We release security updates for the following versions of cascadeflow:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We recommend always using the latest version for the best security and features.
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Please do NOT create a public GitHub issue for security vulnerabilities.
Instead, report security issues via email to:
Please include the following information in your report:
- Type of vulnerability (e.g., injection, authentication bypass, data exposure)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Any potential mitigations you've identified
After you submit a report:
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability and determine its impact
- Updates: We will keep you informed about our progress
- Fix: We will work on a fix and coordinate disclosure timing with you
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)
- 48 hours: Initial response acknowledging receipt
- 7 days: Initial assessment of vulnerability severity
- 30 days: Target for releasing a fix (may vary based on complexity)
- 90 days: Public disclosure (coordinated with reporter)
- Verify: We verify the reported vulnerability
- Assess: We assess the severity using CVSS scoring
- Fix: We develop and test a fix
- Release: We release a patched version
- Announce: We publish a security advisory
- Notify: We notify affected users
We classify vulnerabilities using the following severity levels:
- Critical: Immediate risk to user data or system integrity
- High: Significant risk that should be addressed quickly
- Medium: Moderate risk with limited impact
- Low: Minor issues with minimal impact
Security advisories will be published on:
- GitHub Security Advisories
- Release notes
- Project README (for critical issues)
When using cascadeflow, follow these security practices:
Never commit API keys to version control:
# Always use .env files
echo "OPENAI_API_KEY=sk-..." >> .env
# Ensure .env is in .gitignore
echo ".env" >> .gitignoreUse environment variables:
import os
from dotenv import load_dotenv
load_dotenv()
api_key = os.getenv("OPENAI_API_KEY") # ✅ SecureDon't hardcode keys:
# ❌ NEVER DO THIS
api_key = "sk-proj-abc123..."
# ✅ DO THIS INSTEAD
api_key = os.getenv("OPENAI_API_KEY")Always validate user input:
# Validate before passing to models
def sanitize_input(user_input: str) -> str:
# Remove dangerous characters
# Limit length
# Validate format
return cleaned_inputImplement rate limiting in production:
# Prevent abuse
from cascadeflow import CascadeAgent
agent = CascadeAgent(models=models)
# Add rate limiting middlewareMonitor for unusual activity:
- Unexpected API costs
- High volume of requests
- Failed authentication attempts
- Error rate spikes
If you're contributing to cascadeflow:
- All code must be reviewed before merging
- Security-sensitive code requires additional review
- Use automated security scanning tools
- Keep dependencies up to date
- Review dependency security advisories
- Use
pip-auditto check for vulnerabilities
pip install pip-audit
pip-audit- Write tests for security-critical functionality
- Test with invalid/malicious inputs
- Test authentication and authorization
Risk: API keys could be exposed in logs, error messages, or version control.
Mitigation:
- Never log API keys
- Use environment variables
- Add
.envto.gitignore - Rotate keys if exposed
Risk: Malicious users could craft prompts to bypass safety measures.
Mitigation:
- Validate and sanitize all user inputs
- Implement content filtering
- Use system prompts to set boundaries
- Monitor for suspicious patterns
Risk: Malicious users could cause excessive API costs.
Mitigation:
- Implement budget limits per user/session
- Set up cost alerts
- Use rate limiting
- Monitor usage patterns
from cascadeflow import UserTier
# Set budget limits
tier = UserTier(
name="free",
max_budget=0.01, # $0.01 limit
quality_threshold=0.6
)Risk: Sensitive data could be sent to external APIs.
Mitigation:
- Don't send PII without user consent
- Use local models (Ollama) for sensitive data
- Review provider privacy policies
- Implement data sanitization
Risk: Third-party dependencies may have security vulnerabilities.
Mitigation:
- Regular dependency updates
- Use
pip-auditfor scanning - Pin dependency versions
- Review security advisories
Security issues related to:
- API key exposure
- Authentication/authorization bypass
- Injection vulnerabilities (prompt injection, code injection)
- Data leakage
- Denial of Service (DoS)
- Dependency vulnerabilities
- Cryptographic weaknesses
The following are generally considered out of scope:
- Issues in third-party provider APIs (report to the provider)
- Social engineering attacks
- Physical security issues
- Issues requiring local system access
- Theoretical attacks without proof of concept
- Issues in unsupported versions
We use the following tools to maintain security:
- GitHub Security Scanning: Automated vulnerability detection
- Dependabot: Dependency update alerts
- pip-audit: Python package vulnerability scanning
- Bandit: Python security linter
- Safety: Checks for known security vulnerabilities
Contributors can run security checks locally:
# Install security tools
pip install bandit safety pip-audit
# Run security scan
bandit -r cascadeflow/
# Check for vulnerable dependencies
safety check
pip-audit
# Check for secrets in code
git secrets --scan- OWASP Top 10
- CWE Top 25
- Python Security Best Practices
- OpenAI Security Best Practices
- Anthropic Safety Guidelines
- Watch this repository for security updates
- Subscribe to security advisories
For security concerns:
- Email: security@lemony.ai
- PGP Key: Available upon request
For general questions:
- Email: hello@lemony.ai
- GitHub Issues: For non-security bugs
We appreciate the security research community's efforts to keep cascadeflow secure. Security researchers who responsibly disclose vulnerabilities will be acknowledged in our security advisories (unless they prefer to remain anonymous).
Security researchers who have helped improve cascadeflow security:
- No vulnerabilities reported yet
This security policy may be updated from time to time. Please check back regularly for updates.
Last Updated: October 2025
Version: 1.0