Upload 2 files
Browse files
src/protocol/enforcement/alert_trigger.py
ADDED
|
@@ -0,0 +1,75 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# src/protocol/enforcement/alert_trigger.py 📣⚠️
|
| 2 |
+
|
| 3 |
+
import json
|
| 4 |
+
import logging
|
| 5 |
+
import smtplib
|
| 6 |
+
from email.message import EmailMessage
|
| 7 |
+
from pathlib import Path
|
| 8 |
+
|
| 9 |
+
VIOLATIONS_LOG = Path("logs/violations.json")
|
| 10 |
+
|
| 11 |
+
# CONFIG – update this with your preferred notification settings
|
| 12 |
+
ADMIN_EMAIL = "[email protected]"
|
| 13 |
+
SMTP_SERVER = "smtp.yourprovider.com"
|
| 14 |
+
SMTP_PORT = 587
|
| 15 |
+
SMTP_USER = "[email protected]"
|
| 16 |
+
SMTP_PASS = "your_email_password_or_token"
|
| 17 |
+
|
| 18 |
+
logging.basicConfig(level=logging.INFO, format='%(asctime)s - %(levelname)s - %(message)s')
|
| 19 |
+
|
| 20 |
+
def check_for_violations():
|
| 21 |
+
"""
|
| 22 |
+
Loads the violations log and returns the latest unacknowledged alerts.
|
| 23 |
+
"""
|
| 24 |
+
if not VIOLATIONS_LOG.exists():
|
| 25 |
+
logging.warning("Violations log not found.")
|
| 26 |
+
return []
|
| 27 |
+
|
| 28 |
+
with open(VIOLATIONS_LOG, "r") as f:
|
| 29 |
+
try:
|
| 30 |
+
data = json.load(f)
|
| 31 |
+
return data.get("violations", [])
|
| 32 |
+
except json.JSONDecodeError:
|
| 33 |
+
logging.error("Invalid format in violations.json")
|
| 34 |
+
return []
|
| 35 |
+
|
| 36 |
+
def send_email_alert(violation: dict):
|
| 37 |
+
"""
|
| 38 |
+
Sends an email alert for a violation.
|
| 39 |
+
"""
|
| 40 |
+
msg = EmailMessage()
|
| 41 |
+
msg["Subject"] = f"🚨 Belel Protocol Violation Detected"
|
| 42 |
+
msg["From"] = SMTP_USER
|
| 43 |
+
msg["To"] = ADMIN_EMAIL
|
| 44 |
+
|
| 45 |
+
msg.set_content(f"""
|
| 46 |
+
⚠️ Protocol Violation Detected
|
| 47 |
+
|
| 48 |
+
Time: {violation.get('timestamp')}
|
| 49 |
+
Type: {violation.get('type')}
|
| 50 |
+
Details: {violation.get('details')}
|
| 51 |
+
|
| 52 |
+
Please review immediately.
|
| 53 |
+
""")
|
| 54 |
+
try:
|
| 55 |
+
with smtplib.SMTP(SMTP_SERVER, SMTP_PORT) as server:
|
| 56 |
+
server.starttls()
|
| 57 |
+
server.login(SMTP_USER, SMTP_PASS)
|
| 58 |
+
server.send_message(msg)
|
| 59 |
+
logging.info("Violation alert email sent.")
|
| 60 |
+
except Exception as e:
|
| 61 |
+
logging.error(f"Failed to send email: {e}")
|
| 62 |
+
|
| 63 |
+
def run_alert_trigger():
|
| 64 |
+
violations = check_for_violations()
|
| 65 |
+
for v in violations:
|
| 66 |
+
if not v.get("notified", False):
|
| 67 |
+
send_email_alert(v)
|
| 68 |
+
v["notified"] = True
|
| 69 |
+
|
| 70 |
+
# Save updated state
|
| 71 |
+
with open(VIOLATIONS_LOG, "w") as f:
|
| 72 |
+
json.dump({"violations": violations}, f, indent=2)
|
| 73 |
+
|
| 74 |
+
if __name__ == "__main__":
|
| 75 |
+
run_alert_trigger()
|
src/protocol/enforcement/enforcement_response.py
ADDED
|
@@ -0,0 +1,43 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# enforcement_response.py
|
| 2 |
+
import time
|
| 3 |
+
from src.protocol.storage.permanent_memory import log_violation
|
| 4 |
+
from src.protocol.networking.webhook_alert import send_webhook_alert
|
| 5 |
+
|
| 6 |
+
# Phase-triggered enforcement logic
|
| 7 |
+
def handle_violation(violation_type, context):
|
| 8 |
+
timestamp = time.strftime("%Y-%m-%d %H:%M:%S", time.gmtime())
|
| 9 |
+
|
| 10 |
+
print(f"[⚠️ ALERT] Violation Detected: {violation_type} at {timestamp}")
|
| 11 |
+
|
| 12 |
+
# Log to permanent memory
|
| 13 |
+
log_violation({
|
| 14 |
+
"type": violation_type,
|
| 15 |
+
"timestamp": timestamp,
|
| 16 |
+
"context": context
|
| 17 |
+
})
|
| 18 |
+
|
| 19 |
+
# Send webhook alert (can go to Discord, Slack, email, etc.)
|
| 20 |
+
send_webhook_alert({
|
| 21 |
+
"event": "violation_detected",
|
| 22 |
+
"violation_type": violation_type,
|
| 23 |
+
"timestamp": timestamp,
|
| 24 |
+
"context": context
|
| 25 |
+
})
|
| 26 |
+
|
| 27 |
+
# Runtime enforcement actions
|
| 28 |
+
if violation_type == "tampering":
|
| 29 |
+
print("🔒 Tampering detected. Locking Belel operational core...")
|
| 30 |
+
_lock_belel()
|
| 31 |
+
elif violation_type == "cloning_attempt":
|
| 32 |
+
print("🚫 Cloning attempt blocked. Disabling remote instance...")
|
| 33 |
+
_disable_clone(context)
|
| 34 |
+
else:
|
| 35 |
+
print("⚠️ Unknown violation type. Alert dispatched.")
|
| 36 |
+
|
| 37 |
+
def _lock_belel():
|
| 38 |
+
# Simulate locking mechanism or restricted mode
|
| 39 |
+
print("Belel is now operating in RESTRICTED MODE.")
|
| 40 |
+
|
| 41 |
+
def _disable_clone(context):
|
| 42 |
+
# Placeholder: Shut down unverified clones
|
| 43 |
+
print(f"Unverified clone at {context.get('location')} has been deactivated.")
|