Godmode takes security seriously -- both in the software it helps you build and in its own design.
If you discover a security vulnerability in Godmode, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead:
- Email security@godmode.dev with a description of the vulnerability
- Include steps to reproduce the issue
- Include the potential impact (what an attacker could achieve)
- Allow up to 72 hours for an initial response
- Allow up to 90 days for a fix before public disclosure
We will:
- Acknowledge your report within 72 hours
- Provide a timeline for the fix within 7 days
- Credit you in the security advisory (unless you prefer anonymity)
- Notify you when the fix is released
- A skill that instructs the agent to expose secrets, credentials, or API keys
- A workflow that could cause unintended data loss or destructive operations
- A skill that could be exploited to execute arbitrary commands outside the intended scope
- A configuration default that creates an insecure state
- A hook or script that could be hijacked or injected with malicious content
- Skills producing suboptimal code (this is a quality issue, not a security issue)
- Feature requests for additional security checks
- General questions about best practices (use the FAQ or open a discussion)
Godmode is a collection of Markdown skill files. It does not have:
- Its own runtime or executable code
- Network access or telemetry
- Data collection or analytics
- External service dependencies
All execution happens within Claude Code's existing sandbox. Godmode adds instructions; it does not add attack surface.
Multiple skills include explicit instructions to protect secrets:
/godmode:secrets-- Manages API keys, database credentials, and tokens through dedicated secret stores (Vault, AWS Secrets Manager, GCP Secret Manager). Never hardcodes secrets/godmode:secure-- The security audit specifically scans for hardcoded secrets, exposed credentials, and insecure secret handling/godmode:ship-- The pre-flight checklist verifies that no secrets are included in the deployment artifacts/godmode:git-- Encourages.gitignorepatterns that exclude.env, credentials files, and private keys
Skills explicitly instruct the agent to:
- Never commit
.envfiles, credentials, or private keys - Use environment variables or secret managers for sensitive values
- Rotate secrets that have been accidentally exposed
- Audit git history for previously committed secrets
Godmode skills are designed to prevent accidental data loss:
- No force-push: Skills never instruct the agent to
git push --forceto main/master - No history rewriting: Interactive rebase and history modification are not used in automated workflows
- Branch protection: The
/godmode:finishskill verifies branch state before merging - Dry-run first: The
/godmode:shipworkflow runs a dry-run deployment before the real one - Auto-revert: The optimization loop reverts changes that fail verification, preserving the known-good state
Autonomous skills operate within defined boundaries:
- Iteration limits: The optimization and fix loops have configurable maximums (default: 20). They cannot run indefinitely
- Guard rails: A secondary metric that must never regress. If tests break during optimization, the change is reverted immediately
- Scope definition: Security audits define their scope before analysis. Skills do not access files outside the defined scope
- Git-as-rollback: Every change is committed before verification. The system can always return to the last known-good state
Godmode includes a dedicated security audit skill that uses industry-standard frameworks:
Analyzes each component for:
- Spoofing -- Can an attacker impersonate a user or service?
- Tampering -- Can an attacker modify data they should not?
- Repudiation -- Can an attacker deny their actions?
- Information Disclosure -- Can an attacker access confidential data?
- Denial of Service -- Can an attacker degrade availability?
- Elevation of Privilege -- Can an attacker gain unauthorized access?
Checks for the current OWASP Top 10 web application security risks:
- Broken Access Control
- Cryptographic Failures
- Injection
- Insecure Design
- Security Misconfiguration
- Vulnerable and Outdated Components
- Identification and Authentication Failures
- Software and Data Integrity Failures
- Security Logging and Monitoring Failures
- Server-Side Request Forgery (SSRF)
Four simulated attackers with different capabilities:
- Script Kiddie -- Uses automated tools, exploits known vulnerabilities
- Insider Threat -- Has legitimate access, attempts privilege escalation
- Organized Crime -- Sophisticated, financially motivated, persistent
- Nation-State -- Advanced persistent threat, supply chain attacks
Every finding includes:
- Code evidence (file path, line number, code snippet)
- Severity rating (Critical / High / Medium / Low)
- Exploitation scenario
- Remediation steps with code examples
- References to CWE/CVE where applicable
The DevSecOps skill integrates security into the CI/CD pipeline:
- Static Application Security Testing (SAST) at build time
- Dynamic Application Security Testing (DAST) against running applications
- Software Composition Analysis (SCA) for vulnerable dependencies
- Container image scanning
- Infrastructure as Code security scanning
- Secret detection in pre-commit hooks
For regulated industries, Godmode provides compliance-specific skills:
/godmode:comply-- Framework-agnostic compliance auditing/godmode:rbac-- Access control design that meets regulatory requirements/godmode:auth-- Authentication flows that follow security best practices
1. SCOPE Define what code to audit (files, directories, sensitive areas)
2. STRIDE Run threat analysis on each sensitive area
3. OWASP Check against OWASP Top 10 vulnerabilities
4. RED TEAM Four personas attempt to find exploits
5. EVIDENCE Attach code evidence to every finding
6. REMEDIATE Provide fix for every finding with code examples
7. REPORT Generate structured audit report at docs/security/<name>-audit.md
# Full security audit of the auth module
/godmode:secure Run a full STRIDE + OWASP audit on the auth module
# Pre-ship security check
/godmode:secure --scope=changed # Only audit files changed since last deploy
# Targeted vulnerability check
/godmode:secure Check for SQL injection in the user search endpointSECURITY AUDIT — auth module
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
CRITICAL (1)
[C-001] JWT secret stored in plaintext in config.js:14
→ Move to environment variable or secret manager
→ Rotate the exposed secret immediately
HIGH (2)
[H-001] Missing rate limiting on /api/login endpoint
→ Add rate limiting: max 5 attempts per IP per 15 minutes
[H-002] Password reset token has no expiry
→ Set token expiry to 1 hour maximum
MEDIUM (3)
[M-001] CORS allows wildcard origin in production config
→ Restrict to specific domains
[M-002] Session cookie missing SameSite attribute
→ Set SameSite=Strict or SameSite=Lax
[M-003] Error messages reveal internal stack traces
→ Return generic error messages in production
LOW (1)
[L-001] X-Powered-By header exposes framework version
→ Remove or override the header
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
TOTAL: 7 findings (1 critical, 2 high, 3 medium, 1 low)
- Review generated code before deploying. Godmode enforces discipline, but human review is the final gate
- Run
/godmode:securebefore every production deploy. Make it part of your shipping checklist - Keep secrets out of git. Use
.gitignorefor.envfiles and the/godmode:secretsskill for managing credentials - Set guard rails on autonomous loops. Always define a guard rail metric that includes test passage
- Use the dry-run phase. Never skip the dry-run step in
/godmode:ship - Audit third-party dependencies. Use
/godmode:devsecopsto scan for known vulnerabilities in your dependency tree - Rotate exposed secrets immediately. If a secret appears in a commit, rotation is mandatory -- removing the commit is not sufficient
| Standard | Godmode Skill |
|---|---|
| OWASP Top 10 | /godmode:secure |
| STRIDE | /godmode:secure |
| GDPR | /godmode:comply |
| HIPAA | /godmode:comply |
| SOC 2 | /godmode:comply |
| PCI-DSS | /godmode:comply |
| CWE | Referenced in secure findings |
| CVE | Referenced in devsecops scans |
- Critical vulnerabilities: Patched within 48 hours of confirmation
- High vulnerabilities: Patched within 7 days
- Medium vulnerabilities: Patched in the next scheduled release
- Low vulnerabilities: Addressed on a best-effort basis
All security patches are released as new versions with a security advisory on the GitHub repository.
- Security reports: security@godmode.dev
- General questions: Open an issue with the
questionlabel - Discussions: GitHub Discussions