Only the latest minor release receives security updates.
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
Please do not open a public GitHub issue for security vulnerabilities.
Instead, email tehnic@finesynergy.eu with:
- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Any proof-of-concept code (optional)
You should receive an acknowledgment within 72 hours. If the vulnerability is confirmed, we will:
- Work with you on a fix
- Release a patch as soon as possible
- Publicly disclose the issue after the fix is available, crediting you if you wish
Thank you for helping keep the Cost AI 4 Claude users safe.
Cost AI 4 Claude handles potentially sensitive data:
- SSH credentials (private keys, passwords) in
~/.config/cai4claude/hosts.yaml - Claude Code session content (prompts, responses, code snippets) synced from remote hosts
- Project names and task categories exposed as Prometheus labels
hosts.yamlis written with0600permissions- Remote cache at
~/.cache/cai4claude/hosts/inherits user-only permissions - No telemetry or outbound network calls except to user-configured SSH hosts and LiteLLM pricing feed
- All source code is auditable (MIT, public)
- Passwords in
hosts.yamlare stored in plaintext. SSH key authentication is strongly preferred. StrictHostKeyChecking=nois used by default. Override if running over untrusted networks.- Session data synced from remote hosts is not encrypted at rest on the local machine.
If your threat model requires stronger guarantees (full disk encryption of cache, encrypted config), open an issue — we are happy to discuss additions.