Skip to content

Security audit & pin agent-browser version in postinstall#1452

Open
sjursky wants to merge 2 commits intoruvnet:mainfrom
sjursky:claude/audit-api-key-security-kvC3X
Open

Security audit & pin agent-browser version in postinstall#1452
sjursky wants to merge 2 commits intoruvnet:mainfrom
sjursky:claude/audit-api-key-security-kvC3X

Conversation

@sjursky
Copy link
Copy Markdown

@sjursky sjursky commented Mar 26, 2026

Summary

This PR documents a comprehensive security audit of the repository and implements a supply chain hardening recommendation by pinning the agent-browser package version in the postinstall script.

Changes

  • Added security audit report (docs/security/API-KEY-AUDIT-2026-03-26.md): Documents a full repository scan for leaked API keys, hardcoded secrets, and supply chain risks. Results show no real credentials were leaked, with all matches being safe documentation placeholders or test fixtures.

  • Pinned agent-browser version: Updated v3/@claude-flow/browser/package.json postinstall script to install agent-browser@0.6.0 instead of @latest, reducing supply chain attack surface by ensuring deterministic dependency installation.

Implementation Details

The postinstall script change replaces two instances of agent-browser@latest with the pinned version agent-browser@0.6.0 (matching the version constraint already specified in dependencies). This prevents unexpected major version updates during installation and aligns with the audit's supply chain hardening recommendations.

The security audit confirms:

  • ✅ No real API keys or credentials committed
  • ✅ No hardcoded passwords in source code
  • ✅ No private keys or .env files in repository
  • ✅ All false positives are safe documentation/test fixtures

claude added 2 commits March 26, 2026 16:00
Full repository scan for leaked API keys, hardcoded credentials,
and supply chain risks. All matches are placeholders, test fixtures,
or documentation examples. Two minor hardening recommendations noted.

https://claude.ai/code/session_01RiUrksVbu4ZcMi3exqU7cM
Replace @latest with @0.6.0 to prevent automatic installation of
a potentially compromised version if the npm package is hijacked.

https://claude.ai/code/session_01RiUrksVbu4ZcMi3exqU7cM
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants