If you discover a security vulnerability in ForkScout, please do NOT open a public issue.
Instead, report it privately:
- Email: security@forkscout.com
- GitHub: Use Security Advisories
We will acknowledge your report within 48 hours and aim to release a fix within 7 days for critical issues.
The following are in scope for security reports:
- Vault encryption bypass or key leakage
- Secret values leaking into LLM context, logs, or tool outputs
- Authentication bypass (role escalation, access control issues)
- Remote code execution via crafted messages
- Path traversal in file read/write tools
- Prompt injection leading to unauthorized tool execution
ForkScout uses the following security measures:
| Layer | Protection |
|---|---|
| Secrets | AES-256-GCM encrypted vault (vault.enc.json) |
| Agent isolation | Secrets referenced by {{secret:alias}} — values never in LLM context |
| Output censoring | censorSecrets() scrubs leaked values from tool results |
| Access control | Three-tier roles: owner / user / denied |
| Tool restriction | ownerOnlyTools blocks dangerous tools for non-owners |
| Rate limiting | Per-user rate limits on all channels |
| Input validation | maxInputLength caps on all channels |
- Never commit
.env,vault.enc.json, orauth.json - Set
ownerUserIdsin production — do not run in dev mode - Keep
ownerOnlyToolsconfigured forrun_shell_commandsandwrite_file - Run
forkscout setupto migrate any plaintext secrets to the vault - Regularly rotate your
VAULT_KEYand API keys
| Version | Supported |
|---|---|
| 3.x | ✅ Active |
| < 3.0 | ❌ No longer supported |