Spellcaster runs entirely on the user's own machine and talks only to a
ComfyUI server the user controls — typically localhost. No telemetry,
no cloud API calls, no credential storage. That said, there are still
realistic attack surfaces worth flagging.
- The GIMP plugin (
plugins/gimp/comfyui-connector/) — arbitrary file read/ write, path traversal, deserialization issues in custom workflow imports, code execution viauser_presets.jsonorsession_state.jsonparsing. - The Wizard Guild server (
tavern/) — any RCE, SSRF, or unauthenticated API misuse. The server binds tolocalhostby default but is sometimes exposed on a LAN. - The Windows/macOS/Linux installer (
installer/) — code execution via the auto-updater, tamperedmanifest.json, or the bootstrap fetch fromraw.githubusercontent.com. - The NSFW build path — leakage of NSFW content, tokens, or private-repo
URLs into the public
spellcasterrepo. - The shared library (
comfyui-spellcaster/spellcaster_core/) and its three synced copies.
- Vulnerabilities in ComfyUI itself — report at comfyanonymous/ComfyUI.
- Vulnerabilities in third-party ComfyUI custom node packs we depend on — report them upstream at their respective repos (see DEPENDENCIES.md).
- Vulnerabilities in upstream model weights or training data.
- Prompt-injection of local LLMs that stays within the local machine.
Please do not open a public issue for security problems. Instead:
- Open a private advisory via GitHub Security Advisories.
- Include repro steps, impacted version/commit, and expected vs. observed behavior.
You can expect an acknowledgement within a few days. Critical issues will be patched and released as soon as possible; fixes ship via the normal auto-update flow that every Spellcaster installation already runs on launch.
Spellcaster ships as a rolling release. Only the latest main + the latest
tagged release on the
releases page
receive security fixes. The auto-updater in every GIMP plugin install and
every Wizard Guild launch pulls from main on start, so users are rarely
more than one restart behind.