If you discover a security issue, do not open a public issue.
Please report details privately to the maintainer via GitHub security advisory:
- Go to the repository
Securitytab - Click
Report a vulnerability
Include:
- Affected version(s)
- Reproduction steps
- Impact assessment
- Suggested remediation if available
- Initial acknowledgement: within 7 days
- Triage decision: within 14 days
- Fix timeline: depends on severity and release impact
This project is an OpenCode plugin and CLI installer helper. Reports should focus on:
- Secret exposure risks (API keys, prompt content)
- Unsafe network behavior
- Command/installer path safety
- Plugin hook behavior that could break OpenCode session safety
Socket.dev reports this package as using network access. That is expected: the server plugin sends eligible prompt text to The Token Company compression API.
The network boundary is intentionally narrow:
- Runtime compression requests are pinned to
https://api.thetokencompany.com/v1/compress. - Custom
TTC_BASE_URLvalues are validated and rejected unless they resolve to the pinned TTC host. - Fetch redirects are rejected with
redirect: "error". - Request payloads are fail-open: if TTC is unavailable, the original prompt text continues unchanged.
- Sidebar state never stores prompt text, compressed output, request bodies, or API keys.