We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take security seriously at AgentKits. If you discover a security vulnerability, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via one of these methods:
- Email: Send details to security@agentkits.net
- GitHub Security Advisories: Report a vulnerability
Please include the following information:
- Type of vulnerability (e.g., command injection, XSS, etc.)
- Full path to the affected file(s)
- Step-by-step instructions to reproduce
- Proof-of-concept or exploit code (if possible)
- Impact assessment
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 30 days (depending on complexity)
We consider security research conducted in accordance with this policy to be:
- Authorized concerning any applicable anti-hacking laws
- Authorized concerning any relevant anti-circumvention laws
- Exempt from restrictions in our Terms of Service that would interfere with conducting security research
We will not pursue legal action against researchers who:
- Make a good faith effort to avoid privacy violations, data destruction, and service interruption
- Only interact with accounts they own or with explicit permission
- Report vulnerabilities responsibly (not publicly disclosed before a fix is available)
When using AgentKits:
- Review plugins before installing - Understand what commands, agents, and MCP servers a plugin includes
- Protect API keys - Never commit API keys or tokens to version control
- Use environment variables - Store sensitive configuration in
.envfiles (gitignored) - Keep updated - Regularly update to the latest version for security patches
AgentKits supports MCP (Model Context Protocol) server integrations. When connecting to external MCP servers:
- Only connect to trusted MCP servers
- Review the permissions requested by each server
- Be aware that MCP servers may have access to sensitive data
Some commands may execute system operations. Always:
- Review command documentation before use
- Be cautious with commands that modify files or system settings
- Use sandboxed environments for testing unfamiliar commands
We appreciate responsible disclosure and will acknowledge security researchers who help us improve AgentKits security (with permission).
Thank you for helping keep AgentKits and our community safe!