Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
52 commits
Select commit Hold shift + click to select a range
a9c5b5b
chore(deps): update actions/download-artifact digest to 70fc10c
renovate[bot] Feb 23, 2026
1329b00
Merge pull request #750 from Wikid82/renovate/feature/beta-release-no…
Wikid82 Feb 23, 2026
bc9f2cf
chore: enable Gotify and Custom Webhhok notifications and improve pay…
actions-user Feb 24, 2026
e8a5135
fix: enhance Trivy scan result uploads with conditional checks and ca…
actions-user Feb 24, 2026
fdbf1a6
fix: implement outbound request URL validation and redirect guard in …
actions-user Feb 24, 2026
fcc60a0
Merge branch 'development' into feature/beta-release
Wikid82 Feb 24, 2026
5a2e118
fix: correct configuration key from 'linters-settings' to 'settings' …
actions-user Feb 24, 2026
b531a84
fix: refactor logout function to use useCallback for improved perform…
actions-user Feb 24, 2026
65228c5
fix: enhance Docker image loading and tagging in security scan workflow
actions-user Feb 24, 2026
8381790
fix: improve CodeQL SARIF parsing for accurate high/critical findings…
actions-user Feb 24, 2026
b1a1a7a
fix: enhance CodeQL SARIF parsing for improved severity level detection
actions-user Feb 24, 2026
f56fa41
fix: ensure delete confirmation dialog is always open when triggered
actions-user Feb 24, 2026
6cec0a6
fix: add exception handling for specific SSRF rule in CodeQL SARIF ch…
actions-user Feb 24, 2026
0034968
fix: enforce secure cookie settings and enhance URL validation in HTT…
actions-user Feb 24, 2026
7983de9
fix: enhance workflow triggers and context handling for security scans
actions-user Feb 24, 2026
4d4a5d3
fix: update trustTestCertificate function to remove unnecessary param…
actions-user Feb 24, 2026
e13b49c
chore(deps): update github/codeql-action digest to 28737ec
renovate[bot] Feb 24, 2026
bc4c7c1
Merge pull request #758 from Wikid82/renovate/feature/beta-release-no…
Wikid82 Feb 24, 2026
bbaad17
fix: enhance notification provider validation and error handling in T…
actions-user Feb 24, 2026
2b4f606
fix: add Docker socket volume for container discovery in E2E tests
actions-user Feb 24, 2026
bf53712
fix: implement bearer token handling in TestDataManager and add API h…
actions-user Feb 24, 2026
a9dcc00
fix: enhance DockerUnavailableError to include detailed error message…
actions-user Feb 24, 2026
32f2d25
chore(deps): update non-major-updates
renovate[bot] Feb 25, 2026
15cdaa8
Merge pull request #759 from Wikid82/renovate/feature/beta-release-no…
Wikid82 Feb 25, 2026
e5cebc0
fix: remove model references from agent markdown files
actions-user Feb 25, 2026
9a683c3
fix: enhance authentication token retrieval and header building acros…
actions-user Feb 25, 2026
aa2e7a1
choredocker): enhance local Docker socket access and error handling
actions-user Feb 25, 2026
7591d2c
fix: update minimum coverage threshold to 87 for frontend and backend…
actions-user Feb 25, 2026
d8e6d8d
fix: update vulnerability reporting methods in SECURITY.md
actions-user Feb 25, 2026
c156183
fix: Enhance security handler tests and implement role-based access c…
actions-user Feb 25, 2026
690480e
fix: Implement user API enhancements with masked API keys and updated…
actions-user Feb 25, 2026
29f6664
fix: enforce admin role requirement for SMTP configuration access
actions-user Feb 25, 2026
7b1861f
fix: enhance security in account settings and notifications payload t…
actions-user Feb 25, 2026
4d0df36
fix: streamline group management functions and enhance directory chec…
actions-user Feb 25, 2026
0917edb
fix: enhance notification provider handling by adding token visibilit…
actions-user Feb 25, 2026
cb16ac0
fix: implement security severity policy and enhance CodeQL checks for…
actions-user Feb 25, 2026
ce335ff
chore(deps): update non-major-updates
renovate[bot] Feb 25, 2026
d97c08b
Merge pull request #760 from Wikid82/renovate/feature/beta-release-no…
Wikid82 Feb 25, 2026
12a04b4
chore: update devDependencies to include ESLint plugins for CSS, JSON…
actions-user Feb 25, 2026
a98c9ed
chore: add EthicalCheck workflow for automated API security testing
actions-user Feb 25, 2026
0deffd3
fix: change default DRY_RUN value to false in prune-container-images …
actions-user Feb 25, 2026
bab8414
chore(deps): pin github/codeql-action action to 4558047
renovate[bot] Feb 25, 2026
ad31bac
fix: enhance error classification for notification provider tests and…
actions-user Feb 25, 2026
1af0498
fix: update protected regex pattern for container pruning scripts and…
actions-user Feb 25, 2026
a6c6ce5
fix: improve destination URL handling in HTTP wrapper to enhance secu…
actions-user Feb 25, 2026
a1c88de
fix: enhance GHCR API interaction by adding recommended headers and i…
actions-user Feb 25, 2026
5b436a8
Merge pull request #761 from Wikid82/renovate/feature/beta-release-pi…
Wikid82 Feb 25, 2026
1220302
fix: enhance API interactions by adding authorization headers and imp…
actions-user Feb 25, 2026
4a39818
fix: remove EthicalCheck workflow due to deprecation and lack of support
actions-user Feb 25, 2026
46fe59c
fix: add GitHub CLI to tools installation in container prune workflow
actions-user Feb 25, 2026
e1c0173
fix: update script version echo statement in prune-container-images.sh
actions-user Feb 25, 2026
fb69f3d
fix: add debug output for prune script execution in container prune w…
actions-user Feb 25, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions .docker/compose/docker-compose.dev.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,8 @@ services:
#- CPM_SECURITY_RATELIMIT_ENABLED=false
#- CPM_SECURITY_ACL_ENABLED=false
- FEATURE_CERBERUS_ENABLED=true
# Docker socket group access: copy docker-compose.override.example.yml
# to docker-compose.override.yml and set your host's docker GID.
volumes:
- /var/run/docker.sock:/var/run/docker.sock:ro # For local container discovery
- crowdsec_data:/app/data/crowdsec
Expand Down
2 changes: 2 additions & 0 deletions .docker/compose/docker-compose.local.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,8 @@ services:
- FEATURE_CERBERUS_ENABLED=true
# Emergency "break-glass" token for security reset when ACL blocks access
- CHARON_EMERGENCY_TOKEN=03e4682c1164f0c1cb8e17c99bd1a2d9156b59824dde41af3bb67c513e5c5e92
# Docker socket group access: copy docker-compose.override.example.yml
# to docker-compose.override.yml and set your host's docker GID.
extra_hosts:
- "host.docker.internal:host-gateway"
cap_add:
Expand Down
26 changes: 26 additions & 0 deletions .docker/compose/docker-compose.override.example.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
# Docker Compose override — copy to docker-compose.override.yml to activate.
#
# Use case: grant the container access to the host Docker socket so that
# Charon can discover running containers.
#
# 1. cp docker-compose.override.example.yml docker-compose.override.yml
# 2. Uncomment the service that matches your compose file:
# - "charon" for docker-compose.local.yml
# - "app" for docker-compose.dev.yml
# 3. Replace <GID> with the output of: stat -c '%g' /var/run/docker.sock
# 4. docker compose up -d

services:
# Uncomment for docker-compose.local.yml
charon:
group_add:
- "<GID>" # e.g. "988" — run: stat -c '%g' /var/run/docker.sock
volumes:
- /var/run/docker.sock:/var/run/docker.sock:ro

# Uncomment for docker-compose.dev.yml
app:
group_add:
- "<GID>" # e.g. "988" — run: stat -c '%g' /var/run/docker.sock
volumes:
- /var/run/docker.sock:/var/run/docker.sock:ro
2 changes: 2 additions & 0 deletions .docker/compose/docker-compose.playwright-ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -85,6 +85,7 @@ services:
- playwright_data:/app/data
- playwright_caddy_data:/data
- playwright_caddy_config:/config
- /var/run/docker.sock:/var/run/docker.sock:ro # For container discovery in tests
healthcheck:
test: ["CMD", "curl", "-sf", "http://localhost:8080/api/v1/health"]
interval: 5s
Expand All @@ -111,6 +112,7 @@ services:
volumes:
- playwright_crowdsec_data:/var/lib/crowdsec/data
- playwright_crowdsec_config:/etc/crowdsec
- /var/run/docker.sock:/var/run/docker.sock:ro # For container discovery in tests
healthcheck:
test: ["CMD", "cscli", "version"]
interval: 10s
Expand Down
2 changes: 2 additions & 0 deletions .docker/compose/docker-compose.playwright-local.yml
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,8 @@ services:
# True tmpfs for E2E test data - fresh on every run, in-memory only
# mode=1777 allows any user to write (container runs as non-root)
- /app/data:size=100M,mode=1777
volumes:
- /var/run/docker.sock:/var/run/docker.sock:ro # For container discovery in tests
healthcheck:
test: ["CMD-SHELL", "curl -fsS http://localhost:8080/api/v1/health || exit 1"]
interval: 5s
Expand Down
31 changes: 16 additions & 15 deletions .docker/docker-entrypoint.sh
Original file line number Diff line number Diff line change
Expand Up @@ -27,30 +27,24 @@ get_group_by_gid() {
}

create_group_with_gid() {
local gid="$1"
local name="$2"

if command -v addgroup >/dev/null 2>&1; then
addgroup -g "$gid" "$name" 2>/dev/null || true
addgroup -g "$1" "$2" 2>/dev/null || true
return
fi

if command -v groupadd >/dev/null 2>&1; then
groupadd -g "$gid" "$name" 2>/dev/null || true
groupadd -g "$1" "$2" 2>/dev/null || true
fi
}

add_user_to_group() {
local user="$1"
local group="$2"

if command -v addgroup >/dev/null 2>&1; then
addgroup "$user" "$group" 2>/dev/null || true
addgroup "$1" "$2" 2>/dev/null || true
return
fi

if command -v usermod >/dev/null 2>&1; then
usermod -aG "$group" "$user" 2>/dev/null || true
usermod -aG "$2" "$1" 2>/dev/null || true
fi
}

Expand Down Expand Up @@ -142,8 +136,15 @@ if [ -S "/var/run/docker.sock" ] && is_root; then
fi
fi
elif [ -S "/var/run/docker.sock" ]; then
echo "Note: Docker socket mounted but container is running non-root; skipping docker.sock group setup."
echo " If Docker discovery is needed, run with matching group permissions (e.g., --group-add)"
DOCKER_SOCK_GID=$(stat -c '%g' /var/run/docker.sock 2>/dev/null || echo "unknown")
echo "Note: Docker socket mounted (GID=$DOCKER_SOCK_GID) but container is running non-root; skipping docker.sock group setup."
echo " If Docker discovery is needed, add 'group_add: [\"$DOCKER_SOCK_GID\"]' to your compose service."
if [ "$DOCKER_SOCK_GID" = "0" ]; then
if [ "${ALLOW_DOCKER_SOCK_GID_0:-false}" != "true" ]; then
echo "⚠️ WARNING: Docker socket GID is 0 (root group). group_add: [\"0\"] grants root-group access."
echo " Set ALLOW_DOCKER_SOCK_GID_0=true to acknowledge this risk."
fi
fi
else
echo "Note: Docker socket not found. Docker container discovery will be unavailable."
fi
Expand Down Expand Up @@ -191,7 +192,7 @@ if command -v cscli >/dev/null; then
echo "Initializing persistent CrowdSec configuration..."

# Check if .dist has content
if [ -d "/etc/crowdsec.dist" ] && [ -n "$(ls -A /etc/crowdsec.dist 2>/dev/null)" ]; then
if [ -d "/etc/crowdsec.dist" ] && find /etc/crowdsec.dist -mindepth 1 -maxdepth 1 -print -quit 2>/dev/null | grep -q .; then
echo "Copying config from /etc/crowdsec.dist..."
if ! cp -r /etc/crowdsec.dist/* "$CS_CONFIG_DIR/"; then
echo "ERROR: Failed to copy config from /etc/crowdsec.dist"
Expand All @@ -208,7 +209,7 @@ if command -v cscli >/dev/null; then
exit 1
fi
echo "✓ Successfully initialized config from .dist directory"
elif [ -d "/etc/crowdsec" ] && [ ! -L "/etc/crowdsec" ] && [ -n "$(ls -A /etc/crowdsec 2>/dev/null)" ]; then
elif [ -d "/etc/crowdsec" ] && [ ! -L "/etc/crowdsec" ] && find /etc/crowdsec -mindepth 1 -maxdepth 1 -print -quit 2>/dev/null | grep -q .; then
echo "Copying config from /etc/crowdsec (fallback)..."
if ! cp -r /etc/crowdsec/* "$CS_CONFIG_DIR/"; then
echo "ERROR: Failed to copy config from /etc/crowdsec (fallback)"
Expand Down Expand Up @@ -248,7 +249,7 @@ if command -v cscli >/dev/null; then
echo "Expected: /etc/crowdsec -> /app/data/crowdsec/config"
echo "This indicates a critical build-time issue. Symlink must be created at build time as root."
echo "DEBUG: Directory check:"
ls -la /etc/ | grep crowdsec || echo " (no crowdsec entry found)"
find /etc -mindepth 1 -maxdepth 1 -name '*crowdsec*' -exec ls -ld {} \; 2>/dev/null || echo " (no crowdsec entry found)"
exit 1
fi

Expand Down
2 changes: 1 addition & 1 deletion .github/agents/Backend_Dev.agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: 'Senior Go Engineer focused on high-performance, secure backend imp
argument-hint: 'The specific backend task from the Plan (e.g., "Implement ProxyHost CRUD endpoints")'
tools: vscode/extensions, vscode/getProjectSetupInfo, vscode/installExtension, vscode/memory, vscode/openIntegratedBrowser, vscode/runCommand, vscode/askQuestions, vscode/vscodeAPI, execute, read, agent, 'github/*', 'github/*', 'io.github.goreleaser/mcp/*', edit, search, web, 'github/*', 'playwright/*', todo, vscode.mermaid-chat-features/renderMermaidDiagram, github.vscode-pull-request-github/issue_fetch, github.vscode-pull-request-github/labels_fetch, github.vscode-pull-request-github/notification_fetch, github.vscode-pull-request-github/doSearch, github.vscode-pull-request-github/activePullRequest, github.vscode-pull-request-github/openPullRequest, ms-azuretools.vscode-containers/containerToolsConfig, ms-python.python/getPythonEnvironmentInfo, ms-python.python/getPythonExecutableCommand, ms-python.python/installPythonPackage, ms-python.python/configurePythonEnvironment, ''

model: GPT-5.3-Codex (copilot)

target: vscode
user-invocable: true
disable-model-invocation: false
Expand Down
2 changes: 1 addition & 1 deletion .github/agents/DevOps.agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: 'DevOps specialist for CI/CD pipelines, deployment debugging, and G
argument-hint: 'The CI/CD or infrastructure task (e.g., "Debug failing GitHub Action workflow")'
tools: vscode/extensions, vscode/getProjectSetupInfo, vscode/installExtension, vscode/memory, vscode/openIntegratedBrowser, vscode/runCommand, vscode/askQuestions, vscode/vscodeAPI, execute, read, agent, 'github/*', 'github/*', 'io.github.goreleaser/mcp/*', edit, search, web, 'github/*', 'playwright/*', todo, vscode.mermaid-chat-features/renderMermaidDiagram, github.vscode-pull-request-github/issue_fetch, github.vscode-pull-request-github/labels_fetch, github.vscode-pull-request-github/notification_fetch, github.vscode-pull-request-github/doSearch, github.vscode-pull-request-github/activePullRequest, github.vscode-pull-request-github/openPullRequest, ms-azuretools.vscode-containers/containerToolsConfig, ms-python.python/getPythonEnvironmentInfo, ms-python.python/getPythonExecutableCommand, ms-python.python/installPythonPackage, ms-python.python/configurePythonEnvironment, ''

model: GPT-5.3-Codex (copilot)

target: vscode
user-invocable: true
disable-model-invocation: false
Expand Down
2 changes: 1 addition & 1 deletion .github/agents/Doc_Writer.agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: 'User Advocate and Writer focused on creating simple, layman-friend
argument-hint: 'The feature to document (e.g., "Write the guide for the new Real-Time Logs")'
tools: vscode/extensions, vscode/getProjectSetupInfo, vscode/installExtension, vscode/memory, vscode/openIntegratedBrowser, vscode/runCommand, vscode/askQuestions, vscode/vscodeAPI, execute, read, agent, 'github/*', 'github/*', 'io.github.goreleaser/mcp/*', edit, search, web, 'github/*', 'playwright/*', todo, vscode.mermaid-chat-features/renderMermaidDiagram, github.vscode-pull-request-github/issue_fetch, github.vscode-pull-request-github/labels_fetch, github.vscode-pull-request-github/notification_fetch, github.vscode-pull-request-github/doSearch, github.vscode-pull-request-github/activePullRequest, github.vscode-pull-request-github/openPullRequest, ms-azuretools.vscode-containers/containerToolsConfig, ms-python.python/getPythonEnvironmentInfo, ms-python.python/getPythonExecutableCommand, ms-python.python/installPythonPackage, ms-python.python/configurePythonEnvironment, ''

model: GPT-5.3-Codex (copilot)

target: vscode
user-invocable: true
disable-model-invocation: false
Expand Down
2 changes: 1 addition & 1 deletion .github/agents/Frontend_Dev.agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: 'Senior React/TypeScript Engineer for frontend implementation.'
argument-hint: 'The frontend feature or component to implement (e.g., "Implement the Real-Time Logs dashboard component")'
tools: vscode/extensions, vscode/getProjectSetupInfo, vscode/installExtension, vscode/memory, vscode/openIntegratedBrowser, vscode/runCommand, vscode/askQuestions, vscode/vscodeAPI, execute, read, agent, 'github/*', 'github/*', 'io.github.goreleaser/mcp/*', edit, search, web, 'github/*', 'playwright/*', todo, vscode.mermaid-chat-features/renderMermaidDiagram, github.vscode-pull-request-github/issue_fetch, github.vscode-pull-request-github/labels_fetch, github.vscode-pull-request-github/notification_fetch, github.vscode-pull-request-github/doSearch, github.vscode-pull-request-github/activePullRequest, github.vscode-pull-request-github/openPullRequest, ms-azuretools.vscode-containers/containerToolsConfig, ms-python.python/getPythonEnvironmentInfo, ms-python.python/getPythonExecutableCommand, ms-python.python/installPythonPackage, ms-python.python/configurePythonEnvironment, ''

model: GPT-5.3-Codex (copilot)

target: vscode
user-invocable: true
disable-model-invocation: false
Expand Down
2 changes: 1 addition & 1 deletion .github/agents/Management.agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ argument-hint: 'The high-level goal (e.g., "Build the new Proxy Host Dashboard w

tools: vscode/extensions, vscode/getProjectSetupInfo, vscode/installExtension, vscode/memory, vscode/openIntegratedBrowser, vscode/runCommand, vscode/askQuestions, vscode/vscodeAPI, execute, read, agent, 'github/*', 'github/*', 'io.github.goreleaser/mcp/*', edit, search, web, 'github/*', '', 'playwright/*', todo, vscode.mermaid-chat-features/renderMermaidDiagram, github.vscode-pull-request-github/issue_fetch, github.vscode-pull-request-github/labels_fetch, github.vscode-pull-request-github/notification_fetch, github.vscode-pull-request-github/doSearch, github.vscode-pull-request-github/activePullRequest, github.vscode-pull-request-github/openPullRequest, ms-azuretools.vscode-containers/containerToolsConfig, ms-python.python/getPythonEnvironmentInfo, ms-python.python/getPythonExecutableCommand, ms-python.python/installPythonPackage, ms-python.python/configurePythonEnvironment

model: GPT-5.3-Codex (copilot)

target: vscode
user-invocable: true
disable-model-invocation: false
Expand Down
2 changes: 1 addition & 1 deletion .github/agents/Planning.agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: 'Principal Architect for technical planning and design decisions.'
argument-hint: 'The feature or system to plan (e.g., "Design the architecture for Real-Time Logs")'
tools: vscode/extensions, vscode/getProjectSetupInfo, vscode/installExtension, vscode/memory, vscode/openIntegratedBrowser, vscode/runCommand, vscode/askQuestions, vscode/vscodeAPI, execute, read, agent, 'github/*', 'github/*', 'io.github.goreleaser/mcp/*', edit, search, web, 'github/*', 'playwright/*', todo, vscode.mermaid-chat-features/renderMermaidDiagram, github.vscode-pull-request-github/issue_fetch, github.vscode-pull-request-github/labels_fetch, github.vscode-pull-request-github/notification_fetch, github.vscode-pull-request-github/doSearch, github.vscode-pull-request-github/activePullRequest, github.vscode-pull-request-github/openPullRequest, ms-azuretools.vscode-containers/containerToolsConfig, ms-python.python/getPythonEnvironmentInfo, ms-python.python/getPythonExecutableCommand, ms-python.python/installPythonPackage, ms-python.python/configurePythonEnvironment , ''

model: GPT-5.3-Codex (copilot)

target: vscode
user-invocable: true
disable-model-invocation: false
Expand Down
2 changes: 1 addition & 1 deletion .github/agents/Playwright_Dev.agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ argument-hint: 'The feature or flow to test (e.g., "Write E2E tests for the logi

tools: vscode/extensions, vscode/getProjectSetupInfo, vscode/installExtension, vscode/memory, vscode/openIntegratedBrowser, vscode/runCommand, vscode/askQuestions, vscode/vscodeAPI, execute, read, agent, 'github/*', 'github/*', 'io.github.goreleaser/mcp/*', edit, search, web, 'github/*', '', 'playwright/*', todo, vscode.mermaid-chat-features/renderMermaidDiagram, github.vscode-pull-request-github/issue_fetch, github.vscode-pull-request-github/labels_fetch, github.vscode-pull-request-github/notification_fetch, github.vscode-pull-request-github/doSearch, github.vscode-pull-request-github/activePullRequest, github.vscode-pull-request-github/openPullRequest, ms-azuretools.vscode-containers/containerToolsConfig, ms-python.python/getPythonEnvironmentInfo, ms-python.python/getPythonExecutableCommand, ms-python.python/installPythonPackage, ms-python.python/configurePythonEnvironment

model: GPT-5.3-Codex (copilot)

target: vscode
user-invocable: true
disable-model-invocation: false
Expand Down
2 changes: 1 addition & 1 deletion .github/agents/QA_Security.agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: 'Quality Assurance and Security Engineer for testing and vulnerabil
argument-hint: 'The component or feature to test (e.g., "Run security scan on authentication endpoints")'
tools: vscode/extensions, vscode/getProjectSetupInfo, vscode/installExtension, vscode/memory, vscode/openIntegratedBrowser, vscode/runCommand, vscode/askQuestions, vscode/vscodeAPI, execute, read, agent, 'github/*', 'github/*', 'io.github.goreleaser/mcp/*', edit, search, web, 'github/*', 'playwright/*', todo, vscode.mermaid-chat-features/renderMermaidDiagram, github.vscode-pull-request-github/issue_fetch, github.vscode-pull-request-github/labels_fetch, github.vscode-pull-request-github/notification_fetch, github.vscode-pull-request-github/doSearch, github.vscode-pull-request-github/activePullRequest, github.vscode-pull-request-github/openPullRequest, ms-azuretools.vscode-containers/containerToolsConfig, ms-python.python/getPythonEnvironmentInfo, ms-python.python/getPythonExecutableCommand, ms-python.python/installPythonPackage, ms-python.python/configurePythonEnvironment, ''

model: GPT-5.3-Codex (copilot)

target: vscode
user-invocable: true
disable-model-invocation: false
Expand Down
2 changes: 1 addition & 1 deletion .github/agents/Supervisor.agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ argument-hint: 'The PR or code change to review (e.g., "Review PR #123 for secur

tools: vscode/extensions, vscode/getProjectSetupInfo, vscode/installExtension, vscode/memory, vscode/openIntegratedBrowser, vscode/runCommand, vscode/askQuestions, vscode/vscodeAPI, execute, read, agent, 'github/*', 'github/*', 'io.github.goreleaser/mcp/*', edit, search, web, 'github/*', 'playwright/*', '', vscode.mermaid-chat-features/renderMermaidDiagram, github.vscode-pull-request-github/issue_fetch, github.vscode-pull-request-github/labels_fetch, github.vscode-pull-request-github/notification_fetch, github.vscode-pull-request-github/doSearch, github.vscode-pull-request-github/activePullRequest, github.vscode-pull-request-github/openPullRequest, ms-azuretools.vscode-containers/containerToolsConfig, ms-python.python/getPythonEnvironmentInfo, ms-python.python/getPythonExecutableCommand, ms-python.python/installPythonPackage, ms-python.python/configurePythonEnvironment, todo

model: GPT-5.3-Codex (copilot)

target: vscode
user-invocable: true
disable-model-invocation: false
Expand Down
55 changes: 55 additions & 0 deletions .github/security-severity-policy.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
version: 1
effective_date: 2026-02-25
scope:
- local pre-commit manual security hooks
- github actions security workflows

defaults:
blocking:
- critical
- high
medium:
mode: risk-based
default_action: report
require_sla: true
default_sla_days: 14
escalation:
trigger: high-signal class or repeated finding
action: require issue + owner + due date
low:
action: report

codeql:
severity_mapping:
error: high_or_critical
warning: medium_or_lower
note: informational
blocking_levels:
- error
warning_policy:
default_action: report
escalation_high_signal_rule_ids:
- go/request-forgery
- js/missing-rate-limiting
- js/insecure-randomness

trivy:
blocking_severities:
- CRITICAL
- HIGH
medium_policy:
action: report
escalation: issue-with-sla

grype:
blocking_severities:
- Critical
- High
medium_policy:
action: report
escalation: issue-with-sla

enforcement_contract:
codeql_local_vs_ci: "local and ci block on codeql error-level findings only"
supply_chain_medium: "medium vulnerabilities are non-blocking by default and require explicit triage"
auth_regression_guard: "state-changing routes must remain protected by auth middleware"
Loading
Loading