| Version | Supported |
|---|---|
| 0.x | Yes |
If you discover a security vulnerability, please report it responsibly:
- Do not open a public GitHub issue for security vulnerabilities
- Use GitHub Security Advisories to report privately
- Alternatively, email security concerns to the maintainers via the contact information on the ArtemisAI GitHub profile
We will acknowledge reports within 48 hours and aim to release fixes promptly.
Pi-droid executes ADB commands on connected Android devices. ADB grants broad access to the device including:
- Reading and writing files
- Installing and uninstalling applications
- Executing shell commands
- Capturing screen content
- Sending input events
Only connect devices you trust and control. ADB access is equivalent to physical access to the device.
Plugins are loaded dynamically from npm packages or local paths. A plugin can execute arbitrary code on the host machine and arbitrary ADB commands on connected devices.
- Only install plugins from trusted sources
- Review plugin source code before installation
- Plugins with
requiresApproval: truecapabilities require explicit confirmation before executing actions that affect other users
- Never commit credentials, API keys, device serials, or account data to the repository
- Use environment variables or gitignored configuration files for sensitive data
- Never store credentials in
config/ordata/tracked files -- useconfig/local.jsonor.env(both gitignored)