If you discover a security vulnerability in Operator-Use, please do not open a public issue. Instead, report it privately via GitHub Security Advisories.
We aim to respond within 48 hours and will work with you to understand and resolve the issue promptly.
- Never commit API keys or tokens to version control.
- Store credentials in your
.envfile and ensure it is listed in.gitignore. - Use environment variables for production deployments.
- Restrict file permissions on your config:
chmod 600 .env
- Always configure
allow_fromlists for all channels (Telegram, Discord, Slack, etc.). - An empty
allow_fromlist means no one is allowed — use it intentionally. - Do not expose your bot token publicly or share it in logs.
- Operator can control your desktop, run terminal commands, browse the web, and read/write files. Only give access to trusted users.
- Never run Operator as a root or administrator account unless absolutely necessary.
- Use a dedicated user account with limited system permissions for production setups.
- Keep dependencies up to date.
- Audit dependencies periodically with:
pip-audit
- Run Operator inside a container or VM for isolation.
- Enable logging and monitor for unexpected activity.
- Use a reverse proxy with HTTPS in front of any exposed webhook ports.
- Restrict inbound network access to only the ports Operator needs.
- Channel allowlisting to restrict who can send messages to the agent.
- HTTPS enforced for all external API calls.
- Webhook signature verification where supported by the platform.
- No built-in rate limiting on incoming messages.
- Session history is stored in plaintext on disk.
- No automatic session expiry.
- Audit logging is minimal by default.
We actively maintain the latest release on PyPI. Older versions do not receive security patches.
| Version | Supported |
|---|---|
| Latest | ✅ |
| Older | ❌ |