| Version | Supported |
|---|---|
| 1.0.x | ✅ Yes |
| < 1.0 | ❌ No |
- Local Processing: All log analysis happens on your Mac
- API Key Security: Stored securely in macOS Keychain with encryption
- No Data Collection: We don't collect, store, or transmit user data
- Secure Communication: All network requests use HTTPS/TLS encryption
- App Sandboxing: Restricted file system and network access
- You control all data sharing and API usage
- Clear indication of all network requests
- No analytics, telemetry, or user tracking
- Do not create a public GitHub issue
- Do not discuss the vulnerability in public forums
Send a detailed report to: security@chadbourne.consulting
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Your contact information
- Initial Response: Within 48 hours
- Investigation: Within 1 week
- Resolution: Within 2 weeks
- Disclosure: After fix is released
We follow responsible disclosure practices and will credit you for the discovery (unless you prefer anonymity).
- Use the built-in secure storage (Keychain)
- Rotate API keys periodically
- Monitor usage on API provider dashboards
- Use API keys with minimal required permissions
- Ensure bot endpoints use HTTPS
- Only connect to endpoints with valid SSL certificates
- Be aware of what data is being sent to external services
- Ensure log files are from trusted sources
- Remove sensitive data from exported reports if needed
- Protect configuration files with appropriate permissions
- Ensure test data doesn't contain sensitive information
- Use test environments rather than production systems
- Review exported reports before sharing
When using OpenAI, Anthropic, or other cloud providers:
- Review provider privacy policies and terms of service
- Understand data retention and usage policies
- Monitor costs and usage patterns
- Consider using local models (Ollama) for sensitive data
Patience uses macOS App Sandbox with these entitlements:
com.apple.security.app-sandbox- Enables sandboxingcom.apple.security.network.client- Outgoing network connectionscom.apple.security.files.user-selected.read-write- User-selected file access
- All HTTP requests use URLSession with default security settings
- Certificate validation is enforced for HTTPS connections
- Timeout and retry logic prevents hanging connections
- Configuration data stored in app container
- API keys stored in Keychain with app-specific access
- Temporary files cleaned up after use
- No persistent logging of sensitive data
- Swift's memory safety prevents buffer overflows
- Input validation on all user-provided data
- Error handling prevents information leakage
- User API keys and credentials
- Test configurations and scenarios
- Chat logs and conversation data
- Test results and reports
- Input Validation: All file parsing includes bounds checking
- Secure Communication: HTTPS enforcement and certificate validation
- Keychain Storage: Encrypted storage for sensitive credentials
- Sandboxing: Restricted system access and isolation
- Security Email: security@chadbourne.consulting
- Response Time: 48 hours for initial response
- GitHub Issues: For non-security bugs and feature requests