Skip to content

Commit b0af93c

Browse files
bb-connorclaude
andauthored
chore: bump version to 0.2.5, include hushd in homebrew, update README (#173)
- Bump all crate, npm, PyPI, and config versions from 0.2.4 to 0.2.5 - Fix homebrew formula: include hushd in release tarball and formula install - Release workflow now builds hushd alongside hush-cli in build-binaries job - Update README "What Clawdstrike Is" with Swarm C2 and Swarm Trace layers Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
1 parent a3f78c3 commit b0af93c

File tree

28 files changed

+95
-91
lines changed

28 files changed

+95
-91
lines changed

.github/workflows/release.yml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -626,8 +626,10 @@ jobs:
626626
with:
627627
targets: ${{ matrix.target }}
628628

629-
- name: Build release binary
630-
run: cargo build --release --target ${{ matrix.target }} -p hush-cli
629+
- name: Build release binaries
630+
run: |
631+
cargo build --release --target ${{ matrix.target }} -p hush-cli
632+
cargo build --release --target ${{ matrix.target }} -p hushd
631633
632634
- name: Rename binary (Unix)
633635
if: runner.os != 'Windows'
@@ -650,6 +652,7 @@ jobs:
650652
mkdir -p _archive
651653
cp target/${{ matrix.target }}/release/hush _archive/
652654
cp target/${{ matrix.target }}/release/clawdstrike _archive/
655+
cp target/${{ matrix.target }}/release/hushd _archive/
653656
tar -czf ${{ matrix.archive }}.tar.gz -C _archive .
654657
655658
- name: Upload release archive
@@ -906,10 +909,12 @@ jobs:
906909
def install
907910
bin.install "hush"
908911
bin.install "clawdstrike"
912+
bin.install "hushd"
909913
end
910914
911915
test do
912916
assert_match version.to_s, shell_output("#{bin}/hush --version")
917+
assert_match "hushd", shell_output("#{bin}/hushd --version")
913918
end
914919
end
915920
RUBY

Cargo.lock

Lines changed: 29 additions & 29 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Cargo.toml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ exclude = [
4343
]
4444

4545
[workspace.package]
46-
version = "0.2.4"
46+
version = "0.2.5"
4747
edition = "2021"
4848
license = "Apache-2.0"
4949
repository = "https://github.com/backbay-labs/clawdstrike"
@@ -152,17 +152,17 @@ md-5 = "0.10"
152152
jsonwebtoken = { version = "10", default-features = false, features = ["aws_lc_rs", "use_pem"] }
153153

154154
# Internal crates
155-
hush-core = { path = "crates/libs/hush-core", version = "0.2.4" }
156-
hush-proxy = { path = "crates/libs/hush-proxy", version = "0.2.4" }
157-
clawdstrike = { path = "crates/libs/clawdstrike", version = "0.2.4", default-features = false }
158-
hush-certification = { path = "crates/libs/hush-certification", version = "0.2.4" }
159-
spine = { package = "hush-spine", path = "crates/libs/spine", version = "0.2.4" }
160-
bridge-runtime = { path = "crates/libs/bridge-runtime", version = "0.2.4" }
161-
hunt-scan = { path = "crates/libs/hunt-scan", version = "0.2.4" }
162-
hunt-query = { path = "crates/libs/hunt-query", version = "0.2.4" }
163-
hunt-correlate = { path = "crates/libs/hunt-correlate", version = "0.2.4" }
164-
clawdstrike-ocsf = { path = "crates/libs/clawdstrike-ocsf", version = "0.2.4" }
165-
clawdstrike-policy-event = { path = "crates/libs/clawdstrike-policy-event", version = "0.2.4", default-features = false }
155+
hush-core = { path = "crates/libs/hush-core", version = "0.2.5" }
156+
hush-proxy = { path = "crates/libs/hush-proxy", version = "0.2.5" }
157+
clawdstrike = { path = "crates/libs/clawdstrike", version = "0.2.5", default-features = false }
158+
hush-certification = { path = "crates/libs/hush-certification", version = "0.2.5" }
159+
spine = { package = "hush-spine", path = "crates/libs/spine", version = "0.2.5" }
160+
bridge-runtime = { path = "crates/libs/bridge-runtime", version = "0.2.5" }
161+
hunt-scan = { path = "crates/libs/hunt-scan", version = "0.2.5" }
162+
hunt-query = { path = "crates/libs/hunt-query", version = "0.2.5" }
163+
hunt-correlate = { path = "crates/libs/hunt-correlate", version = "0.2.5" }
164+
clawdstrike-ocsf = { path = "crates/libs/clawdstrike-ocsf", version = "0.2.5" }
165+
clawdstrike-policy-event = { path = "crates/libs/clawdstrike-policy-event", version = "0.2.5", default-features = false }
166166

167167
[profile.release]
168168
lto = true

README.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,14 @@ flowchart LR
9292
H -.-> I[Control API + Control Console]
9393
```
9494

95+
Three layers, one system:
96+
97+
| Layer | What It Does |
98+
| ----- | ------------ |
99+
| **Guard Stack** | 13 composable guards at the tool boundary: path access, egress, secrets, shell commands, MCP tools, jailbreak detection, prompt injection, CUA controls, Spider-Sense threat screening. Every verdict is Ed25519-signed into a non-repudiable receipt. |
100+
| **Swarm C2** | An operational control plane for managing agent fleets in production. Durable, replayable fleet transport over NATS JetStream, policy flow coordination via Spine, enrollment and credential provisioning, posture commands with request/reply acknowledgements, and a Proofs API + Control Console for verification and SOC workflows. |
101+
| **Swarm Trace** | Prevention + hunting at the agent tool boundary. Hunt across signed receipts, kernel telemetry (Tetragon, auditd), and network flows (Hubble), build timelines, run natural-language and structured queries, correlate against detection rules, and ship OCSF-formatted findings straight into your SIEM. |
102+
95103
---
96104

97105
## Why This Matters

apps/agent/src-tauri/Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[package]
22
name = "clawdstrike-agent"
3-
version = "0.2.4"
3+
version = "0.2.5"
44
description = "Clawdstrike Agent - Security enforcement runtime for AI coding tools"
55
edition = "2021"
66
rust-version = "1.80"

apps/agent/src-tauri/tauri.conf.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"$schema": "https://schema.tauri.app/config/2",
33
"productName": "Clawdstrike Agent",
4-
"version": "0.2.4",
4+
"version": "0.2.5",
55
"identifier": "dev.clawdstrike.agent",
66
"build": {
77
"beforeDevCommand": "sh scripts/prepare-bundled-hushd.sh dev",

crates/libs/hush-wasm/package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "@clawdstrike/wasm",
3-
"version": "0.2.4",
3+
"version": "0.2.5",
44
"description": "WebAssembly bindings for clawdstrike cryptographic verification",
55
"main": "hush_wasm.js",
66
"types": "hush_wasm.d.ts",

0 commit comments

Comments
 (0)