Security Policy

May 15, 2026 ยท View on GitHub

Supported versions

Security fixes target the current main branch and the latest published release artifacts when available. Older experimental branches are not supported unless a maintainer explicitly marks them as supported.

Reporting a vulnerability

Please do not open a public issue for a suspected vulnerability. Use GitHub private vulnerability reporting for ultraworkers/claw-code when available, or contact a maintainer through the repository's published support channel with a minimal, non-destructive reproduction.

Include:

  • affected command, crate, or workflow;
  • operating system and shell, especially for Windows/PowerShell path issues;
  • whether live credentials, MCP servers, plugins, or workspace filesystem access are involved;
  • expected impact and any safe proof-of-concept steps.

Do not include real API keys, private prompts, session transcripts with secrets, or exploit payloads that modify third-party systems.

Scope

In scope:

  • workspace path traversal or symlink escapes;
  • permission bypasses, sandbox misreporting, or unsafe tool execution;
  • credential disclosure in logs, JSON output, telemetry, docs, or examples;
  • plugin, hook, MCP, provider, or config behavior that can unexpectedly execute code or leak secrets.

Out of scope:

  • social engineering;
  • denial-of-service without a practical security impact;
  • issues that require already-compromised local developer credentials;
  • reports against third-party providers or upstream tools without a Claw Code integration issue.

Handling expectations

Maintainers will acknowledge valid private reports as soon as practical, keep discussion private until a fix or mitigation is available, and credit reporters when requested and appropriate.