AIDD is currently in active development. Security updates will be applied to the latest version on the main branch.
| Version | Supported |
|---|---|
| main | ✅ |
| < 2.0 | ❌ |
If you discover a security vulnerability in AIDD, please report it responsibly:
- Do NOT open a public GitHub issue
- Email the maintainer directly (check GitHub profile for contact info)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes
We will acknowledge receipt within 48 hours and provide a more detailed response within 7 days.
AIDD executes AI-generated commands and code. Users should:
- Review iteration logs in
.aidd/iterations/ - Monitor git commits for unexpected changes
- Use in controlled environments
- Not use on production systems without review
AIDD has full file system access within project directories. Users should:
- Only run AIDD on projects they control
- Review the
copydirs.txtfile before using shared directory sync - Ensure proper file permissions on sensitive directories
AIDD relies on OpenCode or KiloCode CLIs for AI access. Users should:
- Follow the security guidelines of their chosen CLI
- Ensure API keys are properly secured
- Not commit API keys to version control
- Use environment variables for sensitive configuration
AIDD is a shell script with minimal dependencies:
- Bash 4.0+
- OpenCode or KiloCode CLI
- jq (optional)
- rsync (optional, falls back to cp)
Users should ensure these dependencies come from trusted sources.
- Review AI-generated code before committing to production
- Use version control to track all AIDD changes
- Test in isolated environments before production use
- Monitor iteration logs for unexpected behavior
- Keep CLIs updated to latest secure versions
- Use project-specific rules (
.aidd/project.txt) to enforce constraints
AIDD is a development tool intended for use by developers on their own projects. It is not designed for:
- Production deployment
- Multi-tenant environments
- Untrusted code execution
- Security-critical applications without human review
We appreciate responsible disclosure of security vulnerabilities. Contributors who report valid security issues will be acknowledged (with permission) in release notes.