Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in SecureShell, please report it privately to:
Email: keshav.r.1925@gmail.com
Include the following information:
- Type of vulnerability
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
We will acknowledge your email within 48 hours and send a more detailed response within 7 days indicating the next steps in handling your report.
- The security issue is received and assigned to a primary handler
- The problem is confirmed and affected versions are determined
- Code is audited to find any similar problems
- Fixes are prepared for all supported versions
- New versions are released and announced
| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| 0.1.x | ✅ |
| < 0.1 | ❌ |
When using SecureShell:
-
API Keys: Never commit API keys to version control. Use environment variables or secure secret management.
-
Audit Logs: Enable audit logging in production to track all command executions:
shell = SecureShell(audit_log="secureshell_audit.jsonl")
-
Gatekeeper LLM: Use a reliable LLM provider for the gatekeeper. Unreliable models may approve dangerous commands.
-
Template Selection: Choose appropriate security templates:
strict: Production environmentsdevelopment: Development onlycustom: Carefully review allowed/blocked commands
-
Sandbox Paths: Configure
allowed_dirsto restrict file system access:shell = SecureShell( sandbox_config={ "allowed_dirs": ["/home/user/project"], "blocked_commands": ["rm", "dd", "mkfs"] } )
-
Regular Updates: Keep SecureShell updated to receive security patches.
- LLM Dependency: SecureShell's security relies on the gatekeeper LLM's judgment. While robust, it's not infallible.
- Prompt Injection: Sophisticated adversarial inputs might attempt to manipulate the gatekeeper. Defense mechanisms are in place but evolving.
- Performance: Gatekeeper evaluation adds latency. Balance security with performance needs.
We thank security researchers and the community for responsibly disclosing vulnerabilities and helping improve SecureShell's security.