If you discover a security vulnerability in smoosh, please report it responsibly.
Do not open a public issue. Instead:
- Open a private security advisory on GitHub.
smoosh is a local CLI tool that reads files and writes output to disk. It does not run a server, accept network connections, or process untrusted input beyond the filenames and contents of git-tracked files.
Security-relevant areas:
- Secrets detection — smoosh includes a basic pattern scanner for common secret formats (AWS keys, GitHub PATs, PEM blocks). This is a convenience feature, not a security guarantee. For thorough scanning, use gitleaks or truffleHog.
- Remote clone —
smoosh <url>clones a repository into a temp directory withcore.hooksPath=/dev/nullto disable post-checkout hooks. The temp directory is cleaned up on exit. - Filename handling — all filenames are handled with
printf '%s'(neverecho) and--before file arguments to prevent injection via crafted filenames.
Only the latest release is supported with security fixes.