| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take the security of InnoClaw seriously. If you discover a security vulnerability, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please use one of the following methods:
-
GitHub Security Advisories (Preferred): Use the "Report a vulnerability" button on the Security tab of our GitHub repository to create a private security advisory.
-
Email: Contact the maintainers directly through the email addresses listed in their GitHub profiles.
When reporting a vulnerability, please include:
- A description of the vulnerability and its potential impact
- Steps to reproduce the issue
- Any proof-of-concept code (if applicable)
- The version(s) of InnoClaw affected
- Your suggested fix (if any)
- Acknowledgment: We will acknowledge receipt of your report within 48 hours.
- Assessment: We will provide an initial assessment within 7 days.
- Resolution: We aim to release a fix within 30 days for critical vulnerabilities.
- We follow a coordinated disclosure process.
- We will credit reporters in the security advisory (unless they prefer to remain anonymous).
- Please allow us reasonable time to address the vulnerability before any public disclosure.
When deploying InnoClaw, please follow these security practices:
- Environment Variables: Never commit
.envfiles or API keys to version control. Use.env.exampleas a reference template. - API Keys: Rotate your API keys regularly and use the minimum required permissions.
- Network: When deploying in production, use a reverse proxy (Nginx/Caddy) with HTTPS enabled.
- Database: The SQLite database file contains user data. Ensure appropriate file system permissions.
- Access Control: Restrict
WORKSPACE_ROOTSto only the directories that need to be accessible.