Skip to content

Commit 8eb00c2

Browse files
committed
Add transparency disclaimer and responsible disclosure invitation
- SECURITY.md: new Transparency & Disclaimer section at the top with honest description of filesystem access patterns and liability scope; new Help Us Stay Secure section actively inviting security research with a defined scope and promise of fast response + public credit - README.md: Security & Trust callout after the intro paragraph — brief, direct, links to SECURITY.md for full context
1 parent 0a07187 commit 8eb00c2

2 files changed

Lines changed: 26 additions & 0 deletions

File tree

README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@
1616

1717
High-quality parsing through [tree-sitter](https://tree-sitter.github.io/tree-sitter/) AST analysis across all 66 languages, enhanced with LSP-style hybrid type resolution for Go, C, and C++ (more languages coming soon) — producing a persistent knowledge graph of functions, classes, call chains, HTTP routes, and cross-service links. 14 MCP tools. Zero dependencies. Plug and play across 10 coding agents.
1818

19+
> **Security & Trust** — This tool reads your codebase and writes to your agent configuration files. That is what it is designed to do. If you prefer to audit before running, the [full source is here](https://github.com/DeusData/codebase-memory-mcp) — every release binary is signed, checksummed, and scanned by 70+ antivirus engines before publication. Found a security issue? We want to know — see [SECURITY.md](SECURITY.md). Security is Priority #1 for us.
20+
1921
<p align="center">
2022
<img src="docs/graph-ui-screenshot.png" alt="Graph visualization UI showing the codebase-memory-mcp knowledge graph" width="800">
2123
<br>

SECURITY.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,29 @@
11
# Security Policy
22

3+
## Transparency & Disclaimer
4+
5+
codebase-memory-mcp interacts deeply with your filesystem. It reads source files across your entire codebase, writes to agent configuration files, and spawns background processes. This is inherent to what it does — not a bug.
6+
7+
**If you are uncomfortable with these access patterns**, please audit the source code before running. The full source is available in this repository. Every release binary is reproducibly built from this source and can be independently verified via SLSA provenance, Sigstore signatures, and SHA-256 checksums (see [Verification](#verification) below).
8+
9+
We are humans and can make mistakes. We take security seriously — it is Priority #1 for this project — but we cannot guarantee perfection. By using this software you accept responsibility for evaluating whether it meets your own security requirements.
10+
11+
## Help Us Stay Secure
12+
13+
**We actively invite security researchers to try to break this project.**
14+
15+
If you find a vulnerability — anything from a logic bug to a remote code execution — we want to know. You will receive a fast response, public credit (if you want it), and the knowledge that you helped make a tool used by developers worldwide more secure.
16+
17+
What we consider in scope:
18+
19+
- Arbitrary code execution via MCP tool inputs or CLI arguments
20+
- File reads or writes outside the indexed project root
21+
- Shell injection through any code path
22+
- Binary tampering or supply chain attacks
23+
- Privilege escalation or sandbox escapes
24+
25+
Please report **privately** rather than as a public issue so we can fix before public disclosure. See below for how.
26+
327
## Reporting a Vulnerability
428

529
If you discover a security vulnerability, please report it responsibly:

0 commit comments

Comments
 (0)