| Version | Supported |
|---|---|
| 1.x | ✅ |
If you discover a security vulnerability, please report it privately.
Do not open a public issue for security vulnerabilities.
To report a vulnerability:
- Email: zcole@linux.com
- Include a description of the vulnerability
- Include steps to reproduce if possible
- Include potential impact assessment
You can expect:
- Acknowledgment within 48 hours
- Status update within 7 days
- Credit in the fix announcement (unless you prefer anonymity)
When using Gru, be aware of:
- Agent Permissions: Agents execute commands with your user permissions. Use
GRU_WORKDIRto isolate file operations. - Supervised Mode: Default for a reason. Unsupervised and oneshot modes execute without approval.
- Secret Storage: Requires
GRU_MASTER_PASSWORD. Use a strong password. - Admin IDs: Only users in
GRU_ADMIN_IDScan interact with the bot. Verify these are correct. - MCP Servers: Review
mcp_servers.jsoncarefully. MCP servers can execute arbitrary code.