Skip to content

Security: MrFok/opencode-ttc-plugin

Security

SECURITY.md

Security Policy

Reporting a Vulnerability

If you discover a security issue, do not open a public issue.

Please report details privately to the maintainer via GitHub security advisory:

  • Go to the repository Security tab
  • Click Report a vulnerability

Include:

  • Affected version(s)
  • Reproduction steps
  • Impact assessment
  • Suggested remediation if available

Response Targets

  • Initial acknowledgement: within 7 days
  • Triage decision: within 14 days
  • Fix timeline: depends on severity and release impact

Scope

This project is an OpenCode plugin and CLI installer helper. Reports should focus on:

  • Secret exposure risks (API keys, prompt content)
  • Unsafe network behavior
  • Command/installer path safety
  • Plugin hook behavior that could break OpenCode session safety

Network Behavior

Socket.dev reports this package as using network access. That is expected: the server plugin sends eligible prompt text to The Token Company compression API.

The network boundary is intentionally narrow:

  • Runtime compression requests are pinned to https://api.thetokencompany.com/v1/compress.
  • Custom TTC_BASE_URL values are validated and rejected unless they resolve to the pinned TTC host.
  • Fetch redirects are rejected with redirect: "error".
  • Request payloads are fail-open: if TTC is unavailable, the original prompt text continues unchanged.
  • Sidebar state never stores prompt text, compressed output, request bodies, or API keys.

There aren't any published security advisories