Desktop4Kids OS is designed to be offline-first and kid-safe. Security is a core goal of the project, especially around Electron hardening, IPC safety, and protecting local data.
Security fixes are provided for the most recent release.
| Version | Supported |
|---|---|
| v1.4.x | ✅ Yes |
| v1.3.x | ✅ Yes |
| < v1.3 | ❌ No |
If you believe you’ve found a security issue, please report it responsibly.
- Open a GitHub Security Advisory:
Repository → Security → Advisories → Report a vulnerability
This is the best option because it allows private discussion and coordinated fixes.
- Open an Issue using the title: [SECURITY]
- Do not include exploit code or sensitive details in the issue body.
- I will respond asking for details privately.
Please include:
- A clear description of the issue and potential impact
- Steps to reproduce (proof-of-concept is fine)
- Affected area (e.g., File Explorer, IPC bridge, Mentor AI runtime)
- OS + version info (Windows/Linux/macOS) and Desktop4Kids OS version
- Screenshots/logs if helpful (redact any personal info)
Desktop4Kids OS runs locally and does not require internet access after setup. Primary security concerns include:
- Minimizing the
preload.jssurface area - Validating every IPC request and argument
- Preventing arbitrary file system access from the renderer
- Avoiding use of insecure patterns (e.g., enabling
remote)
- User data is stored under
/users/<username>/ - Deleted items are recoverable via Trash (unless permanently deleted)
- The system is designed to prevent cross-user access when properly configured
- AI runs locally via a
.ggufmodel placed in/models/ - Model execution is offline
- Prompts/responses are intended to be filtered for child-safe behavior (work in progress)
- Model choice can affect output quality and safety; use trusted sources
The following are generally out of scope unless they involve a clear vulnerability:
- Issues caused by modified forks or untrusted third-party models
- Social engineering, phishing, or user behavior outside the application
- Bugs that do not impact confidentiality, integrity, or availability
- Performance issues not tied to security
When a valid vulnerability is confirmed:
- I will acknowledge the report
- I will investigate and reproduce the issue
- A fix will be developed and tested
- A release will be published with patch notes
- Credit will be given if requested (or anonymized if preferred)
If you contribute code, please follow these rules:
- Keep
preload.jsminimal - Never expose raw filesystem access to the renderer
- Validate inputs for all IPC calls (type checks + path checks)
- Avoid adding new IPC endpoints unless necessary
- Document security-sensitive changes clearly in PRs
Thank you for helping keep Desktop4Kids OS safe.