Paraxial.io Ruby Agent Changelog
The Paraxial.io Ruby Agent is hosted on RubyGems - https://rubygems.org/gems/paraxial
1.4.4
- If
.paraxial-rubocop.yml
does not exist when runningparaxial scan
, it will now automatically be created and configured to allow Rubocop to scan erb files.
1.4.3
- Improve cross site request forgery (CSRF) detection in Rubocop.
1.4.2
- Better error handling when user on free tier is rate limited from Code Scans.
1.4.1
- Add the
config.disable_http_tick = true
option to disable HTTP requests when bot defense is not in use.
1.4.0
- Fixed a bug where
Paraxial.block_cloud_ip
would block an IP on the allow list. - Now an IP on the allow list will always be able to make a connection. For example, you have a VPN hosted in AWS and always want to allow traffic from it.
1.3.1
- Improve runtime checks to prevent the agent from starting during rails commands.
1.3.0
- Add the
Paraxial::PHPAttackMiddleware
, a pre-defined way to ban malicious clients requesting.php
routes.
1.2.0
- Add the
.paraxial.yml
file. Users can defineignore-gems:
to exclude gems from vulnerability scannings.
1.1.0
- Configure Paraxial.io RuboCop settings with
.paraxial-rubocop.yml
instead of the old.rubocop.yml
1.0.2
- Fix bug in SQL cop for code scans
1.0.1
- Add
--debug-rubocop
flag forparaxial scan
, runs rubocop in debug mode