Synapse Context Engine (SCE) is currently in alpha research status (v0.2.1-alpha). While we take security seriously, this project is not yet recommended for production use with sensitive data.
| Version | Support Status |
|---|---|
| 0.2.x | β Active development |
| 0.1.x | |
| < 0.1.0 | β Not supported |
DO NOT open public issues for security vulnerabilities.
Instead, please report security issues privately:
- Go to the Security tab
- Click "Report a vulnerability"
- Fill out the form with details
Email: [Your security contact email]
Subject line: [SECURITY] SCE Vulnerability Report
Please provide:
- Description: Clear explanation of the vulnerability
- Impact: What an attacker could achieve
- Steps to Reproduce: Detailed reproduction steps
- Affected Versions: Which versions are impacted
- Suggested Fix: If you have ideas (optional)
- Disclosure Timeline: Your expectations for public disclosure
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix & Disclosure: Depends on severity (typically 30-90 days)
SCE operates primarily in local-first environments:
- Web: Runs in browser with no backend
- Desktop: Tauri app with local file system access
- Data: Stored locally (no cloud sync by default)
Risk: Malicious nodes or edges could be injected through user input
Status: Basic sanitization implemented
Mitigation: Input validation on entity creation
Risk: Large graphs could cause memory issues
Status: No hard limits enforced
Mitigation: Monitor graph size, implement pruning
Risk: Carefully crafted queries could trigger unintended memory retrieval
Status: Under research
Mitigation: Activation thresholds provide some protection
Risk: Sensitive data stored in browser localStorage/IndexedDB
Status: No encryption at rest
Mitigation: Users should not store sensitive data in alpha version
Risk: Tauri app has limited file system access
Status: Scope-limited by Tauri permissions
Mitigation: Review src-tauri/tauri.conf.json permissions
As an AI safety-focused project, we welcome security research including:
- β Memory manipulation attacks
- β Adversarial query patterns
- β Graph poisoning techniques
- β Contradiction injection
- β Privacy leakage through graph structure
- β Resource exhaustion attacks
- β Hebbian learning exploitation
- β Social engineering
- β Physical attacks
- β Attacks requiring local system compromise
- β Third-party dependencies (report to upstream)
We follow a coordinated disclosure model:
- Report vulnerability privately
- Work with us on a fix
- Public disclosure after patch release
- Recognition in security advisory (if desired)
We recognize security researchers who help improve SCE:
No reports yet β be the first!
Web Version:
- Don't store sensitive/personal data during alpha
- Use incognito mode for testing with real data
- Clear browser storage after sessions
Desktop Version:
- Review file permissions before building
- Don't grant unnecessary system access
- Keep application updated
Development:
- Don't commit API keys or credentials
- Use environment variables for sensitive config
- Review dependencies regularly (
npm audit)
- Run
npm auditbefore submitting PRs - Sanitize all user inputs
- Validate graph operations
- Document security implications of changes
- Use TypeScript strict mode
- Avoid
eval()andFunction()constructors
Security patches will be:
- Released as priority updates
- Documented in release notes
- Announced in repository discussions
- Tagged with
securitylabel
Subscribe to repository releases to stay informed.
- Security Issues: Use GitHub Security Advisories (preferred)
- General Security Questions: GitHub Discussions
- Maintainer: Lasse "Sasu" Sainia - sasus.dev
Thank you for helping keep SCE and the community safe! π‘οΈ