We actively support the latest version of Cortex. Security updates are provided for the current release.
| Version | Supported |
|---|---|
| Latest | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security vulnerability, please follow these steps:
- Do not open a public GitHub issue
- Email security concerns to: [YOUR_EMAIL]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and work with you to address the issue.
- Keep Cortex updated to the latest version
- Use strong system-level encryption for your device
- Be cautious when sharing database/export files
- Review exported data before sharing
See SECURITY-REVIEW.md for our security review checklist.
- Always validate and sanitize user inputs
- Use centralized validation functions
- Sanitize values before storing in database
- Never expose sensitive information in error messages
- Use structured logging instead of
printin production - Hide stack traces in production builds
- Always use parameterized queries
- Never concatenate user input into SQL strings
- Use centralized database access functions
- Keep dependencies up to date
- Review security advisories regularly
- Use
pip-auditbefore releases
- Input Sanitization: All text inputs should be sanitized to remove HTML and control characters
- SQL Injection Protection: All queries use parameterized statements
- Error Sanitization: Production error messages are generic and don't expose system details
- Dependency Scanning: Automated vulnerability scanning in CI/CD
- Secrets Scanning: Gitleaks prevents accidental credential commits
- Local data tampering
- Memory inspection
- Malicious plugins/extensions
- Input validation at all entry points
- Parameterized database queries
- Secure session management
Security updates are released as needed. We recommend:
- Enabling automatic updates if available
- Checking for updates regularly
- Reviewing release notes for security fixes
- Vulnerabilities are disclosed after a fix is available
- We credit security researchers who responsibly disclose issues
- Critical vulnerabilities may be disclosed immediately if already exploited
- Semgrep v1 action pinned to commit SHA
713efdd345f3035192eaa63f56867b88e63e4e5dfor reproducibility - Prevents supply chain attacks via floating version tags
- Ensures deterministic security scanning across all CI runs
- Added
.gitleaks.tomlallowlist configuration to reduce false positives - Review
.gitleaks.tomland customize allowlist rules for your repository - Note: This repo uses gitleaks CLI directly (not the GitHub Action)
For security concerns: [YOUR_EMAIL]
For general questions: Open an issue on GitHub