| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability in this project, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please send an email to the repository maintainer with:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (if applicable)
You can reach the maintainer through the contact information on their GitHub profile.
- Acknowledgment: Within 48 hours of your report
- Assessment: Within 1 week, we'll assess the severity and confirm the vulnerability
- Fix: Critical vulnerabilities will be patched as soon as possible
- Disclosure: We'll coordinate with you on public disclosure timing
This project handles document processing and integrates with external APIs. Key security areas:
- Never commit API keys or secrets to the repository
- All API keys are loaded from environment variables (
.envfile) - The
.envfile is excluded from version control via.gitignore
- File paths are sanitized to prevent directory traversal attacks
- Input validation is applied at all system boundaries
- File hashes (SHA-256) verify document integrity throughout the provenance chain
- SQLite databases are stored locally (not exposed to network)
- No SQL injection vectors (parameterized queries throughout)
- Database files are excluded from version control
- Dependencies are regularly reviewed for known vulnerabilities
- Run
npm auditto check for dependency vulnerabilities