Security Policy
Supported Versions
We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 0.4.x | ✅ |
| 0.3.x | ✅ |
| 0.2.x | ✅ |
| 0.1.x | ✅ |
Reporting a Vulnerability
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them using one of the following methods:
Preferred: GitHub Private Vulnerability Reporting
- Go to the Security Advisories page
- Click "Report a vulnerability"
- Fill out the advisory details form
This is the preferred method as it allows us to work with you privately to fix the issue before public disclosure.
Alternative: Email
If you prefer, you can also email security concerns to: sjnims@gmail.com
Please include:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
What to Expect
After you submit a vulnerability report, you can expect:
- Acknowledgment: We'll acknowledge receipt of your report within 48 hours
- Initial Assessment: We'll assess the issue and determine its severity within 5 business days
- Regular Updates: We'll keep you informed about our progress
- Fix Timeline: We aim to release a fix within 30 days for critical issues, 90 days for others
- Credit: With your permission, we'll credit you in the security advisory and release notes
Security Update Process
When a security vulnerability is confirmed:
- We'll develop and test a fix
- We'll prepare a security advisory
- We'll coordinate disclosure timing with you
- We'll release the fix and publish the advisory
- We'll update this SECURITY.md if needed
Security Best Practices for Users
For Plugin Users
- Keep Updated: Always use the latest version of the plugin
- GitHub CLI: Ensure your
ghCLI is updated (gh auth refresh) - Permissions: Only grant the minimum required GitHub permissions (
repo,project) - Authentication: Use GitHub's recommended authentication methods
- Review Commands: Review what each
/plugin-dev:*command does before running it
For Contributors
- No Secrets in Code: Never commit API keys, tokens, or credentials
- Dependencies: Keep dependencies minimal (this plugin has only GitHub CLI as external dependency)
- Code Review: All changes go through pull request review
- Markdown Linting: Run
markdownlintbefore committing to catch potential issues - Test Locally: Always test with
claude --plugin-dir plugins/plugin-devbefore pushing
Known Security Mitigations
Shell Pattern Escaping with [BANG] Placeholder
Issue: Claude Code #12781
Due to a Claude Code issue, inline bash execution patterns (exclamation mark followed by backtick) inside fenced code blocks can be executed when skills are loaded—even when they appear as documentation examples.
Mitigation: This plugin uses a [BANG] placeholder instead of ! in skill documentation that shows bash execution patterns.
<!-- UNSAFE - may execute during skill load --> Current branch: !`git branch --show-current` <!-- SAFE - displays as documentation only --> Current branch: [BANG]`git branch --show-current`
For maintainers:
- Do NOT "fix"
[BANG]back to!- this is intentional - When adding new documentation with bash patterns, use
[BANG] - Audit command:
rg '!\' plugins/plugin-dev/skills/ --glob '*.md' | rg -v '[BANG]'` - See CONTRIBUTING.md for documentation guidelines
- Reference: command-development skill lines 340-378
History: Fixed in PR #142 (v0.2.0)
Scope
This security policy applies to:
- The plugin-dev Claude Code plugin
- All components: commands, skills, agents, hooks
- GitHub CLI integration code
- Documentation that affects security
Out of Scope
The following are not covered by this security policy:
- Vulnerabilities in Claude Code itself (report to Anthropic)
- Vulnerabilities in GitHub CLI (report to GitHub)
- Vulnerabilities in GitHub Projects (report to GitHub)
- Third-party integrations not maintained by this project
Security Disclosure Policy
We follow coordinated disclosure:
- We'll work with you to understand and fix the issue
- We'll agree on a disclosure timeline (typically 90 days)
- We'll credit you (if you wish) when we publish the advisory
- We ask that you don't publicly disclose until we've released a fix
Recognition
We appreciate the security research community's efforts to improve the security of this plugin. Security researchers who responsibly disclose vulnerabilities will be:
- Acknowledged in the security advisory (if they wish)
- Credited in release notes
- Listed in this file's Hall of Fame (if they wish)
Hall of Fame
No security issues have been reported yet.
Contact
- Security Issues: Use GitHub Private Vulnerability Reporting or email sjnims@gmail.com
- General Questions: Open an issue using our question template
- Maintainer: Steve Nims (@sjnims)
Additional Resources
Note: This security policy was last updated: February 10, 2026