We take security seriously. Currently supported versions for security updates:
| Version | Supported |
|---|---|
| 1.1.x | ✅ |
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We appreciate responsible disclosure of security vulnerabilities. If you believe you have found a security vulnerability in pg-agent-memory, please report it to us as described below.
Please do NOT report security vulnerabilities through public GitHub issues, discussions, or pull requests.
Instead, please send an email to: alex.potapenko.dev@gmail.com
Please include the following information:
- Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Status Updates: We will send status updates every 5 business days until resolution
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- We will respond to your report and may ask for additional information
- We will keep you informed of our progress toward resolving the issue
- We may ask if you would like to be credited for the discovery
- We will notify you when the issue is fixed
- Connection Strings: Never log or expose PostgreSQL connection strings
- Credentials: Use environment variables or secure credential management
- Network: Use SSL/TLS connections to PostgreSQL in production
- Access Control: Follow principle of least privilege for database access
- Sensitive Data: Memory contents are automatically cleaned up on process exit
- Logging: We never log conversation content or memory data
- Encryption: Consider encryption at rest for sensitive memory data
- SQL Injection: All database queries use parameterized statements
- Content Sanitization: User content is validated before storage
- Size Limits: Built-in protection against oversized inputs
When using pg-agent-memory in production:
- Environment Variables: Store sensitive configuration in environment variables
- Database Security: Use dedicated database users with minimal required permissions
- Network Security: Ensure PostgreSQL is not exposed to the public internet
- Monitoring: Monitor for unusual access patterns or query volumes
- Updates: Keep pg-agent-memory and its dependencies up to date
This security policy applies to:
- The pg-agent-memory npm package
- Official documentation and examples
- Associated build and deployment tools
This policy does not apply to:
- Third-party dependencies (report to their respective maintainers)
- Applications built using pg-agent-memory (unless the vulnerability is in our code)
- Infrastructure or hosting platforms
We support safe harbor for security researchers who:
- Make a good faith effort to avoid privacy violations and data destruction
- Only interact with their own accounts or test accounts
- Do not access or modify data belonging to others
- Do not exploit vulnerabilities beyond the minimum necessary to demonstrate the issue
- Report vulnerabilities promptly
- Do not violate any applicable laws or regulations
We believe in recognizing the efforts of security researchers. With your permission, we will:
- Credit you in our security advisories
- Include your name in our acknowledgments
- Provide a brief description of the issue you found (if desired)
Thank you for helping keep pg-agent-memory and its users safe!