| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| 0.1.x | ❌ |
| < 0.1 | ❌ |
If you discover a security vulnerability in Marimushka, please report it responsibly:
- Do not open a public GitHub issue for security vulnerabilities
- Email the maintainers at contact@jqr.ae with:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 7 days
- Resolution target: Within 30 days for critical issues
Marimushka executes uvx marimo export as a subprocess. The tool:
- Only processes
.pyfiles from specified directories - Does not execute arbitrary user input as shell commands
- Uses
subprocess.run()with explicit argument lists (no shell=True)
By default, notebooks are exported with --sandbox flag, which:
- Runs exports in an isolated environment
- Prevents access to the local filesystem beyond the notebook
- Requires dependencies to be declared in the notebook metadata
To maintain security, avoid using --no-sandbox in production CI/CD pipelines unless necessary.
Jinja2 templates are rendered with autoescape enabled for HTML/XML content, mitigating XSS risks in generated index pages.
Security patches are released as part of regular version updates. Subscribe to GitHub releases to stay informed.