Skip to content

Security

sonic-runtime is a local-only NativeAOT sidecar. It communicates exclusively over stdin/stdout with its parent process. There are no network sockets, no HTTP endpoints, and no remote API.

SurfaceRiskMitigation
Audio file pathsPath traversalValidated by the runtime; operator controls source directories
ONNX model filesModel tamperingOperator-installed; loaded from configured asset directory
eSpeak-NG subprocessCommand injectionFixed argument format; no user-controlled parameters
stdio protocolMessage injectionLocal IPC only; parent process controls all input
  • Network attacks — no listening sockets exist
  • Authentication — no auth layer; access controlled by the parent process
  • Multi-user — single-user local tool

Synthesis assets (ONNX models, voice embeddings, eSpeak data) are loaded from an operator-configured directory. The runtime validates file existence and format but does not verify cryptographic integrity of assets. Operators should verify asset provenance before deployment.

sonic-runtime collects no telemetry, analytics, or usage data. No network requests are made. All communication is over stdin/stdout with the parent process.

If you discover a security issue, email 64996768+mcp-tool-shop@users.noreply.github.com. We will respond within 7 days.

Do not open public issues for security vulnerabilities.