| Version | Supported |
|---|---|
| 0.6.x | Yes |
| < 0.6 | No |
If you discover a security vulnerability, please report it responsibly:
- Do not open a public issue
- Email jamesyng79@gmail.com with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- You will receive an acknowledgment within 48 hours
- A fix will be prioritized based on severity
This project uses:
- CodeQL — static analysis on every push
- gitleaks — secret scanning on every push
- pip-audit — dependency vulnerability scanning
- Dependabot — automated dependency updates
The following are in scope for security reports:
- Code injection (SQL injection via FTS5 queries, path traversal in file ingestion)
- Authentication/authorization bypasses in the API
- Credential exposure
- Dependency vulnerabilities with known exploits
Out of scope:
- Denial of service
- Social engineering
- Issues in dependencies without a proof of concept