@blogic-cz/agent-tools 0.5.1 → 0.5.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@blogic-cz/agent-tools",
3
- "version": "0.5.1",
3
+ "version": "0.5.3",
4
4
  "description": "CLI tools for AI coding agent workflows — GitHub, database, Kubernetes, Azure DevOps, logs, sessions, and audit",
5
5
  "keywords": [
6
6
  "agent",
@@ -349,7 +349,8 @@ export function createCredentialGuard(config?: CredentialGuardConfig): Credentia
349
349
  `\u{1F6AB} Access blocked: "${filePath}" is a sensitive file.\n\n` +
350
350
  `This file may contain credentials or secrets.\n` +
351
351
  `If you need this file's content, ask the user to provide relevant parts.\n\n` +
352
- `Think this should be allowed? See https://github.com/blogic-cz/agent-tools — fork, extend the guard, and submit a PR.`,
352
+ `Think this should be allowed? See https://github.com/blogic-cz/agent-tools — fork, extend the guard, and submit a PR.\n` +
353
+ `→ Skill "agent-tools"`,
353
354
  );
354
355
  }
355
356
  }
@@ -365,7 +366,8 @@ export function createCredentialGuard(config?: CredentialGuardConfig): Credentia
365
366
  `\u{1F6AB} Secret detected: Potential ${detected.name} found in content.\n\n` +
366
367
  `Matched: ${detected.match}\n\n` +
367
368
  `Never commit secrets to code. Use environment variables or secret managers.\n\n` +
368
- `Think this is a false positive? See https://github.com/blogic-cz/agent-tools — fork, fix the pattern, and submit a PR.`,
369
+ `Think this is a false positive? See https://github.com/blogic-cz/agent-tools — fork, fix the pattern, and submit a PR.\n` +
370
+ `→ Skill "agent-tools"`,
369
371
  );
370
372
  }
371
373
  }
@@ -380,7 +382,8 @@ export function createCredentialGuard(config?: CredentialGuardConfig): Credentia
380
382
  `\u{1F6AB} Command blocked: This command might expose secrets.\n\n` +
381
383
  `Command: ${command}\n\n` +
382
384
  `If you need environment info, ask the user directly.\n\n` +
383
- `Think this is wrong? See https://github.com/blogic-cz/agent-tools — fork, adjust the patterns, and submit a PR.`,
385
+ `Think this is wrong? See https://github.com/blogic-cz/agent-tools — fork, adjust the patterns, and submit a PR.\n` +
386
+ `→ Skill "agent-tools"`,
384
387
  );
385
388
  }
386
389
 
@@ -391,7 +394,8 @@ export function createCredentialGuard(config?: CredentialGuardConfig): Credentia
391
394
  `AI agents must use wrapper tools for security and audit.\n\n` +
392
395
  `Use instead: bun ${blockedTool.wrapper}\n\n` +
393
396
  `Example: bun ${blockedTool.wrapper} --help\n\n` +
394
- `Think this tool should be allowed? See https://github.com/blogic-cz/agent-tools — fork, extend the whitelist, and submit a PR.`,
397
+ `Think this tool should be allowed? See https://github.com/blogic-cz/agent-tools — fork, extend the whitelist, and submit a PR.\n` +
398
+ `→ Skill "agent-tools"`,
395
399
  );
396
400
  }
397
401
  }
@@ -364,6 +364,14 @@ const fetchJobLogs = Effect.fn("workflow.fetchJobLogs")(function* (opts: {
364
364
  let repoName: string;
365
365
  if (opts.repo !== null) {
366
366
  const parts = opts.repo.split("/");
367
+ if (parts.length !== 2 || !parts[0] || !parts[1]) {
368
+ return yield* new GitHubCommandError({
369
+ message: `Invalid --repo format: "${opts.repo}". Expected "owner/name" (e.g. "blogic-cz/agent-tools").`,
370
+ command: "workflow job-logs",
371
+ exitCode: 1,
372
+ stderr: "",
373
+ });
374
+ }
367
375
  owner = parts[0];
368
376
  repoName = parts[1];
369
377
  } else {