We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported | 
|---|---|
| 1.x.x | ✅ | 
| < 1.0 | ❌ | 
We take the security of cclsp seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Open a public issue
- Post about it on social media
- Exploit the vulnerability
- Email us at [INSERT SECURITY EMAIL] with details
- Include steps to reproduce if possible
- Allow us reasonable time to respond and fix the issue
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Assessment: We'll assess the vulnerability and determine its impact
- Fix: We'll work on a fix and coordinate a release
- Disclosure: We'll publicly disclose the issue after the fix is released
cclsp spawns external LSP server processes based on configuration. Users should:
- Trust your LSP servers: Only use LSP servers from trusted sources
- Review configurations: Carefully review any shared cclsp.jsonconfigurations
- Use official servers: Prefer official language servers when available
- Never include sensitive information in cclsp.json
- Be cautious with configurations that execute arbitrary commands
- Review command arguments carefully
cclsp follows MCP protocol security best practices:
- No arbitrary code execution without explicit configuration
- Clear boundaries between tool capabilities
- Transparent operation logging
- Keep cclsp updated: Always use the latest version
- Audit configurations: Review cclsp.jsonbefore using
- Use trusted sources: Only install language servers from official sources
- Report issues: If something seems wrong, report it immediately
We appreciate security researchers who responsibly disclose vulnerabilities. Contributors will be acknowledged here unless they prefer to remain anonymous.