github nyldn/claude-octopus v9.7.3
v9.7.3 — Security hardening

latest releases: v9.37.4, v9.37.3, v9.37.2...
one month ago

Fixed

  • local outside functionoctopus-statusline.sh and scheduler-security-gate.sh used local at script scope, aborting under set -e. Broke bash statusline fallback and silently bypassed scheduler file path restrictions.
  • Atomic credential writeswriteBackCredentials uses temp + renameSync with mode: 0o600 to prevent concurrent session clobber of ~/.claude/.credentials.json.
  • Atomic cache writeswriteUsageCache uses temp + renameSync to prevent torn JSON.
  • Python injection — Bridge path in context-awareness.sh now passed via os.environ instead of string interpolation into python3 -c.
  • Unsafe /tmp glob removed — No longer falls back to ls -t /tmp/octopus-ctx-*.json. Exits cleanly when session ID is unset.
  • 5 additional timeout guardsplan-mode-interceptor.sh, scheduler-security-gate.sh, sysadmin-safety-gate.sh, telemetry-webhook.sh, agent-teams-phase-gate.sh. Total: 10 hooks hardened.
  • HUD stdin timeoutreadStdin() uses Promise.race with 5s guard.
  • contextBar clamp — Prevents RangeError on pct > 100.
  • Bridge file permissions — Written with umask 0177 (owner-only).

Full changelog: https://github.com/nyldn/claude-octopus/blob/main/CHANGELOG.md

To update: /plugin update octo@nyldn-plugins

Don't miss a new claude-octopus release

NewReleases is sending notifications on new releases.