| Version | Supported |
|---|---|
| 4.x | ✅ |
| 3.x | ✅ |
| 2.x | ✅ |
| 1.x | ✅ |
We take security seriously. If you discover a security vulnerability in Convergio CLI, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please send an email to: roberdan@fightthestroke.org
Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Suggested fix (if any)
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Assessment: We will investigate and assess the vulnerability within 7 days
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Disclosure: We will coordinate with you on public disclosure timing
Convergio CLI includes several features that interact with the system:
file_read/file_write: Blocked for system paths (/etc,/System, etc.)shell_exec: Dangerous commands are blocked (rm -rf,sudo, etc.)web_fetch: Standard HTTP/HTTPS only
- The
ANTHROPIC_API_KEYis read from environment variables - Never commit API keys to the repository
- Use
.envfiles (which are gitignored)
- SQLite database stored in
data/directory - Contains conversation history and memories
- The
data/directory is gitignored by default
- Protect your API key: Never share or commit your Anthropic API key
- Review tool usage: Monitor what tools Ali is using via debug mode
- Backup data: The
data/directory contains your conversation history - Update regularly: Pull the latest version for security patches
We appreciate the security research community's efforts in responsibly disclosing vulnerabilities.
Thank you for helping keep Convergio CLI secure!