Documentation Index
Fetch the complete documentation index at: https://docs.bountygrowth.com/llms.txt
Use this file to discover all available pages before exploring further.
Security
Bounty’s CLI and skills are designed for safe agent workflows. The agent receives workflow instructions and authenticated access through the user’s session, not privileged infrastructure credentials.What The CLI Can Access
The CLI can request Bounty product data using the logged-in user’s permissions:- Campaigns
- Ads
- Creative analytics
- Generated actions
- Agent definitions
- Campaign analysis tools
What The CLI Does Not Need
Do not give agents any of the following for normal Bounty CLI workflows:- Database credentials
- Warehouse credentials
- Ad platform credentials
- Infrastructure secrets
- Local environment files
Session Storage
The CLI stores a local user session so future commands can run without repeating browser login. Run this command to clear the stored session:Backend URL Safety
The CLI accepts secure remote backend URLs and local development URLs. It rejects insecure non-local HTTP URLs.Agent Guidance
Agents should:- Use
bounty-cli whoamibefore sensitive work. - Use
--jsonfor parseable evidence. - State the date range used for performance claims.
- Ask the user to authenticate with
bounty-cli loginwhen needed. - Avoid requesting infrastructure secrets.