We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
The ADIC Core team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings, and will make every effort to acknowledge your contributions.
To report a security vulnerability, please use ONE of the following methods:
- Email: Send details to ADICL1@proton.me with subject line "SECURITY: [brief description]"
- GitHub Security Advisories: Use GitHub's private vulnerability reporting feature
- Encrypted Communication: PGP key available upon request via email
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target:
- Critical: 7 days
- High: 14 days
- Medium: 30 days
- Low: 90 days
- Security issues will be disclosed publicly after patches are available
- We will credit reporters who wish to be acknowledged
- We request a 90-day disclosure embargo for critical vulnerabilities
When deploying ADIC Core:
- Always use strong, unique keypairs
- Store private keys securely (use hardware security modules in production)
- Enable TLS for all API endpoints
- Use firewall rules to restrict network access
- Monitor logs for suspicious activity
- Never use default passwords
- Set strong passwords via environment variables or secrets management
- Use Docker secrets or Kubernetes secrets for sensitive data
- Run containers with minimal privileges
- Keep base images updated
- Review all configuration before deployment
- Use environment-specific configs (dev/staging/prod)
- Enable rate limiting on public endpoints
- Configure appropriate resource limits
- Implement proper access controls
ADIC Core includes several security features:
- Cryptographic Security: Ed25519 signatures for message authentication
- Deposit System: Anti-spam mechanism with slashing for malicious behavior
- Reputation System: Tracks node behavior and penalizes bad actors
- Message Validation: Comprehensive validation of all messages
- Rate Limiting: Built-in protection against DoS attacks
We regularly audit our dependencies for known vulnerabilities using:
cargo auditfor Rust dependencies- GitHub Dependabot alerts
- Manual security reviews
For security concerns, contact: ADICL1@proton.me
For general issues: https://github.com/IguanAI/adic-core/issues
The P2P update system implements multiple layers of security:
-
Cryptographic Verification:
- Ed25519 signature verification for all binaries
- SHA256 hash verification for each 1MB chunk
- DNS TXT record validation with optional DNSSEC
-
Attack Mitigation:
- Sybil resistance through multiple peer verification
- Version pinning to prevent forced updates
- Rollback protection against downgrade attacks
- Chunk poisoning prevention via hash verification
-
Secure Distribution:
- P2P distribution reduces single points of failure
- Reputation-based peer selection
- Rate limiting to prevent resource exhaustion
- Copyover technique preserves active connections
# Verify binary signature
openssl dgst -sha256 -verify release.pub -signature update.sig adic-binary
# Check DNS record
dig TXT _version.adic.network.adicl1.com +short
# Verify via API
curl http://localhost:8080/update/verifyWe thank the following researchers for responsibly disclosing security issues:
This security policy is subject to change. Last updated: December 2024