| Version | Supported |
|---|---|
| 3.0.x | ✓ Yes |
| < 3.0 | ✗ No |
Recommendation: Use latest 3.x release for security fixes.
DO NOT open public issues for security vulnerabilities.
Preferred: Use GitHub Security Advisory for private reporting.
Alternative: Email maintainers through GitHub profile.
Include:
- Extension version
- VS Code/Positron version
- Operating system
- Detailed description
- Reproduction steps (if applicable)
- Proof of concept (if applicable)
Response Time: Typically 48-72 hours for acknowledgment.
- v3.0+: VS Code Secrets API (encrypted, platform-native)
- Windows: Credential Manager
- macOS: Keychain
- Linux: libsecret/gnome-keyring
- v2.x: Plaintext settings.json (deprecated, insecure)
Run: Redmine: Set API Key command to migrate from plaintext storage.
See Migration Guide.
- HTTPS Required: HTTP connections are rejected
- Certificate Validation: Always enabled, no opt-out
- Self-signed certs: Not supported - use valid certificates (Let's Encrypt is free)
Rationale: Protects API keys from man-in-the-middle attacks.
-
API Key Scope: Redmine API keys grant full account access. Extension only performs read operations and limited updates (time entries, status changes).
-
Network Traffic: All requests use HTTPS with certificate validation. No data sent to third parties.
-
Local Storage: Server URLs stored in workspace settings (may sync via Settings Sync). API keys never sync.
- Rotate API keys regularly
- Use read-only Redmine accounts if possible
- Review
redmine.additionalHeadersfor sensitive data (it syncs, unlike API keys) - Disable Settings Sync for workspaces with sensitive URLs