Last Updated: October 28, 2025 Version: 2.0.0
DO NOT open public issues for security vulnerabilities.
Instead:
-
Email: Create a GitHub Security Advisory (preferred)
- Go to: Repository β Security β Advisories β New draft security advisory
- Or email: [Your security contact email]
-
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
-
Response Time: We aim to respond within 48 hours
Secrets Are Never Committed:
- β All credentials use GitHub Secrets vault
- β No hardcoded API keys or tokens
- β .env files are gitignored
- β Regular security audits performed
Secrets Used in Workflows:
GITHUB_TOKEN- Auto-provided by GitHub (minimal permissions)CLAUDE_CODE_OAUTH_TOKEN- Claude Code authentication (scoped)PROJECTS_TOKEN- Project board access (scoped: repo + project only)
Audit Status: β Last audited October 28, 2025 - No exposed credentials (See Audit)
For health-sdk-builder and healthcare applications:
Compliance Frameworks:
- β HIPAA (US) - Privacy Rule, Security Rule, Breach Notification
- β GDPR (EU) - Articles 5-11, Data Subject Rights
- β DSGVO (Germany) - German-specific requirements
- β PTV 10 (Germany) - Psychotherapy standards
Data Protection:
- β Encryption at rest (AES-256)
- β Encryption in transit (TLS 1.2+)
- β Audit logging (all PHI/PII access)
- β Access controls (role-based)
- β Data minimization
- β Retention policies
- β Right to erasure
Clinical Safety:
- β Crisis detection (suicide, self-harm, harm to others)
- β Emergency escalation workflows
- β Mandatory reporting compliance
- β Professional boundaries
- β Evidence-based practices only
Documentation: See HEALTHCARE_COMPLIANCE_GUIDE.md
4-Layer Security Model:
Layer 1: GitHub Permissions
# Only team members can trigger workflows
if: contains(fromJSON('["OWNER", "MEMBER", "COLLABORATOR"]'),
github.event.comment.author_association)Layer 2: Tool Restrictions
# Allowlist specific commands only
claude_args: '--allowed-tools "Bash(gh issue:*),Bash(gh pr:*)"'
# Blocks: git push, rm -rf, curl, wget, etc.Layer 3: Token Scoping
- GITHUB_TOKEN: Minimal permissions (read by default)
- PROJECTS_TOKEN: repo + project only (no admin)
- CLAUDE_CODE_OAUTH_TOKEN: Claude operations only
Layer 4: Branch Protection
- Required pull request workflow
- Status checks required (claude-review)
- No force pushes allowed
- Admin enforcement
- Conversation resolution required
Kill Switch (.github/WORKFLOW_KILLSWITCH):
- Master OFF switch for all workflows
- Current status: DISABLED (from Oct 24 incident)
- Instant shutdown capability (no code changes needed)
Emergency Cleanup (.github/EMERGENCY_CLEANUP.sh):
- Bulk issue closure for spam cleanup
- Dry-run mode for safety
- Documented procedures
Emergency Procedures: See .github/GITHUB_WORKFLOWS_GUIDE.md
Never Commit:
- β API keys (sk-ant-*, any provider)
- β GitHub tokens (ghp_, github_pat_)
- β OAuth tokens
- β Passwords or credentials
- β .env files with secrets
- β Private keys (.key, .pem files)
- β Patient data (PHI/PII)
Always Use:
- β .env.example templates (no real values)
- β GitHub Secrets for CI/CD
- β .gitignore for sensitive files
- β Placeholder values in examples
Patient Data Protection:
- β Never commit patient data
- β Use anonymized examples only
- β Implement encryption (AES-256 minimum)
- β Audit all data access
- β Comply with HIPAA/GDPR/DSGVO
Generated Applications:
- β Include compliance by default
- β Document security requirements
- β Provide encryption examples
- β Include audit logging
- β Add crisis detection (mental health apps)
Safe Skill Creation:
- β No secrets in SKILL.md files
- β No hardcoded credentials in Python files
- β Use environment variables for configuration
- β Document security requirements
- β Include security best practices in generated code
Testing:
- β Use test API keys (rotated after testing)
- β Never commit test credentials
- β Use separate testing repository
- β Clean up after testing
Current Versions Receiving Security Updates:
| Version | Supported | Status |
|---|---|---|
| 2.0.x | β Yes | Current, active development |
| 1.2.x | β Yes | Maintained, security fixes only |
| 1.1.x | Critical security fixes only | |
| < 1.0 | β No | Not supported |
Upgrade Recommendation: Always use latest version (2.0.x)
What: Skills can execute Python code (Code Execution Tool required) Risk: Malicious skills could execute harmful code Mitigation:
- β Only use trusted skills (from this repository or verified sources)
- β Review skill code before importing
- β Code Execution runs in sandboxed environment (Anthropic-managed)
- β No filesystem access outside sandbox
Recommendation: Review SKILL.md and Python files before importing unknown skills
What: GitHub workflows can modify issues, PRs, project boards Risk: Malicious workflow changes could spam or delete content Mitigation:
- β Kill switch for emergency shutdown
- β Branch protection (workflow changes require PR + review)
- β Tool allowlists (restrict dangerous commands)
- β Permission scoping (minimal required)
- β Team-only access (@claude mentions)
Recommendation: Never merge workflow changes without review
What: Generated apps handle sensitive patient data (PHI/PII) Risk: Data breach, compliance violations, patient harm Mitigation:
- β HIPAA/GDPR/DSGVO compliance built-in
- β Encryption templates provided
- β Audit logging examples included
- β Crisis detection for mental health apps
- β Clear disclaimers (not replacement for professional care)
Recommendation:
- Clinical validation required before patient use
- Legal review for compliance
- Professional oversight mandatory
- Review all workflow files for understanding
- Configure GitHub Secrets (never hardcode)
- Enable branch protection on main
- Review SECURITY_AUDIT.md
- Understand kill switch mechanism
- Review SKILL.md content
- Check Python files (if any)
- Verify source is trusted
- Check for hardcoded credentials
- Test in isolated environment first
- Complete HIPAA/GDPR/DSGVO compliance review
- Clinical validation by healthcare professionals
- Legal review for regulatory compliance
- Security audit (encryption, access controls, audit logs)
- Penetration testing (if handling real patient data)
- Privacy policy and terms of service
- Incident response plan
- Data breach notification procedures
- Security Audit: .github/SECURITY_AUDIT.md
- Workflows Guide: .github/GITHUB_WORKFLOWS_GUIDE.md
- Healthcare Compliance: HEALTHCARE_COMPLIANCE_GUIDE.md
- GitHub Security: https://docs.github.com/en/code-security
- HIPAA: https://www.hhs.gov/hipaa/
- GDPR: https://gdpr-info.eu/
- Claude Security: https://www.anthropic.com/security
Security Issues: Use GitHub Security Advisory (preferred)
General Questions: Open issue with question label
Healthcare Compliance: Document in issue with documentation label
Repository Security:
- β No exposed credentials (audited October 28, 2025)
- β Proper secrets management
- β Minimal permissions enforced
- β Emergency controls in place
Healthcare Applications:
- β HIPAA compliance templates
- β GDPR/DSGVO compliance frameworks
- β Clinical safety protocols
- β Evidence-based practices
Code Quality:
- β Type hints (Python)
- β Input validation
- β Error handling
- β Security best practices
Weekly:
- Monitor failed workflow runs
- Review GitHub Actions logs
- Check for unusual activity
Monthly:
- Review secrets expiration
- Audit new workflow changes
- Update dependencies
Quarterly:
- Rotate PROJECTS_TOKEN
- Comprehensive security audit
- Review permissions and access
- Update security documentation
Annually:
- Full security assessment
- Penetration testing (if applicable)
- Compliance review (HIPAA/GDPR)
- Update security policy
If Security Issue Discovered:
- Immediate: Activate kill switch (disable workflows)
- Assess: Determine scope and impact
- Contain: Revoke compromised credentials
- Remediate: Fix vulnerability
- Communicate: Notify affected users (if applicable)
- Document: Post-incident report
- Prevent: Update procedures to prevent recurrence
Emergency Contacts: See .github/GITHUB_WORKFLOWS_GUIDE.md
For Healthcare Applications:
- HIPAA (US): 45 CFR Parts 160, 162, 164
- GDPR (EU): Regulation (EU) 2016/679
- DSGVO (Germany): Bundesdatenschutzgesetz (BDSG)
- PTV 10 (Germany): Psychotherapeutenvereinbarung
Responsibility: Users are responsible for ensuring compliance in their deployments. This repository provides templates and guidance, not legal advice.
This repository is secure and safe to:
- β Use in production
- β Share publicly
- β Accept community contributions
- β Deploy in enterprise environments
With proper:
- β Secrets configuration (GitHub Secrets)
- β Access controls (team permissions)
- β Regular audits (quarterly minimum)
- β Healthcare validation (for medical apps)
Last Audited: October 28, 2025 Next Audit: January 28, 2026 Status: β Secure
For questions or concerns, please use GitHub Security Advisory or open an issue.