Skip to content

Security: siisee11/discode

Security

docs/SECURITY.md

Security Map

Canonical for: repository security model, secret handling, and trust boundaries Audience: contributors working on config, hooks, file transfer, release automation, or external integrations Update when: secrets handling, network exposure, file validation, or packaging trust assumptions change

Current security model:

  • bot tokens and local config live outside the repo in ~/.discode/config.json
  • daemon control and hook endpoints are loopback-only interfaces
  • file uploads from agents are validated against project scope before being forwarded
  • npm publishing requires authenticated maintainer credentials and should use automation tokens

Primary references:

Do not store secrets in checked-in docs, plans, or release notes.

There aren’t any published security advisories