-
Notifications
You must be signed in to change notification settings - Fork 1
Closed
Labels
securitySecurity hardeningSecurity hardeningtoolsTool execution and MCP integrationTool execution and MCP integration
Description
Parent
Epic #426, Plan: .local/plan/m26.1-output-filtering-improvements.md
Priority: P0 (security critical)
Problem
Aggressive filtering can hide security-critical warnings (e.g., unused Result on decrypt_password, panic traces, SQL injection patterns).
Design
SecurityPatterns struct with compiled regex list covering 6 categories:
- Rust compiler warnings (
unused Result,panic at,unwrap()) - Unsafe code (
unsafe code,FFI,raw pointer) - Auth (
authentication failed,unauthorized,401/403) - Crypto (
weak cipher,deprecated algorithm,MD5,SHA-1) - SQL/Injection (
SQL injection,unsafe query) - Dependencies (
RUSTSEC-,security advisory)
All filters call security whitelist before returning. Appends preserved lines with visual separator. User-defined patterns via config (additive).
Acceptance Criteria
-
SecurityPatternsstruct with regex list -
extract_security_lines()method - Core patterns cover all 6 categories (18+ patterns)
- All filters call security whitelist
- Config for user-defined patterns
- Unit tests for each category
- Integration test: filter + security warning preservation
- Performance: <10us for 100KB input
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
securitySecurity hardeningSecurity hardeningtoolsTool execution and MCP integrationTool execution and MCP integration