Do NOT open a public GitHub issue for security vulnerabilities.
If you discover a security vulnerability, please report it privately by emailing vero@eudaimoniatech.io with the following information:
- Vulnerability Type: (e.g., XSS, SQL injection, authentication bypass)
- Affected Component: Which part of IntellyWeave is affected?
- Severity: How severe is the vulnerability?
- Description: Clear description of the vulnerability
- Steps to Reproduce: How can the vulnerability be reproduced?
- Impact: What could an attacker do with this vulnerability?
- Proposed Fix (optional): Do you have a suggested fix?
- Within 48 hours: Acknowledgment of your report
- Within 7 days: Initial assessment and validation
- Within 30 days: Development and testing of fix
- Within 45 days: Release of patched version
We request a 90-day responsible disclosure window before public announcement to allow users time to upgrade.
| Version | Security Updates |
|---|---|
| Latest | Yes |
| Previous | Critical fixes only |
| Older | No |
We recommend using the latest version to receive all security patches.
- Keep Updated: Regularly update to the latest version
- API Key Management:
- Store API keys in environment variables, never hardcode
- Rotate keys regularly
- Use separate keys for dev/staging/production
- Network Security:
- Deploy behind HTTPS/TLS
- Use firewalls for sensitive environments
- Restrict API access by IP when possible
- Data Protection:
- Encrypt sensitive documents at rest
- Use TLS 1.2+ for all connections
- Dependency Management:
- Run
pnpm auditandpip auditto check for vulnerabilities - Keep dependencies updated
- Run
- Code Review:
- All changes require review before merge
- Security-sensitive code gets extra scrutiny
- Input Validation:
- Validate all user input
- Sanitize data before storing or displaying
IntellyWeave relies on open-source projects with their own security practices:
Backend: FastAPI, Weaviate, LiteLLM, DSPy, GLiNER Frontend: Next.js, Mapbox GL, vis-network, Radix UI
Dependencies are monitored via Renovate for known vulnerabilities.
- Use
.envfiles for secrets (never commit to git) - Use localhost only
- Deploy behind reverse proxy with HTTPS/TLS
- Enable authentication
- Encrypt data in transit and at rest
- Regular backups with tested recovery procedures
Email: vero@eudaimoniatech.io
For non-security questions, use GitHub Discussions.
Last Updated: December 2025