Currently supported versions with security updates:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability in opencode-review, please do not open a public issue.
Instead, send an email to: dawood@dawooddilawar.com
Please include:
- Description of the vulnerability
- Steps to reproduce the issue
- Affected versions you've tested
- Potential impact if exploited
- Confirmation — I'll respond within 48 hours to acknowledge receipt
- Investigation — I'll investigate and assess the severity
- Resolution — I'll work on a fix and coordinate disclosure with you
- Disclosure — Once fixed, I'll publicly disclose the vulnerability and credit you (if desired)
opencode-review is designed with security in mind:
- No code execution — Agents analyze diffs but don't run code
- No credential storage — API keys managed by
opencodeCLI - Read-only operations — Only reads git diffs and files
- Local execution — All processing happens on your machine
However, be aware:
- Diff content is sent to LLM providers (respect their privacy policies)
- Model choice matters — self-hosted models (Ollama) keep data local
- CI logs may contain code snippets if using
--verbose
This project has zero runtime npm dependencies. Only build-time dependencies:
typescript— Build tool@types/node— TypeScript definitions
Always report vulnerabilities in:
- Node.js runtime itself
opencodeCLI (separate project: https://github.com/opencode-dev/opencode)
This project has not yet undergone a formal security audit. Contributions for security hardening are welcome!
If you're looking to contribute security improvements, consider:
- Input validation for file paths
- Diff sanitization before sending to LLMs
- Config file permissions
- Environment variable handling
- Shell command injection prevention
Thanks for helping keep opencode-review secure! 🔒