| Version | Supported |
|---|---|
| 0.x.x | ✅ |
We take security seriously. If you discover a security vulnerability in TermMind, please report it responsibly.
- Do NOT open a public issue for security vulnerabilities.
- Email your report to: [INSERT SECURITY EMAIL]
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes
- We will acknowledge receipt within 48 hours
- We will provide an initial assessment within 7 days
- We will keep you informed of progress
- We will credit you in the release notes (unless you prefer anonymity)
- We will disclose the vulnerability publicly after a fix is released
- We aim to resolve critical vulnerabilities within 7 days
- We aim to resolve high-severity vulnerabilities within 30 days
- API Keys: Store your API keys in
~/.termmind/config.jsonwith restrictive file permissions (chmod 600). Never commit API keys to version control. - File Operations: Review file changes before applying edits. Use
/undoto revert unwanted changes. - Shell Commands: Review commands before running with
/run. TermMind can execute arbitrary shell commands. - Providers: Use local models (Ollama) for sensitive code to avoid sending code to external APIs.
- Configuration: Review
~/.termmind/config.jsonand ensure sensitive values are not exposed.
- TermMind sends code to configured AI providers for analysis. Use local models for proprietary or sensitive code.
- The
/runcommand can execute arbitrary shell commands — use with caution. - Session data is stored in plain text in
~/.termmind/sessions/. - Snippet data is stored in plain text in
~/.termmind/snippets/.