| Version | Supported |
|---|---|
| 0.2.x | Yes |
| < 0.2 | No |
Only the latest release on the current major version line receives security updates.
Do not open a public issue for security vulnerabilities.
Please report vulnerabilities privately through GitHub Security Advisories.
- Go to the Security Advisories page
- Click "New draft security advisory"
- Fill in a description of the vulnerability, including steps to reproduce if possible
- Acknowledgment: Within 48 hours of your report
- Initial assessment: Within 7 days
- Fix or mitigation: Within 30 days for confirmed vulnerabilities
We will keep you informed of progress throughout the process.
Overstory is a CLI tool that orchestrates multiple Claude Code agents via git worktrees, tmux sessions, and SQLite databases on the local filesystem. The following are considered security issues:
- Command injection -- Unsanitized input passed to
Bun.spawnor shell execution - Path traversal -- Accessing files outside the intended project or
.overstory/directory - Arbitrary file access -- Reading or writing files the user did not intend
- Symlink attacks -- Following symlinks to unintended locations
- Temp file races -- TOCTOU vulnerabilities in temporary file handling
- Agent escape -- An agent accessing files outside its designated worktree or file scope
- Mail injection -- Crafted messages that manipulate agent behavior or escalate privileges
The following are generally not in scope:
- Denial of service via large input (Overstory is a local tool, not a service)
- Issues that require the attacker to already have local shell access with the same privileges as the user
- Social engineering or phishing
- Costs incurred from spawning many agents (this is an operational concern, not a security vulnerability)
Overstory already implements several hardening measures:
- Tool enforcement hooks that mechanically block file modifications for non-implementation agents
- Dangerous git operation blocking (force push, reset --hard) via PreToolUse hooks
- File scope enforcement per agent via overlay configuration
- SQLite WAL mode with busy timeouts for safe concurrent access
If you believe any of these measures can be bypassed, please report it through the process above.