codetrust 2.5.0__tar.gz → 2.5.2__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- codetrust-2.5.2/CHANGELOG.md +119 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/PKG-INFO +7 -7
- {codetrust-2.5.0 → codetrust-2.5.2}/README.md +6 -6
- {codetrust-2.5.0 → codetrust-2.5.2}/metrics.json +2 -2
- {codetrust-2.5.0 → codetrust-2.5.2}/pyproject.toml +1 -1
- {codetrust-2.5.0 → codetrust-2.5.2}/src/config.py +1 -1
- codetrust-2.5.0/CHANGELOG.md +0 -764
- {codetrust-2.5.0 → codetrust-2.5.2}/.codetrust.toml +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/.cursorrules +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/.env.example +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/.gitignore +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/.vscode/mcp.json +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/.vscode/settings.json +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/CLAUDE.md +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/CONTRIBUTING.md +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/Dockerfile +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/LICENSE +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/PLAN.md +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/Procfile +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/SECURITY.md +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/SPEC.md +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/action/action.yml +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/action/entrypoint.sh +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/action/scan.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/action/scan_runner.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/action.yml +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/alembic/README +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/alembic/env.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/alembic/script.py.mako +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/alembic/versions/7e0e30d20d6a_add_telemetry_events.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/alembic/versions/9c1f6d1a2b44_add_telemetry_raw_and_metrics_counters.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/alembic/versions/b74aff4dff57_initial_schema_users_api_keys_scan_logs_.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/alembic.ini +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/dashboard/.env.example +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/docker-compose.yml +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/hooks/pre-commit +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/icon.png +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/railway.toml +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/scripts/export_openapi.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/scripts/generate_icons.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/scripts/generate_metrics.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/scripts/validate_readme_metrics.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/setup.sh +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/smoke_test.sh +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/__init__.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/api.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/cli.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/formatters/__init__.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/formatters/sarif.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/__init__.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/audit.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/custom_rules.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/interceptor.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/policies.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/server.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/siem.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/gateway/webhooks.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/middleware/__init__.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/middleware/ip_rate_limit.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/middleware/metrics.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/models/__init__.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/models/database.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/models/enums.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/models/requests.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/models/responses.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/rules/__init__.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/rules/anti_patterns.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/rules/enterprise.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/server.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/__init__.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/ast_analyzer.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/auth.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/autofix.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/billing.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/cache.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/cross_file_analyzer.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/database.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/docker_verify.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/gdpr.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/import_verifier.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/license_checker.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/public_stats.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/rate_limiter.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/registry.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/sandbox.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/sso.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/static_analyzer.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/team.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/telemetry.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/tenant.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/services/vulnerability.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/telemetry_client.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/CLAUDE.md +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/__init__.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/codetrust-scan.yml +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/codetrust.schema.json +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/codetrust.toml +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/cursorrules +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/pre-commit +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/templates/taplo.toml +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/utils/__init__.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/utils/parsers.py +0 -0
- {codetrust-2.5.0 → codetrust-2.5.2}/src/utils/similarity.py +0 -0
|
@@ -0,0 +1,119 @@
|
|
|
1
|
+
# Changelog
|
|
2
|
+
|
|
3
|
+
All notable changes to CodeTrust will be documented in this file.
|
|
4
|
+
|
|
5
|
+
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/),
|
|
6
|
+
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
|
|
7
|
+
|
|
8
|
+
## [2.5.2] - 2026-02-19
|
|
9
|
+
|
|
10
|
+
### Fixed
|
|
11
|
+
|
|
12
|
+
- Removed all stale version references visible to AI agents fetching platform docs
|
|
13
|
+
- Consolidated duplicate "What's New" sections in Marketplace README into single current entry
|
|
14
|
+
- Trimmed CHANGELOG from 780 lines of historical entries to current release only
|
|
15
|
+
- Removed specific old version numbers (`v2.1.0`, `v2.4.0`) from README and website copy
|
|
16
|
+
|
|
17
|
+
---
|
|
18
|
+
|
|
19
|
+
## [2.5.1] - 2026-02-19
|
|
20
|
+
|
|
21
|
+
### Fixed
|
|
22
|
+
|
|
23
|
+
- Extension Marketplace README corrected: now accurately describes all four moats, 21 MCP tools, and v2.5.0 features (Universal IDE Injection, Governance Disruption Monitoring)
|
|
24
|
+
- Stale `v2.4.0` GitHub Action references in root README updated to `v2.5.1`
|
|
25
|
+
- Stale `17 tools` MCP count in root README updated to `21`
|
|
26
|
+
- `softwareVersion` in website JSON-LD schema corrected from `2.4.0` to `2.5.1`
|
|
27
|
+
- Extension `package.json` description updated from "3 capabilities" to "4 capabilities"
|
|
28
|
+
|
|
29
|
+
---
|
|
30
|
+
|
|
31
|
+
## [2.5.0] - 2026-02-19
|
|
32
|
+
|
|
33
|
+
### Added — Fourth Moat: Session-Level Universal Enforcement
|
|
34
|
+
|
|
35
|
+
This release introduces the fourth and final competitive moat: **enforcement that is active from
|
|
36
|
+
session one, across every AI model, every workspace, automatically — with zero configuration.**
|
|
37
|
+
|
|
38
|
+
Previously, CodeTrust required an AI agent to voluntarily call governance tools. Starting with v2.5.0,
|
|
39
|
+
governance is active before the AI writes a single line of code, and every tool call is validated
|
|
40
|
+
and logged regardless of the agent's cooperation.
|
|
41
|
+
|
|
42
|
+
#### MCP Proxy Enforcement Layer (`src/gateway/server.py`)
|
|
43
|
+
|
|
44
|
+
Four new proxy tools that AI agents MUST call instead of the native VS Code tools.
|
|
45
|
+
The gateway returns `APPROVED` or `BLOCKED` before the native tool is invoked:
|
|
46
|
+
|
|
47
|
+
- **`codetrust_run_in_terminal`** — proxy gate for `run_in_terminal`. BLOCKED verdict
|
|
48
|
+
halts execution; action and verdict logged to audit trail.
|
|
49
|
+
- **`codetrust_create_file`** — proxy gate for `create_file`. Validates content for
|
|
50
|
+
hardcoded secrets and protected path violations before the file is written.
|
|
51
|
+
- **`codetrust_replace_string_in_file`** — proxy gate for `replace_string_in_file`.
|
|
52
|
+
Validates the replacement content before applying edits.
|
|
53
|
+
- **`codetrust_edit_notebook`** — proxy gate for `edit_notebook_file`. Validates
|
|
54
|
+
notebook cell content before execution.
|
|
55
|
+
|
|
56
|
+
All four proxy tools use the existing `CommandInterceptor` and `AuditLogger`, producing
|
|
57
|
+
ALLOW / WARN / BLOCK verdicts consistent with gateway policy. Mode `enforce` = full block.
|
|
58
|
+
Mode `audit` = log and warn without blocking.
|
|
59
|
+
|
|
60
|
+
#### Global Copilot Instruction Injection (`extension/src/extension.ts`)
|
|
61
|
+
|
|
62
|
+
The VS Code extension now automatically injects CodeTrust governance rules into VS Code's
|
|
63
|
+
global `github.copilot.chat.codeGeneration.instructions` setting on every activation:
|
|
64
|
+
|
|
65
|
+
- **Zero configuration** — no workspace setup, no `CLAUDE.md`, no `.codetrust.toml` required.
|
|
66
|
+
- **Global scope** — `ConfigurationTarget.Global` ensures rules apply across every workspace.
|
|
67
|
+
- **Every AI model, every session** — rules are injected before the AI writes a single character.
|
|
68
|
+
- **Idempotent** — duplicate injection is detected and skipped via a unique marker.
|
|
69
|
+
- **Clean uninstall** — `deactivate()` removes injected rules automatically.
|
|
70
|
+
|
|
71
|
+
#### Universal IDE Injection (`extension/src/universal-instructions.ts`)
|
|
72
|
+
|
|
73
|
+
A new module that extends governance injection beyond VS Code to every major AI coding IDE.
|
|
74
|
+
On activation the extension writes the proxy model rules to the global configuration file of
|
|
75
|
+
each installed IDE — skipping any that are not installed:
|
|
76
|
+
|
|
77
|
+
| IDE | Global Config File |
|
|
78
|
+
|---|---|
|
|
79
|
+
| Claude Code | `~/.claude/CLAUDE.md` |
|
|
80
|
+
| Cursor | `~/.cursor/rules/codetrust.mdc` |
|
|
81
|
+
| Windsurf | `~/.codeium/windsurf/memories/global_rules.md` |
|
|
82
|
+
| GitHub Copilot | VS Code global settings (`codeGeneration.instructions`) |
|
|
83
|
+
|
|
84
|
+
Rules are injected once, idempotently, at global scope. Every subsequent session in every
|
|
85
|
+
workspace in every supported IDE enforces the proxy model without any user configuration.
|
|
86
|
+
On deactivation all injected content is removed cleanly, leaving the user's configs intact.
|
|
87
|
+
|
|
88
|
+
#### Governance Disruption Monitoring (`watchForGovernanceDisruption`)
|
|
89
|
+
|
|
90
|
+
CodeTrust now actively monitors injected governance files for disruptions after installation:
|
|
91
|
+
|
|
92
|
+
- **File watchers** — if an IDE update overwrites a watched config file and removes the
|
|
93
|
+
CodeTrust marker, a VS Code warning notification appears immediately with a
|
|
94
|
+
"Re-inject Now" action that restores enforcement in one click.
|
|
95
|
+
- **Window-focus check** — each time VS Code regains focus, CodeTrust scans for IDE
|
|
96
|
+
config directories that now exist but whose rules are absent or corrupted (e.g. an IDE
|
|
97
|
+
installed after CodeTrust). A "Inject Now" notification offers immediate recovery.
|
|
98
|
+
- **Zero user effort** — watchers are registered in `context.subscriptions` and cleaned up
|
|
99
|
+
automatically on extension deactivation.
|
|
100
|
+
|
|
101
|
+
#### New Commands
|
|
102
|
+
|
|
103
|
+
- **`codetrust.injectCopilotInstructions`** (`CodeTrust: Inject Copilot Instructions`) —
|
|
104
|
+
force re-inject governance rules into global Copilot instructions.
|
|
105
|
+
- **`codetrust.governanceStatus`** (`CodeTrust: Governance Status`) — show the current
|
|
106
|
+
governance mode, injection status, and mandatory validation sequence in the output channel.
|
|
107
|
+
|
|
108
|
+
#### Documentation
|
|
109
|
+
|
|
110
|
+
- `extension/resources/copilot-instructions.md` — canonical reference for the proxy model,
|
|
111
|
+
describing the two-step validation workflow and absolute prohibitions.
|
|
112
|
+
|
|
113
|
+
---
|
|
114
|
+
|
|
115
|
+
## Older Releases
|
|
116
|
+
|
|
117
|
+
For release notes prior to v2.5.0, see the [full git history](https://github.com/SaidBorna/codetrust/commits/main) or run `git log --oneline` locally.
|
|
118
|
+
|
|
119
|
+
**Current version: 2.5.2** — install via `pip install codetrust` or the [VS Code Marketplace](https://marketplace.visualstudio.com/items?itemName=SaidBorna.codetrust).
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: codetrust
|
|
3
|
-
Version: 2.5.
|
|
3
|
+
Version: 2.5.2
|
|
4
4
|
Summary: AI code safety platform — 275 rules, 10 enforcement layers, 5 enterprise services. AI Governance Gateway blocks destructive AI agent actions (76 real-time rules). Hallucination Detection verifies imports against PyPI/npm/crates.io/Go/Maven/NuGet/RubyGems/Packagist. Trust Score tracks safety drift. CVE scanning, license compliance, cross-file analysis, auto-fix PRs, RBAC. 42 API endpoints, 21 MCP tools, 1672 tests. CLI, VS Code extension, GitHub Action, MCP server.
|
|
5
5
|
Project-URL: Homepage, https://codetrust.ai
|
|
6
6
|
Project-URL: Documentation, https://codetrust.ai
|
|
@@ -60,7 +60,7 @@ Description-Content-Type: text/markdown
|
|
|
60
60
|
</p>
|
|
61
61
|
|
|
62
62
|
<p align="center">
|
|
63
|
-
<code>Current: v2.5.
|
|
63
|
+
<code>Current: v2.5.2</code> · <code>1672 tests</code> · <code>275 rules</code> · <code>10 layers</code>
|
|
64
64
|
</p>
|
|
65
65
|
|
|
66
66
|
<p align="center">
|
|
@@ -101,7 +101,7 @@ The Gateway intercepts AI agent actions **before execution** — not scanning fi
|
|
|
101
101
|
|
|
102
102
|
All rules are configurable. Any rule can be disabled per-project.
|
|
103
103
|
|
|
104
|
-
**Real proof:** During
|
|
104
|
+
**Real proof:** During development, our own AI agent attempted to create a file using a heredoc pattern. The CodeTrust gateway blocked it in real-time — the product protected itself from its own builder.
|
|
105
105
|
|
|
106
106
|
### Moat 2: Hallucination Detection Engine
|
|
107
107
|
|
|
@@ -258,8 +258,8 @@ codetrust scan .
|
|
|
258
258
|
|---------|---------|--------------|
|
|
259
259
|
| **CLI** | `pip install codetrust` | Full scan from terminal with exit code enforcement |
|
|
260
260
|
| **VS Code** | Install from Marketplace | Scan on save, inline diagnostics, AI governance |
|
|
261
|
-
| **GitHub Action** | `uses: S-Borna/codetrust@v2.
|
|
262
|
-
| **MCP Server** |
|
|
261
|
+
| **GitHub Action** | `uses: S-Borna/codetrust@v2.5.2` | PR checks with SARIF upload to Security tab |
|
|
262
|
+
| **MCP Server** | 21 tools for AI agents | Claude Code / Cursor / Windsurf get real-time safety feedback |
|
|
263
263
|
| **REST API** | 42 endpoints with rate limiting | Integrate into any pipeline or platform |
|
|
264
264
|
|
|
265
265
|
---
|
|
@@ -360,7 +360,7 @@ jobs:
|
|
|
360
360
|
steps:
|
|
361
361
|
- uses: actions/checkout@v4
|
|
362
362
|
|
|
363
|
-
- uses: S-Borna/codetrust@v2.
|
|
363
|
+
- uses: S-Borna/codetrust@v2.5.2
|
|
364
364
|
with:
|
|
365
365
|
fail-on: block # block | warn | info
|
|
366
366
|
scan-type: static # static | deep
|
|
@@ -657,7 +657,7 @@ Organizations, team memberships, and role-based access control. Enforce org-wide
|
|
|
657
657
|
|---------|---------|
|
|
658
658
|
| **PyPI** | `pip install codetrust` |
|
|
659
659
|
| **VS Code Marketplace** | `code --install-extension SaidBorna.codetrust` |
|
|
660
|
-
| **GitHub Action** | `uses: S-Borna/codetrust@v2.
|
|
660
|
+
| **GitHub Action** | `uses: S-Borna/codetrust@v2.5.2` |
|
|
661
661
|
| **Cloud API** | Available at `api.codetrust.ai` |
|
|
662
662
|
| **MCP Server** | Included in the package |
|
|
663
663
|
| **Website** | [codetrust.ai](https://codetrust.ai) |
|
|
@@ -7,7 +7,7 @@
|
|
|
7
7
|
</p>
|
|
8
8
|
|
|
9
9
|
<p align="center">
|
|
10
|
-
<code>Current: v2.5.
|
|
10
|
+
<code>Current: v2.5.2</code> · <code>1672 tests</code> · <code>275 rules</code> · <code>10 layers</code>
|
|
11
11
|
</p>
|
|
12
12
|
|
|
13
13
|
<p align="center">
|
|
@@ -48,7 +48,7 @@ The Gateway intercepts AI agent actions **before execution** — not scanning fi
|
|
|
48
48
|
|
|
49
49
|
All rules are configurable. Any rule can be disabled per-project.
|
|
50
50
|
|
|
51
|
-
**Real proof:** During
|
|
51
|
+
**Real proof:** During development, our own AI agent attempted to create a file using a heredoc pattern. The CodeTrust gateway blocked it in real-time — the product protected itself from its own builder.
|
|
52
52
|
|
|
53
53
|
### Moat 2: Hallucination Detection Engine
|
|
54
54
|
|
|
@@ -205,8 +205,8 @@ codetrust scan .
|
|
|
205
205
|
|---------|---------|--------------|
|
|
206
206
|
| **CLI** | `pip install codetrust` | Full scan from terminal with exit code enforcement |
|
|
207
207
|
| **VS Code** | Install from Marketplace | Scan on save, inline diagnostics, AI governance |
|
|
208
|
-
| **GitHub Action** | `uses: S-Borna/codetrust@v2.
|
|
209
|
-
| **MCP Server** |
|
|
208
|
+
| **GitHub Action** | `uses: S-Borna/codetrust@v2.5.2` | PR checks with SARIF upload to Security tab |
|
|
209
|
+
| **MCP Server** | 21 tools for AI agents | Claude Code / Cursor / Windsurf get real-time safety feedback |
|
|
210
210
|
| **REST API** | 42 endpoints with rate limiting | Integrate into any pipeline or platform |
|
|
211
211
|
|
|
212
212
|
---
|
|
@@ -307,7 +307,7 @@ jobs:
|
|
|
307
307
|
steps:
|
|
308
308
|
- uses: actions/checkout@v4
|
|
309
309
|
|
|
310
|
-
- uses: S-Borna/codetrust@v2.
|
|
310
|
+
- uses: S-Borna/codetrust@v2.5.2
|
|
311
311
|
with:
|
|
312
312
|
fail-on: block # block | warn | info
|
|
313
313
|
scan-type: static # static | deep
|
|
@@ -604,7 +604,7 @@ Organizations, team memberships, and role-based access control. Enforce org-wide
|
|
|
604
604
|
|---------|---------|
|
|
605
605
|
| **PyPI** | `pip install codetrust` |
|
|
606
606
|
| **VS Code Marketplace** | `code --install-extension SaidBorna.codetrust` |
|
|
607
|
-
| **GitHub Action** | `uses: S-Borna/codetrust@v2.
|
|
607
|
+
| **GitHub Action** | `uses: S-Borna/codetrust@v2.5.2` |
|
|
608
608
|
| **Cloud API** | Available at `api.codetrust.ai` |
|
|
609
609
|
| **MCP Server** | Included in the package |
|
|
610
610
|
| **Website** | [codetrust.ai](https://codetrust.ai) |
|
|
@@ -4,7 +4,7 @@ build-backend = "hatchling.build"
|
|
|
4
4
|
|
|
5
5
|
[project]
|
|
6
6
|
name = "codetrust"
|
|
7
|
-
version = "2.5.
|
|
7
|
+
version = "2.5.2"
|
|
8
8
|
description = "AI code safety platform — 275 rules, 10 enforcement layers, 5 enterprise services. AI Governance Gateway blocks destructive AI agent actions (76 real-time rules). Hallucination Detection verifies imports against PyPI/npm/crates.io/Go/Maven/NuGet/RubyGems/Packagist. Trust Score tracks safety drift. CVE scanning, license compliance, cross-file analysis, auto-fix PRs, RBAC. 42 API endpoints, 21 MCP tools, 1672 tests. CLI, VS Code extension, GitHub Action, MCP server."
|
|
9
9
|
readme = "README.md"
|
|
10
10
|
license = "LicenseRef-Proprietary"
|