| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take the security of CLI Agent Orchestrator seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them through one of the following methods:
-
GitHub Security Advisories: Use the Security Advisories feature to privately report a vulnerability.
-
Email: Send an email to the AWS Security team. See AWS Vulnerability Reporting for details.
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Initial Response: Within 48 hours, we will acknowledge receipt of your report.
- Status Update: Within 7 days, we will provide an initial assessment.
- Resolution: We aim to resolve critical vulnerabilities within 30 days.
This project uses automated security scanning to identify vulnerabilities:
We use Trivy to scan for:
- Filesystem vulnerabilities: Scans Python dependencies and configuration files
- Configuration issues: Checks for misconfigurations in IaC files
- Secret detection: Identifies accidentally committed secrets
Security scans run:
- On every push to the
mainbranch - On every pull request targeting
main
Pull requests are automatically checked for:
- Known vulnerabilities in dependencies
- License compliance issues
- Dependency version changes
You can run Trivy locally to check for vulnerabilities before committing:
# Install Trivy
brew install trivy # macOS
# or
sudo apt-get install trivy # Ubuntu/Debian
# Scan the repository
trivy fs --severity HIGH,CRITICAL .
# Scan Python dependencies
trivy fs --scanners vuln --severity HIGH,CRITICAL .When using CLI Agent Orchestrator:
-
Keep Dependencies Updated: Regularly update to the latest version to get security patches.
-
Secure API Access: The CAO server runs on localhost by default. If exposing externally, use proper authentication and TLS.
-
Agent Profiles: Review agent profiles before installation, especially those from external sources.
-
Environment Variables: Never commit sensitive environment variables. Use
.envfiles (excluded from git) or secure secret management. -
Tmux Sessions: CAO manages tmux sessions that may contain sensitive information. Ensure proper access controls on the host system.
We actively monitor and update dependencies to address security vulnerabilities:
- Dependabot: Automated dependency updates via GitHub Dependabot
- uv.lock: Locked dependency versions for reproducible builds
- Regular Audits: Periodic review of dependency tree for security issues
Security updates are released as patch versions (e.g., 1.0.1) and are documented in:
This project is licensed under the Apache-2.0 License. See LICENSE for details.