Add May 21 changelog entry#373
Conversation
|
Preview deployment for your docs. Learn more about Mintlify Previews.
💡 Tip: Enable Workflows to automatically generate PRs for you. |
Updated changelog with new features and improvements, including managed auth enhancements, proxy testing options, and removal of persistent browsers.
There was a problem hiding this comment.
Stale comment
Risk assessment: Very Low
The current diff only adds a
May 21changelog entry tochangelog.mdx(19 inserted lines). It doesn’t modify production codepaths, configuration, navigation, infrastructure, API behavior, auth/permissions, or security boundaries. I also didn’t find aCODEOWNERSfile requiring owner review for this path.The PR already has an approval from this automation, so I did not add a duplicate approval. No risk increase found in the current update.
Sent by Cursor Automation: Assign PR reviewers
There was a problem hiding this comment.
Stale comment
Risk assessment: Very Low
The current diff only adds a
May 21changelog entry tochangelog.mdx(19 inserted lines). It doesn’t modify production codepaths, configuration, navigation, infrastructure, API behavior, auth/permissions, or security boundaries. I also didn’t find aCODEOWNERSfile requiring owner review for this path.The PR is already approved, so I did not add a duplicate approval. No risk increase found in this synchronized update.
Sent by Cursor Automation: Assign PR reviewers
There was a problem hiding this comment.
Risk assessment: Very Low
The current diff only adds a May 21 changelog entry to changelog.mdx (19 inserted lines). It doesn’t modify production codepaths, configuration, navigation, infrastructure, API behavior, auth/permissions, or security boundaries. I also didn’t find a CODEOWNERS file requiring owner review for this path.
The PR is already approved, so I did not add a duplicate approval. No risk increase found in the current update.
Sent by Cursor Automation: Assign PR reviewers
There was a problem hiding this comment.
Risk assessment: Very Low
The current diff only adds a May 21 entry to changelog.mdx (19 inserted lines). It doesn't modify production codepaths, docs navigation/config, infrastructure, API behavior, auth/permissions, or security boundaries.
I didn't find a CODEOWNERS file requiring owner review for this path. The PR already has an approval recorded, so I did not add another approval. No risk increase found in the current update.
Sent by Cursor Automation: Assign PR reviewers
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 1 potential issue.
❌ Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.
Reviewed by Cursor Bugbot for commit 9ce6754. Configure here.
| - Exposed full [Projects](/info/projects) CRUD in the public API, so projects can be created, updated, and deleted programmatically alongside the existing list endpoint. | ||
| - Managed auth improvements: Added health check and automatic re-authentication controls to the [managed auth API](/auth/overview), letting you configure check intervals and reauth triggers per connection. Sessions are now automatically recorded — when a connection enters `NEEDS_AUTH` on the dashboard, a "View last login attempt" link routes directly to the session replay, and /auth rows now show a re-auth capability chip. Also, broader SSO and OAuth provider coverage, support for Google's two-step mobile prompt flow, per-connection post-login wait configuration (`post_login.wait_ms`), automatic SSO provider brand icons in auth dialogs, MFA alternatives displayed on the external action waiting screen, and a post-login browser refresh before the profile snapshot is captured for cleaner saved sessions. | ||
| - Extended `proxy.check()` with an optional `url` parameter for testing reachability against a specific target domain before assigning the proxy. This is useful for catching proxies that pass generic health checks but are blocked on your target site. | ||
| - End of life'd persistent browsers. If you were using persistence, we suggest [`timeout_seconds`](/browsers/termination) with [Profiles](/auth/profiles). |
There was a problem hiding this comment.
New documentation references deprecated persistent browsers feature
Low Severity
This new changelog entry introduces a reference to "persistent browsers," which falls under the project rule that flags any new documentation mentioning "persistent sessions" (the rule explicitly lists "persistent browser sessions" as an example). While the intent here is to announce the EOL of the feature, the rule states these references in new documentation are to be removed or omitted. The migration guidance could be rephrased to avoid naming the deprecated concept directly.
Triggered by learned rule: Flag references to persistent sessions (deprecated feature)
Reviewed by Cursor Bugbot for commit 9ce6754. Configure here.




Summary
Adds the May 21 changelog entry covering product and documentation updates from the past two weeks.
Highlights
chrome_policyonbrowsers.create(),start_url)proxy.check()urlparameterNote
Low Risk
Documentation-only change adding a new changelog entry; no runtime code paths or APIs are modified in this repo.
Overview
Adds a new May 21 entry to
changelog.mdxsummarizing recent product changes (auto-standby for browser pools, newchrome_policy/start_urloptions, Projects CRUD, managed auth enhancements,proxy.check(url), and persistent browsers EOL) and associated documentation updates (new hCaptcha page, refreshed managed auth docs/navigation/FAQ, and several clarifications/guide updates).Reviewed by Cursor Bugbot for commit 9ce6754. Bugbot is set up for automated code reviews on this repo. Configure here.