| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
To report a security vulnerability, email us at blazej@smartcoders.xyz with the subject line [SECURITY] opencode-model-fallback.
Please include:
- A description of the vulnerability and its potential impact
- Steps to reproduce the issue
- Any suggested mitigations or fixes
You should receive a response within 72 hours. If you do not hear back, please follow up via email.
We will:
- Acknowledge receipt of your report
- Investigate and confirm the vulnerability
- Work on a fix and release a patched version
- Credit you in the release notes (unless you prefer to remain anonymous)
This security policy covers the opencode-model-fallback plugin code. It does not cover:
- Third-party dependencies (report those to the respective projects)
- The OpenCode runtime itself
- Issues requiring physical access to your machine
- Config file permissions: The plugin reads config from
~/.config/opencode/model-fallback.jsonand agent config directories. Ensure these paths have appropriate permissions (readable only by your user). - Log files: Log files stored in
~/.local/share/opencode/logs/may contain model usage metadata. They are created with0o600permissions (owner read/write only). - YAML parsing: Agent config files with YAML frontmatter are parsed with the CORE schema, which disallows executable YAML types.
Thank you for helping keep opencode-model-fallback secure.