| Version | Supported |
|---|---|
| 2.x | ✅ |
| < 2.0 | ❌ |
We take security seriously. If you discover a security vulnerability, please report it responsibly.
- Email: williamzujkowski@gmail.com
- GitHub Security Advisory (preferred): https://github.com/williamzujkowski/nexus-agents/security/advisories/new
- Open a public GitHub issue for security vulnerabilities
- Disclose the vulnerability publicly before it has been addressed
- Exploit the vulnerability for any purpose
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Suggested fix (if any)
- CWE identifier (if known)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution Timeline: Dependent on severity
- Critical: 24-48 hours
- High: 7 days
- Medium: 30 days
- Low: Next release
This project implements these security measures:
- Input Validation: All inputs validated with Zod schemas at boundaries
- Path Safety: Path traversal prevention on all file operations
- No User RegExp: Static regex patterns only, no user-provided regular expressions
- Secrets Handling: Environment variables for API keys, sanitized before logging
- Rate Limiting: Token bucket rate limiting on all public tools
- Memory Bounds: Bounded collections and context pruning
pnpm auditruns on every CI build- Dependabot enabled for automated security updates
- No deprecated packages allowed
- Regular dependency review and updates
- API keys are never logged or exposed in error messages
- Secrets are sanitized before any output
- Environment variables validated at startup
Before each release:
-
pnpm auditshows no high/critical vulnerabilities - All dependencies are current and not deprecated
- No secrets in code, logs, or test fixtures
- Path traversal tests pass
- Rate limiting is enabled on all public interfaces
- Input validation covers all tool boundaries
- Memory bounds are enforced on collections
MCP tools execute with the permissions of the host process. Users should:
- Run with minimal required permissions
- Use separate API keys for different environments
- Monitor token usage and rate limits
API keys for model providers (Anthropic, OpenAI, etc.) are sensitive:
- Store in environment variables or secure vaults
- Never commit to version control
- Rotate regularly
- Use scoped keys when available
Security updates are released as patch versions. Subscribe to GitHub releases to receive notifications.
Last updated: 2026-04-17