| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take security issues in ASK seriously. If you discover a security vulnerability, please follow these steps:
Security vulnerabilities should not be disclosed publicly until they have been addressed.
Please report security vulnerabilities by emailing:
- Email: Create a security advisory on GitHub
Or use GitHub's private vulnerability reporting feature:
- Go to the Security tab of the repository
- Click "Report a vulnerability"
- Fill in the details
Please include the following in your report:
- Description: A clear description of the vulnerability
- Steps to Reproduce: Detailed steps to reproduce the issue
- Impact: What could an attacker achieve with this vulnerability?
- Affected Versions: Which versions are affected?
- Suggested Fix: If you have one
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 24-72 hours
- High: 1-2 weeks
- Medium: 2-4 weeks
- Low: Next release cycle
When using ASK:
- Verify Skill Sources: Only install skills from trusted repositories
- Use Security Scanning: Run
ask checkbefore installing new skills - Review Skill Code: Inspect SKILL.md and associated files before installation
- Keep Updated: Regularly run
ask updateto get security patches - Use Lock Files: Commit
ask.lockto ensure reproducible installs
ASK includes built-in security features:
- Entropy Analysis: Detects potential secrets and API keys
- Dangerous Command Detection: Identifies risky shell commands
- Binary File Scanning: Flags suspicious executable files
- HTML Security Reports: Generate detailed audit reports with
ask check -o report.html
We appreciate responsible disclosure and will acknowledge security researchers who report valid vulnerabilities.
Thank you for helping keep ASK secure! 🛡️