Wizzo v0.44.1 Release Notes
Released Feb 11, 2026Public Beta
Highlights
- Hardened production API exposure controls with verified post-deploy endpoint gating and payload redaction for sensitive diagnostics and migration routes.
- Added security-focused production validation assertions so endpoint access-control regressions fail release validation before rollout sign-off.
Fixes
- Hardened owner-scoped APIs by enforcing session-bound ownership checks across achievements, streaks, priorities, wins, trial/task mutations, and related rebuild/batch endpoints.
- Locked down `/api/agentic/sessions` so sessions, confirmations, and retrieval are restricted to the authenticated owner instead of caller-supplied `ownerId`.
- Hardened `/api/conversations` and `/api/conversations/[id]` by removing non-production dev-owner fallback auth and preserving proper 401/404 propagation on route errors.
- Removed non-production owner fallback from `/api/chat`, keeping only explicit `E2E_BYPASS` behavior for test environments.
- Secured `/api/goals/adjustments` with authenticated owner enforcement for both reads and writes.
- Required migration secret validation for both migration execution and migration status endpoints (`/api/migrate`) across environments.
- Reduced diagnostics exposure by limiting full health/monitoring details to internal token-authenticated probes.
- Fixed `/api/migrate` error handling to preserve intended auth failures (`401`/`403`) instead of swallowing route errors into `500` responses.
- Added pnpm overrides for `lodash` and `lodash-es` `4.17.23`, updated lockfile, and removed the remaining `pnpm audit` findings.
- Removed stale API backup/fixed route artifacts from `apps/web/src/app/api/**` to reduce accidental exposure and source drift.
- Added `/api/conversations/[id]` API tests for unauthorized, not-found, ownership mismatch, and successful delete flows.
- Added focused route tests for `/api/health`, `/api/test-monitoring`, and `/api/migrate`, and extended production validation to assert public payload redaction + access control on sensitive endpoints.
- Added a CI migration-prefix guard (`guard:migrations`) to block new duplicate Drizzle migration prefixes beyond the current legacy baseline.
- Tightened GitHub bug intake by disabling blank issues and requiring reproducible build/version, payload, and telemetry details in the bug report template.
Known issues
- _None yet_