Security Policy¶
Supported Versions¶
We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 1.x.x | |
| < 1.0 |
Reporting a Vulnerability¶
The Talent Factory team takes the security of our Claude Code plugins seriously. If you believe you have found a security vulnerability, please report it to us as described below.
How to Report¶
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via email to:
You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message.
What to Include¶
Please include the following information in your report:
- Type of vulnerability (e.g., code injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the vulnerability
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
This information will help us triage your report more quickly.
What to Expect¶
After submitting a vulnerability report:
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Assessment: We'll assess the vulnerability and determine its impact
- Fix Development: We'll work on a fix and keep you updated on progress
- Disclosure: We'll coordinate with you on the disclosure timeline
- Credit: With your permission, we'll credit you in the security advisory
Security Update Process¶
- Security vulnerabilities are addressed with high priority
- Patches are developed and tested in private
- A security advisory is prepared
- The fix is released with a new version
- The security advisory is published
- Users are notified to update
Security Best Practices for Plugin Users¶
Installation Security¶
- Only install plugins from trusted marketplaces
- Verify the repository URL matches official Talent Factory repositories
- Review plugin permissions before installation
- Keep Claude Code and all plugins up to date
Configuration Security¶
- Never commit sensitive credentials in
.claude/settings.json - Use environment variables for sensitive configuration
- Review plugin source code before enabling in production
- Limit plugin access to only what's necessary
Usage Security¶
- Be cautious when plugins request file system access
- Review generated code before execution
- Don't share API keys or tokens through plugin commands
- Use separate Claude Code instances for untrusted projects
Plugin Security Guidelines for Contributors¶
If you're contributing to or developing plugins:
Input Validation¶
- Always validate and sanitize user input
- Never execute arbitrary code without validation
- Use parameterized queries for database operations
- Escape output to prevent injection attacks
File System Access¶
- Limit file system operations to necessary paths only
- Validate all file paths to prevent directory traversal
- Never execute files from untrusted sources
- Use secure file permissions
External Dependencies¶
- Keep dependencies up to date
- Audit dependencies for known vulnerabilities
- Minimize use of external dependencies
- Pin dependency versions
Sensitive Data¶
- Never log sensitive information
- Don't store credentials in plugin files
- Use secure methods for credential management
- Clear sensitive data from memory after use
Code Review¶
- All code changes require review before merging
- Security-focused reviews for authentication/authorization changes
- Automated security scanning in CI/CD pipeline
- Regular security audits of plugin code
Known Security Considerations¶
Plugin Execution Model¶
Claude Code plugins execute with the same permissions as the Claude Code process. This means:
- Plugins can read/write files the user can access
- Plugins can execute system commands
- Plugins can access network resources
- Users should only install trusted plugins
Marketplace Trust¶
- Official Talent Factory plugins are signed and verified
- Third-party plugins should be reviewed before installation
- Check plugin source code in public repositories
- Report suspicious plugins to security@talent-factory.ch
Security Advisories¶
Security advisories for this project are published at:
Subscribe to these channels to stay informed about security updates.
Vulnerability Disclosure Policy¶
We follow responsible disclosure practices:
- 90-day disclosure timeline for vulnerabilities
- Earlier disclosure if actively exploited in the wild
- Coordinated disclosure with affected parties
- Public acknowledgment of security researchers
- CVE assignment for significant vulnerabilities
Bug Bounty Program¶
Currently, we do not have a formal bug bounty program. However, we greatly appreciate security research and will:
- Acknowledge your contribution publicly (with your permission)
- Provide swag/merchandise for significant findings
- Consider your contributions for future programs
Contact¶
- Security Issues: security@talent-factory.ch
- General Support: support@talent-factory.ch
- Website: https://talent-factory.xyz
Additional Resources¶
Last Updated: January 2026 Maintained by: Talent Factory GmbH Security Team