mirror of
https://github.com/google-gemini/gemini-cli.git
synced 2026-05-21 11:52:29 +00:00
docs: update security docs
This commit is contained in:
45
SECURITY.md
45
SECURITY.md
@@ -7,3 +7,48 @@ respond within 5 working days of your report on g.co/vulnz.
|
||||
|
||||
[GitHub Security Advisory]:
|
||||
https://github.com/google-gemini/gemini-cli/security/advisories
|
||||
|
||||
## Shared Responsibility Model
|
||||
|
||||
Using Gemini CLI securely requires understanding the shared responsibilities
|
||||
between Google and the user. Gemini CLI is designed as a developer tool for
|
||||
single-user environments and does not enforce a security boundary between
|
||||
multiple user accounts operating on the same device or environment.
|
||||
|
||||
### Google's responsibilities
|
||||
|
||||
- Delivering a secure and patched application through official distribution
|
||||
channels.
|
||||
- Protecting the backend infrastructure and APIs that Gemini CLI interacts with.
|
||||
- Providing security features and integrations, such as secure prompt handling
|
||||
and API key management within the application's intended scope.
|
||||
|
||||
### Customer's responsibilities
|
||||
|
||||
- Securing the local host environment, including the operating system and
|
||||
filesystem permissions.
|
||||
- Managing user access and privileges on the device where Gemini CLI is
|
||||
installed.
|
||||
- Safely managing and storing API keys and credentials outside of the CLI's
|
||||
configuration directories.
|
||||
- Ensuring the CLI is executed in a trusted context and not against untrusted
|
||||
files or within shared, user-writable directories.
|
||||
|
||||
## Security Best Practices
|
||||
|
||||
### Multi-user environments
|
||||
|
||||
If you use Gemini CLI in an environment shared with other users, we recommend
|
||||
the following practices to prevent cross-user leakage and privilege escalation:
|
||||
|
||||
- **Restrict directory permissions:** Ensure your `~/.gemini` configuration
|
||||
directory is readable and writable only by your user account (for example,
|
||||
`chmod 700 ~/.gemini`). Gemini CLI requires write permissions to this
|
||||
directory.
|
||||
- **Isolate execution and file paths:** Don't run Gemini CLI from shared
|
||||
directories (such as `C:\` on Windows) where other users have write access.
|
||||
Additionally, avoid running Gemini CLI against files located in shared
|
||||
directories (such as `/tmp` on Linux/macOS). This prevents attackers from
|
||||
hijacking the dependency resolution process (for example, via malicious
|
||||
`node_modules` folders) or tampering with inputs, executing code in your
|
||||
context.
|
||||
|
||||
Reference in New Issue
Block a user