| Version | Supported |
|---|---|
| 1.x.x | ✅ |
We take security seriously. If you discover a security vulnerability, please report it responsibly.
- Do NOT open a public GitHub issue for security vulnerabilities
- Use GitHub Security Advisories to report privately
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment within 48 hours
- Regular updates on progress
- Credit in release notes (unless you prefer anonymity)
Specter implements several security measures:
- All shell commands use
spawnSyncwith argument arrays - User input is never interpolated into shell strings
- See
src/compare.tsfor the securegitCommand()pattern
- Dependabot enabled for automatic security updates
npm auditruns in CI pipeline- CodeQL analysis on every PR
- All changes require PR review
- Security-sensitive changes get extra scrutiny
- Biome security rules enforced
Specter executes git commands on user repositories. While we sanitize inputs, users should:
- Only run Specter on trusted codebases
- Review the commands Specter runs (use
--verboseflag)
When running as an MCP server, Specter exposes tools to AI assistants. The tools are read-only and do not modify code.
Security fixes are released as patch versions. We recommend:
- Keeping Specter updated to the latest version
- Subscribing to GitHub releases for notifications