We actively support security updates for the following versions:
| Version | Supported |
|---|---|
| 3.0.x | ✅ |
| < 3.0 | ❌ |
We take security issues seriously. If you discover a security vulnerability in this Claude Code configuration system, please follow these guidelines:
Preferred: Use GitHub's private security advisory feature:
- Navigate to the Security tab
- Click "Report a vulnerability"
- Fill out the form with details
Alternative: Email security issues to the repository maintainer at jags@epicturla.com with subject line: [SECURITY] Claude System Vulnerability
In the context of a Claude Code configuration repository, security issues include:
- Hook injection vulnerabilities — Shell command injection via hook scripts
- Permission bypasses — Circumventing
pre-write.sh(branch-guard logic),pre-bash.sh(safety gate), or other safety gates - Credential exposure — Accidental logging or storing of API keys, tokens, or secrets
- Unsafe file operations — Path traversal, arbitrary file writes, or deletion outside project scope
- Privilege escalation — Hooks gaining unintended system access
- Supply chain risks — Compromised submodules or dependencies
- Description of the vulnerability
- Steps to reproduce
- Affected versions
- Potential impact
- Suggested fix (if you have one)
- Initial response: Within 48 hours
- Severity assessment: Within 7 days
- Fix timeline: Depends on severity
- Critical: 7-14 days
- High: 14-30 days
- Medium/Low: Next scheduled release
Please do not publicly disclose the vulnerability until we've had a chance to address it. We will:
- Confirm receipt within 48 hours
- Provide a severity assessment within 7 days
- Work with you on a fix timeline
- Credit you in the release notes (unless you prefer anonymity)
- Publish a security advisory after the fix is released
When using this configuration system:
- Never commit
.envfiles or credentials to version control - Review hook scripts before installation — they run with your user privileges
- Keep the system updated (
git pullregularly) - Use project-scoped API keys (not account-wide admin keys) for research skills
- Review the
settings.jsonpermissions allow-list before adding new patterns
This is a local configuration system for Claude Code. It does not:
- Run in sandboxed environments
- Validate external tool outputs (e.g.,
gh,git,shellcheck) - Prevent all forms of command injection if external tools are compromised
- Protect against malicious user input — hooks trust the operator
If you use this system in a shared or untrusted environment, review all hook scripts and understand the execution model before proceeding.