| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take the security of Everlast AI Recorder recording app seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via GitHub's private vulnerability reporting:
- Go to the [Security Advisories](https://github.com/odonald/Everlast AI Recorder/security/advisories) page
- Click "New draft security advisory"
- Fill in the details of the vulnerability
Alternatively, you can email us at hello@zynderlab.com.
Please include the following information:
- Type of vulnerability (e.g., buffer overflow, SQL injection, cross-site scripting)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how it might be exploited
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 90 days (depending on complexity)
We support safe harbor for security researchers who:
- Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our services
- Only interact with accounts you own or with explicit permission of the account holder
- Do not exploit a security issue for purposes other than verification
- Report vulnerabilities promptly and do not disclose publicly until resolved
Everlast AI Recorder implements several security measures:
- Encrypted Storage: API keys are encrypted using ChaCha20Poly1305 with Argon2 key derivation
- Per-User Encryption: Each user has unique encryption keys derived from their identity
- Local-First: All data stays on your device unless you explicitly export it
- Auth0 PKCE Flow: Secure authentication without exposing secrets
- External Browser Auth: Passkeys and biometrics work properly via system browser
- No Key Storage in Code: API keys are stored encrypted in the OS keychain
- Minimal Permissions: App requests only necessary system permissions
- Keep your app updated to receive security patches
- Use strong, unique API keys for each service
- Review app permissions regularly in System Preferences
- Back up your data before major updates
- Report suspicious behavior immediately
We thank security researchers who responsibly disclose vulnerabilities. Contributors will be acknowledged in release notes (unless they prefer anonymity).