We actively support the latest version of ai-robo-advisor with security updates.
| Version | Supported | End of Life |
|---|---|---|
| 0.1.x | ✅ Yes | TBD |
| < 0.1 | ❌ No | Immediate |
Note: As this project is in early development, we recommend always using the latest version.
🚨 Do NOT report security vulnerabilities through public GitHub issues.
- Email: Send details to the maintainer at the repository owner's GitHub email
- Subject: Use
[SECURITY] AI Robo Advisor - [Brief Description] - Include:
- Detailed vulnerability description
- Steps to reproduce (with minimal example)
- Affected versions/components
- Potential impact assessment
- Suggested mitigation (if known)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 72 hours
- Status Updates: Every 5 business days
- Resolution Target: 30 days for critical issues
- Authentication bypass
- API key exposure or mishandling
- Dependency vulnerabilities
- Code injection via user inputs
- Data exposure through logs/outputs
- Prompt injection attacks
- Financial data manipulation
- Social engineering attacks
- Physical security issues
- Issues requiring physical access
- Third-party service vulnerabilities (OpenAI, Polygon.io)
- Educational/demo limitations
- Never commit API keys to version control
- Use
.envfiles (included in.gitignore) - Rotate keys if compromised
- Use environment-specific keys (dev/prod)
- Prompt Injection: User inputs are sanitized before LLM processing
- Data Privacy: No personal financial data is stored permanently
- Model Outputs: All outputs include educational disclaimers
- Educational Purpose: No real trading or financial transactions
- Data Sources: Only public market data via Polygon.io API
- No Storage: Portfolio data exists only during session
# ✅ Good: Use environment variables
cp .env.example .env
# Edit .env with your actual API keys
export POLYGON_API_KEY="your-key-here"
# ❌ Bad: Hardcoding keys
POLYGON_API_KEY = "pk_live_1234567890" # Never do this!- Isolated Environment: Run in virtual environment or container
- API Rate Limits: Respect third-party API limits
- Key Rotation: Regularly rotate API keys
- Dependency Updates: Keep dependencies current
- Educational Only: Do not use for actual investment decisions
- Input validation and sanitization
- Environment variable usage for secrets
- Dependency vulnerability scanning (dependabot)
- No persistent data storage
- Educational disclaimers on all outputs
- Automated dependency updates
- Regular security audits of dependencies
- Code quality checks via CI/CD
- No Disruption: Do not interfere with normal operations
- Scope Limitation: Only test your own instances
- Data Protection: Do not access others' data
- Good Faith: Act with integrity and respect
- Allow reasonable time for fixes
- Do not publicly disclose until resolved
- Coordinate disclosure timing with maintainers
We appreciate security researchers who help keep our project safe. Verified reporters will be acknowledged in:
- Security advisories
- Release notes
- This document (with permission)
- Documentation: Contributing Guide
- Dependencies: Requirements
- Best Practices: OWASP Secure Coding
- AI Security: OWASP ML Top 10