The following versions of this project are actively supported for security updates:
Version | Supported |
---|---|
1.x | ✅ Yes |
Older versions are no longer supported. Users are encouraged to update to the latest version for the best security and functionality.
If you discover a security vulnerability in this project, please follow these steps:
-
Do not open a public issue. Security vulnerabilities should not be disclosed publicly until they are reviewed and patched.
-
Contact the maintainers via [email protected] with a detailed description of the vulnerability, including:
- Steps to reproduce the issue.
- Potential impact.
- Any suggested fixes or patches, if applicable.
We aim to respond to security issues within 48 hours and provide a mitigation plan within 7 days.
This project depends on several third-party libraries. We monitor their security updates regularly. Here are some key dependencies and how we address their vulnerabilities:
-
Direct Dependencies:
github.com/gin-gonic/gin
github.com/google/generative-ai-go
google.golang.org/api
github.com/gin-gonic/gin
github.com/golang-jwt/jwt/v4
Mitigation:
- Dependencies are updated frequently to their latest stable versions.
- Vulnerabilities in these libraries are addressed by applying patches or upgrading as soon as fixes are available.
-
Indirect Dependencies:
- Libraries such as
cloud.google.com/go
,google.golang.org/protobuf
,github.com/bytedance/sonic
,golang.org/x/crypto
, andgo.opentelemetry.io
are monitored using automated tooling.
Mitigation:
- Indirect dependencies are audited using tool GoSec.
- Libraries such as
-
Environment Variables and Secrets Management:
- Ensure sensitive information (e.g., API keys, tokens) is stored securely using environment variables.
- Do not commit
.env
files or sensitive data into the repository.
-
Audit Code for Common Vulnerabilities:
- Regularly use tools like
gosec
orstaticcheck
to scan for vulnerabilities in the codebase. - Run dependency checks using tools like
go list -m all
and validate against known vulnerability databases (e.g., CVE).
- Regularly use tools like
-
Runtime Security:
- Run the application in a secured environment with limited access and permissions.
- Use containerization tools like Docker with appropriate security configurations.
If you have questions or concerns regarding security in this project, please reach out to the maintainers at [email protected].