| Version | Security fixes |
|---|---|
main (latest) |
✅ Yes |
| Older tags | ❌ No — please upgrade |
Fuseraft CLI is early-stage software. Only the latest commit on main and the most recent published release receive security fixes.
Please do not file a public GitHub issue for security vulnerabilities.
Use one of the two private channels below:
- Go to the Security tab of this repository.
- Click Report a vulnerability.
- Fill in the advisory form. GitHub keeps the report private until a fix is published.
Send a report to scstauf@gmail.com with:
- Subject:
[fuseraft-cli] Security report - A description of the vulnerability and its impact
- Steps to reproduce or a proof-of-concept (if available)
- Any suggested fix (optional but appreciated)
PGP encryption is not required but appreciated for highly sensitive reports.
| Milestone | Target |
|---|---|
| Acknowledgement | Within 5 business days |
| Initial assessment | Within 10 business days |
| Fix or mitigation | Within 90 days for critical; 180 days for lower severity |
| Public disclosure | After a fix is released (coordinated with reporter) |
If a fix will take longer than the target, we will communicate the delay and provide a mitigation or workaround if one is available.
We follow coordinated (responsible) disclosure:
- Security fixes are committed and released before any public discussion of the vulnerability.
- Once a fix is released, we publish a GitHub Security Advisory crediting the reporter (unless they prefer to remain anonymous).
- We ask reporters to refrain from public disclosure until the fix is released, or for a maximum of 90 days after the initial report — whichever comes first.
The following areas are in scope for security reports:
| Area | Notes |
|---|---|
| API key / credential storage | Keychain integration (SecretToolKeyStore, MacOsKeychainStore, WindowsCredentialManagerStore, PlainTextFallbackKeyStore) and ~/.fuseraft/config handling |
| Shell plugin | Command injection, sandbox bypass, sudo protection bypass |
| FileSystem plugin | Path traversal, sandbox escape |
| HTTP plugin | SSRF, allowlist bypass, private-IP filter bypass |
| Prompt injection | Adversarial tool results that override agent instructions |
| Session files | Permission issues in ~/.fuseraft/sessions/ or repl_events.jsonl |
| MCP server integration | Malicious tool schemas, argument injection from connected servers |
| Dependency vulnerabilities | Known CVEs in direct NuGet dependencies that are exploitable via fuseraft-cli |
Out of scope:
- Vulnerabilities that require the attacker to already have write access to
~/.fuseraft/or the project directory - Social engineering or phishing
- Issues in LLM provider infrastructure (Anthropic, OpenAI, xAI, etc.)
- Theoretical vulnerabilities without a realistic attack path
- Issues only reproducible with
Security.AllowPrivateHosts: trueand a deliberately misconfigured setup
For context on the existing security controls, see:
- Security & Sandbox — filesystem sandbox, HTTP allowlist, execution rings, sudo protection, and prompt injection detection
- Security — API key storage — OS keychain integration details