We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
- Do NOT create a public issue for security vulnerabilities
- Report vulnerabilities through GitHub's Security Advisory feature:
- Go to the Security tab
- Click "Report a vulnerability"
- Fill out the advisory form with details
If you cannot use GitHub's Security Advisory feature, you can email security reports to:
- Email: [email protected]
- Subject: [SECURITY] Claude Code Toolkit Vulnerability Report
When reporting a security vulnerability, please include:
- Description: Clear description of the vulnerability
- Impact: Potential security impact and affected components
- Reproduction: Step-by-step instructions to reproduce the issue
- Environment: Operating system, shell version, and Node.js version
- Proof of Concept: If applicable, include a minimal example
- Suggested Fix: If you have ideas for how to fix the issue
- Acknowledgment: We will acknowledge receipt within 48 hours
- Investigation: We will investigate and assess the vulnerability
- Timeline: We aim to provide an initial response within 5 business days
- Resolution: Security fixes will be prioritized and released as soon as possible
- Disclosure: We will coordinate disclosure timing with the reporter
-
Storage: API keys are stored in:
~/.claude/providers.json(provider configurations)- Environment variables (
ANTHROPIC_API_KEY) - Shell configuration files (
.bashrc,.profile, etc.)
-
Permissions: Ensure proper file permissions:
chmod 600 ~/.claude/providers.json chmod 600 ~/.bashrc ~/.profile
-
Best Practices:
- Never commit API keys to version control
- Use environment variables when possible
- Regularly rotate API keys
- Monitor API key usage for unauthorized access
- Configuration Directory:
~/.claude/should have restricted permissions - Backup Files: Be aware that some operations create temporary backup files
- Shell Configuration: Changes to shell files affect environment security
- HTTPS Only: All API communications use HTTPS
- Certificate Validation: Ensure your system validates SSL certificates
- Proxy Configuration: Be cautious when using HTTP proxies with API requests
- Node.js Security: Keep Node.js updated to the latest stable version
- npm Packages: The toolkit installs
@anthropic-ai/claude-codeglobally - Package Integrity: npm package integrity is verified during installation
- Input Validation: Provider names and URLs are validated before storage
- Safe File Operations: Atomic file writes prevent corruption during updates
- Environment Isolation: Each provider configuration is isolated
- No Plain Text Logging: API keys are never logged in plain text
- Regular Updates: Keep the toolkit updated to the latest version
- Access Control: Limit access to configuration files and directories
- API Key Management: Use dedicated API keys with minimal required permissions
- Network Security: Use the toolkit only on trusted networks
- System Security: Keep your operating system and shell updated
- Command Injection: Unsafe command execution or parameter handling
- Path Traversal: Unauthorized file system access
- Credential Exposure: API keys or secrets exposed in logs or files
- Privilege Escalation: Unauthorized elevation of user permissions
- Supply Chain: Compromised dependencies or malicious packages
- Configuration Issues: Insecure default configurations
- Input Validation: Insufficient validation of user inputs
The following are generally not considered security vulnerabilities:
- Issues requiring physical access to the user's machine
- Social engineering attacks
- Issues in third-party APIs or services (report to the respective vendors)
- Denial of service attacks against external APIs
- Issues that require the user to install malicious software
- Missing security headers on third-party API responses
- Verify Sources: Only download scripts from the official repository
- Review Code: Review scripts before execution, especially when using curl/wget
- Secure Installation: Use official installation methods when possible
- Strong API Keys: Use API keys with appropriate scoping and rotation
- File Permissions: Set restrictive permissions on configuration files
- Regular Audits: Periodically review stored configurations and credentials
- Principle of Least Privilege: Only provide necessary API permissions
- Network Security: Use the toolkit only on trusted, secure networks
- Update Regularly: Keep the toolkit and dependencies updated
- Monitor Usage: Monitor API key usage for unexpected activity
Security updates will be released through:
- GitHub Releases: Tagged releases with security fixes
- Security Advisories: GitHub Security Advisory notifications
- Repository Updates: Updated installation scripts and documentation
To stay informed about security updates:
- Watch this repository for security notifications
- Subscribe to repository releases
- Follow the project's security advisory feed
For security-related questions or concerns:
- Security Reports: Use GitHub Security Advisory or email [email protected]
- General Security Questions: Create a discussion in the repository
- Documentation Issues: Create a regular issue for non-sensitive documentation improvements
Note: This security policy applies to the Claude Code Toolkit repository and scripts. For security issues with the underlying @anthropic-ai/claude-code package or Anthropic's API, please report to the respective maintainers.