The following versions of basic-open-agent-tools are currently supported with security updates:
| Version | Supported | Notes |
|---|---|---|
| 0.9.x | ✅ | Current stable release |
| 0.8.x | ✅ | Previous stable release |
| < 0.8 | ❌ | Legacy versions, please upgrade |
This toolkit is designed for AI agent frameworks and includes security considerations specific to agent deployments:
- Path Validation: All file operations validate paths to prevent directory traversal attacks
- Safe Defaults: Operations default to current working directory when no path specified
- Input Sanitization: File content and paths are validated before processing
- No Arbitrary Execution: File operations do not execute content as code
- Input Validation: All data processing functions validate input types and formats
- Size Limits: Functions include safeguards against processing extremely large data sets
- Safe Parsing: JSON, CSV, and other parsers use safe parsing methods
- No Code Execution: Data processing does not evaluate or execute user input as code
- Type Safety: All functions use JSON-serializable types for secure agent integration
- Parameter Validation: Function parameters are validated for type and format
- Error Handling: Consistent error patterns prevent information leakage
- No Network Operations: Core toolkit avoids network operations to prevent SSRF attacks
- Validate Input: Always validate data before passing to toolkit functions
- Limit Permissions: Run agents with minimal necessary file system permissions
- Monitor Usage: Log and monitor agent tool usage in production
- Sandbox Environment: Consider running agents in sandboxed environments
- Regular Updates: Keep the toolkit updated to receive security patches
We take security seriously. If you discover a security vulnerability, please follow these steps:
- Email: Send details to unseriousai@gmail.com with subject "SECURITY: basic-open-agent-tools"
- GitHub: For non-critical issues, you may create a private security advisory on GitHub
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Suggested fix (if any)
- Your contact information for follow-up
- Initial Response: Within 48 hours
- Investigation: 1-7 days depending on complexity
- Fix Release: Target within 14 days for critical issues
- Public Disclosure: After fix is released and users have time to update
- Report Received: We acknowledge receipt and begin investigation
- Validation: We reproduce and assess the vulnerability
- Fix Development: We develop and test a fix
- Release: We release a patched version
- Disclosure: We publicly disclose details after users can update
Security fixes are released as patch versions (e.g., 0.9.1 → 0.9.2) and are immediately available via:
- PyPI package updates
- GitHub releases with security tags
- Security advisories on GitHub
Thank you for helping keep basic-open-agent-tools secure!