| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
Techlead is designed as a local-first development tool with the following security characteristics:
- Runs entirely on your local machine
- No cloud services or external data transmission
- Knowledge database stored locally in
.techlead/
- HTTP server binds to localhost by default
- MCP mode uses stdio (no network)
- No authentication required (local tool assumption)
- SQLite database with no encryption at rest
- Embeddings stored alongside text content
- Session history stored in plaintext JSONL
- Requires local Ollama instance for embeddings
- Claude Code integration via MCP protocol
- No external API calls for core functionality
- Process sensitive credentials or secrets
- Store PII or confidential information in decisions/learnings
- Expose the HTTP server to public networks
- Run only in trusted development environments
- Keep
.techlead/in.gitignoreto avoid committing local data - Use firewall rules if running HTTP server in shared environments
- Regularly backup or clear
.techlead/knowledge.dbif it contains sensitive context
If you discover a security vulnerability:
- Do not open a public issue
- Email security concerns to the repository maintainer
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We aim to respond to security reports within 48 hours and will work with you to understand and address the issue.
This security policy applies to:
- The techlead binary and all subcommands
- The MCP server integration
- The HTTP server endpoints
- The knowledge database and its contents
Third-party dependencies (Ollama, sqlite-vec, etc.) have their own security policies.