Ghostbox can connect local agents to personal channels and local vaults, so privacy and credential handling are security boundaries.
Security fixes target the current main branch until versioned releases begin.
Do not publish exploit details in a public issue.
Use GitHub private vulnerability reporting if it is available for this repository. If it is not available, contact the maintainer privately through GitHub and share only a minimal description until a private channel is established.
Please include:
- affected commit or version
- impacted bridge, API route, vault behavior, or ARK integration
- reproduction steps
- expected impact
- whether channel credentials, personal messages, vault files, API keys, or local host access are involved
High-priority areas:
- API auth bypass
- unauthorized message send or auto-reply behavior
- allowlist bypass in personal-channel bridges
- personal vault path or file disclosure
- provider credential leakage
- local host command execution beyond intended ARK boundaries
- path traversal in vault reads or writes
Out of scope:
- issues requiring already-compromised host administrator access
- denial of service without a privacy or security boundary impact
- reports against unreleased local experiments not reachable from
main