Skip to content

sign commits#17

Merged
Sajjon merged 2 commits intomainfrom
sign-commits
Jul 8, 2025
Merged

sign commits#17
Sajjon merged 2 commits intomainfrom
sign-commits

Conversation

@Sajjon
Copy link
Copy Markdown
Owner

@Sajjon Sajjon commented Jul 7, 2025

signing of commits and tags.

@codecov
Copy link
Copy Markdown

codecov bot commented Jul 7, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 96.90%. Comparing base (387467d) to head (343c0c2).
Report is 3 commits behind head on main.

Additional details and impacted files
@@           Coverage Diff           @@
##             main      #17   +/-   ##
=======================================
  Coverage   96.90%   96.90%           
=======================================
  Files          76       76           
  Lines        1650     1650           
=======================================
  Hits         1599     1599           
  Misses         51       51           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@Sajjon Sajjon requested a review from Copilot July 7, 2025 21:36
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR enhances security documentation and automates signed releases by updating the CLI README, adding a SECURITY guide, and refactoring the release tool configuration and workflow to handle commit/tag signing, version bumps, crate publishing, and attestations.

  • Introduce SECURITY.md and update README.md with details on signed binaries and build attestations.
  • Simplify .release.toml to defer git/tag/publish to GitHub Actions.
  • Revamp .github/workflows/release.yml to include checkout token, version‐bump commits, crate publishing, and attestation steps.

Reviewed Changes

Copilot reviewed 4 out of 4 changed files in this pull request and generated 2 comments.

File Description
crates/cli/README.md Added signed‐binary notice; reformatted email/security sections with numbered best practices.
SECURITY.md New file describing release verification, signatures, attestations, and best practices.
.release.toml Disabled manual signing/tag/publish options, delegating to the GitHub workflow.
.github/workflows/release.yml Added checkout token, renamed steps, committed version bump, published crates, and attestations.
Comments suppressed due to low confidence (1)

crates/cli/README.md:309

  • Change 'employes' to 'employs' and consider capitalizing 'Klirr' for consistency.
Therefor, klirr employes these best practices to keep your _App Password_ safe: 

Comment on lines +303 to 314
> Klirr's email feature is safe to use. Klirr uses strong encryption and employes
> all IT security best practices to keep your _App Password_ safe.
> It is crucual that an attack does not get access to your _App Password_ since email
> services does not allow users to limit the scope and permission of the _App Password_, with it
> and attacker can read all your emails and send emails to anyone impersonating you!

Therefor, klirr employes these best practices to keep your _App Password_ safe:
1. Key-Derivation: Klirr does not use your encryption password directly, first it's run through a [Hash based Key-Derivation-Function](https://en.wikipedia.org/wiki/HKDF) using a application unique `INFO` (see 'How Should You Introduce Randomness into HKDF?' section of [this blog post](https://soatok.blog/2021/11/17/understanding-hkdf/)) and cryptographically secure random generated [`SALT`](https://en.wikipedia.org/wiki/Salt\_(cryptography)), this forms a strong and unique `EncryptionKey`
2. Advanced Encryption: Klirr uses [AES (Advanced Encryption Standard)] encryption with 256 bits strength, encrypted using the `EncryptionKey` from last step.
3. Zeroisation: Klirr uses [Zeroisation](https://en.wikipedia.org/wiki/Zeroisation) to eagerly erase sensitive secrets from memory.

You can review how klirr employes these safety measures in the [encryption folder of the code](crates/core/src/logic/encryption).
Copy link

Copilot AI Jul 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Correct the spelling of 'employes' to 'employs'.

Copilot uses AI. Check for mistakes.
0. Zeroisation: Klirr uses [Zeroisation](https://en.wikipedia.org/wiki/Zeroisation) to eagerly erase sensitive secrets from memory.
> Klirr's email feature is safe to use. Klirr uses strong encryption and employes
> all IT security best practices to keep your _App Password_ safe.
> It is crucual that an attack does not get access to your _App Password_ since email
Copy link

Copilot AI Jul 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fix the typo 'crucual' to 'crucial'.

Suggested change
> It is crucual that an attack does not get access to your _App Password_ since email
> It is crucial that an attack does not get access to your _App Password_ since email

Copilot uses AI. Check for mistakes.
@Sajjon Sajjon merged commit d01f83f into main Jul 8, 2025
7 checks passed
@Sajjon Sajjon deleted the sign-commits branch July 8, 2025 06:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants