If you discover a security vulnerability in the AI Context Plugin, please report it responsibly:
- Do not open a public issue
- Email security concerns to the maintainers
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Response time: We aim to respond within 48 hours.
This plugin contains no external runtime dependencies. All functionality is self-contained within Claude Code.
- Your
.ai-contextfiles stay local - No telemetry or analytics
- No data is sent to external servers
The plugin makes no network calls. All API communication is handled by Claude Code itself.
All code is open source. You can audit:
- Command definitions in
commands/ - Skill definitions in
skills/ - Schema in
schemas/
- Review generated context - Always review
.ai-contextbefore committing - Don't include secrets - Never put API keys, passwords, or tokens in context files
- Caution areas - Use the
cautionfield to mark sensitive code - .gitignore patterns - Consider what should be ignored
The .ai-context file should NOT contain:
- API keys or secrets
- Passwords or credentials
- Personal identifiable information (PII)
- Internal URLs not meant to be shared
It SHOULD contain:
- Public conventions and patterns
- Domain terminology (non-sensitive)
- Architectural decisions
- Warning areas for careful handling
The active_work.contact field should use team or role designations, not personal information:
# BAD - exposes personal information
active_work:
- area: "auth refactor"
contact: "john.smith@company.com" # Don't do this!
# GOOD - uses team designation
active_work:
- area: "auth refactor"
contact: "auth-team" # Safe for public reposUse the caution field to mark sensitive areas:
caution:
- path: "src/lib/payments/*"
reason: "Payment processing - PCI compliance"
severity: "critical"
requires:
- "security review"
- "team lead approval"
- path: "src/auth/*"
reason: "Authentication code - security sensitive"
severity: "warning"Use preferences.avoid to prevent insecure patterns:
preferences:
avoid:
- pattern: "eval()"
reason: "Security risk - code injection"
- pattern: "innerHTML"
reason: "XSS vulnerability - use textContent"- Execute arbitrary code
- Access network resources
- Read files outside the project
- Modify files without user action
- Store data externally
- Read project files to infer context
- Write
.ai-contextand related files - Parse YAML configuration
- Generate markdown documentation
The plugin's attack surface is minimal:
- Input: User responses to questions, codebase files
- Output: YAML and markdown files in project directory
- Execution: Only through Claude Code's controlled environment
We support security updates for:
- Current major version
- Previous major version (6 months after new major release)
Security-related changes will be noted in release notes with [SECURITY] prefix.