| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take the security of claudecode-rule2hook seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Create a public GitHub issue for security vulnerabilities
- Post about it publicly before it's fixed
- Email us at [INSERT SECURITY EMAIL]
- Include the word "SECURITY" in the subject line
- Provide detailed steps to reproduce the issue
- Allow us reasonable time to fix the issue before disclosure
- Acknowledgment of your report within 48 hours
- Regular updates on our progress
- Credit in the fix announcement (if desired)
- Hooks run with full user permissions
- Always review generated hooks before applying
- Be cautious with rules that execute shell commands
- Review Generated Hooks: Always inspect the generated
hooks.jsonbefore using - Backup Configuration: The tool automatically backs up existing hooks
- Test First: Use the validation tools to verify hook configurations
- Limit Scope: Be specific in your rules to avoid unintended matches
- Don't blindly trust rules from untrusted sources
- Regularly review your active hooks
- Use specific tool matchers to limit hook scope
- Test hooks in a safe environment first
When writing rules that will become hooks:
- Avoid Sensitive Data: Don't include passwords, tokens, or keys in rules
- Use Absolute Paths: Be explicit about file locations
- Validate Input: For complex commands, add validation
- Limit Permissions: Run commands with minimal required permissions
claudecode-rule2hook maintains backups of previous configurations in:
~/.claude/hook-backups/
This allows you to:
- Review changes over time
- Restore previous configurations
- Audit hook modifications
Thank you for helping keep claudecode-rule2hook secure!