We actively maintain security fixes for the following versions:
| Version | Supported |
|---|---|
| Latest stable | Yes |
| Older releases | No — please upgrade |
Do not open a public GitHub issue for security vulnerabilities.
If you discover a security vulnerability in Peaky Peek, please report it responsibly:
- Email: Send details to the maintainers via the contact listed on the GitHub profile.
- Subject line:
[SECURITY] Peaky Peek – <brief description> - Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge receipt within 48 hours and aim to provide a fix or mitigation within 14 days for critical issues.
This policy covers:
- The
peaky-peekSDK package - The
peaky-peek-serverpackage and its REST API - The Peaky Peek web UI
- Authentication and authorization flaws
- Data exposure (agent traces, session data, LLM inputs/outputs)
- SQL injection or other injection attacks
- Insecure defaults that expose sensitive data
- Dependency vulnerabilities with direct exploitability
- Issues in third-party frameworks (LangChain, OpenAI, etc.) — report those upstream
- Bugs without security impact
- Theoretical vulnerabilities without a realistic attack path
Peaky Peek is local-first by default. If you deploy the server publicly, take note:
- API authentication: Enable API key authentication (
AUTH_ENABLED=true) — do not expose the server without auth - Trace data: Agent traces may contain sensitive prompts, tool outputs, or PII — treat the database accordingly
- Environment variables: Never commit
.envfiles containing secrets; use.env.exampleas a reference only - Network exposure: Bind the server to
localhostunless you intend public access; use a reverse proxy with TLS for production
- GitHub Actions runs
gitleakson pushes tomain, pull requests targetingmain, and manual dispatches. - This is intended to catch committed credentials, tokens, and private-key material before they land on the default branch.
- Local runtime files such as
data/,traces/, and.envshould remain untracked; the scan complements.gitignore, it does not replace it.
You can also run the same scanner locally if you have gitleaks installed:
gitleaks git --verbose .We follow coordinated disclosure: we ask that you give us reasonable time to patch before any public disclosure. We will credit reporters in the release notes unless you prefer to remain anonymous.