Skip to content

Security: Aethel-Labs/aethel

SECURITY.md

Security Policy

Supported Versions

We actively maintain and provide security updates for the following versions:

Version Supported
Latest
< Latest

Reporting a Vulnerability

We take security vulnerabilities seriously. If you discover a security vulnerability in Aethel, please report it responsibly.

How to Report

  1. Do NOT create a public GitHub issue for security vulnerabilities
  2. Send an email to the project maintainers with:
    • A clear description of the vulnerability
    • Steps to reproduce the issue
    • Potential impact assessment
    • Any suggested fixes (if available)

What to Expect

  • Acknowledgment: We will acknowledge receipt of your report within 48 hours
  • Initial Assessment: We will provide an initial assessment within 5 business days
  • Updates: We will keep you informed of our progress throughout the investigation
  • Resolution: We aim to resolve critical vulnerabilities within 30 days

Responsible Disclosure

We follow responsible disclosure practices:

  • We will work with you to understand and resolve the issue
  • We will credit you for the discovery (unless you prefer to remain anonymous)
  • We ask that you do not publicly disclose the vulnerability until we have had a chance to address it

Security Measures

Current Security Implementations

  • SSRF Protection: API endpoints are restricted to whitelisted hosts to prevent Server-Side Request Forgery attacks
  • Input Validation: All user inputs are validated and sanitized
  • Encryption: Sensitive data like API keys are encrypted before storage
  • Authentication: Secure token-based authentication for API access
  • Rate Limiting: Protection against abuse and DoS attacks

Allowed API Hosts

For security reasons, custom API endpoints are restricted to the following trusted hosts:

  • api.openai.com
  • openrouter.ai
  • generativelanguage.googleapis.com

Security Best Practices

When contributing to or using Aethel:

  1. Never commit secrets: Do not include API keys, passwords, or other sensitive information in code
  2. Use environment variables: Store sensitive configuration in environment variables
  3. Validate inputs: Always validate and sanitize user inputs
  4. Follow least privilege: Grant minimal necessary permissions
  5. Keep dependencies updated: Regularly update dependencies to patch known vulnerabilities

Security Audits

We regularly review our codebase for security vulnerabilities and welcome security audits from the community.

Automated Security Checks

  • Dependabot: Automatically monitors and updates vulnerable dependencies
  • CodeQL: Static analysis for security vulnerabilities
  • ESLint Security Rules: Linting rules to catch common security issues

Contact

For security-related questions or concerns, please contact the project maintainers at scan@scanash.com


Note: This security policy is subject to change. Please check back regularly for updates.

There aren’t any published security advisories