Skip to content

Security: Workday/ai-conversation-bridge

SECURITY.md

Security Policy

Reporting a Vulnerability

If you discover a security vulnerability in this project, please report it using GitHub's private vulnerability reporting. Go to the Security tab of this repository and click Report a vulnerability.

Please include:

  • A description of the vulnerability
  • Steps to reproduce
  • Potential impact
  • Suggested fix (if any)

Note: This is a community reference architecture, not a Workday product. Security reports are handled by project maintainers on a best-effort basis.

Security Considerations

This project handles sensitive data including:

  • OAuth tokens — LINE WORKS JWT-based authentication
  • API keys — LLM provider and Flowise credentials
  • User messages — Conversation content from enterprise messaging platforms

Best Practices

  • Never commit .env files or API keys to version control
  • Use environment variables or secret managers for all credentials
  • Deploy the chat connector behind HTTPS in production
  • Restrict MCP server access to only the Flowise instance
  • Regularly rotate API keys and tokens
  • Use official Workday MCP servers (Agent Gateway) instead of the demo server in production
  • Consider Flowise Cloud Enterprise for SSO, RBAC, audit trails, and SLA-backed uptime

For detailed technical hardening recommendations (rate limiting, PII redaction, retry logic, prompt injection defenses, observability, and more), see the Enterprise Hardening Guide.

There aren’t any published security advisories