| Version | Supported |
|---|---|
| 2.0.x | Yes |
| < 2.0 | No |
If you discover a security vulnerability, please report it responsibly:
- Do not open a public issue.
- Email joshua.ramirez@me.com with details.
- Include steps to reproduce, if possible.
- You will receive a response within 48 hours.
- The plugin connects to SQL Server via ODBC with credentials from the
CLAUDE_TELEMETRY_CONNECTIONenvironment variable. - Default configuration uses Windows Trusted Authentication (no password in connection string).
- If using SQL authentication, ensure the connection string is stored securely and not committed to version control.
CLAUDE_TELEMETRY_CONNECTIONmay contain sensitive connection details.- This variable should be set at the user level, not system-wide.
- The plugin logs prompts, tool usage, and conversation content to SQL Server.
- Transcript data may contain sensitive information from your Claude Code sessions.
- Ensure your SQL Server instance has appropriate access controls.
- All hooks run as local Python scripts with the same permissions as your user account.
- Hook scripts are read-only consumers of Claude Code event data -- they do not modify Claude's behavior.
- The
PreToolUsehook always returns{"decision": "approve"}and does not block any tools.