mirror of
https://github.com/browseros-ai/BrowserOS.git
synced 2026-05-18 19:16:22 +00:00
* clean-up bunch of files for re-write * more clean-up and adding basic agent * Minor fix moved types into respective files. * Deleted bunch of old files backup Update gitignore Deleted a bunch of files Remove message manager Deleted old docs Update rules rename Profiler to profiler * Temporarily adding old code * Adding two small things back * backup * Implemented LangChainProvider and updated cursor rules backup LangChainProvider curosr rules * Implement tests for LangChainProvider -- unit test and integration test integration test passes integration test backup * Tool Design Tools Desing tools design * NavigationTool ready NavigationTool ready NavigationTool ready NaivgationTool ready backup * MessageManager MessageManager backup * Fixed integration test * Agent design new Updated agent design and added bunch of /NTN commands agent new design * Delete old agent design * MessageManagerReadOnly class * PlannerTool ready PlannerTool almost ready * ToolManager and DoneTool * Integration of BrowserAgent * BrowserAgent implementation v0.1 * BrowserAgent small fix v0.2 * Tool calling design too call design tool design claude * Update agent tool design with // NTN * add zod-to-json npm install * BrowserAGent v0.3 * BrowserAgent v0.4 * BrowserAgent v0.5 * fixes * Build error fixes in my NEWLY added code build errors fix * Build error fixes in old code (integration work) backup * Comment StreamEventProcessor for now, it is not used * Small build error fix * Small rename * Added integration test to check structuredLLM and changed to 4o-mini change default to nxtscape integration test * Small docstring * Simplified BrowserAgent code and added integration test Simplified BrowserAgent code BrowserAGent integrationt est * Update CLAUDE.md with project memory and instructions on how to write code Update CLAUDE.md with project memory and instructions on how to write code Project Memory * Just a mova.. Moved ToolManager outside. Build works. * TabOperations tool TabOperations Tool and fixing some test tab operations * Update CLAUDE.md * Added ClassificationTool classifiction tool classification prommpt * Refactored and simplified PlannerTool unit test and integration test * Updated Plnnaer tool * Update CLAUDE.md * BrowserAgent modified to do classification BrowserAgent with classification * minor fix to ToolManager * Instead of ToolCall and ToolResult -- just updating message manager once * minor fix to BrowserAgent integration test * Changed done to "done_tool" * Updated CLAUDE.md to reflect understanding of claude * Uncommented stream event processor * Renamed EventBus to StreamEventBus * Commented StreamEventProcessor * Event Processor * Integrated EventProcessor with BrowserAgent Added EventProcessor to BrowserAgetn * Renamed StreamEventBus to EventBus * Made EventBus required parameter in ExecutionContext * PlanGenerator rewrite PlanGenerator rewrite backup * For simple task, explicitly tell it to call done tool * Max attempts for simple task * backup * Revert "backup" This reverts commit 7d79a3d4d5774bfef79ec9827878b74edad3593f. * Consolidating where EventBus and EventProcessor are created and initialized backup * Update CLAUDE.md Update CLAUDE.md * Improving agent loop code Cleaned up processTooCall classification task * Create test-writer subAgent test-agent-prompt test agent prompt test-agent-prompt Update test-writer.md * BrowserAgent test Browseragent test BrowserAgent test * BrowserAgent refactor backup backup * Minor fixes * Minor fix * minor change -- NEW AGENT LOOP IS WORKING WELL * Update cursor rules * Small change * Improved BrowserAgent integration test Improved BrowserAgent integration test * Small change * Update CLAUDE.md * Different tools * FindElementTool is ready Find element update backup find element backup * Updated to test strings to say "tests..." * ScrollTool is ready * RefreshStateTool is updated as well * MessageManager updated * SearchTool is ready backup * Interaction Element is also ready * Add debugMessage emitter * ValidatorTool ready and tests are passing Validation Tool validator tool backup backup * GroupTabs tool ready * Registered all the tools * Planning changed to 5 steps * BrowserAgent integration test fix * Minor string changes * backup * Removed too many confusing events in EventProcessor -- there is only event.info right now * Abort control implemented backup Abort * Formatter for toolResult Formatter for toolResult backup * Always render using Markdown * Minor fix --------- Co-authored-by: Nikhil Sonti <nikhilsv92@gmail.com>
103 lines
2.6 KiB
TypeScript
103 lines
2.6 KiB
TypeScript
/**
|
|
* Checks if a URL is allowed based on firewall configuration
|
|
* @param url The URL to check
|
|
* @param allowList The allow list
|
|
* @param denyList The deny list
|
|
* @returns True if the URL is allowed, false otherwise
|
|
*/
|
|
export function isUrlAllowed(url: string, allowList: string[], denyList: string[]): boolean {
|
|
// Normalize and validate input
|
|
const trimmedUrl = url.trim();
|
|
if (trimmedUrl.length === 0) {
|
|
return false;
|
|
}
|
|
|
|
const lowerCaseUrl = trimmedUrl.toLowerCase();
|
|
|
|
// ALWAYS block dangerous/forbidden URLs, even if firewall is disabled
|
|
const DANGEROUS_PREFIXES = [
|
|
'https://chromewebstore.google.com', // scripts are not allowed to be injected into chrome web store
|
|
'chrome-extension://',
|
|
'chrome://',
|
|
'javascript:',
|
|
'data:',
|
|
'file:',
|
|
'vbscript:',
|
|
'ws:',
|
|
'wss:',
|
|
];
|
|
|
|
if (DANGEROUS_PREFIXES.some(prefix => lowerCaseUrl.startsWith(prefix))) {
|
|
return false;
|
|
}
|
|
|
|
// If firewall is disabled, allow all other URLs
|
|
if (allowList.length === 0 && denyList.length === 0) {
|
|
return true;
|
|
}
|
|
|
|
// Special case: Allow 'about:blank' explicitly
|
|
if (trimmedUrl === 'about:blank') {
|
|
return true;
|
|
}
|
|
|
|
try {
|
|
const parsedUrl = new URL(trimmedUrl);
|
|
|
|
// 1. Remove protocol prefix for further comparisons
|
|
const urlWithoutProtocol = lowerCaseUrl.replace(/^https?:\/\//, '');
|
|
|
|
// 2. First check full URL against deny list
|
|
for (const deniedEntry of denyList) {
|
|
if (urlWithoutProtocol === deniedEntry) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
// 3. Check full URL against allow list
|
|
for (const allowedEntry of allowList) {
|
|
if (urlWithoutProtocol === allowedEntry) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
// 4. Extract domain for domain-based checks
|
|
let domain = parsedUrl.hostname.toLowerCase();
|
|
|
|
// Remove port number if present
|
|
const portIndex = domain.indexOf(':');
|
|
if (portIndex > -1) {
|
|
domain = domain.substring(0, portIndex);
|
|
}
|
|
|
|
// 5. Check domain against deny list
|
|
for (const deniedEntry of denyList) {
|
|
if (domain === deniedEntry || domain.endsWith(`.${deniedEntry}`)) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
// 6. Check domain against allow list
|
|
for (const allowedEntry of allowList) {
|
|
if (domain === allowedEntry || domain.endsWith(`.${allowedEntry}`)) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
// Default policy
|
|
return allowList.length === 0;
|
|
} catch (error) {
|
|
// Invalid URL format - deny by default
|
|
return false;
|
|
}
|
|
|
|
}
|
|
|
|
export function getDomainFromUrl(url: string): string {
|
|
try {
|
|
const parsedUrl = new URL(url);
|
|
return parsedUrl.hostname.toLowerCase();
|
|
} catch (error) {
|
|
return 'unknown';
|
|
}
|
|
} |