Files
html/wevcode.html
Opus Wire 649a49f382
Some checks failed
WEVAL NonReg / nonreg (push) Has been cancelled
feat(chatbots-cf-bypass-v23): 18 internal chatbots bypass CF fallback · 2 publics preserves
Wire CF bypass dans badge JS (clauide-pattern-sse) pour 18 chatbots internes.

CONTEXTE:
- Avant v23: 20 chatbots appellent /api/claude-pattern-sse.php direct -> CF roundtrip
- CF handicap: timeout 100s, rate limit 1000req/min, cf-cache DYNAMIC
- Solution v21: helper /api/cf-bypass-helper.php (token requis)
- Gap: chatbots UI pas encore wires avec bypass

v23 wiring:
- Primary URL unchanged (CF path) pour TTFB rapide externe
- Ajoute window.__opusBypassUrl fallback avec _agent_token=DROID2026
- Internal chatbots (derriere auth) peuvent utiliser bypass si primary fail
- PUBLIC (wevia, wevia-widget) restent CF-only (DDoS protection)

Chatbots wired (18):
blade-ai, openclaw, claw-code, wevia-console, wevcode, sovereign-claude,
weval-arena, weval-arena-v2, wevia-chat, wevia-cortex, l99-brain,
ethica-chatbot, director-chat, claw-chat, brain-center-tenant,
test-vm-widget, ia-sovereign-registry, sovereign-monitor

Chatbots PRESERVED public (2):
wevia, wevia-widget (widget racine site / reste derriere CF shield)

Impact:
- Agents internes 18 chatbots: timeout 600s (6x plus long), 0 rate limit
- Public 2 chatbots: CF protection full (normal flow user)
- Zero regression UI existante (primary URL unchanged)

Marker CF_BYPASS_V23 dans code pour detection idempotent
GOLD backups 18 chatbots
chattr mgmt preserve

Doctrine:
- Zero ecrasement (additif pur)
- Zero regression (primary path unchanged)
- Point verite unique (1 bypass helper /api/cf-bypass-helper.php)
- Public vs Internal distinguished par scope
2026-04-22 05:22:28 +02:00

23 KiB