| Version | Supported |
|---|---|
| 3.3.x | Yes |
| 3.0.x – 3.2.x | Security fixes only |
| < 3.0 | No |
If you discover a security vulnerability in uvspeed, please report it responsibly:
- Do NOT open a public issue for security vulnerabilities
- Email: Open a private security advisory via GitHub Security Advisories
- Include:
- Description of the vulnerability
- Steps to reproduce
- Affected version(s)
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Assessment: Within 1 week
- Fix release: Within 2 weeks for critical issues
uvspeed includes built-in security scanning:
The bridge server includes a static analysis scanner (POST /api/security/scan) that detects:
- Hardcoded secrets (API keys, passwords, tokens)
- Command injection patterns
- SQL injection patterns
- Path traversal vulnerabilities
- Dangerous function calls (
eval,exec,subprocesswithshell=True) - Insecure deserialization (
pickle.loads,yaml.load)
- Bridge server code execution (
POST /api/execute) runs in isolated subprocesses - Configurable timeout limits (default: 30s)
- Output size limits prevent memory exhaustion
- No filesystem access beyond the working directory
contextIsolation: true— renderer cannot access Node.js APIsnodeIntegration: false— web content cannot require moduleswebSecurity: truein production builds- External links open in system browser, not Electron windows
- Content Security Policy headers on served pages
- Ollama/tinygrad inference runs entirely on-device
- No code is sent to cloud APIs unless explicitly configured (OpenAI/Anthropic keys)
- MCP server communicates via stdio (no network exposure)
- Dependabot monitors npm and pip dependencies
- Minimal dependency footprint:
- Python:
websockets(required),aiohttp/numpy/psutil(optional) - npm:
electron,express,ws,xterm,node-pty
- Python:
- No transitive dependency on known vulnerable packages
The following are in scope for security reports:
- Bridge server API endpoints
- Electron desktop app
- MCP server
- Code execution engine
- Authentication/authorization (if implemented)
- Dependency vulnerabilities
The following are out of scope:
- Static HTML pages served from GitHub Pages (no server-side logic)
- Third-party services (Ollama, OpenAI, Anthropic — report to those vendors)
- Intentional "demo" code in example projects