| Version | Supported |
|---|---|
| 1.x.x | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability, please report it via one of the following channels:
-
GitHub Private Vulnerability Reporting (preferred):
Go to Security Advisories and open a private advisory. -
Email: Open an issue with the label
securityand we will contact you privately.
- A clear description of the vulnerability
- Steps to reproduce the issue
- Potential impact (e.g., credential leak, code execution, data exposure)
- Any suggested fix, if you have one
- Acknowledgement within 48 hours
- Status update within 7 days
- We will work with you on a coordinated disclosure timeline
- Never commit API keys to your repository
- Set keys via Command Palette:
Revvy: Set OpenAI API KeyorRevvy: Set Anthropic API Key - Keys are stored in your OS keychain via VS Code's SecretStorage API (macOS Keychain, Windows Credential Manager, Linux libsecret) — they never appear in settings.json or any plaintext file
- To remove stored keys:
Revvy: Clear All API Keys - For team/enterprise use, prefer GitHub Copilot (no personal API key required)
- The
.vscode/mcp.jsonfile uses VS Code'spromptStringinputs — tokens are prompted at runtime and never stored on disk - Never replace
${input:...}references with hardcoded token values - Treat your GitHub/GitLab/Atlassian tokens as passwords — use the minimum required scopes
- Rule profiles (
.vscode-reviewer/profiles/*.yaml) are local configuration files - They may contain
ticket_contextdata fetched from Jira — do not commit profiles with sensitive ticket data to public repositories - Add your profiles folder to
.gitignoreif it may contain sensitive context
- The extension's WebView panel uses VS Code's sandboxed WebView environment
- All user-provided content is HTML-escaped before rendering
- File content is read from the workspace and rendered as syntax-highlighted code only