AgentFlow
Security

Security

Secrets, scope, MCP, agents, and data sent to providers.

Security

AgentFlow stitches together compilers, MCP servers, subprocess agents, and optional cloud-hosted models—each layer amplifying whichever mistakes already exist in your repository hygiene. Expect shared responsibility: the CLI can enforce scaffolding, but privileged configuration choices and downstream review rituals remain firmly with your team.

Model summary

AreaBehavior
FilesystemOperates on repo + worktrees; investigation respects denylists
Secretstoken_env for Notion; secret_path_denylist; log redaction
Subprocess agentsNo shell; argv-only exec with timeouts
Networkpolicies.allow_network: false by default; agents may still call networks
MCPOff by default; caps output bytes and command time
Cloud modelsData leaves machine when cloud agents run — you control which commands run

Filesystem scope

Surface area stays bounded:

  • Worktrees under .agentflow/worktrees/
  • State and runs under .agentflow/
  • Investigation skips sensitive globs and denylisted paths (.env, keys)

Everything else—including ignored secrets your editors never committed—is still reachable if an operator misroutes commands, so pairing these defaults with least-privilege agent profiles remains essential.

Sensitive logs

application/internal/redact masks common token patterns in output. Do not rely on redaction alone — avoid piping secrets into agent prompts.

External agents

Configured CLIs (cursor-agent, codex, etc.) run with your user permissions. Treat them like any CI tool with repo access.

Reporting issues

See repository SECURITY.md for disclosure guidance whenever you uncover privilege escalations tied to orchestration workflows.