| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability in EDAF, please report it responsibly:
For security issues, please do NOT open a public GitHub issue.
Instead, please report security vulnerabilities by:
- Email: Create a private security advisory on GitHub
- Private Report: Use GitHub's private vulnerability reporting feature
Please include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Suggested fix (if you have one)
- Your contact information for follow-up
- Acknowledgment: Within 48 hours
- Initial assessment: Within 7 days
- Status updates: Every 7 days until resolved
- Fix timeline: Depends on severity
- Critical: 1-7 days
- High: 7-14 days
- Medium: 14-30 days
- Low: 30-90 days
EDAF is designed to evaluate and generate code. When using EDAF:
.claude/edaf-config.yml- Does not store credentials.claude/CLAUDE.md- Does not store sensitive data.claude/settings.json- May contain local paths (not secrets)
- Sound files in
.claude/sounds/are provided for notifications - These files are safe and licensed (see README.md for attribution)
EDAF includes bash scripts:
.claude/scripts/notification.sh- Plays notification sounds.claude/scripts/verify-ui.sh- Validates UI verification
Security notes:
- Scripts do not access network
- Scripts do not modify code
- Scripts only read/validate local files
If using Claude in Chrome for UI verification:
- Clone from official repository only
- Review code before running
- Use in development environments first
- Keep Claude Code updated
- Do not store secrets in EDAF configuration
- Do not introduce dependencies with known vulnerabilities
- Validate all user inputs in workers/evaluators
- Avoid shell injection in bash scripts
- Document security implications of changes
- Test in isolated environments
EDAF is designed for development environments and has these limitations:
- Not designed for untrusted code execution - Use in trusted development environments
- No built-in sandboxing - Relies on Claude Code's execution environment
- Local file system access - Workers/evaluators read local files
- Script execution - Bash scripts execute with user permissions
When a security vulnerability is confirmed:
- Fix developed and tested privately
- Security advisory published on GitHub
- Patch released as new version
- Users notified via GitHub release notes
- Credit given to reporter (if desired)
Subscribe to security advisories:
- GitHub Watch → Custom → Security alerts
- GitHub Releases for security patches
For security concerns:
- Use GitHub Security Advisories (preferred)
- Open a private vulnerability report
- Do NOT use public issues for security vulnerabilities
Thank you for helping keep EDAF secure! 🔒