Skip to content

Security: levitasOrg/cliphive

Security

SECURITY.md

Security Policy

Supported Versions

Version Supported
1.x ✅ Active support

Reporting a Vulnerability

Please do NOT open a public GitHub issue for security vulnerabilities.

Use one of these channels:

  1. GitHub Private Vulnerability Reporting (preferred) — Report a vulnerability
  2. Emailsecurity@cliphive.dev

What to include

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact
  • Any suggested fixes (optional)

Response SLA

  • Acknowledgement: within 48 hours
  • Initial assessment: within 5 business days
  • Fix timeline: based on severity — Critical ≤ 7 days, High ≤ 30 days, Medium ≤ 90 days

Disclosure policy

We follow coordinated disclosure. We ask that you give us reasonable time to address the issue before making it public. We will credit reporters in the release notes unless you prefer to remain anonymous.

Security Design

ClipHive is designed with privacy as a first principle:

  • No network calls — the app never makes outbound connections
  • AES-256-GCM encryption — all clipboard data is encrypted before being written to SQLite
  • DPAPI machine-scope — the encryption key is derived using Windows DPAPI with machine scope; the database cannot be decrypted on another machine
  • Minimal attack surface — no web server, no IPC server, no plugins, no scripting engine

There aren’t any published security advisories