We release patches for security vulnerabilities. Currently, the following versions are being supported with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
The Agent Workflows team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings, and will make every effort to acknowledge your contributions.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by:
-
Opening a GitHub Security Advisory: Go to the Security tab and click "Report a vulnerability"
-
Via Email: Send details to the project maintainers at the email listed in the repository owner's GitHub profile
Please include the following information in your report:
- Type of vulnerability
- Full paths of affected source files
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
When you report a vulnerability, you can expect:
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 72 hours
- Communication: We will keep you informed about the progress of fixing the vulnerability
- Timeline: We aim to resolve critical vulnerabilities within 90 days
- Credit: We will credit you in the release notes when the vulnerability is disclosed (unless you prefer to remain anonymous)
- Never commit
.envfiles or API keys to version control - Use strong, randomly generated values for
JWT_SECRET - Rotate API keys regularly
- Use
.env.exampleas a template (never contains real secrets)
- Use strong passwords for database connections
- Enable SSL/TLS for database connections in production
- Regularly backup your database
- Keep SQLite file permissions restrictive (600 or 640)
- Always use HTTPS in production
- Configure CORS properly (restrict
ALLOWED_ORIGINS) - Use strong JWT secrets (minimum 32 bytes)
- Enable rate limiting for API endpoints
- Keep Node.js and dependencies up to date
- All user inputs are validated using Zod schemas
- Path traversal protection is enforced
- SQL injection protection via Prisma ORM
- JWT tokens are used for authentication
- Passwords are hashed using bcrypt
- Sessions can be invalidated by logging out
We regularly update dependencies to patch security vulnerabilities. To check for known vulnerabilities:
pnpm auditSecurity updates will be released as patch versions. Subscribe to releases on GitHub to be notified:
https://github.com/sourceborn/agent-workflows-monorepo/releases
This application is designed for single-user deployment (personal use, single machine). If you plan to deploy this in a multi-user environment, please be aware:
- JWT tokens have no expiration by default
- No role-based access control (RBAC)
- Minimal authentication flow
For multi-user deployments, additional security measures are required.
The application has broad file system access to support code editing features. Deploy in sandboxed environments or use proper OS-level permissions to restrict access.
The application executes external CLI tools (Claude, Codex). Ensure:
- CLI tools are from trusted sources
- CLI tools are kept up to date
- Input to CLI tools is properly validated
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find similar problems
- Prepare fixes for all supported versions
- Release new versions as soon as possible
After a security fix is released, we will:
- Publish a security advisory on GitHub
- Update the CHANGELOG
- Credit the reporter (if they wish to be credited)
If you have suggestions on how this process could be improved, please submit a pull request or open an issue.