| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability, please report it responsibly.
- Do NOT open a public issue for security vulnerabilities
- Use GitHub Security Advisories to report privately
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability and determine severity
- Timeline: We aim to address critical vulnerabilities within 7 days
- Disclosure: We will coordinate disclosure timing with you
The following are in scope for security reports:
- FGP daemon implementations
- Protocol vulnerabilities
- Authentication/authorization issues
- Data exposure risks
- Socket permission issues
- Issues in dependencies (report to upstream maintainers)
- Social engineering attacks
- Physical security issues
- Issues requiring unlikely user interaction
When using FGP daemons:
- Socket Permissions: FGP uses UNIX sockets with file-based permissions. Ensure socket directories have appropriate permissions (700)
- API Keys: Store API keys in environment variables, not in code
- Updates: Keep daemons updated to the latest versions
- Isolation: Run daemons with minimal required permissions
FGP daemons are designed with security in mind:
- Local-only: UNIX sockets prevent network exposure
- No auth by default: Relies on file system permissions
- Process isolation: Each daemon runs independently
- No persistent storage: Sensitive data not persisted to disk
Thank you for helping keep FGP secure.