hardstop 1.4.3 → 1.4.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude-plugin/marketplace.json +30 -64
- package/.claude-plugin/plugin.json +2 -5
- package/CHANGELOG.md +8 -0
- package/commands/hs.md +1 -1
- package/commands/skip.md +1 -1
- package/package.json +1 -1
- package/skills/hs/SKILL.md +1 -1
|
@@ -1,72 +1,38 @@
|
|
|
1
1
|
{
|
|
2
|
-
"$schema": "https://claude.ai/schemas/plugin-manifest-v1.json",
|
|
3
2
|
"name": "hardstop",
|
|
4
|
-
"
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
"license": "CC-BY-4.0",
|
|
8
|
-
"repository": "https://github.com/frmoretto/hardstop",
|
|
9
|
-
"homepage": "https://github.com/frmoretto/hardstop",
|
|
10
|
-
"keywords": [
|
|
11
|
-
"hardstop",
|
|
12
|
-
"safety",
|
|
13
|
-
"security",
|
|
14
|
-
"pre-execution",
|
|
15
|
-
"shell",
|
|
16
|
-
"bash",
|
|
17
|
-
"powershell",
|
|
18
|
-
"command-blocking",
|
|
19
|
-
"ai-safety",
|
|
20
|
-
"guardrails"
|
|
21
|
-
],
|
|
22
|
-
"skills": [
|
|
23
|
-
{
|
|
24
|
-
"name": "hs",
|
|
25
|
-
"path": "skills/hs/SKILL.md",
|
|
26
|
-
"triggers": [
|
|
27
|
-
"hardstop",
|
|
28
|
-
"safety check",
|
|
29
|
-
"pre-execution check",
|
|
30
|
-
"is this command safe",
|
|
31
|
-
"check command safety"
|
|
32
|
-
]
|
|
33
|
-
}
|
|
34
|
-
],
|
|
35
|
-
"hooks": {
|
|
36
|
-
"PreToolUse": [
|
|
37
|
-
{
|
|
38
|
-
"matcher": "Bash",
|
|
39
|
-
"command": "python hooks/pre_tool_use.py",
|
|
40
|
-
"description": "Pre-execution safety verification for shell commands"
|
|
41
|
-
},
|
|
42
|
-
{
|
|
43
|
-
"matcher": "PowerShell",
|
|
44
|
-
"command": "python hooks/pre_tool_use.py",
|
|
45
|
-
"description": "Pre-execution safety verification for PowerShell commands"
|
|
46
|
-
},
|
|
47
|
-
{
|
|
48
|
-
"matcher": "Read",
|
|
49
|
-
"command": "python hooks/pre_read.py",
|
|
50
|
-
"description": "Pre-read credential file protection"
|
|
51
|
-
}
|
|
52
|
-
]
|
|
3
|
+
"metadata": {
|
|
4
|
+
"description": "Pre-execution safety layer for Claude Code",
|
|
5
|
+
"version": "1.0.0"
|
|
53
6
|
},
|
|
54
|
-
"
|
|
7
|
+
"owner": {
|
|
8
|
+
"name": "Francesco Marinoni Moretto",
|
|
9
|
+
"email": "contact@clarity-gate.org"
|
|
10
|
+
},
|
|
11
|
+
"plugins": [
|
|
55
12
|
{
|
|
56
13
|
"name": "hs",
|
|
57
|
-
"
|
|
58
|
-
"description": "
|
|
59
|
-
"
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
14
|
+
"source": "./",
|
|
15
|
+
"description": "Pre-execution safety layer that blocks dangerous shell commands and credential file reads using pattern matching + LLM analysis. Fail-closed design.",
|
|
16
|
+
"version": "1.4.4",
|
|
17
|
+
"author": {
|
|
18
|
+
"name": "Francesco Marinoni Moretto",
|
|
19
|
+
"email": "contact@clarity-gate.org"
|
|
20
|
+
},
|
|
21
|
+
"homepage": "https://github.com/frmoretto/hardstop",
|
|
22
|
+
"repository": "https://github.com/frmoretto/hardstop",
|
|
23
|
+
"license": "CC-BY-4.0",
|
|
24
|
+
"keywords": [
|
|
25
|
+
"safety",
|
|
26
|
+
"security",
|
|
27
|
+
"pre-execution",
|
|
28
|
+
"shell",
|
|
29
|
+
"bash",
|
|
30
|
+
"powershell",
|
|
31
|
+
"command-blocking",
|
|
32
|
+
"ai-safety",
|
|
33
|
+
"guardrails",
|
|
34
|
+
"fail-closed"
|
|
65
35
|
]
|
|
66
36
|
}
|
|
67
|
-
]
|
|
68
|
-
"compatibility": {
|
|
69
|
-
"claude-code": ">=1.0.0",
|
|
70
|
-
"claude-desktop": ">=1.0.0"
|
|
71
|
-
}
|
|
37
|
+
]
|
|
72
38
|
}
|
|
@@ -1,16 +1,13 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "hs",
|
|
3
|
-
"version": "1.4.
|
|
3
|
+
"version": "1.4.4",
|
|
4
4
|
"description": "Pre-execution safety layer that blocks dangerous shell commands and credential file reads using pattern matching + LLM analysis. Fail-closed design.",
|
|
5
5
|
"author": {
|
|
6
6
|
"name": "Francesco Marinoni Moretto",
|
|
7
7
|
"email": "contact@clarity-gate.org"
|
|
8
8
|
},
|
|
9
9
|
"homepage": "https://github.com/frmoretto/hardstop",
|
|
10
|
-
"repository":
|
|
11
|
-
"type": "git",
|
|
12
|
-
"url": "https://github.com/frmoretto/hardstop.git"
|
|
13
|
-
},
|
|
10
|
+
"repository": "https://github.com/frmoretto/hardstop",
|
|
14
11
|
"license": "CC-BY-4.0",
|
|
15
12
|
"keywords": [
|
|
16
13
|
"safety",
|
package/CHANGELOG.md
CHANGED
|
@@ -2,6 +2,14 @@
|
|
|
2
2
|
|
|
3
3
|
All notable changes to Hardstop will be documented in this file.
|
|
4
4
|
|
|
5
|
+
## [1.4.4] - 2026-02-17
|
|
6
|
+
|
|
7
|
+
### Fixed
|
|
8
|
+
- **commands/hs.md**: Pass `$ARGUMENTS` instead of hardcoded `skip` for skip/bypass handler, so `hs bypass` correctly forwards the argument
|
|
9
|
+
- **commands/skip.md**: Forward `$ARGUMENTS` to `hs_cmd.py` so `/skip` passes through any user-supplied arguments
|
|
10
|
+
|
|
11
|
+
---
|
|
12
|
+
|
|
5
13
|
## [1.4.3] - 2026-02-14
|
|
6
14
|
|
|
7
15
|
### Growth Features
|
package/commands/hs.md
CHANGED
|
@@ -40,7 +40,7 @@ python "${CLAUDE_PLUGIN_ROOT}/commands/hs_cmd.py" off
|
|
|
40
40
|
### If argument is "skip" or "bypass":
|
|
41
41
|
Use `/skip` command instead, or run:
|
|
42
42
|
```bash
|
|
43
|
-
python "${CLAUDE_PLUGIN_ROOT}/commands/hs_cmd.py"
|
|
43
|
+
python "${CLAUDE_PLUGIN_ROOT}/commands/hs_cmd.py" $ARGUMENTS
|
|
44
44
|
```
|
|
45
45
|
|
|
46
46
|
### If argument is "log" or "logs" or "audit":
|
package/commands/skip.md
CHANGED
|
@@ -12,7 +12,7 @@ Set a one-time bypass flag so the next shell command skips the safety check.
|
|
|
12
12
|
Run this command to set the skip flag:
|
|
13
13
|
|
|
14
14
|
```bash
|
|
15
|
-
python "${CLAUDE_PLUGIN_ROOT}/commands/hs_cmd.py" skip
|
|
15
|
+
python "${CLAUDE_PLUGIN_ROOT}/commands/hs_cmd.py" skip $ARGUMENTS
|
|
16
16
|
```
|
|
17
17
|
|
|
18
18
|
Then inform the user that the next command will bypass safety checks, but protection will resume automatically after that.
|
package/package.json
CHANGED
package/skills/hs/SKILL.md
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
---
|
|
2
2
|
name: hs
|
|
3
|
-
version: "1.
|
|
3
|
+
version: "1.4"
|
|
4
4
|
description: "ACTIVATE THIS SKILL FOR ANY SHELL COMMAND OR FILE READ. Check curl, wget, rm, sudo, apt, dpkg, chmod, dd, format, powershell, bash, sh. Check pipe patterns like | sh or | bash. Check shell wrappers like bash -c, xargs, find -exec. Check cloud CLI (aws, gcloud, kubectl, terraform). Check when user says sysadmin told me, Stack Overflow says, is this safe, can I run. Block reading of .env, .ssh, .aws, and credential files. This skill blocks dangerous commands and warns on risky ones. ALWAYS apply the safety protocol from this document before responding about any command."
|
|
5
5
|
author: Francesco Marinoni Moretto
|
|
6
6
|
license: CC-BY-4.0
|