We take security seriously. If you discover a security vulnerability in Claude Superpowers, please report it directly and confidentially to the security team rather than opening a public issue.
Email: security@smartmur.dev
Please include:
- Description of the vulnerability
- Affected component(s) and version(s)
- Steps to reproduce (if applicable)
- Potential impact
- Suggested fix (if you have one)
Do not disclose the vulnerability publicly until we have issued a patch.
- 48 hours: Initial acknowledgment of your report
- 7 days: Assessment and severity determination
- 30 days: Target for patch release (may be sooner for critical issues)
- Ongoing: Updates on remediation progress
| Version | Python | Status | Support Ends |
|---|---|---|---|
| 0.1.0 | 3.12+ | Current | TBD |
| < 0.1.0 | 3.12+ | Unsupported | N/A |
Security updates are provided for the current version. Users are encouraged to upgrade promptly.
We consider the following as security vulnerabilities:
- Injection attacks — Code injection, SQL injection, command injection, shell escape
- Authentication/Authorization bypasses — Unintended access to protected resources or functions
- Credential exposure — Accidental leakage of secrets, API keys, passwords, or tokens
- Vault vulnerabilities — Bypass of encryption, integrity issues, or weak key management
- Privilege escalation — Ability to execute commands with elevated privileges unexpectedly
- File system access violations — Unintended read/write outside sandboxed paths
- Denial of service — Resource exhaustion or crashes affecting availability
- Cryptographic weaknesses — Misuse of encryption, weak algorithms, or incorrect implementations
- Feature requests or enhancement suggestions
- Non-security bugs (use Issues instead)
- Cosmetic or UI/UX problems
- Documentation gaps or typos
- Performance issues (unless they enable DoS)
- Misconfiguration by users (e.g., storing vault key in an insecure location)
Claude Superpowers implements defense-in-depth:
- Credentials stored with age encryption at rest (
~/.claude-superpowers/vault.enc) - Key material managed via macOS Keychain or equivalent secure storage
- Atomic writes prevent partial/corrupted secrets
- CLI:
claw vault get|set|delete|rotation
- Skill execution strips unnecessary environment variables
- Vault access only granted if explicitly permitted in
skill.yaml - Execution sandboxed via process isolation
- Audit logging of all skill invocations
- Append-only log at
~/.claude-superpowers/audit.log - Records: skill executions, cron jobs, messages sent, SSH commands
- Logs include timestamp, user, command, result
- Tamper detection via integrity checks
- YAML-based rotation policies with warning and expiration thresholds
- Automated alerts for stale or expired credentials
- CLI:
claw vault rotation check|policy - Integration with scheduling system for compliance monitoring
- Dashboard requires strong password in
.env(DASHBOARD_USER/DASHBOARD_PASS) - No hardcoded API keys or tokens
- All external integrations require explicit configuration
.env.exampleprovided as reference;.envnot committed
- All services run on-premise (local Docker Compose stack)
- No cloud dependencies for core functionality
- External integrations (Slack, Telegram, Discord) are optional adapters
- Network isolation via local Redis pubsub for message bus
Users should:
- Protect the vault key — Keep
VAULT_IDENTITY_FILEand Keychain password secure - Rotate credentials regularly — Use
claw vault rotation policyto enforce compliance - Review audit logs — Monitor
~/.claude-superpowers/audit.logfor unexpected activity - Update promptly — Apply security patches as soon as available
- Limit SSH access — Use strong keys and restrict host access via firewall
- Secure .env — Treat
.envas sensitive; never commit to version control - Run services as non-root — Avoid running Docker or cron daemon as root
- Monitor browser automation — Review browser session permissions and website access
We follow coordinated disclosure practices:
- Vulnerabilities are kept confidential until a patch is available
- We provide credit to reporters in release notes (unless they request anonymity)
- We coordinate timing with maintainers of affected dependencies (if applicable)
- Public disclosure happens once users have had time to upgrade
- Subscribe to GitHub Releases: https://github.com/smartmur/claude-superpowers/releases
- Security advisories published separately from regular releases
- Patch releases provided for critical vulnerabilities on older versions if necessary
If you have general security questions or want to discuss hardening strategies, feel free to reach out to security@smartmur.dev (non-disclosure required for unreported vulnerabilities).
Last updated: 2026-03-03