If you discover a security vulnerability in Stave, please report it privately. Do not open a public GitHub issue, pull request, or discussion post.
Preferred reporting channel: use GitHub Security Advisories on this repository to open a private advisory. This routes the report directly to the maintainers and allows coordinated disclosure.
Please include:
- A description of the issue and its potential impact.
- Steps to reproduce, ideally with a minimal test case or proof of concept.
- The Stave version (from
Settings -> Aboutorpackage.json) and your OS. - Any relevant logs, configuration, or provider context.
We aim to acknowledge reports within 5 business days and share an initial assessment within 10 business days. We will coordinate a disclosure timeline with the reporter once the issue is confirmed.
Security fixes target the latest released version. Older versions are not maintained. We recommend keeping Stave updated from the top-bar in-app update action or by re-running the installer.
In scope:
- The Stave desktop application and its Electron main / renderer processes.
- The repository's build and packaging tooling under
scripts/andelectron-builder.yml. - The renderer-to-main IPC bridge and provider runtime adapters.
Out of scope:
- Vulnerabilities in third-party providers (Claude, Codex) — report those upstream to the respective vendor.
- Issues that require a compromised local machine or rely on an attacker already having physical or administrative access.
- Rate limits, SSL/TLS grade, or configuration recommendations for services Stave talks to but does not operate.