We release patches for security vulnerabilities. The following versions are currently being supported with security updates:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them privately using one of the following methods:
- Go to the Security tab of this repository
- Click "Report a vulnerability"
- Fill out the vulnerability report form with as much detail as possible
Alternatively, you can email security reports to the maintainers. Please include:
- Type of vulnerability: (e.g., XSS, SQL injection, authentication bypass, etc.)
- Full paths of affected source files
- Location of the affected source code: (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue: What an attacker might be able to do
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours.
- Communication: We will keep you informed about our progress as we work on a fix.
- Timeline: We aim to release a fix within 90 days of disclosure for most vulnerabilities.
- Credit: With your permission, we will credit you in the security advisory and release notes.
When contributing to or using Agentic Navigator, please follow these security best practices:
- Never commit API keys or secrets to the repository
- Use environment variables (
.envfiles) for local development - Store production secrets in Google Secret Manager
- The
.env.examplefile should only contain placeholders, never real values
- All services use Workload Identity (WI) for authentication to Google Cloud services
- No service account JSON keys are stored in containers
- Secrets are injected at runtime from Secret Manager
- All HTTP traffic is automatically encrypted with TLS/HTTPS
- We use automated dependency scanning via OSV-Scanner in our CI/CD pipeline
- Keep dependencies up to date
- Review security advisories for all dependencies
- Run
make testbefore submitting pull requests
- All infrastructure is defined as code using Terraform
- TFSec scans Terraform code for security issues in CI/CD
- Follow the principle of least privilege for IAM roles
- Use Workload Identity Federation (WIF) for GitHub Actions authentication
- Input validation is required for all user inputs
- Use parameterized queries to prevent injection attacks
- Sanitize outputs to prevent XSS
- Follow OWASP best practices
- Run security linters before committing code
This repository has GitHub Secret Scanning enabled to detect accidentally committed secrets in:
- Current code
- Pull requests
- Historical commits
If a secret is detected, it will be flagged and should be:
- Rotated immediately
- Removed from git history if possible
- Added to
.gitignoreto prevent future commits
Every pull request runs the following security checks:
- TFSec: Terraform security scanning
- OSV-Scanner: Dependency vulnerability scanning
- Secret Verification: Verifies no
.envfiles in git history (FR#095) - Linting: Code quality and security linting
- Tests: Unit and integration tests
All checks must pass before merging.
As part of our commitment to security, we automatically verify that no .env files or other sensitive configuration files exist in the Git history:
- Automated Verification: The
scripts/verify-no-secrets.shscript runs on every PR - Pre-commit Hook: Local commits are checked before they reach the repository
- GitIgnore Enforcement:
.envfiles are properly excluded via.gitignore
For more details, see SECURITY_FIX_FR095.md.
We follow a coordinated disclosure approach:
- Private Disclosure: Report vulnerabilities privately as described above
- Investigation: We investigate and develop a fix
- Patch Development: We develop and test a security patch
- Coordinated Release: We coordinate the release with you
- Public Disclosure: After the patch is released, we publish a security advisory
We request that you:
- Give us a reasonable amount of time to fix the issue before public disclosure
- Do not exploit the vulnerability beyond what is necessary to demonstrate it
- Do not access, modify, or delete data belonging to others
- Act in good faith to avoid privacy violations and service disruption
Security updates will be:
- Released as soon as possible after a vulnerability is confirmed
- Announced through GitHub Security Advisories
- Included in release notes with appropriate credit
Subscribe to repository notifications to stay informed about security updates.
If you have questions about security that don't involve reporting a vulnerability, please:
- Open a GitHub issue with the
securitylabel - Refer to our Contributing Guide
We appreciate the security research community's efforts in responsibly disclosing vulnerabilities. Your contributions help keep Agentic Navigator and its users safe.