Omniscient is a command history tracker that stores your shell commands locally. We take security seriously because this tool has access to sensitive information.
- Privacy First: All data stored locally in
~/.omniscient/. No network calls. No telemetry. - Transparent Code: Open source with comprehensive tests and ADRs documenting all decisions.
- Automated Security: Continuous security audits via GitHub Actions.
- Responsible Development: AI-assisted development with human review and validation.
- Your Command History: Stored in a local SQLite database
- Your Privacy: Automatic redaction of passwords, tokens, and secrets
- Your Data: No data leaves your machine unless you explicitly export it
// Automatic redaction of sensitive patterns (src/redact.rs)
- Passwords: "password", "passwd", "pwd="
- API Keys: "api_key", "apikey", "api-key"
- Tokens: "token", "auth", "bearer"
- Secrets: "secret", "private_key"When a command matches these patterns, it is not stored (not even redacted - completely dropped).
- Local Only: All data in
~/.omniscient/directory - No Network Calls: Zero network activity (verified in code)
- No Telemetry: No analytics, no tracking, no phone home
- User Control: Export/import allows you to manage your data
- ✅ 91 Automated Tests: Comprehensive test coverage
- ✅ Zero Clippy Warnings: Strict linting enforced
- ✅ Security Audits: Automated
cargo-auditchecks - ✅ Dependency Scanning:
cargo-denyfor license/security - ✅ CI/CD Pipeline: Every commit tested on Ubuntu & macOS
| Version | Supported |
|---|---|
| 1.2.x | ✅ |
| 1.1.x | ✅ |
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take all security reports seriously.
For security vulnerabilities, please DO NOT open a public issue.
Instead, please report security issues via:
- Email: [Your email or security@yourdomain.com]
- GitHub Security Advisory: Use the "Security" tab → "Report a vulnerability"
Please include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if you have one)
- Your contact information
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 24-48 hours
- High: 1 week
- Medium: 2 weeks
- Low: Next release cycle
- We will work with you to understand and verify the issue
- We will develop a fix and coordinate disclosure timing
- We will credit you in the security advisory (unless you prefer anonymity)
- We will publish a security advisory once the fix is released
# Verify the installation source
cargo install omniscient --git https://github.com/daneb/omniscient --tag v1.2.0
# Or build from source (recommended for maximum trust)
git clone https://github.com/daneb/omniscient
cd omniscient
git checkout v1.2.0
cargo build --release# Backup your data
cp -r ~/.omniscient ~/.omniscient.backup
# Review what's being stored
omniscient recent 20
# Export for version control (private repo)
omniscient export ~/omniscient-backup.json
# Clear sensitive commands if needed
rm ~/.omniscient/history.dbAdd your own patterns to ~/.omniscient/config.toml:
[privacy]
enabled = true
redact_patterns = [
"password",
"token",
"my-secret-pattern",
]- ✅
cargo audit: No known security vulnerabilities - ✅
cargo deny: All licenses approved - ✅
clippy: Zero warnings - ✅ Test Suite: 91/91 tests passing
All dependencies are from crates.io and vetted:
rusqlite: Battle-tested SQLite wrapperchrono: Standard datetime libraryclap: Industry-standard CLI parserserde: De-facto Rust serialization- All dependencies use permissive licenses (MIT/Apache-2.0)
This project is developed with AI assistance (Claude). Here's how we ensure quality:
- Human Review: All AI-generated code is reviewed and tested
- Comprehensive Testing: 91 tests validate all functionality
- Architecture Decisions: All major decisions documented in ADRs
- Open Development: Full git history shows incremental development
- No Secrets: AI doesn't have access to your data (runs locally)
# Clone and audit the code yourself
git clone https://github.com/daneb/omniscient
cd omniscient
# Read the architecture decision records
ls docs/adr/
# Review the test coverage
cargo test --verbose
# Check for security issues
cargo install cargo-audit
cargo audit
# Verify no network calls (grep the source)
grep -r "http://" src/
grep -r "https://" src/
# Should return nothing (except comments/tests)- Transparency: You can read every line of code
- Auditability: Security researchers can review the codebase
- Community: Issues are tracked publicly
- Control: You can fork and modify as needed
We are committed to:
- ✅ Regular dependency updates
- ✅ Prompt security patch releases
- ✅ Transparent communication about issues
- ✅ Community engagement on security topics
For security questions (non-vulnerabilities):
- Open a GitHub Discussion
- Tag issues with
securitylabel
For urgent security matters, use the reporting process above.
Last Updated: 2026-02-17 Current Version: 1.2.0