Kruxia Flow is currently in active development and is in pre-release. There are not yet any supported versions.
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please send an email to security@kruxia.com with:
- Description - A clear description of the vulnerability
- Impact - The potential impact and severity
- Steps to Reproduce - Detailed steps to reproduce the issue
- Affected Versions - Which versions are affected
- Suggested Fix - If you have suggestions for how to fix it (optional)
- Initial Assessment: We will provide an initial assessment within 7 days
- Resolution Timeline: We aim to resolve critical vulnerabilities within 30 days
- Disclosure: We will coordinate with you on public disclosure timing
We consider security research conducted in accordance with this policy to be:
- Authorized concerning any applicable anti-hacking laws
- Authorized concerning any relevant anti-circumvention laws
- Exempt from restrictions in our Terms of Service that would interfere with security research
We will not pursue civil action or initiate a complaint against researchers who:
- Engage in testing in accordance with this policy
- Report vulnerabilities in good faith
- Avoid privacy violations, destruction of data, and interruption of services
- Do not exploit vulnerabilities beyond what is necessary to demonstrate the issue
- JWT Secrets: Use strong, randomly generated JWT secrets (minimum 256 bits)
- Token Expiration: Configure appropriate token expiration times
- API Keys: Rotate API keys regularly
- Connection Security: Always use TLS for PostgreSQL connections in production
- Credentials: Use strong database passwords and follow the principle of least privilege
- Network: Restrict database access to only necessary hosts
- HTTPS: Always use HTTPS in production environments
- Firewalls: Restrict network access to Kruxia Flow services
- Updates: Keep Kruxia Flow and dependencies up to date
- Secrets Management: Use secure secrets management (environment variables, not config files)
- Storage: Never commit API keys to version control
- Rotation: Rotate LLM provider API keys periodically
- Scoping: Use API keys with minimal necessary permissions
- Monitoring: Monitor API key usage for anomalies
# Example secure Docker Compose configuration
services:
kruxiaflow:
image: kruxia/kruxiaflow:latest
security_opt:
- no-new-privileges:true
read_only: true
tmpfs:
- /tmp
environment:
- DATABASE_URL=${DATABASE_URL}
- JWT_SECRET=${JWT_SECRET}- Workflow definitions can execute HTTP requests to arbitrary URLs
- Database activity types can execute SQL queries
- Always validate and sanitize workflow definitions from untrusted sources
- Budget limits help prevent runaway LLM costs but should not be relied upon as the sole protection
- Set up billing alerts with your LLM providers as an additional safeguard
- Cached responses may contain sensitive information
- Configure appropriate TTLs and consider cache isolation for sensitive workloads
Security updates are announced through:
For security-related inquiries, contact security@kruxia.com.
For general questions, join us on Discord.