| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in Mimir, please report it by emailing [security contact] or opening a private security advisory on GitHub.
Please do not report security vulnerabilities through public GitHub issues.
We will acknowledge receipt of your vulnerability report within 48 hours and aim to provide a detailed response within 7 days.
We run automated security audits on all dependencies:
- Pre-commit hooks: Blocks high/critical vulnerabilities
- Pre-push hooks: Blocks moderate+ vulnerabilities
- CI/CD: Weekly scheduled scans via GitHub Actions
- Dependabot: Automated dependency updates
All dependencies are regularly audited and updated. We use:
- @yao-pkg/pkg: Actively maintained fork of the deprecated
pkgpackage with security fixes - esbuild: Pinned to >=0.25.0 via resolutions to ensure dev server security fixes are applied
No known vulnerabilities in production or development dependencies.
Mimir supports Docker-based sandboxing for executing untrusted code:
- Resource limits (CPU, memory)
- Network isolation options
- Read-only file system mounts
- Non-root user execution
All command executions go through a permission system:
- Risk assessment (low, medium, high, critical)
- User approval prompts
- Allowlist/blocklist support
- Audit trail in SQLite database
- All configuration validated with Zod schemas
- Path sanitization to prevent traversal attacks
- Parameterized command execution (no string interpolation)
- API Keys: Never commit API keys - use environment variables or
.envfiles - Docker: Enable Docker sandboxing for untrusted code execution
- Permissions: Review permission prompts carefully before accepting
- Updates: Keep Mimir updated to latest version for security patches
- Audit Logs: Regularly review
.mimir/mimir.dbpermission audit trail