The latest 0.x.y release on npm receives security fixes. Older minor versions do not.
Please do not open a public issue for security-sensitive reports.
Use GitHub's private security advisory flow:
- Go to https://github.com/vericontext/contextix/security/advisories/new
- Describe the issue, the affected version, and a proof-of-concept if you have one
- Maintainers respond within 7 days
If you can't use GitHub advisories, email the maintainer listed on the npm package page.
Security issues of interest:
- Code execution — a crafted skill file, source fetch, or MCP server response causes unintended code execution on the host
- Data exfiltration — extractor / ingest path leaks
ANTHROPIC_API_KEYor other env values into emitted graph content, logs, or outbound requests - Path traversal —
ingest markdownor similar reads outside the intended directory - Supply chain — a dependency update introduces a malicious change
- Denial of service — adversarial input to any connector that locks up or exhausts memory on reasonable inputs
Out of scope:
- Bugs in upstream MCP servers (report to their maintainers)
- Misconfigured skill files that leak your own credentials — that's an authoring issue
- Known issues already tracked in public advisories
- You report privately
- We confirm the issue and assess severity
- We prepare a fix + a patch release
- We publish a public GHSA advisory crediting the reporter (opt-in)
- We push the fixed version to npm
Target timeline: 14 days from report to fix for high / critical severity; longer for low / informational.