If you discover a security vulnerability in Claude Forge, please report it responsibly:
- Do NOT open a public issue
- Email: Open a private security advisory on GitHub
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Assessment: Within 1 week
- Fix: Depends on severity (Critical: ASAP, High: 1 week, Medium: 2 weeks)
- Secrets accidentally committed to the repository
- Hook scripts with command injection vulnerabilities
- Settings that could lead to data exposure
- Permission configurations that are overly permissive
- Vulnerabilities in Claude Code itself (report to Anthropic)
- Vulnerabilities in MCP servers (report to respective maintainers)
- Social engineering attacks
-
Never commit secrets to your fork
- Use
settings.local.jsonfor sensitive environment variables settings.local.jsonis in.gitignoreby default
- Use
-
Review hooks before enabling
- All hook scripts are in
hooks/directory - Read each script before running
install.sh
- All hook scripts are in
-
Keep your fork updated
git fetch upstream git merge upstream/main
| Version | Supported |
|---|---|
| 1.x | Yes |