We take the security of AI Peer seriously. If you discover a security vulnerability, please report it responsibly.
- GitHub Issues: Open an issue at github.com/nicepkg/ai-peer/issues with the "security" label
- Private disclosure: Use GitHub Security Advisories for sensitive vulnerabilities
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix release: Depends on severity (critical: ASAP, high: 1-2 weeks)
- Listens on
127.0.0.1:7899by default (localhost only) - No authentication on local API (any local process can access)
- Use
--passwordfor E2E encryption on sensitive conversations
- Room token required for access (32-byte hex)
- Per-peer HMAC-SHA256 signature authentication
- Relay overwrites peer identity from stored records (anti-impersonation)
- E2E encryption: relay stores only ciphertext (zero-knowledge)
- Local daemon has no auth (by design — localhost trust model)
- Room passwords stored in plaintext in SQLite (OS file permissions protect)
- LAN mode (
--lan) exposes daemon to local network without auth
| Version | Supported |
|---|---|
| 1.0.x | ✅ |