| Version | Supported |
|---|---|
| 2.x | ✅ |
| < 2.0 | ❌ |
We take security seriously at Memvid. If you discover a security vulnerability, please report it responsibly.
Please do NOT open a public GitHub issue for security vulnerabilities.
Instead, email us at: security@memvid.com
Include the following in your report:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: We will acknowledge your report within 48 hours
- Assessment: We will assess the vulnerability and determine its severity
- Fix Timeline: Critical vulnerabilities will be addressed within 7 days
- Disclosure: We will coordinate with you on public disclosure timing
- Credit: We will credit you in our security advisories (unless you prefer anonymity)
The following are in scope:
- Memory corruption vulnerabilities
- Data leakage from
.mv2files - Encryption bypass (when using
encryptionfeature) - Denial of service attacks
- Path traversal vulnerabilities
We consider security research conducted in good faith to be authorized. We will not pursue legal action against researchers who:
- Act in good faith
- Avoid privacy violations
- Do not access or modify other users' data
- Report vulnerabilities promptly
- Give us reasonable time to fix issues before disclosure
When using Memvid:
- File Permissions: Set appropriate file permissions on
.mv2files - Encryption: Use the
encryptionfeature for sensitive data - Validation: Validate input before ingesting into memory
- Updates: Keep Memvid updated to the latest version
Memvid includes several security features:
- Checksums: Blake3 checksums for data integrity
- Signatures: Ed25519 signatures for authenticity
- Encryption: Optional AES-256-GCM encryption (
.mv2ecapsules) - Crash Safety: WAL-based recovery prevents corruption