@masyv/secretscan 0.1.0 → 0.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/core/Cargo.toml CHANGED
@@ -1,6 +1,6 @@
1
1
  [package]
2
2
  name = "secretscan"
3
- version = "0.1.0"
3
+ version = "0.1.1"
4
4
  edition = "2021"
5
5
  description = "SecretScan — Real-time secret & credential detector for Claude Code. Blocks API keys, tokens, and private keys from entering your LLM context."
6
6
  license = "MIT"
package/core/src/main.rs CHANGED
@@ -117,7 +117,29 @@ fn main() -> Result<()> {
117
117
  let text = read_input(&input)?;
118
118
  let min_sev = parse_severity(&severity);
119
119
 
120
- let findings = patterns::scan_all(&text);
120
+ let all_findings = patterns::scan_all(&text);
121
+
122
+ // Filter out allowlisted fingerprints
123
+ let store = Store::open(&db_path).ok();
124
+ let findings: Vec<_> = all_findings
125
+ .into_iter()
126
+ .filter(|f| {
127
+ store.as_ref()
128
+ .map(|s| !s.is_allowed(&f.fingerprint).unwrap_or(false))
129
+ .unwrap_or(true)
130
+ })
131
+ .collect();
132
+
133
+ // Record findings to DB
134
+ if let Some(ref s) = store {
135
+ for f in &findings {
136
+ let _ = s.record_finding(f, None, "cli");
137
+ }
138
+ if !findings.is_empty() {
139
+ let _ = s.record_scan("cli", None, text.len(), findings.len(), 0);
140
+ }
141
+ }
142
+
121
143
  let filtered: Vec<_> = findings
122
144
  .iter()
123
145
  .filter(|f| f.severity >= min_sev)
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@masyv/secretscan",
3
- "version": "0.1.0",
3
+ "version": "0.1.1",
4
4
  "description": "SecretScan — Real-time secret & credential detector for Claude Code. 47 patterns covering Anthropic, AWS, GitHub, Stripe, database URLs, JWTs and more.",
5
5
  "scripts": {
6
6
  "build": "./scripts/build.sh",