Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
13 changes: 13 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
version: 2
target-branch: develop
updates:
- package-ecosystem: "bundler"
directory: "/"
schedule:
interval: "weekly"
open-pull-requests-limit: 10
- package-ecosystem: "npm"
directory: "/"
Comment on lines +2 to +10
Copy link

Copilot AI Feb 25, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The target-branch field is not a valid top-level configuration option in Dependabot v2 schema. To configure the target branch for pull requests, use the target-branch field under each updates entry instead. For example:

updates:
  - package-ecosystem: "bundler"
    directory: "/"
    target-branch: "develop"
    schedule:
      interval: "weekly"

Alternatively, if you want all Dependabot PRs to target the develop branch, you may need to set the default branch in the repository settings to develop.

Suggested change
target-branch: develop
updates:
- package-ecosystem: "bundler"
directory: "/"
schedule:
interval: "weekly"
open-pull-requests-limit: 10
- package-ecosystem: "npm"
directory: "/"
updates:
- package-ecosystem: "bundler"
directory: "/"
target-branch: develop
schedule:
interval: "weekly"
open-pull-requests-limit: 10
- package-ecosystem: "npm"
directory: "/"
target-branch: develop

Copilot uses AI. Check for mistakes.
schedule:
interval: "weekly"
open-pull-requests-limit: 10
2 changes: 2 additions & 0 deletions .github/workflows/build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,8 @@ on:
- "lib/radvent/version.rb"
- "CLAUDE.md"
- "README.md"
permissions:
contents: read
env:
SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK_URL }}
jobs:
Expand Down
2 changes: 2 additions & 0 deletions .github/workflows/container.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ on:
- '**'
tags:
- '**'
permissions:
contents: read
env:
SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK_URL }}
jobs:
Expand Down
42 changes: 42 additions & 0 deletions AGENTS.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,47 @@
# AGENTS.md - Guidelines for Agentic Coding in Radvent

## ABSOLUTE RULES (CRITICAL)

**NEVER commit or push changes without explicit user permission**
- Do NOT run `git commit` under any circumstances
- Do NOT run `git push` under any circumstances
- Do NOT create pull requests under any circumstances
- Only show changes with `git diff` after user approves
- Wait for explicit user confirmation before ANY git operations

**NEVER decide commit message without user approval**
- Let user write the commit message
- Do not automatically generate or suggest commit messages
- Ask user for commit message before running `git commit`

## Git Flow (Branching Model)

This project uses **Git Flow** branching model (also known as A successful git branching model).

### Branch Structure
- `main`: Production-ready code. Never commit directly to main.
- `develop`: Integration branch. Never commit directly to develop.
- `bugfix/*`: Feature branches for bug fixes.
- `feature/*`: Feature branches for new features.

### Development Workflow
1. Create a `bugfix/` or `feature/` branch from `develop`
2. Make changes, test, and commit to your branch
3. Push branch to remote: `git push -u origin branch-name`
4. Create pull request from your branch to `develop`
5. Merge PR into `develop` after review
6. Never commit or push directly to `main` or `develop`

### Example Commands
```bash
git checkout develop
git pull origin develop
git checkout -b bugfix/your-fix
# Make changes, test, commit
git push -u origin bugfix/your-fix
# Create PR from bugfix/your-fix to develop
```

## Build, Lint, and Test Commands

### Setup
Expand Down
1 change: 0 additions & 1 deletion app/controllers/attachments_controller.rb
Original file line number Diff line number Diff line change
@@ -1,5 +1,4 @@
class AttachmentsController < ApplicationController
protect_from_forgery with: :null_session
before_action :authenticate_user!, only: [:create]

def create
Expand Down
2 changes: 1 addition & 1 deletion lib/radvent/version.rb
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module Radvent
module Version
VERSION = '3.0.0beta'.freeze
VERSION = '3.0.0beta2'.freeze
def self.version
VERSION
end
Expand Down
22 changes: 22 additions & 0 deletions opencode.jsonc
Original file line number Diff line number Diff line change
Expand Up @@ -39,5 +39,27 @@
"enabled": true,
"environment": {}
}
},
"permission": {
"bash": {
"*": "ask",
"ls *": "allow",
"cat *": "allow",
Copy link

Copilot AI Feb 25, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The "cat *": "allow" permission lets the agent run cat on arbitrary paths without user confirmation, enabling it to read sensitive files such as SSH keys, API tokens, or local configuration secrets. An attacker who controls prompts or external content consumed by the agent could inject instructions to cat sensitive files and have their contents exfiltrated via the LLM output. Consider requiring ask (or stricter) for cat commands and limiting file reads to a constrained workspace or explicit allowlist of safe paths.

Suggested change
"cat *": "allow",
"cat *": "ask",

Copilot uses AI. Check for mistakes.
"git status": "allow",
"git diff *": "allow",
"git log *": "allow",
"git commit *": "ask",
"git push *": "deny",
"npm run *": "allow",
"npm test": "allow",
"cargo check": "allow"
},
"edit": {
"*": "ask"
},
"read": "allow",
"glob": "allow",
"grep": "allow",
"list": "allow"
}
}