Skip to content

Security: lornu-ai/agentnav

Security

SECURITY.md

Security Policy

Supported Versions

We release patches for security vulnerabilities. The following versions are currently being supported with security updates:

Version Supported
Latest
< Latest

Reporting a Vulnerability

Please do not report security vulnerabilities through public GitHub issues.

Instead, please report them privately using one of the following methods:

GitHub Security Advisories (Recommended)

  1. Go to the Security tab of this repository
  2. Click "Report a vulnerability"
  3. Fill out the vulnerability report form with as much detail as possible

Email Reporting

Alternatively, you can email security reports to the maintainers. Please include:

  1. Type of vulnerability: (e.g., XSS, SQL injection, authentication bypass, etc.)
  2. Full paths of affected source files
  3. Location of the affected source code: (tag/branch/commit or direct URL)
  4. Step-by-step instructions to reproduce the issue
  5. Proof-of-concept or exploit code (if possible)
  6. Impact of the issue: What an attacker might be able to do

What to Expect

  • Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours.
  • Communication: We will keep you informed about our progress as we work on a fix.
  • Timeline: We aim to release a fix within 90 days of disclosure for most vulnerabilities.
  • Credit: With your permission, we will credit you in the security advisory and release notes.

Security Best Practices

When contributing to or using Agentic Navigator, please follow these security best practices:

API Keys and Secrets

  • Never commit API keys or secrets to the repository
  • Use environment variables (.env files) for local development
  • Store production secrets in Google Secret Manager
  • The .env.example file should only contain placeholders, never real values

Cloud Run Security

  • All services use Workload Identity (WI) for authentication to Google Cloud services
  • No service account JSON keys are stored in containers
  • Secrets are injected at runtime from Secret Manager
  • All HTTP traffic is automatically encrypted with TLS/HTTPS

Dependency Security

  • We use automated dependency scanning via OSV-Scanner in our CI/CD pipeline
  • Keep dependencies up to date
  • Review security advisories for all dependencies
  • Run make test before submitting pull requests

Infrastructure Security

  • All infrastructure is defined as code using Terraform
  • TFSec scans Terraform code for security issues in CI/CD
  • Follow the principle of least privilege for IAM roles
  • Use Workload Identity Federation (WIF) for GitHub Actions authentication

Code Security

  • Input validation is required for all user inputs
  • Use parameterized queries to prevent injection attacks
  • Sanitize outputs to prevent XSS
  • Follow OWASP best practices
  • Run security linters before committing code

Known Security Features

GitHub Secret Scanning

This repository has GitHub Secret Scanning enabled to detect accidentally committed secrets in:

  • Current code
  • Pull requests
  • Historical commits

If a secret is detected, it will be flagged and should be:

  1. Rotated immediately
  2. Removed from git history if possible
  3. Added to .gitignore to prevent future commits

CI/CD Security Checks

Every pull request runs the following security checks:

  1. TFSec: Terraform security scanning
  2. OSV-Scanner: Dependency vulnerability scanning
  3. Secret Verification: Verifies no .env files in git history (FR#095)
  4. Linting: Code quality and security linting
  5. Tests: Unit and integration tests

All checks must pass before merging.

Secret History Verification (FR#095)

As part of our commitment to security, we automatically verify that no .env files or other sensitive configuration files exist in the Git history:

  • Automated Verification: The scripts/verify-no-secrets.sh script runs on every PR
  • Pre-commit Hook: Local commits are checked before they reach the repository
  • GitIgnore Enforcement: .env files are properly excluded via .gitignore

For more details, see SECURITY_FIX_FR095.md.

Vulnerability Disclosure Policy

We follow a coordinated disclosure approach:

  1. Private Disclosure: Report vulnerabilities privately as described above
  2. Investigation: We investigate and develop a fix
  3. Patch Development: We develop and test a security patch
  4. Coordinated Release: We coordinate the release with you
  5. Public Disclosure: After the patch is released, we publish a security advisory

We request that you:

  • Give us a reasonable amount of time to fix the issue before public disclosure
  • Do not exploit the vulnerability beyond what is necessary to demonstrate it
  • Do not access, modify, or delete data belonging to others
  • Act in good faith to avoid privacy violations and service disruption

Security Updates

Security updates will be:

  • Released as soon as possible after a vulnerability is confirmed
  • Announced through GitHub Security Advisories
  • Included in release notes with appropriate credit

Subscribe to repository notifications to stay informed about security updates.

Additional Resources

Questions?

If you have questions about security that don't involve reporting a vulnerability, please:

Thank You

We appreciate the security research community's efforts in responsibly disclosing vulnerabilities. Your contributions help keep Agentic Navigator and its users safe.

There aren’t any published security advisories