| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability in moco-agent, please report it responsibly.
- Do NOT open a public GitHub issue for security vulnerabilities
- Send an email to: security@moco-agent.dev (or create a private security advisory on GitHub)
- Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability and determine its severity
- Updates: We will keep you informed of our progress
- Resolution: We aim to resolve critical vulnerabilities within 7 days
- Credit: We will credit you in our security advisories (unless you prefer anonymity)
When using moco-agent, please follow these security best practices:
- Never commit API keys to version control
- Use environment variables or
.envfiles (which are gitignored) - Rotate API keys regularly
- Use separate API keys for development and production
moco-agent includes built-in guardrails to prevent dangerous operations:
from moco.core.guardrails import Guardrails
guardrails = Guardrails(
# Block dangerous shell commands
enable_dangerous_pattern_check=True,
# Limit input/output length
max_input_length=50000,
max_output_length=100000,
# Limit tool calls per turn
max_tool_calls_per_turn=10,
)Be cautious when enabling tools that can:
- Execute shell commands (
bash) - Write to the filesystem (
write_file,edit_file) - Make network requests (
webfetch,websearch)
Consider using read-only profiles for untrusted inputs.
When using MCP (Model Context Protocol) servers:
- Only connect to trusted MCP servers
- Review the capabilities of each MCP server before enabling
- Use the principle of least privilege
The bash tool can execute arbitrary shell commands. While guardrails block known dangerous patterns (like rm -rf /), it's impossible to block all potentially harmful commands.
Recommendation: Disable the bash tool in production environments or use a sandboxed execution environment.
The read_file and write_file tools can access any file the process has permission to read/write.
Recommendation: Run moco-agent with minimal filesystem permissions and use chroot or containerization in production.
LLM-based agents are susceptible to prompt injection attacks where malicious input attempts to override the system prompt.
Recommendation:
- Validate and sanitize user inputs
- Use the guardrails system to filter suspicious patterns
- Monitor agent behavior for anomalies
- 0.1.0 (2026-01-08): Initial release with guardrails system