DO NOT open a public GitHub issue for security vulnerabilities.
Please report security vulnerabilities by emailing the maintainers directly or using GitHub's private vulnerability reporting feature.
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial response: Within 48 hours
- Triage and assessment: Within 5 business days
- Fix deployment: Within 14 days for critical issues
The following are in scope for security reports:
| In Scope | Out of Scope |
|---|---|
CLI code in /bin |
Third-party MCP servers |
Template files in /templates |
User-modified agent files |
| Package distribution integrity | GitHub Copilot vulnerabilities |
| Documentation accuracy for security guidance | VS Code extension issues |
- This package has zero runtime dependencies to minimize attack surface
- Always verify you're installing from the official npm registry
- Check
package-lock.jsonis present and matches expected checksums
The .agent.md files contain instructions that influence AI behavior. Users should:
- Review agent definitions before use in sensitive environments
- Understand that agents have access to tools defined in their frontmatter
- Be aware that
runSubagentallows autonomous agent execution
If using optional MCP servers:
- Only enable servers from trusted sources
- Pin versions in your
mcp.jsonconfiguration - Review what permissions each server requires
- MCP servers can execute code—treat them as you would any executable
The CLI performs file operations (copying templates). It:
- Only writes to the current working directory
- Does not execute any copied files
- Uses Node.js built-in
fsfunctions with no shell execution
This repository uses automated security scanning:
- npm audit: Runs on every PR and weekly, fails on high/moderate vulnerabilities
- Gitleaks: Scans for accidentally committed secrets
- CodeQL: Static analysis for JavaScript security issues
- SBOM generation: Creates CycloneDX Software Bill of Materials
Install locally to catch issues before commit:
pip install pre-commit
pre-commit installHooks include:
- Gitleaks: Block commits containing secrets
- File checks: Large files, merge conflicts, private keys
- Markdown linting: Keep docs clean
Generate a Software Bill of Materials for compliance:
npx @cyclonedx/cyclonedx-npm --output-file sbom.json- Review before running: Inspect template files before using in production
- Pin versions: Use specific versions in
package.jsondependencies - Audit regularly: Run
npm auditon projects using this package - Least privilege: Only enable MCP servers you actually need
- Secret hygiene: Never commit API keys or credentials
- Use pre-commit hooks: Install gitleaks to catch secrets before they're committed
We appreciate security researchers who help keep this project safe. Contributors who report valid vulnerabilities will be acknowledged here (with permission).
"Security isn't paranoia. It's preparation." — Beth