| Version | Supported |
|---|---|
| 1.2.x | Yes |
| 1.1.x | Yes |
| 1.0.x | Yes |
We take security seriously. If you discover a security vulnerability in SpecOps, please report it responsibly.
- Do NOT open a public GitHub issue for security vulnerabilities
- Use GitHub Security Advisories to report privately
- Alternatively, email security concerns to the repository maintainers
- Description of the vulnerability
- Steps to reproduce
- Affected files or components
- Potential impact assessment
- Suggested fix (if any)
- Acknowledgment: Within 48 hours of report
- Triage: Within 7 business days
- Fix: Dependent on severity, targeting 30 days for critical issues
- Disclosure: Coordinated disclosure after fix, with a 90-day maximum window
| Severity | Description | Example |
|---|---|---|
| Critical | Agent can be hijacked to execute unintended actions | Prompt injection via configuration that bypasses all guardrails |
| High | Data leakage or unauthorized file access | Spec generation that exposes secrets or PII from the codebase |
| Medium | Configuration bypass or validation failure | Schema accepts values that should be rejected (path traversal) |
| Low | Minor information disclosure or cosmetic security issue | Verbose error messages that leak internal paths |
- Prompt injection via
.specops.jsonconfiguration (especiallyteam.conventionsand custom templates) - Path traversal in
specsDiror template paths - Shell script vulnerabilities in
setup.shandverify.sh(command injection, unsafe variable handling) - Schema bypass allowing invalid or dangerous configuration values
- Data leakage through generated specification files
- Vulnerabilities in Claude Code itself (report to Anthropic)
- Vulnerabilities in Anthropic's API or infrastructure
- Issues in third-party dependencies of projects using SpecOps
- Social engineering attacks
SpecOps operates within the following trust boundaries:
-
.specops.jsonis a trust boundary: Anyone with write access to the project repository can modify.specops.json, which influences agent behavior. The agent validates and sanitizes configuration values, but organizations should treat.specops.jsonchanges with the same scrutiny as code changes. -
Custom templates are a trust boundary: Templates loaded from
<specsDir>/templates/are treated as structural content only. The agent does not execute instructions found in template files. -
Generated specs may contain sensitive architectural details: Design documents (
design.md) may describe security-relevant architecture. Organizations should review spec files before sharing broadly. -
The agent respects Claude Code's permission model: All file operations, git commands, and external actions are subject to Claude Code's built-in permission system. SpecOps does not bypass these controls.
- Review
.specops.jsonchanges in PRs just like code changes - Set
autoCommit: falseandcreatePR: falsein sensitive environments - Use
reviewRequired: trueto require human review before implementation - Do not store secrets in
.specops.jsonor specification files - Add
.specops/to your project's.gitignoreif specs contain sensitive architectural details
This project undergoes periodic security reviews using Claude Code's /security-review command, which performs automated static analysis with false-positive filtering and confidence scoring.
Latest audit: 2026-03-02 — No high-confidence vulnerabilities found. See SECURITY-AUDIT.md for the full report.
Audits are recommended before each release and after changes to security-sensitive files.