Skip to content

Security: claude-did-this/claude-hub

Security

SECURITY.md

Security Policy

Intelligence Assist projects handle system integration and AI automation, making security a top priority. We appreciate the security research community's help in keeping our projects safe.

Supported Versions

We actively maintain and provide security updates for:

Project Version Supported
MCPControl Latest release
claude-hub Latest release
ADHD Framework Development

Reporting a Vulnerability

Please do not report security vulnerabilities through public GitHub issues.

Instead, please report security vulnerabilities by emailing: [email protected]

Include the following information:

  • Description of the vulnerability
  • Steps to reproduce the issue
  • Affected versions/components
  • Any potential impact assessment
  • Suggested mitigation if known

What to Expect

  1. Acknowledgment - We'll acknowledge receipt within 48 hours
  2. Initial Assessment - We'll provide an initial assessment within 1 week
  3. Updates - We'll keep you informed of progress toward resolution
  4. Disclosure - We'll coordinate responsible disclosure timing with you

Security Considerations by Project

MCPControl

  • System Access: Grants LLMs direct computer control
  • Privilege Escalation: Monitor for unauthorized privilege requests
  • Data Access: Potential access to sensitive files and applications
  • Network Activity: May initiate network connections

claude-hub

  • Container Isolation: Docker containers must remain properly sandboxed
  • Webhook Security: Validate all incoming webhook payloads
  • Resource Limits: Prevent container resource exhaustion attacks
  • Network Segmentation: Containers should not access internal networks

ADHD Framework

  • Data Privacy: Handles personal productivity and health data
  • Authentication: Discord bot tokens and API credentials
  • Third-party Integrations: Security of connected productivity tools
  • Notification Security: Prevent information leakage through notifications

Security Best Practices for Contributors

  • Never commit secrets - Use environment variables and .env files
  • Validate all inputs - Sanitize user inputs and webhook payloads
  • Principle of least privilege - Request minimum necessary permissions
  • Audit dependencies - Keep dependencies updated and scan for vulnerabilities
  • Test in isolation - Use sandboxed environments for testing system interactions

Bounty Program

While we don't currently offer a formal bug bounty program, we deeply appreciate security research and will:

  • Provide public acknowledgment (if desired)
  • Fast-track fixes for critical vulnerabilities
  • Consider the researcher for future security consulting opportunities

Contact

For security-related questions or concerns:

  • Email: [email protected]
  • Response Time: Within 48 hours
  • Emergency Contact: For critical vulnerabilities requiring immediate attention

Thank you for helping keep Intelligence Assist projects secure!

There aren’t any published security advisories