Files
claude-mem/SECURITY.md
T
Alex Newman 282345f379 backup: Phase 1 agent work (security, persistence, batch endpoint)
This is a backup of all work done by the 3 Phase 1 agents:

Agent A - Command Injection Fix (Issue #354):
- Fixed command injection in BranchManager.ts
- Fixed unnecessary shell usage in bun-path.ts
- Added comprehensive security test suite
- Created SECURITY.md and SECURITY_AUDIT_REPORT.md

Agent B - Observation Persistence Fix (Issue #353):
- Added PendingMessageStore from PR #335
- Integrated persistent queue into SessionManager
- Modified SDKAgent to mark messages complete
- Updated SessionStore with pending_messages migration
- Updated worker-types.ts with new interfaces

Agent C - Batch Endpoint Verification (Issue #348):
- Created batch-observations.test.ts
- Updated worker-service.mdx documentation

Also includes:
- Documentation context files (biomimetic, windows struggles)
- Build artifacts from agent testing

This work will be re-evaluated after v7.3.0 release.
2025-12-16 15:44:06 -05:00

5.9 KiB

Security Policy

Reporting a Vulnerability

If you discover a security vulnerability in claude-mem, please report it by:

  1. DO NOT create a public GitHub issue
  2. Email the maintainer directly with details
  3. Include steps to reproduce, impact assessment, and suggested fixes if possible

We take security seriously and will respond to valid reports within 48 hours.

Security Measures

Command Injection Prevention

Claude-mem executes system commands for git operations and process management. We have implemented comprehensive protections against command injection:

Safe Command Execution

  • Array-based Arguments: All commands use array-based arguments to prevent shell interpretation
  • No Shell Execution: shell: false is explicitly set for all spawn operations involving user input
  • Input Validation: All user-controlled parameters are validated before use

Example Safe Pattern

// ✅ SAFE: Array-based arguments with validation
if (!isValidBranchName(userInput)) {
  throw new Error('Invalid input');
}
spawnSync('git', ['checkout', userInput], { shell: false });

// ❌ UNSAFE: Never do this
execSync(`git checkout ${userInput}`);

Input Validation

All user-controlled inputs are validated using whitelists and strict patterns:

  • Branch Names: Must match /^[a-zA-Z0-9][a-zA-Z0-9._/-]*$/ and not contain ..
  • Port Numbers: Must be numeric and within range 1024-65535
  • File Paths: All paths are joined using path.join() to prevent traversal

Process Management

  • PID File Protection: Process IDs are stored in user's data directory (~/.claude-mem/)
  • Port Validation: Worker port is validated before binding
  • Health Checks: Worker health is verified before processing requests

Privacy Controls

Claude-mem includes dual-tag system for content privacy:

  • <private>content</private> - User-level privacy (prevents storage)
  • <claude-mem-context>content</claude-mem-context> - System-level tag (prevents recursive storage)

Tags are stripped at the hook layer before data reaches worker/database.

Security Audit History

2025-12-16: Command Injection Vulnerability (Issue #354)

  • Severity: CRITICAL
  • Status: RESOLVED
  • Details: See SECURITY_AUDIT_REPORT.md
  • Affected Versions: All versions prior to fix
  • Fixed In: Current version
  • Vulnerabilities Found: 3
  • Vulnerabilities Fixed: 3

Summary of Fixes:

  1. Replaced string interpolation with array-based arguments in BranchManager.ts
  2. Added isValidBranchName() validation function
  3. Removed unnecessary shell usage in bun-path.ts
  4. Created comprehensive security test suite

Security Best Practices for Contributors

When Adding Command Execution

  1. NEVER use shell with user input:

    // ❌ NEVER
    execSync(`command ${userInput}`);
    spawn('command', [...], { shell: true });
    
    // ✅ ALWAYS
    spawnSync('command', [userInput], { shell: false });
    
  2. ALWAYS validate user input:

    if (!isValidInput(userInput)) {
      throw new Error('Invalid input');
    }
    
  3. Use array-based arguments:

    // ❌ NEVER
    execSync(`git ${command} ${arg}`);
    
    // ✅ ALWAYS
    spawnSync('git', [command, arg], { shell: false });
    
  4. Explicitly set shell: false:

    spawnSync('command', args, { shell: false });
    

When Adding User Input

  1. Whitelist validation over blacklist
  2. Strict regex patterns for format validation
  3. Type checking for expected data types
  4. Range validation for numeric inputs
  5. Length limits for string inputs

Code Review Checklist

Before submitting a PR with command execution or user input handling:

  • No execSync with string interpolation or template literals
  • No shell: true when user input is involved
  • All spawn/spawnSync calls use array arguments
  • Input validation is present for all user-controlled parameters
  • Security tests are added for new attack vectors
  • Code follows patterns in SECURITY_AUDIT_REPORT.md

Dependencies

We regularly audit dependencies for vulnerabilities:

  • npm audit: Run before each release
  • Dependabot: Enabled for automatic security updates
  • Manual Review: Critical dependencies reviewed quarterly

Data Storage

Claude-mem stores data locally in ~/.claude-mem/:

  • Database: SQLite3 at ~/.claude-mem/claude-mem.db
  • Vector Store: Chroma at ~/.claude-mem/chroma/
  • Logs: ~/.claude-mem/logs/
  • Settings: ~/.claude-mem/settings.json

All data remains on the user's machine. No telemetry or external data transmission.

Permissions

Claude-mem requires:

  • File System: Read/write to ~/.claude-mem/ and ~/.claude/plugins/
  • Network: HTTP server on localhost (default port 37777)
  • Process Management: Spawn worker processes, manage PIDs

No elevated privileges (root/administrator) are required.

Secure Defaults

  • Worker Host: Binds to 127.0.0.1 by default (localhost only)
  • Worker Port: User-configurable, validates range 1024-65535
  • Log Level: INFO by default (no sensitive data in logs)
  • Privacy Tags: Auto-strips private content before storage

Updates

Security patches are released as soon as possible after discovery. Users should:

  1. Keep claude-mem updated to the latest version
  2. Monitor GitHub releases for security announcements
  3. Review CHANGELOG.md for security-related changes

Questions?

For security-related questions (non-vulnerabilities), please:

  1. Check SECURITY_AUDIT_REPORT.md for technical details
  2. Review code comments in security-critical files
  3. Open a GitHub Discussion (not an Issue) for general security questions

Last Updated: 2025-12-16 Last Audit: 2025-12-16 (Issue #354) Next Scheduled Audit: 2025-03-16