| Version | Supported |
|---|---|
| 0.1.x | Yes |
If you discover a security vulnerability, please do not open a public issue.
Instead, report it privately via GitHub Security Advisories or contact the maintainer directly.
You should receive a response within 48 hours. If confirmed, a fix will be prioritized and a new version released as soon as possible.
JSXN runs as a local tool (CLI, MCP server) and processes source code files. Security considerations include:
- Directory sandbox:
read_jsxnandwrite_jsxnrestrict file access to the server's working directory (or the path set viaJSXN_ROOTenvironment variable). Paths that escape this root are rejected. - File extension allowlist: only
.jsx,.tsx,.js,.ts,.html, and.svgfiles are accepted - Symlink protection: symlinks are resolved via
realpath()and the real target's extension is validated.write_jsxnrefuses to write through symlinks. - Input size limits: 10 MB maximum per file/input
- No network access: JSXN does not make any network requests
- Error sanitization: error messages are generic and do not leak internal paths or stack traces