The following versions of claudelint are currently supported with security updates:
| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| < 0.2 | ❌ |
Note: Once version 1.0.0 is released, only the latest major version will receive security updates.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
[Your security email or create one]
Or use GitHub Security Advisories:
Please include the following information in your report:
- Type of vulnerability (e.g., injection, XSS, path traversal, etc.)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability, including how an attacker might exploit it
- Acknowledgment - You will receive an acknowledgment within 48 hours
- Assessment - We will assess the vulnerability and determine its severity (typically within 5 business days)
- Updates - You will receive status updates every 5 business days
- Resolution - We will work on a fix and coordinate disclosure with you
- Credit - You will be credited in the release notes (if desired)
- Vulnerability reported and confirmed
- Severity assessment (CVSS score assigned)
- Fix development and testing
- Security advisory published (GitHub Security Advisories)
- Patch release published to npm
- Public disclosure coordinated with reporter
We prefer all communications to be in English.
When using claudelint:
- Keep up to date - Always use the latest version to get security patches
- Review dependencies - Run
npm auditregularly to check for vulnerable dependencies - Validate input - If using the programmatic API, validate user input before passing to claudelint
- Sandbox execution - If running claudelint on untrusted code, consider sandboxing
- Report issues - If you discover a security issue, report it responsibly
claudelint is a static analysis tool that:
- Reads and validates configuration files (CLAUDE.md, JSON, YAML)
- Does not execute user code
- Does not make network requests (except for optional external validators)
- Does not modify files unless explicitly using
--fixflag
- Path traversal - claudelint validates file paths but users should be cautious with untrusted
@importdirectives - YAML/JSON parsing - Malformed YAML/JSON files are handled safely but extremely large files could impact performance
- Regular expressions - claudelint uses regex validators which are tested for ReDoS vulnerabilities
We use the following tools to maintain security:
- npm audit - Automated dependency vulnerability scanning
- Dependabot - Automated dependency updates
- CodeQL (planned) - Static code analysis for security issues
- GitHub Security Advisories - Coordinated vulnerability disclosure
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find similar problems
- Prepare fixes for all supported versions
- Release patches as soon as possible
We ask that you:
- Allow us reasonable time to fix the vulnerability before public disclosure
- Make a good faith effort to avoid privacy violations, data destruction, and service disruption
- Do not access or modify data that isn't yours
- Do not perform actions that could negatively affect our users
We appreciate the security research community and will acknowledge researchers who report valid vulnerabilities in:
- Release notes
- Security advisories
- GitHub repository (if desired)
Thank you for helping keep claudelint and our users safe!