Skip to content

Security: 0xbrayo/gptme

Security

SECURITY.md

Security Policy

Reporting a Vulnerability

If you discover a security vulnerability in gptme, please report it responsibly.

How to Report

  1. Do NOT open a public issue for security vulnerabilities
  2. Email the maintainers directly at: [email protected] (or contact via GitHub private disclosure)
  3. Include:
    • Description of the vulnerability
    • Steps to reproduce
    • Potential impact
    • Any suggested fixes (optional)

What to Expect

  • Acknowledgment within 48 hours
  • Regular updates on progress
  • Credit for responsible disclosure (if desired)

Scope

This policy applies to:

  • The gptme CLI tool
  • gptme-server
  • gptme-webui
  • Official gptme packages and plugins

Security Model

gptme is designed to execute code on behalf of the user. Key security considerations:

  • Privilege Level: gptme runs with user permissions - it can do anything you can do
  • Interactive Mode: Commands require user confirmation before execution
  • Non-Interactive Mode: Use only in trusted, isolated environments
  • Tool Execution: All tool outputs are logged for audit purposes

See the security documentation for detailed security guidance.

Supported Versions

Version Supported
latest
< 1.0

We recommend always using the latest version for security updates.

There aren’t any published security advisories