Version | Supported |
---|---|
2.0.x | ✅ |
1.x.x | ❌ |
If you discover a security vulnerability within Claude Code Exporter, please send an email to the maintainers through GitHub. All security vulnerabilities will be promptly addressed.
Please include the following information:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue
This tool:
- Reads local file system data from Claude Code directories
- Does not transmit data over the network
- Does not execute arbitrary code from conversations
- Sanitizes file paths to prevent directory traversal
- Validates all user inputs
- We will acknowledge receipt of your vulnerability report within 48 hours
- We will provide a more detailed response within 7 days
- We will work on a fix and release it as soon as possible