The main branch is the active development line until the project publishes versioned releases.
Please do not open a public issue for security vulnerabilities, prompt-injection bypasses, or accidental sensitive data exposure.
Use GitHub private vulnerability reporting if enabled, or contact the maintainers through the repository's security contact once published.
pi-memctx stores and searches local Markdown memory packs. Those packs must never contain:
- secrets;
- tokens;
- passwords;
- private keys;
- credentials;
- full payment card numbers;
- sensitive customer data;
- sensitive production payloads;
- private third-party data that cannot be shared with an agent.
Give the agent the map, not the keys.
pi-memctx is local-first and does not require hosted infrastructure, but local files can still influence agent behavior. Treat memory packs as trusted-but-reviewable inputs.
Relevant risks:
- accidental persistence of secrets through
memctx_save; - prompt injection in Markdown files;
- memory poisoning through incorrect or malicious notes;
- stale decisions overriding current source-of-truth files;
- accidental publication of private packs.
Mitigations:
memctx_saveblocks common secret patterns;- memory remains Markdown and can be reviewed in Git;
- source-of-truth repository files should win over memory notes;
- keep private packs outside public repositories unless intentionally sanitized.
- Stop using the exposed secret immediately.
- Rotate or revoke it at the source.
- Remove it from the repository and history before publishing or distributing.
- Document only safe pointers to approved secret stores or procedures.