mirror of
https://github.com/koala73/worldmonitor.git
synced 2026-04-25 17:14:57 +02:00
* fix(resilience): wider FX YoY upstream + sanctions absolute threshold Two backtest families consistently failed Outcome-Backtest gates because the detectors were reading the wrong shape of upstream data, not because the upstream seeders were missing. FX Stress (was AUC=0.500): - BIS WS_EER (`economic:bis:eer:v1`) only covers 12 G10/major-EM countries — Argentina, Egypt, Turkey, Pakistan, Nigeria etc. are absent, so the detector had no positive events to score against - Add `seed-fx-yoy.mjs` fetching Yahoo Finance 2-year monthly history across 45 single-country currencies, computing YoY % and 24-month peak-to-trough drawdown - Switch detector to read drawdown24m with -15% threshold (matches methodology spec); falls back to yoyChange/realChange for back-compat - Why drawdown not just YoY: rolling 12-month windows slice through historic crises (Egypt's March 2024 devaluation falls outside an April→April window by 2026); drawdown captures actual stress magnitude regardless of crisis timing - Verified locally: flags AR (-38%), TR (-28%), NG (-21%), MX (-18%) Sanctions Shocks (was AUC=0.624): - Detector previously used top-quartile (Q3) of country-counts which conflated genuine comprehensive-sanctions targets (RU, IR, KP, CU, SY, VE, BY, MM) with financial hubs (UK, CH, DE, US) hosting many sanctioned entities - Replace with absolute threshold of 100 entities — the OFAC distribution is heavy-tailed enough that this cleanly separates targets from hubs Both fixes use existing seeded data (or new seeded data via seed-fx-yoy.mjs) — no hardcoded country curation. api/health.js: register `economic:fx:yoy:v1` in STANDALONE_KEYS + SEED_META so the validation cron monitors freshness. Railway: deploy `seed-fx-yoy` as a daily cron service (NIXPACKS builder, startCommand `node scripts/seed-fx-yoy.mjs`, schedule `30 6 * * *`). * fix(seed-fx-yoy): use running-peak max-drawdown instead of global peak PR #3071 review (P1): the original drawdown calculation found the global maximum across the entire window, then the lowest point AFTER that peak. This silently erased earlier crashes when the currency later recovered to a new high — exactly the class of events the FX Stress family is trying to capture. Example series [5, 10, 7, 9, 6, 11, 10]: true worst drawdown is 10 → 6 = -40%, but the broken implementation picked the later global peak 11 and reported only 11 → 10 = -9.1%. Fix: sweep forward tracking the running peak; for each subsequent bar compute the drop from that running peak; keep the largest such drop. This is the standard max-drawdown computation and correctly handles recover-then-fall-again sequences. Live data verification: - BR (Brazilian real) was missing from the flagged set under the broken algorithm because BRL recovered above its 2024-04 peak. With the fix it correctly surfaces at drawdown=-15.8% (peak 2024-04, trough 2024-12). - KR / CO peaks now resolve to mid-series dates instead of end-of-window, proving the running-peak scan is finding intermediate peaks. Tests added covering: reviewer's regression case, peak-at-start (NGN style), pure appreciation, multi-trough series, yoyChange anchor. * fix(health): gate fxYoy as on-demand to avoid post-merge CRIT alarm PR #3071 review (P1): registering `fxYoy` as a required standalone seeded key creates an operational hazard during the deploy gap. After merge, Vercel auto-deploys `api/health.js` immediately, but the `seed-fx-yoy` Railway cron lives in a separate deployment surface that must be triggered manually. Any gap (deploy-order race, first-cron failure, env var typo) flips health to DEGRADED/UNHEALTHY because `classifyKey()` marks the check as `EMPTY` without an on-demand or empty-data-OK exemption. Add `fxYoy` to ON_DEMAND_KEYS as a transitional safety net (matches the pattern recovery* uses for "stub seeders not yet deployed"). The key is still monitored — freshness via seed-meta — but missing data downgrades from CRIT to WARN, which won't page anyone. Once the Railway cron has fired cleanly for ~7 days in production we can remove this entry and let it be a hard-required key like the rest of the FRED family. Note: the Railway service IS already provisioned (cron `30 6 * * *`, 0.5 vCPU / 0.5 GB, NIXPACKS, watchPatterns scoped to the seeder + utils) and the `economic:fx:yoy:v1` key is currently fresh in production from local test runs. The gating here is defense-in-depth against the operational coupling, not against a known absent key.
666 lines
24 KiB
JavaScript
666 lines
24 KiB
JavaScript
#!/usr/bin/env node
|
|
|
|
import { writeFileSync, mkdirSync } from 'node:fs';
|
|
import { dirname, join } from 'node:path';
|
|
import { fileURLToPath } from 'node:url';
|
|
import { resolveIso2 } from './_country-resolver.mjs';
|
|
import { getRedisCredentials, loadEnvFile } from './_seed-utils.mjs';
|
|
|
|
// Normalize any country identifier the upstream seeders emit (ISO2, ISO3, or
|
|
// full English name) to canonical uppercase ISO2, or null when unrecognized.
|
|
// Each detect* function calls this instead of assuming the payload already
|
|
// uses ISO2 — the event seeders emit mixed shapes (BIS: `countryCode` ISO2;
|
|
// UNHCR/Cloudflare/UCDP: full country name; displacement summary: `code`
|
|
// ISO3) and a single backtest reader has to normalize them all.
|
|
function toIso2(entry) {
|
|
if (!entry || typeof entry !== 'object') return null;
|
|
return resolveIso2({
|
|
iso2: entry.iso2 ?? entry.countryCode,
|
|
iso3: entry.iso3 ?? entry.code,
|
|
name: entry.country ?? entry.countryName ?? entry.originName,
|
|
});
|
|
}
|
|
|
|
loadEnvFile(import.meta.url);
|
|
|
|
const __dirname = dirname(fileURLToPath(import.meta.url));
|
|
const VALIDATION_DIR = join(__dirname, '..', 'docs', 'methodology', 'country-resilience-index', 'validation');
|
|
|
|
const RESILIENCE_SCORE_CACHE_PREFIX = 'resilience:score:v9:';
|
|
const BACKTEST_RESULT_KEY = 'resilience:backtest:outcomes:v1';
|
|
const BACKTEST_TTL_SECONDS = 7 * 24 * 60 * 60;
|
|
|
|
const AUC_THRESHOLD = 0.75;
|
|
const GATE_WIDTH = 0.03;
|
|
|
|
const SOVEREIGN_STRESS_COUNTRIES_2024_2025 = new Set([
|
|
'AR', 'LK', 'GH', 'ZM', 'ET', 'UA', 'LB', 'SV', 'PK', 'BD',
|
|
'BO', 'EG', 'TN', 'KE', 'NG',
|
|
]);
|
|
|
|
const EVENT_FAMILIES = [
|
|
{
|
|
id: 'fx-stress',
|
|
label: 'FX Stress',
|
|
description: 'Currency peak-to-trough drawdown >= 15% over 24 months',
|
|
redisKey: 'economic:fx:yoy:v1',
|
|
detect: detectFxStress,
|
|
dataSource: 'live',
|
|
},
|
|
{
|
|
id: 'sovereign-stress',
|
|
label: 'Sovereign Stress',
|
|
description: 'Sovereign credit downgrade or debt restructuring 2024-2025',
|
|
redisKey: null,
|
|
detect: detectSovereignStress,
|
|
dataSource: 'hardcoded',
|
|
},
|
|
{
|
|
id: 'power-outages',
|
|
label: 'Power Outages',
|
|
description: 'Major grid outage affecting >= 1M people',
|
|
redisKey: 'infra:outages:v1',
|
|
detect: detectPowerOutages,
|
|
dataSource: 'live',
|
|
},
|
|
{
|
|
id: 'food-crisis',
|
|
label: 'Food Crisis Escalation',
|
|
description: 'IPC Phase 3+ escalation',
|
|
redisKey: 'resilience:static:fao',
|
|
detect: detectFoodCrisis,
|
|
dataSource: 'live',
|
|
},
|
|
{
|
|
id: 'refugee-surges',
|
|
label: 'Refugee Surges',
|
|
description: '>= 100k people displaced (refugees + IDPs + stateless)',
|
|
// seed-displacement-summary.mjs writes `displacement:summary:v1:<year>`
|
|
// (`${CANONICAL_KEY_PREFIX}:${currentYear}` on line 226) because the
|
|
// UNHCR dataset is annual. Match the suffix here. Use `getFullYear()`
|
|
// (not `getUTCFullYear()`) to mirror exactly what the seeder computes
|
|
// and what seed-cross-source-signals.mjs reads — otherwise the values
|
|
// can disagree by one for the hours around UTC new year.
|
|
redisKey: `displacement:summary:v1:${new Date().getFullYear()}`,
|
|
detect: detectRefugeeSurges,
|
|
dataSource: 'live',
|
|
},
|
|
{
|
|
id: 'sanctions-shocks',
|
|
label: 'Sanctions Shocks',
|
|
description: 'New comprehensive sanctions package',
|
|
redisKey: 'sanctions:country-counts:v1',
|
|
detect: detectSanctionsShocks,
|
|
dataSource: 'live',
|
|
},
|
|
{
|
|
id: 'conflict-spillover',
|
|
label: 'Conflict Spillover',
|
|
description: 'Armed conflict spreading to a previously-stable neighbor',
|
|
redisKey: 'conflict:ucdp-events:v1',
|
|
detect: detectConflictSpillover,
|
|
dataSource: 'live',
|
|
},
|
|
];
|
|
|
|
function computeAuc(predictions, labels) {
|
|
const n = predictions.length;
|
|
if (n === 0) return 0.5;
|
|
|
|
const positiveCount = labels.filter(Boolean).length;
|
|
const negativeCount = n - positiveCount;
|
|
|
|
if (positiveCount === 0 || negativeCount === 0) return 0.5;
|
|
|
|
const indexed = predictions.map((pred, i) => ({ pred, label: labels[i] }));
|
|
indexed.sort((a, b) => b.pred - a.pred);
|
|
|
|
let tp = 0;
|
|
let fp = 0;
|
|
let auc = 0;
|
|
let prevTp = 0;
|
|
let prevFp = 0;
|
|
let prevPred = -Infinity;
|
|
|
|
for (let i = 0; i < indexed.length; i++) {
|
|
if (indexed[i].pred !== prevPred && i > 0) {
|
|
auc += trapezoidArea(prevFp, fp, prevTp, tp);
|
|
prevTp = tp;
|
|
prevFp = fp;
|
|
}
|
|
if (indexed[i].label) {
|
|
tp++;
|
|
} else {
|
|
fp++;
|
|
}
|
|
prevPred = indexed[i].pred;
|
|
}
|
|
auc += trapezoidArea(prevFp, fp, prevTp, tp);
|
|
|
|
return auc / (positiveCount * negativeCount);
|
|
}
|
|
|
|
function trapezoidArea(x1, x2, y1, y2) {
|
|
return Math.abs(x2 - x1) * (y1 + y2) / 2;
|
|
}
|
|
|
|
function checkGate(auc, threshold, gateWidth) {
|
|
return auc >= (threshold - gateWidth);
|
|
}
|
|
|
|
async function redisGetJson(url, token, key) {
|
|
const resp = await fetch(`${url}/get/${encodeURIComponent(key)}`, {
|
|
headers: { Authorization: `Bearer ${token}` },
|
|
signal: AbortSignal.timeout(10_000),
|
|
});
|
|
if (!resp.ok) return null;
|
|
const data = await resp.json();
|
|
if (!data?.result) return null;
|
|
try {
|
|
return JSON.parse(data.result);
|
|
} catch {
|
|
return typeof data.result === 'string' ? data.result : null;
|
|
}
|
|
}
|
|
|
|
async function redisPipeline(url, token, commands) {
|
|
const resp = await fetch(`${url}/pipeline`, {
|
|
method: 'POST',
|
|
headers: { Authorization: `Bearer ${token}`, 'Content-Type': 'application/json' },
|
|
body: JSON.stringify(commands),
|
|
signal: AbortSignal.timeout(30_000),
|
|
});
|
|
if (!resp.ok) {
|
|
const text = await resp.text().catch(() => '');
|
|
throw new Error(`Redis pipeline HTTP ${resp.status}: ${text.slice(0, 200)}`);
|
|
}
|
|
return resp.json();
|
|
}
|
|
|
|
async function redisSet(url, token, key, value, ttl) {
|
|
const args = ['SET', key, JSON.stringify(value)];
|
|
if (ttl) args.push('EX', String(ttl));
|
|
const resp = await fetch(`${url}`, {
|
|
method: 'POST',
|
|
headers: { Authorization: `Bearer ${token}`, 'Content-Type': 'application/json' },
|
|
body: JSON.stringify(args),
|
|
signal: AbortSignal.timeout(10_000),
|
|
});
|
|
if (!resp.ok) {
|
|
console.warn(`[WARN] Failed to write ${key} to Redis: HTTP ${resp.status}`);
|
|
}
|
|
}
|
|
|
|
async function fetchAllResilienceScores(url, token) {
|
|
const ALL_COUNTRIES = [
|
|
'AF','AL','DZ','AD','AO','AG','AR','AM','AU','AT','AZ','BS','BH','BD','BB',
|
|
'BY','BE','BZ','BJ','BT','BO','BA','BW','BR','BN','BG','BF','BI','CV','KH',
|
|
'CM','CA','CF','TD','CL','CN','CO','KM','CG','CD','CR','CI','HR','CU','CY',
|
|
'CZ','DK','DJ','DM','DO','EC','EG','SV','GQ','ER','EE','SZ','ET','FJ','FI',
|
|
'FR','GA','GM','GE','DE','GH','GR','GD','GT','GN','GW','GY','HT','HN','HU',
|
|
'IS','IN','ID','IR','IQ','IE','IL','IT','JM','JP','JO','KZ','KE','KI','KP',
|
|
'KR','KW','KG','LA','LV','LB','LS','LR','LY','LI','LT','LU','MG','MW','MY',
|
|
'MV','ML','MT','MH','MR','MU','MX','FM','MD','MC','MN','ME','MA','MZ','MM',
|
|
'NA','NR','NP','NL','NZ','NI','NE','NG','MK','NO','OM','PK','PW','PA','PG',
|
|
'PY','PE','PH','PL','PT','QA','RO','RU','RW','KN','LC','VC','WS','SM','ST',
|
|
'SA','SN','RS','SC','SL','SG','SK','SI','SB','SO','ZA','SS','ES','LK','SD',
|
|
'SR','SE','CH','SY','TW','TJ','TZ','TH','TL','TG','TO','TT','TN','TR','TM',
|
|
'TV','UG','UA','AE','GB','US','UY','UZ','VU','VE','VN','YE','ZM','ZW',
|
|
];
|
|
|
|
const commands = ALL_COUNTRIES.map((cc) => ['GET', `${RESILIENCE_SCORE_CACHE_PREFIX}${cc}`]);
|
|
const batchSize = 50;
|
|
const scores = new Map();
|
|
|
|
for (let i = 0; i < commands.length; i += batchSize) {
|
|
const batch = commands.slice(i, i + batchSize);
|
|
const batchCodes = ALL_COUNTRIES.slice(i, i + batchSize);
|
|
const results = await redisPipeline(url, token, batch);
|
|
|
|
for (let j = 0; j < batchCodes.length; j++) {
|
|
const raw = results[j]?.result;
|
|
if (typeof raw !== 'string') continue;
|
|
try {
|
|
const parsed = JSON.parse(raw);
|
|
if (parsed?.overallScore != null) {
|
|
scores.set(batchCodes[j], parsed.overallScore);
|
|
}
|
|
} catch { /* skip */ }
|
|
}
|
|
}
|
|
|
|
return scores;
|
|
}
|
|
|
|
// FX Stress detector — reads the wider-coverage Yahoo FX payload
|
|
// (seed-fx-yoy.mjs, key economic:fx:yoy:v1). Shape:
|
|
// { rates: [{ countryCode: "AR", currency: "ARS",
|
|
// currentRate, yearAgoRate, yoyChange,
|
|
// drawdown24m, peakRate, peakDate, troughRate, troughDate,
|
|
// asOf, yearAgo }], fetchedAt }
|
|
//
|
|
// Use peak-to-trough drawdown over the last 24 months as the stress signal,
|
|
// with a -15% threshold matching the methodology spec. A rolling 12-month
|
|
// YoY window slices through the middle of historic crises (Egypt's March
|
|
// 2024 devaluation, Nigeria's June 2023 devaluation, etc. all fall outside
|
|
// an April→April YoY window by 2026) so YoY-only systematically misses the
|
|
// very events the family is trying to label. Drawdown captures the actual
|
|
// magnitude of stress regardless of crisis timing.
|
|
//
|
|
// Falls back to yoyChange / realChange for back-compat with the old BIS
|
|
// payload during transition deploys (eliminates a CRIT-level health flap if
|
|
// seed-fx-yoy.mjs hasn't run yet but seed-bis-data.mjs has).
|
|
//
|
|
// Coverage: ~45 single-country currencies including Argentina (ARS), Egypt
|
|
// (EGP), Turkey (TRY), Pakistan (PKR), Nigeria (NGN), etc. — the historic
|
|
// FX-crisis countries that BIS WS_EER (~12 G10 + select EM) excluded.
|
|
// Multi-country shared currencies (EUR, XOF, XAF) are intentionally absent
|
|
// because depreciation can't be attributed to any single member.
|
|
const FX_STRESS_THRESHOLD_PCT = -15;
|
|
|
|
function detectFxStress(data) {
|
|
const labels = new Map();
|
|
if (!data || typeof data !== 'object') return labels;
|
|
const rates = Array.isArray(data) ? data : (data.rates || data.countries || data.data || []);
|
|
if (!Array.isArray(rates)) return labels;
|
|
for (const entry of rates) {
|
|
const iso2 = toIso2(entry);
|
|
if (!iso2) continue;
|
|
const change = entry.drawdown24m
|
|
?? entry.yoyChange
|
|
?? entry.realChange
|
|
?? entry.change
|
|
?? entry.depreciation;
|
|
if (typeof change === 'number' && Number.isFinite(change)) {
|
|
labels.set(iso2, change <= FX_STRESS_THRESHOLD_PCT);
|
|
}
|
|
}
|
|
return labels;
|
|
}
|
|
|
|
function detectSovereignStress(_data, _allCountries) {
|
|
const labels = new Map();
|
|
for (const cc of SOVEREIGN_STRESS_COUNTRIES_2024_2025) {
|
|
labels.set(cc, true);
|
|
}
|
|
return labels;
|
|
}
|
|
|
|
// Infrastructure Outages detector — reads seed-internet-outages.mjs payload
|
|
// (key infra:outages:v1). Shape:
|
|
// { outages: [{ id, title, country: "Iraq" (full name), detectedAt, ... }] }
|
|
// Note: the upstream seeder collects *internet* outages (Cloudflare Radar +
|
|
// news), not power outages specifically. We treat any appearance in the
|
|
// outage feed as infrastructure stress — the feed is very sparse (typically
|
|
// 3-10 events globally per week) so a count-based threshold would zero out
|
|
// the signal entirely. This is a looser proxy than the original "1M people
|
|
// power outage" spec; a dedicated grid-outage seeder remains an open
|
|
// methodology question. TODO: if the upstream feed ever densifies (direct
|
|
// grid-operator APIs, ENTSO-E, EIA, etc.), re-introduce a count threshold
|
|
// so noisy single events don't dominate.
|
|
function detectPowerOutages(data) {
|
|
const labels = new Map();
|
|
if (!data || typeof data !== 'object') return labels;
|
|
const events = Array.isArray(data) ? data : (data.outages || data.events || []);
|
|
if (!Array.isArray(events)) return labels;
|
|
for (const event of events) {
|
|
const iso2 = toIso2(event);
|
|
if (!iso2) continue;
|
|
labels.set(iso2, true);
|
|
}
|
|
return labels;
|
|
}
|
|
|
|
function detectFoodCrisis(data, _allCountries) {
|
|
const labels = new Map();
|
|
if (!data || typeof data !== 'object') return labels;
|
|
|
|
const processEntry = (entry, cc) => {
|
|
if (!cc || cc.length !== 2) return;
|
|
const phase = entry.ipcPhase ?? entry.phase ?? entry.ipc_phase;
|
|
if (typeof phase === 'number' && phase >= 3) {
|
|
labels.set(cc.toUpperCase(), true);
|
|
}
|
|
const text = entry.fcsPhase ?? entry.classification ?? '';
|
|
if (typeof text === 'string' && /phase\s*[345]/i.test(text)) {
|
|
labels.set(cc.toUpperCase(), true);
|
|
}
|
|
};
|
|
|
|
if (Array.isArray(data)) {
|
|
for (const entry of data) {
|
|
processEntry(entry, entry.country || entry.iso2 || entry.cc);
|
|
}
|
|
} else if (data.countries) {
|
|
for (const [cc, val] of Object.entries(data.countries)) {
|
|
processEntry(val, cc);
|
|
}
|
|
} else {
|
|
for (const [cc, val] of Object.entries(data)) {
|
|
if (cc.length === 2 && val && typeof val === 'object') {
|
|
processEntry(val, cc);
|
|
}
|
|
}
|
|
}
|
|
|
|
return labels;
|
|
}
|
|
|
|
// Refugee Surges detector — reads seed-displacement-summary.mjs payload
|
|
// (key displacement:summary:v1:<year>). Shape:
|
|
// { summary: { year, globalTotals, countries: [{ code: "AFG" (ISO3),
|
|
// name, refugees, asylumSeekers, idps, stateless,
|
|
// totalDisplaced, hostRefugees, hostTotal, location }] } }
|
|
// UNHCR publishes annual totals, not a YoY delta, so we flag countries with
|
|
// >= 100k people currently displaced (refugees + IDPs + stateless). This
|
|
// captures Chronic-Crisis countries as positive events, consistent with the
|
|
// "displacement stress" signal the family is measuring.
|
|
const REFUGEE_SURGE_THRESHOLD = 100_000;
|
|
|
|
function detectRefugeeSurges(data) {
|
|
const labels = new Map();
|
|
if (!data || typeof data !== 'object') return labels;
|
|
const countries = Array.isArray(data)
|
|
? data
|
|
: (data.summary?.countries || data.countries || data.summaries || []);
|
|
if (!Array.isArray(countries)) return labels;
|
|
for (const entry of countries) {
|
|
const iso2 = toIso2(entry);
|
|
if (!iso2) continue;
|
|
const displaced = entry.totalDisplaced
|
|
?? entry.newDisplacement
|
|
?? entry.displaced
|
|
?? entry.refugees
|
|
?? 0;
|
|
if (typeof displaced === 'number' && displaced >= REFUGEE_SURGE_THRESHOLD) {
|
|
labels.set(iso2, true);
|
|
}
|
|
}
|
|
return labels;
|
|
}
|
|
|
|
// Sanctions Shocks detector — reads seed-sanctions-pressure.mjs payload
|
|
// (key sanctions:country-counts:v1). Shape:
|
|
// { "CU": 35, "GB": 190, "CH": 98, ... }
|
|
// This is the cumulative count of sanctioned entities linked to each ISO2,
|
|
// not a yearly delta. The OFAC distribution is heavily right-skewed:
|
|
// comprehensive-sanctions targets (RU, IR, KP, CU, SY, VE, BY, MM) carry
|
|
// hundreds-to-thousands of entities each. The long tail (financial hubs +
|
|
// incidental nexus countries) carries dozens.
|
|
//
|
|
// The previous Q3 (top-quartile) gate flagged ~50 countries — AUC stuck
|
|
// at ~0.62 because half the flags were financial hubs that merely host
|
|
// sanctioned entities, not the targets themselves. An absolute threshold
|
|
// of SANCTIONS_TARGET_THRESHOLD entities is a more semantically meaningful
|
|
// cutoff: a country with 100+ designated entities IS being heavily
|
|
// targeted, regardless of how the rest of the distribution looks. Review
|
|
// annually as global sanctions volume evolves.
|
|
const SANCTIONS_TARGET_THRESHOLD = 100;
|
|
|
|
function detectSanctionsShocks(data) {
|
|
const labels = new Map();
|
|
if (!data || typeof data !== 'object') return labels;
|
|
|
|
const counts = new Map(); // iso2 → count
|
|
if (Array.isArray(data)) {
|
|
for (const entry of data) {
|
|
const iso2 = toIso2(entry);
|
|
if (!iso2) continue;
|
|
const c = entry.count ?? entry.sanctions ?? entry.newSanctions ?? 0;
|
|
if (typeof c === 'number' && c > 0) counts.set(iso2, c);
|
|
}
|
|
} else {
|
|
for (const [cc, val] of Object.entries(data)) {
|
|
const iso2 = resolveIso2({ iso2: cc });
|
|
if (!iso2) continue;
|
|
const c = typeof val === 'number' ? val : (val?.count ?? val?.total ?? 0);
|
|
if (typeof c === 'number' && c > 0) counts.set(iso2, c);
|
|
}
|
|
}
|
|
|
|
for (const [iso2, c] of counts) {
|
|
if (c >= SANCTIONS_TARGET_THRESHOLD) labels.set(iso2, true);
|
|
}
|
|
return labels;
|
|
}
|
|
|
|
// Conflict Spillover detector — reads seed-ucdp-events.mjs payload
|
|
// (key conflict:ucdp-events:v1). Shape:
|
|
// { events: [{ id, dateStart, country: "Somalia" (full name), sideA, sideB,
|
|
// deathsBest, violenceType, ... }], fetchedAt, version,
|
|
// totalRaw, filteredCount }
|
|
// UCDP emits full country names, not ISO codes. Previous detector filtered
|
|
// on `cc.length === 2` so every event was dropped → AUC 0.500. With proper
|
|
// ISO2 resolution every country that appeared in any UCDP event this year
|
|
// is flagged, matching the family description "Armed conflict … in a
|
|
// previously-stable neighbor". Threshold of >= 3 events filters out
|
|
// single-incident noise while keeping genuine conflict countries labeled.
|
|
const CONFLICT_EVENT_THRESHOLD = 3;
|
|
|
|
function detectConflictSpillover(data) {
|
|
const labels = new Map();
|
|
if (!data || typeof data !== 'object') return labels;
|
|
|
|
const events = Array.isArray(data) ? data : (data.events || data.conflicts || []);
|
|
if (!Array.isArray(events)) return labels;
|
|
const countryCounts = new Map();
|
|
for (const event of events) {
|
|
const iso2 = toIso2(event);
|
|
if (!iso2) continue;
|
|
countryCounts.set(iso2, (countryCounts.get(iso2) || 0) + 1);
|
|
}
|
|
for (const [iso2, count] of countryCounts) {
|
|
if (count >= CONFLICT_EVENT_THRESHOLD) labels.set(iso2, true);
|
|
}
|
|
return labels;
|
|
}
|
|
|
|
function findFalseNegatives(scores, labels, limit = 3) {
|
|
const entries = [];
|
|
for (const [cc, label] of labels) {
|
|
if (label && scores.has(cc)) {
|
|
entries.push({ cc, score: scores.get(cc) });
|
|
}
|
|
}
|
|
entries.sort((a, b) => b.score - a.score);
|
|
return entries.slice(0, limit).map((e) => e.cc);
|
|
}
|
|
|
|
function findFalsePositives(scores, labels, allCountries, limit = 3) {
|
|
const entries = [];
|
|
for (const cc of allCountries) {
|
|
if (!labels.get(cc) && scores.has(cc)) {
|
|
entries.push({ cc, score: scores.get(cc) });
|
|
}
|
|
}
|
|
entries.sort((a, b) => a.score - b.score);
|
|
return entries.slice(0, limit).map((e) => e.cc);
|
|
}
|
|
|
|
async function runBacktest() {
|
|
const { url, token } = getRedisCredentials();
|
|
|
|
console.log('=== OUTCOME BACKTEST: RESILIENCE vs REAL-WORLD EVENTS ===');
|
|
console.log(`Holdout period: 2024-2025`);
|
|
console.log(`AUC threshold: ${AUC_THRESHOLD} (gate width: ${GATE_WIDTH})`);
|
|
console.log('');
|
|
|
|
const scores = await fetchAllResilienceScores(url, token);
|
|
console.log(`Loaded resilience scores for ${scores.size} countries`);
|
|
if (scores.size < 50) {
|
|
// Not actually fatal — the validation bundle runner reports ran:N failed:0
|
|
// for this branch. Happens on cold start when the validation bundle runs
|
|
// before the scores seeder populates Redis. Warn (not error) so ops pages
|
|
// don't trip on a transient.
|
|
console.warn(`[backtest] Skipping: only ${scores.size}/196 scores in Redis — scores seeder likely hasn't run yet`);
|
|
return null;
|
|
}
|
|
console.log('');
|
|
|
|
const allCountries = [...scores.keys()];
|
|
const familyResults = [];
|
|
|
|
for (const family of EVENT_FAMILIES) {
|
|
console.log(`--- ${family.label} (${family.id}) ---`);
|
|
console.log(` Source: ${family.dataSource === 'hardcoded' ? 'hardcoded reference list' : family.redisKey}`);
|
|
|
|
let rawData = null;
|
|
if (family.redisKey) {
|
|
rawData = await redisGetJson(url, token, family.redisKey);
|
|
if (!rawData) {
|
|
console.log(` [WARN] No data at ${family.redisKey}, using empty set`);
|
|
}
|
|
}
|
|
|
|
const eventLabels = family.detect(rawData, allCountries);
|
|
const positiveCountries = [...eventLabels.entries()].filter(([, v]) => v).map(([k]) => k);
|
|
|
|
const aligned = [];
|
|
for (const cc of allCountries) {
|
|
if (!scores.has(cc)) continue;
|
|
const score = scores.get(cc);
|
|
const label = eventLabels.get(cc) === true;
|
|
aligned.push({ cc, score, label });
|
|
}
|
|
|
|
if (family.id === 'sovereign-stress') {
|
|
let skippedCount = 0;
|
|
for (const cc of SOVEREIGN_STRESS_COUNTRIES_2024_2025) {
|
|
if (!aligned.find((a) => a.cc === cc)) {
|
|
const score = scores.get(cc);
|
|
if (score == null) {
|
|
skippedCount++;
|
|
continue;
|
|
}
|
|
aligned.push({ cc, score, label: true });
|
|
}
|
|
}
|
|
if (skippedCount > 0) {
|
|
console.warn(`[${family.id}] Skipped ${skippedCount} sovereign-stress countries absent from cache`);
|
|
}
|
|
}
|
|
|
|
const predictions = aligned.map((a) => 100 - a.score);
|
|
const labels = aligned.map((a) => a.label);
|
|
const positiveCount = labels.filter(Boolean).length;
|
|
|
|
let auc = 0.5;
|
|
let pass = false;
|
|
|
|
if (positiveCount > 0 && positiveCount < aligned.length) {
|
|
auc = computeAuc(predictions, labels);
|
|
pass = checkGate(auc, AUC_THRESHOLD, GATE_WIDTH);
|
|
} else if (positiveCount === 0) {
|
|
console.log(` [WARN] No positive events detected, AUC defaults to 0.5`);
|
|
pass = false;
|
|
}
|
|
|
|
const topFalseNegatives = findFalseNegatives(scores, eventLabels, 3);
|
|
const topFalsePositives = findFalsePositives(scores, eventLabels, allCountries, 3);
|
|
|
|
const result = {
|
|
id: family.id,
|
|
label: family.label,
|
|
description: family.description,
|
|
dataSource: family.dataSource,
|
|
auc: Math.round(auc * 1000) / 1000,
|
|
threshold: AUC_THRESHOLD,
|
|
gateWidth: GATE_WIDTH,
|
|
pass,
|
|
n: aligned.length,
|
|
positives: positiveCount,
|
|
topFalseNegatives,
|
|
topFalsePositives,
|
|
};
|
|
|
|
familyResults.push(result);
|
|
|
|
console.log(` Countries aligned: ${aligned.length}`);
|
|
console.log(` Positive events: ${positiveCount} (${positiveCountries.slice(0, 10).join(', ')}${positiveCountries.length > 10 ? '...' : ''})`);
|
|
console.log(` AUC: ${result.auc.toFixed(3)}`);
|
|
console.log(` Gate: ${pass ? 'PASS' : 'FAIL'} (need >= ${(AUC_THRESHOLD - GATE_WIDTH).toFixed(2)})`);
|
|
console.log(` Top false negatives (high resilience, got hit): ${topFalseNegatives.join(', ') || 'none'}`);
|
|
console.log(` Top false positives (low resilience, survived): ${topFalsePositives.join(', ') || 'none'}`);
|
|
console.log('');
|
|
}
|
|
|
|
const overallPass = familyResults.every((f) => f.pass);
|
|
const passCount = familyResults.filter((f) => f.pass).length;
|
|
|
|
const output = {
|
|
generatedAt: Date.now(),
|
|
holdoutPeriod: '2024-2025',
|
|
aucThreshold: AUC_THRESHOLD,
|
|
gateWidth: GATE_WIDTH,
|
|
families: familyResults,
|
|
overallPass,
|
|
summary: {
|
|
totalFamilies: familyResults.length,
|
|
passed: passCount,
|
|
failed: familyResults.length - passCount,
|
|
totalCountries: scores.size,
|
|
},
|
|
};
|
|
|
|
try {
|
|
await redisSet(url, token, BACKTEST_RESULT_KEY, output, BACKTEST_TTL_SECONDS);
|
|
console.log(`Results written to Redis: ${BACKTEST_RESULT_KEY} (TTL: ${BACKTEST_TTL_SECONDS}s)`);
|
|
} catch (err) {
|
|
console.warn(`[WARN] Failed to write to Redis: ${err.message}`);
|
|
}
|
|
|
|
try {
|
|
mkdirSync(VALIDATION_DIR, { recursive: true });
|
|
const jsonPath = join(VALIDATION_DIR, 'backtest-results.json');
|
|
writeFileSync(jsonPath, JSON.stringify(output, null, 2) + '\n');
|
|
console.log(`Results written to: ${jsonPath}`);
|
|
} catch (err) {
|
|
console.warn(`[WARN] Failed to write JSON: ${err.message}`);
|
|
}
|
|
|
|
console.log('');
|
|
console.log('=== SUMMARY ===');
|
|
console.log('');
|
|
console.log('Family AUC Gate Status');
|
|
console.log('------------------------ ----- ----- ------');
|
|
for (const f of familyResults) {
|
|
const name = f.label.padEnd(24);
|
|
const auc = f.auc.toFixed(3);
|
|
const gate = (f.threshold - f.gateWidth).toFixed(2);
|
|
const status = f.pass ? 'PASS' : 'FAIL';
|
|
console.log(`${name} ${auc} ${gate} ${status}`);
|
|
}
|
|
console.log('');
|
|
console.log(`Overall: ${passCount}/${familyResults.length} families passed. ${overallPass ? 'ALL GATES MET.' : 'SOME GATES FAILED.'}`);
|
|
|
|
return output;
|
|
}
|
|
|
|
const isMain = process.argv[1]?.replace(/\\/g, '/').endsWith('backtest-resilience-outcomes.mjs');
|
|
if (isMain) {
|
|
runBacktest().catch((err) => {
|
|
console.error(`FATAL: ${err.message || err}`);
|
|
process.exitCode = 1;
|
|
});
|
|
}
|
|
|
|
export {
|
|
computeAuc,
|
|
trapezoidArea,
|
|
checkGate,
|
|
detectFxStress,
|
|
detectSovereignStress,
|
|
detectPowerOutages,
|
|
detectFoodCrisis,
|
|
detectRefugeeSurges,
|
|
detectSanctionsShocks,
|
|
detectConflictSpillover,
|
|
findFalseNegatives,
|
|
findFalsePositives,
|
|
EVENT_FAMILIES,
|
|
SOVEREIGN_STRESS_COUNTRIES_2024_2025,
|
|
AUC_THRESHOLD,
|
|
GATE_WIDTH,
|
|
runBacktest,
|
|
};
|