Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 13 additions & 19 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,10 +16,10 @@ jobs:

steps:
- name: Checkout code
uses: actions/checkout@v4
uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4

- name: Set up Go
uses: actions/setup-go@v5
uses: actions/setup-go@40f1582b2485089dde7abd97c1529aa768e1baff # v5
with:
go-version: ${{ matrix.go-version }}

Expand Down Expand Up @@ -61,7 +61,7 @@ jobs:
if: matrix.go-version == '1.25.1'

- name: Upload coverage artifacts
uses: actions/upload-artifact@v4
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4
with:
name: coverage-${{ matrix.go-version }}
path: coverage.html
Expand All @@ -78,43 +78,37 @@ jobs:
security:
name: Security Scan
runs-on: ubuntu-latest
permissions:
contents: read

steps:
- name: Checkout code
uses: actions/checkout@v4
uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4

- name: Set up Go
uses: actions/setup-go@v5
uses: actions/setup-go@40f1582b2485089dde7abd97c1529aa768e1baff # v5
with:
go-version: '1.25.1'

- name: Run gosec
uses: securego/gosec@master
with:
args: -exclude=G115 ./...

- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
scan-type: 'fs'
scan-ref: '.'
severity: 'CRITICAL,HIGH'
run: |
go install github.com/securego/gosec/v2/cmd/gosec@v2.22.4
gosec -exclude=G115 ./...

Copy link

Copilot AI Apr 1, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This change removes the Trivy filesystem vulnerability scan that previously ran in the Security job. If Trivy (or an equivalent dependency/container/FS scanner) is still part of the project’s security posture, it should be restored or replaced so the workflow continues to check for known CVEs beyond what gosec covers.

Suggested change
- name: Run Trivy filesystem scan
uses: aquasecurity/trivy-action@v0.28.0
with:
scan-type: 'fs'
ignore-unfixed: true
severity: 'CRITICAL,HIGH'

Copilot uses AI. Check for mistakes.
lint:
name: Lint
runs-on: ubuntu-latest

steps:
- name: Checkout code
uses: actions/checkout@v4
uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4

- name: Set up Go
uses: actions/setup-go@v5
uses: actions/setup-go@40f1582b2485089dde7abd97c1529aa768e1baff # v5
with:
go-version: '1.25.1'

- name: Run golangci-lint
uses: golangci/golangci-lint-action@v8
uses: golangci/golangci-lint-action@4afd733a84b1f43292c63897423277bb7f4313a9 # v8
with:
version: latest
args: --timeout=5m
12 changes: 6 additions & 6 deletions .github/workflows/openssl.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,10 +13,10 @@ jobs:

steps:
- name: Checkout code
uses: actions/checkout@v4
uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4

- name: Set up Go
uses: actions/setup-go@v5
uses: actions/setup-go@40f1582b2485089dde7abd97c1529aa768e1baff # v5
with:
go-version: '1.23'

Expand All @@ -34,13 +34,13 @@ jobs:
continue-on-error: true
run: |
chmod +x ./scripts/testing/test_cms_headers.sh
./scripts/testing/test_cms_headers.sh || echo "⚠️ Test skipped (known OpenSSL 3.x Ed25519 limitation)"
./scripts/testing/test_cms_headers.sh || echo "Test skipped (known OpenSSL 3.x Ed25519 limitation)"

- name: Run OpenSSL verify test
continue-on-error: true
run: |
chmod +x ./scripts/testing/test_openssl_verify.sh
./scripts/testing/test_openssl_verify.sh || echo "⚠️ Test skipped (known OpenSSL 3.x Ed25519 limitation)"
./scripts/testing/test_openssl_verify.sh || echo "Test skipped (known OpenSSL 3.x Ed25519 limitation)"

- name: Test CMS signature generation and verification
continue-on-error: true
Expand All @@ -52,14 +52,14 @@ jobs:
echo "Test data for CMS signature" > test_data.txt

# Verify with OpenSSL (detached signature)
openssl cms -verify -inform DER -in test.der -content test_data.txt -noverify -binary || echo "⚠️ OpenSSL verification failed (known limitation)"
openssl cms -verify -inform DER -in test.der -content test_data.txt -noverify -binary || echo "OpenSSL verification failed (known limitation)"

# Show ASN.1 structure
openssl asn1parse -inform DER -in test.der -i | head -20

- name: Upload test artifacts
if: failure()
uses: actions/upload-artifact@v4
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4
with:
name: openssl-test-artifacts
path: |
Expand Down
2 changes: 2 additions & 0 deletions AGENTS.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,7 @@ bd ready --json
**Create new issues:**

```bash

bd create "Issue title" --description="Detailed context" -t bug -p 1 --json
bd create "Issue title" --description="What this issue is about" -p 1 --deps discovered-from:bd-123 --json
```
Expand Down Expand Up @@ -121,6 +122,7 @@ bd automatically syncs with git:
- ❌ Do NOT use external issue trackers
- ❌ Do NOT duplicate tracking systems


For more details, see README.md and docs/IMPLEMENTATION.md.

## Landing the Plane (Session Completion)
Expand Down
Loading