| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in Corbat-Coco, please report it responsibly:
- DO NOT create a public GitHub issue for security vulnerabilities
- Email the details to [email protected]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: Within 24 hours
- High: Within 7 days
- Medium: Within 30 days
- Low: Next release cycle
When using Corbat-Coco, follow these security practices:
# Use environment variables for API keys
export ANTHROPIC_API_KEY="sk-ant-..."
# Never commit API keys to version control
# Add to .gitignore:
.env
.env.local
*.keyCorbat-Coco generates code that may need security review:
- Always review generated code before deploying to production
- Run security scanners (e.g.,
npm audit,snyk test) - Check for hardcoded secrets in generated files
- Validate input handling in generated endpoints
The CLI operates on your file system. Be aware:
- The
coco buildcommand creates/modifies files - Generated code may include file operations
- Review file paths in generated configurations
Generated code may include network operations:
- Review all external API calls
- Validate URLs in generated configurations
- Ensure proper HTTPS usage
- Input Validation: All configuration validated with Zod schemas
- No Eval: Generated code avoids
eval()and dynamic execution - Dependency Audit: Regular dependency security audits
- Type Safety: TypeScript strict mode prevents many vulnerabilities
The quality system includes security scoring:
- Security dimension weight: 8%
- Checks for common vulnerabilities (OWASP Top 10)
- Enforces secure coding patterns
- API keys are read from environment variables
- Keys are not stored in configuration files
- Keys are not logged or transmitted beyond API calls
- Generated code should always be reviewed
- Security patterns are enforced but not guaranteed
- Third-party integrations require manual security verification
- Checkpoints may contain project state
- Stored in
.coco/directory - Add
.coco/to.gitignoreif concerned about state exposure
We follow responsible disclosure:
- Reporter notifies us privately
- We confirm and investigate
- We develop and test a fix
- We release the fix
- We credit the reporter (if desired)
- We publicly disclose after fix is available
Security updates are distributed through:
- npm package updates
- GitHub Security Advisories
- CHANGELOG.md entries marked with
[SECURITY]
To receive notifications:
# Watch the repository
# Subscribe to security advisories on GitHub
# Use npm audit regularly
npm auditFor security-related inquiries:
- Email: [email protected]
- GitHub Security Advisories: Link
Thank you for helping keep Corbat-Coco secure!