Skip to content

[comp] Production Deploy#2206

Merged
tofikwest merged 2 commits intoreleasefrom
main
Mar 2, 2026
Merged

[comp] Production Deploy#2206
tofikwest merged 2 commits intoreleasefrom
main

Conversation

@github-actions
Copy link
Contributor

@github-actions github-actions bot commented Mar 2, 2026

This is an automated pull request to release the candidate branch into production, which will trigger a deployment.
It was created by the [Production PR] action.

* fix(github): improve dependabot status check and handling

* fix(github): update dependabot status handling to include paused state

---------

Co-authored-by: Tofik Hasanov <annexcies@gmail.com>
@vercel
Copy link

vercel bot commented Mar 2, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
app (staging) Ready Ready Preview, Comment Mar 2, 2026 8:16pm
portal (staging) Ready Ready Preview, Comment Mar 2, 2026 8:16pm

Request Review

@cursor
Copy link

cursor bot commented Mar 2, 2026

PR Summary

High Risk
Introduces new externally-facing API endpoints and webhook verification logic that persists per-run secrets and updates idempotency state, which is security-sensitive and easy to misconfigure. Also adds a new feature-flagged UI flow and binary artifact downloads that depend on correct auth/header handling.

Overview
Adds a new Security Penetration Tests feature integrated with the Maced provider, exposing v1/security-penetration-tests endpoints to create/list/get runs, fetch progress, and stream markdown/PDF report artifacts.

Implements provider client validation and robust error mapping, persists org ownership for provider run IDs, and adds a per-run webhook handshake (token hashing + replay/idempotency tracking) enforced by the webhook endpoint.

Enables a feature-flagged Security section in the app shell with new pages for penetration test listing, run details (including progress), and a mocked checkout redirect flow; adds SWR hooks/types plus api.raw() for non-JSON artifact downloads and minor error/hydration fixes.

Written by Cursor Bugbot for commit 5c6e34e. This will update automatically on new commits. Configure here.

…le, and provider integration (#2193)

* feat(app): add security vulnerability report module

* fix(app): stabilize shell tooltip and menu ids

* fix(app): wrap shell tooltips in provider for hydration

* feat(security): add vulnerability reports checkout flow and report pages

* feat(security): add vulnerability reports module and checkout flow

* feat(security): gate security tab and routes behind feature flag

* feat(security): add vulnerability reports flow with mock checkout and Maced webhook reconciliation

* fix(security): address review feedback for vulnerability reports

* fix(app): correct vulnerability report api proxy imports

* fix(app): guard temporal ui url before window.open

* fix(app): resolve remaining vulnerability reports build type errors

* fix(app): address latest vulnerability reports review feedback

* fix(app): sync active organization before vulnerability report token

* refactor(app): remove vuln-report proxy routes and call Nest directly

* fix(api): stop forwarding comp org header to Maced

* fix(security): harden webhook handling and preserve checkout metadata

* feat(api): persist per-job webhook handshake for vuln reports

* feat(api): consume Maced-issued webhook tokens for vuln reports

* refactor(api): remove maced org mapping from vulnerability reports

* fix(security-reports): address remaining review threads

* chore(security): rebrand vulnerability reports UI as penetration tests

* fix(security-reports): enforce org ownership and harden report UI

* fix(api): satisfy build typing in vulnerability report parser

* docs: add public penetration tests guide

* chore(security): remove vulnerability report wording from shipped docs and metadata

* fix(api): enforce ownership persistence and early list short-circuit

* feat(security): rename penetration test routes and add run ownership table

* fix(security): harden pentest create flow and extract Maced client

* feat(security): validate Maced client contracts and fix checkout URL typing

* refactor(security): finalize penetration-tests naming and strict provider id contract

* chore(security): polish penetration-tests naming and config formatting

* fix(security): harden webhook handshake and reduce progress provider calls

* feat(api): reconcile penetration webhook by runId and drop orgId query

* fix(api): align webhook trust checks and run ownership migration
@tofikwest tofikwest merged commit a9d5208 into release Mar 2, 2026
15 checks passed
Copy link

@cursor cursor bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.

);
}

return createdReport as SecurityPenetrationTest;
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Webhook authentication token leaked to API clients

High Severity

The createReport, getReport, and listReports methods return the full provider response object (cast via as SecurityPenetrationTest) which includes the raw webhookToken. This token is the server-side secret used for webhook callback authentication — the service hashes it before persisting via persistWebhookHandshake, yet returns the plaintext value to the frontend client. The frontend never uses webhookToken, so it's an unnecessary data leak. An attacker observing the API response could use the token to forge authenticated webhook callbacks to the /v1/security-penetration-tests/webhook endpoint.

Additional Locations (2)

Fix in Cursor Fix in Web

@claudfuen
Copy link
Contributor

🎉 This PR is included in version 1.87.0 🎉

The release is available on GitHub release

Your semantic-release bot 📦🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants