| Version | Supported |
|---|---|
| 4.x.x | ✅ |
| 3.x.x | ✅ |
| < 3.0 | ❌ |
If you discover a security vulnerability in Gemini-Kit, please report it responsibly:
- DO NOT create a public GitHub issue for security vulnerabilities
- Email: Create a private security advisory
- Or contact via GitHub Discussions (private message)
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
| Action | Timeline |
|---|---|
| Initial response | Within 48 hours |
| Status update | Within 7 days |
| Fix release | Within 30 days (critical: 7 days) |
Gemini-Kit includes built-in security protections:
The before-tool hook automatically detects and blocks:
- AWS Access Keys & Secrets
- GitHub/GitLab Tokens
- OpenAI/Anthropic API Keys
- Private Keys (RSA, SSH, PEM)
- Database Connection Strings
- JWT Secrets
Dangerous commands are blocked:
rm -rf /- Fork bombs
- Pipe to shell (
curl | sh)
All file operations validate paths using validatePath() to prevent:
- Directory traversal attacks (
../) - Access to sensitive system files
Before making changes:
kit_create_checkpoint- Creates git checkpointkit_restore_checkpoint- Rollback if needed
/code-preview- Preview changes before applying
- Review changes before accepting AI-generated code
- Use checkpoints before large operations
- Don't store secrets in your codebase
- Review diffs before committing
- Run
npm testbefore submitting PRs - Run
npm run lintto check code quality - Add tests for security-sensitive features
- Follow secure coding practices
We thank the security researchers who help keep Gemini-Kit safe.