You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: DISCLAIMER.md
+9-2Lines changed: 9 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,30 +19,37 @@ While we have made efforts to review this codebase for security vulnerabilities
19
19
## Recommendations
20
20
21
21
### 1. Review the Code First
22
+
22
23
Before running Automaker, we strongly recommend reviewing the source code yourself to understand what operations it performs and ensure you are comfortable with its behavior.
23
24
24
25
### 2. Use Sandboxing (Highly Recommended)
26
+
25
27
**We do not recommend running Automaker directly on your local computer** due to the risk of AI agents having access to your entire file system. Instead, consider:
26
28
27
29
-**Docker**: Run Automaker in a Docker container to isolate it from your host system
28
30
-**Virtual Machine**: Use a VM (such as VirtualBox, VMware, or Parallels) to create an isolated environment
29
31
-**Cloud Development Environment**: Use a cloud-based development environment that provides isolation
30
32
31
33
### 3. Limit Access
34
+
32
35
If you must run locally:
36
+
33
37
- Create a dedicated user account with limited permissions
34
38
- Only grant access to specific project directories
35
39
- Avoid running with administrator/root privileges
36
40
- Keep sensitive files and credentials outside of project directories
37
41
38
42
### 4. Monitor Activity
43
+
39
44
- Review the agent's actions in the output logs
40
45
- Pay attention to file modifications and command executions
41
46
- Stop the agent immediately if you notice unexpected behavior
42
47
43
-
## No Warranty
48
+
## No Warranty & Limitation of Liability
49
+
50
+
THE SOFTWARE UTILIZES ARTIFICIAL INTELLIGENCE TO GENERATE CODE, EXECUTE COMMANDS, AND INTERACT WITH YOUR FILE SYSTEM. YOU ACKNOWLEDGE THAT AI SYSTEMS CAN BE UNPREDICTABLE, MAY GENERATE INCORRECT, INSECURE, OR DESTRUCTIVE CODE, AND MAY TAKE ACTIONS THAT COULD DAMAGE YOUR SYSTEM, FILES, OR HARDWARE.
44
51
45
-
This software is provided "as is", without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose, and noninfringement. In no event shall the authors or copyright holders be liable for any claim, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the software or the use or other dealings in the software.
52
+
This software is provided "as is", without warranty of any kind, express or implied. In no event shall the authors or copyright holders be liable for any claim, damages, or other liability, including but not limited to hardware damage, data loss, financial loss, or business interruption, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the software or the use or other dealings in the software.
0 commit comments