This project is pre-1.0; expect frequent changes. Report security issues against the latest main.
Please open a private issue or email the maintainer (see repository profile) with:
- Description of the issue
- Steps to reproduce
- Potential impact / scope
- Suggested remediation if known
Do NOT create public PoC repositories without coordinated disclosure.
Git-Sim loads third-party plugins via Python entry points:
- Plugins run arbitrary Python code in your environment.
- Malicious plugins could read files, exfiltrate data, or alter git repositories.
- Review plugin source before installation.
- Pin plugin versions.
- Prefer virtual environments.
- Consider running in an isolated container for untrusted plugins.
HookPlugin.override_simulation can entirely bypass built-in safety checks. A malicious override could:
- Fabricate misleading
SimulationResultobjects. - Conceal dangerous operations.
Always verify unexpected output by running native git commands manually.
Report outdated vulnerable dependencies (dulwich, rich, textual, typer) via issues. Automated tools (Dependabot, Renovate) may be enabled later.
- Enable
mypy --strictandruffin CI. - Keep dependencies minimal.
- Avoid executing shell commands in plugins unless necessary.
If a vulnerability is confirmed:
- Acknowledge receipt within 72h.
- Provide fix or mitigation ETA.
- Publish advisory once patched.
Thank you for helping keep Git-Sim secure.