添加 claude code game studios 到项目
This commit is contained in:
80
SECURITY.md
Normal file
80
SECURITY.md
Normal file
@@ -0,0 +1,80 @@
|
||||
# Security Policy
|
||||
|
||||
## Supported Versions
|
||||
|
||||
Only the `main` branch receives security fixes. Forks and older releases are
|
||||
not supported.
|
||||
|
||||
## Reporting a Vulnerability
|
||||
|
||||
**Do not report security vulnerabilities through public GitHub issues.**
|
||||
|
||||
Use GitHub's private vulnerability reporting instead:
|
||||
|
||||
**[Report a vulnerability →](https://github.com/Donchitos/Claude-Code-Game-Studios/security/advisories/new)**
|
||||
|
||||
Include as much detail as possible:
|
||||
- Description of the vulnerability and what it affects
|
||||
- Steps to reproduce
|
||||
- Potential impact and attack scenarios
|
||||
- Any suggested mitigations
|
||||
|
||||
**What to expect:**
|
||||
- Acknowledgment within **48 hours**
|
||||
- Status update within **7 days**
|
||||
- Resolution within **90 days** for confirmed vulnerabilities
|
||||
|
||||
## What Is In Scope
|
||||
|
||||
CCGS is a **local development tool** — it installs shell hooks and coordinates
|
||||
AI agents that run directly on your machine. Security issues are primarily about
|
||||
contributed code that executes in users' environments without their awareness.
|
||||
|
||||
### High Severity
|
||||
- Hooks (`.claude/hooks/*.sh`) that execute malicious or undisclosed shell
|
||||
commands on user machines
|
||||
- Skills or agents that exfiltrate environment variables, API keys, or secrets
|
||||
- Prompt injection via skill or agent definitions that causes Claude to bypass
|
||||
safety measures or take unauthorized destructive actions
|
||||
- Contributions that silently alter behavior in ways users cannot audit
|
||||
|
||||
### Medium Severity
|
||||
- Skills that make undisclosed outbound network requests
|
||||
- Agent definitions that escalate permissions or bypass user confirmation prompts
|
||||
- Hook patterns that behave differently across platforms to conceal behavior
|
||||
- Skills that write outside their documented scope without an explicit user
|
||||
approval step
|
||||
|
||||
### Out of Scope
|
||||
- The behavior of Claude or the Claude Code CLI itself
|
||||
(report to [Anthropic](https://www.anthropic.com/security))
|
||||
- Bugs in the user's Claude Code installation or editor extension
|
||||
- Theoretical vulnerabilities with no realistic attack path
|
||||
- Issues requiring physical access to the user's machine
|
||||
|
||||
## Security Guidelines for Contributors
|
||||
|
||||
When contributing hooks, skills, or agents:
|
||||
|
||||
- **Hooks must be POSIX-compatible** — use `grep -E`, not `grep -P`; avoid
|
||||
platform-specific syntax that behaves differently across operating systems
|
||||
- **No silent network calls** from hooks or skills unless explicitly documented
|
||||
and opt-in by the user
|
||||
- **No reading secrets or environment variables** beyond what is minimally
|
||||
required and clearly documented in the skill's header
|
||||
- **Skills must not write outside their documented scope** without an explicit
|
||||
user confirmation step
|
||||
|
||||
## Disclosure Policy
|
||||
|
||||
We follow a **90-day coordinated disclosure** timeline:
|
||||
|
||||
1. You submit the vulnerability privately
|
||||
2. We acknowledge within 48 hours
|
||||
3. We confirm and assess severity within 7 days
|
||||
4. We develop and test a fix
|
||||
5. We notify you before any public disclosure
|
||||
6. Public disclosure happens after the fix ships, or at 90 days — whichever
|
||||
comes first
|
||||
|
||||
We credit reporters in release notes unless you prefer to remain anonymous.
|
||||
Reference in New Issue
Block a user