We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take the security of PRD Workflow Manager seriously. If you discover a security vulnerability, please follow these steps:
Please do not report security vulnerabilities through public GitHub issues. This helps protect users while a fix is being developed.
Report security vulnerabilities by opening a private security advisory:
- Go to the Security tab
- Click "Report a vulnerability"
- Fill out the advisory form with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Alternatively, you can:
- Open a GitHub Discussion marked as "Security"
- Create an issue with the label
security(for non-critical issues only)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 1-3 days
- High: 1-2 weeks
- Medium: 2-4 weeks
- Low: Next regular release
- We will acknowledge your report within 48 hours
- We will confirm the vulnerability and determine its severity
- We will release a fix as soon as possible
- We will publicly disclose the vulnerability after a fix is released
- We will credit you in the security advisory (unless you prefer to remain anonymous)
When using PRD Workflow Manager:
1. Never commit secrets
# ❌ DON'T
{
"github": {
"token": "ghp_your_token_here" // Never hardcode tokens!
}
}
# ✅ DO
{
"github": {
"token": "${GITHUB_TOKEN}" // Use environment variables
}
}2. Use .gitignore
# Always ignore sensitive config
.claude/config.json
.env
.env.local
*.key
*.pem3. Rotate tokens regularly
- GitHub tokens: Every 90 days
- API keys: Every 60 days
- Webhooks: After each project
Security Audit (/security-audit):
- Runs automatically on commits (enterprise preset)
- Scans for:
- Dependency vulnerabilities
- Hardcoded secrets
- OWASP Top 10 violations
- Insecure code patterns
Always run before PR:
/security-audit
# Must pass with 0 high-severity issuesWhen using Git worktrees:
1. Isolate credentials
# Each worktree should have its own .env
../project-feature-a/.env # Separate credentials
../project-feature-b/.env # Separate credentials2. Clean up worktrees
# Remove worktrees when done
git worktree remove ../project-feature-a3. Don't share worktrees
- Each developer should have their own worktrees
- Don't commit worktree paths to version control
Issue: Git worktrees may inherit parent directory permissions
Mitigation:
- Set proper permissions on worktree directories
- Use
umask 077for sensitive projects - Review
.git/worktrees/permissions
Issue: .claude/config.json may contain sensitive settings
Mitigation:
- Always add
.claude/config.jsonto.gitignore - Use environment variables for secrets
- Review config files before committing
Issue: MCP servers and integrations may have their own security considerations
Mitigation:
- Only use trusted MCP servers
- Review MCP server permissions
- Keep MCP servers updated
- Use least-privilege access
PRD Workflow Manager includes built-in security features:
- npm/yarn audit: Dependency vulnerability scanning
- git-secrets: Prevents committing credentials
- ESLint Security: Detects insecure code patterns
- OWASP Top 10: Checks for common vulnerabilities
- Blocks PR merge if security issues found
- Requires 0 high-severity issues
- Configurable thresholds
- All security scans are logged
- Results stored in
.claude/security-audit-*.json - Review logs regularly
When we fix a security vulnerability:
- Private Fix: Develop fix in private
- Release: Deploy patched version
- Advisory: Publish security advisory
- Credit: Credit the reporter (if they agree)
- Notification: Notify users via GitHub Releases
We recognize security researchers who responsibly disclose vulnerabilities:
- No vulnerabilities reported yet
Thank you for helping keep PRD Workflow Manager secure! 🔒
Last Updated: 2025-10-25 Version: 1.0.0