Peter Steinberger
d92fc85555
refactor(cli): dedupe gateway run mode parsing
2026-02-26 19:50:49 +01:00
Shakker
f7041fbee3
fix(windows): normalize namespaced path containment checks
2026-02-26 18:49:48 +00:00
Peter Steinberger
dc6e4a5b13
fix: harden dm command authorization in open mode
2026-02-26 19:49:36 +01:00
Nimrod Gutman
3f20c43308
fix: add nimrod gutman maintainer profile ( #27840 ) (thanks @ngutman)
2026-02-26 20:46:37 +02:00
Viz
a81cf35a6f
Add contributor Jonathan Taylor to CONTRIBUTING.md
...
Added Jonathan Taylor's contributions and contact links.
2026-02-26 13:22:34 -05:00
Peter Steinberger
a909019078
fix: align gateway run auth modes ( #27469 ) (thanks @s1korrrr)
2026-02-26 18:20:27 +00:00
Rafal
1087033abd
fix(cli): list all supported auth modes in gateway run --auth help
...
Made-with: Cursor
2026-02-26 18:20:27 +00:00
Shakker
47f52cd233
test(cli): tighten daemon status TLS mock typings
2026-02-26 18:13:33 +00:00
Shakker
bed69339c1
fix(cli): scope daemon status TLS fingerprint to local probes
2026-02-26 18:13:33 +00:00
Shakker
b788616d9c
fix(cli): add TLS daemon-status probe regression coverage
2026-02-26 18:13:33 +00:00
Liu Yuan
90d426f9ad
fix(cli): gateway status probe with TLS when bind=lan
...
- Use wss:// scheme when TLS is enabled (specifically for bind=lan)
- Load TLS runtime to get certificate fingerprint
- Pass fingerprint to probeGatewayStatus for self-signed cert trust
2026-02-26 18:13:33 +00:00
Peter Steinberger
d6eefe2e75
style: format auth boundary updates
2026-02-26 18:50:47 +01:00
Peter Steinberger
262bca9bdd
fix: restore dm command and self-chat auth behavior
2026-02-26 18:49:16 +01:00
Peter Steinberger
64de4b6d6a
fix: enforce explicit group auth boundaries across channels
2026-02-26 18:49:16 +01:00
Shakker
d0d83a2020
docs(changelog): add PR #17017 entry
2026-02-26 17:10:09 +00:00
Shakker
fe842b5f14
test(auto-reply): cover inbound timestamp guard
2026-02-26 17:10:09 +00:00
Liu Yuan
c596658b8d
feat(auto-reply): make agent time-aware with message timestamps
...
Add human-readable timestamp field to the Conversation info JSON block.
Before:
{
"conversation_label": "D id:123"
}
After:
{
"conversation_label": "D id:123",
"timestamp": "Sun 2026-02-15 13:35 GMT+8"
}
Benefits:
- Better time awareness for time-related questions
- Understand conversation gaps and response delays
- Handle delayed message delivery
- Context for relative time references ("just now", "later")
2026-02-26 17:10:09 +00:00
Peter Steinberger
10481097f8
refactor(security): enforce v1 node exec approval binding
2026-02-26 18:09:01 +01:00
Peter Steinberger
f4391c1725
docs(security): clarify Teams fileConsent uploadUrl report scope
2026-02-26 17:58:38 +01:00
Peter Steinberger
9597cf1890
docs(security): scope obfuscation parity reports as hardening
2026-02-26 17:58:25 +01:00
joshavant
edf7ad9b7d
add me to Maintainers list
...
Signed-off-by: joshavant <830519+joshavant@users.noreply.github.com >
2026-02-26 10:55:03 -06:00
Peter Steinberger
9f154efa8d
docs(acp): expand /acp operator playbook
2026-02-26 16:49:20 +00:00
Peter Steinberger
c5facb8477
fix(discord): avoid invalid /acp native option payload
2026-02-26 16:49:20 +00:00
Peter Steinberger
cd80c7e7ff
refactor: unify dm policy store reads and reason codes
2026-02-26 17:47:57 +01:00
Peter Steinberger
53e30475e2
test(agents): add compaction and workspace reset regressions
2026-02-26 17:41:25 +01:00
Peter Steinberger
0ec7711bc2
fix(agents): harden compaction and reset safety
...
Co-authored-by: jaden-clovervnd <91520439+jaden-clovervnd@users.noreply.github.com >
Co-authored-by: Sid <201593046+Sid-Qin@users.noreply.github.com >
Co-authored-by: Marcus Widing <245375637+widingmarcus-cyber@users.noreply.github.com >
2026-02-26 17:41:24 +01:00
Peter Steinberger
273973d374
refactor: unify typing dispatch lifecycle and policy boundaries
2026-02-26 17:36:16 +01:00
Peter Steinberger
6fd9ec97de
fix(gateway): preserve turn-origin messageChannel in agent runs
2026-02-26 17:25:56 +01:00
Peter Steinberger
08e3357480
refactor: share gateway security path canonicalization
2026-02-26 17:23:46 +01:00
Shakker
15e3e63705
protocol: regenerate Swift models for exec env field
2026-02-26 16:19:44 +00:00
Shakker
b044c149c1
Mattermost: avoid raw fetch in monitor media download
2026-02-26 16:03:39 +00:00
Peter Steinberger
8a51891ed5
test(exec-approvals): cover v1 binding precedence and mismatch mapping
2026-02-26 17:02:52 +01:00
Peter Steinberger
258d615c4d
fix: harden plugin route auth path canonicalization
2026-02-26 17:02:06 +01:00
Peter Steinberger
37a138c554
fix: harden typing lifecycle and cross-channel suppression
2026-02-26 17:01:09 +01:00
Peter Steinberger
4894d907fa
refactor(exec-approvals): unify system.run binding and generate host env policy
2026-02-26 16:58:01 +01:00
Ayaan Zaidi
baf1c8ea13
docs: add changelog for android device node commands ( #27664 ) (thanks @obviyus)
2026-02-26 21:26:11 +05:30
Ayaan Zaidi
cf327f60ba
fix(android): require validated network for device status
2026-02-26 21:26:11 +05:30
Ayaan Zaidi
d14e734e9c
refactor(android): remove dead thermal sdk branch
2026-02-26 21:26:11 +05:30
Ayaan Zaidi
d768c1f81c
feat(android): wire device commands into runtime
2026-02-26 21:26:11 +05:30
Ayaan Zaidi
67f6a13c5a
feat(android): add device status and info handler
2026-02-26 21:26:11 +05:30
Ayaan Zaidi
551647aa96
feat(android): add device invoke protocol commands
2026-02-26 21:26:11 +05:30
riccoyuanft
60bb475355
fix: set authHeader: true by default for MiniMax API provider ( #27622 )
...
* Update onboard-auth.config-minimax.ts
fix issue #27600
* fix(minimax): default authHeader for implicit + onboarding providers (#27600 )
Landed from contributor PR #27622 by @riccoyuanft and PR #27631 by @kevinWangSheng.
Includes a small TS nullability guard in lane delivery to keep build green on rebased head.
Co-authored-by: riccoyuanft <riccoyuan@gmail.com >
Co-authored-by: Kevin Shenghui <shenghuikevin@github.com >
---------
Co-authored-by: Peter Steinberger <steipete@gmail.com >
Co-authored-by: Kevin Shenghui <shenghuikevin@github.com >
2026-02-26 15:53:51 +00:00
Peter Steinberger
1708b11fab
refactor(pi): simplify image reference detection
2026-02-26 16:52:13 +01:00
Peter Steinberger
b678308d96
docs: add unreleased security note for msteams ssrf hardening
2026-02-26 16:48:32 +01:00
Peter Steinberger
75ed72e807
refactor(pi): extract history image prune helpers
2026-02-26 16:44:52 +01:00
Peter Steinberger
57334cd7d8
refactor: unify channel/plugin ssrf fetch policy and auth fallback
2026-02-26 16:44:13 +01:00
Peter Steinberger
2e97d0dd95
fix: finalize teams file-consent timeout landing ( #27641 ) (thanks @scz2011)
2026-02-26 15:42:08 +00:00
AI Assistant
773ab319ef
fix(msteams): Fix code formatting
...
Remove trailing whitespace to pass oxfmt format check.
2026-02-26 15:42:08 +00:00
AI Assistant
ecbb3bcc1a
fix(msteams): Fix test timing for async file upload handling
...
Update tests to properly wait for async file upload operations:
- Use vi.waitFor() to wait for async upload completion in success case
- Use vi.waitFor() to wait for error message in cross-conversation case
- Add setTimeout delay for decline case to ensure async handler completes
- Adjust assertion order to match new execution flow (invokeResponse first)
The tests were failing because the file upload now happens asynchronously
after sending the invokeResponse, so we need to explicitly wait for the
async operations to complete before making assertions.
2026-02-26 15:42:08 +00:00
AI Assistant
09f4abdd61
fix(msteams): Send invokeResponse immediately to prevent Teams timeout ( #27632 )
...
Fix file upload 'Something went wrong' error by sending the invoke
acknowledgement before performing the file upload, rather than after.
Changes:
- Move invokeResponse to fire immediately upon receiving fileConsent/invoke
- Handle file upload asynchronously without blocking the response
- Update test to wait for async upload completion using vi.waitFor
This prevents Teams from timing out while waiting for the HTTP 200
acknowledgement during slow file uploads to OneDrive.
Fixes #27632
2026-02-26 15:42:08 +00:00