| Version | Supported |
|---|---|
| 3.x.x | ✅ |
| 2.x.x | ✅ |
| < 2.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
- DO NOT create a public GitHub issue for security vulnerabilities
- Email security concerns to the repository maintainer
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution Timeline: Depends on severity
- Critical: 24-72 hours
- High: 7 days
- Medium: 30 days
- Low: Next release
This project implements the following security measures:
- CodeQL: Static analysis for JavaScript/TypeScript and Python
- Trivy: Vulnerability scanning for dependencies and containers
- Dependabot: Automated dependency updates
- Dependency Review: PR checks for vulnerable dependencies
- No hardcoded secrets: All sensitive data via environment variables
- Input validation: All external inputs are validated
- Safe deserialization:
torch.loadusesweights_only=Truewhere possible - CORS protection: Configurable origin restrictions
- HTTPS recommended: For production deployments
- Environment isolation: Test mode available via
AETHER_TEST_MODE - Audit logging: All governance decisions are logged with audit IDs
PyTorch model checkpoints (.pt files) can contain arbitrary code. Only load checkpoints from trusted sources. The training scripts in this repository generate safe checkpoints.
The MCP server is designed to run locally. If exposed to a network:
- Use a reverse proxy with authentication
- Enable HTTPS
- Restrict CORS origins
Process mining event logs may contain PII. The system does not automatically anonymize data. Users are responsible for:
- Anonymizing event logs before processing
- Complying with data protection regulations (GDPR, CCPA, etc.)
- Keep dependencies updated: Run
npm auditandpip auditregularly - Use environment variables: Never hardcode API keys or secrets
- Review model sources: Only use checkpoints from trusted sources
- Anonymize data: Remove PII from event logs before processing
- Network security: Don't expose the inference server to public networks
Security updates are released as patch versions (e.g., 3.0.1) and announced via:
- GitHub Security Advisories
- Release notes
- README updates
This project follows:
- OWASP Top 10 guidelines
- CWE/SANS Top 25 awareness
- Secure coding practices for Python and TypeScript