Only the latest release receives security fixes.
| Version | Supported |
|---|---|
| Latest | ✅ Yes |
| Older | ❌ No |
This tool operates entirely locally. It reads and deletes files under ~/.copilot/session-state/ (or a user-specified directory). It makes no network requests and has no server-side component.
Potential security concerns relevant to this project:
- Path traversal — a crafted session ID causing deletion outside the declared root.
- Symlink attacks — a symlink inside the session directory pointing outside it.
- Dependency vulnerabilities — CVEs in third-party Go modules.
Please do not open a public GitHub issue for security vulnerabilities.
Instead, report them privately via GitHub's private vulnerability reporting or by emailing the maintainer directly (see the GitHub profile for contact details).
Please include:
- A description of the vulnerability and its potential impact.
- Steps to reproduce (proof-of-concept if available).
- Any relevant environment details (OS, Go version, tool version).
You can expect an acknowledgment within 72 hours and a resolution or mitigation plan within 14 days for critical issues.
We follow coordinated disclosure. Please give us a reasonable window to release a fix before public disclosure.