If you discover a security vulnerability in this project, please report it using GitHub's private vulnerability reporting. Go to the Security tab of this repository and click Report a vulnerability.
Please include:
- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Note: This is a community reference architecture, not a Workday product. Security reports are handled by project maintainers on a best-effort basis.
This project handles sensitive data including:
- OAuth tokens — LINE WORKS JWT-based authentication
- API keys — LLM provider and Flowise credentials
- User messages — Conversation content from enterprise messaging platforms
- Never commit
.envfiles or API keys to version control - Use environment variables or secret managers for all credentials
- Deploy the chat connector behind HTTPS in production
- Restrict MCP server access to only the Flowise instance
- Regularly rotate API keys and tokens
- Use official Workday MCP servers (Agent Gateway) instead of the demo server in production
- Consider Flowise Cloud Enterprise for SSO, RBAC, audit trails, and SLA-backed uptime
For detailed technical hardening recommendations (rate limiting, PII redaction, retry logic, prompt injection defenses, observability, and more), see the Enterprise Hardening Guide.