Skip to content

Security: TrueNine/memory-sync

Security

SECURITY.md

Security Policy

Supported Versions

Only the latest release receives security fixes. No backport patches for older versions.

Version Supported
Latest
Older

Reporting a Vulnerability

If you discover a security vulnerability, do not report it in a public Issue.

Contact the maintainer privately via:

  • GitHub Security Advisory: submit a private report under the repository's Security tab

  • Email: contact @TrueNine directly Please include:

  • Vulnerability description and impact scope

  • Reproduction steps (minimal example)

  • Your OS, Node.js version, and memory-sync version

  • Suggested fix if any

Response Timeline

The maintainer is a person, not a security team. No SLA, no 24-hour response guarantee.

  • Will acknowledge receipt as soon as possible
  • Will release a patch within a reasonable timeframe after confirmation
  • Will publicly disclose vulnerability details after the fix is released Don't rush.

Scope

memory-sync is a CLI tool that reads source files only and writes target configs only. Its security boundary:

  • Reads: user .src.mdx source files, the global config file (~/.aindex/.tnmsc.json)

  • Writes: target tool config directories (.cursor/, .claude/, .kiro/, etc.)

  • Cleans: removes stale files from target directories during sync The following are out of scope:

  • Security vulnerabilities in target AI tools themselves

  • Compliance of user prompt content

  • Supply chain security of third-party plugins (packages/) — all plugins are private and not published to npm

Design Principles

  • Never modifies source files: read-only on source; writes only to target
  • Full clean mode: after sync, only explicitly authorised content remains in target directories — no hidden residue
  • No network requests: CLI core makes no outbound network requests (version check excepted, and times out gracefully)
  • No telemetry: no user data collected or reported

License

This project is licensed under AGPL-3.0. Unauthorised commercial use in violation of the licence will be pursued legally.

There aren’t any published security advisories