| Version | Supported |
|---|---|
| 1.0.x | Yes |
If you discover a security vulnerability in Progressive Agent, please report it responsibly:
- Do NOT open a public GitHub issue for security vulnerabilities.
- Open a private security advisory via GitHub's Security tab, or email the maintainers directly.
- Include a clear description of the vulnerability, steps to reproduce, and potential impact.
- We will acknowledge receipt within 48 hours and provide a fix timeline.
Progressive Agent includes several security measures:
- Deny-by-default: Only whitelisted Telegram user IDs can interact with the bot. Unknown users receive no tool or memory access.
- Auto-onboarding: The first
/startcommand registers the owner. Subsequent unknown users are rejected.
- Command blocklist: The CLI tool uses executable extraction with 20+ regex patterns to block dangerous commands.
- Obfuscation detection: Heuristics detect attempts to bypass the blocklist via encoding, variable expansion, or pipe chains.
- Source validation: File copy operations validate source paths to prevent exfiltration of sensitive files (
.ssh,.env, system directories). - Path traversal prevention: File tools validate paths against allowed directories.
- Localhost-only JS evaluation: The
eval_jsfunction in the browser tool only executes JavaScript on localhost URLs, preventing XSS on external sites.
- Daily and monthly spending limits: Configurable thresholds with automatic warnings.
- Cost tracking: Every LLM API call is tracked and logged.
- Local-only storage: All data (memory, conversations, embeddings) is stored locally in SQLite.
- No telemetry: The bot sends no analytics or usage data anywhere.
- Secrets in .env: API keys are stored in
.env(gitignored), never in code or config files.