Skip to content

OpenCode CLI scans outside workspace on macOS (triggers internal security alerts) #15163

@zhouxwyeah

Description

@zhouxwyeah

Question

Question

On macOS, opencode-cli appears to scan/index far beyond the intended project/workspace scope, touching many files under ~/Library and other application cache/container directories,Including many internal sensitive files, which triggered alerts. This triggered an internal security alert

Security tools flagged:

  • Process: /Applications/OpenCode.app/Contents/MacOS/opencode-cli
  • Child processes observed: rg (ripgrep), git
  • File access volume: ~18,000+ files (non-repo / non-workspace)

Examples of accessed paths (non-workspace):

  • ~/Library/Caches/Google/Chrome/...
  • ~/Library/Containers/com.XXX.XXX/...
  • ~/.AppData/com.XXXX.XXXX/...
  • ~/Library/Application Support/...

Actual behavior

  • Scans many unrelated directories under the user home (especially ~/Library/**), including browser/app caches and container data.
  • This looks suspicious to endpoint security systems and may violate corporate security policies.

Impact

  • Security incident/alert requiring manual confirmation and investigation.
  • Potential privacy concern (unrelated personal/app data is being traversed).

Environment

  • macOS:
  • OpenCode/OpenCode CLI version:
  • Install method: /Applications/OpenCode.app
  • Workspace path: <e.g. /Users/.../work/...>

Metadata

Metadata

Assignees

Labels

coreAnything pertaining to core functionality of the application (opencode server stuff)

Type

No type
No fields configured for issues without a type.

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions