Skip to content

Releases: devatsecure/Argus-Security

Release 6.0.0

04 Mar 06:29
ea79556

Choose a tag to compare

🚀 What's Changed

  • docs: Update README, CLAUDE.md, and CHANGELOG for v6.0.0 release (@claude)
  • feat: Add 7 continuous security testing modules (v3.0) (@claude)
  • docs: Add continuous security testing guide with gap analysis (@claude)
  • docs: Fix orchestrator roles and Docker commands in CLAUDE.md and rules (@devatsecure)
  • fix: Improve Falco installation reliability with version verification (@devatsecure)
  • fix: Downgrade .argus directory check to warning in Action E2E fast mode (@devatsecure)
  • perf: Auto-detect IaC frameworks to speed up Checkov scans (@devatsecure)
  • test: Add unit tests for config_loader, hybrid_analyzer, semgrep_scanner (@devatsecure)
  • fix: Auto-detect Docker socket path for macOS and Linux (@devatsecure)
  • fix: Suppress TruffleHog self-update stderr noise (@devatsecure)
  • feat: Enrich heuristic findings with title, description, CWE, and severity (@devatsecure)
  • fix: Improve Semgrep PATH resolution with python -m fallback (@devatsecure)
  • fix: Update Anthropic model fallback chain with latest model IDs (@devatsecure)
  • fix: Allow spaces in --disclosure-reporter CLI argument (@devatsecure)
  • fix: Update ZAP to v2.16.0 (v2.15.0 release removed from GitHub) (@devatsecure)
  • ci: Add Docker E2E workflow to build and smoke-test Dockerfile.complete (@devatsecure)

🐳 Docker Images

Multi-platform container images are available on GitHub Container Registry:

# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:6.0.0
docker pull ghcr.io/devatsecure/Argus-Security:6.0
docker pull ghcr.io/devatsecure/Argus-Security:6
docker pull ghcr.io/devatsecure/Argus-Security:latest

Supported Platforms

  • linux/amd64
  • linux/arm64

Quick Start

# Run security audit on current directory
docker run -v $(pwd):/workspace \
  -e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
  ghcr.io/devatsecure/Argus-Security:6.0.0 \
  /workspace audit

GitHub Actions Usage

- name: Run Argus Security Review
  uses: devatsecure/argus-action@v6.0.0
  with:
    anthropic_api_key: 
    severity_threshold: high

📦 Installation

Using Docker (Recommended)

docker pull ghcr.io/devatsecure/Argus-Security:6.0.0

Using pip

pip install git+https://github.com/devatsecure/Argus-Security.git@v6.0.0

Using GitHub Actions

See README.md for complete setup instructions.


🔒 Security

This release includes:

  • ✅ Signed container images (Sigstore/cosign)
  • ✅ Software Bill of Materials (SBOM)
  • ✅ Provenance attestations
  • ✅ Vulnerability scanning (Trivy)

Verify Container Signature

cosign verify \
  --certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
  ghcr.io/devatsecure/Argus-Security:6.0.0

📚 Documentation


🐛 Bug Reports

Found a bug? Please open an issue.

Full Changelog: v5.0.0...v6.0.0

Release 5.0.0

16 Feb 11:34

Choose a tag to compare

🚀 What's Changed

  • docs: Update CHANGELOG with all recent commits, release as v5.0.0 (@devatsecure)
  • ci: Add GitHub Action E2E test workflow for fast and full modes (@devatsecure)
  • security: Add SHA256 integrity verification to all binary downloads (@devatsecure)
  • feat: Add pytest-xdist for parallel test execution (@devatsecure)
  • feat: Wire ZAP and Falco into Dockerfile.complete and pipeline (@devatsecure)
  • fix: Resolve 3 flaky tests caused by thread races and subprocess mock (@devatsecure)
  • fix: Resolve MCP server thread race condition (@devatsecure)
  • feat: Wire DAST agents with guarded imports and 43 tests (@devatsecure)
  • security: Harden 6 modules from self-scan dogfooding (@devatsecure)
  • feat: Add mypy type annotations to core modules (@devatsecure)
  • fix: Replace 22 deprecated datetime.utcnow() calls with timezone-aware alternative (@devatsecure)
  • fix: Resolve 2 test failures + add conftest.py auto-mock for speed (@devatsecure)
  • test: Add 7 test files covering 241 tests for previously untested modules (@devatsecure)
  • docs: Refresh README (578→297 lines) and add CHANGELOG (@devatsecure)
  • ci: Add GitHub Actions test workflow with Python matrix (@devatsecure)
  • feat: Wire Temporal orchestrator into hybrid_analyzer pipeline (@devatsecure)
  • chore: Remove vestigial ZAP + OpenJDK from Dockerfile.complete (@devatsecure)
  • fix: Fix ZAP PHP echo regex to match echo without parentheses (@devatsecure)
  • fix: Fix 3 known bugs — noise_scorer AttributeError, reachability ZeroDivision, max_files mismatch (@devatsecure)
  • test: Add 11 test files covering 470+ tests for previously untested modules (@devatsecure)
  • feat: Add Gitleaks v8.18.4 binary to all Dockerfiles (@devatsecure)
  • feat: Add full 6-phase pipeline mode to GitHub Action (@devatsecure)
  • feat: Activate MCP server with config toggle in hybrid_analyzer (@devatsecure)
  • feat: Wire DAST orchestrator into hybrid_analyzer pipeline (@devatsecure)
  • fix: Resolve test failures from agent integration changes (@devatsecure)
  • fix: Resolve 38 ruff linting errors across codebase (@devatsecure)
  • fix: Update OPA policy hardening tests for new block_ids-based decision (@devatsecure)
  • test: Add coverage for phase_gate, threat_model_generator, remediation_engine (@devatsecure)
  • feat: Wire Gitleaks secret scanner into pipeline (@devatsecure)
  • fix: Remove auto_fixable bypass from OPA policy gate (@devatsecure)
  • audit: Full 6-phase security scan of chrome-devtools-mcp (@devatsecure)
  • chore: Auto-fix 1,690 ruff errors across codebase (@devatsecure)
  • test: Add test coverage for pipeline stages, scanner runners, config loader (@devatsecure)
  • fix: Downgrade Falco missing from error to warning with install guidance (@devatsecure)
  • chore: Fix all ruff errors in both orchestrators, align max_files default (@devatsecure)
  • fix: Extract .findings from CheckovScanResult in pipeline/stages.py (@devatsecure)
  • docs: next fixes design — bugs, ruff cleanup, infra, test coverage (@devatsecure)
  • docs+tests: audit Wave 3 — tests for new modules, architecture diagrams (@devatsecure)
  • fix: update test patch targets for enrichment pipeline extraction (@devatsecure)
  • refactor: audit Wave 2 — extract phase functions, shared enrichment, schema validation (@devatsecure)
  • fix: audit Wave 1 quick wins — bare excepts, dead code, env var sanitization (@devatsecure)
  • fix: Resolve 6 integration bugs in pipeline enrichment features (@devatsecure)
  • fix: Resolve Semgrep PATH issue, quality check for CVE findings, add claude-cli provider (@devatsecure)
  • fix: Address 4 Cursor Bugbot findings from PR #34 (@devatsecure)
  • fix: Patch 4 critical security issues — shell injection, config precedence, CLI toggles, CI gate (@devatsecure)
  • feat: Add DVWA-inspired scanner enhancements — backup detection, CSRF, session ID, Nuclei & ZAP (@devatsecure)
  • feat: Wire 6 missing features into Docker pipeline, fix config bugs, remove 28 dead modules (@devatsecure)
  • feat: Wire Phase 4 exploit validation, add scanner health tracking, quality filter, and DinD support (@devatsecure)

🐳 Docker Images

Multi-platform container images are available on GitHub Container Registry:

# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:5.0.0
docker pull ghcr.io/devatsecure/Argus-Security:5.0
docker pull ghcr.io/devatsecure/Argus-Security:5
docker pull ghcr.io/devatsecure/Argus-Security:latest

Supported Platforms

  • linux/amd64
  • linux/arm64

Quick Start

# Run security audit on current directory
docker run -v $(pwd):/workspace \
  -e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
  ghcr.io/devatsecure/Argus-Security:5.0.0 \
  /workspace audit

GitHub Actions Usage

- name: Run Argus Security Review
  uses: devatsecure/argus-action@v5.0.0
  with:
    anthropic_api_key: 
    severity_threshold: high

📦 Installation

Using Docker (Recommended)

docker pull ghcr.io/devatsecure/Argus-Security:5.0.0

Using pip

pip install git+https://github.com/devatsecure/Argus-Security.git@v5.0.0

Using GitHub Actions

See README.md for complete setup instructions.


🔒 Security

This release includes:

  • ✅ Signed container images (Sigstore/cosign)
  • ✅ Software Bill of Materials (SBOM)
  • ✅ Provenance attestations
  • ✅ Vulnerability scanning (Trivy)

Verify Container Signature

cosign verify \
  --certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
  ghcr.io/devatsecure/Argus-Security:5.0.0

📚 Documentation


🐛 Bug Reports

Found a bug? Please open an issue.

Full Changelog: v2.2.0...v5.0.0

Release 2.2.0

09 Feb 08:37

Choose a tag to compare

🚀 What's Changed

  • feat: P0/P1/P2 security hardening, decomposition, and feature additions (@devatsecure)

🐳 Docker Images

Multi-platform container images are available on GitHub Container Registry:

# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:2.2.0
docker pull ghcr.io/devatsecure/Argus-Security:2.2
docker pull ghcr.io/devatsecure/Argus-Security:2
docker pull ghcr.io/devatsecure/Argus-Security:latest

Supported Platforms

  • linux/amd64
  • linux/arm64

Quick Start

# Run security audit on current directory
docker run -v $(pwd):/workspace \
  -e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
  ghcr.io/devatsecure/Argus-Security:2.2.0 \
  /workspace audit

GitHub Actions Usage

- name: Run Argus Security Review
  uses: devatsecure/argus-action@v2.2.0
  with:
    anthropic_api_key: 
    severity_threshold: high

📦 Installation

Using Docker (Recommended)

docker pull ghcr.io/devatsecure/Argus-Security:2.2.0

Using pip

pip install git+https://github.com/devatsecure/Argus-Security.git@v2.2.0

Using GitHub Actions

See README.md for complete setup instructions.


🔒 Security

This release includes:

  • ✅ Signed container images (Sigstore/cosign)
  • ✅ Software Bill of Materials (SBOM)
  • ✅ Provenance attestations
  • ✅ Vulnerability scanning (Trivy)

Verify Container Signature

cosign verify \
  --certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
  ghcr.io/devatsecure/Argus-Security:2.2.0

📚 Documentation


🐛 Bug Reports

Found a bug? Please open an issue.

Full Changelog: v2.1.0...v2.2.0

Release 2.1.0

09 Feb 07:42

Choose a tag to compare

🚀 What's Changed

  • feat: Add Claude Code automations — 2 MCP servers, 4 skills, 4 hooks, 4 subagents (@devatsecure)
  • fix: Resolve 4 pipeline runtime issues for full phase execution (@devatsecure)
  • fix: Fix FuzzingEngine/RuntimeSecurityMonitor init args and cache fallback (@devatsecure)
  • feat: Enable all phases by default and wire TruffleHog scanner (@devatsecure)
  • fix: Resolve 161 test failures and 8 unnecessary skips (@devatsecure)
  • feat: Wire enrichment pipeline and scanner registry into orchestrators (@devatsecure)

🐳 Docker Images

Multi-platform container images are available on GitHub Container Registry:

# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:2.1.0
docker pull ghcr.io/devatsecure/Argus-Security:2.1
docker pull ghcr.io/devatsecure/Argus-Security:2
docker pull ghcr.io/devatsecure/Argus-Security:latest

Supported Platforms

  • linux/amd64
  • linux/arm64

Quick Start

# Run security audit on current directory
docker run -v $(pwd):/workspace \
  -e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
  ghcr.io/devatsecure/Argus-Security:2.1.0 \
  /workspace audit

GitHub Actions Usage

- name: Run Argus Security Review
  uses: devatsecure/argus-action@v2.1.0
  with:
    anthropic_api_key: 
    severity_threshold: high

📦 Installation

Using Docker (Recommended)

docker pull ghcr.io/devatsecure/Argus-Security:2.1.0

Using pip

pip install git+https://github.com/devatsecure/Argus-Security.git@v2.1.0

Using GitHub Actions

See README.md for complete setup instructions.


🔒 Security

This release includes:

  • ✅ Signed container images (Sigstore/cosign)
  • ✅ Software Bill of Materials (SBOM)
  • ✅ Provenance attestations
  • ✅ Vulnerability scanning (Trivy)

Verify Container Signature

cosign verify \
  --certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
  ghcr.io/devatsecure/Argus-Security:2.1.0

📚 Documentation


🐛 Bug Reports

Found a bug? Please open an issue.

Full Changelog: v2.0.0...v2.1.0

Release 2.0.0

08 Feb 11:04

Choose a tag to compare

🚀 What's Changed

  • fix: Address 5 bugs from Cursor Bugbot code review (#33) (@devatsecure)
  • docs: Clean up internal comments and section headers (@devatsecure)
  • feat: Add 15 advanced security modules (Shannon + Trivy feature ports) (@devatsecure)
  • fix: Reduce false positives by detecting safe coding patterns before flagging (@claude)
  • fix: Resolve 7 pipeline-breaking bugs found during full Docker scan (@devatsecure)
  • fix: Replace remaining || true with continue-on-error for mypy in tests.yml (@devatsecure)
  • refactor: Decompose god objects and harden security across pipeline (@devatsecure)
  • feat: Add Pipeline Stage Interface, Typed Schemas, and Config Profiles (@claude)
  • feat: Add responsible disclosure generator (Phase 6.5) (@devatsecure)
  • fix: Resolve dataclass attribute access errors and add missing CLI options (@devatsecure)
  • refactor: Add exceptions module and all exports to all modules (@devatsecure)
  • test: Update regression test results after import fixes (@devatsecure)
  • chore: Add local artifacts to .gitignore (@devatsecure)
  • refactor: Extract ReviewMetrics to separate module and update CLAUDE.md (@devatsecure)
  • refactor: Extract classes from run_ai_audit.py into separate modules (@devatsecure)
  • fix: Production readiness improvements and test fixes (@devatsecure)
  • fix: 6 critical accuracy improvements to Enhanced FP Detector (@devatsecure)
  • feat: Complete Enhanced False Positive Detector with 8 Architectural Improvements (@devatsecure)
  • fix: Correct Phase 4 sandbox validation status reporting (@devatsecure)
  • fix: Correct Semgrep field name mappings in hybrid_analyzer (@devatsecure)
  • docs: Clarify phase numbering convention (2.5-2.7 explained) (@devatsecure)
  • docs: Update README with complete pipeline (Phases 2.5-2.7), DAST, and Vulnerability Chaining (@devatsecure)

🐳 Docker Images

Multi-platform container images are available on GitHub Container Registry:

# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:2.0.0
docker pull ghcr.io/devatsecure/Argus-Security:2.0
docker pull ghcr.io/devatsecure/Argus-Security:2
docker pull ghcr.io/devatsecure/Argus-Security:latest

Supported Platforms

  • linux/amd64
  • linux/arm64

Quick Start

# Run security audit on current directory
docker run -v $(pwd):/workspace \
  -e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
  ghcr.io/devatsecure/Argus-Security:2.0.0 \
  /workspace audit

GitHub Actions Usage

- name: Run Argus Security Review
  uses: devatsecure/argus-action@v2.0.0
  with:
    anthropic_api_key: 
    severity_threshold: high

📦 Installation

Using Docker (Recommended)

docker pull ghcr.io/devatsecure/Argus-Security:2.0.0

Using pip

pip install git+https://github.com/devatsecure/Argus-Security.git@v2.0.0

Using GitHub Actions

See README.md for complete setup instructions.


🔒 Security

This release includes:

  • ✅ Signed container images (Sigstore/cosign)
  • ✅ Software Bill of Materials (SBOM)
  • ✅ Provenance attestations
  • ✅ Vulnerability scanning (Trivy)

Verify Container Signature

cosign verify \
  --certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
  ghcr.io/devatsecure/Argus-Security:2.0.0

📚 Documentation


🐛 Bug Reports

Found a bug? Please open an issue.

Full Changelog: v1.5.0...v2.0.0

v1.5.0: Phase 2.7 Deep Analysis Engine

29 Jan 08:06

Choose a tag to compare

Argus Security v1.5.0 - Phase 2.7 Deep Analysis Engine

🎉 Major New Feature: Phase 2.7 Deep Analysis

Adds AI-powered semantic security analysis to the Argus pipeline with four specialized modules:

  • Semantic Code Twin: Deep code understanding with intent vs behavior analysis
  • Proactive AI Scanner: Autonomous vulnerability reasoning (VulnHuntr-inspired)
  • Taint Analyzer: Cross-function data flow tracking (Pysa-inspired)
  • Zero-Day Hypothesizer: Novel vulnerability hypothesis generation

✅ Validation Results

Production-Ready Metrics

  • Precision: 100% (zero false positives)
  • Recall: 80% (4/5 real CVEs detected)
  • F1 Score: 0.889 (exceeds excellent target of 0.75)
  • Cost: $1.87 per scan (37% of $5 ceiling)
  • Time: 3 minutes (40% faster than target)

CVE Detection Coverage

  • ✅ SQL Injection: 100% (1/1 detected)
  • ✅ Path Traversal: 100% (1/1 detected)
  • ✅ SSRF: 100% (1/1 detected)
  • ⚠️ XSS: 50% (1/2 detected)

🚀 New Features

Progressive Rollout Modes

  • `off` - Default for backwards compatibility
  • `semantic-only` - Light analysis (~$1.50/50 files)
  • `conservative` - Recommended for PR checks (~$4.00/50 files)
  • `full` - Complete analysis (~$13.00/50 files)

Safety Controls

  • File Limit: 50 files (configurable)
  • Timeout: 300s with graceful abort
  • Cost Ceiling: $5.00 with 80% warning

Benchmark Support

Real-time cost and performance tracking with detailed per-phase metrics.

📦 Usage

CLI

```bash

Conservative mode (recommended)

python scripts/run_ai_audit.py . audit \
--deep-analysis-mode=conservative \
--benchmark

With safety controls

python scripts/run_ai_audit.py . audit \
--deep-analysis-mode=conservative \
--max-files-deep-analysis=50 \
--deep-analysis-cost-ceiling=5.0 \
--benchmark
```

GitHub Action

```yaml

  • uses: devatsecure/Argus-Security@v1.5.0
    with:
    anthropic-api-key: ${{ secrets.ANTHROPIC_API_KEY }}
    review-type: security
    deep-analysis-mode: conservative
    benchmark: true
    ```

🐳 Docker Usage

```bash

Pull the latest image with Phase 2.7

docker pull ghcr.io/devatsecure/Argus-Security:1.5.0

Run with Deep Analysis

docker run -v $(pwd):/workspace \
-e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
ghcr.io/devatsecure/Argus-Security:1.5.0 \
/workspace audit --deep-analysis-mode=conservative --benchmark
```

📚 Documentation

  • Deployment Guide: `docs/deep-analysis-migration.md`
  • Examples: `DEEP_ANALYSIS_EXAMPLES.md`
  • Validation Report: `PR27_FINAL_METRICS_FOR_MERGE.md`
  • Safety Controls: `DEEP_ANALYSIS_SAFETY_CONTROLS.md`

🔧 Breaking Changes

None. Phase 2.7 is opt-in with default mode `off`.

🐛 Bug Fixes

  • Fixed Phase 2.7 integration with argument parsing
  • Fixed CVE test data repository URLs and commit SHAs
  • Fixed boolean configuration handling
  • Fixed findings normalization and merging

📊 Deliverables

  • 18 new files (~7,000 lines of code)
  • 2,300+ lines of documentation
  • Complete test suite with CVE validation
  • 4-week rollout strategy

🙏 Credits

Developed with Claude Code (Anthropic)
Research based on IRIS, VulnHuntr, GPTScan, Pysa/Scalpel


🚀 What's Changed

  • feat: Add Phase 2.7 Deep Analysis Engine with production validation (@devatsecure)
  • feat: Complete Docker setup with ALL features (DAST + Vulnerability Chaining + Phase 2 fix) (@devatsecure)
  • feat: Add Vulnerability Chaining System with attack path discovery (@devatsecure)
  • feat: Add Phase 1 MVP Enhanced DAST Integration with Multi-Agent System (@devatsecure)
  • feat: Add enhanced false positive detection for OAuth2, file permissions, dev configs, and locking (@devatsecure)
  • feat: Implement IRIS-style LLM semantic vulnerability analysis (@devatsecure)

🐳 Docker Images

Multi-platform container images are available on GitHub Container Registry:

```bash

Pull the image

docker pull ghcr.io/devatsecure/Argus-Security:1.5.0
docker pull ghcr.io/devatsecure/Argus-Security:1.5
docker pull ghcr.io/devatsecure/Argus-Security:1
docker pull ghcr.io/devatsecure/Argus-Security:latest
```

Supported Platforms

  • `linux/amd64`
  • `linux/arm64`

Quick Start

```bash

Run security audit on current directory

docker run -v $(pwd):/workspace \
-e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
ghcr.io/devatsecure/Argus-Security:1.5.0 \
/workspace audit
```

GitHub Actions Usage

```yaml

  • name: Run Argus Security Review
    uses: devatsecure/argus-action@v1.5.0
    with:
    anthropic_api_key:
    severity_threshold: high
    ```

📦 Installation

Using Docker (Recommended)

```bash
docker pull ghcr.io/devatsecure/Argus-Security:1.5.0
```

Using pip

```bash
pip install git+https://github.com/devatsecure/Argus-Security.git@v1.5.0
```

Using GitHub Actions

See README.md for complete setup instructions.


🔒 Security

This release includes:

  • ✅ Signed container images (Sigstore/cosign)
  • ✅ Software Bill of Materials (SBOM)
  • ✅ Provenance attestations
  • ✅ Vulnerability scanning (Trivy)

Verify Container Signature

```bash
cosign verify \
--certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
--certificate-oidc-issuer=https://token.actions.githubusercontent.com \
ghcr.io/devatsecure/Argus-Security:1.5.0
```


📚 Documentation


🐛 Bug Reports

Found a bug? Please open an issue.

Full Changelog: v1.0.0...v1.5.0


🤖 Generated with Claude Code

Release 1.0.0

29 Jan 08:05

Choose a tag to compare

🚀 What's Changed

  • feat: Add Phase 2.7 Deep Analysis Engine with production validation (@devatsecure)
  • feat: Complete Docker setup with ALL features (DAST + Vulnerability Chaining + Phase 2 fix) (@devatsecure)
  • feat: Add Vulnerability Chaining System with attack path discovery (@devatsecure)
  • feat: Add Phase 1 MVP Enhanced DAST Integration with Multi-Agent System (@devatsecure)
  • feat: Add enhanced false positive detection for OAuth2, file permissions, dev configs, and locking (@devatsecure)
  • feat: Implement IRIS-style LLM semantic vulnerability analysis (@devatsecure)
  • feat: enhance Docker and shell scripts for complete 6-phase Argus scanning (@devatsecure)
  • fix: Resolve NoneType error in Checkov AI enrichment and update Ollama model name (@devatsecure)
  • feat: Add CODE_INJECTION and SSRF sandbox validation templates (@devatsecure)
  • docs: Add session summary for documentation finalization (@devatsecure)
  • docs: Highlight context-aware features and add comprehensive documentation index (@devatsecure)
  • docs: Add comprehensive project status and roadmap (@devatsecure)
  • docs: Add comprehensive 6-phase pipeline verification report (@devatsecure)
  • docs: Add state-of-the-art feature recommendations based on 2025 research (@devatsecure)
  • feat: Add context-aware security analysis with false positive reduction (@devatsecure)
  • refactor: Complete Argus Security rebrand with 6-phase pipeline (@devatsecure)
  • docs: Clean CLAUDE.md for awesome-claude-code submission (@devatsecure)
  • feat: Argus Security - Enterprise AI Security Platform (@devatsecure)
  • feat: Enable Phase 4 Sandbox Validation with Docker SDK (@devatsecure)
  • feat: Add simplified all-in-one Docker scanner with complete documentation (@devatsecure)

🐳 Docker Images

Multi-platform container images are available on GitHub Container Registry:

# Pull the image
docker pull ghcr.io/devatsecure/Argus-Security:1.0.0
docker pull ghcr.io/devatsecure/Argus-Security:1.0
docker pull ghcr.io/devatsecure/Argus-Security:1
docker pull ghcr.io/devatsecure/Argus-Security:latest

Supported Platforms

  • linux/amd64
  • linux/arm64

Quick Start

# Run security audit on current directory
docker run -v $(pwd):/workspace \
  -e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \
  ghcr.io/devatsecure/Argus-Security:1.0.0 \
  /workspace audit

GitHub Actions Usage

- name: Run Argus Security Review
  uses: devatsecure/argus-action@v1.0.0
  with:
    anthropic_api_key: 
    severity_threshold: high

📦 Installation

Using Docker (Recommended)

docker pull ghcr.io/devatsecure/Argus-Security:1.0.0

Using pip

pip install git+https://github.com/devatsecure/Argus-Security.git@v1.0.0

Using GitHub Actions

See README.md for complete setup instructions.


🔒 Security

This release includes:

  • ✅ Signed container images (Sigstore/cosign)
  • ✅ Software Bill of Materials (SBOM)
  • ✅ Provenance attestations
  • ✅ Vulnerability scanning (Trivy)

Verify Container Signature

cosign verify \
  --certificate-identity-regexp="https://github.com/devatsecure/Argus-Security" \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
  ghcr.io/devatsecure/Argus-Security:1.0.0

📚 Documentation


🐛 Bug Reports

Found a bug? Please open an issue.

Full Changelog: ...v1.0.0