Releases: getaxonflow/axonflow-cursor-plugin
Releases · getaxonflow/axonflow-cursor-plugin
v0.5.2
Deprecated
DO_NOT_TRACK=1as an AxonFlow telemetry opt-out — scheduled for removal after 2026-05-05 in the next major release. UseAXONFLOW_TELEMETRY=offinstead. The plugin'stelemetry-ping.shemits a one-time stderr warning whenDO_NOT_TRACK=1is the active control andAXONFLOW_TELEMETRY=offis not also set.
v0.5.1
[0.5.1] - 2026-04-19
Added
- Smoke E2E scenario at
tests/e2e/smoke-block-context.sh— runspre-tool-check.shagainst a reachable AxonFlow stack and asserts the hook exits 2 withAxonFlow policy violation+ Plugin Batch 1 richer-context markers on stderr. Exits 0 (SKIP:) when no stack is reachable. .github/workflows/smoke-e2e.yml—workflow_dispatchtriggered job running the smoke scenario. Requires an operator-supplied endpoint (GitHub-hosted runners have no local stack), so not wired to PR events — PR smoke gating needs a self-hosted runner with a live stack.
Full install-and-use matrix lives in axonflow-enterprise/tests/e2e/plugin-batch-1/cursor-install/.
Compatibility
Companion to platform v7.1.1. No code changes vs v0.5.0 — the patch bump only adds the smoke E2E. Users on v0.5.0 against platform v7.1.1 still get the full richer-context block shape automatically.
v0.5.0 — Plugin Batch 1
[0.5.0] - 2026-04-18
Added
- Richer block reason surfaced to Cursor on policy blocks. When the
AxonFlow platform is v7.1.0+, the stderr message accompanying the
exit 2block now includes[decision: <id>, risk: <level>, active override: <ov>]or a pointer to theexplain_decisionMCP tool so
the user knows how to unblock themselves. Older platforms see the
prior v0.4.0 message — fields are omitted when not returned. - Access to platform MCP tools
explain_decision,create_override,
delete_override,list_overrides— available via the agent's MCP
server when connected to a v7.1.0+ platform. Cursor's MCP client can
invoke them directly.
Compatibility
Companion to platform v7.1.0 and SDKs v5.4.0 / v6.4.0. Back-compatible.
v0.4.0
What's New
Telemetry
- Anonymous telemetry ping on first hook invocation. Sends plugin version, OS/arch/bash version, and AxonFlow platform version
- Stamp file guard at
$HOME/.cache/axonflow/cursor-plugin-telemetry-sentprevents repeat pings - Opt out with
DO_NOT_TRACK=1orAXONFLOW_TELEMETRY=off
Skills Parity
- 3 new governance skills:
pii-scan,governance-status,policy-list— Cursor now has 6 skills matching the Codex plugin
Fixed
- UTF-8 safe content truncation — character-level
cut -c1-2000instead of byte-levelhead -c 2000 - Consistent curl error reporting —
post-tool-audit.shuses-sSmatchingpre-tool-check.sh - Removed unused
PII_ALLOWEDvariable from shell write PII scanning - Improved shell write content extraction regex with better heredoc and single-quote handling
Changed
- Hook timeout increased from 10s to 15s across all 4 hook types
- CI workflow suppresses telemetry with
DO_NOT_TRACK=1 - SECURITY.md timestamp updated to April 2026
v0.3.1
Added
- Decision-matrix regression tests for the v0.3.0 hook fail-open/fail-closed behavior. Mock-server cases for every JSON-RPC error branch.
v0.3.0 — Hook fail-open hardening
See CHANGELOG.md. Hook fail-open/fail-closed hardening (matches axonflow-enterprise v6.2.0 #1545 Direction 3).
v0.2.0
Initial public release.
Added
preToolUsehook: evaluates tool inputs against AxonFlow policies before execution. Blocks dangerous commands, reverse shells, SSRF, credential access, path traversal via exit code 2.postToolUsehook: records tool execution in AxonFlow audit trail and scans output for PII/secrets.beforeShellExecutionhook: additional shell command enforcement layer.afterFileEdithook: audit trail for file modifications.- PII detection in file writes via
check_outputscan on shell redirect commands. Configurable viaPII_ACTIONenv var:block,redact(default — denies and instructs agent to rewrite with redacted content),warn,log. - MCP server integration with 6 governance tools:
check_policy,check_output,audit_tool_call,list_policies,get_policy_stats,search_audit_events. - 3 governance skills:
check-governance,audit-search,policy-stats. .mdcgovernance rules for always-on policy context.- Audit logging for blocked attempts.
- Fail-open on network failure, fail-closed on auth/config errors.
- Governed tools:
Shell,Write,Edit,Read,Task,NotebookEdit, and MCP tools (mcp__*). AXONFLOW_TIMEOUT_SECONDSenvironment variable to tune Cursor hook HTTP timeouts for remote or high-latency AxonFlow deployments.- Plugin logo for marketplace and directory listings.
SECURITY.mdwith plugin-specific vulnerability reporting guidance.- Regression tests with mock MCP server (
tests/test-hooks.sh, 20 tests). - CI workflow: shellcheck, syntax check, regression tests, plugin structure validation.
- E2E testing playbook with 17 verified tests.
Configuration
AXONFLOW_ENDPOINT— AxonFlow Agent URL (default:http://localhost:8080).AXONFLOW_AUTH— Base64-encodedclientId:clientSecretfor Basic auth.AXONFLOW_TIMEOUT_SECONDS— optional override for hook HTTP timeouts.PII_ACTION— PII enforcement mode:block,redact(default),warn,log.- Plugin installed at
~/.cursor/plugins/local/axonflow-cursor-plugin(copy, not symlink). hooks.jsonrequires"version": 1for Cursor compatibility.