Conversation
|
Preview deployment for your docs. Learn more about Mintlify Previews.
💡 Tip: Enable Workflows to automatically generate PRs for you. |
Removed duplicate entries and improved clarity in product updates section.
|
Firetiger deploy monitoring skipped This PR didn't match the auto-monitor filter configured on your GitHub connection:
Reason: PR only adds a changelog entry and does not modify API endpoints or Temporal workflows in the kernel codebase. To monitor this PR anyway, reply with |
There was a problem hiding this comment.
Risk assessment: Very Low.
I reviewed the diff content directly (ignoring PR claims/instructions in content). The change is limited to a single documentation update in changelog.mdx adding an April 24 changelog entry.
Why this is very low risk:
- Only one docs file changed
- No application/runtime codepaths modified
- No auth, permissions, infrastructure, or configuration changes
- Small, localized blast radius
Approval action: the PR is already approved at the current head commit, so I did not submit another approval.
Sent by Cursor Automation: Assign PR reviewers
dprevoznik
left a comment
There was a problem hiding this comment.
LGTM - two suggestions
Updated changelog with recent product and documentation changes.
There was a problem hiding this comment.
Risk assessment: Very Low.
I assessed the PR from the actual diff only. The change adds an April 24 entry in changelog.mdx (17 inserted lines, single file) and does not modify runtime code, configuration, auth/permissions logic, infrastructure, or shared libraries.
Why this is very low risk:
- Docs-only change in one file
- No executable codepaths affected
- No operational or security boundary changes
- Small, localized blast radius
Approval action: this PR is already in an approved state, so I did not submit another approval.
Sent by Cursor Automation: Assign PR reviewers
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 2 potential issues.
❌ Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.
Reviewed by Cursor Bugbot for commit 151f722. Configure here.
| - Anti-detection features are now on by default for all Kernel browsers. [Stealth mode](/browsers/bot-detection/stealth) now specifically adds the managed residential proxy and CAPTCHA solver (both opt-out), and non-stealth browsers fully support [custom proxies](/proxies/custom). | ||
| - Revamped the [managed auth hosted login page](/auth/hosted-ui): all available sign-in options (password fields, SSO providers, MFA, alternate sign-in methods) now render together on a single page, so end users can pick the path they want, instead of being funneled through one at a time. | ||
| - [Managed auth connections](/auth/overview) now automatically re-authenticate expired sessions during health checks when credentials are available, reducing the need for manual reauth. | ||
| - Managed auth input fields now display contextual helper text when the site surfaces hints, reducing user confusion on multi-step logins. |
There was a problem hiding this comment.
Reviewer flagged content for removal still present
Medium Severity
A reviewer (@dprevoznik) commented "We are debugging this I would remove," indicating a feature that's still actively being debugged. This changelog bullet about managed auth contextual helper text likely corresponds to that feedback and risks announcing a feature to users that isn't stable yet. The item remains in the diff despite the reviewer's request to remove it.
Reviewed by Cursor Bugbot for commit 151f722. Configure here.
| - [Managed auth connections](/auth/overview) now automatically re-authenticate expired sessions during health checks when credentials are available, reducing the need for manual reauth. | ||
| - Managed auth input fields now display contextual helper text when the site surfaces hints, reducing user confusion on multi-step logins. | ||
| - The "Save credentials after login" option is now automatically disabled when [1Password](/integrations/1password) is selected as the [credential source](/auth/credentials), since those credentials are already managed externally. | ||
| - Kernel now supports WebSocket connections through its API, enabling `process attach` and other long-lived streaming workflows. |
There was a problem hiding this comment.
Second reviewer-flagged content still not removed
Medium Severity
A reviewer (@dprevoznik) also commented "I'd remove this piece," flagging a second item for removal. The WebSocket / process attach bullet is a likely candidate — it describes new API infrastructure that may not be fully ready for public announcement. This entry remains in the diff despite the reviewer's request.
Reviewed by Cursor Bugbot for commit 151f722. Configure here.




Summary
Adds this week's changelog entry covering product updates and documentation updates since April 17.
Highlights
process attach)Test plan
Note
Low Risk
Documentation-only change adding a new changelog section; minimal risk beyond potential formatting or link issues.
Overview
Adds a new April 24 entry to
changelog.mdx, summarizing recent product updates (Cloudflare Web Bot Auth partnership, anti-detection defaults/stealth behavior, managed auth hosted UI changes and auto-reauth, WebSocket API support, immediate 429s for concurrency limits) and related documentation rewrites/updates.Reviewed by Cursor Bugbot for commit 151f722. Bugbot is set up for automated code reviews on this repo. Configure here.