- Local code leakage (no cloud default)
- Prompt injection (via malicious diffs)
- Secret scanning false negatives
- Cache poisoning (tampered SQLite)
- Supply-chain (npm deps)
- Local Default: Code never leaves machine (Ollama runs offline)
- Input Sanitization: Diff parser strips shell/meta chars
- Secret Vault: Scan + warn on keys; never log
- Signed Releases: NPM publish with GPG
- Model Isolation: Ollama in sandbox (Docker if flagged)
- GDPR-friendly (no data exfil)
- SOC2-lite (audit logs in cache/)
- Open-source audit (pre-release scans via Semgrep)
- Detect (static scans + runtime assertions)
- Isolate (fail-safe to text output)
- Revoke (cache wipe via CLI)
- Audit (logs in cache/)
- Patch (hotfix via NPM)
Cloud fallback: Opt-in only; keys via .env (ignored).