We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| 0.1.x | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them using one of the following methods:
- Go to the Security Advisories page
- Click "Report a vulnerability"
- Fill out the advisory details form
This is the preferred method as it allows us to work with you privately to fix the issue before public disclosure.
If you prefer, you can also email security concerns to: sjnims@gmail.com
Please include:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
After you submit a vulnerability report, you can expect:
- Acknowledgment: We'll acknowledge receipt of your report within 48 hours
- Initial Assessment: We'll assess the issue and determine its severity within 5 business days
- Regular Updates: We'll keep you informed about our progress
- Fix Timeline: We aim to release a fix within 30 days for critical issues, 90 days for others
- Credit: With your permission, we'll credit you in the security advisory and release notes
When a security vulnerability is confirmed:
- We'll develop and test a fix
- We'll prepare a security advisory
- We'll coordinate disclosure timing with you
- We'll release the fix and publish the advisory
- We'll update this SECURITY.md if needed
- Keep Updated: Always use the latest version of the plugin
- GitHub CLI: Ensure your
ghCLI is updated (gh auth refresh) - Permissions: Only grant the minimum required GitHub permissions (
repo,project) - Authentication: Use GitHub's recommended authentication methods
- Review Commands: Review what each
/plugin-dev:*command does before running it
- No Secrets in Code: Never commit API keys, tokens, or credentials
- Dependencies: Keep dependencies minimal (this plugin has only GitHub CLI as external dependency)
- Code Review: All changes go through pull request review
- Markdown Linting: Run
markdownlintbefore committing to catch potential issues - Test Locally: Always test with
claude --plugin-dir plugins/plugin-devbefore pushing
Issue: Claude Code #12781
Due to a Claude Code issue, inline bash execution patterns (exclamation mark followed by backtick) inside fenced code blocks can be executed when skills are loaded—even when they appear as documentation examples.
Mitigation: This plugin uses a [BANG] placeholder instead of ! in skill documentation that shows bash execution patterns.
<!-- UNSAFE - may execute during skill load -->
Current branch: !`git branch --show-current`
<!-- SAFE - displays as documentation only -->
Current branch: [BANG]`git branch --show-current`For maintainers:
- Do NOT "fix"
[BANG]back to!- this is intentional - When adding new documentation with bash patterns, use
[BANG] - Audit command:
rg '!\' plugins/plugin-dev/skills/ --glob '*.md' | rg -v '[BANG]'` - See CONTRIBUTING.md for documentation guidelines
- Reference: command-development skill lines 340-378
History: Fixed in PR #142 (v0.2.0)
This security policy applies to:
- The plugin-dev Claude Code plugin
- All components: commands, skills, agents, hooks
- GitHub CLI integration code
- Documentation that affects security
The following are not covered by this security policy:
- Vulnerabilities in Claude Code itself (report to Anthropic)
- Vulnerabilities in GitHub CLI (report to GitHub)
- Vulnerabilities in GitHub Projects (report to GitHub)
- Third-party integrations not maintained by this project
We follow coordinated disclosure:
- We'll work with you to understand and fix the issue
- We'll agree on a disclosure timeline (typically 90 days)
- We'll credit you (if you wish) when we publish the advisory
- We ask that you don't publicly disclose until we've released a fix
We appreciate the security research community's efforts to improve the security of this plugin. Security researchers who responsibly disclose vulnerabilities will be:
- Acknowledged in the security advisory (if they wish)
- Credited in release notes
- Listed in this file's Hall of Fame (if they wish)
No security issues have been reported yet.
- Security Issues: Use GitHub Private Vulnerability Reporting or email sjnims@gmail.com
- General Questions: Open an issue using our question template
- Maintainer: Steve Nims (@sjnims)
Note: This security policy was last updated: December 13, 2025