Pipelock Agent Security Scan
Version updated for https://github.com/luckyPipewrench/pipelock to version v2.0.0.
- This action is used across all versions by 0 repositories.
Action Type
This is a Composite action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary
Pipelock is an open-source security tool designed to protect AI agents by acting as an agent firewall and local runtime. It provides network traffic scanning, process containment, and enforcement of tool usage policies to prevent data leaks, unauthorized access, and malicious activity. By monitoring API keys, HTTP requests, and runtime behavior, Pipelock automates security measures, ensuring safe operation of AI agents like OpenAI SDK, Google ADK, and others.
Release notes
Changelog
- 67e2ed3ed60781532d8a438255f13cfe73e270aa ci: bump the ci-actions group with 4 updates (#287)
- c609b0b7cb6a200c20480522fdc10757f6427b51 deps: bump modernc.org/sqlite from 1.46.1 to 1.47.0 (#282)
- e87d8c2f1652fe8c20f04829eead6078b2004dfc feat: JetBrains/Junie MCP proxy integration (#260)
- b7145d22323a1da95b941cb8ee96f1a924cb6674 feat: adaptive enforcement exempt_domains for DLP scoring (#268)
- d8f1ef464822f4ee82594ad3a123536c4796dd9c feat: add –sandbox and –workspace flags to jetbrains install (#269)
- 33330fb93d8f6318eb98730081f442640011d7e0 feat: add redirect policy action for MCP tool call routing (#271)
- 65b936bbd1611196d94bd6943670394c47c8b6b5 feat: built-in attack simulation command (#277)
- f98bf702c5ac160f3402ed9211a1f4f7d145b0e2 feat: config security scoring and tool policy overpermission audit (#273)
- d735d3e613ef33d00f8a01309aa8171709a76c75 feat: full-schema tool poisoning + state/control response patterns (#270)
- f5a1fa6b420b568b5ea8cbaec41519f2657dac11 feat: generic HTTP reverse proxy with body scanning (#278)
- 62094cb0781bbcc22366f907ba16d9e17e728cb6 feat: macOS sandbox via sandbox-exec (seatbelt) (#275)
- 662486263f9fc48f968db27162a4b6e09b4ec875 feat: per-agent sandbox profiles, strict mode, diagnostics, redirect handler (#272)
- cfec5f86720e24f1ee8d37eb6ad652a7efe5d868 feat: sandbox –best-effort for container environments (#289)
- ce39f127716c5b62532524bf3c2afcb019751ff7 feat: unprivileged process sandbox (Landlock + seccomp + netns) (#267)
- 2332fb139645c26d404ce3d5b9da8ce17278b368 fix: harden reverse proxy scanning and kill switch preemption (#281)