Skip to content

Security: BrandonDucar/dream-net

Security

SECURITY.md

πŸ” Security Policy

Vulnerability Disclosure

If you discover a security vulnerability in DreamNet, please DO NOT open a public GitHub issue.

Instead, email: security@dreamnet.ink

Include:

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact
  • Any suggested fix

Response Time: We will respond within 24 hours.


Security Practices

Container Security

βœ… All containers use non-root users
βœ… Read-only filesystems enabled
βœ… No CAP_SYS_ADMIN capabilities
βœ… Network policies enforced
βœ… Resource limits configured

Dependency Security

βœ… Dependabot enabled (automated updates)
βœ… npm audit run on every build
βœ… Supply chain verification (package signatures)
βœ… Vulnerability scanning (Snyk integration)

Secrets Management

βœ… No secrets committed (enforced via pre-commit hooks)
βœ… Environment variables for sensitive data
βœ… Encrypted at rest (for production)
βœ… Secret scanning enabled (GitHub Advanced Security)

Network Security

βœ… NATS cluster TLS (optional, can be enabled)
βœ… Redis authentication (optional, can be enabled)
βœ… etcd cluster security (consensus protection)
βœ… Docker socket proxy (for remote daemon access)

Access Control

βœ… API key validation on every request
βœ… RBAC for agents (role-based access control)
βœ… Talon security gates (policy enforcement)
βœ… Audit logging (all actions logged)


Vulnerability Scanning

Automated Scanning

# Manual scanning
pnpm audit

# Container scanning
docker scout cves <image>

# SBOM generation
syft <image> > sbom.spdx.json

Known Vulnerabilities

As of February 18, 2026:

Status: βœ… ALL CRITICAL VULNERABILITIES PATCHED

  • βœ… CVE-2025-15467 (OpenSSL 3.5.4): PATCHED
  • βœ… 47 HIGH vulnerabilities: PATCHED
  • βœ… 6 MEDIUM vulnerabilities: MITIGATED (not applicable)
  • βœ… 2 LOW vulnerabilities: ACKNOWLEDGED (acceptable risk)

See POST_LAUNCH_SECURITY_PATCH.md for details.


Threat Model

Protected Against

1. Agent Compromise

  • Threat: Malicious actor compromises an agent
  • Defense:
    • Health monitoring detects anomalies
    • Compromised agent auto-quarantined
    • Other agents continue operating

2. Supply Chain Attack

  • Threat: Malicious code in dependencies
  • Defense:
    • Container scanning (Trivy, Grype)
    • Image verification (cosign signatures)
    • Dependency pinning (lock files)

3. Cross-Chain Attack

  • Threat: Attacker exploits bridge vulnerability
  • Defense:
    • Multi-sig validation on bridge transactions
    • Rate limiting on cross-chain transfers
    • Bridge liquidity monitoring

4. Reward Manipulation

  • Threat: Attacker inflates agent performance metrics
  • Defense:
    • Cryptographic validation of all metrics
    • Distributed validation (multiple agents verify)
    • Historical trend analysis (outlier detection)

5. Container Escape

  • Threat: Attacker breaks out of container sandbox
  • Defense:
    • Read-only filesystem
    • No privileged capabilities
    • Resource limits enforced
    • AppArmor/SELinux policies (production)

Not Protected Against

⚠️ Physical attacks on infrastructure
⚠️ Insider threats (trusted employees)
⚠️ Zero-day vulnerabilities (unknown exploits)
⚠️ Compromise of the host OS (requires rebuilding)


Best Practices for Users

Development

# βœ… DO: Use environment variables for secrets
export OPENAI_API_KEY="sk-..."
pnpm dev

# ❌ DON'T: Commit secrets to git
git add .env  # DON'T DO THIS!

# βœ… DO: Use .env files with .gitignore
echo ".env" >> .gitignore
cp .env.example .env

Production

# βœ… DO: Enable all security features
# In docker-compose.yml:
read_only: true                    # Read-only filesystem
cap_drop:
  - ALL                            # Drop all capabilities
cap_add:
  - NET_BIND_SERVICE               # Add back only what's needed
security_opt:
  - no-new-privileges              # No privilege escalation

# βœ… DO: Rotate API keys regularly
# Generate new keys monthly and revoke old ones

# βœ… DO: Monitor logs
docker logs dreamnet_<service> | grep -i "error\|warning"

# βœ… DO: Keep images updated
docker pull <image>:latest
docker-compose up

Network

# βœ… DO: Use private network for NATS/Redis
# (Already configured in docker-compose.yml)

# ❌ DON'T: Expose Redis/NATS to public internet
# In production, use:
# - VPN to access
# - Bastion host
# - Firewall rules

Incident Response

If You Suspect a Compromise

  1. Isolate: Stop the affected container

    docker-compose stop <service>
  2. Preserve: Don't delete anything (needed for investigation)

    docker logs <container> > /tmp/logs.txt
    docker cp <container>:/app /tmp/app_copy
  3. Report: Email security@dreamnet.ink with:

    • Container affected
    • When you noticed it
    • What behavior was unusual
    • Attached logs/data
  4. Rebuild: Once we advise, rebuild from latest image

    docker-compose pull
    docker-compose up

Security Roadmap

Q1 2026

  • βœ… Container hardening
  • βœ… Vulnerability scanning
  • βœ… Secret management

Q2 2026

  • ⏳ Zero-trust networking
  • ⏳ Encryption at rest
  • ⏳ Audit logging enhancement

Q3 2026

  • ⏳ Penetration testing
  • ⏳ Formal threat model
  • ⏳ Security certification

Q4 2026

  • ⏳ Bug bounty program
  • ⏳ Third-party security audit
  • ⏳ Compliance certifications (SOC 2, ISO 27001)

Security Updates

Notification

When security updates are available:

  1. GitHub Security Advisories: Automatic notification
  2. Dependabot alerts: Pull requests created automatically
  3. Email: Announcements sent to watchers (opt-in)

Applying Updates

# Check for updates
pnpm audit

# Update dependencies
pnpm update

# Update Docker images
docker-compose pull
docker-compose up -d

# Rebuild containers
docker-compose up -d --build

Compliance

Standards Followed

  • βœ… OWASP Top 10 (application security)
  • βœ… CIS Docker Benchmark (container security)
  • βœ… NIST Cybersecurity Framework (general security)
  • βœ… SANS Top 25 (critical vulnerabilities)

Third-Party Security

DreamNet integrates with:

  • GitHub Advanced Security: Code scanning, secret scanning
  • Dependabot: Automated dependency updates
  • Snyk: Vulnerability scanning
  • Docker Scout: Container vulnerability scanning

Contact


Last Updated: February 18, 2026
Next Review: August 18, 2026

There aren’t any published security advisories