| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take the security of CodeVista seriously. If you believe you have found a security vulnerability, please report it responsibly.
- Do not open a public issue for the vulnerability.
- Send an email to [INSERT SECURITY EMAIL] with the subject line
[Security] CodeVista Vulnerability Report. - Include as much information as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- We will acknowledge receipt of your report within 48 hours.
- We will provide an initial assessment within 7 business days.
- We will keep you updated on the progress of the fix.
- If the vulnerability is accepted, we will release a fix as soon as possible.
- We follow Coordinated Disclosure — we will work with you to determine a timeline for public disclosure.
- Credit will be given to the reporter (unless anonymity is requested).
- We will not disclose the vulnerability publicly until a fix is released.
When using CodeVista, follow these best practices:
- Only analyze codebases you trust or have permission to analyze.
- CodeVista reads source files — be aware of what you're pointing it at.
- HTML reports contain code excerpts — do not share reports publicly if the codebase contains sensitive information.
- JSON exports may contain security findings — handle with care.
- Snapshots are stored in
~/.codevista/snapshots/— they contain analysis metadata but not source code content. - Review snapshot content before sharing.
- SARIF output may contain file paths and line numbers from your codebase.
- Ensure CI/CD logs are properly secured if your codebase is private.
CodeVista itself includes security scanning capabilities:
- Secret Detection: Identifies hardcoded API keys, passwords, tokens
- Dangerous Function Detection: Flags
eval(),exec(),pickle, etc. - Private Key Detection: Finds private keys committed to source
These features help you secure your codebase, not CodeVista itself.