| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| 2.0.x | ✅ |
We take security seriously. If you discover a security vulnerability, please follow these steps:
- DO NOT open a public issue
- Send details via GitHub Security Advisories
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
-
Verify Script Sources
- Always use HTTPS URLs
- Pin to specific commits for production use
- Review scripts before execution
-
Use Official Sources
# Good - official repository https://raw.githubusercontent.com/alex-feel/claude-code-toolbox/main/... # Bad - unknown source http://random-site.com/install.ps1
-
Check Script Integrity
- Compare SHA256 checksums when available
- Review code changes between versions
-
Never Commit Secrets
- API keys
- Passwords
- Personal access tokens
- Private certificates
-
Validate Input
- Sanitize user input
- Validate file paths
- Check command arguments
-
Use Secure Defaults
- HTTPS over HTTP
- User-scope over system-scope when possible
- Explicit permissions over wildcards
The installer requires bypassing execution policy. Users should:
- Review the script before running
- Use
-ExecutionPolicy Bypassonly for trusted scripts - Reset policy after installation if needed
The installer may request elevation for:
- System-wide Git installation
- System-wide Node.js installation
This is normal behavior but users should:
- Understand why elevation is needed
- Prefer user-scope installations when possible
When behind corporate proxies:
- Use authenticated proxy settings securely
- Don't hardcode credentials in scripts
- Use environment variables for proxy configuration
Security patches will be released as soon as possible after discovery. Watch this repository for updates.
This project aims to follow security best practices including:
- OWASP guidelines where applicable
- Principle of least privilege
- Defense in depth
- Secure by default