Skip to content

Security: withpointbreak/pointbreak

Security

SECURITY.md

Security Policy

Our Commitment

Security is critical for Pointbreak. As a debugging tool that accesses your IDE and code, security is taken seriously, and the security community's help in keeping Pointbreak safe is appreciated.

Supported Versions

Version Supported
0.x.x βœ…

Note: Pointbreak is currently in beta (0.x.x versions). Please update to the latest version before reporting issues.

Reporting a Vulnerability

🚨 DO NOT open public GitHub issues for security vulnerabilities.

Public disclosure of security issues puts all users at risk. Instead:

How to Report

Email: security@withpointbreak.com

Subject line: "Security Vulnerability in Pointbreak"

What to Include

Please provide:

  1. Description - What's the vulnerability?
  2. Impact - What can an attacker do?
  3. Steps to Reproduce - How did you find it?
  4. Affected Versions - Which versions are vulnerable?
  5. Suggested Fix - (Optional) How might we fix it?
  6. Your Details - Name/handle for credit (optional)

Example Report:

Subject: Security Vulnerability in Pointbreak

Description:
Pointbreak MCP server accepts unauthenticated connections allowing
arbitrary debug commands from any process on the system.

Impact:
Local attacker could connect to MCP server and control debug sessions,
potentially executing code in the context of the debugged process.

Steps to Reproduce:
1. Start Pointbreak MCP server
2. From separate process, connect to MCP socket
3. Send arbitrary debug commands
4. Commands execute without authentication

Affected Versions: 0.1.0 - 0.2.5

Suggested Fix:
Add authentication token requirement for MCP connections

Contact: @security_researcher (prefer anonymous credit)

Response Process

Security reports are treated seriously and will responded to promptly:

Timeline

  • Within 48 hours: Acknowledge your report
  • Within 1 week: Provide initial assessment and timeline
  • Within 30 days: Release fix or provide detailed plan
  • After fix: Public disclosure (coordinated with you)

Process

  1. Acknowledge - Confirm we received your report
  2. Investigate - Assess severity and impact
  3. Develop Fix - Create and test a patch
  4. Release - Deploy fix in new version
  5. Disclose - Publish security advisory
  6. Credit - Thank you publicly (if you want)

Severity Levels

Vulnerabilities are assessed using these levels:

Critical πŸ”΄

  • Remote code execution
  • Arbitrary file read/write outside project
  • Authentication bypass in paid features
  • Data exfiltration of code/credentials

Response goal: Patch within 7 days

High 🟠

  • Local privilege escalation
  • Unauthorized debug session access
  • MCP protocol bypass
  • IDE crash or data loss

Response goal: Patch within 14 days

Medium 🟑

  • Information disclosure (non-sensitive)
  • Denial of service (local)
  • Debug session hijacking

Response goal: Patch within 30 days

Low 🟒

  • UI spoofing
  • Error message information leakage
  • Minor security improvements

Response goal: Patch in next release

What's Considered a Security Issue

IN SCOPE: βœ…

  • Code execution vulnerabilities
    • RCE via MCP protocol
    • Arbitrary code in debug context
  • Authentication/Authorization issues
    • Bypassing session controls
    • Unauthorized debug access
  • Data exposure
    • Leaking code or credentials
    • Exposing debug session data
  • Injection attacks
    • Command injection
    • Path traversal
  • MCP protocol vulnerabilities
    • Protocol bypass
    • Unauthenticated access
  • IDE integration exploits
    • Escaping sandbox
    • Cross-session attacks

OUT OF SCOPE: ❌

  • Social engineering (not a technical bug)
  • Physical access attacks (requires local access)
  • Denial of service (user can just restart)
  • Issues in third-party services (report to them)
  • Known issues in dependencies (we'll upgrade)
  • Theoretical vulnerabilities (no working exploit)
  • Beta software bugs (use GitHub issues)

When in doubt, report it! It's better to evaluate a non-issue than miss a real vulnerability.

Safe Harbor

We consider security research conducted according to this policy to be:

  • βœ… Authorized under the Computer Fraud and Abuse Act
  • βœ… Exempt from DMCA anti-circumvention provisions
  • βœ… Lawful and conducted in good faith

We will not pursue legal action against security researchers who:

  • Follow this responsible disclosure policy
  • Don't access user data beyond what's needed to demonstrate the vulnerability
  • Don't intentionally harm users or our systems
  • Don't publicly disclose before we've patched
  • Act in good faith

What We Ask From You

Please:

  • βœ… Give us reasonable time to fix before public disclosure
  • βœ… Don't access user data beyond proof-of-concept
  • βœ… Don't harm users or our services
  • βœ… Don't use vulnerabilities maliciously
  • βœ… Follow responsible disclosure practices

Don't:

  • ❌ Publicly disclose before it's patched
  • ❌ Access other users' debug sessions or data
  • ❌ Perform denial of service attacks
  • ❌ Demand payment (no bounties currently)
  • ❌ Violate laws in your research

Recognition

We believe in recognizing security researchers:

What We Offer

Currently:

  • πŸ† Public recognition
  • πŸŽ–οΈ Listed in Security Hall of Fame
  • πŸ“’ Mention in release notes
  • πŸ’œ Eternal gratitude

Future (potentially):

  • πŸ’° Bug bounties
  • 🎁 Free premium subscriptions
  • πŸ‘• Swag and merchandise

Security Best Practices for Users

For Developers Using Pointbreak

  • βœ… Keep Pointbreak updated to the latest version
  • βœ… Only install from official sources (npm, VS Code marketplace)
  • βœ… Review MCP server permissions
  • βœ… Don't share debug sessions with untrusted parties
  • βœ… Be careful debugging untrusted code
  • βœ… Use security features in your IDE

For Organizations

  • βœ… Audit Pointbreak before deploying internally
  • βœ… Monitor for security updates
  • βœ… Restrict MCP server network access
  • βœ… Follow your organization's security policies
  • βœ… Consider security implications of AI assistant access

Security Features in Pointbreak

Current protections:

  • πŸ”’ MCP server runs locally (not exposed to internet)
  • πŸ”’ No remote code execution by default
  • πŸ”’ Respects IDE security boundaries
  • πŸ”’ No persistent storage of debug data
  • πŸ”’ Minimal telemetry (opt-in only)

Planned protections:

  • πŸ” MCP connection authentication
  • πŸ” Signed releases (code signing)
  • πŸ” Integrity verification
  • πŸ” Session isolation
  • πŸ” Audit logging

Keeping Informed

Subscribe to security updates:

Security advisories will be posted at:

  • GitHub Security Advisories
  • Release notes (for each patched version)
  • Our blog (for major issues)

Contact

For security issues:

For other concerns:

Additional Resources


Quick Reference

Found a security issue?

  1. βœ‰οΈ Email: security@withpointbreak.com
  2. 🀐 Don't post publicly
  3. πŸ“‹ Include detailed reproduction steps
  4. ⏱️ We'll respond within 48 hours
  5. πŸ† We'll credit you (if you want)

Thank you for helping keep Pointbreak secure!


Last Updated: November 3, 2025

This security policy is inspired by industry best practices from GitHub, HackerOne, and the security community.

There aren’t any published security advisories