Found something? Don't open a public issue. Email ke@pika.art directly with the subject line peer security. We'll respond within 48 hours.
If the issue is critical (remote code execution, secret exfiltration, data loss), we'll cut a patch release within 72 hours and credit you in the release notes (or anonymously if you prefer).
peer runs as a sandboxed agent:
- No bash / shell tool. The agent cannot execute arbitrary commands.
- File operations are path-jailed to
$PEER_HOME(default~/.peer/). Any attempt to read, write, or edit a path outside this directory is refused at the operations layer (seesrc/agent/sandbox.ts). - API keys (
ANTHROPIC_API_KEY,OPENAI_API_KEY,SEMANTIC_SCHOLAR_API_KEY) are read from environment variables and never logged, written to disk, or sent over the network to anywhere other than the corresponding provider's official API endpoint. - No telemetry. peer makes network calls only to: api.anthropic.com, api.openai.com, api.semanticscholar.org, api.openalex.org, export.arxiv.org. That's the entire egress allowlist.
- Path-traversal in the sandbox
- Prompt-injection that escapes tool restrictions
- API key leakage through tool outputs, error messages, or logs
- Dependency vulnerabilities surfaced by
npm audit - Supply-chain risks in published builds
- Issues that require the user to manually run untrusted code
- Compromised user machines (keylogger, etc.)
- Provider-side issues at Anthropic / OpenAI
We follow 90-day coordinated disclosure. If you report a CVE-class issue and we don't ship a fix in 90 days, you may go public.