| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability in jsh, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please send an email to: security@pegasusheavy.com
Include the following information in your report:
- Description: A clear description of the vulnerability
- Impact: The potential impact of the vulnerability
- Steps to Reproduce: Detailed steps to reproduce the issue
- Affected Versions: Which versions of jsh are affected
- Suggested Fix: If you have a suggested fix, please include it
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Initial Assessment: We will provide an initial assessment within 7 days
- Updates: We will keep you informed about our progress
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)
As a shell interpreter, jsh handles potentially sensitive operations:
- Command Execution: jsh executes arbitrary commands on the system
- Environment Variables: May contain sensitive information
- File Operations: Read/write access to the filesystem
- Profile Scripts: Automatic execution of configuration files
When using jsh:
- Review Scripts: Always review scripts before running them
- Limit Permissions: Run jsh with appropriate user permissions
- Sanitize Input: Be cautious with user-provided input in scripts
- Secure Configuration: Protect your
.jshrcand profile files
The following are generally not considered vulnerabilities:
- Bugs that require local access with the same privileges as the user
- Issues in third-party dependencies (report to the dependency maintainer)
- Social engineering attacks
- Issues that require physical access to the machine
Security updates will be released as patch versions (e.g., 0.1.1, 0.1.2).
Subscribe to our releases on GitHub to be notified of security updates.
We follow responsible disclosure practices:
- Vulnerabilities are fixed before public disclosure
- A security advisory is published on GitHub
- Credit is given to the reporter (if desired)
- Users are given time to update before full details are released
Thank you for helping keep jsh and its users safe!