If you discover a security vulnerability in this project, please report it responsibly:
- Do NOT open a public GitHub issue
- Email the maintainers directly or use GitHub's private vulnerability reporting feature
- Include detailed information about the vulnerability:
- Description of the issue
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
This project implements several security controls:
- Uses
execFileandexecFileSyncinstead ofexecto prevent shell injection - Validates all user-provided git references against a strict pattern
- No user input is directly interpolated into shell commands
- All file paths are validated to ensure they remain within the working directory
- Symlinks are resolved and checked against the working directory
- Only
.jsand.mjsfiles are allowed for proof-of-concept execution
- Git references are validated with regex patterns
- File paths undergo realpath resolution and boundary checks
- Timeout and buffer limits on executed commands
- PoC execution is limited to Node.js scripts only
- 30-second timeout on PoC execution
- 1MB output buffer limit
This tool is designed to identify security vulnerabilities in code, including:
- Hardcoded secrets
- Injection vulnerabilities (SQL, XSS, Command Injection, SSRF)
- Broken access control
- Insecure data handling
- Authentication issues
- LLM safety concerns
- Privacy violations
When contributing to this project:
- Never commit secrets or credentials
- Run security analysis on your changes before submitting PRs
- Follow secure coding practices
- Keep dependencies up to date
- Run
npm auditregularly
- Dependencies are regularly updated
npm auditis run to identify vulnerable dependencies- Lock files are committed to ensure reproducible builds
This project is licensed under the Apache License 2.0. See LICENSE for details.