The current code makes use of predictable filenames, in a way that causes a security issue. I reported this to Debian last year: - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809252 It was recently highlighted by the nodesecurity people (six months later!): - https://nodesecurity.io/advisories/95 Suggested fix: - Avoid using predictable filenames in world-writable directories. - Using `~/.app.pid` would be better than `/tmp` for example.