| Version | Supported |
|---|---|
| latest | Yes |
If you discover a security vulnerability in dotclaude, please report it responsibly:
- Do not open a public GitHub issue
- Email the maintainers directly or use GitHub's private vulnerability reporting
- Include a description of the vulnerability, steps to reproduce, and potential impact
We will acknowledge receipt within 48 hours and provide a timeline for a fix.
dotclaude includes shell scripts that execute as Claude Code hooks. Users should be aware of:
- Hook scripts run automatically during Claude Code tool execution. Review
.claude/hooks/before adopting. - MCP servers (cachebro, codemogger) run as child processes. Only enable servers you trust.
- Agent permissions are scoped via
allowed-toolsfrontmatter. Review agent files before extending permissions. - The
/shipcommand stages and commits code. It excludes secrets patterns (.env*,*.key,*.pem) but users should verify their.gitignorecovers project-specific sensitive files.
- Always review
.claude/settings.jsonhook registrations before use - Keep
CLAUDE.local.mdin.gitignore(it may contain personal preferences) - Run
setup.sh --dry-runto preview all actions before executing - Audit agent
allowed-toolsif extending with custom agents