engramx@0.4.4

The context spine for AI coding agents. 9 built-in providers + mcpConfig plugin contract (wrap any MCP server in 10 lines), generic MCP-client aggregator (stdio), pre-mortem mistake-guard, bi-temporal mistake memory, Anthropic Auto-Memory bridge, SSE stre

  • latest version

    4.0.0

  • latest non vulnerable version

  • first published

    1 months ago

  • latest version published

    1 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the engramx package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Insecure Default Initialization of Resource

    engramx is a The context spine for AI coding agents. 9 built-in providers + mcpConfig plugin contract (wrap any MCP server in 10 lines), generic MCP-client aggregator (stdio), pre-mortem mistake-guard, bi-temporal mistake memory, Anthropic Auto-Memory bridge, SSE stre

    Affected versions of this package are vulnerable to Insecure Default Initialization of Resource through the HTTP server's lack of authentication and permissive CORS configuration. An attacker can exfiltrate sensitive data and inject persistent payloads by enticing a user to visit a malicious web page, which can interact with the local server endpoints such as /query, /stats, and /learn.

    How to fix Insecure Default Initialization of Resource?

    Upgrade engramx to version 2.0.2 or higher.

    <2.0.2