| Version | Supported |
|---|---|
| 0.0.x | Yes |
If you discover a security vulnerability, please report it responsibly:
- Do NOT open a public issue
- Email nxan2911@gmail.com with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- You'll receive a response within 48 hours
Yeastbook executes arbitrary TypeScript/JavaScript code via new AsyncFunction(). This is by design — it's a notebook runtime, similar to how Jupyter executes Python.
Known attack surface:
- Cell code runs with full Bun/Node.js permissions (filesystem, network, process)
- The WebSocket server has no authentication by default
- The HTTP server binds to localhost only
Recommendations:
- Don't run untrusted notebooks without reviewing cell contents
- Don't expose the server to the public internet
- Use
--portto avoid port conflicts
Security issues in the following areas are in scope:
- Code execution escaping intended sandboxing
- XSS in the notebook UI (output rendering, markdown)
- Path traversal in file operations
- WebSocket message injection