Only the latest minor release line receives security fixes. swm is a CLI
that handles cloud-provider API keys and writes SSH config, so most relevant
issues are credential-handling, command-injection, or supply-chain bugs in
the release pipeline.
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
Please do not open public issues for security reports.
Use GitHub's private vulnerability reporting: https://github.com/swm-gpu/swm/security/advisories/new
Include:
- The version of
swm(swm --version). - The provider / storage backend involved, if relevant.
- A minimal reproduction and the expected vs. actual behavior.
- Whether credentials are exposed (we will rotate the affected
HOMEBREW_TAP_TOKENand re-issue PyPI/Homebrew artifacts if so).
We will acknowledge within 72 hours and ship a fix on a best-effort basis, prioritizing credential-handling and remote-execution issues. Once a fix is released, the advisory is published with credit to the reporter unless they prefer otherwise.
- Vulnerabilities in upstream cloud providers (RunPod, Vast.ai, Lambda Labs, AWS, GCP, Azure, CoreWeave, Vultr, Fluidstack, TensorDock) — report to them directly.
- Issues that require already having an attacker's API keys configured in
~/.config/swm/config.toml. - Self-DoS by running
swmagainst accounts with insufficient quotas.