If you discover a security vulnerability, please report it responsibly.
Email: fazle.elahee@gmail.com
Please include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
We will acknowledge receipt within 48 hours and aim to release a fix within 7 days for critical issues.
CCE runs entirely locally. No cloud APIs, no telemetry, no phone-home. Embeddings are generated on-device via ONNX Runtime.
These file patterns are never indexed:
.env, .env.*, *.pem, *.key, *.p12, *.pfx, credentials.json, secrets.yml, id_rsa, id_ed25519
Indexed content is scanned and redacted for:
- AWS access keys and secret keys
- GitHub personal access tokens
- Slack tokens
- Stripe API keys
- JWTs
- Generic API keys and passwords in assignment patterns
Redaction is enabled by default (indexer_redact_secrets: true in config).
Memory writes (record_decision, record_code_area) are scrubbed for:
- Email addresses
- IP addresses
- Credit card numbers (Luhn-validated)
- Social Security Numbers
- Phone numbers
Enabled by default (memory_redact_pii: true in config).
All MCP tool file path arguments are validated to stay within the project directory. Attempts to access files outside the project root are rejected.
When running cce serve bound to a non-loopback address, bearer token authentication is required. Tokens are compared using hmac.compare_digest to prevent timing attacks. Request body size is capped at 10 MB.
| Version | Supported |
|---|---|
| 0.4.x | Yes |
| < 0.4 | No |