| Version | Supported |
|---|---|
| 0.2.x | yes |
| < 0.2 | no |
OSS-Dev handles credentials and API tokens. If you discover a security vulnerability:
- Do NOT open a public GitHub issue
- Email the maintainers directly or open a security advisory
- Include a detailed description and reproduction steps
You should receive a response within 48 hours. If not, follow up.
- Credential exposure in logs or output
- Injection vulnerabilities in shell commands
- Unsafe token storage
- Approval bypass
- Provider credential leakage
- Dependency CVEs with known fixes
- Phishing attacks against maintainers
- DOS attacks
- All credentials loaded from environment variables only
.oss-dev/directory is gitignored (contains workflow state)- Approval system blocks dangerous commands by default
gitsubprocess commands are parameterized (no shell injection)- No hardcoded secrets in codebase
- Automated secret scanning via Gitleaks in CI
- Report received and acknowledged
- Investigation and fix development
- Fix released in next patch version
- Public disclosure after 30 days