Copyright (c) 2026 Joerg Peetz. All rights reserved.
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability in Memex, please report it responsibly:
- Do NOT open a public issue
- Email: [security contact via GitHub profile]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
You can expect:
- Acknowledgment within 48 hours
- Status update within 7 days
- Credit in the fix (if desired)
NEVER commit your L1/ directory. It contains:
credentials.md— API keys, tokens- Personal rules and identity files
The .gitignore excludes L1/ by default. If you accidentally commit credentials:
- Rotate all exposed keys immediately
- Use
git filter-branchor BFG Repo-Cleaner to purge history - Force push (coordinate with collaborators)
The batch API (mcp/batch.py) accepts API keys via:
- Constructor parameter
- Environment variables (
ANTHROPIC_API_KEY,OPENAI_API_KEY)
Keys are held in memory only — never logged or persisted.
- PDF ingestion validates file headers
- Web clipper sanitizes URLs
- SQL queries use parameterized statements (no injection risk)
The MCP server uses stdio transport by default (local only). If exposing over network:
- Use authentication
- Enable rate limiting
- Run behind a reverse proxy with TLS
Run periodic audits:
pip-audit
# or
safety checkPin dependencies in production deployments.