| Version | Supported |
|---|---|
| 1.x | ✅ Yes |
Do NOT open a public GitHub issue for security vulnerabilities.
Please report vulnerabilities privately:
- Email the maintainer directly via GitHub: @bosekarmegam
- Include a clear description of the vulnerability, steps to reproduce, and potential impact
- We will acknowledge receipt within 48 hours
- We aim to resolve critical issues within 7 days
- 90-day embargo from the date of private disclosure
- We will coordinate a public disclosure date with the reporter
- A CVE will be requested for confirmed vulnerabilities with significant impact
- Security advisories will be published via GitHub Security Advisories
- Zero secrets logging — stdout capture always runs through
scrub_stdout()which redacts API keys, tokens, and passwords - No outbound network calls in core — the core library never connects to the internet
- User-owned API keys —
stepcastnever holds, proxies, or transmits your Gemini API key - Config file permissions —
~/.stepcast/config.tomlis created withchmod 600on Linux/macOS - Path traversal protection — all user-provided file paths are sanitised before use
- The
dashboardoptional dependency runs a local web server. By default it binds to127.0.0.1(localhost only). Never expose the dashboard withSTEPCAST_HOST=0.0.0.0without settingSTEPCAST_AUTH_KEY. - The Gemini integration sends step stdout to Google's API. Do not enable
narrate=Truefor steps that may output sensitive data.
Built by Suneel Bose K