You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .claude-plugin/plugin.json
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
{
2
2
"name": "runwall",
3
3
"description": "Runtime security plugin for Claude Code with balanced default hooks plus the Runwall inline MCP gateway for shell, git, MCP, secret, and exfiltration risks.",
Copy file name to clipboardExpand all lines: .codex-plugin/plugin.json
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
{
2
2
"name": "runwall",
3
3
"description": "Runtime security plugin bundle for Codex with the Runwall inline MCP gateway, policy tools, skills, and safer defaults for coding-agent workflows.",
Copy file name to clipboardExpand all lines: CHANGELOG.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,10 @@
1
1
# Changelog
2
2
3
+
## 3.3.5
4
+
5
+
- added a gateway-side fallback for obvious secret markers so upstream MCP responses still get redacted even when nested JSON payloads are mangled by platform-specific shell argument handling
6
+
- kept the redaction attribution on `mcp-response-secret-leak-guard` so the signature model and audit trail stay consistent
7
+
3
8
## 3.3.4
4
9
5
10
- fixed the MCP response secret redaction path on Windows by adding a deterministic fixed-string fast path for obvious secret markers before regex-file matching
0 commit comments