| Version | Supported |
|---|---|
| latest | ✅ |
Please do NOT open a public GitHub issue for security vulnerabilities.
Instead, report vulnerabilities privately:
- Email: Send details to melkholy@techmatrix.com
- Include: Description of the vulnerability, steps to reproduce, potential impact, and suggested fix if any
- Acknowledgment within 48 hours
- Assessment within 1 week
- Fix or mitigation for confirmed vulnerabilities as soon as possible
- Credit in the release notes (unless you prefer anonymity)
Pythinker uses several layers of security:
- Sandboxed execution — All agent tasks run in isolated Docker containers with resource limits
- Container hardening —
no-new-privileges,cap_drop: ALL, minimal capabilities - Network isolation — Internal services (MongoDB, Redis, Qdrant) run on private Docker networks
- JWT authentication — Secure session management
- Secret scanning — CI pipeline includes TruffleHog and dependency auditing
- No direct sandbox access — All browser/terminal access is proxied through authenticated backend endpoints
- Always change default secrets in
.envbefore deploying - Use TLS termination (Traefik/nginx) in production
- Keep Docker images updated
- Monitor container logs for anomalous behavior
- Restrict network access to management ports (MongoDB, Redis, MinIO)