| Version | Supported |
|---|---|
| 2.3.x | ✅ |
| < 2.3 | ❌ |
By default, PromptMill binds to 127.0.0.1 (localhost only) for security. This prevents unauthorized network access.
For Docker/network deployment:
- Set
SERVER_HOST=0.0.0.0to allow external connections - Always use a reverse proxy (nginx, traefik, caddy) for production
- Configure SSL/HTTPS at the proxy level
- Consider adding authentication at the proxy level
The Docker images:
- Run as non-root user (
promptmill) - Have health checks enabled
- Use pinned base images for reproducibility
Models are downloaded from Hugging Face Hub:
- All downloads use HTTPS
- Models are cached locally after first download
- No authentication required for public models
The application includes:
- Prompt length limits (10,000 characters)
- Temperature clamping (0.1-2.0)
- Token limits (100-2000)
- GPU layer validation (0-100)
If you discover a security vulnerability, please:
- Do NOT open a public issue
- Email the maintainer directly or use GitHub's private vulnerability reporting
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We aim to respond within 48 hours and will work with you to address the issue.
When deploying PromptMill:
- Use a reverse proxy for production deployments
- Enable HTTPS via your reverse proxy
- Keep Docker images updated for security patches
- Limit network access to trusted users
- Monitor resource usage to prevent DoS