| Version | Supported |
|---|---|
| 0.x.x | ✅ |
We take security seriously. If you discover a security issue:
- Do NOT report through public GitHub issues
- Contact the maintainer directly at dan@strategicautomation.com with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested mitigations (if any)
- Environment-based configuration (no hardcoded secrets)
SecretStrfor all API keys and sensitive values.envfiles in.gitignore- Deno sandbox for custom TypeScript tools
- Pointer pattern prevents massive output in context windows
- Custom Python tools loaded via
exec_modulewithout sandboxing. Fix in progress. - Path traversal in
read_file/write_file— realpath check insufficient. Fix planned. - Session Data Exposure: Mission-critical data in session logs not yet encrypted.
- Never commit
.envor secrets - Run agents with minimal filesystem permissions
- Review auto-generated tool code before deployment
- Use Deno sandbox over Python sandbox when possible