Skip to content

VERSION 3.1.0#58

Merged
Anof-cyber merged 77 commits intomasterfrom
dev
Jan 23, 2026
Merged

VERSION 3.1.0#58
Anof-cyber merged 77 commits intomasterfrom
dev

Conversation

@Anof-cyber
Copy link
Member

Pull Request

⚠️ IMPORTANT - READ BEFORE SUBMITTING

Required Pre-Submission Checklist

  • I have read the CONTRIBUTING.md file
  • I have created a GitHub issue for this change and linked it below
  • I have forked the dev branch (NOT master)
  • I understand that the master branch is ONLY updated when a new release is created
  • I understand that pull requests to master will be REJECTED

⛔ Critical Information

DO NOT submit a pull request directly to the master branch. The master branch is only updated when a new release is created. No direct commits or merges are accepted to master - neither from the InterceptSuite team nor from contributors.

All changes MUST be submitted to the dev branch, which contains the latest code and commits.

You MUST create a GitHub issue first before submitting a pull request. This allows the InterceptSuite team to:

  • Verify if the bug is already fixed in the development branch
  • Confirm if a new feature is accepted and approved
  • Avoid duplicate work

Pull requests without an associated issue will be rejected.


Pull Request Details

Type of Change

  • Bug Fix
  • New Feature
  • Code Improvement/Refactoring
  • Documentation Update
  • Other (please describe):

Related GitHub Issue

Issue Link:

Platform(s) Affected

  • Windows
  • macOS
  • Linux
  • Cross-platform/All

macOS Application Changes

Does this pull request include changes to the macOS application?

  • Yes
  • No

If YES, you MUST answer the following:

macOS Code Signing & Verification

  • I have signed the macOS app with a valid Apple Developer account
  • I have run the signed application on macOS to verify my changes work as expected
  • I confirm the application launches and functions correctly with my changes

⚠️ Important: If you cannot sign the macOS app to verify your code changes work, please DO NOT submit this pull request. Instead, use the GitHub issue you created to let the InterceptSuite team fix the bug or add the feature. You will need to wait for the next release.


Description of Changes

What does this pull request do?

How has this been tested?

  • Test environment (OS, version, etc.):
  • Test steps:
  • Test results:

Compilation & Dependencies

  • I have reviewed the CONTRIBUTING.md file for compilation instructions
  • I have verified all required libraries and packages are documented
  • My changes compile without errors
  • My changes do not introduce new dependencies (or I have documented them below)

New dependencies (if any):


Screenshots/Logs (if applicable)


Additional Context


Final Checklist

  • My code follows the project's coding style
  • I have commented my code, particularly in hard-to-understand areas
  • I have updated documentation as needed
  • My changes do not generate new warnings or errors
  • I have tested my changes on the target platform(s)
  • I have verified this change is based on the latest dev branch
  • I understand that pull requests without an associated GitHub issue will be rejected

Anof-cyber and others added 30 commits December 10, 2025 20:21
- Added check for active rules (only process packet if at least 1 active rule)
-  Removed PID check duplication code on rules and logging
- Added no proessing with no logging - CLI APP
- Log Only TCP SYN Connections
- Added PID Caching
- Added multi Threads
- Improved Packet Processing
- Optimized packet lookup from O(n) to O(1)
- GUI no longer handle the windivert drivers
- GUI pass C Stop method to stop all drivers and network threads
- ProxyBridge now validate the application already running
- Fixed Driver load unload issues from GUI
- GUI save local config real time instead of on exit
- GUI now handle close and clean up on force stop from windows
- GUI operate more smoothly
added EBPF
added demo  CLI code
Fixed buffer and free use vuln
…o remove all garbage from memory, updated C connection track to remove all connection more efficiently
improved run time memory usage
reduced logging, removed unwanted logs, added more UI optimization
- added code optimization - removed unwanted code
- added compression in nsis installer
Comment on lines +9 to +53
runs-on: self-hosted

steps:
- name: Checkout code
uses: actions/checkout@v4

- name: Setup .NET
uses: actions/setup-dotnet@v4
with:
dotnet-version: '9.0.x'

- name: Verify WinDivert installation
run: |
if (Test-Path "C:\WinDivert-2.2.2-A") {
Write-Host "WinDivert found at C:\WinDivert-2.2.2-A"
} else {
Write-Error "WinDivert not found. Please install WinDivert 2.2.2-A at C:\WinDivert-2.2.2-A"
exit 1
}
shell: pwsh

- name: Build and sign project
run: .\Windows\compile.ps1
shell: pwsh

- name: List built files
run: |
Write-Host "`nBuild artifacts:"
Get-ChildItem Windows/output -Recurse | ForEach-Object {
$size = [math]::Round($_.Length/1MB, 2)
Write-Host " $($_.Name) - $size MB"
}
shell: pwsh

- name: Upload installer to release
uses: softprops/action-gh-release@v1
with:
files: Windows/output/ProxyBridge-Setup-*.exe

- name: Upload build artifacts
uses: actions/upload-artifact@v4
with:
name: ProxyBridge-Release-${{ github.event.release.tag_name }}
path: Windows/output/
retention-days: 90

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Copilot Autofix

AI about 2 months ago

To fix the problem, explicitly set a permissions: block so the GITHUB_TOKEN has only the scopes this workflow needs. The steps are: (1) add a top‑level permissions: block (or a job‑level one) and (2) restrict it to the least privileges required. In this workflow, actions/checkout and the build steps require read access to repository contents, and softprops/action-gh-release needs to write to the release assets; no other special scopes are evident.

The single best minimal change without altering functionality is to define permissions at the workflow root, applying to all jobs. Add, near the top of .github/workflows/release-windows.yml, a block:

permissions:
  contents: write

This ensures the job can upload assets to the release while avoiding overly broad default permissions. Concretely, insert this block after the on: section (after line 5 and before jobs: at line 7). No additional methods, imports, or definitions are needed because this is purely a workflow‑configuration change.

Suggested changeset 1
.github/workflows/release-windows.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/release-windows.yml b/.github/workflows/release-windows.yml
--- a/.github/workflows/release-windows.yml
+++ b/.github/workflows/release-windows.yml
@@ -4,6 +4,9 @@
   release:
     types: [created]
 
+permissions:
+  contents: write
+
 jobs:
   build-and-release:
     runs-on: self-hosted
EOF
@@ -4,6 +4,9 @@
release:
types: [created]

permissions:
contents: write

jobs:
build-and-release:
runs-on: self-hosted
Copilot is powered by AI and may make mistakes. Always verify output.
Unable to commit as this autofix suggestion is now outdated
@sonarqubecloud
Copy link

Quality Gate Failed Quality Gate failed

Failed conditions
7 Security Hotspots
E Reliability Rating on New Code (required ≥ A)

See analysis details on SonarQube Cloud

Catch issues before they fail your Quality Gate with our IDE extension SonarQube for IDE

@Anof-cyber Anof-cyber merged commit a4115db into master Jan 23, 2026
12 of 13 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant