The following versions of autospec are currently supported with security updates:
| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
DO NOT open a public GitHub issue for security vulnerabilities.
Instead, please report security vulnerabilities by emailing the maintainers directly or using GitHub's private vulnerability reporting feature:
- Go to the Security tab of this repository
- Click "Report a vulnerability"
- Provide details about the vulnerability
When reporting a vulnerability, please include:
- Description: A clear description of the vulnerability
- Impact: What an attacker could achieve by exploiting this vulnerability
- Steps to reproduce: Detailed steps to reproduce the issue
- Affected versions: Which versions are affected
- Possible fix: If you have suggestions for how to fix the issue
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Initial assessment: We will provide an initial assessment within 7 days
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- We follow a coordinated disclosure process
- We will work with you to understand and resolve the issue
- Once fixed, we will publish a security advisory
- We will credit reporters (unless they prefer to remain anonymous)
When using autospec:
- Store sensitive configuration in environment variables, not config files
- Do not commit
.autospec/config.jsonif it contains sensitive data - Use appropriate file permissions for config files
- Never hardcode API keys in scripts or configuration
- Use environment variables for API keys (
ANTHROPIC_API_KEY) - Rotate API keys periodically
- Be cautious when using
custom_claude_cmdwith untrusted input - Validate spec names and paths before use
- Review generated commands before execution in production
- The tool writes to
~/.autospec/state/for retry state - Ensure appropriate permissions on state directory
- Review specs directory permissions
The tool executes external commands (Claude CLI, SpecKit CLI). While we sanitize inputs, users should:
- Not pass untrusted input directly to commands
- Review custom command templates before use
- Be cautious with user-provided spec names in automated environments
The tool reads and writes files in the specs directory and state directory:
- Files are created with default permissions
- No special handling for symlinks (may follow symlinks)
- State files contain workflow metadata, not sensitive data
Security updates will be released as patch versions. Subscribe to releases to be notified:
- Go to the repository
- Click "Watch" > "Custom" > Select "Releases"
For security concerns that don't fit the vulnerability reporting process, contact the maintainers through the repository's discussion forum.
Thank you for helping keep autospec secure!