| Version | Supported |
|---|---|
| 0.4.x | Yes |
| 0.3.x | Critical fixes only |
| < 0.2 | No |
If you discover a security vulnerability in ax-cli, please report it responsibly:
- Do NOT open a public GitHub issue
- Email security@paxai.app with details
- Include steps to reproduce if possible
- We will acknowledge within 48 hours and provide a fix timeline
Do not include raw PATs, JWTs, API keys, or production secrets in the initial report. If a credential is involved, include the token prefix and last four characters only.
ax-cli handles authentication tokens (PATs) and communicates with the aX Platform API. Security concerns include:
- User PAT, agent PAT, and exchanged JWT handling
- Token storage and handling (
~/.ax/config.toml, token files, and cache files) - API communication (HTTPS enforcement)
- Command injection via user input
- Credential leakage in logs or error messages
- Tokens are stored in config or token files with
0600permissions - Tokens are never logged or printed in full
- User PATs should be treated as bootstrap credentials, not agent runtime credentials
- Agent runtime workflows should use agent-bound PATs or exchanged short-lived JWTs
- The
.ax/directory is in.gitignoreto prevent accidental commits