The following versions of GenAssist are currently supported with security updates:
| Version | Supported |
|---|---|
| latest | ✅ |
| < 1.0 | ❌ |
We take the security of GenAssist seriously. If you discover a security vulnerability, please report it responsibly.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please use one of these methods:
- GitHub Security Advisories: Use the "Report a vulnerability" button in the Security tab of this repository (preferred)
- Email: Send details to the repository maintainers
When reporting a vulnerability, please provide:
- A clear description of the vulnerability
- Steps to reproduce the issue
- Affected components (frontend, backend, API, database, etc.)
- Potential impact and severity assessment
- Any proof-of-concept code (if applicable)
- Suggested remediation (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 5 business days
- Status Updates: Every 7 days until resolution
- Resolution Target: Based on severity
- Critical: 7 days
- High: 14 days
- Medium: 30 days
- Low: 90 days
- We will acknowledge receipt of your report
- We will investigate and validate the issue
- We will keep you informed of our progress
- We will work on a fix and coordinate disclosure timing with you
- We will credit you in the release notes (unless you prefer anonymity)
Given that GenAssist handles AI workflows, user data, and integrates with various LLM providers, we pay special attention to:
- Secure user authentication mechanisms
- Role-based access control (RBAC)
- API key management and secure storage
- Encryption of sensitive data at rest and in transit
- Secure handling of conversation data and transcripts
- Protection of AI agent configurations and credentials
- Input validation and sanitization
- Rate limiting and abuse prevention
- Secure communication with LLM providers
- Container security best practices
- Database security (PostgreSQL)
- Secure environment variable handling
When contributing to GenAssist, please follow these guidelines:
- Never commit secrets, API keys, passwords, or credentials
- Use environment variables for all sensitive configuration
- Validate and sanitize all user inputs
- Use parameterized queries to prevent SQL injection
- Escape output to prevent XSS attacks
- Follow the principle of least privilege
- Keep dependencies up to date
- Review security advisories for dependencies
- Use
npm auditandpip auditto check for vulnerabilities
- Never store passwords in plain text
- Use secure session management
- Implement proper CORS policies
- Never commit
.envfiles - Use
.env.exampleas a template without actual secrets - Document required environment variables
This security policy applies to:
- The GenAssist core repository
- Frontend application (React/TypeScript)
- Backend API (FastAPI/Python)
- Official plugins (React, iOS)
- Associated documentation
- Docker configurations
- Third-party dependencies (report to their maintainers)
- Self-hosted instances with custom modifications
- Issues in forked repositories
We appreciate security researchers who help keep GenAssist and its users safe. Contributors who report valid security issues will be:
- Acknowledged in our release notes (with permission)
- Added to our security hall of fame (coming soon)
Thank you for helping us maintain a secure platform for AI workflow management.