| Version | Supported |
|---|---|
| 0.1.x | Yes |
If you discover a security vulnerability in CodeGenesis, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please send an email to the maintainers or use GitHub's private vulnerability reporting feature on this repository.
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix or mitigation: Depends on severity, but we aim for 30 days for critical issues
CodeGenesis executes Claude Code CLI as a subprocess with access to the local filesystem. Keep the following in mind:
- Review YAML pipelines before running them. Pipelines can specify
allowed_toolsthat grant Claude access to tools likeBash,Write, andEdit. Only run pipelines from trusted sources. - Use
allowed_toolsto restrict access. Limit each step to only the tools it needs. For example, a planning step should not needBashaccess. - Set
timeout_secondsappropriately. This acts as a safety net, especially when using unlimitedmax_turns.
- CodeGenesis operates within the specified
working_directory. Be cautious when pointing it at sensitive directories. - Avoid running pipelines with
working_directoryset to system-critical paths.
- Never commit API keys or secrets to the repository
- Use environment variables or secure secret management for credentials
- The
.gitignorealready excludes.env,secrets.json, and credential files
- We regularly review and update dependencies for known vulnerabilities
- Run
dotnet list package --vulnerableto check for known issues in your local copy