| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| < 0.2 | ❌ |
If you discover a security vulnerability in PatchPilot, please report it responsibly:
- Do NOT open a public GitHub issue for security vulnerabilities
- Email the maintainer directly or use GitHub's private vulnerability reporting
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix timeline: Depends on severity
- Critical: 24-48 hours
- High: 1 week
- Medium: 2 weeks
- Low: Next release
- Keep PatchPilot updated - Run
npm update patchpilotregularly - Review blocked packages - Understand why a package was flagged
- Report bypasses - If you find a way to bypass detection, please report it
- Homebrew: No vulnerability database available (OSV doesn't support Homebrew)
- Private registries: Only public npm/PyPI packages are checked
- Version ranges: Only exact versions are checked;
latestchecks the latest published version
This security policy covers:
- The PatchPilot npm package
- The command parsing logic
- The OSV API integration
Out of scope:
- The OSV database itself
- Claude Code's hook system
- Third-party dependencies (report to their maintainers)