Security fixes are applied to the latest release only. We recommend always running the most recent version.
| Version | Supported |
|---|---|
| Latest | ✅ |
| Older | ❌ |
Please do not report security vulnerabilities via public GitHub issues.
Instead, report them privately via GitHub Security Advisories. This keeps the details confidential until a fix is ready.
Include:
- A clear description of the vulnerability and its impact
- Steps to reproduce (a minimal proof of concept if possible)
- The version of Cairn you're running
You should receive an acknowledgement within 72 hours. We aim to publish a fix within 14 days for critical issues.
Cairn is a local-first desktop app — it never transmits your notes or project data to any server. Potential security concerns include:
- XSS in the dashboard iframe — dashboards render in a sandboxed
<iframe srcdoc>with noallow-same-originand no network access - Path traversal in the Agent workspace — all file IPC calls validate paths against registered
code_directoryvalues viaassertWithinCodeDirectory - MCP server access control — the MCP server connects directly to your local SQLite database; it should only be exposed to agents you trust
Out of scope: issues requiring physical access to the machine, or issues in third-party dependencies that have no direct impact on Cairn users.
We follow coordinated disclosure. Once a fix is released we'll publish a security advisory crediting the reporter (unless you prefer to remain anonymous).