Releases: oktsec/oktsec
Releases · oktsec/oktsec
v0.13.2
What's new
Aguara v0.12.0 (detection engine)
- MCPCFG_012 (HIGH): Detects
uvxanduv runMCP servers without version pins. This is exactly how the litellm supply chain attack spread -uvxauto-downloaded the compromised version from PyPI. - MCPCFG_013 (MEDIUM): Flags
pip installin MCP server setup without--require-hashes. aguara checknow scansuv,pip, andnpxcaches in addition to site-packages.aguara cleanis now interactive: shows findings, asks confirmation, then executes. No--dry-runneeded.- 257 total detection rules (was 255 in v0.13.1).
Incident response workflow
brew install garagon/tap/aguara
aguara check
aguara cleanThree commands, zero flags. Detects compromised packages, malicious .pth files, persistence backdoors. Quarantines for forensics.
Full v0.13.x changelog (since v0.12.1)
- Delegation chain enforcement (Ed25519-signed authorization tokens)
- Session tracking (auto per-agent, 30-min TTL)
oktsec audit verify-chain(offline tamper-evident chain verification)- Dashboard Ed25519 signature verification display
- 12 CE- container escape detection rules (from SandboxEscapeBench)
- 2 IAP rules for vulnerability knowledge transfer
- TC-002 expanded (shell history, git creds, wallets, SSL keys, CI/CD, npmrc)
- TC-011 persistence detection (systemd, sysmon, crontab)
- Egress sandbox (
egress_sandbox: trueforces HTTP through proxy) oktsec audit deps(scans against OSV.dev)- Dependency rug-pull detection (
dep_check: true) - Aguara v0.10.0 → v0.11.0 → v0.11.1 → v0.12.0
v0.13.1
v0.13.0
v0.12.1
v0.12.0
v0.11.2
v0.11.1
Changelog
- 574cc15 feat: agent hierarchy tracking (human -> agent -> sub-agent) (#76)
- 69cc5ac fix: /simplify findings - session leak, thread safety, abstractions
- 28445da fix: TUI agent count shows active agents (5min window) not watermark
- 41559f6 fix: TUI indent only when previous event is from different agent
- f6bc184 fix: TUI stats read from DB every 3s for accurate counters
- 9621cc8 fix: exclude gateway/ targets from active agent count in TUI
- 19bb2df fix: resolveAgent false matches, hook port from config
- 92b1a1a fix: treat Agent tool as ContentTool to prevent prompt false positives
v0.11.0
Changelog
- d5c5480 chore(deps): bump github.com/modelcontextprotocol/go-sdk (#68)
- 5f60fe7 feat: security posture fix and egress UI in agent detail (#72)
- 72af9a2 feat: session management with inventory, export, and AI analysis (#71)
- 1264bc8 feat: upgrade to Aguara v0.9.1 with context-aware scanning (#70)
- 6693d6e fix: quarantine enqueue, dark calendar icons, color variable fixes (#73)
- b43047e fix: session trace quote stripping and multi-agent display
v0.10.1
Changelog
- 650a2b6 feat: database config UI with test connection and save
- 0824b15 feat: database-agnostic audit store with Dialect abstraction
- 73a25e8 feat: extract AuditStore interface for multi-backend support
- c8e1fc8 feat: mask paths toggle, fix process signal on restart
- 10a55d7 feat: session trace shows human vs agent roles, newest first
- d7c62e5 feat: wire Postgres support via audit.Open() factory
- dd9cd7f fix: remove internal demo traffic generator from public repo
- 66f0b93 fix: single shared audit store between proxy and gateway
- 902610b refactor: migrate consumers to AuditStore interface
v0.10.0
Changelog
- af9ce48 feat: Bubbletea TUI, dashboard color system, UX polish (#64)
- 3985f25 feat: delegation chains, session traces, ephemeral keys, TUI polish (#67)
- b2cae58 feat: scan profiles, tool-scoped rules, TUI polish (#65)
- ff751cd fix: cross-platform process signal for Windows goreleaser build
- 354e368 fix: false positive reduction, TUI accuracy and polish (#66)