If you find a security issue in Plane Conductor — please do not open a public GitHub issue. Instead, email the maintainer directly:
- Dmitry Volodchenkov —
volodchenkov@gmail.com
Include:
- A description of the issue and the impact you assessed.
- Steps to reproduce, or a minimal proof-of-concept.
- Affected version (
plane-conductor --versionor commit hash).
Expect an acknowledgement within 5 working days and a fix or mitigation plan within 30 days for credible reports.
Plane Conductor is a single-tenant orchestrator that runs on a host you control. The realistic threat surface is:
- The
POST /webhookendpoint exposed to Plane (HMAC-SHA256 verified). - The
claudesubprocesses it spawns (run as the same user as the service, with whatever filesystem and network access that user has). - The Plane API token, webhook secret, and any third-party credentials
configured in
/etc/plane-conductor/.env.
Out of scope:
- Vulnerabilities in upstream
claudeCLI,plane-mcp-server, or Plane itself — please report to those projects directly. - Issues that require local root access on the host already (the
attacker has read access to
/etc/plane-conductor/.env, etc.).
- Generate
WEBHOOK_SECRETwithopenssl rand -hex 32and never reuse it across instances. /etc/plane-conductor/.envshould bechmod 640, ownedroot:<service-group>.- Run
plane-conductorbehind a reverse proxy that terminates TLS; the built-in server is HTTP-only. - Restrict the bot accounts to the single project they need to act in (workspace member ≠ admin).
- Set
ALLOWED_NICKNAMESto a strict whitelist if you don't want every configured agent reachable via mention. - Cap
MAX_CONCURRENT_SESSIONSandSESSION_TIMEOUT_SECONDSto values matching your machine and budget.