| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you find a vulnerability, report it privately to the maintainer before publishing details publicly.
- Email: noahsheldon06@gmail.com
- Response time: within 48 hours
- Status updates: every 7 days until resolved
- Target fix time: 30 days from report
The following are in scope for security reports:
- Plugin manifests (
.claude-plugin/,.codex-plugin/,.gemini/,.opencode/) - Install scripts (
install.sh,install.ps1) - Automation hooks (
hooks/) - MCP configurations (
mcp-configs/,.mcp.json) - Validation scripts (
scripts/) - Shell commands in skills, agents, and commands
- Validate external input in scripts and hooks
- Avoid shell interpolation from untrusted strings
- Never hardcode secrets, API keys, or credentials
- Use environment variables for sensitive configuration
- Keep default plugin configuration conservative
- Audit new dependencies for known CVEs before adding
- Pin dependency versions — no floating
*orlatest - Review lock files for unexpected changes
- Monitor for deprecated or unmaintained packages
- No PII in logs, error messages, or telemetry
- API responses don't over-expose internal data
- Database queries use parameterized statements — no raw SQL with user input
- File operations use path validation — no directory traversal
- Never bypass auth checks in hooks or automation
- Use least privilege — explicit allowlists over denylists
- Token scopes are minimal — read-only where possible
- Expired or revoked tokens are rejected
- Third-party dependencies (report upstream)
- Infrastructure outside this repository
- Social engineering attacks
- Physical security
When changes touch auth, secrets, or external input:
- Flag the change with a SECURITY label in the PR
- Request review from the
security-revieweragent - Do not merge until the security review passes
- Document any security-relevant decisions in the PR description