| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability within NDS, please:
- Do not open a public issue
- Send a description of the vulnerability to the maintainers through GitHub's private vulnerability reporting feature
- Include steps to reproduce if possible
We take all security bugs seriously and will respond as quickly as possible to fix the issue.
NDS handles shell sessions and PTY allocation. When using NDS:
- Sessions run with the permissions of the user who created them
- Session metadata is stored in
~/.nds/with user-only permissions (0700) - No network connectivity or remote access features are implemented
- All IPC happens through Unix domain sockets with appropriate permissions
- Keep NDS updated to the latest version
- Regularly clean up old sessions with
nds clean - Be cautious when attaching to sessions you didn't create
- Review session history periodically with
nds history