We provide security updates for the following versions of CapiscIO CLI:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
We take the security of CapiscIO CLI seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to: [email protected]
You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message.
Please include the following information in your report:
- Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
CapiscIO CLI is designed with security in mind:
- Uses HTTPS by default for all remote requests
- Implements proper timeout handling to prevent hanging connections
- Does not store or cache sensitive information
- Uses standard HTTP headers and follows security best practices
- All JSON input is parsed safely
- URL validation prevents malicious redirects
- File path validation prevents directory traversal attacks
- Input sanitization for all user-provided data
- Minimal dependency footprint to reduce attack surface
- Regular dependency auditing and updates
- No external service dependencies that could be compromised
- No persistent storage of validated agent cards
- No transmission of sensitive data to external services
- All validation is performed locally
When we receive a security bug report, we will:
- Acknowledge receipt of your report within 48 hours
- Assess the vulnerability and determine its impact
- Develop a fix for the issue
- Test the fix thoroughly
- Release a patch version as soon as possible
- Notify the community about the security update
- Critical vulnerabilities: Patch within 7 days
- High vulnerabilities: Patch within 14 days
- Medium/Low vulnerabilities: Patch in next regular release
We believe in giving credit to security researchers who help make our software safer. If you report a security vulnerability, we will:
- Credit you in the security advisory (unless you prefer to remain anonymous)
- Include your name in the CHANGELOG for the release that fixes the issue
- Provide a brief description of your contribution
- Keep Updated: Always use the latest version of CapiscIO CLI
- Verify Sources: Only validate agent cards from trusted sources
- Network Security: Be cautious when validating URLs from untrusted sources
- File Permissions: Ensure proper file permissions on agent card files
- CI/CD Security: Use JSON output mode in automated environments
- Use Strict Mode: Enable strict validation for production deployments
- Network Isolation: Consider running validation in isolated environments
- Logging: Monitor validation logs for suspicious activity
- Access Control: Limit who can run validation commands in production
- Validate Input: Always validate agent cards before deployment
- Use HTTPS: Ensure agent cards are served over HTTPS
- Content Security: Implement proper Content-Security-Policy headers
- Regular Audits: Regularly audit your agent card configurations
This security policy applies to:
- The CapiscIO CLI codebase
- npm package distribution
- GitHub repository and releases
- Documentation and examples
This policy does not cover:
- Third-party agent cards validated by the CLI
- External services that agent cards may reference
- User-specific configurations or environments
For general security questions (not vulnerability reports), please contact: [email protected]
For urgent security matters, you may also reach out via:
- GitHub Security Advisory (for confirmed vulnerabilities)
- Direct message to maintainers (for clarification only)
By reporting security vulnerabilities, you agree that:
- You will not access, modify, or delete data belonging to others
- You will not perform any attacks that could harm the reliability or integrity of our services
- You will not disclose the vulnerability publicly until we have had time to address it
- Your testing and research comply with applicable laws
Thank you for helping keep CapiscIO CLI and our users safe!\n