| Version | Supported |
|---|---|
| 2.0.x | ✅ Active support |
| 1.0.x | ❌ No longer supported |
If you discover a security vulnerability, please report it responsibly:
- Do NOT open a public GitHub issue
- Email: [email protected]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgement: Within 48 hours
- Initial Assessment: Within 1 week
- Fix & Disclosure: Within 30 days (for valid reports)
The following are in scope:
- API endpoint vulnerabilities (injection, authentication bypass)
- XSS or CSRF in the frontend
- Path traversal in file upload/download
- Information disclosure via error messages
- Container escape or privilege escalation
The following are out of scope:
- Denial of service on local instances
- Issues in third-party dependencies (report upstream)
- Social engineering attacks
- Run the pipeline on a trusted network — the API has no authentication by default
- Use Docker with read-only volumes for production deployments
- Keep Ollama and all dependencies updated
- Never expose the API port (8000) to the public internet without a reverse proxy