-
Notifications
You must be signed in to change notification settings - Fork 2.6k
Description
App Version
3.16.6
API Provider
OpenRouter
Model Used
Claude 3.7 Sonnet
π Steps to Reproduce
Description:
When a directory is provided as context, .rooignore is bypassed, and sensitive files (e.g., .env) listed in .rooignore are still processed, leading to unintended exposure of sensitive data in responses. This undermines the purpose of .rooignore and forces manual exclusion of sensitive files, creating a security risk and workflow inefficiency.
Example:
.rooignore contents:
.env
.env.dev
.env.dist
.env.production
node_modules/
.git
dist/
When providing the directory as context, the response included sensitive .env data and concluded with:

Problem:
The .rooignore file is rendered ineffective when a directory is used as context, negating its role in protecting sensitive files. Manually curating context to exclude ignored files defeats the purpose of .rooignore and increases the risk of errors.
Expected Behavior:
Files and directories specified in .rooignore should be automatically excluded from processing when a directory is provided as context, ensuring sensitive data is not exposed.
Steps to Reproduce:
- Create a
.rooignorefile listing.envand other sensitive files/directories. - Include a directory containing
.envin the context. - Observe that sensitive
.envdata is included in the response despite being listed in.rooignore.
Impact:
- Security: Exposure of sensitive data (e.g., API keys, credentials).
- Usability: Manual exclusion of files undermines
.rooignorefunctionality, increasing complexity.
Suggested Fix:
- Enforce
.rooignorerules during directory context processing to exclude listed files/directories. - Add validation or warnings if ignored files are detected in the context.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status