Back to Home
sudocode-ai icon

sudocode

Verified Safe

by sudocode-ai

Overview

Git-native spec and issue management for AI-assisted software development, enabling agents to track context, manage tasks, and collaborate through structured workflows and feedback loops within a version-controlled repository. It provides agent orchestration, context persistence, and real-time visualization for complex, long-horizon software development tasks.

Installation

Run Command
npm install -g sudocode && sudocode init && sudocode server

Environment Variables

  • SUDOCODE_DIR
  • OPENAI_API_KEY
  • ANTHROPIC_API_KEY
  • LITELLM_MASTER_KEY
  • CLAUDE_PATH
  • COPILOT_PATH
  • CURSOR_PATH
  • DEBUG_PRINT_LIMIT
  • SUDOCODE_WATCH
  • SUDOCODE_PORT
  • NODE_ENV
  • VSCODE_CWD
  • EDITOR
  • VISUAL
  • VOLTA_HOME

Security Notes

Sudocode operates directly within your Git repository, granting AI agents powerful capabilities including code modification, execution of arbitrary commands via tools (e.g., Bash), and direct manipulation of Git state (branches, worktrees). While designed for AI-assisted development, this level of access inherently carries risks. Key security considerations: 1. **Agent Autonomy**: Misconfigured or malicious agents could introduce bugs, compromise data, or execute unintended commands. The `dangerouslySkipPermissions` flag, if enabled, bypasses all interactive permission prompts, significantly increasing risk. 2. **Worktree Isolation**: Executions are isolated in Git worktrees by default, which is a strong protective measure, preventing direct modification of the main branch. However, changes are still intended to be merged back. 3. **Local-first Design**: All project data (`.sudocode/`) is version-controlled in your repository, and user-level credentials (`~/.config/sudocode/user_credentials.json`) are stored locally with restrictive `600` permissions, reducing external attack surface. 4. **External AI Services**: Relies on external AI CLI tools (Claude, Codex, Cursor). The security of the overall system is dependent on the security and behavior of these third-party agents. 5. **Plugins**: Supports third-party integration plugins, which could introduce vulnerabilities if not carefully vetted. 6. **Code Review**: Human oversight and code review of agent-generated changes are critical before merging to main branches. 7. **`restrictToWorkDir`**: The `AcpExecutorWrapper` supports a `restrictToWorkDir` option which, when enabled, configures a PreToolUse hook to block file operations outside the working directory. This enhances isolation but is not enabled by default for all execution modes.

Similar Servers

Stats

Interest Score77
Security Score7
Cost ClassHigh
Avg Tokens5000
Stars126
Forks10
Last Update2026-01-18

Tags

AI-assisted developmentagent orchestrationspec-driven developmentissue trackinggit-nativecontext managementsoftware developmentcollaborationworkflow automationlocal-firstmodel context protocolcliui