| Version | Supported |
|---|---|
| 1.0.x | Yes |
If you discover a security vulnerability in SLM Mesh, please report it responsibly:
- Do not open a public GitHub issue for security vulnerabilities.
- Open a GitHub issue with the
securitylabel and a brief, non-detailed description. - Alternatively, contact the maintainer directly via the repository.
- Acknowledgment: Within 48 hours
- Assessment: Within 1 week
- Fix: Depends on severity (Critical: 48h, High: 1 week, Medium: 2 weeks)
SLM Mesh is designed for single-machine, single-user use. See docs/security.md for the full security model, threat model, and architecture decisions.
- Localhost-only binding (cannot bind to 0.0.0.0)
- Bearer token authentication on all API endpoints
- No shell injection (execFileSync with argument arrays)
- Input validation (UUID peer IDs, payload size limits, rate limiting)
- File permissions (0o600 for sensitive files, 0o700 for directories)
- No telemetry or external data transmission