Security fixes are guaranteed only for the latest code on the main branch.
Do not disclose sensitive vulnerabilities in public issues.
Preferred reporting channels:
- GitHub Private Security Advisory
- The maintainer contact listed on the repository profile
Please include:
- impact and severity
- the smallest reliable reproduction
- affected modules or files
- optional mitigation ideas
- Never commit real API keys, tokens, or credentials.
- Keep secrets in local
.envfiles and use.env.exampleonly as a placeholder template. - Treat
config.jsonas local runtime state, not as a place to commit real secrets. - If you suspect a leak, immediately:
- rotate the credential
- clean or rewrite history if necessary
- publish mitigation guidance and follow-up steps
- Run the minimum CI-aligned regression suite.
- Verify that high-risk tool paths still require confirmation and auditing.
- Scan the codebase and recent history for common secret patterns.
- Fix remotely triggerable issues, privilege escalation, and data exposure first.
- Add regression coverage after the fix so the same class of issue does not return.