| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| 0.1.x | ❌ |
We take security vulnerabilities seriously. If you discover a security vulnerability in the RAFT Toolkit, please report it to us responsibly.
- Do not create a public GitHub issue for security vulnerabilities
- Email security concerns to: [security@raft-toolkit.com] (or use GitHub's private vulnerability reporting)
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Initial Assessment: We'll provide an initial assessment within 5 business days
- Updates: We'll keep you informed about progress
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Dependency Scanning: Automated dependency vulnerability scanning with Dependabot
- Container Scanning: Docker images scanned with Trivy for vulnerabilities
- Code Scanning: Static analysis with CodeQL and Bandit
- Secrets Detection: GitHub Advanced Security for secret scanning
- Regular Updates: Dependencies and base images updated regularly
- Non-root User: Containers run as non-root user
raft - Minimal Base Images: Using slim Python images with security updates
- Layer Optimization: Multi-stage builds to minimize attack surface
- Security Scanning: All images scanned before deployment
- Input Validation: All user inputs validated and sanitized
- API Security: Rate limiting and authentication for API endpoints
- Secret Management: Environment variables for sensitive configuration
- Secure Defaults: Security-first configuration defaults
Some low-severity vulnerabilities in base Debian packages are filtered out as they:
- Are historical/legacy issues not applicable to containerized environments
- Require system-level updates beyond application control
- Have minimal impact in the container context
These are tracked in .trivyignore and reviewed regularly.
- Python dependencies are automatically updated via Dependabot
- Security patches are prioritized and applied promptly
- Development dependencies are separated from production dependencies
- Use Official Images: Only use images from our official registry
- Keep Updated: Regularly update to the latest version
- Network Security: Use proper network isolation and firewalls
- Secrets Management: Use secure secret management systems
- Access Control: Implement proper authentication and authorization
- Environment Variables: Store API keys in environment variables
- Key Rotation: Regularly rotate API keys
- Least Privilege: Use keys with minimal required permissions
- Monitoring: Monitor API key usage for anomalies
- Input Sanitization: Validate all document inputs
- Output Review: Review generated content before use
- Data Retention: Implement appropriate data retention policies
- Access Logs: Monitor access to sensitive data
- Day 0: Vulnerability reported
- Day 1-2: Acknowledgment sent
- Day 3-5: Initial assessment and triage
- Day 6-30: Investigation and fix development
- Day 30+: Public disclosure (coordinated with reporter)
For security-related questions or concerns:
- Security Email: [Create appropriate security contact]
- GitHub Security Advisories: Use private reporting feature
- General Issues: Use public GitHub issues (non-security only)
This security policy is reviewed and updated regularly to reflect current best practices and threat landscape.