Email security@orbweva.com with subject [academy] <short summary>. Please do not open a public GitHub issue.
We aim to acknowledge within 72 hours.
@orbweva/academy performs a narrow set of operations on your machine:
- Shells out to
gitto shallow-clone public GitHub repos underhttps://github.com/ORBWEVA/*into a temp directory. - Reads files from the cloned temp dirs and copies
skills/<name>/folders into either~/.claude/skills/(global) or./.claude/skills/(project-local). - Prints suggested shell commands for CLI tool installs (
brew,winget,scoop,npm -g) and MCP server setup (claude mcp add …). These are not executed automatically — you must copy/paste them. - Removes the temp directory after copying.
It does not: write to ~/.claude.json, edit shell dotfiles, run arbitrary commands from any repo, reach any server besides GitHub, or transmit telemetry.
- Source of skills — only repos listed in
manifest.jsonunder theORBWEVA/*namespace. A malicious PR attempting to add a third-party repo must pass review. - Runtime dependencies — none (beyond Node 18+ and system
git). Zeronode_modules. npxtrust — runningnpx @orbweva/academyexecutes arbitrary npm-published code. Audit the published version by runningnpm view @orbweva/academybefore installing, orgit clonethis repo and runnode bin/install.jsdirectly.
We follow coordinated disclosure:
- Reporter emails security@orbweva.com.
- We triage within 72 hours.
- Fix developed privately; release candidate shared with reporter.
- Patch released + CVE filed if applicable.
- Public advisory 7–30 days after patch release, depending on severity.