Important security considerations for using Gnosis Evolve safely.
Gnosis Evolve allows Claude to execute Python code on your system through MCP (Model Context Protocol) tools. While this provides powerful capabilities, it also requires careful security considerations.
With Gnosis Evolve, Claude can:
- Execute Python code through MCP tools
- Read and write files in accessible directories
- Make network requests through tools that support it
- Install new Python packages when creating tools
- Run system commands through some tools (like docker tools)
Claude is limited by:
- Tool boundaries - Only functions exposed through MCP tools
- Python environment - Cannot execute arbitrary system commands outside Python
- File system permissions - Limited by your user account permissions
- Network restrictions - Limited by your firewall and network settings
These activities are generally safe:
- File exploration using file_explorer and evolve_filesystem
- Basic calculations using math_and_stats
- Random number generation using random_generator
- Reading configuration files and logs
- Creating simple text files
Exercise caution with:
- Installing new tools - Review code before installation
- File editing operations - Backup important files first
- Network requests - Be aware of external API calls
- Processing user data - Sensitive information handling
Require careful consideration:
- Docker operations - Container management can affect system
- System file modifications - Could impact system stability
- Installing unknown packages - Potential for malicious code
- Executing user-provided code - Always review first
-
Review Generated Code
"Show me the code before installing this tool" "What exactly will this tool do?" "Explain the security implications of this operation" -
Use in Appropriate Environments
- Development machines: Full functionality
- Personal computers: Use with caution
- Production servers: Not recommended without restrictions
- Shared systems: Requires administrator approval
-
Backup Important Data
# Before major operations "Create a backup of this project before making changes" "Show me what files will be modified"
-
Monitor Tool Activity
# Check logs regularly .\evolve.ps1 -ViewLogs # Windows ./evolve.sh --view-logs # macOS
-
Understand File Permissions
- Tools inherit your user permissions
- Cannot access files you cannot access
- Can modify any file you can modify
-
Use Version Control
# Work in Git repositories when possible git status git add . git commit -m "Before using Gnosis Evolve tools"
-
Validate File Changes
"Show me exactly what changes you're about to make" "Use a diff to show the modifications" "Create a backup before applying these changes"
-
Code Review Process
# Always review tool code for: # - Unnecessary file system access # - Network requests to unknown hosts # - Execution of system commands # - Handling of sensitive data
-
Principle of Least Privilege
- Tools should only access what they need
- Validate all inputs
- Handle errors gracefully
- Log security-relevant operations
-
Secure Coding Practices
# Input validation if not isinstance(user_input, str) or len(user_input) > 1000: return {"error": "Invalid input"} # Path validation if not os.path.abspath(file_path).startswith(allowed_directory): return {"error": "Access denied"} # Command injection prevention # Never use: os.system(user_input) # Use: subprocess.run([command, arg1, arg2], shell=False)
-
Use Virtual Environments
# Isolate Python dependencies python -m venv gnosis_env source gnosis_env/bin/activate # macOS/Linux gnosis_env\Scripts\activate # Windows
-
Network Restrictions
# Consider firewall rules for Python # Block unnecessary outbound connections # Monitor network activity
-
File System Permissions
# Create a dedicated workspace mkdir ~/gnosis_workspace cd ~/gnosis_workspace # Work primarily in this directory
❌ Not Recommended: Using Gnosis Evolve in production environments without significant restrictions.
If you must use in production:
-
Containerization
# Run in isolated container FROM python:3.11-slim RUN useradd -m -s /bin/bash gnosis USER gnosis # ... rest of container setup
-
Restricted User Account
# Create limited user account sudo useradd -m -s /bin/bash gnosis-user sudo usermod -L gnosis-user # Lock password login
-
Network Isolation
- Use VPNs or network segmentation
- Restrict internet access
- Monitor all network connections
-
Regular Log Review
# Check for suspicious activity grep -i "error\|warning\|fail" logs/*.log grep -i "network\|http\|download" logs/*.log
-
Tool Usage Tracking
# Monitor which tools are being used grep "tool.*called" logs/evolve.log
-
File Access Monitoring
# Track file operations grep -i "file.*created\|file.*modified\|file.*deleted" logs/*.log
-
Process Monitoring
# Monitor Python processes ps aux | grep python ps aux | grep claude
-
Network Monitoring
# Monitor network connections netstat -an | grep python lsof -i | grep python
-
File System Monitoring
# Use tools like auditd (Linux) or File Auditing (Windows) # to track file system changes
-
Immediate Actions
# Stop Claude Desktop # Windows .\evolve.ps1 -Stop # macOS ./evolve.sh --stop # Check running processes ps aux | grep -E "(claude|python|mcp)" # Kill if necessary pkill -f "claude\|evolve"
-
Assess Damage
# Check recent file modifications find . -mtime -1 -type f # Check network connections netstat -an # Review logs tail -100 logs/*.log
-
Recovery Steps
- Restore from backups if needed
- Review what tools were active
- Check for any persistent changes
- Update security measures
If you discover a security vulnerability:
- Do not create a public issue
- Email: security@gnosis-evolve.com (if available)
- Discord: Contact moderators privately
- Include: Detailed reproduction steps and impact assessment
- Understand the risks involved
- Choose appropriate environment (development recommended)
- Backup important data
- Review system permissions
- Review generated code before execution
- Monitor log files regularly
- Use version control for important projects
- Validate file changes before applying
- Review all tool code thoroughly
- Test tools in isolated environment first
- Follow secure coding practices
- Document security considerations
- Update Gnosis Evolve regularly
- Review installed tools periodically
- Clean up unused tools
- Monitor system for unusual activity
Gnosis Evolve provides powerful capabilities that require responsible use. By following these security guidelines, you can enjoy the benefits while minimizing risks.
Remember: When in doubt, ask Claude to explain what a tool will do before using it. Claude can help you understand the security implications of any operation.
For questions about security, join our Discord community or review our documentation.
Stay safe! 🔒