| Version | Supported |
|---|---|
| 1.0.x | ✅ |
We take security vulnerabilities seriously. If you discover a security vulnerability within Prsist, please send an email to the project maintainer rather than using the issue tracker.
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
Prsist includes several built-in security features:
- All file paths are validated to prevent directory traversal attacks
- User input is sanitized before database operations
- SQL injection prevention through parameterized queries
- Restricted file access to project directory only
- Path canonicalization to prevent access outside permitted areas
- Safe file operations with proper error handling
- SQLite database with atomic transactions
- No sensitive data stored in memory files
- Proper database connection handling and cleanup
- Limited memory usage (< 50MB)
- Automatic cleanup of temporary data
- No credential storage in memory files
- Enable branch protection on main branch
- Require pull request reviews for all changes
- Enable secret scanning and push protection
- Use Dependabot for dependency updates
- Limit repository collaborators to trusted users only
- Keep Python and dependencies updated
- Use virtual environments for development
- Review code before committing sensitive changes
- Enable git hooks for automatic validation
- Regularly audit system logs for suspicious activity
- Use minimal required permissions
- Enable monitoring and logging
- Regularly backup memory databases
- Keep system and dependencies updated
- Monitor for security advisories
- Session data contains conversation history and project context
- Memory files are stored locally and not encrypted at rest
- Database files should be excluded from version control
- No network communication by default
- Git integration uses local git configuration
- Claude Code integration is local-only
- File system access limited to project directory
- No authentication mechanism (relies on system security)
- Memory data accessible to anyone with file system access
Security updates will be released as patch versions and announced through:
- GitHub releases
- Security advisories (if applicable)
- Repository README updates
This software is provided "as is" without warranty of any kind. Users are responsible for:
- Securing their development environment
- Protecting sensitive project data
- Following security best practices
- Regular security audits of their usage
For questions about this security policy, please contact the project maintainer.
Last updated: 2025-01-24