You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix(classifiers): add PII NER allowlist and document metal feature for macOS (#2541)
Add configurable pii_ner_allowlist to ClassifiersConfig that prevents
tokens matching an allowlist entry (case-insensitive) from being redacted
by the piiranha NER model. Suppresses common false positives such as
"Zeph" being misclassified as [PII:CITY] by piiranha-v1.
Default allowlist entries: ["Zeph", "Rust", "OpenAI", "Ollama", "Claude"].
Configurable via [classifiers] pii_ner_allowlist in config.toml.
Set to [] to disable the allowlist entirely.
Also document that on macOS Apple Silicon, --features full,metal is
required for piiranha NER GPU acceleration. Without metal, the 1.1 GB
model times out after 30s on CPU and falls back to regex-only detection.
Closes#2537, closes#2538
Copy file name to clipboardExpand all lines: CHANGELOG.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,6 +17,9 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/).
17
17
18
18
### Fixed
19
19
20
+
- fix(classifiers): add configurable `pii_ner_allowlist` to `ClassifiersConfig` — tokens matching an allowlist entry (case-insensitive) are never redacted by the piiranha NER model, suppressing false positives such as "Zeph" → `[PII:CITY]`; default entries: `["Zeph", "Rust", "OpenAI", "Ollama", "Claude"]`; list is empty-able via config to disable the feature (closes #2537)
21
+
- fix(classifiers): document that macOS Apple Silicon requires `--features full,metal` for piiranha NER GPU acceleration; without `metal`, the 1.1 GB model exceeds the 30s timeout on CPU and falls back to regex-only PII detection (closes #2538)
22
+
20
23
- fix(tools): propagate `claim_source` from `ToolOutput` into the post-execution audit entry in `AdversarialPolicyGateExecutor`; `write_audit` now accepts an explicit `claim_source` parameter so the field is no longer hardcoded to `None` for successful executions (closes #2535)
21
24
- fix(tools): `extract_paths` now detects relative path tokens that contain `/` but do not start with `/` or `./` (e.g. `src/main.rs`, `.local/foo/bar`); URL schemes (`://`) and shell variable assignments (`KEY=value`) are excluded from matching (closes #2536)
0 commit comments