We currently support the following versions with security updates:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability, please do not open a public issue. Instead, please report it privately using one of the following methods:
Email: [INSERT SECURITY EMAIL]
Please include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if you have one)
- Open a GitHub Security Advisory
- Contact maintainers through GitHub (if you have access)
- Never commit API keys to the repository
- Use environment variables (
.envfile) - Rotate keys regularly
- Use different keys for development and production
- Keep dependencies up to date
- Review security advisories regularly
- Use
pip-auditornpm auditto check for vulnerabilities
- User content is processed in-memory when possible
- Content is encrypted at rest (AES-256)
- Content is encrypted in transit (TLS 1.3)
- User-controlled retention (default: 30 days)
- API keys are hashed (SHA256) before storage
- Rate limiting is enforced
- Input validation and sanitization on all endpoints
When contributing, ensure:
- No hardcoded credentials or API keys
- Input validation on all user inputs
- SQL injection prevention (use parameterized queries)
- XSS prevention (sanitize user content)
- CSRF protection (if applicable)
- Rate limiting implemented
- Error messages don't leak sensitive information
- Dependencies are up to date
- Security headers are set correctly
- API keys must be kept secure
- Rate limits may apply from AI service providers
- Content sent to AI services may be logged by providers
- Use parameterized queries (SQLAlchemy handles this)
- Database credentials should be in environment variables
- Regular backups recommended
- Keep Docker images updated
- Use non-root user in containers when possible
- Review docker-compose.yml for exposed ports
Security updates will be:
- Released as patch versions (e.g., 0.1.1)
- Documented in CHANGELOG.md
- Tagged with
securitylabel
- Vulnerabilities will be disclosed after a fix is available
- A CVE will be requested for critical vulnerabilities
- Users will be notified through GitHub releases
Regular security audits are recommended:
- Dependency scanning
- Code review
- Penetration testing (for production deployments)
Thank you for helping keep AIEO secure!