We take security seriously and actively maintain the following versions:
| Version | Supported |
|---|---|
| latest | β |
| < 1.0 | β |
We recommend always using the latest version to ensure you have the most recent security patches and updates.
Please do NOT report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability, please report it to:
Email: prateek@llmhub.dev
Subject: [SECURITY] Brief description of the issue
Please provide as much information as possible to help us understand and resolve the issue:
- Description: Clear description of the vulnerability
- Impact: What could an attacker achieve?
- Steps to Reproduce: Detailed steps to reproduce the issue
- Proof of Concept: Code snippets, screenshots, or logs
- Environment: OS, browser, Node.js/Python versions
- Suggested Fix: If you have ideas on how to fix it
- Severity: Your assessment of the severity (Critical/High/Medium/Low)
Subject: [SECURITY] SQL Injection in user profile endpoint
Description:
The /api/user/profile endpoint is vulnerable to SQL injection through the
'username' parameter.
Impact:
An attacker could read, modify, or delete database records, potentially
accessing sensitive user data or taking over accounts.
Steps to Reproduce:
1. Navigate to http://localhost:3000/api/user/profile
2. Send POST request with payload: {"username": "admin' OR '1'='1"}
3. Observe unauthorized data access
Proof of Concept:
[Attach screenshot or code snippet]
Environment:
- OS: Ubuntu 22.04
- Node.js: 20.10.0
- Browser: Chrome 120
Severity: Critical
- Acknowledgment: We'll acknowledge receipt within 24 hours
- Initial Assessment: We'll assess severity and impact within 48 hours
- Status Updates: We'll keep you informed of our progress
- Fix Development: We'll work on a fix and coordinate disclosure timing
- Public Disclosure: We'll publicly disclose after the fix is deployed
- Critical vulnerabilities: Fix within 7 days
- High severity: Fix within 14 days
- Medium severity: Fix within 30 days
- Low severity: Fix in next regular release
- Supabase Auth with Row Level Security (RLS)
- JWT-based session management
- Encrypted API keys storage (BYOK)
- CSRF protection on all state-changing operations
- API keys encrypted with AES-256 (ENCRYPTION_KEY)
- Passwords hashed with bcrypt
- Secure session cookies (httpOnly, secure, sameSite)
- Environment variables for sensitive data
- Docker container sandboxing
- Network isolation options
- Resource limits (CPU, memory, disk)
- Ephemeral environments (no data persistence)
- Automated cleanup after sessions
- Pydantic models for request validation
- TypeScript strict mode
- SQL injection prevention (parameterized queries)
- XSS protection (sanitized outputs)
- File path validation
- API endpoint rate limiting
- WebSocket connection limits
- VM creation throttling
- Resource usage monitoring
- Security event logging
- Error tracking
- Access logs (anonymized)
- Anomaly detection
-
Environment Variables
- Never commit
.envfiles - Use
.env.exampleas a template - Rotate credentials regularly
- Use strong, unique passwords
- Never commit
-
API Keys
- Store in environment variables only
- Enable encryption (ENCRYPTION_KEY)
- Never log API keys
- Use least-privilege access
-
VM Security
- Don't store sensitive data in VMs
- Use isolated networks when possible
- Monitor resource usage
- Clean up containers regularly
-
Code Security
- Review generated commands before execution
- Validate all user inputs
- Use parameterized queries
- Sanitize file paths
- Keep dependencies updated
-
Network Security
- Use HTTPS in production
- Configure firewall rules
- Restrict VM network access
- Use VPNs for remote access
-
Container Security
- Keep Docker images updated
- Use non-root users in containers
- Scan images for vulnerabilities
- Limit container capabilities
-
Database Security
- Enable Supabase RLS policies
- Use strong database passwords
- Backup regularly
- Monitor access logs
-
Server Hardening
- Keep OS and packages updated
- Disable unnecessary services
- Configure fail2ban or similar
- Use SSH keys (not passwords)
- VM Access: Agents have full control within VMs by design
- Command Execution: Terminal agent can execute any command
- Browser Automation: Browser agent can visit any website
- User Responsibility: Users are responsible for agent actions
- VMs are isolated and ephemeral
- Resource limits prevent abuse
- Rate limiting prevents spam
- Monitoring detects anomalies
- User consent required for actions
We follow coordinated disclosure:
- Report received: Vulnerability reported privately
- Fix developed: We develop and test a fix
- Fix deployed: Patch released to all users
- Public disclosure: Details published after 90 days
We appreciate security researchers who help keep our users safe:
- Hall of Fame: Public recognition on our website
- Credit: Listed in release notes and security advisories
- Swag: Open Computer Use swag for significant findings
Note: We currently don't offer a bug bounty program, but we deeply value your contributions.
Security advisories will be published at:
- GitHub Security Advisories
- Release notes
- Discord announcements
- Email to registered users
Subscribe to our GitHub releases to stay informed.
- GitHub: Security advisories and releases
- Discord: #security-updates channel
- Email: Critical alerts to registered users
- Twitter: @llmhub_dev for major updates
- Update regularly:
git pull && npm install && pip install -r requirements.txt - Watch releases: Enable GitHub notifications
- Join Discord: Get real-time security updates
- Review changelog: Check CHANGELOG.md for security fixes
- OWASP Top 10: Web application security risks
- CWE Top 25: Common software weaknesses
- NIST Cybersecurity Framework: Security best practices
- GDPR: Data protection and privacy (for EU users)
- CCPA: Privacy rights (for California users)
We're working towards:
- SOC 2 Type II compliance
- ISO 27001 certification
- GDPR compliance audit
| Date | Type | Auditor | Findings | Status |
|---|---|---|---|---|
| TBD | External | TBD | TBD | Planned |
We plan to conduct regular security audits as the project grows.
- Security Lead: Prateek Jannu (prateek@llmhub.dev)
- General Security: prateek@llmhub.dev
- PGP Key: [Coming soon]
Our security team includes:
- Core maintainers
- Security advisors
- Community contributors
Have questions about our security practices?
- Email: security@llmhub.dev
- Discord: Join our server
- Discussions: GitHub Discussions
Thank you for helping keep Open Computer Use and our users safe! π
Last updated: October 2025