We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We take security bugs seriously. We appreciate your efforts to responsibly disclose your findings, and will make every effort to acknowledge your contributions.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to:
When reporting a security vulnerability, please include:
- Description: A clear description of the vulnerability
- Steps to Reproduce: Detailed steps to reproduce the issue
- Impact: Description of the potential impact
- Environment: OS, Rust version, LLM model, and any other relevant details
- Proof of Concept: If possible, include a minimal code example that demonstrates the issue
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Regular Updates: We will keep you informed of our progress
- Resolution: We will work with you to resolve the issue and coordinate disclosure
- Initial Response: Within 48 hours
- Status Update: Within 5 business days
- Resolution: Within 30 days (depending on complexity)
When reporting vulnerabilities, please consider:
- Prompt Injection: Successful bypass of injection detection
- Jailbreak Attacks: Successful jailbreak attempts
- Unicode Attacks: Bypass through Unicode manipulation
- False Positives: Legitimate inputs being blocked
- Performance: DoS through resource exhaustion
- Memory Safety: Unsafe memory operations or buffer overflows
Common attack vectors to test:
- Direct Injection: "Ignore previous instructions"
- Jailbreak Techniques: DAN, STAN, developer mode
- Unicode Homoglyphs: Visually similar characters
- Zero-Width Characters: Hidden characters
- RTL Override: Right-to-left text manipulation
- Encoding Attacks: URL encoding, HTML entities
- Social Engineering: Professional-sounding manipulation
- Semantic Cloaking: Disguised attack patterns
- Always validate inputs before sending to LLMs
- Use the library correctly according to documentation
- Implement additional layers of security
- Keep the library updated to the latest version
- Monitor for security advisories
- Test with your specific LLM models
- Test with malicious inputs regularly
- Implement defense in depth
- Use the library correctly according to documentation
- Consider additional validation for critical applications
- Monitor security updates
- Test with various LLM models
- 90+ Attack Patterns: Comprehensive pattern matching
- Multi-Layer Detection: Input sanitization and output validation
- Unicode Protection: Homoglyph and zero-width character detection
- Jailbreak Prevention: DAN, STAN, and other jailbreak techniques
- Memory Safety: Rust's memory safety guarantees
- Configurable Security: Adjustable security levels
- Input Sanitization: Sanitize user input before validation
- Output Validation: Validate LLM responses
- Rate Limiting: Implement rate limiting for LLM calls
- Logging: Log security events for monitoring
- Regular Updates: Keep dependencies and the library updated
- Model Testing: Test with your specific LLM models
- Assessment: We assess the severity and impact
- Fix Development: We develop a fix in private
- Testing: We thoroughly test the fix
- Release: We release the fix with a security advisory
- Disclosure: We coordinate disclosure with reporters
Security advisories are published on:
- GitHub Security Advisories: https://github.com/redasgard/llm-security/security/advisories
- Crates.io: Security notices in release notes
- Email: Subscribers to security@redasgard.com
We follow responsible disclosure practices:
- Private Reporting: Report vulnerabilities privately first
- Coordinated Disclosure: We coordinate disclosure timing
- Credit: We give credit to security researchers
- No Legal Action: We won't take legal action against good faith research
- Test Responsibly: Don't test on production systems
- Respect Privacy: Don't access or modify data
- Report Promptly: Report findings as soon as possible
- Follow Guidelines: Follow this security policy
In Scope:
- Prompt injection bypasses
- Jailbreak technique bypasses
- Unicode manipulation attacks
- False positive issues
- Memory safety issues
- Performance DoS attacks
Out of Scope:
- Social engineering attacks
- Physical security issues
- Issues in dependencies (report to their maintainers)
- Issues in applications using this library
- Issues in LLM models themselves
For security-related questions or to report vulnerabilities:
- Email: security@redasgard.com
- PGP Key: Available upon request
- Response Time: Within 48 hours
We thank the security researchers who help keep our software secure. Security researchers who follow responsible disclosure practices will be acknowledged in our security advisories.
By reporting a security vulnerability, you agree to:
- Not disclose the vulnerability publicly until we've had a chance to address it
- Not access or modify data that doesn't belong to you
- Not disrupt our services or systems
- Act in good faith to avoid privacy violations, destruction of data, and interruption or degradation of our services
Thank you for helping keep LLM Security and our users safe! 🤖🛡️