-
Notifications
You must be signed in to change notification settings - Fork 15.5k
OpenCode CLI scans outside workspace on macOS (triggers internal security alerts) #15163
Copy link
Copy link
Open
Labels
coreAnything pertaining to core functionality of the application (opencode server stuff)Anything pertaining to core functionality of the application (opencode server stuff)
Description
Question
Question
On macOS, opencode-cli appears to scan/index far beyond the intended project/workspace scope, touching many files under ~/Library and other application cache/container directories,Including many internal sensitive files, which triggered alerts. This triggered an internal security alert
Security tools flagged:
- Process:
/Applications/OpenCode.app/Contents/MacOS/opencode-cli - Child processes observed:
rg(ripgrep),git - File access volume: ~18,000+ files (non-repo / non-workspace)
Examples of accessed paths (non-workspace):
~/Library/Caches/Google/Chrome/...~/Library/Containers/com.XXX.XXX/...~/.AppData/com.XXXX.XXXX/...~/Library/Application Support/...
Actual behavior
- Scans many unrelated directories under the user home (especially
~/Library/**), including browser/app caches and container data. - This looks suspicious to endpoint security systems and may violate corporate security policies.
Impact
- Security incident/alert requiring manual confirmation and investigation.
- Potential privacy concern (unrelated personal/app data is being traversed).
Environment
- macOS:
- OpenCode/OpenCode CLI version:
- Install method:
/Applications/OpenCode.app - Workspace path: <e.g. /Users/.../work/...>
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
coreAnything pertaining to core functionality of the application (opencode server stuff)Anything pertaining to core functionality of the application (opencode server stuff)
Type
Fields
Give feedbackNo fields configured for issues without a type.