We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We recommend always using the latest stable release to ensure you have all security patches and updates.
We take the security of amazon-cli seriously. If you discover a security vulnerability, please follow these steps:
Email: [email protected]
Please include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact and severity
- Suggested fix (if you have one)
- Your contact information for follow-up
-
Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours.
-
Initial Assessment: We will provide an initial assessment of the report within 5 business days, including an expected timeline for a fix.
-
Updates: We will keep you informed of our progress throughout the investigation and remediation process.
-
Resolution: Once the vulnerability is fixed, we will:
- Release a security patch
- Publish a security advisory
- Credit you for the discovery (unless you prefer to remain anonymous)
- Please do not publicly disclose the vulnerability until we have released a fix
- We aim to resolve critical vulnerabilities within 30 days
- We will coordinate the disclosure timeline with you
Follow these security best practices when using amazon-cli:
Critical: Ensure your configuration file has restricted permissions to prevent unauthorized access to your credentials.
# Set correct permissions on config file
chmod 0600 ~/.amazon-cli/config.jsonThe configuration file at ~/.amazon-cli/config.json contains sensitive authentication tokens. Setting permissions to 0600 ensures that only your user account can read and write this file.
Verify permissions:
ls -la ~/.amazon-cli/config.json
# Should show: -rw------- (0600)Regularly rotate your authentication credentials to minimize the risk of compromised tokens:
- Re-authenticate periodically: Run
amazon-cli auth loginto generate fresh tokens - Logout when not in use: Use
amazon-cli auth logoutto clear stored credentials when you're done using the CLI - Monitor token expiration: Check
amazon-cli auth statusto see when your tokens expire - Revoke access: If you suspect your credentials have been compromised, immediately logout and re-authenticate
# Logout and clear credentials
amazon-cli auth logout
# Re-authenticate to get fresh tokens
amazon-cli auth loginamazon-cli requires the --confirm flag for all operations that modify data or make purchases. This is a safety mechanism to prevent accidental or unauthorized actions.
Commands requiring --confirm:
amazon-cli cart checkout --confirm- Complete a purchaseamazon-cli cart clear --confirm- Clear your shopping cartamazon-cli buy <asin> --confirm- Quick buy an itemamazon-cli returns create <order-id> <item-id> --confirm- Initiate a returnamazon-cli subscriptions skip <subscription-id> --confirm- Skip subscription deliveryamazon-cli subscriptions frequency <subscription-id> --interval <weeks> --confirm- Change subscription frequencyamazon-cli subscriptions cancel <subscription-id> --confirm- Cancel a subscription
Without --confirm flag: Commands show a preview of what would happen without executing the action.
# Safe: Preview checkout without executing
amazon-cli cart checkout
# Executes the purchase (requires explicit confirmation)
amazon-cli cart checkout --confirmImportant: Never script or automate commands with --confirm without proper safeguards and monitoring.
- Keep software updated: Regularly update amazon-cli to the latest version
- Use in trusted environments: Avoid using amazon-cli on shared or untrusted systems
- Secure your system: Ensure your operating system and development environment are secure
- Review automation scripts: Carefully audit any scripts that use amazon-cli
- Enable verbose logging cautiously: Tokens never appear in verbose output, but avoid sharing logs publicly
- Monitor account activity: Regularly check your Amazon account for unauthorized actions
amazon-cli implements several security features:
- HTTPS only: All communication with Amazon uses TLS encryption
- No credential logging: Authentication tokens are never written to logs
- Rate limiting: Built-in rate limiting helps prevent detection as automation
- Token expiration: Authentication tokens expire automatically
- Confirmation required: Destructive operations require explicit confirmation
If you discover a vulnerability in one of our dependencies, please:
- Report it to the dependency's maintainers directly
- Also notify us at [email protected] so we can track and update accordingly
To stay informed about security updates:
- Watch the GitHub repository for security advisories
- Subscribe to release notifications
- Follow the project changelog
Thank you for helping keep amazon-cli and its users secure.