Please report security vulnerabilities responsibly.
Do not open a public issue for exploitable vulnerabilities.
Preferred path:
- Open a private GitHub Security Advisory:
- If that is unavailable, contact maintainers directly and include
SECURITYin the subject.
Include the following details:
- Description of the issue
- Impact and potential attacker outcomes
- Reproduction steps or proof of concept
- Affected versions/commit ranges
- Suggested remediation (if available)
- Environment details (OS, shell, provider mode, config context)
- Initial acknowledgment: within 72 hours
- Triage/status update: within 7 days
- Fix timeline by severity:
- Critical: 7-14 days
- High: 14-30 days
- Medium/Low: best effort, usually 30-90 days
Security fixes are provided for:
| Version | Supported |
|---|---|
| 0.1.x | Yes |
| < 0.1.0 | No |
This project executes shell commands through an agent tool. High-priority reports include:
- Sandbox/policy bypasses for blocked commands
- Approval bypasses (
never,on-request,alwaysbehavior defects) - Prompt-injection paths that cause unsafe tool execution
- Secret exposure (API keys, local config leakage)
- Path/workspace boundary escapes
- Report received and acknowledged
- Maintainers validate and assess severity
- Fix is prepared and tested
- Coordinated release and advisory publication
- Avoid committing secrets (API keys, local endpoint credentials)
- Keep
.quincode/config.tomllocal - Treat tool execution and command validation changes as security-sensitive
- Add tests for policy and approval behavior when touching
src/agent.rsorsrc/tools/shell.rs