reeln-plugin-openai is pre-1.0 software. Security fixes are published against the latest release only. We recommend always running the most recent version from PyPI or the Releases page.
| Version | Supported |
|---|---|
| latest release | ✅ |
| older | ❌ |
reeln-plugin-openai is a reeln-cli plugin that integrates OpenAI services
for livestream metadata generation, game thumbnail rendering, and
translation. It runs inside reeln-cli on a livestreamer's local
machine and makes outbound HTTPS requests to the OpenAI API.
In-scope concerns include, but are not limited to:
- Leakage of the OpenAI API key or organization ID via logs, error messages, cached responses, or saved state
- Prompt injection via untrusted game metadata (team names, roster strings, score events) that manipulates the LLM into producing unsafe output or revealing system prompts
- Unsafe deserialization of OpenAI API responses or cached templates
- Command injection or path traversal in generated thumbnail files or metadata written to disk
- Dependency confusion or typosquatting on the PyPI package name
Out of scope:
- Vulnerabilities in the OpenAI API itself or in the upstream
openaiPython SDK — report those to OpenAI - Vulnerabilities in reeln-cli or other reeln plugins — report those to the respective repository
- Issues that require an attacker to already have local code execution on the user's machine or access to the stored API key
Please do not report security vulnerabilities through public GitHub issues, discussions, or pull requests.
Report vulnerabilities using GitHub's private vulnerability reporting:
- Go to the Security tab of this repository
- Click "Report a vulnerability"
- Fill in as much detail as you can: affected version, reproduction steps, impact, and any suggested mitigation
If you cannot use GitHub's reporting, email git-security@email.remitz.us instead.
A good report contains:
- The version of reeln-plugin-openai, reeln-cli, and Python you tested against
- Your operating system and architecture (macOS / Windows / Linux, arch)
- Steps to reproduce the issue
- What you expected to happen vs. what actually happened
- The potential impact (credential leakage, prompt injection, code execution, data loss, etc.)
- Any proof-of-concept code or prompts, if applicable
This plugin is maintained by a small team, so all timelines below are best-effort rather than hard guarantees:
- Acknowledgement: typically within a week of your report
- Initial assessment: usually within two to three weeks, including whether we consider the report in scope and our planned next steps
- Status updates: roughly every few weeks until the issue is resolved
- Fix & disclosure: coordinated with you. We aim to ship a patch release reasonably quickly for high-severity issues, with lower-severity issues addressed in a future release. Credit will be given in the release notes and CHANGELOG unless you prefer to remain anonymous.
If a report is declined, we will explain why. You are welcome to disagree and provide additional context.