Commit Graph

948 Commits

Author SHA1 Message Date
Vincent Koc
d115faa367 chore: update security codeowners team 2026-04-29 15:57:17 -07:00
Vincent Koc
847d8fa0e1 chore(ci): add Plugin SDK reply CodeQL quality shard
Adds a focused non-security CodeQL quality shard for Plugin SDK reply/session delivery runtime contracts.
2026-04-29 15:56:41 -07:00
Vincent Koc
8f50920c45 chore(ci): add session diagnostics CodeQL quality shard
Adds a focused non-security CodeQL quality shard for session diagnostics, delivery queues, and related diagnostic contracts.
2026-04-29 15:29:03 -07:00
Peter Steinberger
c7e2aceb05 ci(dup): guard duplicate scan coverage 2026-04-29 23:24:57 +01:00
Vincent Koc
6717f8b334 chore(ci): add plugin trust CodeQL shard
Adds the plugin trust-boundary CodeQL security shard on Blacksmith and documents the rollout scope.
2026-04-29 15:02:06 -07:00
Vincent Koc
71ab341f46 chore(ci): rename CodeQL auth security shard
Renames the default auth/secrets CodeQL security category from the generic javascript-typescript label to core-auth-secrets.

Proof:
- Branch CodeQL security run https://github.com/openclaw/openclaw/actions/runs/25134871512 passed on 1d9f727bfd.
- Core auth/secrets analysis 1200412263 returned 0 results.
- Branch open CodeQL alerts: none.
- Workflow Sanity, Blacksmith Testbox, Blacksmith Build Artifacts Testbox, and OpenGrep PR Diff passed.

Scope is label/config only: same paths, query pack, filters, timeout, and runner.
2026-04-29 14:32:34 -07:00
Peter Steinberger
21e2168b8f ci: shard install smoke release checks 2026-04-29 22:25:55 +01:00
clawsweeper[bot]
27fafa4754 fix: Found two release-validation regressions in the new focused live- (#74562)
Co-authored-by: openclaw-clawsweeper[bot] <280122609+openclaw-clawsweeper[bot]@users.noreply.github.com>
2026-04-29 14:08:45 -07:00
clawsweeper[bot]
fbe41fbdfc fix(ci): Found one low-severity diagnostic bug in the new Full Release Val (#74513)
Co-authored-by: openclaw-clawsweeper[bot] <280122609+openclaw-clawsweeper[bot]@users.noreply.github.com>
2026-04-29 14:08:07 -07:00
Vincent Koc
fdf8ffaf3c fix(ci): exempt automation PRs from Barnacle PR limit
Treat ClawSweeper and Clownfish head refs as automation PRs for Barnacle's active-PR-limit close path, and cover the behavior with a regression test.
2026-04-29 13:58:06 -07:00
Peter Steinberger
9ccd015898 ci: bound install smoke docker builds 2026-04-29 21:56:54 +01:00
Vincent Koc
cd6efd1a42 chore(ci): add MCP process CodeQL shard
Adds the focused MCP/process/tool-execution CodeQL security shard and documents it in CI docs.

Proof:
- Branch CodeQL security run https://github.com/openclaw/openclaw/actions/runs/25132942030 passed on 9d8ca2bae7.
- New mcp-process-tool-boundary analysis 1200250367 returned 0 results.
- Branch open CodeQL alerts: none.
- Workflow Sanity, Blacksmith Testbox, Blacksmith Build Artifacts Testbox, and OpenGrep PR Diff passed.
2026-04-29 13:48:53 -07:00
Vincent Koc
6516be1023 fix(ci): stop ClawSweeper dispatch PAT fallback
Remove the maintainer PAT fallback from the ClawSweeper dispatch workflow so missing app auth fails closed instead of attributing downstream automation to a human token.
2026-04-29 13:26:02 -07:00
Vincent Koc
c9156cd9a8 chore(ci): add network SSRF CodeQL shard
Adds a narrow critical-security CodeQL shard for the network/SSRF boundary and documents the new category.
2026-04-29 13:08:46 -07:00
Peter Steinberger
dac7237494 ci: shard release validation hotspots 2026-04-29 20:40:42 +01:00
Peter Steinberger
57e4994caf ci: speed up release validation 2026-04-29 19:55:37 +01:00
Vincent Koc
297f4c6e60 feat(i18n): align docs and ui locales 2026-04-29 10:25:47 -07:00
Peter Steinberger
9f21335462 ci: reduce release runner queue pressure 2026-04-29 17:45:53 +01:00
Jesse Merhi
6de9d71bfb feat(security): add GHSA detector-review pipeline and OpenGrep CI workflows (#69483)
* feat(security): add GHSA detector-review pipeline and OpenGrep CI workflows [AI-assisted]

Stand up an end-to-end pipeline that turns every published openclaw GitHub
Security Advisory into a reusable OpenGrep rule, and wire the compiled rules
into manual-dispatch GitHub Actions workflows that publish SARIF to GitHub
Code Scanning.

The pipeline is harness-agnostic: any coding-agent CLI (Rovo Dev, Claude
Code, Codex, OpenCode, or anything you can shell out to) can drive it via
the runner script's --harness flag. Built-in adapters cover the four common
harnesses; --harness-cmd '<template>' supports anything else with shell-style
{prompt}/{model}/{output_file} substitution.

Pipeline pieces:

- scripts/run-ghsa-detector-review-batch.mjs runs your chosen coding harness
  in parallel against every advisory using the agent-agnostic detector-review
  spec at security/detector-review/detector-review-spec.md. Each case
  produces an opengrep general-rule.yml (precise) and broad-rule.yml
  (review-aid), plus a coverage-validated report against the vulnerable
  commit's changed files.
- scripts/compile-opengrep-rules.mjs walks a run directory, rewrites each
  rule's id to ghsa-detector.<ghsa>.<orig-id>, injects ghsa/advisory-url/
  detector-bucket/source-rule-id metadata, and uses opengrep itself to drop
  rules with InvalidRuleSchemaError so the published super-configs load
  cleanly.

Compiled outputs:

- security/opengrep/precise.yml     (336 rules)
- security/opengrep/broad.yml       (459 rules)
- security/opengrep/compile-manifest.json    (per-rule provenance map)

CI workflows (manual workflow_dispatch only):

- .github/workflows/opengrep-precise.yml
- .github/workflows/opengrep-broad.yml

Both install a pinned opengrep, run opengrep scan against src/, upload SARIF
to Code Scanning under categories opengrep-precise / opengrep-broad, and use
continue-on-error: true so findings never block the workflow.

Detector-review spec and assets:

- security/detector-review/detector-review-spec.md   the agent-agnostic spec
  the runner injects into each per-case prompt
- security/detector-review/references/{detector-rubric,report-template}.md
- security/detector-review/scripts/init_case.py
- security/prompt-suffix-coverage-first.md   mandatory prompt addendum that
  enforces coverage-first validation (rule must catch the OG vuln, not just
  pass synthetic fixtures)

Docs:

- security/README.md          end-to-end flow, supported harnesses, regen recipe
- security/opengrep/README.md compiled-config details + recompile recipe

* security: tighten GHSA OpenGrep detector workflow

* chore: refine precise opengrep workflow

* chore: remove stale opengrep metadata

* fix: harden GHSA OpenGrep workflow

* ci: split OpenGrep diff and full scans

* chore: remove performance-only opengrep rule

* ci: use OpenGrep installer path

* chore: enforce opengrep rule metadata provenance

* chore: generalize opengrep rule compilation

* docs: align opengrep rulepack guidance

* chore: support generic opengrep rule sources

* fix: validate opengrep rulepack-only changes

---------

Co-authored-by: Jesse Merhi <security-engineering@atlassian.com>
2026-04-30 02:42:20 +10:00
Peter Steinberger
7471c2116f ci: use smaller runners for native live shards 2026-04-29 17:16:26 +01:00
Peter Steinberger
86f473d8b9 ci: isolate moonshot live shard 2026-04-29 17:03:48 +01:00
Peter Steinberger
334f4624e0 ci: avoid blacksmith for release setup jobs 2026-04-29 16:55:08 +01:00
Peter Steinberger
c99d680714 ci: run release orchestration on github runners 2026-04-29 16:49:13 +01:00
Peter Steinberger
e8d23e5489 ci: cancel superseded release validation runs 2026-04-29 16:41:26 +01:00
Peter Steinberger
2d53b49b20 ci: use same-run release package artifacts 2026-04-29 16:06:02 +01:00
Peter Steinberger
beff88175e ci: run release orchestration on blacksmith 2026-04-29 15:58:00 +01:00
Mason Huang
7108414009 ci: add codeql quality profile input (#74348)
* ci: add codeql quality profile input

* ci: gate codeql quality profiles

* ci: ignore spec files in codeql shard
2026-04-29 22:39:54 +08:00
Peter Steinberger
5a2c50275d ci: cap docker e2e package validation 2026-04-29 15:10:25 +01:00
Mason Huang
dda765c445 ci: add plugin sdk package contract codeql quality shard (#74342) 2026-04-29 21:33:11 +08:00
Peter Steinberger
9881a808f2 ci: fallback deadcode check for legacy targets 2026-04-29 13:50:27 +01:00
Vincent Koc
ad2516b1c8 fix(ci): tolerate legacy plugin contract targets 2026-04-29 05:40:28 -07:00
Peter Steinberger
7a69069bfc ci: retry release live smokes faster 2026-04-29 13:31:29 +01:00
Peter Steinberger
49a6bfe601 ci: keep codex cli live smoke on fast tier 2026-04-29 13:01:44 +01:00
Peter Steinberger
1446069707 ci: speed up release live smoke retries 2026-04-29 12:33:52 +01:00
Peter Steinberger
1dac6ac4c6 ci: retry transient live provider flakes 2026-04-29 11:44:42 +01:00
Peter Steinberger
6b4873d0c1 ci: split plugin contract shards 2026-04-29 11:44:32 +01:00
Peter Steinberger
427d5d4f69 ci: guard unused dead-code files 2026-04-29 11:35:34 +01:00
Peter Steinberger
6cea276976 ci: shard release docker plugin validation 2026-04-29 11:33:24 +01:00
Peter Steinberger
f28bc31ecd ci: rename clawsweeper automation labels 2026-04-29 10:18:57 +01:00
Vincent Koc
cf6e4d0ed7 ci: keep clownfish command reactions owned 2026-04-29 01:34:29 -07:00
Vincent Koc
fed552c2ef ci: keep command reactions in progress 2026-04-29 01:30:16 -07:00
Vincent Koc
88237faed3 ci: drop bare automerge reaction trigger 2026-04-29 01:19:43 -07:00
Peter Steinberger
72cf700fbf ci: add Knip dependency check
Add a dependency-only Knip CI shard, keep full unused-file mode manual, and scope pnpm's release-age override to the latest Knip dlx install.
2026-04-29 09:10:48 +01:00
Vincent Koc
b85cf280c7 fix(ci): gate plugin prerelease docker suite 2026-04-29 01:06:57 -07:00
Vincent Koc
9d8de70c20 ci: tolerate command reaction token limits 2026-04-29 00:59:30 -07:00
Vincent Koc
250fec85e1 ci: react to autoclose on issues 2026-04-29 00:52:02 -07:00
Vincent Koc
a62c7e5a27 ci: react to autoclose commands 2026-04-29 00:46:00 -07:00
Vincent Koc
275b0f00b0 ci: require maintainer permission for command reactions 2026-04-29 00:30:32 -07:00
Peter Steinberger
a0fd105e5e ci: split plugin prerelease validation 2026-04-29 08:21:12 +01:00
Vincent Koc
6a3310bbda chore(ci): add memory CodeQL quality shard
Adds a narrow CodeQL Critical Quality shard for the memory host/runtime boundary.
2026-04-29 00:18:30 -07:00