We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 0.0.x | ✅ |
The Git Scout team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
-
GitHub Security Advisories (Preferred)
- Go to the Security tab of the repository
- Click "Report a vulnerability"
- Fill out the form with details
-
Email
- Send an email to: malcohelper@users.noreply.github.com
- Include the word "SECURITY" in the subject line
- Provide a detailed description of the vulnerability
To help us better understand and resolve the issue, please include:
- Type of vulnerability (e.g., XSS, CSRF, SQL injection, command injection, etc.)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability (what an attacker could do)
- Suggested fix (if you have one)
- Initial Response: Within 48 hours of receiving your report
- Status Update: Within 7 days with our assessment
- Fix Release: Varies depending on complexity, but typically within 30 days
- Acknowledgment: We'll confirm receipt of your vulnerability report
- Communication: We'll keep you informed as we investigate and work on a fix
- Credit: With your permission, we'll publicly acknowledge your contribution in the release notes
- Disclosure: We'll coordinate with you on the disclosure timeline
When using Git Scout:
- Keep Updated: Always use the latest version to get security patches
- Permissions: Be cautious about granting file system access
- Configuration: Protect your
~/.git-scout/config.jsonfile - CI/CD Secrets: Store Slack webhook URLs and other sensitive data in environment variables or secrets management systems
- Review Code: When installing from source, review the code before running
- Git Scout requires read access to your Git repositories
- Configuration files may contain repository paths
- CI/CD integration may require webhook URLs (store securely)
- The tool executes Git commands on your local system
Security updates will be announced via:
- GitHub Security Advisories
- Release notes in CHANGELOG.md
- GitHub Releases page
Git Scout uses several npm packages. We:
- Regularly audit dependencies for known vulnerabilities
- Keep dependencies up to date
- Run automated security scans via GitHub Dependabot
If you have questions about this security policy, please open a GitHub Discussion.
Thank you for helping keep Git Scout and its users safe! 🔒