Security model
RepoVista is an audit assistant. It is not a replacement for tests, manual review, SAST, dependency scanning, or a security assessment.
Read-only default
Audits use read-only intent by default:
repovista audit --sandbox read-onlyworkspace-write is reserved for workflows that need writes, such as repovista fix.
Provider trust
RepoVista sends repository context to the selected provider CLI. Only run it on repositories and with providers you are allowed to use.
Provider plugin trust
Repository-local provider plugins can define arbitrary executables. RepoVista loads them for discovery but will not execute them unless explicitly allowed:
repovista audit --provider custom --allow-repo-provider-pluginor:
REPOVISTA_TRUSTED_PROVIDER_PLUGIN_DIRS=/trusted/plugins repovista audit --provider customSecrets
RepoVista avoids including obvious secret-like content where its ignore and evidence rules apply, but you should still use repository-level secret scanning and .gitignore/ignore rules for private files.
Writes and remote actions
audit,doctor,plan,reports,findings,github-status, andrevieware non-mutating except for RepoVista output/state files.github-statusreads linked GitHub resources throughgh.fixcan write local code and records patch attempts, but it does not commit or push.issue,publish, andopen-prcan create or update GitHub resources after explicit command invocation.--dry-runis supported by publishing, issue, CI-init, patch preview, rollback preview, and related workflows.
