mirror of
https://github.com/koala73/worldmonitor.git
synced 2026-04-25 17:14:57 +02:00
* fix(intelligence): include framework/systemAppend hash in cache keys (todos 041, 045, 051) * fix(intelligence): gate framework/systemAppend on server-side PRO check (todo 042) * fix(skills): exact hostname allowlist + redirect:manual to prevent SSRF (todos 043, 054) * fix(intelligence): sanitize systemAppend against prompt injection before LLM (todo 044) * fix(intelligence): use framework field in DeductionPanel, fix InsightsPanel double increment (todos 046, 047) * fix(intelligence): settings export, hot-path cache, country-brief debounce (todos 048, 049, 050) * fix(intelligence): i18n, FrameworkSelector note, stripThinkingTags dedup, UUID IDs (todos 052, 055, 056, 057) - i18n Analysis Frameworks settings section (en + fr locales, replace all hardcoded English strings with t() calls) - FrameworkSelector: replace panelId==='insights' hardcode with note? option; both InsightsPanel and DailyMarketBriefPanel pass note - stripThinkingTags: remove inline duplicate in summarize-article.ts, import from _shared/llm; add Strip unterminated comment so tests can locate the section - Replace Date.now() IDs for imported frameworks with crypto.randomUUID() - Drop 'not supported in phase 1' phrasing to 'not supported' - test: fix summarize-reasoning Fix 2 suite to read from llm.ts - test: add premium-check-stub and wire into redis-caching country intel brief importPatchedTsModule so test can resolve the new import * fix(security): address P1 review findings from PR #2386 - premium-check: require `required: true` from validateApiKey so trusted browser origins (worldmonitor.app, Vercel previews, localhost) are not treated as PRO callers; fixes free-user bypass of framework/systemAppend gate - llm: replace weak sanitizeSystemAppend with sanitizeForPrompt from llm-sanitize.js; all callLlm callers now get model-delimiter and control-char stripping, not just phrase blocklist - get-country-intel-brief: apply sanitizeForPrompt to contextSnapshot before injecting into user prompt; fixes unsanitized query-param injection Closes todos 060, 061, 062 (P1 — blocked merge of #2386). * chore(todos): mark P1 todos 060-062 complete * fix(agentskills): address Greptile P2 review comments - hoist ALLOWED_AGENTSKILLS_HOSTS Set to module scope (was reallocated per-request) - add res.type === 'opaqueredirect' check alongside the 3xx guard; Edge Runtime returns status=0 for opaque redirects so the status range check alone is dead code
23 lines
1.0 KiB
TypeScript
23 lines
1.0 KiB
TypeScript
// @ts-expect-error — JS module, no declaration file
|
|
import { validateApiKey } from '../../api/_api-key.js';
|
|
import { validateBearerToken } from '../auth-session';
|
|
|
|
/**
|
|
* Returns true when the caller has a valid API key OR a PRO bearer token.
|
|
* Used by handlers where the RPC endpoint is public but certain fields
|
|
* (e.g. framework/systemAppend) should only be honored for premium callers.
|
|
*/
|
|
export async function isCallerPremium(request: Request): Promise<boolean> {
|
|
const keyCheck = validateApiKey(request, {}) as { valid: boolean; required: boolean };
|
|
// Only treat as premium when an explicit API key was validated (required: true).
|
|
// Trusted-origin short-circuits (required: false) do NOT imply PRO entitlement.
|
|
if (keyCheck.valid && keyCheck.required) return true;
|
|
|
|
const authHeader = request.headers.get('Authorization');
|
|
if (authHeader?.startsWith('Bearer ')) {
|
|
const session = await validateBearerToken(authHeader.slice(7));
|
|
return session.valid && session.role === 'pro';
|
|
}
|
|
return false;
|
|
}
|