Only the latest release on the main branch receives security updates.
If you discover a security vulnerability, please report it responsibly:
- Do NOT open a public issue.
- Use GitHub's private vulnerability reporting.
- Alternatively, reach out via the Discord server (DM a maintainer).
You should receive a response within 72 hours. If the vulnerability is confirmed, a fix will be prioritized and released as soon as practical.
iNiR is a desktop shell that runs with user-level permissions. Security concerns include:
- Config injection — malicious config.json values that execute arbitrary commands
- Script injection — untrusted input reaching shell scripts without sanitization
- IPC abuse — external processes calling IPC handlers with crafted arguments
- Credential exposure — API keys (Gemini, OpenRouter, etc.) leaking through logs or IPC
Out of scope: compositor vulnerabilities (Niri/Hyprland), Qt/Quickshell framework bugs, and system-level privilege escalation (iNiR never runs as root).