| Version | Supported |
|---|---|
| 1.2.x | ✅ Active |
| 1.1.x | |
| < 1.1.0 | ❌ End of life |
Do NOT open public issues for security vulnerabilities.
- Email: security@synapselayer.org
- Response: 48 hours
- AES-256-GCM encryption at rest
- Header-first auth (
x-connect-token) - Tokens never in URLs or logs
- CI secret scanning on every commit
- Content sanitization before encryption
- Encryption: AES-256-GCM at rest with per-operation random IV — content cleared after encryption
Memories with a TTL (expiresAt field) are automatically hard-deleted when expired:
- Mechanism: Automated GC cron runs daily, deleting expired rows in batches
- Auth: Bearer token (
CRON_SECRET) with constant-time comparison - Batching: Max 50 rows per query, max 10 iterations per run (500 rows cap)
- Audit: Every GC run is logged to
ForgeGcAuditLog(timestamp, count, duration, status) - LGPD/GDPR: Hard delete (erasure) — no soft-delete for expired data
- Fail-closed: Auth failure returns 401, never exposes data