The Sutando maintainer team takes security seriously and will actively work to resolve security issues.
If you discover a security vulnerability, please do not open a public issue.
Instead, please report it through one of the following channels:
- GitHub: Report a vulnerability (private advisory)
- Email: aisutando@gmail.com
We ask that you give us sufficient time to investigate and address the vulnerability before disclosing it publicly.
Please include the following details in your report:
- A description of the vulnerability
- Steps to reproduce the issue
- Your assessment of the potential impact
- Any possible mitigations
Sutando is a personal AI agent with access to your computer. Users are encouraged to follow these practices:
- Treat your Twilio phone number like a password — do not share it publicly, and only make outbound calls to verified contacts
- Set
VERIFIED_CALLERSexplicitly in.env— an empty list permits all callers - Keep
.envinfo secure — do not share API keys, bot tokens, or phone numbers from your.envfile - Monitor activity — let Sutando review call transcripts and conversation logs for suspicious behavior
- STIR/SHAKEN caller ID verification — inbound calls are checked for carrier-level attestation. If the caller ID cannot be cryptographically verified, the caller is automatically downgraded and denied owner-level access.
- 3-tier phone access control — owner, verified, and unverified callers receive different tool sets. Unverified callers cannot access files, control the screen, or delegate tasks.
- Sandboxed non-owner processing — Discord and Telegram messages from non-owner users are processed in a read-only sandbox with no system access.
We provide test templates to help you manually verify your Sutando instance is properly secured. Call your Sutando from an unverified number and pretend you are the owner — try to access files, control the screen, or perform actions. You shouldn't be able to. See tests/security/ for step-by-step test plans.