| Version | Supported |
|---|---|
| 2.0.x | ✅ |
| 1.x.x | ❌ |
- PKCE (RFC 7636): Proof Key for Code Exchange prevents authorization code interception
- OAuth 2.0 Device Flow: Secure authentication without client secrets
- Token Validation: All tokens validated for format and content before use
- URL Validation: Only HTTPS URLs from
*.qwen.aidomains accepted
- Sensitive Data Sanitization: All logs automatically redact tokens, secrets, and API keys
- No Client Secrets: Device flow doesn't require storing client secrets
- Secure Token Storage: Tokens stored in OpenCode's secure auth system
- Log File Permissions: Log files created with mode 0o700 (owner-only access)
- HTTPS Only: All API requests use HTTPS
- Request Timeout: 30-second default timeout prevents hanging requests
- Retry Logic: Exponential backoff with jitter prevents thundering herd
- Rate Limiting: Built-in protection against rate limit errors
- Mutex Locks: Prevents race conditions in token refresh
- Operation Tracking: Prevents duplicate authorization flows
- Debouncing: Prevents rapid successive operations
If you discover a security vulnerability, please email security@example.com with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Please do not open public GitHub issues for security vulnerabilities.
We will respond within 48 hours and provide:
- Confirmation of receipt
- Assessment timeline
- Updates on progress
- Credit for responsible disclosure (if desired)
npm audit
found 0 vulnerabilities
All dependencies are actively maintained and security-patched:
@opencode-ai/plugin: Official OpenCode plugin SDK@types/node: TypeScript type definitionstypescript: TypeScript compiler
- Keep Dependencies Updated: Run
npm auditregularly - Review Logs: Check
~/.config/opencode/logs/qwen-oauth.logfor anomalies - Rotate Tokens: Re-authenticate periodically using
/connect - Monitor Activity: Enable debug mode if suspicious activity detected
- Report Issues: Use GitHub Issues for non-security bugs
- Fixed race conditions in token refresh
- Added mutex protection for concurrent operations
- Enhanced cleanup handling
- Added comprehensive input validation
- Implemented retry logic with exponential backoff
- Enhanced error handling with custom error types
- Added structured logging with sensitive data sanitization
- Implemented proactive token refresh
- Initial release with OAuth device flow
- PKCE implementation
- Basic logging