| Version | Supported |
|---|---|
| 0.1.x | Yes |
Do not open a public GitHub issue for security vulnerabilities.
Please use GitHub's private vulnerability reporting to disclose security issues responsibly. This keeps the report confidential until a fix is available.
- Description of the vulnerability
- Steps to reproduce
- Affected versions and components
- Impact assessment (if known)
- Acknowledgement — within 48 hours
- Initial assessment — within 1 week
- Fix or mitigation — depends on severity, but we aim for patches within 30 days for critical issues
ch4p ships with nine defense layers enabled by default:
- Filesystem scoping with symlink escape detection
- Command allowlist with shell metacharacter blocking
- AES-256-GCM encrypted secrets with PBKDF2 key derivation
- Output sanitization (25 regex patterns)
- Input validation (prompt injection and data exfiltration detection)
- Autonomy levels (readonly / supervised / full)
- SSRF protection (private IP blocking, DNS checks, cloud metadata guards)
- Secure file permissions (transcripts
0o600, log dirs0o700) - Pairing token expiration (30-day TTL)
For full details, see: