| Version | Supported |
|---|---|
| latest | Yes |
Please do not open a public GitHub issue for security vulnerabilities.
Instead, report them responsibly via one of these channels:
- Email: security@memrynote.com
- GitHub Private Vulnerability Reporting: Report a vulnerability
Include as much of the following as possible:
- Description of the vulnerability
- Steps to reproduce
- Affected versions
- Potential impact
- Suggested fix (if any)
- Acknowledgement: within 48 hours
- Initial assessment: within 5 business days
- Fix or mitigation: depends on severity, targeting:
- Critical: 7 days
- High: 14 days
- Medium/Low: next scheduled release
The following areas are in scope:
- Encryption and key management (XChaCha20, Ed25519, Argon2id)
- Sync protocol and server communication
- Authentication and session handling
- Local data storage and IPC boundaries
- Desktop shell security for Electron (CSP, preload/webview boundaries)
- Social engineering attacks
- Denial of service (volumetric)
- Issues in third-party dependencies (report upstream, but let us know)
- Attacks requiring physical access to an unlocked device
We appreciate responsible disclosure. Contributors who report valid vulnerabilities will be credited in release notes (unless they prefer to remain anonymous).