We take security seriously. If you discover a security vulnerability in LLM Unify, please report it responsibly.
Email: security@llm-unify.dev
PGP Key: See .well-known/security.txt
- Critical vulnerabilities (RCE, privilege escalation, data exposure): 7 days
- High severity (authentication bypass, injection): 14 days
- Medium severity (DoS, information disclosure): 30 days
- Low severity (configuration issues, minor leaks): 60 days
- Description of the vulnerability
- Steps to reproduce the issue
- Proof of concept (if applicable)
- Impact assessment (what can be compromised)
- Suggested fix (if you have one)
LLM Unify is designed with a local-first architecture:
- No network calls - All data stays on your machine
- SQLite storage - Encrypted at rest with user's file system permissions
- No telemetry - Zero data collection or phone-home behavior
-
SQL Injection Prevention
- All database queries use parameterized statements (SQLx)
- No raw SQL string concatenation
- Type-safe query builders
-
Input Validation
- File path sanitization for import/export operations
- JSON parsing with strict schema validation
- Message content size limits (configurable)
-
Memory Safety
- Zero unsafe blocks - Rust compile-time guarantees
- No manual memory management
- Thread-safe concurrency (SQLite connection pooling)
-
Dependency Management
- Regular
cargo auditscans in CI/CD - Minimal dependency footprint
- Vetted crates only (serde, sqlx, ratatui, clap)
- Regular
-
Database Encryption
- SQLite database is not encrypted by default in v0.1
- Relies on file system permissions
- Plan to add encryption in v0.2 (see roadmap)
-
Export Format
- Exported JSON files contain plaintext conversations
- Users should secure export files appropriately
-
Parser Trust
- Import parsers trust input data structure
- Malformed exports may cause parse errors (non-exploitable)
| Date | Auditor | Scope | Findings | Status |
|---|---|---|---|---|
| 2025-11-28 | Internal | Initial release | None | Clean |
External audit: Planned for v0.2.0 release (Q1 2025)
- SQLite database encryption (SQLCipher integration)
- Export file encryption (age/GPG options)
- Secure key management
- Formal threat modeling
- External security audit
- Penetration testing results
- Security.txt automation
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
-
File Permissions: Protect your database file (
llm-unify.db)chmod 600 llm-unify.db
-
Backup Security: Encrypt backups before cloud storage
llm-unify backup backup.db gpg -c backup.db # Encrypt with passphrase -
Import Safety: Only import exports from trusted sources
-
Update Regularly: Keep LLM Unify updated for security patches
This security policy follows:
- RFC 9116 -
security.txtstandard - OWASP Top 10 - Web application security risks
- Rhodium Standard Repository - Security documentation requirements