If you discover a security vulnerability in DreamNet, please DO NOT open a public GitHub issue.
Instead, email: security@dreamnet.ink
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fix
Response Time: We will respond within 24 hours.
β
All containers use non-root users
β
Read-only filesystems enabled
β
No CAP_SYS_ADMIN capabilities
β
Network policies enforced
β
Resource limits configured
β
Dependabot enabled (automated updates)
β
npm audit run on every build
β
Supply chain verification (package signatures)
β
Vulnerability scanning (Snyk integration)
β
No secrets committed (enforced via pre-commit hooks)
β
Environment variables for sensitive data
β
Encrypted at rest (for production)
β
Secret scanning enabled (GitHub Advanced Security)
β
NATS cluster TLS (optional, can be enabled)
β
Redis authentication (optional, can be enabled)
β
etcd cluster security (consensus protection)
β
Docker socket proxy (for remote daemon access)
β
API key validation on every request
β
RBAC for agents (role-based access control)
β
Talon security gates (policy enforcement)
β
Audit logging (all actions logged)
# Manual scanning
pnpm audit
# Container scanning
docker scout cves <image>
# SBOM generation
syft <image> > sbom.spdx.jsonAs of February 18, 2026:
Status: β ALL CRITICAL VULNERABILITIES PATCHED
- β CVE-2025-15467 (OpenSSL 3.5.4): PATCHED
- β 47 HIGH vulnerabilities: PATCHED
- β 6 MEDIUM vulnerabilities: MITIGATED (not applicable)
- β 2 LOW vulnerabilities: ACKNOWLEDGED (acceptable risk)
See POST_LAUNCH_SECURITY_PATCH.md for details.
- Threat: Malicious actor compromises an agent
- Defense:
- Health monitoring detects anomalies
- Compromised agent auto-quarantined
- Other agents continue operating
- Threat: Malicious code in dependencies
- Defense:
- Container scanning (Trivy, Grype)
- Image verification (cosign signatures)
- Dependency pinning (lock files)
- Threat: Attacker exploits bridge vulnerability
- Defense:
- Multi-sig validation on bridge transactions
- Rate limiting on cross-chain transfers
- Bridge liquidity monitoring
- Threat: Attacker inflates agent performance metrics
- Defense:
- Cryptographic validation of all metrics
- Distributed validation (multiple agents verify)
- Historical trend analysis (outlier detection)
- Threat: Attacker breaks out of container sandbox
- Defense:
- Read-only filesystem
- No privileged capabilities
- Resource limits enforced
- AppArmor/SELinux policies (production)
# β
DO: Use environment variables for secrets
export OPENAI_API_KEY="sk-..."
pnpm dev
# β DON'T: Commit secrets to git
git add .env # DON'T DO THIS!
# β
DO: Use .env files with .gitignore
echo ".env" >> .gitignore
cp .env.example .env# β
DO: Enable all security features
# In docker-compose.yml:
read_only: true # Read-only filesystem
cap_drop:
- ALL # Drop all capabilities
cap_add:
- NET_BIND_SERVICE # Add back only what's needed
security_opt:
- no-new-privileges # No privilege escalation
# β
DO: Rotate API keys regularly
# Generate new keys monthly and revoke old ones
# β
DO: Monitor logs
docker logs dreamnet_<service> | grep -i "error\|warning"
# β
DO: Keep images updated
docker pull <image>:latest
docker-compose up# β
DO: Use private network for NATS/Redis
# (Already configured in docker-compose.yml)
# β DON'T: Expose Redis/NATS to public internet
# In production, use:
# - VPN to access
# - Bastion host
# - Firewall rules-
Isolate: Stop the affected container
docker-compose stop <service>
-
Preserve: Don't delete anything (needed for investigation)
docker logs <container> > /tmp/logs.txt docker cp <container>:/app /tmp/app_copy
-
Report: Email security@dreamnet.ink with:
- Container affected
- When you noticed it
- What behavior was unusual
- Attached logs/data
-
Rebuild: Once we advise, rebuild from latest image
docker-compose pull docker-compose up
- β Container hardening
- β Vulnerability scanning
- β Secret management
- β³ Zero-trust networking
- β³ Encryption at rest
- β³ Audit logging enhancement
- β³ Penetration testing
- β³ Formal threat model
- β³ Security certification
- β³ Bug bounty program
- β³ Third-party security audit
- β³ Compliance certifications (SOC 2, ISO 27001)
When security updates are available:
- GitHub Security Advisories: Automatic notification
- Dependabot alerts: Pull requests created automatically
- Email: Announcements sent to watchers (opt-in)
# Check for updates
pnpm audit
# Update dependencies
pnpm update
# Update Docker images
docker-compose pull
docker-compose up -d
# Rebuild containers
docker-compose up -d --build- β OWASP Top 10 (application security)
- β CIS Docker Benchmark (container security)
- β NIST Cybersecurity Framework (general security)
- β SANS Top 25 (critical vulnerabilities)
DreamNet integrates with:
- GitHub Advanced Security: Code scanning, secret scanning
- Dependabot: Automated dependency updates
- Snyk: Vulnerability scanning
- Docker Scout: Container vulnerability scanning
- Security Issues: security@dreamnet.ink
- General Questions: contact@dreamnet.ink
- GitHub Issues: Bug reports (public)
Last Updated: February 18, 2026
Next Review: August 18, 2026