| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
- DO NOT open a public GitHub issue for security vulnerabilities
- Email the maintainers directly or use GitHub's private vulnerability reporting feature
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability and determine its severity
- Fix Timeline: Critical issues will be addressed within 7 days; others within 30 days
- Disclosure: We will coordinate disclosure timing with you
Sushi Focus implements several security measures:
- Local-only communication: Daemon binds to
127.0.0.1only - CORS restrictions: Configurable origin whitelist
- Bearer token authentication: Optional API authentication
- Input validation: All API inputs are validated
- No remote code execution: Commands are whitelisted
- Keep Sushi Focus updated to the latest version
- Set
SUSHI_FOCUS_SECRETenvironment variable for API authentication - Review distraction domain lists before adding custom entries
- Don't expose the daemon to external networks
Thank you for helping keep Sushi Focus secure!