mimo-auth handles local API keys, so security reports are taken seriously.
The current main branch and the latest GitHub Release are supported for security fixes.
Do not open a public issue that contains:
- full MiMo API keys
- Token Plan keys
- Claude Code
settings.jsonwith real credentials - cookies
- account credentials
- exploit details that would put users at immediate risk
If GitHub private vulnerability reporting is enabled for this repository, use it. Otherwise, open a minimal public issue asking for maintainer contact without including secrets or exploit details.
mimo-auth does not:
- upload API keys
- send telemetry
- proxy model traffic
- create accounts
- scrape cookies
- bypass login flows
The only command that makes a MiMo API request is mimo-auth check, and it only runs when the user explicitly invokes it.
Maintainers and contributors should:
- never commit real API keys or Token Plan keys
- never print full keys in CLI output
- keep test keys obviously fake, such as
sk-demo-...ortp-test-... - mask keys in examples and logs
- preserve unrelated Claude Code settings when updating
settings.json