We actively support the following versions of SuperMini:
| Version | Supported |
|---|---|
| 2.1.x | ✅ |
| 2.0.x | ✅ |
| 1.x.x | ❌ |
We take security vulnerabilities seriously. If you discover a security vulnerability in SuperMini, please follow these steps:
Please do not report security vulnerabilities through public GitHub issues, discussions, or pull requests.
Send your vulnerability report to:
- Email: security@supermini.app (if available)
- GitHub Security Advisory: Use the "Report a vulnerability" feature
Please include as much information as possible:
- Description: Clear description of the vulnerability
- Impact: Potential impact and attack scenarios
- Steps to Reproduce: Detailed steps to reproduce the issue
- Proof of Concept: If possible, include a minimal proof of concept
- Environment: Version, OS, Python version, dependencies
- Suggested Fix: If you have ideas for fixing the issue
- Acknowledgment: We will acknowledge receipt within 48 hours
- Initial Assessment: We will provide an initial assessment within 7 days
- Regular Updates: We will provide regular updates on our progress
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Keep Updated: Always use the latest version of SuperMini
- Secure API Keys:
- Never commit API keys to version control
- Use environment variables or secure config files
- Regularly rotate your API keys
- Network Security:
- Use HTTPS for all API communications
- Be cautious when processing untrusted files
- File Permissions:
- Ensure proper file permissions for generated outputs
- Be careful with script execution permissions
- Input Validation:
- Validate all user inputs
- Sanitize file paths and names
- Check file types and sizes
- API Security:
- Use secure authentication methods
- Implement rate limiting
- Validate API responses
- Dependencies:
- Keep dependencies updated
- Monitor for security advisories
- Use security scanning tools
- Code Review:
- Review all code changes for security implications
- Use static analysis tools
- Test security-related functionality
SuperMini includes several security features:
- Most processing can be done locally with Ollama
- Optional cloud API usage only when configured
- Proper file path validation
- Safe temporary file creation
- Automatic cleanup of temporary files
- Environment variable support
- Secure configuration storage
- No hardcoded credentials
- Safe operation validation
- Restricted command execution
- User confirmation for high-risk actions
- AI-generated code should be reviewed before execution
- Be cautious with automatically generated scripts
- Validate AI suggestions for security implications
- Processing untrusted files may pose risks
- Large files can cause resource exhaustion
- Some file types may contain embedded code
- API communications are encrypted (HTTPS)
- Local Ollama connections use localhost
- No telemetry data is collected by default
When we receive a security vulnerability report:
- Confirmation: We will confirm the vulnerability and its impact
- Development: We will develop a fix and test it thoroughly
- Coordination: We will coordinate the release with the reporter
- Disclosure: We will publicly disclose the vulnerability after the fix is released
- Credit: We will provide appropriate credit to the reporter (unless they prefer to remain anonymous)
Security updates will be:
- Released as patch versions (e.g., 2.0.1 → 2.0.2)
- Clearly marked in the changelog
- Announced through GitHub releases
- Documented with severity and impact assessment
Currently, we do not have a formal bug bounty program. However, we greatly appreciate security researchers who responsibly disclose vulnerabilities and will:
- Provide public recognition (if desired)
- Include contributors in our security acknowledgments
- Consider featuring contributions in our project documentation
We thank the following security researchers for their contributions:
No security issues have been reported yet. Be the first to help make SuperMini more secure!
If you have questions about this security policy, please:
- Create a public issue for general security questions
- Use private reporting channels for potential vulnerabilities
- Check our documentation for security best practices
By reporting security vulnerabilities, you agree to:
- Give us reasonable time to fix the issue before public disclosure
- Not exploit the vulnerability beyond what's necessary for verification
- Not access or modify user data without explicit permission
- Follow responsible disclosure practices
We commit to:
- Respond to reports in a timely manner
- Keep your information confidential
- Provide credit for your discovery (if desired)
- Not pursue legal action for good-faith security research