| Version | Supported |
|---|---|
| 0.6.x | Yes |
| < 0.6 | No |
If you discover a security vulnerability in SynthEd, please report it responsibly:
- Do NOT open a public issue
- Email: h.aykut.cosgun@gmail.com with subject line
[SynthEd Security] - Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
You will receive a response within 72 hours.
SynthEd is a research tool that generates fictional synthetic data. It does not:
- Handle real student data
- Provide authentication or access control
- Run as a web service (CLI and library only)
Security concerns most relevant to SynthEd:
- Dependency vulnerabilities -- monitored by Dependabot and CodeQL
- LLM API key exposure -- keys are read from environment variables, never hardcoded
- Tempfile cleanup -- simulation runners clean up temporary directories in
finallyblocks - Input validation -- all
PersonaConfiginputs are validated at construction time
- CodeQL: Automated security scanning on every push and PR
- Dependabot: Automatic dependency update PRs
- Branch protection: 4 required CI checks before merge
- No hardcoded secrets: Verified by grep + CodeQL
- Input validation:
validate_range()andvalidate_probability_distribution()on all config inputs