We release security updates for the following versions:
| Version | Supported |
|---|---|
| main | ✅ |
| < 1.0 | ❌ |
Note: This project is currently in active development. The main branch receives all security updates.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
[INSERT SECURITY EMAIL]
You should receive a response within 48 hours. If for some reason you do not, please follow up to ensure we received your original message.
Please include the following information in your report:
- Type of vulnerability (e.g., command injection, path traversal, XSS, etc.)
- Full paths of affected source file(s)
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
This information will help us triage your report more quickly.
- Acknowledgment: Within 48 hours of report
- Initial Assessment: Within 5 business days
- Fix Development: Depends on severity and complexity
- Public Disclosure: After fix is deployed or 90 days from report (whichever comes first)
We use the following severity classifications:
Critical: Vulnerabilities that can be exploited remotely without authentication
- Timeline: Fix within 7 days
- Examples: Remote code execution, arbitrary file write
High: Vulnerabilities requiring some user interaction or local access
- Timeline: Fix within 30 days
- Examples: Command injection, path traversal, privilege escalation
Medium: Vulnerabilities with limited impact or requiring specific conditions
- Timeline: Fix within 60 days
- Examples: Information disclosure, denial of service
Low: Minimal impact vulnerabilities
- Timeline: Fix in next regular release
- Examples: Minor information leaks, configuration issues
When contributing to this project, please:
- Never commit secrets: No API keys, tokens, passwords, or credentials
- Validate all inputs: Especially in shell scripts and user-facing commands
- Use absolute paths carefully: Avoid exposing user directory structures
- Follow path standards: See
.claude/rules/path-standards.md - Review GitHub operations: See
.claude/rules/github-operations.md - Use safe shell practices:
set -euo pipefail # Exit on error, undefined vars # Quote all variables echo "${variable}" # Validate user input [[ "${input}" =~ ^[a-zA-Z0-9_-]+$ ]] || exit 1
When using this framework:
- Review scripts before execution: Understand what helper scripts do
- Don't share credentials: Keep API keys and tokens secure
- Use environment variables: For sensitive configuration
- Keep dependencies updated: Especially MCP servers
- Review GitHub permissions: Before syncing with repositories
This framework executes shell scripts with user-provided input. Users should:
- Review all scripts before running
- Understand the SPARC methodology and command structure
- Only use trusted slash commands
- Validate repository URLs before GitHub operations
This framework integrates with external MCP servers:
- claude-flow: Official, maintained by ruvnet
- ruv-swarm: Optional, maintained by ruvnet
- flow-nexus: Optional, requires authentication
Verify MCP server sources before installation.
The framework can create and modify GitHub issues/PRs:
- Always validates repository origin (see
.claude/rules/github-operations.md) - Prevents accidental operations on template repository
- Users should verify
git remote get-url originbefore syncing
The framework includes protections against exposing user paths:
- Automatically normalizes paths in documentation
- Prevents absolute paths with usernames in GitHub syncs
- See
.claude/rules/path-standards.mdfor details
We will publish security advisories through:
- GitHub Security Advisories
- Release notes with
[SECURITY]prefix - Email notification to reported vulnerabilities
This framework depends on:
- Claude Code CLI: Official Anthropic tool
- Git: Standard version control
- Bash: Shell scripting environment
- MCP Servers (optional): claude-flow, ruv-swarm, flow-nexus
Users are responsible for keeping these dependencies updated.
We follow coordinated disclosure:
- Private reporting: Report received and acknowledged
- Fix development: Working with reporter to develop fix
- Fix deployment: Update released to users
- Public disclosure: Advisory published after 90 days or when fix is deployed
We appreciate security researchers who:
- Allow reasonable time for fixes
- Do not publicly disclose until fix is available
- Do not exploit vulnerabilities maliciously
For security concerns:
- Email: [INSERT SECURITY EMAIL]
- PGP Key: [INSERT PGP KEY IF AVAILABLE]
For general questions:
- GitHub Issues: For non-security bugs
- GitHub Discussions: For questions and ideas
Thank you for helping keep this project secure!