We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
| Version | Supported |
|---|---|
| 0.0.x | ✅ |
The CodeMie team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings, and will make every effort to acknowledge your contributions.
Please DO NOT file a public issue for security vulnerabilities. Instead, please report security vulnerabilities through one of the following channels:
- Go to the Security tab of the repository
- Click on "Report a vulnerability"
- Fill out the security advisory form with details about the vulnerability
After you submit a vulnerability report, you can expect:
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
- Initial Assessment: We will provide an initial assessment within 10 business days
- Updates: We will keep you informed about our progress as we work on a fix
- Resolution: We will notify you when the vulnerability has been fixed and publicly disclosed
- We will coordinate with you on the disclosure timeline
- We will credit you in the security advisory (unless you prefer to remain anonymous)
- We request that you do not publicly disclose the vulnerability until we have released a fix
- We aim to release fixes for critical vulnerabilities within 30 days
Security updates will be released as:
- New Package Versions: Published to npm with security notes in the release
- GitHub Security Advisories: Published in the repository's Security tab
- Release Notes: Detailed in GitHub releases with
[SECURITY]tag
When using CodeMie CLI:
-
API Keys: Never commit API keys or credentials to version control
- Use environment variables or secure config files
- Run
npm run validate:secretsbefore committing (requires Docker)
-
Configuration Files: The
~/.codemie/codemie-cli.config.jsonfile may contain sensitive data- Ensure proper file permissions (readable only by you)
- Do not share this file or include it in backups without redacting secrets
-
SSO Authentication: When using AI/Run SSO:
- Tokens are stored securely in the system keychain
- Use
codemie auth logoutto clear tokens when needed
-
Proxy Server: When using the built-in proxy:
- Only run on localhost
- The proxy should not be exposed to external networks
- Logs may contain sensitive request/response data
-
Analytics: Analytics data is collected locally by default
- Review
~/.codemie/analytics/for sensitive information - Use
codemie analytics disableif you prefer not to collect analytics
- Review
-
Updates: Keep CodeMie CLI up to date
npm update -g @codemieai/code
- API keys are stored in plain text in
~/.codemie/codemie-cli.config.json - Ensure this file has restricted permissions (600 on Unix-like systems)
- Consider using environment variables for ephemeral sessions
- All API requests use HTTPS by default
- The proxy server can handle custom SSL certificates for enterprise environments
- Self-signed certificates require explicit configuration
- The CLI can execute shell commands through built-in tools
- External agents (Claude Code, Gemini) run with your user permissions
- Review code before executing suggested commands
CodeMie CLI is designed with security and privacy in mind:
- Data Privacy: User prompts and code are sent only to configured AI providers
- Local Processing: Configuration and analytics are stored locally
- No Telemetry: We do not collect usage data without explicit opt-in
- Open Source: All code is available for security review
We do not currently have a formal bug bounty program. However, we deeply appreciate responsible disclosure of security vulnerabilities and will publicly acknowledge your contributions (with your permission).
For security-related questions or concerns that are not vulnerabilities, you can reach us at:
- Email: security@codemie.ai
- GitHub Issues: https://github.com/codemie-ai/codemie-code/issues (for non-sensitive security questions)