If you discover a security vulnerability in OpenAnalyst CLI, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, email: security@openanalyst.com
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Remote code execution
- Credential exposure (API keys, tokens)
- Path traversal or sandbox escape
- Injection attacks (command injection, etc.)
- Authentication/authorization bypass
- Data exfiltration through tool misuse
- Acknowledgment: Within 48 hours
- Assessment: Within 7 days
- Fix: Depends on severity (critical: ASAP, high: 14 days, medium: 30 days)
- Disclosure: Coordinated with reporter
| Version | Supported |
|---|---|
| 1.0.x | Yes |
- Never commit API keys to version control
- Use
openanalyst loginfor credential management (stored in~/.openanalyst/credentials.json) - Review tool permissions before granting
danger-full-accessmode - Use
read-onlyorworkspace-writepermission modes for untrusted projects