Enterprise Secure Configuration
Security-focused setup with strict validation, no AI dependencies, and audit-friendly logging
When to Use
Essential for enterprise environments requiring:
- Zero external API dependencies for security compliance
- Strict commit message validation for audit trails
- Deterministic behavior without AI unpredictability
- Data sovereignty with no information leaving the network
- Compliance-ready logging for security audits
This configuration prioritizes security and predictability over convenience, making it ideal for regulated industries and security-conscious organizations.
Configuration Template
{
"$schema": "https://commitweave.dev/schema.json",
"ai": {
"enabled": false,
"allowFallback": false,
"logAttempts": true
},
"commit": {
"type": {
"required": true,
"strict": true,
"enum": [
"feat", "fix", "docs", "refactor",
"test", "build", "chore"
]
},
"scope": {
"required": true,
"strict": true,
"enum": [
"auth", "api", "ui", "db", "config",
"security", "audit", "compliance"
]
},
"emoji": {
"enabled": false,
"allowed": false
},
"format": {
"maxLength": 50,
"minLength": 20,
"case": "lowercase",
"wrapBody": 50,
"enforceBlankLine": true,
"noSpecialChars": true
},
"breaking": {
"required": true,
"format": "BREAKING CHANGE:",
"requireApproval": true
}
},
"git": {
"signoff": true,
"gpgSign": true,
"requireCleanIndex": true,
"hooks": {
"skipVerify": false,
"enforceAll": true,
"validateMessage": true,
"requireTests": true
}
},
"ui": {
"interactive": true,
"fancyUI": false,
"asciiArt": false,
"animations": false,
"colors": false,
"emoji": false,
"editor": "${EDITOR:-vi}",
"prompts": {
"confirmCommit": true,
"showPreview": true,
"allowEdit": false,
"requireDescription": true,
"requireJustification": true
}
},
"validation": {
"enabled": true,
"strict": true,
"enforceAll": true,
"rules": {
"typeRequired": true,
"scopeRequired": true,
"maxLength": 50,
"minLength": 20,
"noEmoji": true,
"noSpecialChars": true,
"conventionalFormat": true,
"requireBody": true,
"requireFooter": false,
"breakingChangeFormat": true,
"noSecrets": true,
"auditCompliant": true
}
},
"security": {
"stripSecrets": true,
"logCommits": true,
"requireSignature": true,
"validateAuthor": true,
"auditTrail": true,
"secretPatterns": [
"password", "token", "key", "secret",
"credential", "api_key", "private"
]
},
"logging": {
"enabled": true,
"level": "info",
"auditLog": "/var/log/commitweave/audit.log",
"retentionDays": 365,
"includeMetadata": true
}
}Security Features
Secret Detection and Stripping
CommitWeave automatically scans for and removes sensitive information:
- API Keys:
OPENAI_API_KEY,SECRET_TOKEN - Passwords:
password=,pwd: - Private Keys:
-----BEGIN PRIVATE KEY----- - Database URLs: Connection strings with credentials
Audit Trail
All commit operations are logged with:
- User identification: Author name and email
- Timestamp: ISO 8601 format with timezone
- Operation details: Command used, validation results
- Security events: Secret detection, validation failures
Setup Instructions
- Save the configuration as
.commitweave.jsonin your project root - Configure GPG signing for commit verification:
git config --global user.signingkey YOUR_GPG_KEY_ID git config --global commit.gpgsign true - Set up audit logging directory:
sudo mkdir -p /var/log/commitweave sudo chown $USER:$USER /var/log/commitweave - Test security features:
commitweave doctor --security-check
Security Note: This configuration requires GPG signing and strict validation. Ensure all team members have proper GPG setup before deployment.
Enterprise Workflow
Secure Commit Process
# Interactive commit with security validation
commitweave commit --validate --secure
# Verify commit before push
commitweave validate --security --range HEAD~1..HEAD
# Export sanitized config for sharing
commitweave config --export --strip-secretsCompliance Verification
# Generate audit report
commitweave audit --range main..HEAD --format compliance
# Validate all commits meet security standards
commitweave validate --strict --security --range origin/main..HEAD
# Check for potential secrets in history
commitweave security --scan-history --depth 100Config Export for Teams
When sharing configuration across teams, use the built-in secret stripping:
# Export clean config without sensitive data
commitweave config --export --output team-config.json --strip-secrets
# Validate exported config
commitweave config --validate --file team-config.jsonThe exported config will have sensitive values replaced with placeholders:
{
"security": {
"auditLog": "${AUDIT_LOG_PATH}",
"secretPatterns": ["***REDACTED***"]
}
}Compliance Integration
CI/CD Pipeline Integration
# .github/workflows/security-validation.yml
name: Security Validation
on: [push, pull_request]
jobs:
validate:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
with:
fetch-depth: 0
- run: npm install -g commitweave
- run: commitweave validate --strict --security --audit --range ${{ github.event.before }}..${{ github.event.after }}
- run: commitweave security --scan-commits --range ${{ github.event.before }}..${{ github.event.after }}Integration with Security Tools
- SonarQube: Export audit logs in compatible format
- Splunk: Forward commit logs for security monitoring
- JIRA: Link commits to security tickets automatically
- Vault: Integration for secure secret management
Related Templates: Team Standard • Offline Local AI