| Version | Supported |
|---|---|
| 0.3.x | ✅ Current |
| 0.2.x | Security fixes only |
If you discover a security vulnerability, please report it privately:
- Do not open a public GitHub issue.
- Use GitHub private vulnerability reporting from the Security tab of this repository.
- Include steps to reproduce and any relevant details.
We aim to respond to private reports within 72 hours.
This project runs locally and does not expose endpoints to the internet by default. However, the following areas are security-relevant:
- Token-verified cleanup flow: All destructive operations (archive, delete) require a two-step dry-run + confirm-token handshake.
- Provider file path validation: File operations are guarded by provider-root and extension allowlists to prevent path traversal.
- Local API boundary: The product runtime is served by the local Fastify API on
127.0.0.1:8788. Unknown/api/*paths return404. - Desktop API token: Packaged desktop runs generate a per-launch API token and require it for local API requests. Standalone development mode is still local-only; do not expose port
8788to untrusted networks.
We use pnpm audit to track known vulnerabilities in dependencies. Contributors are encouraged to run pnpm audit before submitting PRs.