| Version | Supported |
|---|---|
| 0.0.x | ✅ |
We take security seriously. If you discover a security vulnerability in Blade Code, please report it responsibly.
- DO NOT create a public GitHub issue for security vulnerabilities
- Use one of the following methods:
- GitHub Security Advisories (推荐): Report a vulnerability
- Email: [email protected] 或通过 GitHub 联系维护者
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Response Time: We will respond as soon as possible, typically within 3 business days
- Resolution: Critical vulnerabilities will be prioritized and patched as soon as possible
- Credit: We will credit reporters in the release notes (unless you prefer to remain anonymous)
When using Blade Code, follow these security guidelines:
- Never hardcode API keys in your code or configuration files
- Use environment variables:
BLADE_API_KEY,QWEN_API_KEY,VOLCENGINE_API_KEY - Add
.envfiles to.gitignore
# Good: Use environment variables
export BLADE_API_KEY="your-api-key"
# Bad: Don't commit this
# config.json with hardcoded keysBlade Code includes a three-level permission system (allow, ask, deny). Use it wisely:
{
"permissions": {
"allow": [
"Read(*)",
"Glob(*)",
"Grep(*)"
],
"deny": [
"Bash(rm -rf *)",
"Write(*.env)"
]
}
}Blade Code automatically detects sensitive files. Be cautious when:
- Reading or writing
.env,credentials.json,secrets.*files - Executing shell commands that might expose sensitive data
- Using tools that access network resources
- Be careful when using
WebFetchandWebSearchtools - Don't fetch untrusted URLs
- Review any data before sending to external APIs
Bashtool can execute arbitrary shell commands- Always review commands before approving in
askmode - Use
denyrules for dangerous patterns
Read,Write,Edittools can access any file the process has permission to- Use path restrictions in permission rules if needed
- Be cautious in directories with sensitive data
- MCP servers run with the same permissions as Blade Code
- Only install trusted MCP servers
- Review MCP server code before installation
We regularly audit dependencies for vulnerabilities:
# Check for vulnerabilities
pnpm audit
# Update dependencies
pnpm updateSecurity-related changes are documented in CHANGELOG.md with the Security tag.