| Version | Supported |
|---|---|
| 2026.04.x (latest) | ✅ Yes |
If you discover a security vulnerability, please do not open a public GitHub issue.
Instead, report it via GitHub's private vulnerability reporting:
- Go to the Security tab of this repository
- Click "Report a vulnerability"
- Provide a description, steps to reproduce, and potential impact
We will acknowledge your report within 48 hours and aim to release a fix within 14 days for confirmed vulnerabilities.
M3 Memory is designed with security as a first-class concern:
- Credential storage — AES-256 encrypted vault (PBKDF2-HMAC-SHA256, 600K iterations). API keys and secrets never stored in plaintext. OS keyring integration (Keychain on macOS, Credential Manager on Windows).
- Content integrity — SHA-256 hash computed and stored on every write.
memory_verifyre-computes and compares to detect post-write tampering. - Input safety — write boundary rejects XSS, SQL injection, Python code injection, and prompt injection patterns before data reaches storage.
- Search safety — FTS5 operator sanitization prevents query injection.
- Network hardening — circuit breaker (3-failure threshold), strict timeouts, API tokens never logged.
- Data locality — all data remains on your hardware by default. Optional sync to PostgreSQL is under your control.
In-scope for vulnerability reports:
- Authentication/authorization bypass
- Credential vault weaknesses
- Input sanitization bypasses (XSS, injection, poisoning)
- Data exfiltration vulnerabilities
- Tamper detection failures
Out of scope:
- Issues requiring physical access to the machine
- Social engineering attacks
- Vulnerabilities in third-party dependencies (report to the upstream project)
We periodically run bandit (static analysis), regex-based secrets scans, and pip-audit (dependency CVEs) against the tree and publish the results. Each scan is dated and reproducible — every report includes the exact commands so you can verify on your own machine.
| Date | Report | Headline |
|---|---|---|
| 2026-05-01 | security-scan-2026-05-01.md | Clean shipped library; 14 CVEs all in opt-in / bench-only deps |
CI runs pip-audit scoped to core dependencies on every push, so new CVEs in shipped-library deps surface immediately. See .github/workflows/ci.yml.