| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability in Agent SDK, please report it responsibly.
- Do not open a public GitHub issue for security vulnerabilities
- Email security concerns to the maintainers directly
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes
- We will acknowledge receipt within 48 hours
- We will provide an initial assessment within 7 days
- We will work with you to understand and resolve the issue
- We will credit you in the security advisory (unless you prefer to remain anonymous)
The SDK includes a capability-based security model (AgentCapabilities) to control what agents can do:
read_only()- Only allows file readingwith_write(bool)- Controls file write accesswith_exec(bool)- Controls command execution
Always use the minimum required capabilities for your use case.
- Tools are categorized by tier (
ToolTier::Observe,ToolTier::Confirm,ToolTier::RequiresPin) - Implement
AgentHooksto add confirmation flows for sensitive operations - Review tool inputs before execution in production environments
- Never commit API keys to version control
- Use environment variables for sensitive configuration
- Consider using a secrets manager in production
- The
InMemoryFileSystemis useful for sandboxed testing - When using
LocalFileSystem, be mindful of the paths agents can access - Consider chrooting or containerizing agents that need file system access
- Validate inputs - Always validate tool inputs before processing
- Limit scope - Use read-only capabilities when write access isn't needed
- Monitor usage - Implement logging hooks to track agent actions
- Rate limit - Implement rate limiting for tool calls in production
- Review outputs - Be cautious about exposing raw LLM outputs to end users