-
Notifications
You must be signed in to change notification settings - Fork 0
fix(plugin): correct repository URLs in plugin.json #30
Conversation
- Archive secrets-filtering spec to completed/ - Add RETROSPECTIVE.md with completion metrics and learnings - Update CLAUDE.md with completed project entry - Update README.md and CHANGELOG.md with final status
The homepage and repository URLs incorrectly pointed to git-notes-memory-manager instead of git-notes-memory. This was preventing the marketplace from finding the correct version. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request overview
This PR aims to fix incorrect repository URLs in .claude-plugin/plugin.json that pointed to git-notes-memory-manager instead of git-notes-memory. The PR also includes a version bump to 0.12.0.
Key Changes
- Corrected repository URLs in plugin.json from
git-notes-memory-managertogit-notes-memory - Version bump from 0.11.0 to 0.12.0 across multiple files
- Addition of extensive secrets filtering documentation (appears unrelated to the stated PR purpose)
Reviewed changes
Copilot reviewed 8 out of 13 changed files in this pull request and generated 3 comments.
Show a summary per file
| File | Description |
|---|---|
.claude-plugin/plugin.json |
Fixed repository and homepage URLs to use correct repository name; updated version to 0.12.0 |
.claude-plugin/marketplace.json |
Updated version to 0.12.0 (but URLs not fixed) |
src/git_notes_memory/__init__.py |
Version bump to 0.12.0 |
pyproject.toml |
Version bump to 0.12.0 |
CLAUDE.md |
Added documentation for secrets filtering spec (unrelated to URL fix) |
docs/spec/completed/2025-12-25-secrets-filtering/* |
Added 8 new documentation files totaling 2000+ lines for secrets filtering feature (unrelated to URL fix) |
| "name": "memory-capture", | ||
| "description": "Git-backed memory system for Claude Code. Captures decisions, learnings, and context as git notes with semantic search and automatic recall.", | ||
| "version": "0.11.0", | ||
| "version": "0.12.0", |
Copilot
AI
Dec 26, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The version was updated here, but the repository and homepage URLs on lines 18 and 22 (not shown in this diff but present in the file) still reference git-notes-memory-manager instead of git-notes-memory. These should also be updated to be consistent with the changes in plugin.json.
| --- | ||
| document_type: retrospective | ||
| project_id: SPEC-2025-12-25-001 | ||
| completed: 2025-12-25 | ||
| outcome: success | ||
| --- | ||
|
|
||
| # Secrets Filtering and Sensitive Data Protection - Project Retrospective | ||
|
|
||
| ## Completion Summary | ||
|
|
||
| | Metric | Planned | Actual | Variance | | ||
| |--------|---------|--------|----------| | ||
| | Duration | 1-2 days | 1 day | On schedule | | ||
| | Effort | 8-16 hours | ~12 hours | As planned | | ||
| | Scope | 32 tasks (4 phases) | 32 tasks delivered | 0% variance | | ||
| | Test Coverage | 80%+ target | 87%+ achieved | +7% above target | | ||
|
|
||
| ## What Went Well | ||
|
|
||
| - **Comprehensive Security Coverage**: Successfully implemented detect-secrets integration + custom PII detection covering SSN, credit cards (with Luhn validation), and phone numbers | ||
| - **Flexible Filtering Strategies**: Four strategies (REDACT, MASK, BLOCK, WARN) provide appropriate responses for different use cases and compliance requirements | ||
| - **Production-Ready Audit Trail**: SOC2/GDPR-compliant audit logging with rotation and retention policies | ||
| - **Graceful Degradation**: All filtering failures properly handled - no capture operations blocked by filtering errors | ||
| - **Test Quality**: 87%+ coverage with comprehensive integration tests, performance benchmarks (<10ms overhead), and edge case validation | ||
| - **Command Integration**: Four new slash commands (/memory:scan-secrets, /memory:secrets-allowlist, /memory:test-secret, /memory:audit-log) provide full operational visibility | ||
|
|
||
| ## What Could Be Improved | ||
|
|
||
| - **Documentation**: While technical docs are complete, user-facing documentation for allowlist management could be expanded with more examples | ||
| - **Performance Optimization**: Current <10ms overhead is acceptable but could be further optimized with caching strategies for repeated content | ||
| - **Allowlist UX**: The hash-based allowlist works but could benefit from a more user-friendly review workflow | ||
|
|
||
| ## Scope Changes | ||
|
|
||
| ### Added | ||
| - **Performance benchmarking**: Added explicit performance tests to validate <10ms overhead requirement | ||
| - **Code review integration**: Deep-clean code review revealed and fixed several edge cases not in original plan | ||
|
|
||
| ### Removed | ||
| None - all planned features delivered | ||
|
|
||
| ### Modified | ||
| - **Allowlist storage**: Changed from simple list to hash-based deduplication for better performance with large allowlists | ||
|
|
||
| ## Key Learnings | ||
|
|
||
| ### Technical Learnings | ||
| - **detect-secrets integration**: The library's plugin architecture required careful wrapping to extract structured detection results | ||
| - **Luhn algorithm**: Implementing credit card validation with Luhn checksum reduced false positives significantly | ||
| - **Thread safety**: File-based allowlist required careful locking coordination with existing capture service locks | ||
| - **Audit logging**: JSON Lines format with rotation provides excellent balance between queryability and performance | ||
|
|
||
| ### Process Learnings | ||
| - **Code review value**: Running `/cr` + `/cr-fx` after implementation caught 15+ issues that would have been missed | ||
| - **Progressive implementation**: Building foundation → detection → filtering → audit in phases made testing much cleaner | ||
| - **Test-driven development**: Writing tests alongside implementation (not after) caught integration issues early | ||
|
|
||
| ### Planning Accuracy | ||
| - **Scope estimation**: Original 4-phase, 32-task breakdown was accurate - no major surprises | ||
| - **Effort estimation**: 8-16 hour range captured actual ~12 hours well | ||
| - **Dependency management**: detect-secrets was only new dependency; no surprises in integration complexity | ||
|
|
||
| ## Recommendations for Future Projects | ||
|
|
||
| 1. **Always run code review**: The `/cr` + `/cr-fx` workflow should be standard for all feature work | ||
| 2. **Performance tests upfront**: Adding performance benchmarks early prevents "fast enough?" debates later | ||
| 3. **Compliance from start**: Building audit logging from the beginning (vs retrofitting) saved significant refactoring | ||
| 4. **Progressive disclosure**: The 4-phase approach (foundation → detect → filter → audit) worked extremely well for this complexity level | ||
|
|
||
| ## Final Notes | ||
|
|
||
| This project demonstrates the value of structured planning with `/claude-spec:plan` followed by tracked implementation with `/claude-spec:implement`. The PROGRESS.md checkpoint system kept implementation organized across multiple sessions, and the code review integration caught issues before they reached production. | ||
|
|
||
| The secrets filtering subsystem is now production-ready and provides a solid foundation for future LLM-powered memory analysis features (Issue #11) where preventing prompt injection via captured secrets is critical. | ||
|
|
||
| **Merged**: PR merged to main on 2025-12-25 | ||
| **Test Status**: All 1949 tests passing (including 524 new security tests) | ||
| **Coverage**: 87%+ on security module (above 80% project threshold) |
Copilot
AI
Dec 26, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This PR adds extensive documentation for a secrets filtering feature that is unrelated to fixing repository URLs. The PR description mentions fixing incorrect repository URLs, but this PR includes 8 new documentation files totaling over 2000 lines for a secrets filtering feature. These changes appear to be unrelated to the stated PR purpose and should likely be in a separate commit or PR. This makes the PR difficult to review and mixes unrelated changes.
| - `docs/spec/completed/2025-12-25-secrets-filtering/` - Secrets Filtering and Sensitive Data Protection | ||
| - Completed: 2025-12-25 | ||
| - Outcome: success | ||
| - GitHub Issue: [#12](https://github.com/zircote/git-notes-memory/issues/12) | ||
| - Features: detect-secrets integration, custom PII detection (SSN, credit cards with Luhn, phones), 4 filtering strategies (REDACT/MASK/BLOCK/WARN), SOC2/GDPR audit logging | ||
| - Deliverables: security/ module (7 components), 4 slash commands, 524 tests with 87%+ coverage | ||
| - Key docs: REQUIREMENTS.md, ARCHITECTURE.md, IMPLEMENTATION_PLAN.md, DECISIONS.md, RETROSPECTIVE.md | ||
|
|
Copilot
AI
Dec 26, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These documentation additions about secrets filtering are unrelated to fixing repository URLs (the stated purpose of this PR) and should be in a separate commit or PR.
Summary
.claude-plugin/plugin.jsongit-notes-memory-managerinstead ofgit-notes-memoryChanges
homepage:git-notes-memory-manager→git-notes-memoryrepository:git-notes-memory-manager→git-notes-memoryTest plan
🤖 Generated with Claude Code