security
Last updated: April 2026
// core principle
Shodh-memory is designed so that your data never leaves your machine. There is no cloud component, no telemetry, no phone-home behavior. Everything runs locally.
// architecture
- Single Rust binary — no external runtime, no Docker, no interpreter
- All storage is local RocksDB on your filesystem
- Embeddings computed locally via ONNX Runtime (MiniLM-L6-v2, 384-dim)
- Entity extraction runs locally via a bundled NER model
- No network calls are made during normal operation
- The only network activity is model downloads on first run (from HuggingFace, with checksum verification)
// data isolation
- Each user gets a separate storage directory with isolated RocksDB instances
- Multi-user mode uses per-user column families — no cross-user data access
- API endpoints are scoped by user ID — one user cannot access another's memories
- The MCP server runs on localhost by default — not exposed to the network
// network exposure
- The REST API binds to
127.0.0.1:3030by default (localhost only) - WebSocket endpoint (
/api/stream) has no authentication — acceptable for localhost, not recommended for network exposure - If you expose the API to a network, use a reverse proxy with authentication (nginx, Caddy, etc.)
- The MCP server communicates over stdio — no network sockets involved
// supply chain
- Model URLs are pinned to immutable HuggingFace commits
- All model downloads are verified with SHA-256 checksums
- Binary releases are built via GitHub Actions CI with reproducible builds
- Dependencies are audited — see
cargo auditin CI - Published on crates.io, npm, and PyPI with standard package verification
// memory safety
- Core written in Rust — memory-safe by design, no buffer overflows or use-after-free
- 1089 tests covering storage, retrieval, graph operations, and edge cases
- CI runs
cargo clippywith strict warnings on every PR - OOM protection: deserialization has 10MB size limits to prevent allocation attacks
- ONNX Runtime configured with thread limits and lock timeouts to prevent deadlocks
// backup & recovery
- Built-in backup system with SHA-256 checksum verification
- Backups cover all data: memories, todos, reminders, facts, knowledge graph, feedback, audit logs
- Point-in-time restore with integrity verification before restore
- Backup purging to manage disk space (configurable retention count)
// responsible disclosure
If you discover a security vulnerability, please report it responsibly:
- Email: enterprise@shodh-memory.com with subject "SECURITY"
- Do not open a public GitHub issue for security vulnerabilities
- We will acknowledge receipt within 48 hours
- We will provide a fix timeline within 7 days
- We credit all responsible disclosures (unless you prefer anonymity)
tl;dr → Everything runs locally. No cloud, no telemetry, no network calls. Rust for memory safety. SHA-256 for supply chain. Report vulnerabilities to enterprise@shodh-memory.com.