We take the security of this project seriously. As an installer tool that creates symlinks and runs on user systems, we're committed to ensuring the safety and integrity of all installation scripts, commands, and skills.
This project follows a rolling release model. The main branch is the only supported version.
| Version | Supported |
|---|---|
| main | ✅ |
To ensure you have the latest security fixes and updates:
cd ~/agentic-slash-commands
git pullThe symlink-based installation means updates are immediately available across all platforms without reinstallation.
We use GitHub's Security Advisory feature for private vulnerability reporting.
- Navigate to the Security Advisories page
- Click "Report a vulnerability"
- Fill out the advisory form with detailed information
Please include as much information as possible:
- Description - Clear explanation of the vulnerability
- Steps to reproduce - Detailed steps to trigger the issue
- Potential impact - What could an attacker achieve?
- Affected platforms - Claude Code, Codex, Gemini CLI, or all?
- Suggested fix - If you have ideas for remediation
- Initial response: Within 48-72 hours
- Status update: Within 7 days
- Fix timeline: Depends on severity and complexity
We'll keep you informed throughout the process and credit you in the security advisory (unless you prefer to remain anonymous).
Our installation scripts include several safety measures:
- Validation checks - Scripts verify symlink targets exist before creation
- Broken link detection - Tests identify and report broken symlinks
- Backup functionality - Auto-backup before overwriting existing files
- Idempotence testing - Multiple installations don't break existing setup
The test suite (tests/run-tests.sh) validates:
- Symlinks point to valid files in the repository
- No broken or dangling symlinks after installation
- Repeated installations produce consistent results
- Backup files are created correctly
Each platform has dedicated installation scripts:
scripts/install-claude.sh- Claude Code onlyscripts/install-codex.sh- Codex onlyscripts/install-gemini.sh- Gemini CLI only
This separation prevents cross-platform contamination and ensures platform-specific behaviour is isolated.
Our GitHub Actions workflows follow security best practices:
- Pinned Actions - All actions pinned to commit hashes (not floating tags)
- No floating versions - Prevents supply chain attacks via action updates
- Minimal permissions - Workflows use least-privilege access
- Automated testing - All changes validated before merge
See .github/workflows/tests.yml for our CI/CD security configuration.
This project minimises external dependencies:
- Core tools only - Relies on git, bash/zsh, and Docker for testing
- No npm dependencies - Pure bash/markdown implementation
- Regular audits - Periodic review of all scripts and dependencies
To use this project securely:
-
Clone from official repository:
git clone https://github.com/ruchernchong/agentic-slash-commands.git
-
Review installer scripts before running:
cat install.sh cat scripts/install-claude.sh
-
Verify symlinks after installation:
ls -la ~/.claude/commands/ ls -la ~/.codex/prompts/
-
Keep repository updated:
cd ~/agentic-slash-commands git pull
-
Run tests to verify integrity:
cd tests && ./run-tests.sh
We follow coordinated disclosure:
- Report received - Acknowledge within 48-72 hours
- Investigation - Assess severity and impact
- Fix developed - Create and test patch
- Coordinated release - Agree on public disclosure timeline with reporter
- Public advisory - Publish security advisory with credit to reporter
- CVE assignment - Request CVE if applicable
We believe in recognising security researchers. If you report a vulnerability, we'll:
- Credit you in the security advisory (unless you prefer anonymity)
- Thank you in the commit message fixing the issue
- Add you to our security acknowledgements (if you'd like)
Thank you for helping keep this project secure!