| Version | Supported |
|---|---|
| 0.2.x | Yes |
| 0.1.x | Yes |
Do not open a public GitHub issue for security problems.
- Go to the Security Advisories page.
- Click Report a vulnerability.
- Describe the issue, impact, and steps to reproduce.
- Expect a response within 7 days.
- Credit will be given in the changelog (you may request anonymity).
- Credential leakage (passwords stored in plaintext, exposed to renderer)
- Remote code execution via email content (HTML/JS injection escaping sandbox)
- Man-in-the-middle vulnerabilities in TLS handling
- Attachment handling that could execute arbitrary code
- Issues requiring local filesystem access (credentials are stored locally by design)
- Bugs without security impact
- Credentials are stored via
electron-store(encrypted at rest on supported platforms). - Email HTML is rendered in a sandboxed iframe (
sandbox="allow-same-origin"). - The renderer process has
contextIsolation: trueandnodeIntegration: false. - All IPC between renderer and main process goes through the
preload.jsbridge. - IMAP/SMTP connections use TLS by default.