We actively support the following versions of Squads CLI with security updates:
| Version | Supported |
|---|---|
| 0.x.x | ✅ |
We take the security of Squads CLI seriously. If you discover a security vulnerability, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please report security issues by emailing:
Include the following information:
- Type of vulnerability (e.g., command injection, path traversal, etc.)
- Affected versions of squads-cli
- Steps to reproduce the vulnerability
- Potential impact of the vulnerability
- Suggested fix (if you have one)
- Initial Response: Within 48 hours, we'll acknowledge receipt of your report
- Investigation: We'll investigate the issue and determine its severity
- Updates: We'll keep you informed of our progress
- Resolution: We'll develop and test a fix
- Disclosure: Once fixed, we'll coordinate disclosure timing with you
- Credit: With your permission, we'll credit you in the security advisory
- Security issue reported and confirmed
- Fix developed and tested
- Security advisory drafted
- Patch released
- Security advisory published
- Users notified via GitHub releases and npm
When using Squads CLI, follow these security best practices:
- Never commit API keys or credentials to git repositories
- Use environment variables for sensitive data
- Use
.envfiles (and add to.gitignore) - Consider using secret management tools (HashiCorp Vault, AWS Secrets Manager, etc.)
- Ensure
.agents/directory has appropriate permissions (0700 recommended) - Protect memory and state files from unauthorized access
- Be careful with agent markdown files that may contain sensitive prompts
- Review agent prompts before execution, especially from untrusted sources
- Be cautious with agents that execute system commands
- Use sandboxed environments for untrusted agents
- Implement least-privilege principles for agent permissions
- Use HTTPS for all external API calls
- Validate and sanitize all external inputs
- Implement rate limiting for API calls
- Use authentication for remote agent execution
- Keep squads-cli updated to the latest version
- Monitor security advisories for dependencies
- Use
npm auditto check for vulnerable dependencies
Agents accept natural language prompts which could potentially be exploited. Always:
- Review agent output before executing suggested commands
- Use trusted agent sources
- Implement input validation in production agents
Some agents may execute system commands. Always:
- Review agent code before execution
- Use sandboxed environments when possible
- Implement command whitelisting for production
Memory and state files may contain sensitive information:
- Encrypt sensitive data in memory files
- Use appropriate file permissions
- Consider secure deletion for old state files
- We aim to respond to security reports within 48 hours
- We provide security updates for all supported versions
- We publicly disclose vulnerabilities after fixes are available
- We coordinate disclosure timing with reporters
For security concerns:
- Email: security@agents-squads.com
- General inquiries: contact@agents-squads.com
- Website: https://agents-squads.com/contact
Thank you for helping keep Squads CLI and our community safe! 🔒