| Version | Supported |
|---|---|
| 6.x.x | ✅ Actively supported |
| 5.x.x | |
| < 5.0 | ❌ No longer supported |
If you discover a security vulnerability in Alex Cognitive Architecture, please report it responsibly:
Email: Create a private security advisory on GitHub
| Severity | Initial Response | Resolution Target |
|---|---|---|
| Critical | 24 hours | 7 days |
| High | 48 hours | 14 days |
| Medium | 5 days | 30 days |
| Low | 14 days | 60 days |
- Description of the vulnerability
- Steps to reproduce the issue
- Affected versions
- Potential impact
- Suggested fix (if applicable)
- Acknowledgment — We'll confirm receipt of your report
- Investigation — We'll investigate and validate the issue
- Fix Development — We'll develop and test a fix
- Disclosure — We'll coordinate disclosure with you
- Credit — We'll credit you in the release notes (unless you prefer anonymity)
- Local-first design — Data stays on your machine by default
- No telemetry — We don't collect usage data
- Minimal dependencies — Reduced supply chain attack surface
- VS Code sandbox — Extension runs in VS Code's security sandbox
- SecretStorage API — API keys stored encrypted via VS Code
- No hardcoded secrets — All credentials externalized
- Transient tokens — Session tokens not persisted
- HTTPS/WSS only — All external communication encrypted
- Minimal external calls — Only Edge TTS and GitHub (opt-in)
- No data exfiltration — Your code never leaves your machine
- Content Security Policy (CSP) — Prevents XSS attacks
- No inline scripts — All JavaScript in separate files
- Sanitized HTML — User content escaped before rendering
Alex uses VS Code agent hooks (.github/hooks.json) to automate cognitive workflows. These hooks execute shell commands at session start/stop and before/after tool use.
// .vscode/settings.json
{
"chat.tools.terminal.sandbox.enabled": true,
"chat.tools.terminal.sandbox.macFileSystem": {
"allowWrite": ["."],
"denyWrite": ["./.github/config/MASTER-ALEX-PROTECTED.json"]
},
"chat.tools.terminal.sandbox.linuxFileSystem": {
"mode": "project"
}
}Sandbox Settings:
| Setting | Platform | Purpose |
|---|---|---|
chat.tools.terminal.sandbox.enabled |
macOS/Linux | Enable sandboxed terminal execution |
chat.tools.terminal.sandbox.macFileSystem |
macOS | File system access restrictions |
chat.tools.terminal.sandbox.linuxFileSystem |
Linux | File system access mode |
chat.tools.terminal.sandbox.network |
macOS/Linux | Network access restrictions |
Windows Users: Terminal sandboxing is not available on Windows. Hooks execute in the normal VS Code terminal context. Use the Master Alex Protected marker (.github/config/MASTER-ALEX-PROTECTED.json) as a safety gate.
VS Code's Autopilot mode (chat.autopilot.enabled) allows the agent to execute tool calls without manual approval. Alex ships with safety hooks that enforce boundaries even in non-interactive mode.
| Hook | Event | Protection |
|---|---|---|
pre-tool-use.cjs |
PreToolUse | I3/I4: Blocks Initialize/Reset on Master Alex (exit 2) |
pre-tool-use.cjs |
PreToolUse | H8: Denies heir contamination (writing master files from heir workspace) |
pre-tool-use.cjs |
PreToolUse | H9: Denies I8 violations (architecture depending on extension) |
prompt-safety-gate.cjs |
UserPromptSubmit | Scans prompts for embedded secrets and I1 violations |
All safety hooks use decision: "deny" (not warn) — they block the action even when the user is not present to confirm.
| Workflow | Why It's Safe | Example |
|---|---|---|
| Dream / Neural Maintenance | Read-only analysis + write to session files | @alex /dream |
| Meditation | Knowledge consolidation in memory files | @alex /meditate |
| Brain QA | Read-only architecture health check | @alex /brainqa |
| Routine maintenance | Sync, reindex, validate | @alex reindex skills |
| Workflow | Risk | Mitigation |
|---|---|---|
| Code generation / refactoring | May introduce bugs | Review diffs before committing |
| File deletion / restructuring | Data loss | Commit before starting; review changes |
| Publishing / releasing | Public impact | Never run vsce publish in Autopilot |
| Infrastructure changes | External systems | Always require human approval |
Set "chat.autopilot.enabled": false in .vscode/settings.json to return to manual approval mode.
We regularly audit dependencies:
# Check for vulnerabilities
npm audit
# Update dependencies
npm update| Package | Purpose | Risk Level |
|---|---|---|
ws |
WebSocket for TTS | Low (well-maintained) |
fs-extra |
File operations | Low (well-maintained) |
All changes undergo review for:
- Hardcoded secrets
- Unsafe operations (eval, dynamic requires)
- XSS vulnerabilities in webviews
- Path traversal risks
-
npm auditpasses - Dependencies updated
- Security-focused code review completed
- alex_docs/audits/COMPLIANCE-AUDIT.md updated
In case of a security incident:
- Contain — Disable affected functionality
- Investigate — Determine scope and impact
- Fix — Develop and test remediation
- Release — Publish patched version
- Notify — Inform affected users
- Review — Post-mortem and process improvement
Thank you for helping keep Alex safe!