Only the latest release receives security fixes. No backport patches for older versions.
| Version | Supported |
|---|---|
| Latest | ✅ |
| Older | ❌ |
If you discover a security vulnerability, do not report it in a public Issue.
Contact the maintainer privately via:
-
GitHub Security Advisory: submit a private report under the repository's Security tab
-
Email: contact @TrueNine directly Please include:
-
Vulnerability description and impact scope
-
Reproduction steps (minimal example)
-
Your OS, Node.js version, and
memory-syncversion -
Suggested fix if any
The maintainer is a person, not a security team. No SLA, no 24-hour response guarantee.
- Will acknowledge receipt as soon as possible
- Will release a patch within a reasonable timeframe after confirmation
- Will publicly disclose vulnerability details after the fix is released Don't rush.
memory-sync is a CLI tool that reads source files only and writes target configs only. Its security boundary:
-
Reads: user
.src.mdxsource files, the global config file (~/.aindex/.tnmsc.json) -
Writes: target tool config directories (
.cursor/,.claude/,.kiro/, etc.) -
Cleans: removes stale files from target directories during sync The following are out of scope:
-
Security vulnerabilities in target AI tools themselves
-
Compliance of user prompt content
-
Supply chain security of third-party plugins (
packages/) — all plugins areprivateand not published to npm
- Never modifies source files: read-only on source; writes only to target
- Full clean mode: after sync, only explicitly authorised content remains in target directories — no hidden residue
- No network requests: CLI core makes no outbound network requests (version check excepted, and times out gracefully)
- No telemetry: no user data collected or reported
This project is licensed under AGPL-3.0. Unauthorised commercial use in violation of the licence will be pursued legally.