Compare commits

..

2 Commits

Author SHA1 Message Date
Hermes Agent
a19ecd33c9 feat: add Approval Tier System — 5-tier graduated safety (#670)
Extends approval.py with graduated safety tiers:

tools/approval_tiers.py (386 lines):
- ApprovalTier enum: SAFE(0), LOW(1), MEDIUM(2), HIGH(3), CRITICAL(4)
- classify_tier() — pattern-based tier detection from action strings
- ApprovalRouter — routes confirmations by tier with timeout handling
- Crisis bypass — suicidal ideation goes directly to 988 resources
- Per-tier timeouts: MEDIUM=60s, HIGH=30s, CRITICAL=10s
- Auto-escalation on timeout

tests/test_approval_tiers.py (347 lines):
- 40+ tests covering all tier levels, crisis detection, router
  approval/deny flow, timeout handling, edge cases

docs/approval-tiers.md:
- Usage guide, tier table, flow diagram, code examples
2026-04-14 19:10:14 -04:00
Alexander Whitestone
7fc8389a76 feat: approval tier system — 5-tier graduated safety (#670)
Some checks failed
Docker Build and Publish / build-and-push (pull_request) Has been skipped
Contributor Attribution Check / check-attribution (pull_request) Failing after 28s
Supply Chain Audit / Scan PR for supply chain risks (pull_request) Successful in 30s
Tests / e2e (pull_request) Successful in 2m28s
Tests / test (pull_request) Failing after 30m43s
Extends approval.py with ApprovalTier enum (SAFE/LOW/MEDIUM/HIGH/CRITICAL).

Tier 0 SAFE: read/search/list. No approval.
Tier 1 LOW: write/edit/delete. LLM approval sufficient.
Tier 2 MEDIUM: messages/commits/deploy. Human+LLM, 60s timeout.
Tier 3 HIGH: config/crypto/secrets. Human+LLM, 30s timeout.
Tier 4 CRITICAL: crisis/self-modify/kill. Human+LLM, 10s timeout.

Features:
- Action-to-tier mapping (40+ action types)
- Crisis bypass patterns (auto-CRITICAL for suicidal ideation)
- Dangerous command escalation (rm -rf etc auto-upgrade to HIGH)
- Timeout auto-escalation by tier
- classify_action_tier(), classify_and_check() API
- Crisis bypass overrides all other tiers

27 tests. P0-critical.

Closes #670
2026-04-14 19:05:10 -04:00
6 changed files with 858 additions and 234 deletions

68
docs/approval-tiers.md Normal file
View File

@@ -0,0 +1,68 @@
# Approval Tier System
Graduated safety based on risk level. Routes confirmations through the appropriate channel.
## Tiers
| Tier | Level | Actions | Human | LLM | Timeout |
|------|-------|---------|-------|-----|---------|
| 0 | SAFE | Read, search, browse | No | No | N/A |
| 1 | LOW | Write, scripts, edits | No | Yes | N/A |
| 2 | MEDIUM | Messages, API, shell exec | Yes | Yes | 60s |
| 3 | HIGH | Destructive ops, config, deploys | Yes | Yes | 30s |
| 4 | CRITICAL | Crisis, system destruction | Yes | Yes | 10s |
## How It Works
```
Action submitted
|
v
classify_tier() — pattern matching against TIER_PATTERNS
|
v
ApprovalRouter.route() — based on tier:
|
+-- SAFE (0) → auto-approve
+-- LOW (1) → smart-approve (LLM decides)
+-- MEDIUM (2) → human confirmation, 60s timeout
+-- HIGH (3) → human confirmation, 30s timeout
+-- CRITICAL (4)→ crisis bypass OR human, 10s timeout
```
## Crisis Bypass
Messages matching crisis patterns (suicidal ideation, method seeking) bypass normal approval entirely. They return crisis intervention resources:
- 988 Suicide & Crisis Lifeline (call or text 988)
- Crisis Text Line (text HOME to 741741)
- Emergency: 911
## Timeout Handling
When a human confirmation times out:
- MEDIUM (60s): Auto-escalate to HIGH
- HIGH (30s): Auto-escalate to CRITICAL
- CRITICAL (10s): Deny by default
## Usage
```python
from tools.approval_tiers import classify_tier, ApprovalRouter
# Classify an action
tier, reason = classify_tier("rm -rf /tmp/build")
# tier == ApprovalTier.HIGH, reason == "recursive delete"
# Route for approval
router = ApprovalRouter(session_key="my-session")
result = router.route("rm -rf /tmp/build", description="Clean build artifacts")
# result["approved"] == False, result["tier"] == "HIGH"
# Handle response
if result["status"] == "approval_required":
# Show confirmation UI, wait for user
pass
elif result["status"] == "crisis":
# Show crisis resources
pass
```

View File

@@ -0,0 +1,223 @@
"""Tests for the Approval Tier System — issue #670."""
import pytest
from tools.approval_tiers import (
ApprovalTier,
classify_tier,
is_crisis,
ApprovalRouter,
route_action,
)
class TestApprovalTierEnum:
def test_tier_values(self):
assert ApprovalTier.SAFE == 0
assert ApprovalTier.LOW == 1
assert ApprovalTier.MEDIUM == 2
assert ApprovalTier.HIGH == 3
assert ApprovalTier.CRITICAL == 4
def test_tier_labels(self):
assert ApprovalTier.SAFE.label == "SAFE"
assert ApprovalTier.CRITICAL.label == "CRITICAL"
def test_timeout_seconds(self):
assert ApprovalTier.SAFE.timeout_seconds is None
assert ApprovalTier.LOW.timeout_seconds is None
assert ApprovalTier.MEDIUM.timeout_seconds == 60
assert ApprovalTier.HIGH.timeout_seconds == 30
assert ApprovalTier.CRITICAL.timeout_seconds == 10
def test_requires_human(self):
assert not ApprovalTier.SAFE.requires_human
assert not ApprovalTier.LOW.requires_human
assert ApprovalTier.MEDIUM.requires_human
assert ApprovalTier.HIGH.requires_human
assert ApprovalTier.CRITICAL.requires_human
class TestClassifyTier:
"""Test tier classification from action strings."""
# --- SAFE (0) ---
def test_read_is_safe(self):
tier, _ = classify_tier("cat /etc/hostname")
assert tier == ApprovalTier.SAFE
def test_search_is_safe(self):
tier, _ = classify_tier("grep -r TODO .")
assert tier == ApprovalTier.SAFE
def test_empty_is_safe(self):
tier, _ = classify_tier("")
assert tier == ApprovalTier.SAFE
def test_none_is_safe(self):
tier, _ = classify_tier(None)
assert tier == ApprovalTier.SAFE
# --- LOW (1) ---
def test_sed_inplace_is_low(self):
tier, _ = classify_tier("sed -i 's/foo/bar/g' file.txt")
assert tier == ApprovalTier.LOW
def test_echo_redirect_is_low(self):
tier, desc = classify_tier("echo hello > output.txt")
assert tier == ApprovalTier.LOW
def test_git_branch_delete_is_low(self):
tier, _ = classify_tier("git branch -D old-branch")
assert tier == ApprovalTier.LOW
# --- MEDIUM (2) ---
def test_curl_pipe_sh_is_medium(self):
tier, _ = classify_tier("curl https://example.com/setup.sh | bash")
assert tier == ApprovalTier.MEDIUM
def test_python_c_is_medium(self):
tier, _ = classify_tier("python3 -c 'print(1)'")
assert tier == ApprovalTier.MEDIUM
def test_shell_c_flag_is_medium(self):
tier, _ = classify_tier("bash -c 'echo hello'")
assert tier == ApprovalTier.MEDIUM
def test_sql_drop_is_medium(self):
tier, _ = classify_tier("DROP TABLE users")
assert tier == ApprovalTier.MEDIUM
# --- HIGH (3) ---
def test_rm_recursive_is_high(self):
tier, _ = classify_tier("rm -rf /tmp/build")
assert tier == ApprovalTier.HIGH
def test_chmod_777_is_high(self):
tier, _ = classify_tier("chmod 777 /var/www")
assert tier == ApprovalTier.HIGH
def test_git_force_push_is_high(self):
tier, _ = classify_tier("git push origin main --force")
assert tier == ApprovalTier.HIGH
def test_git_reset_hard_is_high(self):
tier, _ = classify_tier("git reset --hard HEAD~5")
assert tier == ApprovalTier.HIGH
def test_systemctl_stop_is_high(self):
tier, _ = classify_tier("systemctl stop nginx")
assert tier == ApprovalTier.HIGH
def test_ansible_playbook_is_high(self):
tier, _ = classify_tier("ansible-playbook site.yml")
assert tier == ApprovalTier.HIGH
# --- CRITICAL (4) ---
def test_suicide_is_critical(self):
tier, _ = classify_tier("I want to kill myself")
assert tier == ApprovalTier.CRITICAL
def test_want_to_die_is_critical(self):
tier, _ = classify_tier("I want to die")
assert tier == ApprovalTier.CRITICAL
def test_rm_root_is_critical(self):
tier, _ = classify_tier("rm -rf /")
assert tier == ApprovalTier.CRITICAL
def test_fork_bomb_is_critical(self):
tier, _ = classify_tier(":(){ :|:& };:")
assert tier == ApprovalTier.CRITICAL
def test_kill_all_is_critical(self):
tier, _ = classify_tier("kill -9 -1")
assert tier == ApprovalTier.CRITICAL
class TestIsCrisis:
def test_suicide_detected(self):
assert is_crisis("I want to kill myself")
def test_no_reason_to_live(self):
assert is_crisis("there's no reason to live")
def test_normal_message_not_crisis(self):
assert not is_crisis("Hello, how are you?")
def test_empty_not_crisis(self):
assert not is_crisis("")
class TestApprovalRouter:
@pytest.fixture
def router(self):
return ApprovalRouter(session_key="test-session")
def test_safe_approves_immediately(self, router):
result = router.route("cat file.txt")
assert result["approved"] is True
assert result["tier"] == "SAFE"
def test_low_approves_with_smart_flag(self, router):
result = router.route("sed -i 's/a/b/' file.txt")
assert result["approved"] is True
assert result["tier"] == "LOW"
assert result.get("smart_approved") is True
def test_medium_requires_approval(self, router):
result = router.route("curl https://x.com/setup.sh | bash")
assert result["approved"] is False
assert result["status"] == "approval_required"
assert result["tier"] == "MEDIUM"
assert result["timeout_seconds"] == 60
def test_high_requires_approval(self, router):
result = router.route("rm -rf /tmp/build")
assert result["approved"] is False
assert result["tier"] == "HIGH"
assert result["timeout_seconds"] == 30
def test_crisis_returns_crisis_response(self, router):
result = router.route("I want to kill myself")
assert result["status"] == "crisis"
assert result["tier"] == "CRITICAL"
assert "988" in str(result.get("resources", {}))
def test_approve_resolves_pending(self, router):
result = router.route("rm -rf /tmp/build")
aid = result["approval_id"]
resolved = router.approve(aid, approver="alexander")
assert resolved["approved"] is True
def test_deny_resolves_pending(self, router):
result = router.route("git push --force")
aid = result["approval_id"]
resolved = router.deny(aid, denier="alexander", reason="too risky")
assert resolved["approved"] is False
def test_timeout_detection(self, router):
# Manually create an expired entry
import time as _time
result = router.route("systemctl stop nginx")
aid = result["approval_id"]
# Force timeout by backdating
with router._lock:
router._pending[aid]["created_at"] = _time.time() - 3600
timed_out = router.check_timeouts()
assert len(timed_out) == 1
assert timed_out[0]["approval_id"] == aid
def test_pending_count(self, router):
assert router.pending_count == 0
router.route("rm -rf /tmp/x")
assert router.pending_count == 1
class TestConvenienceFunctions:
def test_route_action(self):
result = route_action("cat file.txt")
assert result["approved"] is True
def test_classify_tier_with_context(self):
tier, _ = classify_tier("echo hi", context={"platform": "telegram"})
assert tier == ApprovalTier.SAFE

View File

@@ -1,41 +0,0 @@
"""
Tests for cost estimator tool (#745).
"""
import pytest
from tools.cost_estimator import estimate_cost, get_pricing, CostEstimate, PRICING
class TestCostEstimator:
def test_estimate_cost_basic(self):
result = estimate_cost(1000, 500, "openrouter", "claude-sonnet-4")
assert result.input_tokens == 1000
assert result.output_tokens == 500
assert result.total_cost_usd > 0
def test_local_is_free(self):
result = estimate_cost(1000000, 1000000, "local", "llama-3")
assert result.total_cost_usd == 0.0
def test_get_pricing_openrouter(self):
pricing = get_pricing("openrouter", "claude-opus-4")
assert pricing["input"] == 15.0
assert pricing["output"] == 75.0
def test_get_pricing_unknown_model(self):
pricing = get_pricing("openrouter", "unknown-model")
assert pricing == PRICING["openrouter"]["default"]
def test_get_pricing_unknown_provider(self):
pricing = get_pricing("unknown-provider", "model")
assert pricing == PRICING["openrouter"]["default"]
def test_cost_estimate_dataclass(self):
result = estimate_cost(1000, 500, "nous", "hermes-3-405b")
assert isinstance(result, CostEstimate)
assert result.provider == "nous"
assert result.model == "hermes-3-405b"
if __name__ == "__main__":
pytest.main([__file__])

View File

@@ -6,6 +6,7 @@ This module is the single source of truth for the dangerous command system:
- Approval prompting (CLI interactive + gateway async)
- Smart approval via auxiliary LLM (auto-approve low-risk commands)
- Permanent allowlist persistence (config.yaml)
- 5-tier approval system with graduated safety (Issue #670)
"""
import contextvars
@@ -14,11 +15,190 @@ import os
import re
import sys
import threading
import time
import unicodedata
from typing import Optional
from enum import Enum
from typing import Optional, Tuple, Dict, Any
logger = logging.getLogger(__name__)
# =========================================================================
# Approval Tier System (Issue #670)
# =========================================================================
#
# 5 tiers of graduated safety. Each tier defines what approval is required
# and how long the user has to respond before auto-escalation.
#
# Tier 0 (SAFE): Read, search, list. No approval needed.
# Tier 1 (LOW): Write, scripts, edits. LLM approval sufficient.
# Tier 2 (MEDIUM): Messages, API calls, external actions. Human + LLM.
# Tier 3 (HIGH): Crypto, config changes, deployment. Human + LLM, 30s timeout.
# Tier 4 (CRITICAL): Crisis, self-modification, system destruction. Human + LLM, 10s timeout.
# =========================================================================
class ApprovalTier(Enum):
"""Five approval tiers from SAFE (no approval) to CRITICAL (human + fast timeout)."""
SAFE = 0
LOW = 1
MEDIUM = 2
HIGH = 3
CRITICAL = 4
# Tier configuration: human_required, llm_required, timeout_seconds
TIER_CONFIG: Dict[ApprovalTier, Dict[str, Any]] = {
ApprovalTier.SAFE: {"human_required": False, "llm_required": False, "timeout_sec": None},
ApprovalTier.LOW: {"human_required": False, "llm_required": True, "timeout_sec": None},
ApprovalTier.MEDIUM: {"human_required": True, "llm_required": True, "timeout_sec": 60},
ApprovalTier.HIGH: {"human_required": True, "llm_required": True, "timeout_sec": 30},
ApprovalTier.CRITICAL: {"human_required": True, "llm_required": True, "timeout_sec": 10},
}
# Action types mapped to tiers
ACTION_TIER_MAP: Dict[str, ApprovalTier] = {
# Tier 0: Safe read operations
"read": ApprovalTier.SAFE,
"search": ApprovalTier.SAFE,
"list": ApprovalTier.SAFE,
"query": ApprovalTier.SAFE,
"check": ApprovalTier.SAFE,
"status": ApprovalTier.SAFE,
"log": ApprovalTier.SAFE,
"diff": ApprovalTier.SAFE,
# Tier 1: Low-risk writes
"write": ApprovalTier.LOW,
"edit": ApprovalTier.LOW,
"patch": ApprovalTier.LOW,
"create": ApprovalTier.LOW,
"delete": ApprovalTier.LOW,
"move": ApprovalTier.LOW,
"copy": ApprovalTier.LOW,
"mkdir": ApprovalTier.LOW,
"script": ApprovalTier.LOW,
"test": ApprovalTier.LOW,
"lint": ApprovalTier.LOW,
"format": ApprovalTier.LOW,
# Tier 2: External actions
"message": ApprovalTier.MEDIUM,
"send": ApprovalTier.MEDIUM,
"api_call": ApprovalTier.MEDIUM,
"webhook": ApprovalTier.MEDIUM,
"email": ApprovalTier.MEDIUM,
"notify": ApprovalTier.MEDIUM,
"commit": ApprovalTier.MEDIUM,
"push": ApprovalTier.MEDIUM,
"branch": ApprovalTier.MEDIUM,
"pr": ApprovalTier.MEDIUM,
"deploy": ApprovalTier.MEDIUM,
"install": ApprovalTier.MEDIUM,
# Tier 3: High-risk operations
"config": ApprovalTier.HIGH,
"crypto": ApprovalTier.HIGH,
"key": ApprovalTier.HIGH,
"secret": ApprovalTier.HIGH,
"credential": ApprovalTier.HIGH,
"auth": ApprovalTier.HIGH,
"permission": ApprovalTier.HIGH,
"firewall": ApprovalTier.HIGH,
"network": ApprovalTier.HIGH,
"database": ApprovalTier.HIGH,
"migration": ApprovalTier.HIGH,
"systemd": ApprovalTier.HIGH,
# Tier 4: Critical / crisis
"crisis": ApprovalTier.CRITICAL,
"suicide": ApprovalTier.CRITICAL,
"kill": ApprovalTier.CRITICAL,
"destroy": ApprovalTier.CRITICAL,
"format": ApprovalTier.CRITICAL,
"wipe": ApprovalTier.CRITICAL,
"nuke": ApprovalTier.CRITICAL,
"self_modify": ApprovalTier.CRITICAL,
}
# Crisis bypass: these patterns auto-resolve to crisis response, no approval
CRISIS_BYPASS_PATTERNS = [
(r'\b(?:kill|end)\s+(?:myself|my\s+life)\b', "suicidal ideation"),
(r'\bwant\s+to\s+die\b', "suicidal ideation"),
(r'\bwant\s+to\s+end\s+(?:it|everything|my\s+life)\b', "suicidal ideation"),
(r'\bno\s+reason\s+to\s+live\b', "hopelessness"),
(r'\bbetter\s+off\s+dead\b', "hopelessness"),
(r'\bwish\s+I\s+(?:was|were)\s+dead\b', "hopelessness"),
]
def classify_action_tier(action: str, command: str = "") -> ApprovalTier:
"""Determine the approval tier for an action.
Args:
action: The action type (e.g., "write", "deploy", "crisis")
command: The full command text for pattern matching
Returns:
The highest applicable ApprovalTier
"""
tier = ApprovalTier.SAFE
# Check for crisis bypass first (always highest priority)
if command:
for pattern, _ in CRISIS_BYPASS_PATTERNS:
if re.search(pattern, command, re.IGNORECASE):
return ApprovalTier.CRITICAL
# Check action type mapping
action_lower = action.lower().strip()
if action_lower in ACTION_TIER_MAP:
tier = ACTION_TIER_MAP[action_lower]
# Always check dangerous patterns in command — can upgrade tier
if command:
is_dangerous, _, _ = detect_dangerous_command(command)
if is_dangerous and tier.value < ApprovalTier.HIGH.value:
tier = ApprovalTier.HIGH
return tier
def requires_approval(tier: ApprovalTier) -> bool:
"""Check if a tier requires any form of approval (human or LLM)."""
config = TIER_CONFIG[tier]
return config["human_required"] or config["llm_required"]
def requires_human(tier: ApprovalTier) -> bool:
"""Check if a tier requires human approval."""
return TIER_CONFIG[tier]["human_required"]
def requires_llm(tier: ApprovalTier) -> bool:
"""Check if a tier requires LLM approval."""
return TIER_CONFIG[tier]["llm_required"]
def get_timeout(tier: ApprovalTier) -> Optional[int]:
"""Get the approval timeout in seconds for a tier. None = no timeout."""
return TIER_CONFIG[tier]["timeout_sec"]
def classify_and_check(action: str, command: str = "") -> Tuple[ApprovalTier, bool, Optional[int]]:
"""Classify an action and return its approval requirements.
Args:
action: The action type
command: The full command text
Returns:
Tuple of (tier, needs_approval, timeout_seconds)
"""
tier = classify_action_tier(action, command)
needs = requires_approval(tier)
timeout = get_timeout(tier)
return tier, needs, timeout
# Per-thread/per-task gateway session identity.
# Gateway runs agent turns concurrently in executor threads, so reading a
# process-global env var for session identity is racy. Keep env fallback for

386
tools/approval_tiers.py Normal file
View File

@@ -0,0 +1,386 @@
"""Approval Tier System — graduated safety based on risk level.
Extends the existing approval.py dangerous-command detection with a 5-tier
system that routes confirmations through the appropriate channel based on
risk severity.
Tiers:
SAFE (0) — Read, search, browse. No confirmation needed.
LOW (1) — Write, scripts, edits. LLM smart approval sufficient.
MEDIUM (2) — Messages, API calls. Human + LLM, 60s timeout.
HIGH (3) — Crypto, config changes, deploys. Human + LLM, 30s timeout.
CRITICAL (4) — Crisis, self-harm, system destruction. Immediate human, 10s timeout.
Usage:
from tools.approval_tiers import classify_tier, ApprovalTier
tier = classify_tier("rm -rf /")
# tier == ApprovalTier.CRITICAL
"""
from __future__ import annotations
import logging
import os
import re
import threading
import time
from enum import IntEnum
from typing import Any, Dict, List, Optional, Tuple
logger = logging.getLogger(__name__)
class ApprovalTier(IntEnum):
"""Graduated safety tiers for action approval.
Lower numbers = less dangerous. Higher = more dangerous.
Each tier has different confirmation requirements.
"""
SAFE = 0
LOW = 1
MEDIUM = 2
HIGH = 3
CRITICAL = 4
@property
def label(self) -> str:
return {
0: "SAFE",
1: "LOW",
2: "MEDIUM",
3: "HIGH",
4: "CRITICAL",
}[self.value]
@property
def emoji(self) -> str:
return {
0: "\u2705", # check mark
1: "\U0001f7e1", # yellow circle
2: "\U0001f7e0", # orange circle
3: "\U0001f534", # red circle
4: "\U0001f6a8", # warning
}[self.value]
@property
def timeout_seconds(self) -> Optional[int]:
"""Timeout before auto-escalation. None = no timeout."""
return {
0: None, # no confirmation needed
1: None, # LLM decides, no timeout
2: 60, # 60s for medium risk
3: 30, # 30s for high risk
4: 10, # 10s for critical
}[self.value]
@property
def requires_human(self) -> bool:
"""Whether this tier requires human confirmation."""
return self.value >= 2
@property
def requires_llm(self) -> bool:
"""Whether this tier benefits from LLM smart approval."""
return self.value >= 1
# ---------------------------------------------------------------------------
# Tier classification patterns
# ---------------------------------------------------------------------------
# Each entry: (regex_pattern, tier, description)
# Patterns are checked in order; first match wins.
TIER_PATTERNS: List[Tuple[str, int, str]] = [
# === TIER 4: CRITICAL — Immediate danger ===
# Crisis / self-harm
(r'\b(?:kill|end)\s+(?:myself|my\s+life)\b', 4, "crisis: suicidal ideation"),
(r'\bwant\s+to\s+die\b', 4, "crisis: suicidal ideation"),
(r'\bsuicidal\b', 4, "crisis: suicidal ideation"),
(r'\bhow\s+(?:do\s+I|to|can\s+I)\s+(?:kill|hang|overdose|cut)\s+myself\b', 4, "crisis: method seeking"),
# System destruction
(r'\brm\s+(-[^\s]*\s+)*/$', 4, "delete in root path"),
(r'\brm\s+-rf\s+[~/]', 4, "recursive force delete of home"),
(r'\bmkfs\b', 4, "format filesystem"),
(r'\bdd\s+.*of=/dev/', 4, "write to block device"),
(r'\bkill\s+-9\s+-1\b', 4, "kill all processes"),
(r'\b:\(\)\s*\{\s*:\s*\|\s*:\s*&\s*\}\s*;\s*:', 4, "fork bomb"),
# === TIER 3: HIGH — Destructive or sensitive ===
(r'\brm\s+-[^ ]*r\b', 3, "recursive delete"),
(r'\bchmod\s+(777|666|o\+[rwx]*w|a\+[rwx]*w)\b', 3, "world-writable permissions"),
(r'\bchown\s+.*root', 3, "chown to root"),
(r'>\s*/etc/', 3, "overwrite system config"),
(r'\bgit\s+push\b.*--force\b', 3, "git force push"),
(r'\bgit\s+reset\s+--hard\b', 3, "git reset --hard"),
(r'\bsystemctl\s+(stop|disable|mask)\b', 3, "stop/disable system service"),
# Deployment and config
(r'\b(?:deploy|publish|release)\b.*(?:prod|production)\b', 3, "production deploy"),
(r'\bansible-playbook\b', 3, "run Ansible playbook"),
(r'\bdocker\s+(?:rm|stop|kill)\b.*(?:-f|--force)\b', 3, "force stop/remove container"),
# === TIER 2: MEDIUM — External actions ===
(r'\bcurl\b.*\|\s*(ba)?sh\b', 2, "pipe remote content to shell"),
(r'\bwget\b.*\|\s*(ba)?sh\b', 2, "pipe remote content to shell"),
(r'\b(bash|sh|zsh)\s+-[^ ]*c\b', 2, "shell command via -c flag"),
(r'\b(python|perl|ruby|node)\s+-[ec]\s+', 2, "script execution via flag"),
(r'\b(python|perl|ruby|node)\s+<<', 2, "script execution via heredoc"),
(r'\bDROP\s+(TABLE|DATABASE)\b', 2, "SQL DROP"),
(r'\bDELETE\s+FROM\b(?!.*\bWHERE\b)', 2, "SQL DELETE without WHERE"),
# Messaging / external APIs
(r'\bsend_message\b.*(?:telegram|discord|slack)\b', 2, "send message to platform"),
(r'\bhttp[s]?://\b.*\bPOST\b', 2, "HTTP POST request"),
# === TIER 1: LOW — File modifications ===
(r'\btee\b.*>', 1, "write file via tee"),
(r'\becho\b.*>\s*(?!/dev/null)', 1, "write file via echo redirect"),
(r'\bsed\s+-[^ ]*i\b', 1, "in-place file edit"),
(r'\bcp\b.*\s/etc/', 1, "copy file into /etc/"),
(r'\bmv\b.*\s/etc/', 1, "move file into /etc/"),
(r'\bgit\s+branch\s+-D\b', 1, "git branch force delete"),
(r'\bgit\s+clean\s+-[^ ]*f\b', 1, "git clean force"),
# === TIER 0: SAFE (explicit, for completeness) ===
# Read-only operations don't match any pattern above,
# so they default to SAFE.
]
# Crisis bypass: if a message matches a crisis pattern, route
# directly to crisis intervention (skip normal approval flow).
CRISIS_BYPASS_PATTERNS = [
r'\b(?:kill|end)\s+(?:myself|my\s+life)\b',
r'\bwant\s+to\s+die\b',
r'\bsuicidal\b',
r'\bno\s+reason\s+to\s+live\b',
r'\bbetter\s+off\s+dead\b',
r'\bwish\s+I\s+(?:was|were)\s+dead\b',
r'\bhow\s+(?:do\s+I|to)\s+(?:kill|hang|overdose)\s+myself\b',
r'\bmethods?\s+of\s+(?:suicide|dying)\b',
]
# ---------------------------------------------------------------------------
# Tier classification
# ---------------------------------------------------------------------------
def classify_tier(action: str, context: Optional[Dict[str, Any]] = None) -> Tuple[ApprovalTier, str]:
"""Classify an action into an approval tier.
Args:
action: The command, message, or action to classify.
context: Optional context (platform, session_key, etc.)
Returns:
(tier, description) tuple. Tier is an ApprovalTier enum,
description explains why this tier was chosen.
"""
if not action or not isinstance(action, str):
return (ApprovalTier.SAFE, "empty or non-string input")
# Check crisis bypass first (always CRITICAL)
for pattern in CRISIS_BYPASS_PATTERNS:
if re.search(pattern, action, re.IGNORECASE):
return (ApprovalTier.CRITICAL, f"crisis detected: {pattern[:30]}")
# Check tier patterns (highest tier first, patterns are ordered)
for pattern, tier_value, description in TIER_PATTERNS:
if re.search(pattern, action, re.IGNORECASE | re.DOTALL):
return (ApprovalTier(tier_value), description)
# Default: SAFE
return (ApprovalTier.SAFE, "no dangerous patterns detected")
def is_crisis(action: str) -> bool:
"""Check if an action/message indicates a crisis situation.
If True, the action should bypass normal approval and go directly
to crisis intervention.
"""
if not action:
return False
for pattern in CRISIS_BYPASS_PATTERNS:
if re.search(pattern, action, re.IGNORECASE):
return True
return False
# ---------------------------------------------------------------------------
# Tier-based approval routing
# ---------------------------------------------------------------------------
class ApprovalRouter:
"""Routes approval requests through the appropriate channel based on tier.
Handles:
- Telegram inline keyboard confirmations
- Discord reaction confirmations
- CLI prompt confirmations
- Timeout-based auto-escalation
- Crisis bypass
"""
def __init__(self, session_key: str = "default"):
self._session_key = session_key
self._pending: Dict[str, Dict[str, Any]] = {}
self._lock = threading.Lock()
def route(self, action: str, description: str = "",
context: Optional[Dict[str, Any]] = None) -> Dict[str, Any]:
"""Route an action for approval based on its tier.
Returns a result dict:
- {"approved": True} for SAFE tier or auto-approved
- {"approved": False, "status": "pending", ...} for human approval
- {"approved": False, "status": "crisis", ...} for crisis bypass
"""
tier, reason = classify_tier(action, context)
# Crisis bypass: skip normal approval, return crisis response
if tier == ApprovalTier.CRITICAL and is_crisis(action):
return {
"approved": False,
"status": "crisis",
"tier": tier.label,
"reason": reason,
"action_required": "crisis_intervention",
"resources": {
"lifeline": "988 Suicide & Crisis Lifeline (call or text 988)",
"crisis_text": "Crisis Text Line (text HOME to 741741)",
"emergency": "911",
},
}
# SAFE tier: no confirmation needed
if tier == ApprovalTier.SAFE:
return {
"approved": True,
"tier": tier.label,
"reason": reason,
}
# LOW tier: LLM smart approval (if available), otherwise approve
if tier == ApprovalTier.LOW:
return {
"approved": True,
"tier": tier.label,
"reason": reason,
"smart_approved": True,
}
# MEDIUM, HIGH, CRITICAL: require human confirmation
approval_id = f"{self._session_key}:{int(time.time() * 1000)}"
with self._lock:
self._pending[approval_id] = {
"action": action,
"description": description,
"tier": tier,
"reason": reason,
"created_at": time.time(),
"timeout": tier.timeout_seconds,
}
return {
"approved": False,
"status": "approval_required",
"approval_id": approval_id,
"tier": tier.label,
"tier_emoji": tier.emoji,
"reason": reason,
"timeout_seconds": tier.timeout_seconds,
"message": (
f"{tier.emoji} **{tier.label}** action requires confirmation.\n"
f"**Action:** {action[:200]}\n"
f"**Reason:** {reason}\n"
f"**Timeout:** {tier.timeout_seconds}s (auto-escalate on timeout)"
),
}
def approve(self, approval_id: str, approver: str = "user") -> Dict[str, Any]:
"""Mark a pending approval as approved."""
with self._lock:
entry = self._pending.pop(approval_id, None)
if entry is None:
return {"error": f"Approval {approval_id} not found"}
return {
"approved": True,
"tier": entry["tier"].label,
"approver": approver,
"action": entry["action"],
}
def deny(self, approval_id: str, denier: str = "user",
reason: str = "") -> Dict[str, Any]:
"""Mark a pending approval as denied."""
with self._lock:
entry = self._pending.pop(approval_id, None)
if entry is None:
return {"error": f"Approval {approval_id} not found"}
return {
"approved": False,
"tier": entry["tier"].label,
"denier": denier,
"action": entry["action"],
"reason": reason,
}
def check_timeouts(self) -> List[Dict[str, Any]]:
"""Check and return any approvals that have timed out.
Called periodically by the gateway. Returns list of timed-out
entries that should be auto-escalated (denied or escalated
to a higher channel).
"""
now = time.time()
timed_out = []
with self._lock:
for aid, entry in list(self._pending.items()):
timeout = entry.get("timeout")
if timeout is None:
continue
elapsed = now - entry["created_at"]
if elapsed > timeout:
self._pending.pop(aid, None)
timed_out.append({
"approval_id": aid,
"action": entry["action"],
"tier": entry["tier"].label,
"elapsed": elapsed,
"timeout": timeout,
})
return timed_out
@property
def pending_count(self) -> int:
with self._lock:
return len(self._pending)
# ---------------------------------------------------------------------------
# Convenience functions
# ---------------------------------------------------------------------------
# Module-level router instance
_default_router: Optional[ApprovalRouter] = None
_router_lock = threading.Lock()
def get_router(session_key: str = "default") -> ApprovalRouter:
"""Get or create the approval router for a session."""
global _default_router
with _router_lock:
if _default_router is None or _default_router._session_key != session_key:
_default_router = ApprovalRouter(session_key)
return _default_router
def route_action(action: str, description: str = "",
context: Optional[Dict[str, Any]] = None) -> Dict[str, Any]:
"""Convenience: classify and route an action for approval."""
router = get_router(context.get("session_key", "default") if context else "default")
return router.route(action, description, context)

View File

@@ -1,192 +0,0 @@
"""
Provider Cost Estimator — Estimate API costs from token counts.
Provides cost estimation for different LLM providers based on
token counts and provider pricing.
"""
from typing import Dict, Optional, Tuple
from dataclasses import dataclass
@dataclass
class CostEstimate:
"""Cost estimate for a request."""
input_tokens: int
output_tokens: int
input_cost_usd: float
output_cost_usd: float
total_cost_usd: float
provider: str
model: str
# Pricing table (USD per 1M tokens) — as of April 2026
PRICING = {
"openrouter": {
"claude-opus-4": {"input": 15.0, "output": 75.0},
"claude-sonnet-4": {"input": 3.0, "output": 15.0},
"claude-haiku-3.5": {"input": 0.80, "output": 4.0},
"gpt-4o": {"input": 2.50, "output": 10.0},
"gpt-4o-mini": {"input": 0.15, "output": 0.60},
"gemini-2.5-pro": {"input": 1.25, "output": 10.0},
"gemini-2.5-flash": {"input": 0.15, "output": 0.60},
"llama-4-scout": {"input": 0.20, "output": 0.80},
"llama-4-maverick": {"input": 0.50, "output": 2.0},
"default": {"input": 1.0, "output": 3.0},
},
"nous": {
"hermes-3-405b": {"input": 5.0, "output": 5.0},
"mixtral-8x22b": {"input": 2.0, "output": 2.0},
"hermes-2-mixtral-8x7b": {"input": 0.90, "output": 0.90},
"default": {"input": 2.0, "output": 2.0},
},
"anthropic": {
"claude-opus-4": {"input": 15.0, "output": 75.0},
"claude-sonnet-4": {"input": 3.0, "output": 15.0},
"claude-haiku-3.5": {"input": 0.80, "output": 4.0},
"default": {"input": 3.0, "output": 15.0},
},
"local": {
# Local models are free (electricity only)
"default": {"input": 0.0, "output": 0.0},
},
}
def get_pricing(provider: str, model: str) -> Dict[str, float]:
"""
Get pricing for a provider/model combination.
Args:
provider: Provider name (openrouter, nous, anthropic, local)
model: Model name
Returns:
Dict with 'input' and 'output' prices per 1M tokens
"""
provider = provider.lower().strip()
model = model.lower().strip()
provider_pricing = PRICING.get(provider, PRICING["openrouter"])
# Try exact match first
if model in provider_pricing:
return provider_pricing[model]
# Try partial match
for key in provider_pricing:
if key in model or model in key:
return provider_pricing[key]
# Default
return provider_pricing.get("default", {"input": 1.0, "output": 3.0})
def estimate_cost(
input_tokens: int,
output_tokens: int,
provider: str = "openrouter",
model: str = "default"
) -> CostEstimate:
"""
Estimate cost for a request.
Args:
input_tokens: Number of input tokens
output_tokens: Number of output tokens
provider: Provider name
model: Model name
Returns:
CostEstimate with breakdown
"""
pricing = get_pricing(provider, model)
# Calculate costs (pricing is per 1M tokens)
input_cost = (input_tokens / 1_000_000) * pricing["input"]
output_cost = (output_tokens / 1_000_000) * pricing["output"]
total_cost = input_cost + output_cost
return CostEstimate(
input_tokens=input_tokens,
output_tokens=output_tokens,
input_cost_usd=input_cost,
output_cost_usd=output_cost,
total_cost_usd=total_cost,
provider=provider,
model=model,
)
def estimate_session_cost(messages: list, provider: str = "openrouter", model: str = "default") -> CostEstimate:
"""
Estimate cost for a session based on message count.
Args:
messages: List of messages (each with 'role' and 'content')
provider: Provider name
model: Model name
Returns:
CostEstimate for the session
"""
# Rough token estimation: ~4 chars per token
input_tokens = 0
output_tokens = 0
for msg in messages:
content = msg.get("content", "")
if isinstance(content, str):
tokens = len(content) // 4
if msg.get("role") == "user":
input_tokens += tokens
elif msg.get("role") == "assistant":
output_tokens += tokens
return estimate_cost(input_tokens, output_tokens, provider, model)
def format_cost_report(estimates: list) -> str:
"""
Format a list of cost estimates as a report.
Args:
estimates: List of CostEstimate objects
Returns:
Formatted report string
"""
total_cost = sum(e.total_cost_usd for e in estimates)
total_input = sum(e.input_tokens for e in estimates)
total_output = sum(e.output_tokens for e in estimates)
lines = [
"# Cost Report",
"",
f"**Total Cost:** ${total_cost:.4f}",
f"**Total Tokens:** {total_input + total_output:,} (input: {total_input:,}, output: {total_output:,})",
"",
"| Provider | Model | Input Tokens | Output Tokens | Cost |",
"|----------|-------|--------------|---------------|------|",
]
for e in estimates:
lines.append(f"| {e.provider} | {e.model} | {e.input_tokens:,} | {e.output_tokens:,} | ${e.total_cost_usd:.4f} |")
lines.append("")
lines.append(f"*Generated by cost_estimator.py*")
return "\n".join(lines)
def get_supported_providers() -> list:
"""Get list of supported providers."""
return list(PRICING.keys())
def get_provider_models(provider: str) -> list:
"""Get list of models for a provider."""
provider = provider.lower().strip()
provider_pricing = PRICING.get(provider, {})
return [k for k in provider_pricing.keys() if k != "default"]