| Version | Supported |
|---|---|
| 2.3.x | ✅ |
| 2.2.x | ❌ |
| < 2.2 | ❌ |
If you discover a security vulnerability, please DO NOT create a public issue. Instead:
- Email the details to the maintainer through GitHub
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We aim to respond within 48 hours and will work with you to understand and address the issue promptly.
- No hardcoded API keys or secrets
- Environment variables for sensitive configuration
- Regular dependency updates
- Automated security scanning in CI/CD
- Branch protection on
main - Required PR reviews
- Automated security checks must pass
- No direct commits to main branch
- Local embeddings by default (no data sent to cloud)
- Optional cloud embeddings with explicit opt-in
- No tracking or analytics
- All data stored locally in Docker volumes
- Secrets scanning with Gitleaks
- Dependency vulnerability scanning
- Docker image security scanning with Trivy
- Code quality checks with Bandit
- File permission validation
- Never commit secrets: Use environment variables
- Check dependencies: Run
npm auditandpip-auditbefore submitting PRs - Test locally: Ensure all tests pass before pushing
- Use .gitignore: Don't commit generated files or local data
- Review changes: Double-check your commits for sensitive data
For repository administrators:
- ✅ Require pull request reviews before merging
- ✅ Dismiss stale pull request approvals when new commits are pushed
- ✅ Require status checks to pass before merging:
python-testnpm-package-testdocker-buildsecrets-scandependency-scan
- ✅ Require branches to be up to date before merging
- ✅ Include administrators
- ✅ Do not allow force pushes
- ✅ Do not allow deletions
- ✅ Enable Dependabot security updates
- ✅ Enable secret scanning
- ✅ Enable push protection for secrets
- ✅ Enable vulnerability alerts
- v2.4.11: Security update to address CVE-2025-7458:
- Updated all Docker base images from Python 3.11-slim to Python 3.12-slim
- Added explicit
apt-get upgradein all Dockerfiles for system package updates - SQLite updated from vulnerable 3.40.1 to 3.50.1
- Applied to: importer, watcher, mcp-server, streaming-importer, importer-isolated
- v2.3.9: Added gitleaks configuration to handle false positives and historical secrets
- v2.3.7: Major security cleanup - removed 250+ internal files, secured .env permissions
- v2.3.3: Migrated to local embeddings by default for privacy
- v2.0.0: Complete rewrite with security-first design
During routine security scanning, some API keys were found in git history. These have been:
- ✅ Revoked - All identified keys are no longer active
- ✅ Allowlisted in
.gitleaks.tomlsince they're already invalid - ✅ Preserved in history to avoid disrupting contributors
No action is required from contributors. Your local clones remain safe.