Email security@hookcli.dev. We respond within 48 hours. Do not open public issues for security vulnerabilities.
| Version | Supported |
|---|---|
| 0.1.x | Yes |
All CLI commands run in Docker containers with:
- Read-only root filesystem (
/tmpwritable) seccompsyscall whitelistcap_drop=ALLnetwork_mode="none"during validation- Memory and CPU limits
Commands are validated through hook_validate (template safety, regex guards, dry-run) before deployment. High-risk hooks require Slack/Teams approval. Secrets are never logged or exposed to AI clients.
- Use
docker-socket-proxyto limit Docker API exposure - Rotate API keys and Slack tokens every 90 days
- Monitor audit logs for unexpected
hook_deleteorsecret_setactions - Review seccomp profiles when adding new CLI tools