Skip to content

Security

sonic-core is a local-only audio control plane. It communicates with sonic-runtime over stdio — no network sockets are opened by the library itself.

SurfaceRiskMitigation
File paths (audio sources)Path traversalValidated but not sandboxed — operator controls source paths
Runtime binary pathArbitrary executionOperator-configured via SONIC_RUNTIME_PATH
ndjson-stdio protocolMessage injectionLocal IPC only — no network exposure
MCP service (stdio)Unauthorized tool callsMCP transport is stdio — access controlled by the host process
  • Network attacks — sonic-core opens no listening sockets
  • Authentication bypass — no auth layer exists; this is a local development tool
  • Supply chain — standard npm dependency tree; no post-install scripts

sonic-core collects no telemetry, analytics, or usage data. No network requests are made by the library. The runtime binary (sonic-runtime) is equally offline — it communicates only over stdin/stdout with its parent process.

If you discover a security issue, email 64996768+mcp-tool-shop@users.noreply.github.com. We will respond within 7 days.

Do not open public issues for security vulnerabilities.