| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability, please report it responsibly:
- DO NOT open a public issue
- Email vedantjadhav701@gmail.com with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- You will receive a response within 48 hours
- A fix will be released as soon as possible
- This agent executes code locally via
subprocess(pytest, ripgrep, flake8) - It writes files to disk based on LLM output
- Always run in a sandboxed environment or on non-critical code
- Never point the agent at system directories or sensitive files
- Run the agent inside a virtual environment
- Use
--rootto limit the agent's scope to a specific project directory - Review
logs/run.jsonafter each run to audit what the agent did - Back up your code before running the agent on important projects