DO NOT open a public GitHub issue for security vulnerabilities. Report them responsibly to security@rethunk.tech.
Response SLA: We aim to respond to security reports within 24 hours.
When reporting a vulnerability, please include:
- Description of the vulnerability
- Affected component(s) and version(s)
- Steps to reproduce, if applicable
- Potential impact
- Suggested fix, if available
This repository is a Claude Code plugin marketplace — a catalog of JSON manifests. It contains no executable code of its own. The security surface is what installing a plugin causes a user's Claude Code to run, and the integrity of the manifests that point there.
- High: Each plugin's
.mcp.jsoninstructs Claude Code to run an MCP server. The plugins here usenpx -y @scope/pkg@x.y.z, which downloads and executes that package from npm at launch. - Plugins pin exact versions (
@x.y.z), never ranges orlatest, so an installed plugin runs the same code until itsversionis deliberately bumped. - Review the upstream package and its release before bumping a pinned version. The wrapped servers are maintained at
Rethunk-AI/mcp-multi-root-gitandRethunk-AI/rethunk-github-mcp. - A compromised manifest in this repo could redirect a plugin to a malicious package. Branch protection and CODEOWNERS review on
mainare the primary defense; treat manifest edits as releases.
- Critical: Manifests must never contain tokens or secrets. Credentials are forwarded from the environment with
${VAR}expansion (e.g."GITHUB_TOKEN": "${GITHUB_TOKEN}"); the value lives only in the user's environment, never in the repo. - Any PR introducing a literal secret into a
.mcp.jsonmust be rejected and the secret rotated. - The
rethunk-githubplugin consumes a GitHub token at the user's machine — see that server's ownSECURITY.mdfor token-scope and mutation-risk guidance. Prefer least-privilege, read-only tokens unless write tools are needed.
- Medium: A malformed manifest (trailing comma, mismatched
name, wrongsource) breaks installation for every user of the marketplace. - Validate with
claude plugin validatebefore merging; confirmsourcepaths resolve within this repository.
- Pin every wrapped npm package to an exact version; never
latestor a range. - Keep
marketplace.jsonand eachplugin.jsonversionin lockstep with the upstream package version they wrap. - Require CODEOWNERS review for any change under
.claude-plugin/orplugins/. - Audit upstream MCP server releases before bumping a pinned version.
- Never commit a
.npmrcwith a registry auth token.
Latest release only.
| Version | Supported |
|---|---|
| 1.x | Yes |
| < 1.0 | No |
None currently known. Reports are welcome via security@rethunk.tech.
If a security vulnerability is discovered:
- Report immediately to security@rethunk.tech and do not disclose publicly.
- Include reproduction steps and affected version(s).
- Allow 24-48 hours for initial response and triage.
- Coordinate a disclosure timeline if a patch is required.
- Credit will be given to the reporter if desired.
- Security Issues: security@rethunk.tech
- General Support: support@rethunk.tech
- Website: rethunk.tech
Last updated: 2026-05-22