535 llm_request_timeout_secs: default_llm_request_timeout(),
536 embedding_seconds: default_embedding_timeout(),
537 a2a_seconds: default_a2a_timeout(),
538 max_parallel_tools: default_max_parallel_tools(),
539 context_prep_timeout_secs: default_context_prep_timeout(),
540 no_providers_backoff_secs: default_no_providers_backoff_secs(),
541 }
542 }
543}
544
545#[cfg(test)]
546mod tests {
547 use super::*;
548
549 #[test]
550 fn trust_config_default_has_scan_on_load_true() {
551 let config = TrustConfig::default();
552 assert!(config.scan_on_load);
553 }
554
555 #[test]
556 fn trust_config_serde_roundtrip_with_scan_on_load() {
557 let config = TrustConfig {
558 default_level: SkillTrustLevel::Quarantined,
559 local_level: SkillTrustLevel::Trusted,
560 hash_mismatch_level: SkillTrustLevel::Quarantined,
561 bundled_level: SkillTrustLevel::Trusted,
562 scan_on_load: false,
563 scanner: ScannerConfig::default(),
564 };
565 let toml = toml::to_string(&config).expect("serialize");
566 let deserialized: TrustConfig = toml::from_str(&toml).expect("deserialize");
567 assert!(!deserialized.scan_on_load);
568 assert_eq!(deserialized.bundled_level, SkillTrustLevel::Trusted);
569 }
570
571 #[test]
572 fn trust_config_missing_scan_on_load_defaults_to_true() {
573 let toml = r#"
574default_level = "quarantined"
575local_level = "trusted"
576hash_mismatch_level = "quarantined"
577"#;
578 let config: TrustConfig = toml::from_str(toml).expect("deserialize");
579 assert!(
580 config.scan_on_load,
581 "missing scan_on_load must default to true"
582 );
583 }
584
585 #[test]
586 fn trust_config_default_has_bundled_level_trusted() {
587 let config = TrustConfig::default();
588 assert_eq!(config.bundled_level, SkillTrustLevel::Trusted);
589 }
590
591 #[test]
592 fn trust_config_missing_bundled_level_defaults_to_trusted() {
593 let toml = r#"
594default_level = "quarantined"
595local_level = "trusted"
596hash_mismatch_level = "quarantined"
597"#;
598 let config: TrustConfig = toml::from_str(toml).expect("deserialize");
599 assert_eq!(
600 config.bundled_level,
601 SkillTrustLevel::Trusted,
602 "missing bundled_level must default to trusted"
603 );
604 }
605
606 #[test]
607 fn scanner_config_defaults() {
608 let cfg = ScannerConfig::default();
609 assert!(cfg.injection_patterns);
610 assert!(!cfg.capability_escalation_check);
611 }
612
613 #[test]
614 fn scanner_config_serde_roundtrip() {
615 let cfg = ScannerConfig {
616 injection_patterns: false,
617 capability_escalation_check: true,
618 };
619 let toml = toml::to_string(&cfg).expect("serialize");
620 let back: ScannerConfig = toml::from_str(&toml).expect("deserialize");
621 assert!(!back.injection_patterns);
622 assert!(back.capability_escalation_check);
623 }
624
625 #[test]
626 fn trust_config_scanner_defaults_when_missing() {
627 let toml = r#"
628default_level = "quarantined"
629local_level = "trusted"
630hash_mismatch_level = "quarantined"
631"#;
632 let config: TrustConfig = toml::from_str(toml).expect("deserialize");
633 assert!(config.scanner.injection_patterns);
634 assert!(!config.scanner.capability_escalation_check);
635 }
636
637 #[test]
642 fn timeout_config_context_prep_timeout_default() {
643 let cfg = TimeoutConfig::default();
644 assert_eq!(
645 cfg.context_prep_timeout_secs, 30,
646 "context_prep_timeout_secs default must be 30s (#3357)"
647 );
648 }
649
650 #[test]
651 fn timeout_config_no_providers_backoff_default() {
652 let cfg = TimeoutConfig::default();
653 assert_eq!(
654 cfg.no_providers_backoff_secs, 2,
655 "no_providers_backoff_secs default must be 2s (#3357)"
656 );
657 }
658
659 #[test]
660 fn timeout_config_new_fields_deserialize_from_toml() {
661 let toml = r"
662context_prep_timeout_secs = 60
663no_providers_backoff_secs = 10
664";
665 let cfg: TimeoutConfig = toml::from_str(toml).expect("deserialize");
666 assert_eq!(cfg.context_prep_timeout_secs, 60);
667 assert_eq!(cfg.no_providers_backoff_secs, 10);
668 }
669
670 #[test]
671 fn timeout_config_new_fields_default_when_missing_from_toml() {
672 let cfg: TimeoutConfig = toml::from_str("").expect("deserialize empty");
674 assert_eq!(cfg.context_prep_timeout_secs, 30);
675 assert_eq!(cfg.no_providers_backoff_secs, 2);
676 }
677}