| Version | Supported |
|---|---|
| latest | Yes |
If you discover a security vulnerability in MetriLLM, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, open a private security advisory on GitHub with:
- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge receipt within 48 hours and aim to provide a fix or mitigation within 7 days for critical issues.
The following are in scope:
- CLI code (
src/directory) — command injection, arbitrary code execution, data exfiltration - Coding benchmark sandbox (
src/benchmarks/coding.ts) — VM escape, sandbox bypass - Upload mechanism (
src/core/uploader.ts) — data tampering, unauthorized access - Telemetry (
src/core/telemetry.ts) — unintended data collection
The following are out of scope:
- The public leaderboard website (separate repository)
- Supabase infrastructure (report to Supabase directly)
- Social engineering attacks
- No secrets in source code: All credentials are loaded from environment variables at runtime
- Supabase anon key: The anon key is intentionally public and relies on Row Level Security (RLS) for access control — public read + public insert, immutable rows
- Coding sandbox: LLM-generated code runs in a Node.js VM sandbox with
strings: false, wasm: falseand worker thread isolation - Telemetry: Opt-in only, anonymous (hashed CPU+OS+arch), no personal data collected