If you discover a security vulnerability in the Astrolift CLI, please report it responsibly.
Do not open a public issue.
Instead, email [email protected] with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge your report within 48 hours and aim to release a fix within 7 days for critical issues.
| Version | Supported |
|---|---|
| latest | Yes |
The CLI is pre-1.0 and surface may shift; only the latest tagged release is supported. When 1.0 ships, this matrix will expand.
When using the Astrolift CLI:
- Credentials are stored at
~/.config/astrolift/credentials/<server>.yamlwith mode0600. The CLI refuses to read credentials files with wider permissions — don't loosen them. - Use a deploy token (
ASTROLIFT_DEPLOY_TOKEN) for CI; never use a personal access token from automation. - Don't commit
~/.config/astrolift/or any file under it to source control. - Rotate deploy tokens regularly via
astro app tokens(per-app) orastro org tokens(org-scoped). - Use
astro auth statusto check token expiry; letastro auth refreshrotate access tokens rather than long-lived credentials. - Verify the platform you're logging into —
astro server add <slug> <api-url>binds a slug to a URL; check the URL before completing the device flow. - Run
astro version-checkperiodically; the platform reports the minimum supported CLI and the upgrade URL.