You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
chore(ci): bump socket-registry SHA to ed311907 (#1180)
* chore(ci): bump socket-registry SHA to ed311907
* fix(ci): suppress pre-existing zizmor template-injection warnings in summary step
* fix(ci): document permissions, fix template injection in weekly-update
* chore(ci): bump socket-registry SHA to 07975491
* chore(ci): bump socket-registry SHA to 47d61c98
* chore: trim CLAUDE.md and audit skills
Reduce CLAUDE.md from 26KB to 8KB (69% reduction) by removing:
- File-by-file codebase descriptions (Claude reads code directly)
- Verbose architecture/update mechanism sections
- Redundant examples repeating the rules they illustrate
- Tutorial-like explanations for standard workflows
- Duplicate information already in socket-registry/CLAUDE.md
- Configuration file listings discoverable from the repo
- Standard language conventions Claude already knows
Merged JUDGMENT/SCOPE and Critical Rules/ABSOLUTE RULES sections.
Condensed Documentation Policy to a single paragraph.
* fix: use third-person in skill descriptions
* chore: trim skill files and fix third-person descriptions
* chore(ci): bump socket-registry SHA to 1dc0e87d
* chore(ci): bump socket-registry SHA to 96c2a403
Copy file name to clipboardExpand all lines: .claude/skills/security-scan/SKILL.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
name: security-scan
3
-
description: Run a multi-tool security scan — AgentShield for Claude config, zizmor for GitHub Actions, and optionally Socket CLI for dependency scanning. Produces an A-F graded security report.
3
+
description: Runs a multi-tool security scan — AgentShield for Claude config, zizmor for GitHub Actions, and optionally Socket CLI for dependency scanning. Produces an A-F graded security report.
description: Updates SHA-256 checksums from GitHub releases to external-tools.json. Triggers when user mentions "update checksums", "sync checksums", or after releasing new tool versions.
3
+
description: >
4
+
Syncs SHA-256 checksums from GitHub releases to external-tools.json.
5
+
Triggers when user mentions "update checksums", "sync checksums", or after
Your task is to sync SHA-256 checksums from GitHub releases to the embedded `external-tools.json` file, ensuring SEA builds have up-to-date integrity verification.
12
15
</task>
13
16
14
-
<context>
15
-
**What is this?**
16
-
socket-cli downloads prebuilt security tools (opengrep, python, socket-patch, sfw, trivy, trufflehog) from GitHub releases for bundling into SEA (Single Executable Application) builds. Each release may include a `checksums.txt` file with SHA-256 hashes.
17
-
18
-
**Architecture:**
19
-
20
-
-`packages/cli/external-tools.json` - Configuration with embedded checksums
21
-
-`packages/cli/scripts/sync-checksums.mjs` - Sync script for GitHub release tools
22
-
23
-
**Tool Types in external-tools.json:**
24
-
25
-
| Type | Example | Checksums |
26
-
|------|---------|-----------|
27
-
|`github-release`| opengrep, trivy, sfw | Synced from releases |
28
-
|`npm`|@coana-tech/cli, synp | SRI integrity hashes |
29
-
|`pypi`| socketsecurity | May have checksums |
30
-
31
-
**Why Sync?**
32
-
- After tool updates (new versions), checksums become stale
33
-
- SEA builds verify downloads against embedded checksums
34
-
- Version-controlled checksums enable audit trail
35
-
</context>
36
-
37
17
<constraints>
38
-
**CRITICAL Requirements:**
39
-
- Network access required to fetch from GitHub API
40
-
- Only `github-release` type tools are synced
41
-
42
-
**Do NOT:**
43
-
- Modify checksums manually (always fetch from releases)
44
-
- Skip verification after sync
45
-
- Commit without reviewing changes
46
-
47
-
**Do ONLY:**
48
-
- Fetch checksums from official GitHub releases
49
-
- Update external-tools.json with new checksums
50
-
- Verify the JSON is valid after update
18
+
- Network access required to fetch from GitHub API.
19
+
- Only `github-release` type tools are synced (not npm or pypi).
20
+
- Never modify checksums manually; always fetch from releases.
21
+
- Verify JSON validity after sync.
22
+
- Review changes before committing.
51
23
</constraints>
52
24
53
-
<instructions>
54
-
55
-
## Process
56
-
57
-
### Phase 1: Check Current State
58
-
59
-
<action>
60
-
Review current embedded checksums and tool versions:
61
-
</action>
62
-
63
-
```bash
64
-
# Show current GitHub release tools in external-tools.json
65
-
grep -A2 '"type": "github-release"' packages/cli/external-tools.json | head -40
Update embedded SHA-256 checksums from GitHub releases.
137
-
Enables SEA builds with up-to-date integrity verification."
138
-
```
139
-
140
-
</instructions>
141
-
142
-
## Success Criteria
143
-
144
-
- All GitHub release tools synced from releases
145
-
- external-tools.json updated with latest checksums
146
-
- JSON syntax validated
147
-
- Changes committed (if any updates)
27
+
1.**Check Current State** - Review current checksums and tool versions in `packages/cli/external-tools.json`.
28
+
2.**Sync Checksums** - Run `node packages/cli/scripts/sync-checksums.mjs`. Tries `checksums.txt` from the release first; falls back to downloading assets and computing SHA-256.
0 commit comments