At AVI, we take security issues seriously. We appreciate your efforts to responsibly disclose your findings and will make every effort to acknowledge your contributions.
If you believe you've found a security vulnerability in AVI, please follow these steps:
- Do not disclose the vulnerability publicly (including in GitHub issues)
- Email your findings to: [email protected]
- Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggestions for mitigation (if applicable)
- Initial Response: We aim to acknowledge receipt of your report within 48 hours
- Status Updates: We will provide regular updates on the progress of addressing the vulnerability
- Resolution Timeline: We strive to resolve critical issues within 30 days of verification
- Disclosure: We will coordinate with you on the disclosure timeline
Only the latest released version and the development branch receive security updates. If you're running an older version, please update to the latest release.
Version | Supported |
---|---|
0.1.x | ✅ |
< 0.1.0 | ❌ |
- All code is reviewed before merging into the main branch
- We use static analysis tools to identify potential security issues
- The project maintains a comprehensive test suite with security-focused tests
- Dependencies are regularly audited for known vulnerabilities
- We use
cargo audit
to scan for vulnerable dependencies - Critical security updates to dependencies are prioritized
- We follow the principle of least privilege throughout the codebase
- Authentication and authorization are separated concerns
- All user input is validated and sanitized
- Sensitive data is encrypted in transit and at rest
AVI has not yet undergone a formal external security audit. As the project matures, we plan to conduct regular security assessments.
If you're deploying AVI in your environment, consider the following security recommendations:
- Run with Minimal Privileges: Configure AVI to run with the minimum privileges required
- Network Security: Limit network access to the AVI instance
- Regular Updates: Keep your AVI installation up-to-date with the latest releases
- Input Validation: Always validate user inputs in your AviScript skills
- Secure Communication: Use TLS/SSL for all communications with AVI
- Authentication: Implement strong authentication mechanisms for administrative access
- Logging: Enable comprehensive logging for security monitoring
We believe in responsible disclosure. When we receive a security bug report, we will:
- Confirm the vulnerability
- Determine the scope and impact
- Develop and test a fix
- Release a patch
- Publicly disclose the issue after a reasonable time period
We appreciate security researchers who help improve our security. Contributors who responsibly disclose vulnerabilities will be acknowledged in our Security Hall of Fame (coming soon).
This security policy was last updated on April 27, 2025.