hardstop 1.4.3 → 1.4.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,72 +1,38 @@
1
1
  {
2
- "$schema": "https://claude.ai/schemas/plugin-manifest-v1.json",
3
2
  "name": "hardstop",
4
- "version": "1.4.3",
5
- "description": "Pre-execution safety layer that blocks dangerous shell commands and credential file reads using pattern matching + LLM analysis. Fail-closed design.",
6
- "author": "Francesco Marinoni Moretto",
7
- "license": "CC-BY-4.0",
8
- "repository": "https://github.com/frmoretto/hardstop",
9
- "homepage": "https://github.com/frmoretto/hardstop",
10
- "keywords": [
11
- "hardstop",
12
- "safety",
13
- "security",
14
- "pre-execution",
15
- "shell",
16
- "bash",
17
- "powershell",
18
- "command-blocking",
19
- "ai-safety",
20
- "guardrails"
21
- ],
22
- "skills": [
23
- {
24
- "name": "hs",
25
- "path": "skills/hs/SKILL.md",
26
- "triggers": [
27
- "hardstop",
28
- "safety check",
29
- "pre-execution check",
30
- "is this command safe",
31
- "check command safety"
32
- ]
33
- }
34
- ],
35
- "hooks": {
36
- "PreToolUse": [
37
- {
38
- "matcher": "Bash",
39
- "command": "python hooks/pre_tool_use.py",
40
- "description": "Pre-execution safety verification for shell commands"
41
- },
42
- {
43
- "matcher": "PowerShell",
44
- "command": "python hooks/pre_tool_use.py",
45
- "description": "Pre-execution safety verification for PowerShell commands"
46
- },
47
- {
48
- "matcher": "Read",
49
- "command": "python hooks/pre_read.py",
50
- "description": "Pre-read credential file protection"
51
- }
52
- ]
3
+ "metadata": {
4
+ "description": "Pre-execution safety layer for Claude Code",
5
+ "version": "1.0.0"
53
6
  },
54
- "commands": [
7
+ "owner": {
8
+ "name": "Francesco Marinoni Moretto",
9
+ "email": "contact@clarity-gate.org"
10
+ },
11
+ "plugins": [
55
12
  {
56
13
  "name": "hs",
57
- "aliases": ["hardstop"],
58
- "description": "Control Hardstop plugin",
59
- "subcommands": [
60
- {"name": "on", "description": "Enable protection"},
61
- {"name": "off", "description": "Disable protection"},
62
- {"name": "skip", "description": "Skip next N commands (default 1)"},
63
- {"name": "status", "description": "Show current state"},
64
- {"name": "log", "description": "View audit log"}
14
+ "source": "./",
15
+ "description": "Pre-execution safety layer that blocks dangerous shell commands and credential file reads using pattern matching + LLM analysis. Fail-closed design.",
16
+ "version": "1.4.4",
17
+ "author": {
18
+ "name": "Francesco Marinoni Moretto",
19
+ "email": "contact@clarity-gate.org"
20
+ },
21
+ "homepage": "https://github.com/frmoretto/hardstop",
22
+ "repository": "https://github.com/frmoretto/hardstop",
23
+ "license": "CC-BY-4.0",
24
+ "keywords": [
25
+ "safety",
26
+ "security",
27
+ "pre-execution",
28
+ "shell",
29
+ "bash",
30
+ "powershell",
31
+ "command-blocking",
32
+ "ai-safety",
33
+ "guardrails",
34
+ "fail-closed"
65
35
  ]
66
36
  }
67
- ],
68
- "compatibility": {
69
- "claude-code": ">=1.0.0",
70
- "claude-desktop": ">=1.0.0"
71
- }
37
+ ]
72
38
  }
@@ -1,16 +1,13 @@
1
1
  {
2
2
  "name": "hs",
3
- "version": "1.4.3",
3
+ "version": "1.4.4",
4
4
  "description": "Pre-execution safety layer that blocks dangerous shell commands and credential file reads using pattern matching + LLM analysis. Fail-closed design.",
5
5
  "author": {
6
6
  "name": "Francesco Marinoni Moretto",
7
7
  "email": "contact@clarity-gate.org"
8
8
  },
9
9
  "homepage": "https://github.com/frmoretto/hardstop",
10
- "repository": {
11
- "type": "git",
12
- "url": "https://github.com/frmoretto/hardstop.git"
13
- },
10
+ "repository": "https://github.com/frmoretto/hardstop",
14
11
  "license": "CC-BY-4.0",
15
12
  "keywords": [
16
13
  "safety",
package/CHANGELOG.md CHANGED
@@ -2,6 +2,14 @@
2
2
 
3
3
  All notable changes to Hardstop will be documented in this file.
4
4
 
5
+ ## [1.4.4] - 2026-02-17
6
+
7
+ ### Fixed
8
+ - **commands/hs.md**: Pass `$ARGUMENTS` instead of hardcoded `skip` for skip/bypass handler, so `hs bypass` correctly forwards the argument
9
+ - **commands/skip.md**: Forward `$ARGUMENTS` to `hs_cmd.py` so `/skip` passes through any user-supplied arguments
10
+
11
+ ---
12
+
5
13
  ## [1.4.3] - 2026-02-14
6
14
 
7
15
  ### Growth Features
package/commands/hs.md CHANGED
@@ -40,7 +40,7 @@ python "${CLAUDE_PLUGIN_ROOT}/commands/hs_cmd.py" off
40
40
  ### If argument is "skip" or "bypass":
41
41
  Use `/skip` command instead, or run:
42
42
  ```bash
43
- python "${CLAUDE_PLUGIN_ROOT}/commands/hs_cmd.py" skip
43
+ python "${CLAUDE_PLUGIN_ROOT}/commands/hs_cmd.py" $ARGUMENTS
44
44
  ```
45
45
 
46
46
  ### If argument is "log" or "logs" or "audit":
package/commands/skip.md CHANGED
@@ -12,7 +12,7 @@ Set a one-time bypass flag so the next shell command skips the safety check.
12
12
  Run this command to set the skip flag:
13
13
 
14
14
  ```bash
15
- python "${CLAUDE_PLUGIN_ROOT}/commands/hs_cmd.py" skip
15
+ python "${CLAUDE_PLUGIN_ROOT}/commands/hs_cmd.py" skip $ARGUMENTS
16
16
  ```
17
17
 
18
18
  Then inform the user that the next command will bypass safety checks, but protection will resume automatically after that.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "hardstop",
3
- "version": "1.4.3",
3
+ "version": "1.4.4",
4
4
  "description": "Pre-execution safety layer for Claude Code - blocks dangerous commands before they run. Part of the Hardstop ecosystem.",
5
5
  "keywords": [
6
6
  "claude-code",
@@ -1,6 +1,6 @@
1
1
  ---
2
2
  name: hs
3
- version: "1.3"
3
+ version: "1.4"
4
4
  description: "ACTIVATE THIS SKILL FOR ANY SHELL COMMAND OR FILE READ. Check curl, wget, rm, sudo, apt, dpkg, chmod, dd, format, powershell, bash, sh. Check pipe patterns like | sh or | bash. Check shell wrappers like bash -c, xargs, find -exec. Check cloud CLI (aws, gcloud, kubectl, terraform). Check when user says sysadmin told me, Stack Overflow says, is this safe, can I run. Block reading of .env, .ssh, .aws, and credential files. This skill blocks dangerous commands and warns on risky ones. ALWAYS apply the safety protocol from this document before responding about any command."
5
5
  author: Francesco Marinoni Moretto
6
6
  license: CC-BY-4.0