Skip to content

Security: marinsalinas/hevy-cli

Security

SECURITY.md

Security Policy

Supported versions

hevy-cli is pre-1.0 and only the latest minor release line receives security fixes. Once 1.0 ships, this table will be updated to track a broader support window.

Version Supported
0.2.x
< 0.2

Reporting a vulnerability

Please do not open a public GitHub issue for security problems.

Use one of the following private channels:

  1. Preferred: GitHub Security Advisory — opens a private thread with the maintainers and lets us coordinate a fix and a CVE if warranted.
  2. Email marinssalinas@gmail.com with subject line [hevy-cli security].

Please include:

  • A description of the issue and its impact.
  • Steps to reproduce (a minimal example is ideal).
  • The version of hevy-cli affected (output of hevy --version).
  • Any suggested mitigation, if you have one.

What to expect

  • Acknowledgement within 72 hours.
  • A triage assessment (severity, scope, fix plan) within 7 days.
  • Fix released as a patch version; coordinated disclosure timeline agreed with the reporter.
  • Credit in the advisory and changelog unless you request anonymity.

Proactive measures in this repo

  • CodeQL static analysis runs on every push/PR to main plus weekly. Findings appear under Security → Code scanning.
  • Dependabot opens grouped weekly PRs for Python and GitHub Actions dependencies; major bumps are kept separate for deliberate review.
  • PyPI Trusted Publishing (OIDC) + Sigstore attestations on every release — no long-lived API tokens in the repo, artifacts are cryptographically attested.
  • Branch protection on main requires PR + passing CI matrix (3.11 / 3.12 / 3.13) before merge.

Scope

In scope:

  • The hevy-cli codebase in this repository.
  • The packaging/publishing pipeline (.github/workflows/release-please.yml, PyPI artifact integrity).
  • Handling of user-supplied API keys (storage, logging, masking, environment precedence).

Out of scope:

  • Vulnerabilities in the upstream Hevy API itself — report those to Hevy.
  • Issues in third-party dependencies — report upstream; we will bump the pin once a fix is available.
  • Social-engineering attacks that do not involve a flaw in this codebase.

Safe harbour

Good-faith research conducted within this scope will not result in legal action from the maintainer. Please give us reasonable time to address the issue before public disclosure.

There aren't any published security advisories