-
Notifications
You must be signed in to change notification settings - Fork 9
Comparing changes
Open a pull request
base repository: SocketDev/socket-python-cli
base: v2.2.59
head repository: SocketDev/socket-python-cli
compare: main
- 17 commits
- 27 files changed
- 7 contributors
Commits on Jan 2, 2026
-
feat: add Slack formatter for Socket Facts reachability analysis (#144)
- Add new markdown utility for Socket Facts data formatting - Add `socketsecurity/core/helper/socket_facts_loader.py` to load Socket Facts JSON - Add `socketsecurity/plugins/formatters/slack.py` for Slack-specific formatting - Update Slack plugin to support reachability analysis notifications with smart block limiting - Add markdown dependency for enhanced formatting capabilities - Update README documentation - Update socketdev dependency to 3.0.25 - Bump version to 2.2.59
Configuration menu - View commit details
-
Copy full SHA for 13b8fe5 - Browse repository at this point
Copy the full SHA 13b8fe5View commit details
Commits on Jan 5, 2026
-
Added support to do a Slack Bot instead of just a Slack WebHook (#145)
* Added support to do a Slack Bot instead of just a Slack WebHook * Updated README with new Slack bot directions
Configuration menu - View commit details
-
Copy full SHA for 58bcf76 - Browse repository at this point
Copy the full SHA 58bcf76View commit details -
Configuration menu - View commit details
-
Copy full SHA for d0886a5 - Browse repository at this point
Copy the full SHA d0886a5View commit details
Commits on Jan 16, 2026
-
feat: add PyPy installation for Alpine on x86_64 (#148)
* feat: add PyPy installation for Alpine on x86_64 Install Alpine-compatible PyPy3.11 build on amd64 platforms to enable faster Python reachability analysis. * Fix versions & changelog * Bump version to 2.2.65 --------- Co-authored-by: Douglas Coburn <douglas@dactbc.com>
Configuration menu - View commit details
-
Copy full SHA for 0f0127a - Browse repository at this point
Copy the full SHA 0f0127aView commit details -
Mucha dev fail on any block (#149)
* feat: add --strict-blocking flag to fail on any existing security violations Introduces a new --strict-blocking flag that causes builds to fail on ANY security policy violations with blocking severity, not just new ones. This enables enforcement of a zero-tolerance policy on security issues. Key features: - Works in diff mode only (logs warning in API mode) - Only fails on error-level alerts (not warnings) - --disable-blocking takes precedence when both flags are set - Enhanced console output distinguishes NEW vs EXISTING violations - Comprehensive test coverage for all scenarios Implementation details: - Added unchanged_alerts and removed_alerts fields to Diff class - Created get_unchanged_alerts() method to extract alerts from unchanged packages - Updated report_pass() to check both new and unchanged alerts when enabled - Added validation warnings for conflicting flags and API mode limitations Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com> * chore: update uv.lock with version 2.2.63 Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com> * docs: add --strict-blocking flag documentation to README Added comprehensive documentation for the new --strict-blocking feature: - Added flag to Advanced Configuration parameters table - Created dedicated "Strict Blocking Mode" section with: - Behavior comparison (standard vs strict) - Usage examples for different CI/CD platforms - Output examples showing NEW vs EXISTING violations - Common use cases and implementation strategies - Important notes about limitations and flag priority - Flag combination examples - Migration strategy guidance - Links to GitLab CI example files The documentation clearly explains: - Zero-tolerance security policy enforcement - Diff mode requirement - Error-level filtering (not warnings) - --disable-blocking precedence - First scan behavior Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com> * chore: bump version to 2.3.1 for --strict-blocking feature Bumped version from 2.2.63 to 2.3.1 following semantic versioning (minor version bump for new feature). This version number avoids conflict with the mucha-dev-gitlab-security-output branch which uses 2.3.0 for the GitLab Security Dashboard feature. Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com> * version sync * Bumping version --------- Co-authored-by: Jonathan Mucha <jonathan@mucha.local> Co-authored-by: Claude Sonnet 4.5 <noreply@anthropic.com> Co-authored-by: Douglas Coburn <douglas@dactbc.com>
Configuration menu - View commit details
-
Copy full SHA for 54e6ec7 - Browse repository at this point
Copy the full SHA 54e6ec7View commit details -
Mucha dev gitlab security output (#147)
* feat: add GitLab Security Dashboard integration with Dependency Scanning report output Adds support for generating GitLab-compatible Dependency Scanning reports that integrate with GitLab's Security Dashboard. This feature enables Socket security findings to be displayed natively in GitLab merge requests and security dashboards. Key Features: - New --enable-gitlab-security flag to generate GitLab reports - New --gitlab-security-file flag for custom output paths (default: gl-dependency-scanning-report.json) - Generates GitLab Dependency Scanning schema v15.0.0 compliant reports - Supports multiple simultaneous output formats (JSON, SARIF, GitLab) - Includes actionable security alerts (error/warn level) in vulnerability reports - Maps Socket severity levels to GitLab severity (Critical, High, Medium, Low) - Extracts CVE identifiers and dependency chain information - Generates deterministic UUIDs for vulnerability tracking Implementation: - Added GitLab report generator in messages.py with helper functions for severity mapping, identifier extraction, and location parsing - Refactored OutputHandler to support multiple simultaneous output formats - Added comprehensive unit tests (test_gitlab_format.py) and integration tests - Updated documentation with usage examples, CI/CD integration guide, and alert filtering details Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com> * capturing all recent changes * chore: bump version to 2.3.0 for GitLab Security Dashboard feature Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com> * bumping version * Removing unneeded files --------- Co-authored-by: Jonathan Mucha <jonathan@mucha.local> Co-authored-by: Claude Sonnet 4.5 <noreply@anthropic.com> Co-authored-by: Douglas Coburn <douglas@dactbc.com>
Configuration menu - View commit details
-
Copy full SHA for 3defe2e - Browse repository at this point
Copy the full SHA 3defe2eView commit details
Commits on Jan 19, 2026
-
feat: add new reachability flags and change analysis splitting default
- Add --reach-enable-analysis-splitting flag (splitting now disabled by default) - Add --reach-detailed-analysis-log-file flag - Add --reach-lazy-mode flag - Keep --reach-disable-analysis-splitting as hidden no-op for backwards compatibility
Configuration menu - View commit details
-
Copy full SHA for b8231bb - Browse repository at this point
Copy the full SHA b8231bbView commit details
Commits on Jan 20, 2026
-
Configuration menu - View commit details
-
Copy full SHA for c4cd89a - Browse repository at this point
Copy the full SHA c4cd89aView commit details -
Merge pull request #153 from SocketDev/reach-new-flags
feat: add new reachability flags and change analysis splitting default
Configuration menu - View commit details
-
Copy full SHA for ef21b60 - Browse repository at this point
Copy the full SHA ef21b60View commit details
Commits on Jan 21, 2026
-
Configuration menu - View commit details
-
Copy full SHA for 92ebc97 - Browse repository at this point
Copy the full SHA 92ebc97View commit details -
Merge pull request #154 from SocketDev/set-scan-type-when-reach
Set the scan type to socket_tier1 when using the reachability flag
Configuration menu - View commit details
-
Copy full SHA for 03549b4 - Browse repository at this point
Copy the full SHA 03549b4View commit details
Commits on Jan 22, 2026
-
Added strace to the base packages in the Docker image for debugging purposes.
Configuration menu - View commit details
-
Copy full SHA for 628e386 - Browse repository at this point
Copy the full SHA 628e386View commit details -
Merge pull request #155 from SocketDev/add-strace-to-docker
Add strace to Docker image
Configuration menu - View commit details
-
Copy full SHA for 9007613 - Browse repository at this point
Copy the full SHA 9007613View commit details
Commits on Feb 5, 2026
-
Configuration menu - View commit details
-
Copy full SHA for b0c00be - Browse repository at this point
Copy the full SHA b0c00beView commit details -
Configuration menu - View commit details
-
Copy full SHA for d021137 - Browse repository at this point
Copy the full SHA d021137View commit details -
Configuration menu - View commit details
-
Copy full SHA for 4f2be5c - Browse repository at this point
Copy the full SHA 4f2be5cView commit details
Commits on Feb 6, 2026
-
Merge pull request #156 from SocketDev/e2e-test
e2e tests for full scans + full scans with reachability
Configuration menu - View commit details
-
Copy full SHA for 38c064d - Browse repository at this point
Copy the full SHA 38c064dView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v2.2.59...main