| Version | Supported |
|---|---|
| Latest | ✅ |
We always recommend using the latest version of RememberCommands to ensure you have the most up-to-date security features and patches.
The RememberCommands plugin includes several built-in security protections:
- HTTPS enforcement: API URLs must use HTTPS protocol
- TLS 1.2+ requirement: Enforced via curl options
- Certificate validation: Relies on system CA bundle
- Length limits: User input limited to 500 characters
- Configuration validation: Temperature (0-1) and max_tokens (1-4096) validated
- Response length checks: Warns on unusually long API responses (>1000 chars)
- Dangerous pattern detection: Automatically detects risky commands:
rm -rf /orrm -rf *dd if=(disk operations)mkfs(filesystem formatting)sudo rmchmod -R 777chown -R
- User confirmation: Prompts before pre-filling dangerous commands
- Review before execution: Commands are pre-filled, not auto-executed
- Error message sanitization: Redacts potential API keys (32+ alphanumeric strings)
- No automatic execution: Users must press Enter after reviewing commands
- No command logging: Plugin does not store command history
Store your API key in macOS Keychain instead of plaintext:
# One-time setup
security add-generic-password -a "$USER" -s "mistral-api-key" -w "your-api-key-here"
# Add to ~/.zshrc
export MISTRAL_API_KEY=$(security find-generic-password -a "$USER" -s "mistral-api-key" -w 2>/dev/null)❌ Don't:
- Commit API keys to version control
- Store keys in plaintext files
- Share your API key publicly
- Use the same key across multiple projects/users
✅ Do:
- Use environment-specific keys
- Rotate keys regularly
- Set up billing alerts in Mistral console
- Review API usage periodically
We take security seriously. If you discover a security vulnerability in RememberCommands, please help us by reporting it responsibly.
-
Open a GitHub Issue with the "Security" label
-
Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact (data exposure, privilege escalation, etc.)
- Suggested fix (if applicable)
-
Do not:
- Disclose the vulnerability publicly before it's fixed
- Exploit the vulnerability beyond confirming its existence
- Test the vulnerability on systems you don't own
- Initial response: Within 48 hours
- Status update: Within 7 days
- Fix timeline: Depends on severity (critical fixes within days, low-priority within weeks)
- Credit: Security researchers will be credited in release notes (unless anonymity is requested)
- Critical: Remote code execution, API key exposure
- High: Command injection, unauthorized API access
- Medium: Input validation bypass, information disclosure
- Low: Error message leaks, minor configuration issues
- Only install from official repository
- Review code before running
install.sh - Verify symlink targets after installation
- Always review commands before pressing Enter
- Test with low-risk queries first (e.g.,
remembercmd list files) - Be cautious with prompts mentioning:
- File deletion
- Permission changes
- System modifications
- Sudo operations
- Monitor API usage at https://console.mistral.ai
- Set up billing alerts
- Review generated commands periodically
- Check for unusual API activity
- Keep Oh My Zsh updated
- Use the latest version of curl (with TLS 1.2+ support)
- Keep jq updated
- Ensure system CA certificates are current
This plugin is designed for:
- ✅ Single-user development environments
- ✅ Local terminal usage
- ✅ Interactive command generation
It is NOT designed for:
- ❌ Multi-user or shared environments
- ❌ Automated/unattended execution
- ❌ Production server automation
- ❌ CI/CD pipelines
- The plugin trusts the Mistral API to return safe commands
- Users must review all commands before execution
- The plugin cannot guarantee 100% detection of dangerous commands
- Advanced obfuscation techniques may bypass detection
If you believe your API key has been compromised:
- Immediately revoke the key at https://console.mistral.ai/api-keys
- Generate a new key and update your configuration
- Review API usage logs for unauthorized activity
- Report suspicious activity to Mistral support
- Check billing for unexpected charges
Security updates are released as needed. To stay informed:
- ⭐ Star the repository on GitHub
- 👀 Watch releases
- 📢 Follow announcements
To update:
cd ~/.oh-my-zsh/custom/plugins/remembercommands
git pull
source ~/.zshrcFor security concerns that don't fit the above categories, you can open a general GitHub Issue.
Last Updated: 2026-02-07
Version: 1.0.0