Skip to content

Security: friuns2/claw-code-android

Security

SECURITY.md

Security Policy

Supported versions

Security fixes target the current main branch and the latest published release artifacts when available. Older experimental branches are not supported unless a maintainer explicitly marks them as supported.

Reporting a vulnerability

Please do not open a public issue for a suspected vulnerability. Use GitHub private vulnerability reporting for ultraworkers/claw-code when available, or contact a maintainer through the repository's published support channel with a minimal, non-destructive reproduction.

Include:

  • affected command, crate, or workflow;
  • operating system and shell, especially for Windows/PowerShell path issues;
  • whether live credentials, MCP servers, plugins, or workspace filesystem access are involved;
  • expected impact and any safe proof-of-concept steps.

Do not include real API keys, private prompts, session transcripts with secrets, or exploit payloads that modify third-party systems.

Scope

In scope:

  • workspace path traversal or symlink escapes;
  • permission bypasses, sandbox misreporting, or unsafe tool execution;
  • credential disclosure in logs, JSON output, telemetry, docs, or examples;
  • plugin, hook, MCP, provider, or config behavior that can unexpectedly execute code or leak secrets.

Out of scope:

  • social engineering;
  • denial-of-service without a practical security impact;
  • issues that require already-compromised local developer credentials;
  • reports against third-party providers or upstream tools without a Claw Code integration issue.

Handling expectations

Maintainers will acknowledge valid private reports as soon as practical, keep discussion private until a fix or mitigation is available, and credit reporters when requested and appropriate.

There aren't any published security advisories