- Never commit API keys to version control
- Use environment variables or secure config files
- Store keys in
~/.200model8cli/config.yaml(automatically gitignored) - Use the CLI commands to set keys:
200model8cli set-api-key YOUR_KEY
- Don't hardcode API keys in source code
- Don't share config files containing keys
- Don't commit
.envfiles with keys - Don't paste keys in public forums or issues
- All user inputs are validated before processing
- File operations are restricted to safe extensions
- Command execution has safety checks
- File operations are limited to current directory by default
- Destructive operations require confirmation
- Automatic backups before file modifications
- API calls are rate-limited to prevent abuse
- Timeout protection for long-running operations
- Retry logic with exponential backoff
- The CLI can read, write, and execute files
- Always review file operations before confirming
- Use in trusted directories only
- The CLI can make web requests and open browsers
- URLs are validated against allowed domains
- Be cautious with untrusted websites
- Limited system command execution capability
- Blocked dangerous commands (rm -rf, format, etc.)
- Always review system operations
~/.200model8cli/config.yaml # Automatically protected by .gitignore
# Recommended approach
export OPENROUTER_API_KEY="your-key-here"
export GROQ_API_KEY="your-groq-key-here"- Keys are encrypted at rest when possible
- Config files have restricted permissions
- Temporary files are cleaned up automatically
The CLI automatically blocks these dangerous patterns:
rm -rf(recursive deletion)del /f(force deletion)format(disk formatting)fdisk(disk partitioning)- Fork bombs and similar
Before using 200Model8CLI:
- Set API keys using secure methods
- Review file permissions in working directory
- Understand what operations you're authorizing
- Keep the CLI updated to latest version
- Use in trusted environments only
If you find security vulnerabilities:
- DO NOT create public GitHub issues
- Email security concerns privately
- Include detailed reproduction steps
- Allow time for fixes before disclosure
- Rotate API keys periodically
- Review and clean up old config files
- Update to latest CLI version regularly
- Monitor API usage for anomalies
Remember: This CLI has powerful capabilities. Use responsibly and always verify operations before execution.