We provide security updates for the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take security seriously. If you discover a security vulnerability in Chasm, please report it responsibly.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please report security vulnerabilities by emailing:
Please include the following in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Suggested fix (if you have one)
- Your contact information for follow-up questions
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Assessment: We will assess the vulnerability and determine its severity within 7 days
- Updates: We will keep you informed of our progress
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)
- We follow a 90-day coordinated disclosure policy
- We will work with you to understand and resolve the issue
- We will publicly disclose the vulnerability after a fix is available
- We will credit reporters who follow responsible disclosure practices
When using Chasm, we recommend:
- Keep updated: Always use the latest version
- Secure your database: The SQLite database may contain sensitive chat history
- API security: If running the API server, use appropriate network security
- Access control: Limit who can access your Chasm installation
If you're running the Chasm API server:
- Use HTTPS: Always use TLS in production
- Firewall: Restrict access to trusted networks
- Authentication: Enable authentication for sensitive operations
- Audit logs: Monitor access logs for suspicious activity
Chasm may use the following environment variables. Keep them secure:
CSM_DATABASE_PATH- Path to the database fileCSM_API_PORT- API server port
- Chat history is stored in a local SQLite database
- The database is not encrypted at rest by default
- Users are responsible for securing the database file
- The API server binds to
0.0.0.0by default (all interfaces) - CORS is configured for localhost by default
- No authentication is required by default
- Chasm can decrypt browser cookies to access chat provider sessions
- This feature requires appropriate system permissions
- Use this feature responsibly and only on systems you own
We welcome security audits of our codebase. If you're interested in conducting a security audit, please contact us at security@nervosys.ai.
We currently do not have a formal bug bounty program. However, we appreciate and acknowledge security researchers who responsibly disclose vulnerabilities.
For security-related questions or concerns:
- Email: security@nervosys.ai
- PGP Key: Available upon request
Thank you for helping keep Chasm and its users safe! 🛡️