Skip to content

Commit fdafe4e

Browse files
committed
fixing the linter errors from ruff
Signed-off-by: Ambrish Rawat <[email protected]>
1 parent f29d529 commit fdafe4e

File tree

10 files changed

+271
-226
lines changed

10 files changed

+271
-226
lines changed

docs/examples/security/taint_example.py

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,38 +3,44 @@
33
from mellea.security import SecLevel, privileged, SecurityError
44

55
# Create tainted content
6-
tainted_desc = CBlock("Process this sensitive user data", sec_level=SecLevel.tainted_by(None))
6+
tainted_desc = CBlock(
7+
"Process this sensitive user data", sec_level=SecLevel.tainted_by(None)
8+
)
79

8-
print(f"Original CBlock is tainted: {tainted_desc.sec_level.is_tainted() if tainted_desc.sec_level else False}")
10+
print(
11+
f"Original CBlock is tainted: {tainted_desc.sec_level.is_tainted() if tainted_desc.sec_level else False}"
12+
)
913

1014
# Create session
1115
session = start_session()
1216

1317
# Use tainted CBlock in session.instruct
1418
print("Testing session.instruct with tainted CBlock...")
15-
result = session.instruct(
16-
description=tainted_desc,
17-
)
19+
result = session.instruct(description=tainted_desc)
1820

1921
# The result should be tainted
20-
print(f"Result is tainted: {result.sec_level.is_tainted() if result.sec_level else False}")
22+
print(
23+
f"Result is tainted: {result.sec_level.is_tainted() if result.sec_level else False}"
24+
)
2125
if result.sec_level and result.sec_level.is_tainted():
2226
taint_source = result.sec_level.get_taint_source()
2327
print(f"Taint source: {taint_source}")
2428
print("✅ SUCCESS: Taint preserved!")
2529
else:
2630
print("❌ FAIL: Result should be tainted but isn't!")
2731

32+
2833
# Mock privileged function that requires un-tainted input
2934
@privileged
3035
def process_un_tainted_data(data: CBlock) -> str:
3136
"""A function that requires un-tainted input."""
3237
return f"Processed: {data.value}"
3338

39+
3440
print("\nTesting privileged function with tainted result...")
3541
try:
3642
# This should raise a SecurityError
3743
processed = process_un_tainted_data(result)
3844
print("❌ FAIL: Should have raised SecurityError!")
3945
except SecurityError as e:
40-
print(f"✅ SUCCESS: SecurityError raised - {e}")
46+
print(f"✅ SUCCESS: SecurityError raised - {e}")

mellea/backends/litellm.py

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@
2828
chat_completion_delta_merge,
2929
extract_model_tool_requests,
3030
)
31+
from mellea.security import taint_sources
3132
from mellea.stdlib.base import (
3233
CBlock,
3334
Component,
@@ -37,7 +38,6 @@
3738
ModelOutputThunk,
3839
ModelToolCall,
3940
)
40-
from mellea.security import taint_sources
4141
from mellea.stdlib.chat import Message
4242
from mellea.stdlib.requirement import ALoraRequirement
4343

@@ -312,11 +312,9 @@ async def _generate_from_chat_context_standard(
312312

313313
# Compute taint sources from action and context
314314
sources = taint_sources(action, ctx)
315-
315+
316316
output = ModelOutputThunk.from_generation(
317-
value=None,
318-
taint_sources=sources,
319-
meta={}
317+
value=None, taint_sources=sources, meta={}
320318
)
321319
output._context = linearized_context
322320
output._action = action

mellea/backends/ollama.py

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@
2525
)
2626
from mellea.helpers.event_loop_helper import _run_async_in_thread
2727
from mellea.helpers.fancy_logger import FancyLogger
28+
from mellea.security import taint_sources
2829
from mellea.stdlib.base import (
2930
CBlock,
3031
Component,
@@ -34,7 +35,6 @@
3435
ModelOutputThunk,
3536
ModelToolCall,
3637
)
37-
from mellea.security import taint_sources
3838
from mellea.stdlib.chat import Message
3939
from mellea.stdlib.requirement import ALoraRequirement
4040

@@ -357,11 +357,9 @@ async def generate_from_chat_context(
357357

358358
# Compute taint sources from action and context
359359
sources = taint_sources(action, ctx)
360-
360+
361361
output = ModelOutputThunk.from_generation(
362-
value=None,
363-
taint_sources=sources,
364-
meta={}
362+
value=None, taint_sources=sources, meta={}
365363
)
366364
output._context = linearized_context
367365
output._action = action
@@ -442,9 +440,7 @@ async def generate_from_raw(
442440
error = None
443441
if isinstance(response, BaseException):
444442
result = ModelOutputThunk.from_generation(
445-
value="",
446-
taint_sources=taint_sources(actions[i], None),
447-
meta={}
443+
value="", taint_sources=taint_sources(actions[i], None), meta={}
448444
)
449445
error = response
450446
else:

mellea/backends/openai.py

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,7 @@
4646
chat_completion_delta_merge,
4747
extract_model_tool_requests,
4848
)
49+
from mellea.security import taint_sources
4950
from mellea.stdlib.base import (
5051
CBlock,
5152
Component,
@@ -55,7 +56,6 @@
5556
GenerateType,
5657
ModelOutputThunk,
5758
)
58-
from mellea.security import taint_sources
5959
from mellea.stdlib.chat import Message
6060
from mellea.stdlib.intrinsics.intrinsic import Intrinsic
6161
from mellea.stdlib.requirement import ALoraRequirement, LLMaJRequirement, Requirement
@@ -642,11 +642,9 @@ async def _generate_from_chat_context_standard(
642642

643643
# Compute taint sources from action and context
644644
sources = taint_sources(action, ctx)
645-
645+
646646
output = ModelOutputThunk.from_generation(
647-
value=None,
648-
taint_sources=sources,
649-
meta={}
647+
value=None, taint_sources=sources, meta={}
650648
)
651649
output._context = linearized_context
652650
output._action = action

mellea/security/__init__.py

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,19 +7,19 @@
77
from .core import (
88
AccessType,
99
SecLevel,
10-
SecurityMetadata,
1110
SecurityError,
12-
privileged,
11+
SecurityMetadata,
1312
declassify,
13+
privileged,
1414
taint_sources,
1515
)
1616

1717
__all__ = [
1818
"AccessType",
1919
"SecLevel",
20-
"SecurityMetadata",
2120
"SecurityError",
22-
"privileged",
21+
"SecurityMetadata",
2322
"declassify",
23+
"privileged",
2424
"taint_sources",
25-
]
25+
]

0 commit comments

Comments
 (0)