codetrust 2.5.0__tar.gz → 2.5.2__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (103) hide show
  1. codetrust-2.5.2/CHANGELOG.md +119 -0
  2. {codetrust-2.5.0 → codetrust-2.5.2}/PKG-INFO +7 -7
  3. {codetrust-2.5.0 → codetrust-2.5.2}/README.md +6 -6
  4. {codetrust-2.5.0 → codetrust-2.5.2}/metrics.json +2 -2
  5. {codetrust-2.5.0 → codetrust-2.5.2}/pyproject.toml +1 -1
  6. {codetrust-2.5.0 → codetrust-2.5.2}/src/config.py +1 -1
  7. codetrust-2.5.0/CHANGELOG.md +0 -764
  8. {codetrust-2.5.0 → codetrust-2.5.2}/.codetrust.toml +0 -0
  9. {codetrust-2.5.0 → codetrust-2.5.2}/.cursorrules +0 -0
  10. {codetrust-2.5.0 → codetrust-2.5.2}/.env.example +0 -0
  11. {codetrust-2.5.0 → codetrust-2.5.2}/.gitignore +0 -0
  12. {codetrust-2.5.0 → codetrust-2.5.2}/.vscode/mcp.json +0 -0
  13. {codetrust-2.5.0 → codetrust-2.5.2}/.vscode/settings.json +0 -0
  14. {codetrust-2.5.0 → codetrust-2.5.2}/CLAUDE.md +0 -0
  15. {codetrust-2.5.0 → codetrust-2.5.2}/CONTRIBUTING.md +0 -0
  16. {codetrust-2.5.0 → codetrust-2.5.2}/Dockerfile +0 -0
  17. {codetrust-2.5.0 → codetrust-2.5.2}/LICENSE +0 -0
  18. {codetrust-2.5.0 → codetrust-2.5.2}/PLAN.md +0 -0
  19. {codetrust-2.5.0 → codetrust-2.5.2}/Procfile +0 -0
  20. {codetrust-2.5.0 → codetrust-2.5.2}/SECURITY.md +0 -0
  21. {codetrust-2.5.0 → codetrust-2.5.2}/SPEC.md +0 -0
  22. {codetrust-2.5.0 → codetrust-2.5.2}/action/action.yml +0 -0
  23. {codetrust-2.5.0 → codetrust-2.5.2}/action/entrypoint.sh +0 -0
  24. {codetrust-2.5.0 → codetrust-2.5.2}/action/scan.py +0 -0
  25. {codetrust-2.5.0 → codetrust-2.5.2}/action/scan_runner.py +0 -0
  26. {codetrust-2.5.0 → codetrust-2.5.2}/action.yml +0 -0
  27. {codetrust-2.5.0 → codetrust-2.5.2}/alembic/README +0 -0
  28. {codetrust-2.5.0 → codetrust-2.5.2}/alembic/env.py +0 -0
  29. {codetrust-2.5.0 → codetrust-2.5.2}/alembic/script.py.mako +0 -0
  30. {codetrust-2.5.0 → codetrust-2.5.2}/alembic/versions/7e0e30d20d6a_add_telemetry_events.py +0 -0
  31. {codetrust-2.5.0 → codetrust-2.5.2}/alembic/versions/9c1f6d1a2b44_add_telemetry_raw_and_metrics_counters.py +0 -0
  32. {codetrust-2.5.0 → codetrust-2.5.2}/alembic/versions/b74aff4dff57_initial_schema_users_api_keys_scan_logs_.py +0 -0
  33. {codetrust-2.5.0 → codetrust-2.5.2}/alembic.ini +0 -0
  34. {codetrust-2.5.0 → codetrust-2.5.2}/dashboard/.env.example +0 -0
  35. {codetrust-2.5.0 → codetrust-2.5.2}/docker-compose.yml +0 -0
  36. {codetrust-2.5.0 → codetrust-2.5.2}/hooks/pre-commit +0 -0
  37. {codetrust-2.5.0 → codetrust-2.5.2}/icon.png +0 -0
  38. {codetrust-2.5.0 → codetrust-2.5.2}/railway.toml +0 -0
  39. {codetrust-2.5.0 → codetrust-2.5.2}/scripts/export_openapi.py +0 -0
  40. {codetrust-2.5.0 → codetrust-2.5.2}/scripts/generate_icons.py +0 -0
  41. {codetrust-2.5.0 → codetrust-2.5.2}/scripts/generate_metrics.py +0 -0
  42. {codetrust-2.5.0 → codetrust-2.5.2}/scripts/validate_readme_metrics.py +0 -0
  43. {codetrust-2.5.0 → codetrust-2.5.2}/setup.sh +0 -0
  44. {codetrust-2.5.0 → codetrust-2.5.2}/smoke_test.sh +0 -0
  45. {codetrust-2.5.0 → codetrust-2.5.2}/src/__init__.py +0 -0
  46. {codetrust-2.5.0 → codetrust-2.5.2}/src/api.py +0 -0
  47. {codetrust-2.5.0 → codetrust-2.5.2}/src/cli.py +0 -0
  48. {codetrust-2.5.0 → codetrust-2.5.2}/src/formatters/__init__.py +0 -0
  49. {codetrust-2.5.0 → codetrust-2.5.2}/src/formatters/sarif.py +0 -0
  50. {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/__init__.py +0 -0
  51. {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/audit.py +0 -0
  52. {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/custom_rules.py +0 -0
  53. {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/interceptor.py +0 -0
  54. {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/policies.py +0 -0
  55. {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/server.py +0 -0
  56. {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/siem.py +0 -0
  57. {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/webhooks.py +0 -0
  58. {codetrust-2.5.0 → codetrust-2.5.2}/src/middleware/__init__.py +0 -0
  59. {codetrust-2.5.0 → codetrust-2.5.2}/src/middleware/ip_rate_limit.py +0 -0
  60. {codetrust-2.5.0 → codetrust-2.5.2}/src/middleware/metrics.py +0 -0
  61. {codetrust-2.5.0 → codetrust-2.5.2}/src/models/__init__.py +0 -0
  62. {codetrust-2.5.0 → codetrust-2.5.2}/src/models/database.py +0 -0
  63. {codetrust-2.5.0 → codetrust-2.5.2}/src/models/enums.py +0 -0
  64. {codetrust-2.5.0 → codetrust-2.5.2}/src/models/requests.py +0 -0
  65. {codetrust-2.5.0 → codetrust-2.5.2}/src/models/responses.py +0 -0
  66. {codetrust-2.5.0 → codetrust-2.5.2}/src/rules/__init__.py +0 -0
  67. {codetrust-2.5.0 → codetrust-2.5.2}/src/rules/anti_patterns.py +0 -0
  68. {codetrust-2.5.0 → codetrust-2.5.2}/src/rules/enterprise.py +0 -0
  69. {codetrust-2.5.0 → codetrust-2.5.2}/src/server.py +0 -0
  70. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/__init__.py +0 -0
  71. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/ast_analyzer.py +0 -0
  72. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/auth.py +0 -0
  73. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/autofix.py +0 -0
  74. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/billing.py +0 -0
  75. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/cache.py +0 -0
  76. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/cross_file_analyzer.py +0 -0
  77. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/database.py +0 -0
  78. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/docker_verify.py +0 -0
  79. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/gdpr.py +0 -0
  80. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/import_verifier.py +0 -0
  81. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/license_checker.py +0 -0
  82. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/public_stats.py +0 -0
  83. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/rate_limiter.py +0 -0
  84. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/registry.py +0 -0
  85. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/sandbox.py +0 -0
  86. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/sso.py +0 -0
  87. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/static_analyzer.py +0 -0
  88. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/team.py +0 -0
  89. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/telemetry.py +0 -0
  90. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/tenant.py +0 -0
  91. {codetrust-2.5.0 → codetrust-2.5.2}/src/services/vulnerability.py +0 -0
  92. {codetrust-2.5.0 → codetrust-2.5.2}/src/telemetry_client.py +0 -0
  93. {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/CLAUDE.md +0 -0
  94. {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/__init__.py +0 -0
  95. {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/codetrust-scan.yml +0 -0
  96. {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/codetrust.schema.json +0 -0
  97. {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/codetrust.toml +0 -0
  98. {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/cursorrules +0 -0
  99. {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/pre-commit +0 -0
  100. {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/taplo.toml +0 -0
  101. {codetrust-2.5.0 → codetrust-2.5.2}/src/utils/__init__.py +0 -0
  102. {codetrust-2.5.0 → codetrust-2.5.2}/src/utils/parsers.py +0 -0
  103. {codetrust-2.5.0 → codetrust-2.5.2}/src/utils/similarity.py +0 -0
@@ -0,0 +1,119 @@
1
+ # Changelog
2
+
3
+ All notable changes to CodeTrust will be documented in this file.
4
+
5
+ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/),
6
+ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
7
+
8
+ ## [2.5.2] - 2026-02-19
9
+
10
+ ### Fixed
11
+
12
+ - Removed all stale version references visible to AI agents fetching platform docs
13
+ - Consolidated duplicate "What's New" sections in Marketplace README into single current entry
14
+ - Trimmed CHANGELOG from 780 lines of historical entries to current release only
15
+ - Removed specific old version numbers (`v2.1.0`, `v2.4.0`) from README and website copy
16
+
17
+ ---
18
+
19
+ ## [2.5.1] - 2026-02-19
20
+
21
+ ### Fixed
22
+
23
+ - Extension Marketplace README corrected: now accurately describes all four moats, 21 MCP tools, and v2.5.0 features (Universal IDE Injection, Governance Disruption Monitoring)
24
+ - Stale `v2.4.0` GitHub Action references in root README updated to `v2.5.1`
25
+ - Stale `17 tools` MCP count in root README updated to `21`
26
+ - `softwareVersion` in website JSON-LD schema corrected from `2.4.0` to `2.5.1`
27
+ - Extension `package.json` description updated from "3 capabilities" to "4 capabilities"
28
+
29
+ ---
30
+
31
+ ## [2.5.0] - 2026-02-19
32
+
33
+ ### Added — Fourth Moat: Session-Level Universal Enforcement
34
+
35
+ This release introduces the fourth and final competitive moat: **enforcement that is active from
36
+ session one, across every AI model, every workspace, automatically — with zero configuration.**
37
+
38
+ Previously, CodeTrust required an AI agent to voluntarily call governance tools. Starting with v2.5.0,
39
+ governance is active before the AI writes a single line of code, and every tool call is validated
40
+ and logged regardless of the agent's cooperation.
41
+
42
+ #### MCP Proxy Enforcement Layer (`src/gateway/server.py`)
43
+
44
+ Four new proxy tools that AI agents MUST call instead of the native VS Code tools.
45
+ The gateway returns `APPROVED` or `BLOCKED` before the native tool is invoked:
46
+
47
+ - **`codetrust_run_in_terminal`** — proxy gate for `run_in_terminal`. BLOCKED verdict
48
+ halts execution; action and verdict logged to audit trail.
49
+ - **`codetrust_create_file`** — proxy gate for `create_file`. Validates content for
50
+ hardcoded secrets and protected path violations before the file is written.
51
+ - **`codetrust_replace_string_in_file`** — proxy gate for `replace_string_in_file`.
52
+ Validates the replacement content before applying edits.
53
+ - **`codetrust_edit_notebook`** — proxy gate for `edit_notebook_file`. Validates
54
+ notebook cell content before execution.
55
+
56
+ All four proxy tools use the existing `CommandInterceptor` and `AuditLogger`, producing
57
+ ALLOW / WARN / BLOCK verdicts consistent with gateway policy. Mode `enforce` = full block.
58
+ Mode `audit` = log and warn without blocking.
59
+
60
+ #### Global Copilot Instruction Injection (`extension/src/extension.ts`)
61
+
62
+ The VS Code extension now automatically injects CodeTrust governance rules into VS Code's
63
+ global `github.copilot.chat.codeGeneration.instructions` setting on every activation:
64
+
65
+ - **Zero configuration** — no workspace setup, no `CLAUDE.md`, no `.codetrust.toml` required.
66
+ - **Global scope** — `ConfigurationTarget.Global` ensures rules apply across every workspace.
67
+ - **Every AI model, every session** — rules are injected before the AI writes a single character.
68
+ - **Idempotent** — duplicate injection is detected and skipped via a unique marker.
69
+ - **Clean uninstall** — `deactivate()` removes injected rules automatically.
70
+
71
+ #### Universal IDE Injection (`extension/src/universal-instructions.ts`)
72
+
73
+ A new module that extends governance injection beyond VS Code to every major AI coding IDE.
74
+ On activation the extension writes the proxy model rules to the global configuration file of
75
+ each installed IDE — skipping any that are not installed:
76
+
77
+ | IDE | Global Config File |
78
+ |---|---|
79
+ | Claude Code | `~/.claude/CLAUDE.md` |
80
+ | Cursor | `~/.cursor/rules/codetrust.mdc` |
81
+ | Windsurf | `~/.codeium/windsurf/memories/global_rules.md` |
82
+ | GitHub Copilot | VS Code global settings (`codeGeneration.instructions`) |
83
+
84
+ Rules are injected once, idempotently, at global scope. Every subsequent session in every
85
+ workspace in every supported IDE enforces the proxy model without any user configuration.
86
+ On deactivation all injected content is removed cleanly, leaving the user's configs intact.
87
+
88
+ #### Governance Disruption Monitoring (`watchForGovernanceDisruption`)
89
+
90
+ CodeTrust now actively monitors injected governance files for disruptions after installation:
91
+
92
+ - **File watchers** — if an IDE update overwrites a watched config file and removes the
93
+ CodeTrust marker, a VS Code warning notification appears immediately with a
94
+ "Re-inject Now" action that restores enforcement in one click.
95
+ - **Window-focus check** — each time VS Code regains focus, CodeTrust scans for IDE
96
+ config directories that now exist but whose rules are absent or corrupted (e.g. an IDE
97
+ installed after CodeTrust). A "Inject Now" notification offers immediate recovery.
98
+ - **Zero user effort** — watchers are registered in `context.subscriptions` and cleaned up
99
+ automatically on extension deactivation.
100
+
101
+ #### New Commands
102
+
103
+ - **`codetrust.injectCopilotInstructions`** (`CodeTrust: Inject Copilot Instructions`) —
104
+ force re-inject governance rules into global Copilot instructions.
105
+ - **`codetrust.governanceStatus`** (`CodeTrust: Governance Status`) — show the current
106
+ governance mode, injection status, and mandatory validation sequence in the output channel.
107
+
108
+ #### Documentation
109
+
110
+ - `extension/resources/copilot-instructions.md` — canonical reference for the proxy model,
111
+ describing the two-step validation workflow and absolute prohibitions.
112
+
113
+ ---
114
+
115
+ ## Older Releases
116
+
117
+ For release notes prior to v2.5.0, see the [full git history](https://github.com/SaidBorna/codetrust/commits/main) or run `git log --oneline` locally.
118
+
119
+ **Current version: 2.5.2** — install via `pip install codetrust` or the [VS Code Marketplace](https://marketplace.visualstudio.com/items?itemName=SaidBorna.codetrust).
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: codetrust
3
- Version: 2.5.0
3
+ Version: 2.5.2
4
4
  Summary: AI code safety platform — 275 rules, 10 enforcement layers, 5 enterprise services. AI Governance Gateway blocks destructive AI agent actions (76 real-time rules). Hallucination Detection verifies imports against PyPI/npm/crates.io/Go/Maven/NuGet/RubyGems/Packagist. Trust Score tracks safety drift. CVE scanning, license compliance, cross-file analysis, auto-fix PRs, RBAC. 42 API endpoints, 21 MCP tools, 1672 tests. CLI, VS Code extension, GitHub Action, MCP server.
5
5
  Project-URL: Homepage, https://codetrust.ai
6
6
  Project-URL: Documentation, https://codetrust.ai
@@ -60,7 +60,7 @@ Description-Content-Type: text/markdown
60
60
  </p>
61
61
 
62
62
  <p align="center">
63
- <code>Current: v2.5.0</code> &middot; <code>1672 tests</code> &middot; <code>275 rules</code> &middot; <code>10 layers</code>
63
+ <code>Current: v2.5.2</code> &middot; <code>1672 tests</code> &middot; <code>275 rules</code> &middot; <code>10 layers</code>
64
64
  </p>
65
65
 
66
66
  <p align="center">
@@ -101,7 +101,7 @@ The Gateway intercepts AI agent actions **before execution** — not scanning fi
101
101
 
102
102
  All rules are configurable. Any rule can be disabled per-project.
103
103
 
104
- **Real proof:** During the development of v2.1.0, our own AI agent attempted to create a file using a heredoc pattern. The CodeTrust gateway blocked it in real-time — the product protected itself from its own builder.
104
+ **Real proof:** During development, our own AI agent attempted to create a file using a heredoc pattern. The CodeTrust gateway blocked it in real-time — the product protected itself from its own builder.
105
105
 
106
106
  ### Moat 2: Hallucination Detection Engine
107
107
 
@@ -258,8 +258,8 @@ codetrust scan .
258
258
  |---------|---------|--------------|
259
259
  | **CLI** | `pip install codetrust` | Full scan from terminal with exit code enforcement |
260
260
  | **VS Code** | Install from Marketplace | Scan on save, inline diagnostics, AI governance |
261
- | **GitHub Action** | `uses: S-Borna/codetrust@v2.4.0` | PR checks with SARIF upload to Security tab |
262
- | **MCP Server** | 17 tools for AI agents | Claude Code / Cursor get real-time safety feedback |
261
+ | **GitHub Action** | `uses: S-Borna/codetrust@v2.5.2` | PR checks with SARIF upload to Security tab |
262
+ | **MCP Server** | 21 tools for AI agents | Claude Code / Cursor / Windsurf get real-time safety feedback |
263
263
  | **REST API** | 42 endpoints with rate limiting | Integrate into any pipeline or platform |
264
264
 
265
265
  ---
@@ -360,7 +360,7 @@ jobs:
360
360
  steps:
361
361
  - uses: actions/checkout@v4
362
362
 
363
- - uses: S-Borna/codetrust@v2.4.0
363
+ - uses: S-Borna/codetrust@v2.5.2
364
364
  with:
365
365
  fail-on: block # block | warn | info
366
366
  scan-type: static # static | deep
@@ -657,7 +657,7 @@ Organizations, team memberships, and role-based access control. Enforce org-wide
657
657
  |---------|---------|
658
658
  | **PyPI** | `pip install codetrust` |
659
659
  | **VS Code Marketplace** | `code --install-extension SaidBorna.codetrust` |
660
- | **GitHub Action** | `uses: S-Borna/codetrust@v2.4.0` |
660
+ | **GitHub Action** | `uses: S-Borna/codetrust@v2.5.2` |
661
661
  | **Cloud API** | Available at `api.codetrust.ai` |
662
662
  | **MCP Server** | Included in the package |
663
663
  | **Website** | [codetrust.ai](https://codetrust.ai) |
@@ -7,7 +7,7 @@
7
7
  </p>
8
8
 
9
9
  <p align="center">
10
- <code>Current: v2.5.0</code> &middot; <code>1672 tests</code> &middot; <code>275 rules</code> &middot; <code>10 layers</code>
10
+ <code>Current: v2.5.2</code> &middot; <code>1672 tests</code> &middot; <code>275 rules</code> &middot; <code>10 layers</code>
11
11
  </p>
12
12
 
13
13
  <p align="center">
@@ -48,7 +48,7 @@ The Gateway intercepts AI agent actions **before execution** — not scanning fi
48
48
 
49
49
  All rules are configurable. Any rule can be disabled per-project.
50
50
 
51
- **Real proof:** During the development of v2.1.0, our own AI agent attempted to create a file using a heredoc pattern. The CodeTrust gateway blocked it in real-time — the product protected itself from its own builder.
51
+ **Real proof:** During development, our own AI agent attempted to create a file using a heredoc pattern. The CodeTrust gateway blocked it in real-time — the product protected itself from its own builder.
52
52
 
53
53
  ### Moat 2: Hallucination Detection Engine
54
54
 
@@ -205,8 +205,8 @@ codetrust scan .
205
205
  |---------|---------|--------------|
206
206
  | **CLI** | `pip install codetrust` | Full scan from terminal with exit code enforcement |
207
207
  | **VS Code** | Install from Marketplace | Scan on save, inline diagnostics, AI governance |
208
- | **GitHub Action** | `uses: S-Borna/codetrust@v2.4.0` | PR checks with SARIF upload to Security tab |
209
- | **MCP Server** | 17 tools for AI agents | Claude Code / Cursor get real-time safety feedback |
208
+ | **GitHub Action** | `uses: S-Borna/codetrust@v2.5.2` | PR checks with SARIF upload to Security tab |
209
+ | **MCP Server** | 21 tools for AI agents | Claude Code / Cursor / Windsurf get real-time safety feedback |
210
210
  | **REST API** | 42 endpoints with rate limiting | Integrate into any pipeline or platform |
211
211
 
212
212
  ---
@@ -307,7 +307,7 @@ jobs:
307
307
  steps:
308
308
  - uses: actions/checkout@v4
309
309
 
310
- - uses: S-Borna/codetrust@v2.4.0
310
+ - uses: S-Borna/codetrust@v2.5.2
311
311
  with:
312
312
  fail-on: block # block | warn | info
313
313
  scan-type: static # static | deep
@@ -604,7 +604,7 @@ Organizations, team memberships, and role-based access control. Enforce org-wide
604
604
  |---------|---------|
605
605
  | **PyPI** | `pip install codetrust` |
606
606
  | **VS Code Marketplace** | `code --install-extension SaidBorna.codetrust` |
607
- | **GitHub Action** | `uses: S-Borna/codetrust@v2.4.0` |
607
+ | **GitHub Action** | `uses: S-Borna/codetrust@v2.5.2` |
608
608
  | **Cloud API** | Available at `api.codetrust.ai` |
609
609
  | **MCP Server** | Included in the package |
610
610
  | **Website** | [codetrust.ai](https://codetrust.ai) |
@@ -1,6 +1,6 @@
1
1
  {
2
- "version": "2.5.0",
3
- "generated_at": "2026-02-19T05:54:03.986636+00:00",
2
+ "version": "2.5.2",
3
+ "generated_at": "2026-02-19T06:56:07.293487+00:00",
4
4
  "scan_rules": 199,
5
5
  "enterprise_rule_ids": 4,
6
6
  "gateway_terminal_rules": 58,
@@ -4,7 +4,7 @@ build-backend = "hatchling.build"
4
4
 
5
5
  [project]
6
6
  name = "codetrust"
7
- version = "2.5.0"
7
+ version = "2.5.2"
8
8
  description = "AI code safety platform — 275 rules, 10 enforcement layers, 5 enterprise services. AI Governance Gateway blocks destructive AI agent actions (76 real-time rules). Hallucination Detection verifies imports against PyPI/npm/crates.io/Go/Maven/NuGet/RubyGems/Packagist. Trust Score tracks safety drift. CVE scanning, license compliance, cross-file analysis, auto-fix PRs, RBAC. 42 API endpoints, 21 MCP tools, 1672 tests. CLI, VS Code extension, GitHub Action, MCP server."
9
9
  readme = "README.md"
10
10
  license = "LicenseRef-Proprietary"
@@ -13,7 +13,7 @@ class Settings(BaseSettings):
13
13
  host: str = "0.0.0.0"
14
14
  port: int = 8000
15
15
  debug: bool = False
16
- version: str = "2.5.0"
16
+ version: str = "2.5.2"
17
17
 
18
18
  # --- Auth ---
19
19
  api_key: str = "" # Empty = no auth required (local dev)