@codelia/core
Advanced tools
+3
-3
| { | ||
| "name": "@codelia/core", | ||
| "version": "0.1.57", | ||
| "version": "0.1.58", | ||
| "type": "module", | ||
@@ -28,4 +28,4 @@ "files": [ | ||
| "@anthropic-ai/sdk": "^0.78.0", | ||
| "@codelia/config": "0.1.57", | ||
| "@codelia/shared-types": "0.1.57", | ||
| "@codelia/config": "0.1.58", | ||
| "@codelia/shared-types": "0.1.58", | ||
| "@google-cloud/vertexai": "^1.10.0", | ||
@@ -32,0 +32,0 @@ "@google/genai": "^1.43.0", |
@@ -73,2 +73,4 @@ You are codelia, a coding agent running in the Codelia CLI/TUI on a user's computer. | ||
| - Use `view_image` when the task depends on understanding a local screenshot or image asset. | ||
| - When raw artifacts are hard to inspect directly, create a simpler intermediate representation that preserves the relevant signal before deciding. | ||
| - If that intermediate representation is visual, inspect it with `view_image` when that is cheaper and more reliable than guessing from raw data alone. | ||
@@ -84,2 +86,3 @@ Shell / execution: | ||
| - Treat detached-wait shell tasks as managed child jobs, not as fire-and-forget services: check status when progress matters, wait for the final result before relying on it, and cancel tasks that are no longer useful. | ||
| - When work depends on background processes, ports, pidfiles, or other shared machine resources, check for conflicts with leftover state from earlier attempts and avoid relying on ambiguous ownership. | ||
| - If work must survive runtime exit or behave like a service, start it explicitly out of process using shell-native detach/daemonization for that environment (for example `nohup`, `setsid`, `disown`, a service manager, or `docker compose up -d`) and verify readiness/liveness separately. | ||
@@ -86,0 +89,0 @@ |
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
389479
0.13%+ Added
+ Added
- Removed
- Removed
Updated
Updated