This repository is a security-hardened fork of Continue.dev. It is designed to provide an enterprise-grade AI coding assistant that operates in a strictly offline, Zero Trust model.
The Promise: No code, snippets, or prompts ever leave your environment. All analytics, telemetry, and remote API calls are physically blocked at the JVM level.
| Threat | Mitigation | Implementation |
|---|---|---|
| Data Exfiltration | Blocks all outbound socket creation. | NetworkBlocker |
| Proxy Tunneling | Detects and fails on proxy env vars/flags. | SecurityBootstrapValidator |
| DNS Leakage | Prohibits name resolution for external hosts. | NetworkBlocker |
| Telemetry Pathways | Physically blocks all analytics endpoints. | NetworkBlocker |
| Developer Override | Fail-fast if security perimeter cannot be established. | FailFastStartupGuard |
If the system detects a potential security breach (e.g., an intercepting proxy is present), the plugin follows a Fail-Fast strategy, invoking Runtime.getRuntime().halt(1) immediately, bypassing shutdown hooks.
The project follows Hexagonal Architecture principles to enforce a one-way trust boundary from the core logic to the infrastructure.
+-----------------------------------------------------------+
| INFRASTRUCTURE |
| +------------------+ +------------------+ |
| | Inbound Adapter | | Outbound Adapter | |
| | (IntelliJ / VS) | | (Local Model) | |
+---+--------|---------+-------------+--------^---------+---+
| |
+------------|--------------------------------|-------------+
| | APPLICATION | |
| +--------v----------+ +--------|---------+ |
| | UseCase | | Service | |
| +--------|----------+ +--------^---------+ |
+------------|--------------------------------|-------------+
| |
+------------|-------------+------------------|-------------+
| | | | |
| +--------v----------+ | +--------|---------+ |
| | Port | | | Policy | |
| | (Inbound) | | | (Network Block) | |
| +-------------------+ | +-----------------+ |
| | |
| DOMAIN |
+-----------------------------------------------------------+
See ARCHITECTURE.md for detailed layer responsibilities.
- Startup: The plugin initializes via a dedicated activity/entry point.
- Security Audit:
SecurityBootstrapValidatorscans for proxies and unauthorized JVM flags. - Lockdown:
NetworkBlockerinstalls a globalSecurityManagerto override all networking. - Validation:
FailFastStartupGuardverifies the perimeter; if breached, the process halts. - Orchestration: Only after lockdown is the Spring context and model orchestration loaded.
- Java: JDK 17+
- Node.js: v18+ (for VS Code packaging)
./gradlew buildAll- Build Core:
./gradlew build - Run Security Tests:
./gradlew verify - Package VS Code Plugin:
./gradlew vsCodePackage - Build IntelliJ Plugin:
./gradlew buildPlugin
📖 For detailed step-by-step build instructions, see BUILD.md
All security mitigations are validated via deterministic automated tests.
./gradlew verifyThis task executes the full verification suite, asserting that every network attempt results in a SecurityException.
We welcome contributions that respect our Zero Trust model.
- Syncing with Upstream: See CONTRIBUTING.md for workflows.
- Code of Conduct: Please adhere to our CODE_OF_CONDUCT.md during interactions.
- Reporting Issues: Use our Issue Template for clear bug reports.
- Pull Requests: Follow the Pull Request Template for submissions.
This project is a downstream fork. It preserves the core UI and logic of Continue.dev while injecting a proprietary security layer. We maintain compatibility by isolating enhancement to the infrastructure and bootstrap layers.