| Version | Supported |
|---|---|
main |
✅ Yes |
Only the current main branch receives security fixes.
Do not open a public GitHub issue for security vulnerabilities.
Report security issues privately by emailing coding.projects.1642@proton.me.
Include:
- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested mitigations (optional)
You will receive an acknowledgment within 72 hours. We aim to release a fix within 14 days of a confirmed report, depending on severity and complexity.
SourceRegistry resolves named source dependencies to local paths and verifies expected source state. The primary security surface is:
- Path traversal via
local_clone_hintor env-var-derived clone roots — resolved paths must stay within an expected root - Git command injection via untrusted SHA / branch / repo strings passed to
gitsubprocesses - Force-push consent bypass — auto-sync must never push without an explicit
auto_sync: trueflag on the source entry - Upstream PR push consent bypass —
push(open PR against original) must never run without an explicitauto_pr_push: trueflag - Symlink attack on local clones (a malicious clone could symlink
.gitto an attacker-controlled location) - Credential exposure —
gitoperations should not embed credentials in logs or registry yamls
- Vulnerabilities in
gititself or in upstream repos being tracked - Vulnerabilities in package managers (
uv,pip,bun) used by integrators - Issues requiring physical access to the host machine
- Network-level MITM against
git+httpsorgit+ssh(those are the upstream provider's responsibility)