Skip to content

Releases: getaxonflow/axonflow-cursor-plugin

v0.5.2

22 Apr 13:32
773c9cf

Choose a tag to compare

Deprecated

  • DO_NOT_TRACK=1 as an AxonFlow telemetry opt-out — scheduled for removal after 2026-05-05 in the next major release. Use AXONFLOW_TELEMETRY=off instead. The plugin's telemetry-ping.sh emits a one-time stderr warning when DO_NOT_TRACK=1 is the active control and AXONFLOW_TELEMETRY=off is not also set.

v0.5.1

19 Apr 11:33
1b2724a

Choose a tag to compare

[0.5.1] - 2026-04-19

Added

  • Smoke E2E scenario at tests/e2e/smoke-block-context.sh — runs pre-tool-check.sh against a reachable AxonFlow stack and asserts the hook exits 2 with AxonFlow policy violation + Plugin Batch 1 richer-context markers on stderr. Exits 0 (SKIP:) when no stack is reachable.
  • .github/workflows/smoke-e2e.ymlworkflow_dispatch triggered job running the smoke scenario. Requires an operator-supplied endpoint (GitHub-hosted runners have no local stack), so not wired to PR events — PR smoke gating needs a self-hosted runner with a live stack.

Full install-and-use matrix lives in axonflow-enterprise/tests/e2e/plugin-batch-1/cursor-install/.

Compatibility

Companion to platform v7.1.1. No code changes vs v0.5.0 — the patch bump only adds the smoke E2E. Users on v0.5.0 against platform v7.1.1 still get the full richer-context block shape automatically.

v0.5.0 — Plugin Batch 1

18 Apr 12:20
d8d234d

Choose a tag to compare

[0.5.0] - 2026-04-18

Added

  • Richer block reason surfaced to Cursor on policy blocks. When the
    AxonFlow platform is v7.1.0+, the stderr message accompanying the
    exit 2 block now includes [decision: <id>, risk: <level>, active override: <ov>] or a pointer to the explain_decision MCP tool so
    the user knows how to unblock themselves. Older platforms see the
    prior v0.4.0 message — fields are omitted when not returned.
  • Access to platform MCP tools explain_decision, create_override,
    delete_override, list_overrides — available via the agent's MCP
    server when connected to a v7.1.0+ platform. Cursor's MCP client can
    invoke them directly.

Compatibility

Companion to platform v7.1.0 and SDKs v5.4.0 / v6.4.0. Back-compatible.

v0.4.0

16 Apr 11:57
c4090fd

Choose a tag to compare

What's New

Telemetry

  • Anonymous telemetry ping on first hook invocation. Sends plugin version, OS/arch/bash version, and AxonFlow platform version
  • Stamp file guard at $HOME/.cache/axonflow/cursor-plugin-telemetry-sent prevents repeat pings
  • Opt out with DO_NOT_TRACK=1 or AXONFLOW_TELEMETRY=off

Skills Parity

  • 3 new governance skills: pii-scan, governance-status, policy-list — Cursor now has 6 skills matching the Codex plugin

Fixed

  • UTF-8 safe content truncation — character-level cut -c1-2000 instead of byte-level head -c 2000
  • Consistent curl error reportingpost-tool-audit.sh uses -sS matching pre-tool-check.sh
  • Removed unused PII_ALLOWED variable from shell write PII scanning
  • Improved shell write content extraction regex with better heredoc and single-quote handling

Changed

  • Hook timeout increased from 10s to 15s across all 4 hook types
  • CI workflow suppresses telemetry with DO_NOT_TRACK=1
  • SECURITY.md timestamp updated to April 2026

v0.3.1

09 Apr 23:52
003c5ba

Choose a tag to compare

Added

  • Decision-matrix regression tests for the v0.3.0 hook fail-open/fail-closed behavior. Mock-server cases for every JSON-RPC error branch.

v0.3.0 — Hook fail-open hardening

08 Apr 21:09
fdc8117

Choose a tag to compare

See CHANGELOG.md. Hook fail-open/fail-closed hardening (matches axonflow-enterprise v6.2.0 #1545 Direction 3).

v0.2.0

06 Apr 18:42
bc2a297

Choose a tag to compare

Initial public release.

Added

  • preToolUse hook: evaluates tool inputs against AxonFlow policies before execution. Blocks dangerous commands, reverse shells, SSRF, credential access, path traversal via exit code 2.
  • postToolUse hook: records tool execution in AxonFlow audit trail and scans output for PII/secrets.
  • beforeShellExecution hook: additional shell command enforcement layer.
  • afterFileEdit hook: audit trail for file modifications.
  • PII detection in file writes via check_output scan on shell redirect commands. Configurable via PII_ACTION env var: block, redact (default — denies and instructs agent to rewrite with redacted content), warn, log.
  • MCP server integration with 6 governance tools: check_policy, check_output, audit_tool_call, list_policies, get_policy_stats, search_audit_events.
  • 3 governance skills: check-governance, audit-search, policy-stats.
  • .mdc governance rules for always-on policy context.
  • Audit logging for blocked attempts.
  • Fail-open on network failure, fail-closed on auth/config errors.
  • Governed tools: Shell, Write, Edit, Read, Task, NotebookEdit, and MCP tools (mcp__*).
  • AXONFLOW_TIMEOUT_SECONDS environment variable to tune Cursor hook HTTP timeouts for remote or high-latency AxonFlow deployments.
  • Plugin logo for marketplace and directory listings.
  • SECURITY.md with plugin-specific vulnerability reporting guidance.
  • Regression tests with mock MCP server (tests/test-hooks.sh, 20 tests).
  • CI workflow: shellcheck, syntax check, regression tests, plugin structure validation.
  • E2E testing playbook with 17 verified tests.

Configuration

  • AXONFLOW_ENDPOINT — AxonFlow Agent URL (default: http://localhost:8080).
  • AXONFLOW_AUTH — Base64-encoded clientId:clientSecret for Basic auth.
  • AXONFLOW_TIMEOUT_SECONDS — optional override for hook HTTP timeouts.
  • PII_ACTION — PII enforcement mode: block, redact (default), warn, log.
  • Plugin installed at ~/.cursor/plugins/local/axonflow-cursor-plugin (copy, not symlink).
  • hooks.json requires "version": 1 for Cursor compatibility.