| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via email to: security@agit-stuff.dev (or create a private security advisory on GitHub).
Include the following information:
- Type of vulnerability (e.g., path traversal, command injection, etc.)
- Full path to the affected source file(s)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact assessment
- Acknowledgment: We will acknowledge receipt within 48 hours.
- Assessment: We will assess the vulnerability and determine its severity.
- Fix Timeline: Critical vulnerabilities will be addressed within 7 days. Others within 30 days.
- Disclosure: We will coordinate with you on disclosure timing.
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous).
AGIT implements several security measures:
- Atomic writes prevent partial file corruption
- File locking prevents race conditions
- All paths are validated to prevent traversal attacks
- No shell command execution with user input
- Content-addressable storage with SHA-256 hashing
- JSON schema versioning for forward compatibility
- Checksums verify object integrity on read
- JSON-RPC 2.0 protocol with strict validation
- No network exposure (stdio transport only)
- Input sanitization on all tool parameters
- Regular dependency audits with
cargo-deny - Automated security scanning in CI
- Minimal dependency footprint
-
Keep AGIT Updated: Always use the latest version to get security fixes.
-
Protect Your
.agitDirectory: The.agitdirectory contains your neural graph history. Ensure appropriate file permissions. -
Review Instruction Files: Check
CLAUDE.md,.cursorrules, and.windsurfrulesbefore committing them to version control. -
Trust Boundaries: AGIT trusts your AI editor via MCP. Only connect editors you trust.
We use cargo-deny to audit dependencies. Our policy:
- No known vulnerabilities in dependencies
- License compatibility checked
- Source repository verification
Run the audit yourself:
cargo deny check