Currently supported versions of MindBase:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
As this project is in early development, we support only the latest version. Security updates will be released promptly for critical vulnerabilities.
We take the security of MindBase seriously. If you discover a security vulnerability, please report it responsibly.
DO NOT open a public issue for security vulnerabilities.
Instead, please email us at:
- Email: security@agiletec.jp
- Subject:
[SECURITY] MindBase Vulnerability Report
Please provide the following information:
- Description: Clear description of the vulnerability
- Impact: Potential impact and attack scenario
- Reproduction: Step-by-step instructions to reproduce
- Environment:
- Operating system
- Docker version
- MindBase version
- Any relevant configuration
- Proof of Concept: Code or screenshots (if applicable)
- Suggested Fix: If you have ideas for mitigation
- Initial Response: Within 48 hours of report
- Status Update: Within 7 days with assessment
- Fix Timeline:
- Critical: 7-14 days
- High: 14-30 days
- Medium: 30-60 days
- Low: Next scheduled release
- Coordinated Disclosure: We request 90 days before public disclosure
- Credit: We will credit researchers in security advisories (unless you prefer anonymity)
- Updates: We will keep you informed throughout the process
Conversation Data Isolation:
- Conversation data stored in
~/Library/Application Support/mindbase/ - NOT included in Git repository
- Excluded from Docker images
- Local processing only (no external API calls for embeddings)
API Keys and Secrets:
- Use environment variables (
.envfiles) - NEVER commit
.envfiles to Git - Docker secrets recommended for production
- Follow
.env.examplefor configuration
Container Isolation:
- All services run in isolated Docker containers
- No privileged containers
- Minimal base images
- Regular dependency updates
Network Security:
- Services communicate via internal Docker network
- Only necessary ports exposed to host
- No default remote access
PostgreSQL:
- Default credentials for development only
- Change passwords in production
- Use strong passwords (16+ characters)
- Enable SSL/TLS for production deployments
Data Encryption:
- Conversations stored as embeddings (1024-dimensional vectors)
- Database backups should be encrypted
- Consider encrypting data directory at rest
FastAPI Backend:
- Input validation with Pydantic schemas
- SQL injection prevention via SQLAlchemy ORM
- Rate limiting recommended for production
- CORS configuration for allowed origins
Authentication:
- Currently designed for local use only
- Implement authentication before exposing to network
- Use JWT tokens or API keys for production
Regular Updates:
- Monitor dependency vulnerabilities
- Update Python packages:
pip list --outdated - Update Node packages:
pnpm outdated - Review Docker base image updates
Known Dependencies:
- Python: FastAPI, SQLAlchemy, asyncpg, pydantic
- TypeScript: Node.js, tsx
- Docker: PostgreSQL 17, Ollama
- Embedding Model: qwen3-embedding:8b (Ollama)
- Code Review: All changes reviewed before merge
- Static Analysis: Use
ruff,mypyfor Python - Dependency Scanning: Regular security audits
- Least Privilege: Run services with minimal permissions
- Change Default Credentials: Update all passwords
- Enable HTTPS: Use TLS for API endpoints
- Firewall Configuration: Restrict network access
- Regular Backups: Automated, encrypted backups
- Monitoring: Log and monitor security events
- Updates: Keep all dependencies current
- Personal Information: Review conversations for PII before processing
- Data Retention: Implement retention policies
- Access Control: Limit who can access conversation data
- Compliance: Follow applicable regulations (GDPR, etc.)
- Local Development Focus: Designed for single-user local use
- No Built-in Authentication: Not production-ready without authentication
- Default Credentials: Development defaults must be changed for production
- Network Exposure: Should not be exposed to internet without hardening
- User authentication and authorization
- API rate limiting
- Audit logging
- Encrypted backups
- RBAC (Role-Based Access Control)
- Security headers and CSRF protection
No vulnerabilities have been publicly disclosed at this time.
Last Updated: 2025-10-16
Thank you for helping keep MindBase secure!