Please do not report security vulnerabilities through public GitHub issues.
Instead, please use GitHub's private vulnerability reporting:
- Go to https://github.com/GeiserX/cc-agents-md/security/advisories
- Click "Report a vulnerability"
- Fill out the form with details
We will respond within 48 hours and work with you to understand and address the issue.
- Type of issue (e.g., command injection, path traversal)
- Full paths of affected source files
- Step-by-step instructions to reproduce
- Proof-of-concept or exploit code (if possible)
- Impact assessment and potential attack scenarios
| Version | Supported |
|---|---|
| 0.x.x | Current release |
Only the latest version receives security updates. We recommend always running the latest version.
- Read-only: The loader script (
loader.sh) only reads AGENTS.md files — it never writes, deletes, or modifies any files. - Bounded traversal: Directory walking is bounded between the current working directory and the git root. It cannot escape the repository.
- No symlink exploitation: Standard
catfollows symlinks, but the walk is bounded to the repo root, limiting the attack surface.
- The
setupcommand modifies~/.claude/settings.jsonto add a hook entry. It merges non-destructively and never overwrites existing settings. - The
removecommand only removes the specific hook entry added by this tool.
- The hook script runs as a
command-type hook in Claude Code's hook system, inheriting the user's shell permissions. - No user input is passed to shell commands — the script only uses
$CLAUDE_PROJECT_DIR(set by Claude Code) and filesystem paths.
- Never execute user-controlled strings — All shell operations use hardcoded commands and paths.
- Validate paths — Directory traversal is bounded to the git root.
- Fail silently — The loader script never blocks a Claude Code session, even on errors.
Last updated: April 2026