We take the security of the Claude Coder Docker environment seriously. If you believe you've found a security vulnerability in this project, please follow these steps:
-
Do Not Disclose Publicly: Please do not disclose the issue publicly until it has been addressed.
-
Email Details: Send an email to [email protected] with:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Any suggestions for mitigation
-
Response Time: We'll acknowledge your report within 72 hours and provide an estimated timeline for a fix.
-
Disclosure Process: Once the issue is fixed, we'll:
- Release a patch
- Credit you in the release notes (unless you prefer to remain anonymous)
- Coordinate disclosure timing if needed
This Docker implementation runs Claude Code with the --dangerously-skip-permissions
flag enabled by default:
CMD ["claude", "--dangerously-skip-permissions", "--verbose"]
Security Implications:
- Claude Code will not prompt for permission before accessing files
- All files in mounted volumes are accessible to Claude Code
- Security relies on proper Docker volume configuration
Recommendations:
- Only mount directories that Claude Code should have access to
- Do not mount sensitive directories or files containing credentials
- Consider running without this flag if working with highly sensitive codebases
- Authentication tokens are stored in the
.claude-docker
directory and.claude-docker.json
file - These are mounted as volumes and persist between container runs
- Ensure these files have appropriate permissions on your host machine
We regularly update dependencies to address known vulnerabilities. However, you should:
- Periodically rebuild the Docker image to incorporate security updates
- Check for security advisories related to the project's dependencies
- Consider using tools like Dependabot when forking this repository