2659ec3231
* Refactor CLAUDE.md and related files for December 2025 updates - Updated CLAUDE.md in src/services/worker with new entries for December 2025, including changes to Search.ts, GeminiAgent.ts, SDKAgent.ts, and SessionManager.ts. - Revised CLAUDE.md in src/shared to reflect updates and new entries for December 2025, including paths.ts and worker-utils.ts. - Modified hook-constants.ts to clarify exit codes and their behaviors. - Added comprehensive hooks reference documentation for Claude Code, detailing usage, events, and examples. - Created initial CLAUDE.md files in various directories to track recent activity. * fix: Merge user-message-hook output into context-hook hookSpecificOutput - Add footer message to additionalContext in context-hook.ts - Remove user-message-hook from SessionStart hooks array - Fixes issue where stderr+exit(1) approach was silently discarded Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * Update logs and documentation for recent plugin and worker service changes - Added detailed logs for worker service activities from Dec 10, 2025 to Jan 7, 2026, including initialization patterns, cleanup confirmations, and diagnostic logging. - Updated plugin documentation with recent activities, including plugin synchronization and configuration changes from Dec 3, 2025 to Jan 7, 2026. - Enhanced the context hook and worker service logs to reflect improvements and fixes in the plugin architecture. - Documented the migration and verification processes for the Claude memory system and its integration with the marketplace. * Refactor hooks architecture and remove deprecated user-message-hook - Updated hook configurations in CLAUDE.md and hooks.json to reflect changes in session start behavior. - Removed user-message-hook functionality as it is no longer utilized in Claude Code 2.1.0; context is now injected silently. - Enhanced context-hook to handle session context injection without user-visible messages. - Cleaned up documentation across multiple files to align with the new hook structure and removed references to obsolete hooks. - Adjusted timing and command execution for hooks to improve performance and reliability. * fix: Address PR #610 review issues - Replace USER_MESSAGE_ONLY test with BLOCKING_ERROR test in hook-constants.test.ts - Standardize Claude Code 2.1.0 note wording across all three documentation files - Exclude deprecated user-message-hook.ts from logger-usage-standards test Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * fix: Remove hardcoded fake token counts from context injection Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * Address PR #610 review issues by fixing test files, standardizing documentation notes, and verifying code quality improvements. * fix: Add path validation to CLAUDE.md distribution to prevent invalid directory creation - Add isValidPathForClaudeMd() function to reject invalid paths: - Tilde paths (~) that Node.js doesn't expand - URLs (http://, https://) - Paths with spaces (likely command text or PR references) - Paths with # (GitHub issue/PR references) - Relative paths that escape project boundary - Integrate validation in updateFolderClaudeMdFiles loop - Add 6 unit tests for path validation - Update .gitignore to prevent accidental commit of malformed directories - Clean up existing invalid directories (~/, PR #610..., git diff..., https:) Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com> * fix: Implement path validation in CLAUDE.md generation to prevent invalid directory creation - Added `isValidPathForClaudeMd()` function to validate file paths in `src/utils/claude-md-utils.ts`. - Integrated path validation in `updateFolderClaudeMdFiles` to skip invalid paths. - Added 6 new unit tests in `tests/utils/claude-md-utils.test.ts` to cover various rejection cases. - Updated `.gitignore` to prevent tracking of invalid directories. - Cleaned up existing invalid directories in the repository. * feat: Promote critical WARN logs to ERROR level across codebase Comprehensive log-level audit promoting 38+ WARN messages to ERROR for improved debugging and incident response: - Parser: observation type errors, data contamination - SDK/Agents: empty init responses (Gemini, OpenRouter) - Worker/Queue: session recovery, auto-recovery failures - Chroma: sync failures, search failures (now treated as critical) - SQLite: search failures (primary data store) - Session/Generator: failures, missing context - Infrastructure: shutdown, process management failures - File Operations: CLAUDE.md updates, config reads - Branch Management: recovery checkout failures Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com> * fix: Address PR #614 review issues - Remove incorrectly tracked tilde-prefixed files from git - Fix absolute path validation to check projectRoot boundaries - Add test coverage for absolute path validation edge cases Closes review issues: - Issue 1: ~/ prefixed files removed from tracking - Issue 3: Absolute paths now validated against projectRoot - Issue 4: Added 3 new test cases for absolute path scenarios Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * build assets and context --------- Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>
263 lines
6.8 KiB
Markdown
263 lines
6.8 KiB
Markdown
# CLAUDE.md Path Validation Bug Fix
|
|
|
|
## Problem Summary
|
|
|
|
Claude-Mem 9.0's distributed CLAUDE.md feature has a **critical path validation bug** that creates invalid directories when Claude SDK agent outputs non-path strings in file tracking XML tags (`<files_read>`, `<files_modified>`).
|
|
|
|
### Root Cause
|
|
|
|
In `src/utils/claude-md-utils.ts:234-239`:
|
|
```typescript
|
|
if (projectRoot && !path.isAbsolute(filePath)) {
|
|
absoluteFilePath = path.join(projectRoot, filePath);
|
|
}
|
|
```
|
|
|
|
- `path.isAbsolute('~/.claude-mem/logs')` returns `false` (Node.js doesn't recognize `~`)
|
|
- Code joins: `path.join(projectRoot, '~/.claude-mem/logs')` → `/project/~/.claude-mem/logs`
|
|
- `mkdirSync` creates literal directories
|
|
|
|
### Invalid Directories Currently in Repo
|
|
|
|
```
|
|
./~/ ← literal tilde directory
|
|
./PR #610 on thedotmack/ ← GitHub PR reference
|
|
./git diff for src/ ← git command text
|
|
./https:/code.claude.com/docs/en/ ← URL
|
|
```
|
|
|
|
---
|
|
|
|
## Implementation Plan
|
|
|
|
### Phase 1: Add Path Validation Function
|
|
|
|
**File:** `src/utils/claude-md-utils.ts`
|
|
|
|
Add new validation function after the imports (around line 16):
|
|
|
|
```typescript
|
|
/**
|
|
* Validate that a file path is safe for CLAUDE.md generation.
|
|
* Rejects tilde paths, URLs, command-like strings, and paths with invalid chars.
|
|
*
|
|
* @param filePath - The file path to validate
|
|
* @param projectRoot - Optional project root for boundary checking
|
|
* @returns true if path is valid for CLAUDE.md processing
|
|
*/
|
|
function isValidPathForClaudeMd(filePath: string, projectRoot?: string): boolean {
|
|
// Reject empty or whitespace-only
|
|
if (!filePath || !filePath.trim()) return false;
|
|
|
|
// Reject tilde paths (Node.js doesn't expand ~)
|
|
if (filePath.startsWith('~')) return false;
|
|
|
|
// Reject URLs
|
|
if (filePath.startsWith('http://') || filePath.startsWith('https://')) return false;
|
|
|
|
// Reject paths with spaces (likely command text or PR references)
|
|
if (filePath.includes(' ')) return false;
|
|
|
|
// Reject paths with # (GitHub issue/PR references)
|
|
if (filePath.includes('#')) return false;
|
|
|
|
// If projectRoot provided, ensure resolved path stays within project
|
|
if (projectRoot) {
|
|
const resolved = path.resolve(projectRoot, filePath);
|
|
const normalizedRoot = path.resolve(projectRoot);
|
|
if (!resolved.startsWith(normalizedRoot + path.sep) && resolved !== normalizedRoot) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
```
|
|
|
|
### Phase 2: Integrate Validation in updateFolderClaudeMdFiles
|
|
|
|
**File:** `src/utils/claude-md-utils.ts`
|
|
|
|
Modify the file path loop in `updateFolderClaudeMdFiles` (around line 232):
|
|
|
|
```typescript
|
|
for (const filePath of filePaths) {
|
|
if (!filePath || filePath === '') continue;
|
|
|
|
// VALIDATE PATH BEFORE PROCESSING
|
|
if (!isValidPathForClaudeMd(filePath, projectRoot)) {
|
|
logger.debug('FOLDER_INDEX', 'Skipping invalid file path', {
|
|
filePath,
|
|
reason: 'Failed path validation'
|
|
});
|
|
continue;
|
|
}
|
|
|
|
// ... rest of existing logic unchanged
|
|
}
|
|
```
|
|
|
|
### Phase 3: Add Unit Tests
|
|
|
|
**File:** `tests/utils/claude-md-utils.test.ts`
|
|
|
|
Add new test block after existing tests:
|
|
|
|
```typescript
|
|
describe('path validation in updateFolderClaudeMdFiles', () => {
|
|
it('should reject tilde paths', async () => {
|
|
const fetchMock = mock(() => Promise.resolve({ ok: true } as Response));
|
|
global.fetch = fetchMock;
|
|
|
|
await updateFolderClaudeMdFiles(
|
|
['~/.claude-mem/logs/worker.log'],
|
|
'test-project',
|
|
37777,
|
|
tempDir
|
|
);
|
|
|
|
expect(fetchMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should reject URLs', async () => {
|
|
const fetchMock = mock(() => Promise.resolve({ ok: true } as Response));
|
|
global.fetch = fetchMock;
|
|
|
|
await updateFolderClaudeMdFiles(
|
|
['https://example.com/file.ts'],
|
|
'test-project',
|
|
37777,
|
|
tempDir
|
|
);
|
|
|
|
expect(fetchMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should reject paths with spaces', async () => {
|
|
const fetchMock = mock(() => Promise.resolve({ ok: true } as Response));
|
|
global.fetch = fetchMock;
|
|
|
|
await updateFolderClaudeMdFiles(
|
|
['PR #610 on thedotmack/CLAUDE.md'],
|
|
'test-project',
|
|
37777,
|
|
tempDir
|
|
);
|
|
|
|
expect(fetchMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should reject paths with hash symbols', async () => {
|
|
const fetchMock = mock(() => Promise.resolve({ ok: true } as Response));
|
|
global.fetch = fetchMock;
|
|
|
|
await updateFolderClaudeMdFiles(
|
|
['issue#123/file.ts'],
|
|
'test-project',
|
|
37777,
|
|
tempDir
|
|
);
|
|
|
|
expect(fetchMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should reject path traversal outside project', async () => {
|
|
const fetchMock = mock(() => Promise.resolve({ ok: true } as Response));
|
|
global.fetch = fetchMock;
|
|
|
|
await updateFolderClaudeMdFiles(
|
|
['../../../etc/passwd'],
|
|
'test-project',
|
|
37777,
|
|
tempDir
|
|
);
|
|
|
|
expect(fetchMock).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should accept valid relative paths', async () => {
|
|
const apiResponse = {
|
|
content: [{ text: '| #123 | 4:30 PM | 🔵 | Test | ~100 |' }]
|
|
};
|
|
const fetchMock = mock(() => Promise.resolve({
|
|
ok: true,
|
|
json: () => Promise.resolve(apiResponse)
|
|
} as Response));
|
|
global.fetch = fetchMock;
|
|
|
|
await updateFolderClaudeMdFiles(
|
|
['src/utils/logger.ts'],
|
|
'test-project',
|
|
37777,
|
|
tempDir
|
|
);
|
|
|
|
expect(fetchMock).toHaveBeenCalledTimes(1);
|
|
});
|
|
});
|
|
```
|
|
|
|
### Phase 4: Update .gitignore
|
|
|
|
**File:** `.gitignore`
|
|
|
|
Add at end of file:
|
|
|
|
```gitignore
|
|
# Prevent literal tilde directories (path validation bug artifacts)
|
|
~*/
|
|
|
|
# Prevent other malformed path directories
|
|
http*/
|
|
https*/
|
|
```
|
|
|
|
### Phase 5: Clean Up Invalid Directories
|
|
|
|
**Command sequence:**
|
|
```bash
|
|
rm -rf "~/."
|
|
rm -rf "PR #610 on thedotmack"
|
|
rm -rf "git diff for src"
|
|
rm -rf "https:"
|
|
```
|
|
|
|
### Phase 6: Verify and Commit
|
|
|
|
1. Run test suite: `npm test`
|
|
2. Run build: `npm run build`
|
|
3. Verify no invalid directories remain
|
|
4. Commit with message: `fix: Add path validation to CLAUDE.md distribution to prevent invalid directory creation`
|
|
|
|
---
|
|
|
|
## Files Modified
|
|
|
|
| File | Change |
|
|
|------|--------|
|
|
| `src/utils/claude-md-utils.ts` | Add `isValidPathForClaudeMd()` function + integrate in loop |
|
|
| `tests/utils/claude-md-utils.test.ts` | Add 6 new path validation tests |
|
|
| `.gitignore` | Add `~*/`, `http*/`, `https*/` patterns |
|
|
|
|
## Files Deleted
|
|
|
|
| Path | Reason |
|
|
|------|--------|
|
|
| `~/` (directory tree) | Invalid literal tilde directory |
|
|
| `PR #610 on thedotmack/` | Invalid PR reference directory |
|
|
| `git diff for src/` | Invalid git command directory |
|
|
| `https:/` | Invalid URL directory |
|
|
|
|
---
|
|
|
|
## Risk Assessment
|
|
|
|
**Low Risk:**
|
|
- Validation is additive (only skips invalid paths, doesn't change valid path handling)
|
|
- Existing tests remain unchanged
|
|
- Fire-and-forget design means failures are logged but don't break hooks
|
|
|
|
**Testing Coverage:**
|
|
- 6 new unit tests covering all rejection cases
|
|
- Existing 27 tests verify valid path behavior unchanged
|