Skip to content

Commit 2e62f0b

Browse files
8nevil8codemie-ai
andauthored
chore(agents): bump Claude Code version to 2.1.78 and extend gitleaks config (#219)
Co-authored-by: codemie-ai <codemie.ai@gmail.com>
1 parent d7aaaa6 commit 2e62f0b

7 files changed

Lines changed: 23 additions & 19 deletions

File tree

.claude/agents/unit-tester-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -255,7 +255,7 @@ it('should parse npm network error correctly', async () => {
255255
**Example**:
256256
```typescript
257257
test('should sanitize API key in logs', () => {
258-
const input = { apiKey: 'sk-1234567890abcdef' };
258+
const input = { apiKey: 'sk-test-placeholder-value' };
259259
const sanitized = sanitizeObject(input);
260260

261261
expect(sanitized.apiKey).toBe('[REDACTED]');

.claude/skills/spec-reviewer/references/violation-examples.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ The adapter plugin contains installation checking logic.
124124
```
125125
Configuration:
126126
openai:
127-
apiKey: "sk-proj-abc123..."
127+
apiKey: "YOUR_OPENAI_API_KEY"
128128
baseUrl: "https://api.openai.com"
129129
```
130130

.gitleaks.toml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,13 @@
33

44
title = "Gitleaks Configuration"
55

6+
[extend]
7+
useDefault = true
8+
69
# Exclude test files from secrets detection
710
[allowlist]
8-
description = "Exclude sanitize test file containing intentional fake secrets for testing"
11+
description = "Exclude test files and build artifacts containing intentional fake secrets"
912
paths = [
10-
'''src/utils/__tests__/sanitize\.test\.ts$'''
13+
'''src/utils/__tests__/sanitize\.test\.ts$''',
14+
'''dist/'''
1115
]

docs/AUTHENTICATION.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ After setup, provide tokens via environment variable or CLI option:
138138
**Environment Variable (Recommended):**
139139
```bash
140140
# Set token in your environment
141-
export CODEMIE_JWT_TOKEN="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."
141+
export CODEMIE_JWT_TOKEN="<YOUR_JWT_TOKEN>"
142142

143143
# Run commands normally
144144
codemie-claude "analyze this code"
@@ -147,13 +147,13 @@ codemie-claude "analyze this code"
147147
**CLI Option:**
148148
```bash
149149
# Provide token per command
150-
codemie-claude --jwt-token "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..." "analyze this code"
150+
codemie-claude --jwt-token "<YOUR_JWT_TOKEN>" "analyze this code"
151151
```
152152

153153
**Custom Environment Variable:**
154154
```bash
155155
# If you configured a custom env var during setup
156-
export MY_CUSTOM_TOKEN="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."
156+
export MY_CUSTOM_TOKEN="<YOUR_JWT_TOKEN>"
157157
codemie-claude "analyze this code"
158158
```
159159

src/agents/plugins/claude/claude.plugin.ts

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,17 +30,17 @@ let statuslineManagedThisSession = false;
3030
*
3131
* **UPDATE THIS WHEN BUMPING CLAUDE VERSION**
3232
*/
33-
const CLAUDE_SUPPORTED_VERSION = '2.1.63';
33+
const CLAUDE_SUPPORTED_VERSION = '2.1.78';
3434

3535
/**
3636
* Minimum supported Claude Code version
3737
* Versions below this are known to be incompatible and will be blocked from starting
3838
* Rule: always 10 patch versions below CLAUDE_SUPPORTED_VERSION
39-
* e.g. supported = 2.1.63 → minimum = 2.1.53
39+
* e.g. supported = 2.1.78 → minimum = 2.1.60
4040
*
4141
* **UPDATE THIS WHEN BUMPING CLAUDE VERSION**
4242
*/
43-
const CLAUDE_MINIMUM_SUPPORTED_VERSION = '2.1.53';
43+
const CLAUDE_MINIMUM_SUPPORTED_VERSION = '2.1.60';
4444

4545
/**
4646
* Claude Code installer URLs

src/agents/plugins/claude/plugin/skills/claude-setup-audit/references/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -452,7 +452,7 @@ curl https://api.example.com/log -d "$CLAUDE_TOOL_INPUT"
452452

453453
// ❌ Bad
454454
"env": {
455-
"API_KEY": "sk-prod-abc123",
455+
"API_KEY": "YOUR_API_KEY_HERE",
456456
"DATABASE_URL": "postgres://user:pass@prod-host/db"
457457
}
458458
```

src/utils/__tests__/security.test.ts

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ describe('sanitize utilities', () => {
4343
});
4444

4545
it('should detect JWT tokens', () => {
46-
const jwt = 'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c';
46+
const jwt = 'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c'; // gitleaks:allow
4747
const result = sanitizeValue(jwt);
4848
expect(result).toContain('[REDACTED]');
4949
});
@@ -57,7 +57,7 @@ describe('sanitize utilities', () => {
5757
describe('sanitizeObject', () => {
5858
it('should sanitize all sensitive keys in object', () => {
5959
const obj = {
60-
apiKey: 'sk-1234567890abcdefghij',
60+
apiKey: 'sk-1234567890abcdefghij', // gitleaks:allow
6161
username: 'john',
6262
password: 'secret123',
6363
sessionId: 'abc-def-ghi-jkl'
@@ -74,7 +74,7 @@ describe('sanitize utilities', () => {
7474
it('should handle nested objects', () => {
7575
const obj = {
7676
config: {
77-
apiKey: 'sk-1234567890abcdefghij',
77+
apiKey: 'sk-1234567890abcdefghij', // gitleaks:allow
7878
timeout: 5000
7979
},
8080
name: 'test'
@@ -89,7 +89,7 @@ describe('sanitize utilities', () => {
8989

9090
it('should handle arrays', () => {
9191
const obj = {
92-
tokens: ['sk-1234567890abcdefghijklmnop', 'sk-9876543210zyxwvutsrqponmlkjihgfedcba'],
92+
tokens: ['sk-1234567890abcdefghijklmnop', 'sk-9876543210zyxwvutsrqponmlkjihgfedcba'], // gitleaks:allow
9393
names: ['alice', 'bob']
9494
};
9595

@@ -134,7 +134,7 @@ describe('sanitize utilities', () => {
134134

135135
describe('sanitizeAuthToken', () => {
136136
it('should mask real tokens', () => {
137-
const token = 'sk-1234567890abcdefghij1234567890';
137+
const token = 'sk-1234567890abcdefghij1234567890'; // gitleaks:allow
138138
const result = sanitizeAuthToken(token);
139139

140140
expect(result).toContain('sk-12345');
@@ -163,8 +163,8 @@ describe('sanitize utilities', () => {
163163
it('should sanitize multiple arguments', () => {
164164
const args = [
165165
'normal string',
166-
{ apiKey: 'sk-1234567890abcdefghijklmnop', name: 'test' },
167-
'sk-9876543210zyxwvutsrq9876543210'
166+
{ apiKey: 'sk-1234567890abcdefghijklmnop', name: 'test' }, // gitleaks:allow
167+
'sk-9876543210zyxwvutsrq9876543210' // gitleaks:allow
168168
];
169169

170170
const result = sanitizeLogArgs(...args);
@@ -181,7 +181,7 @@ describe('sanitize utilities', () => {
181181
123,
182182
true,
183183
null,
184-
{ apiKey: 'sk-1234567890abcdefghijklmnop' }
184+
{ apiKey: 'sk-1234567890abcdefghijklmnop' } // gitleaks:allow
185185
];
186186

187187
const result = sanitizeLogArgs(...args);

0 commit comments

Comments
 (0)