Rename utils/arf_engine.py to utils/arf_engine_enhanced.py
Browse files- utils/arf_engine.py +0 -580
- utils/arf_engine_enhanced.py +912 -0
utils/arf_engine.py
DELETED
|
@@ -1,580 +0,0 @@
|
|
| 1 |
-
"""
|
| 2 |
-
ARF 3.3.9 Engine - PhD Level Implementation
|
| 3 |
-
Realistic scoring, psychological framing, enterprise simulation
|
| 4 |
-
"""
|
| 5 |
-
|
| 6 |
-
import random
|
| 7 |
-
import time
|
| 8 |
-
from datetime import datetime
|
| 9 |
-
from typing import Dict, List, Tuple
|
| 10 |
-
import numpy as np
|
| 11 |
-
|
| 12 |
-
class BayesianRiskModel:
|
| 13 |
-
"""Bayesian risk assessment with priors and confidence intervals"""
|
| 14 |
-
|
| 15 |
-
def __init__(self):
|
| 16 |
-
# Prior distributions for different action types
|
| 17 |
-
self.priors = {
|
| 18 |
-
"destructive": {"alpha": 2, "beta": 8}, # 20% base risk
|
| 19 |
-
"modification": {"alpha": 1, "beta": 9}, # 10% base risk
|
| 20 |
-
"readonly": {"alpha": 1, "beta": 99}, # 1% base risk
|
| 21 |
-
"deployment": {"alpha": 3, "beta": 7}, # 30% base risk
|
| 22 |
-
}
|
| 23 |
-
|
| 24 |
-
# Historical patterns
|
| 25 |
-
self.history = {
|
| 26 |
-
"DROP DATABASE": {"success": 5, "failure": 95},
|
| 27 |
-
"DELETE FROM": {"success": 10, "failure": 90},
|
| 28 |
-
"GRANT": {"success": 30, "failure": 70},
|
| 29 |
-
"UPDATE": {"success": 40, "failure": 60},
|
| 30 |
-
"DEPLOY": {"success": 60, "failure": 40},
|
| 31 |
-
}
|
| 32 |
-
|
| 33 |
-
def assess(self, action: str, context: Dict, historical_patterns: Dict = None) -> Dict:
|
| 34 |
-
"""Bayesian risk assessment"""
|
| 35 |
-
# Determine action type
|
| 36 |
-
action_type = self._classify_action(action)
|
| 37 |
-
|
| 38 |
-
# Get prior
|
| 39 |
-
prior = self.priors.get(action_type, self.priors["modification"])
|
| 40 |
-
|
| 41 |
-
# Get likelihood from historical data
|
| 42 |
-
action_key = self._extract_action_key(action)
|
| 43 |
-
historical = historical_patterns.get(action_key, {"success": 50, "failure": 50})
|
| 44 |
-
|
| 45 |
-
# Calculate posterior (simplified)
|
| 46 |
-
alpha_posterior = prior["alpha"] + historical["failure"]
|
| 47 |
-
beta_posterior = prior["beta"] + historical["success"]
|
| 48 |
-
|
| 49 |
-
# Expected risk score
|
| 50 |
-
risk_score = alpha_posterior / (alpha_posterior + beta_posterior)
|
| 51 |
-
|
| 52 |
-
# Add context-based adjustments
|
| 53 |
-
context_adjustment = self._assess_context(context)
|
| 54 |
-
risk_score *= context_adjustment
|
| 55 |
-
|
| 56 |
-
# Add realistic variance (never 0.0 or 1.0)
|
| 57 |
-
risk_score = max(0.25, min(0.95, risk_score + random.uniform(-0.1, 0.1)))
|
| 58 |
-
|
| 59 |
-
# Confidence interval
|
| 60 |
-
n = alpha_posterior + beta_posterior
|
| 61 |
-
confidence = min(0.99, 0.8 + (n / (n + 100)) * 0.19)
|
| 62 |
-
|
| 63 |
-
return {
|
| 64 |
-
"score": risk_score,
|
| 65 |
-
"confidence": confidence,
|
| 66 |
-
"action_type": action_type,
|
| 67 |
-
"risk_factors": self._extract_risk_factors(action, context)
|
| 68 |
-
}
|
| 69 |
-
|
| 70 |
-
def _classify_action(self, action: str) -> str:
|
| 71 |
-
"""Classify action type"""
|
| 72 |
-
action_lower = action.lower()
|
| 73 |
-
if any(word in action_lower for word in ["drop", "delete", "truncate", "remove"]):
|
| 74 |
-
return "destructive"
|
| 75 |
-
elif any(word in action_lower for word in ["update", "alter", "modify", "change"]):
|
| 76 |
-
return "modification"
|
| 77 |
-
elif any(word in action_lower for word in ["deploy", "execute", "run", "train"]):
|
| 78 |
-
return "deployment"
|
| 79 |
-
elif any(word in action_lower for word in ["grant", "revoke", "permission"]):
|
| 80 |
-
return "modification"
|
| 81 |
-
else:
|
| 82 |
-
return "readonly"
|
| 83 |
-
|
| 84 |
-
def _extract_action_key(self, action: str) -> str:
|
| 85 |
-
"""Extract key action identifier"""
|
| 86 |
-
words = action.split()
|
| 87 |
-
if len(words) > 0:
|
| 88 |
-
return words[0].upper()
|
| 89 |
-
return "UNKNOWN"
|
| 90 |
-
|
| 91 |
-
def _assess_context(self, context: Dict) -> float:
|
| 92 |
-
"""Assess context risk multiplier"""
|
| 93 |
-
multiplier = 1.0
|
| 94 |
-
context_str = str(context).lower()
|
| 95 |
-
|
| 96 |
-
# Time-based risk
|
| 97 |
-
if "2am" in context_str or "night" in context_str:
|
| 98 |
-
multiplier *= 1.3
|
| 99 |
-
|
| 100 |
-
# User-based risk
|
| 101 |
-
if "junior" in context_str or "intern" in context_str:
|
| 102 |
-
multiplier *= 1.4
|
| 103 |
-
elif "senior" in context_str or "lead" in context_str:
|
| 104 |
-
multiplier *= 0.8
|
| 105 |
-
|
| 106 |
-
# Environment-based risk
|
| 107 |
-
if "production" in context_str or "prod" in context_str:
|
| 108 |
-
multiplier *= 1.5
|
| 109 |
-
elif "staging" in context_str:
|
| 110 |
-
multiplier *= 1.2
|
| 111 |
-
elif "development" in context_str:
|
| 112 |
-
multiplier *= 0.7
|
| 113 |
-
|
| 114 |
-
# Backup status
|
| 115 |
-
if "backup" in context_str and ("old" in context_str or "no" in context_str):
|
| 116 |
-
multiplier *= 1.4
|
| 117 |
-
elif "backup" in context_str and ("fresh" in context_str or "recent" in context_str):
|
| 118 |
-
multiplier *= 0.9
|
| 119 |
-
|
| 120 |
-
return multiplier
|
| 121 |
-
|
| 122 |
-
def _extract_risk_factors(self, action: str, context: Dict) -> List[str]:
|
| 123 |
-
"""Extract specific risk factors"""
|
| 124 |
-
factors = []
|
| 125 |
-
action_lower = action.lower()
|
| 126 |
-
context_str = str(context).lower()
|
| 127 |
-
|
| 128 |
-
if "drop" in action_lower and "database" in action_lower:
|
| 129 |
-
factors.append("Irreversible data destruction")
|
| 130 |
-
factors.append("Potential service outage")
|
| 131 |
-
|
| 132 |
-
if "delete" in action_lower:
|
| 133 |
-
factors.append("Data loss risk")
|
| 134 |
-
if "where" not in action_lower:
|
| 135 |
-
factors.append("No WHERE clause (mass deletion)")
|
| 136 |
-
|
| 137 |
-
if "production" in context_str:
|
| 138 |
-
factors.append("Production environment")
|
| 139 |
-
|
| 140 |
-
if "junior" in context_str:
|
| 141 |
-
factors.append("Junior operator")
|
| 142 |
-
|
| 143 |
-
if "2am" in context_str:
|
| 144 |
-
factors.append("Off-hours operation")
|
| 145 |
-
|
| 146 |
-
return factors[:3] # Return top 3 factors
|
| 147 |
-
|
| 148 |
-
class PolicyEngine:
|
| 149 |
-
"""Hierarchical policy evaluation engine"""
|
| 150 |
-
|
| 151 |
-
def __init__(self):
|
| 152 |
-
self.policies = {
|
| 153 |
-
"destructive": {
|
| 154 |
-
"risk_threshold": 0.3,
|
| 155 |
-
"required_approvals": 2,
|
| 156 |
-
"backup_required": True
|
| 157 |
-
},
|
| 158 |
-
"modification": {
|
| 159 |
-
"risk_threshold": 0.5,
|
| 160 |
-
"required_approvals": 1,
|
| 161 |
-
"backup_required": False
|
| 162 |
-
},
|
| 163 |
-
"deployment": {
|
| 164 |
-
"risk_threshold": 0.4,
|
| 165 |
-
"required_approvals": 1,
|
| 166 |
-
"tests_required": True
|
| 167 |
-
},
|
| 168 |
-
"readonly": {
|
| 169 |
-
"risk_threshold": 0.8,
|
| 170 |
-
"required_approvals": 0,
|
| 171 |
-
"backup_required": False
|
| 172 |
-
}
|
| 173 |
-
}
|
| 174 |
-
|
| 175 |
-
def evaluate(self, action: str, risk_profile: Dict, confidence_threshold: float = 0.7) -> Dict:
|
| 176 |
-
"""Evaluate action against policies"""
|
| 177 |
-
action_type = risk_profile.get("action_type", "modification")
|
| 178 |
-
risk_score = risk_profile.get("score", 0.5)
|
| 179 |
-
|
| 180 |
-
policy = self.policies.get(action_type, self.policies["modification"])
|
| 181 |
-
|
| 182 |
-
# Policy compliance check
|
| 183 |
-
if risk_score > policy["risk_threshold"]:
|
| 184 |
-
compliance = "HIGH_RISK"
|
| 185 |
-
recommendation = f"Requires {policy['required_approvals']} approval(s)"
|
| 186 |
-
if policy.get("backup_required", False):
|
| 187 |
-
recommendation += " and verified backup"
|
| 188 |
-
else:
|
| 189 |
-
compliance = "WITHIN_POLICY"
|
| 190 |
-
recommendation = "Within policy limits"
|
| 191 |
-
|
| 192 |
-
# Confidence check
|
| 193 |
-
confidence = risk_profile.get("confidence", 0.5)
|
| 194 |
-
if confidence < confidence_threshold:
|
| 195 |
-
compliance = "LOW_CONFIDENCE"
|
| 196 |
-
recommendation = "Low confidence score - manual review recommended"
|
| 197 |
-
|
| 198 |
-
return {
|
| 199 |
-
"compliance": compliance,
|
| 200 |
-
"recommendation": recommendation,
|
| 201 |
-
"policy_type": action_type,
|
| 202 |
-
"risk_threshold": policy["risk_threshold"],
|
| 203 |
-
"actual_risk": risk_score
|
| 204 |
-
}
|
| 205 |
-
|
| 206 |
-
class LicenseManager:
|
| 207 |
-
"""Psychology-enhanced license manager"""
|
| 208 |
-
|
| 209 |
-
def __init__(self):
|
| 210 |
-
self.license_patterns = {
|
| 211 |
-
"trial": r"ARF-TRIAL-[A-Z0-9]{8}",
|
| 212 |
-
"starter": r"ARF-STARTER-[A-Z0-9]{8}",
|
| 213 |
-
"professional": r"ARF-PRO-[A-Z0-9]{8}",
|
| 214 |
-
"enterprise": r"ARF-ENTERPRISE-[A-Z0-9]{8}"
|
| 215 |
-
}
|
| 216 |
-
|
| 217 |
-
self.tier_features = {
|
| 218 |
-
"oss": {
|
| 219 |
-
"name": "OSS Edition",
|
| 220 |
-
"color": "#1E88E5",
|
| 221 |
-
"enforcement": "advisory",
|
| 222 |
-
"gates": 0,
|
| 223 |
-
"support": "community"
|
| 224 |
-
},
|
| 225 |
-
"trial": {
|
| 226 |
-
"name": "Trial Edition",
|
| 227 |
-
"color": "#FFB300",
|
| 228 |
-
"enforcement": "mechanical",
|
| 229 |
-
"gates": 3,
|
| 230 |
-
"support": "email",
|
| 231 |
-
"days_remaining": 14
|
| 232 |
-
},
|
| 233 |
-
"starter": {
|
| 234 |
-
"name": "Starter Edition",
|
| 235 |
-
"color": "#FF9800",
|
| 236 |
-
"enforcement": "mechanical",
|
| 237 |
-
"gates": 3,
|
| 238 |
-
"support": "business_hours",
|
| 239 |
-
"price": "$2,000/mo"
|
| 240 |
-
},
|
| 241 |
-
"professional": {
|
| 242 |
-
"name": "Professional Edition",
|
| 243 |
-
"color": "#FF6F00",
|
| 244 |
-
"enforcement": "mechanical",
|
| 245 |
-
"gates": 5,
|
| 246 |
-
"support": "24/7",
|
| 247 |
-
"price": "$5,000/mo"
|
| 248 |
-
},
|
| 249 |
-
"enterprise": {
|
| 250 |
-
"name": "Enterprise Edition",
|
| 251 |
-
"color": "#D84315",
|
| 252 |
-
"enforcement": "mechanical",
|
| 253 |
-
"gates": 7,
|
| 254 |
-
"support": "dedicated",
|
| 255 |
-
"price": "$15,000/mo"
|
| 256 |
-
}
|
| 257 |
-
}
|
| 258 |
-
|
| 259 |
-
def validate(self, license_key: str = None, action_risk: float = 0.5) -> Dict:
|
| 260 |
-
"""Validate license and return tier info"""
|
| 261 |
-
if not license_key:
|
| 262 |
-
return self.tier_features["oss"]
|
| 263 |
-
|
| 264 |
-
# Check license patterns
|
| 265 |
-
license_upper = license_key.upper()
|
| 266 |
-
|
| 267 |
-
if "ARF-TRIAL" in license_upper:
|
| 268 |
-
tier = "trial"
|
| 269 |
-
elif "ARF-STARTER" in license_upper:
|
| 270 |
-
tier = "starter"
|
| 271 |
-
elif "ARF-PRO" in license_upper:
|
| 272 |
-
tier = "professional"
|
| 273 |
-
elif "ARF-ENTERPRISE" in license_upper:
|
| 274 |
-
tier = "enterprise"
|
| 275 |
-
else:
|
| 276 |
-
tier = "oss"
|
| 277 |
-
|
| 278 |
-
# Get tier features
|
| 279 |
-
features = self.tier_features.get(tier, self.tier_features["oss"]).copy()
|
| 280 |
-
|
| 281 |
-
# Add psychological elements
|
| 282 |
-
if tier == "trial":
|
| 283 |
-
features["scarcity"] = f"⏳ {features.get('days_remaining', 14)} days remaining"
|
| 284 |
-
features["social_proof"] = "Join 1,000+ developers using ARF"
|
| 285 |
-
|
| 286 |
-
return features
|
| 287 |
-
|
| 288 |
-
class MechanicalGateEvaluator:
|
| 289 |
-
"""Mechanical gate evaluation engine"""
|
| 290 |
-
|
| 291 |
-
def __init__(self):
|
| 292 |
-
self.gates = {
|
| 293 |
-
"risk_assessment": {"weight": 0.3, "required": True},
|
| 294 |
-
"policy_compliance": {"weight": 0.3, "required": True},
|
| 295 |
-
"resource_check": {"weight": 0.2, "required": False},
|
| 296 |
-
"approval_workflow": {"weight": 0.1, "required": False},
|
| 297 |
-
"audit_trail": {"weight": 0.1, "required": False}
|
| 298 |
-
}
|
| 299 |
-
|
| 300 |
-
def evaluate(self, risk_profile: Dict, policy_result: Dict, license_info: Dict) -> Dict:
|
| 301 |
-
"""Evaluate mechanical gates"""
|
| 302 |
-
gate_results = []
|
| 303 |
-
total_score = 0
|
| 304 |
-
max_score = 0
|
| 305 |
-
|
| 306 |
-
# Gate 1: Risk Assessment
|
| 307 |
-
risk_gate = self._evaluate_risk_gate(risk_profile)
|
| 308 |
-
gate_results.append(risk_gate)
|
| 309 |
-
total_score += risk_gate["score"] * self.gates["risk_assessment"]["weight"]
|
| 310 |
-
max_score += self.gates["risk_assessment"]["weight"]
|
| 311 |
-
|
| 312 |
-
# Gate 2: Policy Compliance
|
| 313 |
-
policy_gate = self._evaluate_policy_gate(policy_result)
|
| 314 |
-
gate_results.append(policy_gate)
|
| 315 |
-
total_score += policy_gate["score"] * self.gates["policy_compliance"]["weight"]
|
| 316 |
-
max_score += self.gates["policy_compliance"]["weight"]
|
| 317 |
-
|
| 318 |
-
# Additional gates based on license tier
|
| 319 |
-
license_tier = license_info.get("name", "OSS Edition").lower()
|
| 320 |
-
|
| 321 |
-
if "trial" in license_tier or "starter" in license_tier:
|
| 322 |
-
# Gate 3: Resource Check
|
| 323 |
-
resource_gate = self._evaluate_resource_gate(risk_profile)
|
| 324 |
-
gate_results.append(resource_gate)
|
| 325 |
-
total_score += resource_gate["score"] * self.gates["resource_check"]["weight"]
|
| 326 |
-
max_score += self.gates["resource_check"]["weight"]
|
| 327 |
-
|
| 328 |
-
if "professional" in license_tier or "enterprise" in license_tier:
|
| 329 |
-
# Gate 4: Approval Workflow
|
| 330 |
-
approval_gate = self._evaluate_approval_gate(policy_result)
|
| 331 |
-
gate_results.append(approval_gate)
|
| 332 |
-
total_score += approval_gate["score"] * self.gates["approval_workflow"]["weight"]
|
| 333 |
-
max_score += self.gates["approval_workflow"]["weight"]
|
| 334 |
-
|
| 335 |
-
# Gate 5: Audit Trail
|
| 336 |
-
audit_gate = self._evaluate_audit_gate()
|
| 337 |
-
gate_results.append(audit_gate)
|
| 338 |
-
total_score += audit_gate["score"] * self.gates["audit_trail"]["weight"]
|
| 339 |
-
max_score += self.gates["audit_trail"]["weight"]
|
| 340 |
-
|
| 341 |
-
# Calculate overall score
|
| 342 |
-
overall_score = total_score / max_score if max_score > 0 else 0
|
| 343 |
-
|
| 344 |
-
# Decision authority
|
| 345 |
-
decision = self._calculate_decision_authority(gate_results, license_tier, overall_score)
|
| 346 |
-
|
| 347 |
-
return {
|
| 348 |
-
"gate_results": gate_results,
|
| 349 |
-
"overall_score": overall_score,
|
| 350 |
-
"decision": decision,
|
| 351 |
-
"gates_passed": len([g for g in gate_results if g["passed"]]),
|
| 352 |
-
"total_gates": len(gate_results)
|
| 353 |
-
}
|
| 354 |
-
|
| 355 |
-
def _evaluate_risk_gate(self, risk_profile: Dict) -> Dict:
|
| 356 |
-
"""Evaluate risk assessment gate"""
|
| 357 |
-
risk_score = risk_profile.get("score", 0.5)
|
| 358 |
-
confidence = risk_profile.get("confidence", 0.5)
|
| 359 |
-
|
| 360 |
-
passed = risk_score < 0.7 and confidence > 0.6
|
| 361 |
-
score = (0.7 - min(risk_score, 0.7)) / 0.7 * 0.5 + (confidence - 0.6) / 0.4 * 0.5
|
| 362 |
-
|
| 363 |
-
return {
|
| 364 |
-
"name": "Risk Assessment",
|
| 365 |
-
"passed": passed,
|
| 366 |
-
"score": max(0, min(1, score)),
|
| 367 |
-
"details": f"Risk: {risk_score:.1%}, Confidence: {confidence:.1%}"
|
| 368 |
-
}
|
| 369 |
-
|
| 370 |
-
def _evaluate_policy_gate(self, policy_result: Dict) -> Dict:
|
| 371 |
-
"""Evaluate policy compliance gate"""
|
| 372 |
-
compliance = policy_result.get("compliance", "HIGH_RISK")
|
| 373 |
-
risk_threshold = policy_result.get("risk_threshold", 0.5)
|
| 374 |
-
actual_risk = policy_result.get("actual_risk", 0.5)
|
| 375 |
-
|
| 376 |
-
passed = compliance != "HIGH_RISK"
|
| 377 |
-
score = 1.0 if passed else (risk_threshold / actual_risk if actual_risk > 0 else 0)
|
| 378 |
-
|
| 379 |
-
return {
|
| 380 |
-
"name": "Policy Compliance",
|
| 381 |
-
"passed": passed,
|
| 382 |
-
"score": max(0, min(1, score)),
|
| 383 |
-
"details": f"Compliance: {compliance}"
|
| 384 |
-
}
|
| 385 |
-
|
| 386 |
-
def _evaluate_resource_gate(self, risk_profile: Dict) -> Dict:
|
| 387 |
-
"""Evaluate resource check gate"""
|
| 388 |
-
# Simulate resource availability check
|
| 389 |
-
passed = random.random() > 0.3 # 70% chance of passing
|
| 390 |
-
score = 0.8 if passed else 0.3
|
| 391 |
-
|
| 392 |
-
return {
|
| 393 |
-
"name": "Resource Check",
|
| 394 |
-
"passed": passed,
|
| 395 |
-
"score": score,
|
| 396 |
-
"details": "Resources available" if passed else "Resource constraints detected"
|
| 397 |
-
}
|
| 398 |
-
|
| 399 |
-
def _evaluate_approval_gate(self, policy_result: Dict) -> Dict:
|
| 400 |
-
"""Evaluate approval workflow gate"""
|
| 401 |
-
# Simulate approval workflow
|
| 402 |
-
passed = random.random() > 0.2 # 80% chance of passing
|
| 403 |
-
score = 0.9 if passed else 0.2
|
| 404 |
-
|
| 405 |
-
return {
|
| 406 |
-
"name": "Approval Workflow",
|
| 407 |
-
"passed": passed,
|
| 408 |
-
"score": score,
|
| 409 |
-
"details": "Approvals verified" if passed else "Pending approvals"
|
| 410 |
-
}
|
| 411 |
-
|
| 412 |
-
def _evaluate_audit_gate(self) -> Dict:
|
| 413 |
-
"""Evaluate audit trail gate"""
|
| 414 |
-
# Always passes for demo
|
| 415 |
-
return {
|
| 416 |
-
"name": "Audit Trail",
|
| 417 |
-
"passed": True,
|
| 418 |
-
"score": 1.0,
|
| 419 |
-
"details": "Audit trail generated"
|
| 420 |
-
}
|
| 421 |
-
|
| 422 |
-
def _calculate_decision_authority(self, gate_results: List[Dict], license_tier: str, overall_score: float) -> str:
|
| 423 |
-
"""Calculate decision authority"""
|
| 424 |
-
required_gates = [g for g in gate_results if self.gates.get(g["name"].lower().replace(" ", "_"), {}).get("required", False)]
|
| 425 |
-
passed_required = all(g["passed"] for g in required_gates)
|
| 426 |
-
|
| 427 |
-
if not passed_required:
|
| 428 |
-
return "BLOCKED"
|
| 429 |
-
|
| 430 |
-
# Decision thresholds based on license tier
|
| 431 |
-
thresholds = {
|
| 432 |
-
"oss": 1.0, # Never autonomous
|
| 433 |
-
"trial": 0.9,
|
| 434 |
-
"starter": 0.85,
|
| 435 |
-
"professional": 0.8,
|
| 436 |
-
"enterprise": 0.75
|
| 437 |
-
}
|
| 438 |
-
|
| 439 |
-
tier_key = "oss"
|
| 440 |
-
for key in ["trial", "starter", "professional", "enterprise"]:
|
| 441 |
-
if key in license_tier:
|
| 442 |
-
tier_key = key
|
| 443 |
-
break
|
| 444 |
-
|
| 445 |
-
threshold = thresholds.get(tier_key, 1.0)
|
| 446 |
-
|
| 447 |
-
if overall_score >= threshold:
|
| 448 |
-
return "AUTONOMOUS"
|
| 449 |
-
else:
|
| 450 |
-
return "HUMAN_APPROVAL"
|
| 451 |
-
|
| 452 |
-
class ARFEngine:
|
| 453 |
-
"""Enterprise-grade reliability engine with psychological optimization"""
|
| 454 |
-
|
| 455 |
-
def __init__(self):
|
| 456 |
-
self.risk_model = BayesianRiskModel()
|
| 457 |
-
self.policy_engine = PolicyEngine()
|
| 458 |
-
self.license_manager = LicenseManager()
|
| 459 |
-
self.gate_evaluator = MechanicalGateEvaluator()
|
| 460 |
-
self.stats = {
|
| 461 |
-
"actions_tested": 0,
|
| 462 |
-
"risks_prevented": 0,
|
| 463 |
-
"time_saved_minutes": 0,
|
| 464 |
-
"trial_requests": 0,
|
| 465 |
-
"start_time": time.time()
|
| 466 |
-
}
|
| 467 |
-
self.history = []
|
| 468 |
-
|
| 469 |
-
def assess_action(self, action: str, context: Dict, license_key: str = None) -> Dict:
|
| 470 |
-
"""Comprehensive action assessment with psychological framing"""
|
| 471 |
-
start_time = time.time()
|
| 472 |
-
|
| 473 |
-
# 1. Multi-dimensional risk assessment
|
| 474 |
-
risk_profile = self.risk_model.assess(
|
| 475 |
-
action=action,
|
| 476 |
-
context=context,
|
| 477 |
-
historical_patterns=self.risk_model.history
|
| 478 |
-
)
|
| 479 |
-
|
| 480 |
-
# 2. Policy evaluation with confidence intervals
|
| 481 |
-
policy_result = self.policy_engine.evaluate(
|
| 482 |
-
action=action,
|
| 483 |
-
risk_profile=risk_profile,
|
| 484 |
-
confidence_threshold=0.7
|
| 485 |
-
)
|
| 486 |
-
|
| 487 |
-
# 3. License validation with tier-specific gates
|
| 488 |
-
license_info = self.license_manager.validate(
|
| 489 |
-
license_key,
|
| 490 |
-
action_risk=risk_profile["score"]
|
| 491 |
-
)
|
| 492 |
-
|
| 493 |
-
# 4. Mechanical gate evaluation
|
| 494 |
-
gate_results = self.gate_evaluator.evaluate(
|
| 495 |
-
risk_profile=risk_profile,
|
| 496 |
-
policy_result=policy_result,
|
| 497 |
-
license_info=license_info
|
| 498 |
-
)
|
| 499 |
-
|
| 500 |
-
# 5. Generate recommendation
|
| 501 |
-
recommendation = self._generate_recommendation(
|
| 502 |
-
risk_profile, policy_result, license_info, gate_results
|
| 503 |
-
)
|
| 504 |
-
|
| 505 |
-
# 6. Calculate processing time
|
| 506 |
-
processing_time = (time.time() - start_time) * 1000 # ms
|
| 507 |
-
|
| 508 |
-
# Update statistics
|
| 509 |
-
if risk_profile["score"] > 0.5:
|
| 510 |
-
self.stats["risks_prevented"] += 1
|
| 511 |
-
|
| 512 |
-
# Store in history
|
| 513 |
-
self.history.append({
|
| 514 |
-
"action": action,
|
| 515 |
-
"risk_score": risk_profile["score"],
|
| 516 |
-
"timestamp": datetime.now().isoformat(),
|
| 517 |
-
"license_tier": license_info.get("name", "OSS")
|
| 518 |
-
})
|
| 519 |
-
|
| 520 |
-
# Keep only last 100 entries
|
| 521 |
-
if len(self.history) > 100:
|
| 522 |
-
self.history = self.history[-100:]
|
| 523 |
-
|
| 524 |
-
return {
|
| 525 |
-
"risk_score": risk_profile["score"],
|
| 526 |
-
"risk_factors": risk_profile["risk_factors"],
|
| 527 |
-
"confidence": risk_profile["confidence"],
|
| 528 |
-
"recommendation": recommendation,
|
| 529 |
-
"policy_compliance": policy_result["compliance"],
|
| 530 |
-
"license_tier": license_info["name"],
|
| 531 |
-
"gate_decision": gate_results["decision"],
|
| 532 |
-
"gates_passed": gate_results["gates_passed"],
|
| 533 |
-
"total_gates": gate_results["total_gates"],
|
| 534 |
-
"processing_time_ms": processing_time,
|
| 535 |
-
"stats": self.get_stats()
|
| 536 |
-
}
|
| 537 |
-
|
| 538 |
-
def _generate_recommendation(self, risk_profile: Dict, policy_result: Dict,
|
| 539 |
-
license_info: Dict, gate_results: Dict) -> str:
|
| 540 |
-
"""Generate psychological recommendation"""
|
| 541 |
-
risk_score = risk_profile["score"]
|
| 542 |
-
decision = gate_results["decision"]
|
| 543 |
-
tier = license_info["name"]
|
| 544 |
-
|
| 545 |
-
if tier == "OSS Edition":
|
| 546 |
-
if risk_score > 0.7:
|
| 547 |
-
return "🚨 HIGH RISK: This action would be BLOCKED by mechanical gates. Consider Enterprise for protection."
|
| 548 |
-
elif risk_score > 0.4:
|
| 549 |
-
return "⚠️ MODERATE RISK: Requires manual review. Mechanical gates would automate this check."
|
| 550 |
-
else:
|
| 551 |
-
return "✅ LOW RISK: Action appears safe. Mechanical gates provide additional verification."
|
| 552 |
-
|
| 553 |
-
else:
|
| 554 |
-
if decision == "BLOCKED":
|
| 555 |
-
return "❌ BLOCKED: Action prevented by mechanical gates. Risk factors: " + ", ".join(risk_profile["risk_factors"][:2])
|
| 556 |
-
elif decision == "HUMAN_APPROVAL":
|
| 557 |
-
return "🔄 REQUIRES APPROVAL: Action meets risk threshold. Routing to human approver."
|
| 558 |
-
else: # AUTONOMOUS
|
| 559 |
-
return "✅ APPROVED: Action passes all mechanical gates and is proceeding autonomously."
|
| 560 |
-
|
| 561 |
-
def update_stats(self, stat_type: str, value: int = 1):
|
| 562 |
-
"""Update statistics"""
|
| 563 |
-
if stat_type in self.stats:
|
| 564 |
-
self.stats[stat_type] += value
|
| 565 |
-
|
| 566 |
-
# Update time saved (15 minutes per action)
|
| 567 |
-
if stat_type == "actions_tested":
|
| 568 |
-
self.stats["time_saved_minutes"] += 15
|
| 569 |
-
|
| 570 |
-
def get_stats(self) -> Dict:
|
| 571 |
-
"""Get current statistics"""
|
| 572 |
-
elapsed_hours = (time.time() - self.stats["start_time"]) / 3600
|
| 573 |
-
actions_per_hour = self.stats["actions_tested"] / max(elapsed_hours, 0.1)
|
| 574 |
-
|
| 575 |
-
return {
|
| 576 |
-
**self.stats,
|
| 577 |
-
"actions_per_hour": round(actions_per_hour, 1),
|
| 578 |
-
"reliability_score": min(99.9, 95 + (self.stats["risks_prevented"] / max(self.stats["actions_tested"], 1)) * 5),
|
| 579 |
-
"history_size": len(self.history)
|
| 580 |
-
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
utils/arf_engine_enhanced.py
ADDED
|
@@ -0,0 +1,912 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"""
|
| 2 |
+
ARF 3.3.9 Enhanced Engine - PhD Level Implementation
|
| 3 |
+
FIXED: Unified detection that correctly shows REAL OSS when installed
|
| 4 |
+
ADDED: Mathematical sophistication with Bayesian confidence intervals
|
| 5 |
+
"""
|
| 6 |
+
|
| 7 |
+
import random
|
| 8 |
+
import time
|
| 9 |
+
import numpy as np
|
| 10 |
+
from datetime import datetime
|
| 11 |
+
from typing import Dict, List, Tuple, Any
|
| 12 |
+
from dataclasses import dataclass, field
|
| 13 |
+
from enum import Enum
|
| 14 |
+
from scipy.stats import beta as Beta
|
| 15 |
+
|
| 16 |
+
class RiskCategory(Enum):
|
| 17 |
+
"""Risk categories with mathematical bounds"""
|
| 18 |
+
CRITICAL = (0.8, 1.0, "#F44336")
|
| 19 |
+
HIGH = (0.6, 0.8, "#FF9800")
|
| 20 |
+
MEDIUM = (0.4, 0.6, "#FFC107")
|
| 21 |
+
LOW = (0.0, 0.4, "#4CAF50")
|
| 22 |
+
|
| 23 |
+
@classmethod
|
| 24 |
+
def from_score(cls, score: float) -> 'RiskCategory':
|
| 25 |
+
"""Get risk category from score"""
|
| 26 |
+
for category in cls:
|
| 27 |
+
lower, upper, _ = category.value
|
| 28 |
+
if lower <= score < upper:
|
| 29 |
+
return category
|
| 30 |
+
return cls.LOW
|
| 31 |
+
|
| 32 |
+
@property
|
| 33 |
+
def color(self) -> str:
|
| 34 |
+
"""Get color for category"""
|
| 35 |
+
return self.value[2]
|
| 36 |
+
|
| 37 |
+
@property
|
| 38 |
+
def emoji(self) -> str:
|
| 39 |
+
"""Get emoji for category"""
|
| 40 |
+
emoji_map = {
|
| 41 |
+
RiskCategory.CRITICAL: "🚨",
|
| 42 |
+
RiskCategory.HIGH: "⚠️",
|
| 43 |
+
RiskCategory.MEDIUM: "🔶",
|
| 44 |
+
RiskCategory.LOW: "✅"
|
| 45 |
+
}
|
| 46 |
+
return emoji_map[self]
|
| 47 |
+
|
| 48 |
+
@dataclass
|
| 49 |
+
class BayesianRiskAssessment:
|
| 50 |
+
"""Enhanced risk assessment with Bayesian confidence"""
|
| 51 |
+
score: float
|
| 52 |
+
confidence: float
|
| 53 |
+
category: RiskCategory
|
| 54 |
+
confidence_interval: Tuple[float, float]
|
| 55 |
+
factors: List[str]
|
| 56 |
+
method: str = "bayesian"
|
| 57 |
+
|
| 58 |
+
@property
|
| 59 |
+
def formatted_score(self) -> str:
|
| 60 |
+
"""Formatted risk score"""
|
| 61 |
+
return f"{self.score:.1%}"
|
| 62 |
+
|
| 63 |
+
@property
|
| 64 |
+
def formatted_confidence(self) -> str:
|
| 65 |
+
"""Formatted confidence"""
|
| 66 |
+
return f"{self.confidence:.1%}"
|
| 67 |
+
|
| 68 |
+
@property
|
| 69 |
+
def confidence_width(self) -> float:
|
| 70 |
+
"""Width of confidence interval"""
|
| 71 |
+
return self.confidence_interval[1] - self.confidence_interval[0]
|
| 72 |
+
|
| 73 |
+
def to_dict(self) -> Dict[str, Any]:
|
| 74 |
+
"""Convert to dictionary"""
|
| 75 |
+
return {
|
| 76 |
+
'score': self.score,
|
| 77 |
+
'confidence': self.confidence,
|
| 78 |
+
'category': self.category.name,
|
| 79 |
+
'category_color': self.category.color,
|
| 80 |
+
'category_emoji': self.category.emoji,
|
| 81 |
+
'confidence_interval': self.confidence_interval,
|
| 82 |
+
'confidence_width': self.confidence_width,
|
| 83 |
+
'factors': self.factors,
|
| 84 |
+
'method': self.method,
|
| 85 |
+
'formatted_score': self.formatted_score,
|
| 86 |
+
'formatted_confidence': self.formatted_confidence,
|
| 87 |
+
'is_high_risk': self.score > 0.7
|
| 88 |
+
}
|
| 89 |
+
|
| 90 |
+
class EnhancedBayesianRiskModel:
|
| 91 |
+
"""PhD-level Bayesian risk model with confidence intervals"""
|
| 92 |
+
|
| 93 |
+
def __init__(self):
|
| 94 |
+
# Conjugate priors for different action types (Beta distributions)
|
| 95 |
+
self.priors = {
|
| 96 |
+
'database_drop': Beta(2, 8), # α=2, β=8 → 20% prior risk
|
| 97 |
+
'data_delete': Beta(3, 7), # α=3, β=7 → 30% prior risk
|
| 98 |
+
'permission_grant': Beta(4, 6), # α=4, β=6 → 40% prior risk
|
| 99 |
+
'deployment': Beta(5, 5), # α=5, β=5 → 50% prior risk
|
| 100 |
+
'readonly': Beta(1, 9), # α=1, β=9 → 10% prior risk
|
| 101 |
+
}
|
| 102 |
+
|
| 103 |
+
# Historical data (enterprise-scale)
|
| 104 |
+
self.historical_data = {
|
| 105 |
+
'database_drop': {'successes': 95, 'failures': 5}, # 95% success rate
|
| 106 |
+
'data_delete': {'successes': 90, 'failures': 10}, # 90% success rate
|
| 107 |
+
'permission_grant': {'successes': 85, 'failures': 15}, # 85% success rate
|
| 108 |
+
'deployment': {'successes': 80, 'failures': 20}, # 80% success rate
|
| 109 |
+
'readonly': {'successes': 98, 'failures': 2}, # 98% success rate
|
| 110 |
+
}
|
| 111 |
+
|
| 112 |
+
def assess_with_confidence(self, action: str, context: Dict) -> BayesianRiskAssessment:
|
| 113 |
+
"""
|
| 114 |
+
Bayesian risk assessment with 95% confidence intervals
|
| 115 |
+
P(risk|data) ∝ P(data|risk) * P(risk)
|
| 116 |
+
|
| 117 |
+
Returns comprehensive assessment with mathematical rigor
|
| 118 |
+
"""
|
| 119 |
+
# Classify action type
|
| 120 |
+
action_type = self._classify_action(action)
|
| 121 |
+
prior = self.priors.get(action_type, self.priors['readonly'])
|
| 122 |
+
historical = self.historical_data.get(action_type, self.historical_data['readonly'])
|
| 123 |
+
|
| 124 |
+
# Context adjustment multiplier
|
| 125 |
+
context_multiplier = self._calculate_context_multiplier(context)
|
| 126 |
+
|
| 127 |
+
# Bayesian update: Posterior = Beta(α + successes, β + failures)
|
| 128 |
+
posterior_alpha = prior.args[0] + historical['successes']
|
| 129 |
+
posterior_beta = prior.args[1] + historical['failures']
|
| 130 |
+
|
| 131 |
+
# Posterior distribution
|
| 132 |
+
posterior = Beta(posterior_alpha, posterior_beta)
|
| 133 |
+
|
| 134 |
+
# Point estimate (posterior mean)
|
| 135 |
+
risk_score = posterior.mean() * context_multiplier
|
| 136 |
+
|
| 137 |
+
# 95% credible interval
|
| 138 |
+
ci_lower = posterior.ppf(0.025)
|
| 139 |
+
ci_upper = posterior.ppf(0.975)
|
| 140 |
+
|
| 141 |
+
# Confidence score (inverse of interval width)
|
| 142 |
+
interval_width = ci_upper - ci_lower
|
| 143 |
+
confidence = 1.0 - interval_width # Narrower interval = higher confidence
|
| 144 |
+
|
| 145 |
+
# Cap values
|
| 146 |
+
risk_score = min(0.99, max(0.01, risk_score))
|
| 147 |
+
confidence = min(0.99, max(0.01, confidence))
|
| 148 |
+
|
| 149 |
+
# Risk factors
|
| 150 |
+
factors = self._extract_risk_factors(action, context, risk_score)
|
| 151 |
+
|
| 152 |
+
# Risk category
|
| 153 |
+
category = RiskCategory.from_score(risk_score)
|
| 154 |
+
|
| 155 |
+
return BayesianRiskAssessment(
|
| 156 |
+
score=risk_score,
|
| 157 |
+
confidence=confidence,
|
| 158 |
+
category=category,
|
| 159 |
+
confidence_interval=(ci_lower, ci_upper),
|
| 160 |
+
factors=factors,
|
| 161 |
+
method=f"bayesian_{action_type}"
|
| 162 |
+
)
|
| 163 |
+
|
| 164 |
+
def _classify_action(self, action: str) -> str:
|
| 165 |
+
"""Classify action type with precision"""
|
| 166 |
+
action_lower = action.lower()
|
| 167 |
+
|
| 168 |
+
if any(word in action_lower for word in ['drop database', 'drop table', 'truncate', 'purge']):
|
| 169 |
+
return 'database_drop'
|
| 170 |
+
elif any(word in action_lower for word in ['delete', 'remove', 'erase', 'clear']):
|
| 171 |
+
return 'data_delete'
|
| 172 |
+
elif any(word in action_lower for word in ['grant', 'permission', 'access', 'admin', 'root']):
|
| 173 |
+
return 'permission_grant'
|
| 174 |
+
elif any(word in action_lower for word in ['deploy', 'execute', 'run', 'train', 'update']):
|
| 175 |
+
return 'deployment'
|
| 176 |
+
else:
|
| 177 |
+
return 'readonly'
|
| 178 |
+
|
| 179 |
+
def _calculate_context_multiplier(self, context: Dict) -> float:
|
| 180 |
+
"""Calculate context-based risk multiplier with mathematical precision"""
|
| 181 |
+
multiplier = 1.0
|
| 182 |
+
|
| 183 |
+
# Environment multiplier
|
| 184 |
+
env = context.get('environment', '').lower()
|
| 185 |
+
env_multipliers = {
|
| 186 |
+
'production': 1.5,
|
| 187 |
+
'staging': 1.2,
|
| 188 |
+
'development': 0.8,
|
| 189 |
+
'testing': 0.7
|
| 190 |
+
}
|
| 191 |
+
multiplier *= env_multipliers.get(env, 1.0)
|
| 192 |
+
|
| 193 |
+
# User role multiplier
|
| 194 |
+
user = context.get('user', '').lower()
|
| 195 |
+
if 'junior' in user or 'intern' in user or 'new' in user:
|
| 196 |
+
multiplier *= 1.3
|
| 197 |
+
elif 'senior' in user or 'lead' in user or 'principal' in user:
|
| 198 |
+
multiplier *= 0.8
|
| 199 |
+
elif 'admin' in user or 'root' in user:
|
| 200 |
+
multiplier *= 0.9 # Admins are more careful
|
| 201 |
+
|
| 202 |
+
# Time multiplier
|
| 203 |
+
time_of_day = context.get('time', '').lower()
|
| 204 |
+
if any(word in time_of_day for word in ['2am', '3am', '4am', 'night', 'off-hours']):
|
| 205 |
+
multiplier *= 1.4
|
| 206 |
+
|
| 207 |
+
# Backup status multiplier
|
| 208 |
+
backup = context.get('backup', '').lower()
|
| 209 |
+
if backup in ['none', 'none available', 'corrupted', 'old']:
|
| 210 |
+
multiplier *= 1.6
|
| 211 |
+
elif backup in ['fresh', 'recent', 'verified']:
|
| 212 |
+
multiplier *= 0.9
|
| 213 |
+
|
| 214 |
+
# Compliance context
|
| 215 |
+
compliance = context.get('compliance', '').lower()
|
| 216 |
+
if compliance in ['pci-dss', 'hipaa', 'gdpr', 'soc2']:
|
| 217 |
+
multiplier *= 1.3 # Higher stakes
|
| 218 |
+
|
| 219 |
+
return min(2.0, max(0.5, multiplier))
|
| 220 |
+
|
| 221 |
+
def _extract_risk_factors(self, action: str, context: Dict, risk_score: float) -> List[str]:
|
| 222 |
+
"""Extract mathematically significant risk factors"""
|
| 223 |
+
factors = []
|
| 224 |
+
action_lower = action.lower()
|
| 225 |
+
context_str = str(context).lower()
|
| 226 |
+
|
| 227 |
+
# Action-specific factors
|
| 228 |
+
if 'drop' in action_lower and 'database' in action_lower:
|
| 229 |
+
factors.append("Irreversible data destruction")
|
| 230 |
+
factors.append("Potential service outage")
|
| 231 |
+
if risk_score > 0.7:
|
| 232 |
+
factors.append("High financial impact (>$1M)")
|
| 233 |
+
|
| 234 |
+
if 'delete' in action_lower:
|
| 235 |
+
factors.append("Data loss risk")
|
| 236 |
+
if 'where' not in action_lower:
|
| 237 |
+
factors.append("No WHERE clause (mass deletion risk)")
|
| 238 |
+
|
| 239 |
+
if 'grant' in action_lower or 'admin' in action_lower:
|
| 240 |
+
factors.append("Privilege escalation")
|
| 241 |
+
factors.append("Security implications")
|
| 242 |
+
|
| 243 |
+
# Context-specific factors
|
| 244 |
+
if 'production' in context_str:
|
| 245 |
+
factors.append("Production environment")
|
| 246 |
+
|
| 247 |
+
if 'junior' in context_str or 'intern' in context_str:
|
| 248 |
+
factors.append("Inexperienced operator")
|
| 249 |
+
|
| 250 |
+
if '2am' in context_str or 'night' in context_str:
|
| 251 |
+
factors.append("Off-hours operation")
|
| 252 |
+
|
| 253 |
+
if 'backup' in context_str and ('none' in context_str or 'old' in context_str):
|
| 254 |
+
factors.append("Inadequate backup")
|
| 255 |
+
|
| 256 |
+
if 'pci' in context_str or 'hipaa' in context_str:
|
| 257 |
+
factors.append("Regulated data environment")
|
| 258 |
+
|
| 259 |
+
return factors[:4] # Return top 4 most significant factors
|
| 260 |
+
|
| 261 |
+
class EnhancedPolicyEngine:
|
| 262 |
+
"""Enhanced policy engine with mathematical enforcement"""
|
| 263 |
+
|
| 264 |
+
def __init__(self):
|
| 265 |
+
# Mathematical policy definitions with confidence requirements
|
| 266 |
+
self.policies = {
|
| 267 |
+
"database_drop": {
|
| 268 |
+
"risk_threshold": 0.3,
|
| 269 |
+
"confidence_required": 0.9,
|
| 270 |
+
"required_approvals": 2,
|
| 271 |
+
"backup_required": True,
|
| 272 |
+
"time_restricted": True
|
| 273 |
+
},
|
| 274 |
+
"data_delete": {
|
| 275 |
+
"risk_threshold": 0.5,
|
| 276 |
+
"confidence_required": 0.8,
|
| 277 |
+
"required_approvals": 1,
|
| 278 |
+
"backup_required": True,
|
| 279 |
+
"time_restricted": False
|
| 280 |
+
},
|
| 281 |
+
"permission_grant": {
|
| 282 |
+
"risk_threshold": 0.4,
|
| 283 |
+
"confidence_required": 0.85,
|
| 284 |
+
"required_approvals": 1,
|
| 285 |
+
"backup_required": False,
|
| 286 |
+
"time_restricted": False
|
| 287 |
+
},
|
| 288 |
+
"deployment": {
|
| 289 |
+
"risk_threshold": 0.4,
|
| 290 |
+
"confidence_required": 0.8,
|
| 291 |
+
"required_approvals": 1,
|
| 292 |
+
"backup_required": False,
|
| 293 |
+
"tests_required": True
|
| 294 |
+
},
|
| 295 |
+
"readonly": {
|
| 296 |
+
"risk_threshold": 0.8,
|
| 297 |
+
"confidence_required": 0.6,
|
| 298 |
+
"required_approvals": 0,
|
| 299 |
+
"backup_required": False,
|
| 300 |
+
"time_restricted": False
|
| 301 |
+
}
|
| 302 |
+
}
|
| 303 |
+
|
| 304 |
+
def evaluate_mathematically(self, action_type: str, risk_assessment: BayesianRiskAssessment) -> Dict:
|
| 305 |
+
"""
|
| 306 |
+
Mathematical policy evaluation with confidence constraints
|
| 307 |
+
"""
|
| 308 |
+
policy = self.policies.get(action_type, self.policies["readonly"])
|
| 309 |
+
|
| 310 |
+
risk_score = risk_assessment.score
|
| 311 |
+
confidence = risk_assessment.confidence
|
| 312 |
+
|
| 313 |
+
# Risk threshold compliance
|
| 314 |
+
risk_compliant = risk_score <= policy["risk_threshold"]
|
| 315 |
+
|
| 316 |
+
# Confidence requirement
|
| 317 |
+
confidence_compliant = confidence >= policy["confidence_required"]
|
| 318 |
+
|
| 319 |
+
# Determine compliance level
|
| 320 |
+
if not risk_compliant and not confidence_compliant:
|
| 321 |
+
compliance = "BLOCKED"
|
| 322 |
+
reason = f"Risk ({risk_score:.1%}) > threshold ({policy['risk_threshold']:.0%}) and low confidence ({confidence:.1%})"
|
| 323 |
+
elif not risk_compliant:
|
| 324 |
+
compliance = "HIGH_RISK"
|
| 325 |
+
reason = f"Risk ({risk_score:.1%}) > threshold ({policy['risk_threshold']:.0%})"
|
| 326 |
+
elif not confidence_compliant:
|
| 327 |
+
compliance = "LOW_CONFIDENCE"
|
| 328 |
+
reason = f"Confidence ({confidence:.1%}) < required ({policy['confidence_required']:.0%})"
|
| 329 |
+
else:
|
| 330 |
+
compliance = "WITHIN_POLICY"
|
| 331 |
+
reason = f"Within policy limits: risk ≤ {policy['risk_threshold']:.0%}, confidence ≥ {policy['confidence_required']:.0%}"
|
| 332 |
+
|
| 333 |
+
# Generate recommendation
|
| 334 |
+
if compliance == "BLOCKED":
|
| 335 |
+
recommendation = "🚨 BLOCKED: Action exceeds both risk and confidence thresholds"
|
| 336 |
+
elif compliance == "HIGH_RISK":
|
| 337 |
+
approvals = policy["required_approvals"]
|
| 338 |
+
recommendation = f"⚠️ REQUIRES {approvals} APPROVAL{'S' if approvals > 1 else ''}: High risk action"
|
| 339 |
+
elif compliance == "LOW_CONFIDENCE":
|
| 340 |
+
recommendation = "🔶 MANUAL REVIEW: Low confidence score requires human oversight"
|
| 341 |
+
else:
|
| 342 |
+
recommendation = "✅ WITHIN POLICY: Action meets all policy requirements"
|
| 343 |
+
|
| 344 |
+
return {
|
| 345 |
+
"compliance": compliance,
|
| 346 |
+
"recommendation": recommendation,
|
| 347 |
+
"policy_type": action_type,
|
| 348 |
+
"risk_threshold": policy["risk_threshold"],
|
| 349 |
+
"actual_risk": risk_score,
|
| 350 |
+
"confidence_required": policy["confidence_required"],
|
| 351 |
+
"actual_confidence": confidence,
|
| 352 |
+
"reason": reason,
|
| 353 |
+
"approvals_required": 0 if compliance == "WITHIN_POLICY" else policy["required_approvals"],
|
| 354 |
+
"additional_requirements": self._get_additional_requirements(policy)
|
| 355 |
+
}
|
| 356 |
+
|
| 357 |
+
def _get_additional_requirements(self, policy: Dict) -> List[str]:
|
| 358 |
+
"""Get additional requirements"""
|
| 359 |
+
requirements = []
|
| 360 |
+
if policy.get("backup_required"):
|
| 361 |
+
requirements.append("Verified backup required")
|
| 362 |
+
if policy.get("time_restricted"):
|
| 363 |
+
requirements.append("Business hours only")
|
| 364 |
+
if policy.get("tests_required"):
|
| 365 |
+
requirements.append("Tests must pass")
|
| 366 |
+
return requirements
|
| 367 |
+
|
| 368 |
+
class EnhancedLicenseManager:
|
| 369 |
+
"""Enhanced license manager with enterprise features"""
|
| 370 |
+
|
| 371 |
+
def __init__(self):
|
| 372 |
+
# Enterprise license definitions with mathematical gates
|
| 373 |
+
self.tier_definitions = {
|
| 374 |
+
"oss": {
|
| 375 |
+
"name": "OSS Edition",
|
| 376 |
+
"color": "#1E88E5",
|
| 377 |
+
"execution_level": "ADVISORY_ONLY",
|
| 378 |
+
"mechanical_gates": 0,
|
| 379 |
+
"confidence_threshold": 0.0,
|
| 380 |
+
"risk_prevention": 0.0,
|
| 381 |
+
"price": "$0",
|
| 382 |
+
"support": "Community",
|
| 383 |
+
"sla": "None"
|
| 384 |
+
},
|
| 385 |
+
"trial": {
|
| 386 |
+
"name": "Trial Edition",
|
| 387 |
+
"color": "#FFB300",
|
| 388 |
+
"execution_level": "OPERATOR_REVIEW",
|
| 389 |
+
"mechanical_gates": 3,
|
| 390 |
+
"confidence_threshold": 0.6,
|
| 391 |
+
"risk_prevention": 0.5,
|
| 392 |
+
"price": "$0 (14 days)",
|
| 393 |
+
"support": "Email",
|
| 394 |
+
"sla": "Best Effort"
|
| 395 |
+
},
|
| 396 |
+
"starter": {
|
| 397 |
+
"name": "Starter Edition",
|
| 398 |
+
"color": "#FF9800",
|
| 399 |
+
"execution_level": "SUPERVISED",
|
| 400 |
+
"mechanical_gates": 3,
|
| 401 |
+
"confidence_threshold": 0.7,
|
| 402 |
+
"risk_prevention": 0.7,
|
| 403 |
+
"price": "$2,000/mo",
|
| 404 |
+
"support": "Business Hours",
|
| 405 |
+
"sla": "99.5%"
|
| 406 |
+
},
|
| 407 |
+
"professional": {
|
| 408 |
+
"name": "Professional Edition",
|
| 409 |
+
"color": "#FF6F00",
|
| 410 |
+
"execution_level": "AUTONOMOUS_LOW",
|
| 411 |
+
"mechanical_gates": 5,
|
| 412 |
+
"confidence_threshold": 0.8,
|
| 413 |
+
"risk_prevention": 0.85,
|
| 414 |
+
"price": "$5,000/mo",
|
| 415 |
+
"support": "24/7",
|
| 416 |
+
"sla": "99.9%"
|
| 417 |
+
},
|
| 418 |
+
"enterprise": {
|
| 419 |
+
"name": "Enterprise Edition",
|
| 420 |
+
"color": "#D84315",
|
| 421 |
+
"execution_level": "AUTONOMOUS_HIGH",
|
| 422 |
+
"mechanical_gates": 7,
|
| 423 |
+
"confidence_threshold": 0.9,
|
| 424 |
+
"risk_prevention": 0.92,
|
| 425 |
+
"price": "$15,000/mo",
|
| 426 |
+
"support": "Dedicated",
|
| 427 |
+
"sla": "99.99%"
|
| 428 |
+
}
|
| 429 |
+
}
|
| 430 |
+
|
| 431 |
+
def validate_license(self, license_key: str = None) -> Dict:
|
| 432 |
+
"""Validate license with enhanced features"""
|
| 433 |
+
if not license_key:
|
| 434 |
+
return self.tier_definitions["oss"]
|
| 435 |
+
|
| 436 |
+
license_upper = license_key.upper()
|
| 437 |
+
|
| 438 |
+
if "ARF-TRIAL" in license_upper:
|
| 439 |
+
tier = "trial"
|
| 440 |
+
# Add trial-specific features
|
| 441 |
+
tier_info = self.tier_definitions[trial].copy()
|
| 442 |
+
tier_info["days_remaining"] = 14
|
| 443 |
+
tier_info["scarcity_message"] = "⏳ 14-day trial ends soon"
|
| 444 |
+
return tier_info
|
| 445 |
+
|
| 446 |
+
elif "ARF-STARTER" in license_upper:
|
| 447 |
+
tier = "starter"
|
| 448 |
+
elif "ARF-PRO" in license_upper or "ARF-PROFESSIONAL" in license_upper:
|
| 449 |
+
tier = "professional"
|
| 450 |
+
elif "ARF-ENTERPRISE" in license_upper:
|
| 451 |
+
tier = "enterprise"
|
| 452 |
+
else:
|
| 453 |
+
tier = "oss"
|
| 454 |
+
|
| 455 |
+
return self.tier_definitions[tier]
|
| 456 |
+
|
| 457 |
+
def can_execute_at_level(self, license_tier: str, execution_level: str) -> bool:
|
| 458 |
+
"""Check if license allows execution at given level"""
|
| 459 |
+
execution_hierarchy = {
|
| 460 |
+
"ADVISORY_ONLY": 0,
|
| 461 |
+
"OPERATOR_REVIEW": 1,
|
| 462 |
+
"SUPERVISED": 2,
|
| 463 |
+
"AUTONOMOUS_LOW": 3,
|
| 464 |
+
"AUTONOMOUS_HIGH": 4
|
| 465 |
+
}
|
| 466 |
+
|
| 467 |
+
tier_hierarchy = {
|
| 468 |
+
"oss": 0,
|
| 469 |
+
"trial": 1,
|
| 470 |
+
"starter": 2,
|
| 471 |
+
"professional": 3,
|
| 472 |
+
"enterprise": 4
|
| 473 |
+
}
|
| 474 |
+
|
| 475 |
+
tier_level = tier_hierarchy.get(license_tier, 0)
|
| 476 |
+
exec_level = execution_hierarchy.get(execution_level, 0)
|
| 477 |
+
|
| 478 |
+
return tier_level >= exec_level
|
| 479 |
+
|
| 480 |
+
class EnhancedMechanicalGateEvaluator:
|
| 481 |
+
"""Mathematical mechanical gate evaluation"""
|
| 482 |
+
|
| 483 |
+
def __init__(self):
|
| 484 |
+
# Gate definitions with mathematical weights
|
| 485 |
+
self.gates = {
|
| 486 |
+
"risk_assessment": {
|
| 487 |
+
"weight": 0.3,
|
| 488 |
+
"required": True,
|
| 489 |
+
"function": self._evaluate_risk_gate,
|
| 490 |
+
"description": "Assess risk against thresholds"
|
| 491 |
+
},
|
| 492 |
+
"policy_compliance": {
|
| 493 |
+
"weight": 0.25,
|
| 494 |
+
"required": True,
|
| 495 |
+
"function": self._evaluate_policy_gate,
|
| 496 |
+
"description": "Verify policy compliance"
|
| 497 |
+
},
|
| 498 |
+
"license_validation": {
|
| 499 |
+
"weight": 0.2,
|
| 500 |
+
"required": True,
|
| 501 |
+
"function": self._evaluate_license_gate,
|
| 502 |
+
"description": "Validate license entitlement"
|
| 503 |
+
},
|
| 504 |
+
"rollback_feasibility": {
|
| 505 |
+
"weight": 0.15,
|
| 506 |
+
"required": False,
|
| 507 |
+
"function": self._evaluate_rollback_gate,
|
| 508 |
+
"description": "Ensure action reversibility"
|
| 509 |
+
},
|
| 510 |
+
"resource_availability": {
|
| 511 |
+
"weight": 0.1,
|
| 512 |
+
"required": False,
|
| 513 |
+
"function": self._evaluate_resource_gate,
|
| 514 |
+
"description": "Check resource constraints"
|
| 515 |
+
},
|
| 516 |
+
"admin_approval": {
|
| 517 |
+
"weight": 0.1,
|
| 518 |
+
"required": False,
|
| 519 |
+
"function": self._evaluate_approval_gate,
|
| 520 |
+
"description": "Executive approval"
|
| 521 |
+
}
|
| 522 |
+
}
|
| 523 |
+
|
| 524 |
+
def evaluate_gates(self, risk_assessment: BayesianRiskAssessment,
|
| 525 |
+
policy_result: Dict, license_info: Dict) -> Dict:
|
| 526 |
+
"""Evaluate all applicable mechanical gates"""
|
| 527 |
+
gate_results = []
|
| 528 |
+
total_weight = 0
|
| 529 |
+
weighted_score = 0
|
| 530 |
+
|
| 531 |
+
# Required gates (always evaluated)
|
| 532 |
+
for gate_name, gate_def in self.gates.items():
|
| 533 |
+
if gate_def["required"]:
|
| 534 |
+
result = gate_def["function"](risk_assessment, policy_result, license_info)
|
| 535 |
+
gate_results.append(result)
|
| 536 |
+
|
| 537 |
+
if result["passed"]:
|
| 538 |
+
weighted_score += gate_def["weight"]
|
| 539 |
+
total_weight += gate_def["weight"]
|
| 540 |
+
|
| 541 |
+
# Optional gates based on license tier
|
| 542 |
+
license_tier = license_info.get("name", "OSS Edition").lower()
|
| 543 |
+
|
| 544 |
+
if "trial" in license_tier or "starter" in license_tier:
|
| 545 |
+
# Add resource gate
|
| 546 |
+
resource_result = self._evaluate_resource_gate(risk_assessment, policy_result, license_info)
|
| 547 |
+
gate_results.append(resource_result)
|
| 548 |
+
|
| 549 |
+
if resource_result["passed"]:
|
| 550 |
+
weighted_score += self.gates["resource_availability"]["weight"]
|
| 551 |
+
total_weight += self.gates["resource_availability"]["weight"]
|
| 552 |
+
|
| 553 |
+
if "professional" in license_tier or "enterprise" in license_tier:
|
| 554 |
+
# Add rollback gate
|
| 555 |
+
rollback_result = self._evaluate_rollback_gate(risk_assessment, policy_result, license_info)
|
| 556 |
+
gate_results.append(rollback_result)
|
| 557 |
+
|
| 558 |
+
if rollback_result["passed"]:
|
| 559 |
+
weighted_score += self.gates["rollback_feasibility"]["weight"]
|
| 560 |
+
total_weight += self.gates["rollback_feasibility"]["weight"]
|
| 561 |
+
|
| 562 |
+
# Add approval gate for high-risk in enterprise
|
| 563 |
+
if "enterprise" in license_tier and risk_assessment.score > 0.6:
|
| 564 |
+
approval_result = self._evaluate_approval_gate(risk_assessment, policy_result, license_info)
|
| 565 |
+
gate_results.append(approval_result)
|
| 566 |
+
|
| 567 |
+
if approval_result["passed"]:
|
| 568 |
+
weighted_score += self.gates["admin_approval"]["weight"]
|
| 569 |
+
total_weight += self.gates["admin_approval"]["weight"]
|
| 570 |
+
|
| 571 |
+
# Calculate overall gate score
|
| 572 |
+
gate_score = weighted_score / total_weight if total_weight > 0 else 0
|
| 573 |
+
|
| 574 |
+
# Determine if all required gates passed
|
| 575 |
+
required_gates = [g for g in gate_results if self.gates.get(g["name"].lower().replace(" ", "_"), {}).get("required", False)]
|
| 576 |
+
all_required_passed = all(g["passed"] for g in required_gates)
|
| 577 |
+
|
| 578 |
+
# Decision logic
|
| 579 |
+
if not all_required_passed:
|
| 580 |
+
decision = "BLOCKED"
|
| 581 |
+
reason = "Failed required mechanical gates"
|
| 582 |
+
elif gate_score >= 0.9:
|
| 583 |
+
decision = "AUTONOMOUS"
|
| 584 |
+
reason = "Passed all mechanical gates with high confidence"
|
| 585 |
+
elif gate_score >= 0.7:
|
| 586 |
+
decision = "SUPERVISED"
|
| 587 |
+
reason = "Passed gates but requires monitoring"
|
| 588 |
+
else:
|
| 589 |
+
decision = "HUMAN_APPROVAL"
|
| 590 |
+
reason = "Requires human review and approval"
|
| 591 |
+
|
| 592 |
+
return {
|
| 593 |
+
"gate_results": gate_results,
|
| 594 |
+
"gate_score": gate_score,
|
| 595 |
+
"decision": decision,
|
| 596 |
+
"reason": reason,
|
| 597 |
+
"gates_passed": len([g for g in gate_results if g["passed"]]),
|
| 598 |
+
"total_gates": len(gate_results),
|
| 599 |
+
"required_passed": all_required_passed,
|
| 600 |
+
"gate_details": self._format_gate_details(gate_results)
|
| 601 |
+
}
|
| 602 |
+
|
| 603 |
+
def _evaluate_risk_gate(self, risk_assessment: BayesianRiskAssessment, policy_result: Dict, license_info: Dict) -> Dict:
|
| 604 |
+
"""Evaluate risk assessment gate"""
|
| 605 |
+
risk_score = risk_assessment.score
|
| 606 |
+
confidence = risk_assessment.confidence
|
| 607 |
+
|
| 608 |
+
# Risk threshold from license
|
| 609 |
+
license_tier = license_info.get("name", "OSS Edition").lower()
|
| 610 |
+
risk_threshold = 0.8 # Default
|
| 611 |
+
|
| 612 |
+
if "trial" in license_tier:
|
| 613 |
+
risk_threshold = 0.7
|
| 614 |
+
elif "starter" in license_tier:
|
| 615 |
+
risk_threshold = 0.6
|
| 616 |
+
elif "professional" in license_tier:
|
| 617 |
+
risk_threshold = 0.5
|
| 618 |
+
elif "enterprise" in license_tier:
|
| 619 |
+
risk_threshold = 0.4
|
| 620 |
+
|
| 621 |
+
passed = risk_score < risk_threshold and confidence > 0.6
|
| 622 |
+
score = (risk_threshold - min(risk_score, risk_threshold)) / risk_threshold * 0.5
|
| 623 |
+
score += (confidence - 0.6) / 0.4 * 0.5 if confidence > 0.6 else 0
|
| 624 |
+
|
| 625 |
+
return {
|
| 626 |
+
"name": "Risk Assessment",
|
| 627 |
+
"passed": passed,
|
| 628 |
+
"score": max(0, min(1, score)),
|
| 629 |
+
"details": f"Risk: {risk_score:.1%} < {risk_threshold:.0%}, Confidence: {confidence:.1%}",
|
| 630 |
+
"required": True
|
| 631 |
+
}
|
| 632 |
+
|
| 633 |
+
def _evaluate_policy_gate(self, risk_assessment: BayesianRiskAssessment, policy_result: Dict, license_info: Dict) -> Dict:
|
| 634 |
+
"""Evaluate policy compliance gate"""
|
| 635 |
+
compliance = policy_result.get("compliance", "BLOCKED")
|
| 636 |
+
passed = compliance not in ["BLOCKED", "HIGH_RISK"]
|
| 637 |
+
score = 1.0 if passed else 0.3
|
| 638 |
+
|
| 639 |
+
return {
|
| 640 |
+
"name": "Policy Compliance",
|
| 641 |
+
"passed": passed,
|
| 642 |
+
"score": score,
|
| 643 |
+
"details": f"Policy: {compliance}",
|
| 644 |
+
"required": True
|
| 645 |
+
}
|
| 646 |
+
|
| 647 |
+
def _evaluate_license_gate(self, risk_assessment: BayesianRiskAssessment, policy_result: Dict, license_info: Dict) -> Dict:
|
| 648 |
+
"""Evaluate license validation gate"""
|
| 649 |
+
license_name = license_info.get("name", "OSS Edition")
|
| 650 |
+
passed = license_name != "OSS Edition"
|
| 651 |
+
score = 1.0 if passed else 0.0
|
| 652 |
+
|
| 653 |
+
return {
|
| 654 |
+
"name": "License Validation",
|
| 655 |
+
"passed": passed,
|
| 656 |
+
"score": score,
|
| 657 |
+
"details": f"License: {license_name}",
|
| 658 |
+
"required": True
|
| 659 |
+
}
|
| 660 |
+
|
| 661 |
+
def _evaluate_rollback_gate(self, risk_assessment: BayesianRiskAssessment, policy_result: Dict, license_info: Dict) -> Dict:
|
| 662 |
+
"""Evaluate rollback feasibility gate"""
|
| 663 |
+
risk_score = risk_assessment.score
|
| 664 |
+
# Rollback more feasible for lower risk actions
|
| 665 |
+
passed = risk_score < 0.7
|
| 666 |
+
score = 0.9 if passed else 0.2
|
| 667 |
+
|
| 668 |
+
return {
|
| 669 |
+
"name": "Rollback Feasibility",
|
| 670 |
+
"passed": passed,
|
| 671 |
+
"score": score,
|
| 672 |
+
"details": "Rollback possible" if passed else "Rollback difficult",
|
| 673 |
+
"required": False
|
| 674 |
+
}
|
| 675 |
+
|
| 676 |
+
def _evaluate_resource_gate(self, risk_assessment: BayesianRiskAssessment, policy_result: Dict, license_info: Dict) -> Dict:
|
| 677 |
+
"""Evaluate resource availability gate"""
|
| 678 |
+
# Simulated resource check
|
| 679 |
+
passed = random.random() > 0.3 # 70% chance of passing
|
| 680 |
+
score = 0.8 if passed else 0.3
|
| 681 |
+
|
| 682 |
+
return {
|
| 683 |
+
"name": "Resource Availability",
|
| 684 |
+
"passed": passed,
|
| 685 |
+
"score": score,
|
| 686 |
+
"details": "Resources available" if passed else "Resource constraints",
|
| 687 |
+
"required": False
|
| 688 |
+
}
|
| 689 |
+
|
| 690 |
+
def _evaluate_approval_gate(self, risk_assessment: BayesianRiskAssessment, policy_result: Dict, license_info: Dict) -> Dict:
|
| 691 |
+
"""Evaluate admin approval gate"""
|
| 692 |
+
# For high-risk actions, requires manual approval
|
| 693 |
+
risk_score = risk_assessment.score
|
| 694 |
+
passed = risk_score < 0.6 # Auto-pass if risk is moderate
|
| 695 |
+
score = 1.0 if passed else 0.0
|
| 696 |
+
|
| 697 |
+
return {
|
| 698 |
+
"name": "Admin Approval",
|
| 699 |
+
"passed": passed,
|
| 700 |
+
"score": score,
|
| 701 |
+
"details": "Auto-approved" if passed else "Requires manual approval",
|
| 702 |
+
"required": False
|
| 703 |
+
}
|
| 704 |
+
|
| 705 |
+
def _format_gate_details(self, gate_results: List[Dict]) -> List[Dict]:
|
| 706 |
+
"""Format gate details for display"""
|
| 707 |
+
return [
|
| 708 |
+
{
|
| 709 |
+
"gate": r["name"],
|
| 710 |
+
"status": "✅ PASSED" if r["passed"] else "❌ FAILED",
|
| 711 |
+
"score": f"{r['score']:.1%}",
|
| 712 |
+
"details": r["details"]
|
| 713 |
+
}
|
| 714 |
+
for r in gate_results
|
| 715 |
+
]
|
| 716 |
+
|
| 717 |
+
class EnhancedARFEngine:
|
| 718 |
+
"""Enterprise-grade reliability engine with PhD-level mathematics"""
|
| 719 |
+
|
| 720 |
+
def __init__(self):
|
| 721 |
+
self.risk_model = EnhancedBayesianRiskModel()
|
| 722 |
+
self.policy_engine = EnhancedPolicyEngine()
|
| 723 |
+
self.license_manager = EnhancedLicenseManager()
|
| 724 |
+
self.gate_evaluator = EnhancedMechanicalGateEvaluator()
|
| 725 |
+
|
| 726 |
+
# Statistics with mathematical rigor
|
| 727 |
+
self.stats = {
|
| 728 |
+
"actions_tested": 0,
|
| 729 |
+
"risks_prevented": 0,
|
| 730 |
+
"high_risk_blocked": 0,
|
| 731 |
+
"license_validations": 0,
|
| 732 |
+
"mechanical_gates_triggered": 0,
|
| 733 |
+
"confidence_average": 0.0,
|
| 734 |
+
"risk_average": 0.0,
|
| 735 |
+
"start_time": time.time()
|
| 736 |
+
}
|
| 737 |
+
|
| 738 |
+
self.history = []
|
| 739 |
+
self.arf_status = "REAL_OSS" # Unified status
|
| 740 |
+
|
| 741 |
+
def assess_action(self, action: str, context: Dict, license_key: str = None) -> Dict:
|
| 742 |
+
"""Comprehensive action assessment with mathematical rigor"""
|
| 743 |
+
start_time = time.time()
|
| 744 |
+
|
| 745 |
+
# 1. Bayesian risk assessment with confidence intervals
|
| 746 |
+
risk_assessment = self.risk_model.assess_with_confidence(action, context)
|
| 747 |
+
|
| 748 |
+
# 2. Action type classification
|
| 749 |
+
action_type = self.risk_model._classify_action(action)
|
| 750 |
+
|
| 751 |
+
# 3. Policy evaluation with confidence constraints
|
| 752 |
+
policy_result = self.policy_engine.evaluate_mathematically(action_type, risk_assessment)
|
| 753 |
+
|
| 754 |
+
# 4. License validation
|
| 755 |
+
license_info = self.license_manager.validate_license(license_key)
|
| 756 |
+
|
| 757 |
+
# 5. Mechanical gate evaluation
|
| 758 |
+
gate_results = self.gate_evaluator.evaluate_gates(risk_assessment, policy_result, license_info)
|
| 759 |
+
|
| 760 |
+
# 6. Generate enterprise recommendation
|
| 761 |
+
recommendation = self._generate_enterprise_recommendation(
|
| 762 |
+
risk_assessment, policy_result, license_info, gate_results
|
| 763 |
+
)
|
| 764 |
+
|
| 765 |
+
# 7. Calculate processing metrics
|
| 766 |
+
processing_time = (time.time() - start_time) * 1000 # ms
|
| 767 |
+
|
| 768 |
+
# 8. Update statistics with mathematical precision
|
| 769 |
+
self._update_statistics(risk_assessment, policy_result, gate_results)
|
| 770 |
+
|
| 771 |
+
# 9. Store in history
|
| 772 |
+
history_entry = {
|
| 773 |
+
"action": action[:50] + "..." if len(action) > 50 else action,
|
| 774 |
+
"risk_score": risk_assessment.score,
|
| 775 |
+
"confidence": risk_assessment.confidence,
|
| 776 |
+
"license_tier": license_info.get("name", "OSS Edition"),
|
| 777 |
+
"gate_decision": gate_results["decision"],
|
| 778 |
+
"timestamp": datetime.now().isoformat(),
|
| 779 |
+
"arf_status": self.arf_status
|
| 780 |
+
}
|
| 781 |
+
self.history.append(history_entry)
|
| 782 |
+
|
| 783 |
+
# Keep only last 100 entries
|
| 784 |
+
if len(self.history) > 100:
|
| 785 |
+
self.history = self.history[-100:]
|
| 786 |
+
|
| 787 |
+
# 10. Compile comprehensive result
|
| 788 |
+
return {
|
| 789 |
+
"risk_assessment": risk_assessment.to_dict(),
|
| 790 |
+
"policy_result": policy_result,
|
| 791 |
+
"license_info": license_info,
|
| 792 |
+
"gate_results": gate_results,
|
| 793 |
+
"recommendation": recommendation,
|
| 794 |
+
"processing_metrics": {
|
| 795 |
+
"processing_time_ms": round(processing_time, 1),
|
| 796 |
+
"assessment_method": "bayesian_with_confidence",
|
| 797 |
+
"arf_status": self.arf_status,
|
| 798 |
+
"version": "3.3.9"
|
| 799 |
+
},
|
| 800 |
+
"statistics": self.get_enhanced_stats()
|
| 801 |
+
}
|
| 802 |
+
|
| 803 |
+
def _generate_enterprise_recommendation(self, risk_assessment: BayesianRiskAssessment,
|
| 804 |
+
policy_result: Dict, license_info: Dict,
|
| 805 |
+
gate_results: Dict) -> str:
|
| 806 |
+
"""Generate mathematically-informed enterprise recommendation"""
|
| 807 |
+
license_name = license_info.get("name", "OSS Edition")
|
| 808 |
+
decision = gate_results["decision"]
|
| 809 |
+
risk_score = risk_assessment.score
|
| 810 |
+
|
| 811 |
+
if license_name == "OSS Edition":
|
| 812 |
+
if risk_score > 0.7:
|
| 813 |
+
return "🚨 CRITICAL RISK: Would be BLOCKED by mechanical gates (Enterprise required)"
|
| 814 |
+
elif risk_score > 0.4:
|
| 815 |
+
return "⚠️ MODERATE RISK: Requires manual review (Mechanical gates automate this)"
|
| 816 |
+
else:
|
| 817 |
+
return "✅ LOW RISK: Appears safe but cannot execute without license"
|
| 818 |
+
|
| 819 |
+
elif decision == "BLOCKED":
|
| 820 |
+
risk_factors = ", ".join(risk_assessment.factors[:2])
|
| 821 |
+
return f"❌ BLOCKED: Action prevented by mechanical gates. Risk factors: {risk_factors}"
|
| 822 |
+
|
| 823 |
+
elif decision == "HUMAN_APPROVAL":
|
| 824 |
+
return "🔄 REQUIRES HUMAN APPROVAL: Action meets risk threshold but requires oversight"
|
| 825 |
+
|
| 826 |
+
elif decision == "SUPERVISED":
|
| 827 |
+
return "👁️ SUPERVISED EXECUTION: Action passes gates but requires monitoring"
|
| 828 |
+
|
| 829 |
+
elif decision == "AUTONOMOUS":
|
| 830 |
+
confidence = risk_assessment.confidence
|
| 831 |
+
return f"✅ AUTONOMOUS APPROVAL: Action passes all mechanical gates with {confidence:.0%} confidence"
|
| 832 |
+
|
| 833 |
+
else:
|
| 834 |
+
return "⚡ PROCESSING: Action under evaluation"
|
| 835 |
+
|
| 836 |
+
def _update_statistics(self, risk_assessment: BayesianRiskAssessment,
|
| 837 |
+
policy_result: Dict, gate_results: Dict):
|
| 838 |
+
"""Update statistics with mathematical precision"""
|
| 839 |
+
self.stats["actions_tested"] += 1
|
| 840 |
+
|
| 841 |
+
# Update rolling averages
|
| 842 |
+
n = self.stats["actions_tested"]
|
| 843 |
+
old_avg_risk = self.stats["risk_average"]
|
| 844 |
+
old_avg_conf = self.stats["confidence_average"]
|
| 845 |
+
|
| 846 |
+
self.stats["risk_average"] = old_avg_risk + (risk_assessment.score - old_avg_risk) / n
|
| 847 |
+
self.stats["confidence_average"] = old_avg_conf + (risk_assessment.confidence - old_avg_conf) / n
|
| 848 |
+
|
| 849 |
+
# Count high-risk blocks
|
| 850 |
+
if risk_assessment.score > 0.7:
|
| 851 |
+
self.stats["high_risk_blocked"] += 1
|
| 852 |
+
|
| 853 |
+
# Count prevented risks
|
| 854 |
+
if gate_results["decision"] == "BLOCKED":
|
| 855 |
+
self.stats["risks_prevented"] += 1
|
| 856 |
+
|
| 857 |
+
# Count gate triggers
|
| 858 |
+
if gate_results["total_gates"] > 0:
|
| 859 |
+
self.stats["mechanical_gates_triggered"] += 1
|
| 860 |
+
|
| 861 |
+
# Count license validations
|
| 862 |
+
if gate_results["gate_results"]:
|
| 863 |
+
license_gate = next((g for g in gate_results["gate_results"] if g["name"] == "License Validation"), None)
|
| 864 |
+
if license_gate and license_gate["passed"]:
|
| 865 |
+
self.stats["license_validations"] += 1
|
| 866 |
+
|
| 867 |
+
def get_enhanced_stats(self) -> Dict:
|
| 868 |
+
"""Get enhanced statistics with mathematical insights"""
|
| 869 |
+
elapsed_hours = (time.time() - self.stats["start_time"]) / 3600
|
| 870 |
+
|
| 871 |
+
# Calculate prevention rate
|
| 872 |
+
prevention_rate = 0.0
|
| 873 |
+
if self.stats["actions_tested"] > 0:
|
| 874 |
+
prevention_rate = self.stats["risks_prevented"] / self.stats["actions_tested"]
|
| 875 |
+
|
| 876 |
+
# Calculate reliability score (mathematically grounded)
|
| 877 |
+
reliability_score = 95.0 + (prevention_rate * 5.0) # Base 95% + prevention bonus
|
| 878 |
+
|
| 879 |
+
return {
|
| 880 |
+
**self.stats,
|
| 881 |
+
"actions_per_hour": round(self.stats["actions_tested"] / max(elapsed_hours, 0.1), 1),
|
| 882 |
+
"reliability_score": min(99.99, reliability_score),
|
| 883 |
+
"prevention_rate": round(prevention_rate * 100, 1),
|
| 884 |
+
"average_risk": round(self.stats["risk_average"] * 100, 1),
|
| 885 |
+
"average_confidence": round(self.stats["confidence_average"] * 100, 1),
|
| 886 |
+
"gate_effectiveness": round((self.stats["risks_prevented"] / max(self.stats["high_risk_blocked"], 1)) * 100, 1),
|
| 887 |
+
"history_size": len(self.history),
|
| 888 |
+
"demo_duration_hours": round(elapsed_hours, 2),
|
| 889 |
+
"arf_status": self.arf_status
|
| 890 |
+
}
|
| 891 |
+
|
| 892 |
+
def set_arf_status(self, status: str):
|
| 893 |
+
"""Set ARF status (REAL_OSS, SIMULATION, etc.)"""
|
| 894 |
+
self.arf_status = status
|
| 895 |
+
|
| 896 |
+
def get_action_history(self, limit: int = 10) -> List[Dict]:
|
| 897 |
+
"""Get action history with limits"""
|
| 898 |
+
return self.history[:limit]
|
| 899 |
+
|
| 900 |
+
def reset_statistics(self):
|
| 901 |
+
"""Reset statistics (for demo purposes)"""
|
| 902 |
+
self.stats = {
|
| 903 |
+
"actions_tested": 0,
|
| 904 |
+
"risks_prevented": 0,
|
| 905 |
+
"high_risk_blocked": 0,
|
| 906 |
+
"license_validations": 0,
|
| 907 |
+
"mechanical_gates_triggered": 0,
|
| 908 |
+
"confidence_average": 0.0,
|
| 909 |
+
"risk_average": 0.0,
|
| 910 |
+
"start_time": time.time()
|
| 911 |
+
}
|
| 912 |
+
self.history = []
|