| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| 0.1.x | ❌ |
If you discover a security vulnerability, please:
- Do not open a public issue
- Email security concerns to the maintainers
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and work with you to resolve the issue.
- State database is stored locally by default
- No authentication on local database access
- For production deployments, consider:
- File system permissions
- Encrypted storage
- Network isolation
- Enable authentication for production use
- Configure CORS appropriately
- Use TLS for network deployments
- Set appropriate depth and complexity limits
- pandoc and tesseract are invoked as subprocesses
- Validate and sanitize inputs before processing
- Consider sandboxing for untrusted inputs
- Keep dependencies updated
- Use the
auditanddenyjust recipes - Review agent capabilities in production
- Monitor event logs for suspicious activity
- Regular backups with
db backup