Releases: devatsecure/Argus-Security
Release 6.0.0
🚀 What's Changed
- docs: Update README, CLAUDE.md, and CHANGELOG for v6.0.0 release (@claude)
- feat: Add 7 continuous security testing modules (v3.0) (@claude)
- docs: Add continuous security testing guide with gap analysis (@claude)
- docs: Fix orchestrator roles and Docker commands in CLAUDE.md and rules (@devatsecure)
- fix: Improve Falco installation reliability with version verification (@devatsecure)
- fix: Downgrade .argus directory check to warning in Action E2E fast mode (@devatsecure)
- perf: Auto-detect IaC frameworks to speed up Checkov scans (@devatsecure)
- test: Add unit tests for config_loader, hybrid_analyzer, semgrep_scanner (@devatsecure)
- fix: Auto-detect Docker socket path for macOS and Linux (@devatsecure)
- fix: Suppress TruffleHog self-update stderr noise (@devatsecure)
- feat: Enrich heuristic findings with title, description, CWE, and severity (@devatsecure)
- fix: Improve Semgrep PATH resolution with python -m fallback (@devatsecure)
- fix: Update Anthropic model fallback chain with latest model IDs (@devatsecure)
- fix: Allow spaces in --disclosure-reporter CLI argument (@devatsecure)
- fix: Update ZAP to v2.16.0 (v2.15.0 release removed from GitHub) (@devatsecure)
- ci: Add Docker E2E workflow to build and smoke-test Dockerfile.complete (@devatsecure)
🐳 Docker Images
Multi-platform container images are available on GitHub Container Registry:
# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:6.0.0
docker pull ghcr.io/devatsecure/Argus-Security:6.0
docker pull ghcr.io/devatsecure/Argus-Security:6
docker pull ghcr.io/devatsecure/Argus-Security:latestSupported Platforms
linux/amd64linux/arm64
Quick Start
# Run security audit on current directory
docker run -v $(pwd):/workspace \
-e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
ghcr.io/devatsecure/Argus-Security:6.0.0 \
/workspace auditGitHub Actions Usage
- name: Run Argus Security Review
uses: devatsecure/argus-action@v6.0.0
with:
anthropic_api_key:
severity_threshold: high📦 Installation
Using Docker (Recommended)
docker pull ghcr.io/devatsecure/Argus-Security:6.0.0Using pip
pip install git+https://github.com/devatsecure/Argus-Security.git@v6.0.0Using GitHub Actions
See README.md for complete setup instructions.
🔒 Security
This release includes:
- ✅ Signed container images (Sigstore/cosign)
- ✅ Software Bill of Materials (SBOM)
- ✅ Provenance attestations
- ✅ Vulnerability scanning (Trivy)
Verify Container Signature
cosign verify \
--certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
--certificate-oidc-issuer=https://token.actions.githubusercontent.com \
ghcr.io/devatsecure/Argus-Security:6.0.0📚 Documentation
🐛 Bug Reports
Found a bug? Please open an issue.
Full Changelog: v5.0.0...v6.0.0
Release 5.0.0
🚀 What's Changed
- docs: Update CHANGELOG with all recent commits, release as v5.0.0 (@devatsecure)
- ci: Add GitHub Action E2E test workflow for fast and full modes (@devatsecure)
- security: Add SHA256 integrity verification to all binary downloads (@devatsecure)
- feat: Add pytest-xdist for parallel test execution (@devatsecure)
- feat: Wire ZAP and Falco into Dockerfile.complete and pipeline (@devatsecure)
- fix: Resolve 3 flaky tests caused by thread races and subprocess mock (@devatsecure)
- fix: Resolve MCP server thread race condition (@devatsecure)
- feat: Wire DAST agents with guarded imports and 43 tests (@devatsecure)
- security: Harden 6 modules from self-scan dogfooding (@devatsecure)
- feat: Add mypy type annotations to core modules (@devatsecure)
- fix: Replace 22 deprecated datetime.utcnow() calls with timezone-aware alternative (@devatsecure)
- fix: Resolve 2 test failures + add conftest.py auto-mock for speed (@devatsecure)
- test: Add 7 test files covering 241 tests for previously untested modules (@devatsecure)
- docs: Refresh README (578→297 lines) and add CHANGELOG (@devatsecure)
- ci: Add GitHub Actions test workflow with Python matrix (@devatsecure)
- feat: Wire Temporal orchestrator into hybrid_analyzer pipeline (@devatsecure)
- chore: Remove vestigial ZAP + OpenJDK from Dockerfile.complete (@devatsecure)
- fix: Fix ZAP PHP echo regex to match echo without parentheses (@devatsecure)
- fix: Fix 3 known bugs — noise_scorer AttributeError, reachability ZeroDivision, max_files mismatch (@devatsecure)
- test: Add 11 test files covering 470+ tests for previously untested modules (@devatsecure)
- feat: Add Gitleaks v8.18.4 binary to all Dockerfiles (@devatsecure)
- feat: Add full 6-phase pipeline mode to GitHub Action (@devatsecure)
- feat: Activate MCP server with config toggle in hybrid_analyzer (@devatsecure)
- feat: Wire DAST orchestrator into hybrid_analyzer pipeline (@devatsecure)
- fix: Resolve test failures from agent integration changes (@devatsecure)
- fix: Resolve 38 ruff linting errors across codebase (@devatsecure)
- fix: Update OPA policy hardening tests for new block_ids-based decision (@devatsecure)
- test: Add coverage for phase_gate, threat_model_generator, remediation_engine (@devatsecure)
- feat: Wire Gitleaks secret scanner into pipeline (@devatsecure)
- fix: Remove auto_fixable bypass from OPA policy gate (@devatsecure)
- audit: Full 6-phase security scan of chrome-devtools-mcp (@devatsecure)
- chore: Auto-fix 1,690 ruff errors across codebase (@devatsecure)
- test: Add test coverage for pipeline stages, scanner runners, config loader (@devatsecure)
- fix: Downgrade Falco missing from error to warning with install guidance (@devatsecure)
- chore: Fix all ruff errors in both orchestrators, align max_files default (@devatsecure)
- fix: Extract .findings from CheckovScanResult in pipeline/stages.py (@devatsecure)
- docs: next fixes design — bugs, ruff cleanup, infra, test coverage (@devatsecure)
- docs+tests: audit Wave 3 — tests for new modules, architecture diagrams (@devatsecure)
- fix: update test patch targets for enrichment pipeline extraction (@devatsecure)
- refactor: audit Wave 2 — extract phase functions, shared enrichment, schema validation (@devatsecure)
- fix: audit Wave 1 quick wins — bare excepts, dead code, env var sanitization (@devatsecure)
- fix: Resolve 6 integration bugs in pipeline enrichment features (@devatsecure)
- fix: Resolve Semgrep PATH issue, quality check for CVE findings, add claude-cli provider (@devatsecure)
- fix: Address 4 Cursor Bugbot findings from PR #34 (@devatsecure)
- fix: Patch 4 critical security issues — shell injection, config precedence, CLI toggles, CI gate (@devatsecure)
- feat: Add DVWA-inspired scanner enhancements — backup detection, CSRF, session ID, Nuclei & ZAP (@devatsecure)
- feat: Wire 6 missing features into Docker pipeline, fix config bugs, remove 28 dead modules (@devatsecure)
- feat: Wire Phase 4 exploit validation, add scanner health tracking, quality filter, and DinD support (@devatsecure)
🐳 Docker Images
Multi-platform container images are available on GitHub Container Registry:
# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:5.0.0
docker pull ghcr.io/devatsecure/Argus-Security:5.0
docker pull ghcr.io/devatsecure/Argus-Security:5
docker pull ghcr.io/devatsecure/Argus-Security:latestSupported Platforms
linux/amd64linux/arm64
Quick Start
# Run security audit on current directory
docker run -v $(pwd):/workspace \
-e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
ghcr.io/devatsecure/Argus-Security:5.0.0 \
/workspace auditGitHub Actions Usage
- name: Run Argus Security Review
uses: devatsecure/argus-action@v5.0.0
with:
anthropic_api_key:
severity_threshold: high📦 Installation
Using Docker (Recommended)
docker pull ghcr.io/devatsecure/Argus-Security:5.0.0Using pip
pip install git+https://github.com/devatsecure/Argus-Security.git@v5.0.0Using GitHub Actions
See README.md for complete setup instructions.
🔒 Security
This release includes:
- ✅ Signed container images (Sigstore/cosign)
- ✅ Software Bill of Materials (SBOM)
- ✅ Provenance attestations
- ✅ Vulnerability scanning (Trivy)
Verify Container Signature
cosign verify \
--certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
--certificate-oidc-issuer=https://token.actions.githubusercontent.com \
ghcr.io/devatsecure/Argus-Security:5.0.0📚 Documentation
🐛 Bug Reports
Found a bug? Please open an issue.
Full Changelog: v2.2.0...v5.0.0
Release 2.2.0
🚀 What's Changed
- feat: P0/P1/P2 security hardening, decomposition, and feature additions (@devatsecure)
🐳 Docker Images
Multi-platform container images are available on GitHub Container Registry:
# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:2.2.0
docker pull ghcr.io/devatsecure/Argus-Security:2.2
docker pull ghcr.io/devatsecure/Argus-Security:2
docker pull ghcr.io/devatsecure/Argus-Security:latestSupported Platforms
linux/amd64linux/arm64
Quick Start
# Run security audit on current directory
docker run -v $(pwd):/workspace \
-e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
ghcr.io/devatsecure/Argus-Security:2.2.0 \
/workspace auditGitHub Actions Usage
- name: Run Argus Security Review
uses: devatsecure/argus-action@v2.2.0
with:
anthropic_api_key:
severity_threshold: high📦 Installation
Using Docker (Recommended)
docker pull ghcr.io/devatsecure/Argus-Security:2.2.0Using pip
pip install git+https://github.com/devatsecure/Argus-Security.git@v2.2.0Using GitHub Actions
See README.md for complete setup instructions.
🔒 Security
This release includes:
- ✅ Signed container images (Sigstore/cosign)
- ✅ Software Bill of Materials (SBOM)
- ✅ Provenance attestations
- ✅ Vulnerability scanning (Trivy)
Verify Container Signature
cosign verify \
--certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
--certificate-oidc-issuer=https://token.actions.githubusercontent.com \
ghcr.io/devatsecure/Argus-Security:2.2.0📚 Documentation
🐛 Bug Reports
Found a bug? Please open an issue.
Full Changelog: v2.1.0...v2.2.0
Release 2.1.0
🚀 What's Changed
- feat: Add Claude Code automations — 2 MCP servers, 4 skills, 4 hooks, 4 subagents (@devatsecure)
- fix: Resolve 4 pipeline runtime issues for full phase execution (@devatsecure)
- fix: Fix FuzzingEngine/RuntimeSecurityMonitor init args and cache fallback (@devatsecure)
- feat: Enable all phases by default and wire TruffleHog scanner (@devatsecure)
- fix: Resolve 161 test failures and 8 unnecessary skips (@devatsecure)
- feat: Wire enrichment pipeline and scanner registry into orchestrators (@devatsecure)
🐳 Docker Images
Multi-platform container images are available on GitHub Container Registry:
# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:2.1.0
docker pull ghcr.io/devatsecure/Argus-Security:2.1
docker pull ghcr.io/devatsecure/Argus-Security:2
docker pull ghcr.io/devatsecure/Argus-Security:latestSupported Platforms
linux/amd64linux/arm64
Quick Start
# Run security audit on current directory
docker run -v $(pwd):/workspace \
-e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
ghcr.io/devatsecure/Argus-Security:2.1.0 \
/workspace auditGitHub Actions Usage
- name: Run Argus Security Review
uses: devatsecure/argus-action@v2.1.0
with:
anthropic_api_key:
severity_threshold: high📦 Installation
Using Docker (Recommended)
docker pull ghcr.io/devatsecure/Argus-Security:2.1.0Using pip
pip install git+https://github.com/devatsecure/Argus-Security.git@v2.1.0Using GitHub Actions
See README.md for complete setup instructions.
🔒 Security
This release includes:
- ✅ Signed container images (Sigstore/cosign)
- ✅ Software Bill of Materials (SBOM)
- ✅ Provenance attestations
- ✅ Vulnerability scanning (Trivy)
Verify Container Signature
cosign verify \
--certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
--certificate-oidc-issuer=https://token.actions.githubusercontent.com \
ghcr.io/devatsecure/Argus-Security:2.1.0📚 Documentation
🐛 Bug Reports
Found a bug? Please open an issue.
Full Changelog: v2.0.0...v2.1.0
Release 2.0.0
🚀 What's Changed
- fix: Address 5 bugs from Cursor Bugbot code review (#33) (@devatsecure)
- docs: Clean up internal comments and section headers (@devatsecure)
- feat: Add 15 advanced security modules (Shannon + Trivy feature ports) (@devatsecure)
- fix: Reduce false positives by detecting safe coding patterns before flagging (@claude)
- fix: Resolve 7 pipeline-breaking bugs found during full Docker scan (@devatsecure)
- fix: Replace remaining || true with continue-on-error for mypy in tests.yml (@devatsecure)
- refactor: Decompose god objects and harden security across pipeline (@devatsecure)
- feat: Add Pipeline Stage Interface, Typed Schemas, and Config Profiles (@claude)
- feat: Add responsible disclosure generator (Phase 6.5) (@devatsecure)
- fix: Resolve dataclass attribute access errors and add missing CLI options (@devatsecure)
- refactor: Add exceptions module and all exports to all modules (@devatsecure)
- test: Update regression test results after import fixes (@devatsecure)
- chore: Add local artifacts to .gitignore (@devatsecure)
- refactor: Extract ReviewMetrics to separate module and update CLAUDE.md (@devatsecure)
- refactor: Extract classes from run_ai_audit.py into separate modules (@devatsecure)
- fix: Production readiness improvements and test fixes (@devatsecure)
- fix: 6 critical accuracy improvements to Enhanced FP Detector (@devatsecure)
- feat: Complete Enhanced False Positive Detector with 8 Architectural Improvements (@devatsecure)
- fix: Correct Phase 4 sandbox validation status reporting (@devatsecure)
- fix: Correct Semgrep field name mappings in hybrid_analyzer (@devatsecure)
- docs: Clarify phase numbering convention (2.5-2.7 explained) (@devatsecure)
- docs: Update README with complete pipeline (Phases 2.5-2.7), DAST, and Vulnerability Chaining (@devatsecure)
🐳 Docker Images
Multi-platform container images are available on GitHub Container Registry:
# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:2.0.0
docker pull ghcr.io/devatsecure/Argus-Security:2.0
docker pull ghcr.io/devatsecure/Argus-Security:2
docker pull ghcr.io/devatsecure/Argus-Security:latestSupported Platforms
linux/amd64linux/arm64
Quick Start
# Run security audit on current directory
docker run -v $(pwd):/workspace \
-e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
ghcr.io/devatsecure/Argus-Security:2.0.0 \
/workspace auditGitHub Actions Usage
- name: Run Argus Security Review
uses: devatsecure/argus-action@v2.0.0
with:
anthropic_api_key:
severity_threshold: high📦 Installation
Using Docker (Recommended)
docker pull ghcr.io/devatsecure/Argus-Security:2.0.0Using pip
pip install git+https://github.com/devatsecure/Argus-Security.git@v2.0.0Using GitHub Actions
See README.md for complete setup instructions.
🔒 Security
This release includes:
- ✅ Signed container images (Sigstore/cosign)
- ✅ Software Bill of Materials (SBOM)
- ✅ Provenance attestations
- ✅ Vulnerability scanning (Trivy)
Verify Container Signature
cosign verify \
--certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
--certificate-oidc-issuer=https://token.actions.githubusercontent.com \
ghcr.io/devatsecure/Argus-Security:2.0.0📚 Documentation
🐛 Bug Reports
Found a bug? Please open an issue.
Full Changelog: v1.5.0...v2.0.0
v1.5.0: Phase 2.7 Deep Analysis Engine
Argus Security v1.5.0 - Phase 2.7 Deep Analysis Engine
🎉 Major New Feature: Phase 2.7 Deep Analysis
Adds AI-powered semantic security analysis to the Argus pipeline with four specialized modules:
- Semantic Code Twin: Deep code understanding with intent vs behavior analysis
- Proactive AI Scanner: Autonomous vulnerability reasoning (VulnHuntr-inspired)
- Taint Analyzer: Cross-function data flow tracking (Pysa-inspired)
- Zero-Day Hypothesizer: Novel vulnerability hypothesis generation
✅ Validation Results
Production-Ready Metrics
- Precision: 100% (zero false positives)
- Recall: 80% (4/5 real CVEs detected)
- F1 Score: 0.889 (exceeds excellent target of 0.75)
- Cost: $1.87 per scan (37% of $5 ceiling)
- Time: 3 minutes (40% faster than target)
CVE Detection Coverage
- ✅ SQL Injection: 100% (1/1 detected)
- ✅ Path Traversal: 100% (1/1 detected)
- ✅ SSRF: 100% (1/1 detected)
⚠️ XSS: 50% (1/2 detected)
🚀 New Features
Progressive Rollout Modes
- `off` - Default for backwards compatibility
- `semantic-only` - Light analysis (~$1.50/50 files)
- `conservative` - Recommended for PR checks (~$4.00/50 files)
- `full` - Complete analysis (~$13.00/50 files)
Safety Controls
- File Limit: 50 files (configurable)
- Timeout: 300s with graceful abort
- Cost Ceiling: $5.00 with 80% warning
Benchmark Support
Real-time cost and performance tracking with detailed per-phase metrics.
📦 Usage
CLI
```bash
Conservative mode (recommended)
python scripts/run_ai_audit.py . audit \
--deep-analysis-mode=conservative \
--benchmark
With safety controls
python scripts/run_ai_audit.py . audit \
--deep-analysis-mode=conservative \
--max-files-deep-analysis=50 \
--deep-analysis-cost-ceiling=5.0 \
--benchmark
```
GitHub Action
```yaml
- uses: devatsecure/Argus-Security@v1.5.0
with:
anthropic-api-key: ${{ secrets.ANTHROPIC_API_KEY }}
review-type: security
deep-analysis-mode: conservative
benchmark: true
```
🐳 Docker Usage
```bash
Pull the latest image with Phase 2.7
docker pull ghcr.io/devatsecure/Argus-Security:1.5.0
Run with Deep Analysis
docker run -v $(pwd):/workspace \
-e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
ghcr.io/devatsecure/Argus-Security:1.5.0 \
/workspace audit --deep-analysis-mode=conservative --benchmark
```
📚 Documentation
- Deployment Guide: `docs/deep-analysis-migration.md`
- Examples: `DEEP_ANALYSIS_EXAMPLES.md`
- Validation Report: `PR27_FINAL_METRICS_FOR_MERGE.md`
- Safety Controls: `DEEP_ANALYSIS_SAFETY_CONTROLS.md`
🔧 Breaking Changes
None. Phase 2.7 is opt-in with default mode `off`.
🐛 Bug Fixes
- Fixed Phase 2.7 integration with argument parsing
- Fixed CVE test data repository URLs and commit SHAs
- Fixed boolean configuration handling
- Fixed findings normalization and merging
📊 Deliverables
- 18 new files (~7,000 lines of code)
- 2,300+ lines of documentation
- Complete test suite with CVE validation
- 4-week rollout strategy
🙏 Credits
Developed with Claude Code (Anthropic)
Research based on IRIS, VulnHuntr, GPTScan, Pysa/Scalpel
🚀 What's Changed
- feat: Add Phase 2.7 Deep Analysis Engine with production validation (@devatsecure)
- feat: Complete Docker setup with ALL features (DAST + Vulnerability Chaining + Phase 2 fix) (@devatsecure)
- feat: Add Vulnerability Chaining System with attack path discovery (@devatsecure)
- feat: Add Phase 1 MVP Enhanced DAST Integration with Multi-Agent System (@devatsecure)
- feat: Add enhanced false positive detection for OAuth2, file permissions, dev configs, and locking (@devatsecure)
- feat: Implement IRIS-style LLM semantic vulnerability analysis (@devatsecure)
🐳 Docker Images
Multi-platform container images are available on GitHub Container Registry:
```bash
Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:1.5.0
docker pull ghcr.io/devatsecure/Argus-Security:1.5
docker pull ghcr.io/devatsecure/Argus-Security:1
docker pull ghcr.io/devatsecure/Argus-Security:latest
```
Supported Platforms
- `linux/amd64`
- `linux/arm64`
Quick Start
```bash
Run security audit on current directory
docker run -v $(pwd):/workspace \
-e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
ghcr.io/devatsecure/Argus-Security:1.5.0 \
/workspace audit
```
GitHub Actions Usage
```yaml
- name: Run Argus Security Review
uses: devatsecure/argus-action@v1.5.0
with:
anthropic_api_key:
severity_threshold: high
```
📦 Installation
Using Docker (Recommended)
```bash
docker pull ghcr.io/devatsecure/Argus-Security:1.5.0
```
Using pip
```bash
pip install git+https://github.com/devatsecure/Argus-Security.git@v1.5.0
```
Using GitHub Actions
See README.md for complete setup instructions.
🔒 Security
This release includes:
- ✅ Signed container images (Sigstore/cosign)
- ✅ Software Bill of Materials (SBOM)
- ✅ Provenance attestations
- ✅ Vulnerability scanning (Trivy)
Verify Container Signature
```bash
cosign verify \
--certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
--certificate-oidc-issuer=https://token.actions.githubusercontent.com \
ghcr.io/devatsecure/Argus-Security:1.5.0
```
📚 Documentation
🐛 Bug Reports
Found a bug? Please open an issue.
Full Changelog: v1.0.0...v1.5.0
🤖 Generated with Claude Code
Release 1.0.0
🚀 What's Changed
- feat: Add Phase 2.7 Deep Analysis Engine with production validation (@devatsecure)
- feat: Complete Docker setup with ALL features (DAST + Vulnerability Chaining + Phase 2 fix) (@devatsecure)
- feat: Add Vulnerability Chaining System with attack path discovery (@devatsecure)
- feat: Add Phase 1 MVP Enhanced DAST Integration with Multi-Agent System (@devatsecure)
- feat: Add enhanced false positive detection for OAuth2, file permissions, dev configs, and locking (@devatsecure)
- feat: Implement IRIS-style LLM semantic vulnerability analysis (@devatsecure)
- feat: enhance Docker and shell scripts for complete 6-phase Argus scanning (@devatsecure)
- fix: Resolve NoneType error in Checkov AI enrichment and update Ollama model name (@devatsecure)
- feat: Add CODE_INJECTION and SSRF sandbox validation templates (@devatsecure)
- docs: Add session summary for documentation finalization (@devatsecure)
- docs: Highlight context-aware features and add comprehensive documentation index (@devatsecure)
- docs: Add comprehensive project status and roadmap (@devatsecure)
- docs: Add comprehensive 6-phase pipeline verification report (@devatsecure)
- docs: Add state-of-the-art feature recommendations based on 2025 research (@devatsecure)
- feat: Add context-aware security analysis with false positive reduction (@devatsecure)
- refactor: Complete Argus Security rebrand with 6-phase pipeline (@devatsecure)
- docs: Clean CLAUDE.md for awesome-claude-code submission (@devatsecure)
- feat: Argus Security - Enterprise AI Security Platform (@devatsecure)
- feat: Enable Phase 4 Sandbox Validation with Docker SDK (@devatsecure)
- feat: Add simplified all-in-one Docker scanner with complete documentation (@devatsecure)
🐳 Docker Images
Multi-platform container images are available on GitHub Container Registry:
# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:1.0.0
docker pull ghcr.io/devatsecure/Argus-Security:1.0
docker pull ghcr.io/devatsecure/Argus-Security:1
docker pull ghcr.io/devatsecure/Argus-Security:latestSupported Platforms
linux/amd64linux/arm64
Quick Start
# Run security audit on current directory
docker run -v $(pwd):/workspace \
-e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
ghcr.io/devatsecure/Argus-Security:1.0.0 \
/workspace auditGitHub Actions Usage
- name: Run Argus Security Review
uses: devatsecure/argus-action@v1.0.0
with:
anthropic_api_key:
severity_threshold: high📦 Installation
Using Docker (Recommended)
docker pull ghcr.io/devatsecure/Argus-Security:1.0.0Using pip
pip install git+https://github.com/devatsecure/Argus-Security.git@v1.0.0Using GitHub Actions
See README.md for complete setup instructions.
🔒 Security
This release includes:
- ✅ Signed container images (Sigstore/cosign)
- ✅ Software Bill of Materials (SBOM)
- ✅ Provenance attestations
- ✅ Vulnerability scanning (Trivy)
Verify Container Signature
cosign verify \
--certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
--certificate-oidc-issuer=https://token.actions.githubusercontent.com \
ghcr.io/devatsecure/Argus-Security:1.0.0📚 Documentation
🐛 Bug Reports
Found a bug? Please open an issue.
Full Changelog: ...v1.0.0