| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| < 0.2 | ❌ |
If you discover a security vulnerability in TraceIQ, please report it by:
- Email: Open an issue on GitHub with the label "security" (do not include sensitive details in public issues)
- GitHub Security Advisories: Use GitHub's private vulnerability reporting feature
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial response: Within 48 hours
- Status update: Within 1 week
- Resolution: Depends on severity
- Critical: Remote code execution, data exfiltration
- High: Privilege escalation, data corruption
- Medium: Information disclosure, denial of service
- Low: Minor issues with limited impact
- SQLite databases may contain sensitive agent interaction data
- Use appropriate file permissions on database files
- Consider encrypting database files at rest for sensitive deployments
- When using sentence-transformers, model weights are downloaded from Hugging Face
- Verify model integrity if operating in high-security environments
- Consider using local models for air-gapped deployments
- Keep dependencies updated to receive security patches
- Use
pip-auditor similar tools to scan for known vulnerabilities