We release security updates for the following versions:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
- Never commit API tokens to version control
- Use environment variables (
LINEAR_API_TOKEN) instead of hardcoding - Rotate tokens regularly in Linear settings
- Use minimal required permissions when creating tokens
- Store tokens securely in production environments
This CLI tool caches ticket data locally for performance:
- Cache is stored temporarily and contains workspace data
- No sensitive authentication data is cached
- Clear cache regularly if sharing development machines
- Cache location: Current working directory (temporary files)
- All API communication uses HTTPS with TLS encryption
- API requests go directly to Linear's official API endpoints
- No third-party intermediaries are involved
- Certificate verification is enabled by default
We take security vulnerabilities seriously. If you discover a security issue:
DO NOT create a public issue for security vulnerabilities.
Instead, please report security vulnerabilities by:
- Email: Send details to [SECURITY_EMAIL] (replace with actual email)
- Subject: Include "SECURITY" in the subject line
- Details: Provide as much information as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fixes (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Regular Updates: At least weekly until resolution
- Resolution: Coordinated disclosure after fix is available
When reporting security issues, please include:
- Description: Clear description of the vulnerability
- Impact: How the vulnerability could be exploited
- Steps: Detailed steps to reproduce
- Environment: Python version, OS, CLI version
- Evidence: Screenshots, logs, or proof of concept (if safe)
- Use virtual environments for Python dependencies
- Keep dependencies updated regularly
- Don't commit
.envfiles containing tokens - Use separate tokens for development and production
- Store tokens in secure environment variables
- Use CI/CD secret management for automation
- Rotate API tokens regularly
- Monitor Linear audit logs for unexpected activity
- Limit token permissions to minimum required scope
When using in CI/CD pipelines:
# Good: Use secure environment variables
env:
LINEAR_API_TOKEN: ${{ secrets.LINEAR_API_TOKEN }}
# Bad: Never hardcode tokens
env:
LINEAR_API_TOKEN: "lin_api_1234567890" # ❌ DON'T DO THIS- Environment variable authentication (no hardcoded secrets)
- HTTPS-only API communication
- Input validation and sanitization
- Error handling that doesn't leak sensitive information
- No persistent token storage
- No telemetry or analytics data collection
- No third-party service integration
- Local-only data processing
- Temporary caching only
Currently, no security vulnerabilities have been reported or discovered.
For security-related questions or concerns:
- Security issues: [SECURITY_EMAIL]
- General questions: Create a GitHub issue (for non-security topics)
- Project maintainers: See CONTRIBUTING.md for contact information
Thank you for helping keep Linear Ticket Manager CLI and our users safe! 🔒