| Version | Supported |
|---|---|
| latest | ✅ |
If you discover a security vulnerability in Gobby, please report it responsibly:
- Do not open a public GitHub issue for security vulnerabilities
- Email security concerns to the maintainers directly
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge receipt within 48 hours and aim to provide a fix within 7 days for critical issues.
Gobby is designed as a local-first daemon:
- All data is stored locally in SQLite (
~/.gobby/gobby-hub.db) - No data is sent to external servers unless explicitly configured
- MCP proxy connections are user-configured
- API keys in
config.yamlshould have restricted file permissions - Never commit
~/.gobby/config.yamlto version control - Use environment variables for sensitive values when possible
By default, Gobby binds to localhost:
- HTTP server:
127.0.0.1:8765 - WebSocket server:
127.0.0.1:8766
Do not expose these ports to the public internet without proper authentication.
Hook dispatcher scripts execute with the permissions of the calling AI CLI. Review hook configurations before installation:
# Review what will be installed
cat src/install/claude/hooks/hook_dispatcher.py- Keep Gobby updated to the latest version
- Review MCP server configurations before adding them
- Monitor logs at
~/.gobby/logs/for suspicious activity - Use restrictive file permissions on the
~/.gobby/directory