Only the latest release of each extension receives security updates.
| Extension | Current version | Status |
|---|---|---|
| VS Code | 0.1.8 | Supported |
| JetBrains | 0.1.7 | Supported |
| Claude Code | 1.0.0 | Supported |
Do not open a public issue. Security vulnerabilities must be reported privately so we can fix them before they are exploited.
- GitHub Private Vulnerability Reporting (preferred) — go to the Security tab and click Report a vulnerability.
- Email — send a detailed report to contact@devglobe.xyz.
- A clear description of the vulnerability
- Steps to reproduce (or a proof of concept)
- The affected extension(s) and version(s)
- The potential impact
| Step | Target |
|---|---|
| Acknowledgment | 48 hours |
| Initial assessment | 5 business days |
| Critical fix released | 7 days |
| Non-critical fix released | 30 days |
We will keep you informed of our progress throughout the process.
The following are in scope for security reports:
- Heartbeat data leaking information beyond what is documented (language, city-level location, optional repo name)
- API key exposure or insecure storage
- Bypass of anonymous mode (real location sent when anonymous mode is enabled)
- Code injection via the VS Code webview sidebar
- Insecure network communication (TLS downgrade, unencrypted requests)
- Unauthorized access to user data through the Supabase API or Row Level Security bypass
- Supabase Row Level Security policy bypass (accessing or modifying another user's data)
- Supabase Edge Functions vulnerabilities
- GitHub App (devglobeapp) permission escalation or data leakage beyond documented scope
- Vulnerabilities on devglobe.xyz (XSS, CSRF, authentication bypass, data exposure)
- Rate limiting on the heartbeat endpoint (server-side throttling is already in place)
- The Supabase anonymous key being visible in source code (this is public by Supabase design — protection relies on RLS policies)
- Social engineering or phishing attacks
- Denial of service attacks
- Vulnerabilities in third-party geolocation services (freeipapi.com, ipapi.co) — report those to the respective service owners
- Vulnerabilities in dependencies of the IDE platforms themselves (VS Code, JetBrains, Claude Code)
- Issues that require physical access to the user's machine
For a detailed description of what data is collected, how API keys are stored, and how network communication works, see the Privacy & Security section of the main README.
Key design decisions:
- HTTPS only — all network requests enforce TLS, no HTTP fallback
- Minimal data — only language, city-level location, and coding time are sent; source code, file names, and keystrokes are never accessed
- Secure key storage — OS keychain on VS Code (SecretStorage) and JetBrains (PasswordSafe); local config file on Claude Code (no keychain API available)
- Content Security Policy — VS Code webview uses a cryptographic nonce-based CSP
- Row Level Security — each user's data is isolated server-side
- No telemetry — no third-party analytics or tracking services
We follow coordinated disclosure. Once a fix is released, we will:
- Credit the reporter (unless they prefer to stay anonymous)
- Publish a summary in the release notes
- If the vulnerability is significant, publish a GitHub Security Advisory