Hebbian Mind Enterprise was built with security as a core requirement. The codebase includes:
- SQL Injection Prevention: All database operations use parameterized queries
- Input Validation: Comprehensive validation with strict limits on all inputs
- Dual-Write Integrity: RAM writes verified against disk truth with automatic sync
- Error Sanitization: Sensitive data (paths, credentials) scrubbed from error messages
- Non-Root Execution: Docker containers run as non-privileged user (UID 1000)
- Minimal Attack Surface: Lean Alpine/slim base images with only required dependencies
- Secure Defaults: All optional integrations (FAISS, PRECOG) disabled by default
| Version | Supported |
|---|---|
| 2.x.x | Active support |
| < 2.0 | Not supported |
If you discover a security vulnerability in Hebbian Mind Enterprise, please report it privately.
Do NOT open a public GitHub issue for security vulnerabilities.
Email: [email protected] Subject Line: [SECURITY] Hebbian Mind Enterprise Vulnerability Report
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Affected versions
- Suggested fix (if you have one)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Resolution Timeline: Provided after assessment
- We will acknowledge your report within 48 hours
- We will investigate and assess the severity
- We will work on a fix and coordinate disclosure timing with you
- We will credit you in the security advisory (unless you prefer anonymity)
We kindly request that you:
- Allow reasonable time for us to fix the issue before public disclosure
- Do not exploit vulnerabilities beyond proof of concept
- Do not access, modify, or delete other users' data
- Act in good faith to avoid privacy violations and service disruption
When deploying Hebbian Mind Enterprise:
- Run as non-root: Containers already configured with user
hebbian(UID 1000) - Read-only filesystem: Consider adding
--read-onlyflag with writable volumes - Network isolation: Use Docker networks to isolate services
- Resource limits: Set memory and CPU limits in docker-compose.yml
- Never commit .env files: Add
.envto.gitignore - Use secrets management: For production, use Docker secrets or vault
- Rotate credentials: If using license keys, rotate them periodically
- Encrypt volumes: Use encrypted filesystem for
/data/hebbian_mind - Backup regularly: Implement automated backups of persistent volumes
- Access control: Restrict filesystem permissions on data directories
- No exposed ports: Default configuration uses stdio (no network exposure)
- If using sockets: Bind to localhost only, use firewall rules
- TLS/SSL: If exposing over network, use TLS termination (nginx/traefik)
- Write-Ahead Logging (WAL) enabled for better concurrency
- WAL files (
-wal,-shm) should be backed up with main database - Checkpoint regularly to prevent unbounded WAL growth
- Data in tmpfs is lost on container restart
- Dual-write ensures disk persistence
- Ensure adequate disk space for backup writes
- Socket communication is unauthenticated by default
- Use internal Docker networks only
- Do not expose FAISS socket to public internet
- Requires mounting external code into container
- Validate PRECOG source before mounting
- Consider using read-only volume mount
Hebbian Mind Enterprise can be configured to meet common compliance requirements:
- GDPR: Data minimization through configurable retention
- SOC 2: Audit logging of all operations (enable via LOG_LEVEL=DEBUG)
- HIPAA: Encryption at rest and in transit (configure externally)
Contact [email protected] for compliance consultation.
Security patches are released as soon as possible after confirmation. Subscribers receive:
- Email notification of security releases
- Detailed changelog with CVE references (if applicable)
- Migration guides for breaking security fixes
- Security Issues: [email protected]
- General Support: [email protected]
- Documentation: https://docs.cipscorps.io/hebbian-mind
CIPS LLC - https://cipscorps.io