Protecting orchestr8 and Its Users
- Supported Versions
- Security Architecture
- Reporting Vulnerabilities
- Security Best Practices
- Automated Security
- Vulnerability Disclosure
- Security Champions
We actively maintain and provide security updates for the following versions:
| Version | Status | Security Updates | End of Life |
|---|---|---|---|
| 8.x.x | β Current | Active | TBD |
| 7.x.x | Critical only | 2026-01-01 | |
| < 7.0 | β Unsupported | None | 2025-01-10 |
Recommendation: Always use the latest version for best security posture.
orchestr8 implements defense-in-depth security with five layers of protection:
| Feature | Implementation | Protection |
|---|---|---|
| stdio Transport | All communication via stdin/stdout | No network attack surface |
| Process Isolation | Separate Node.js process | Sandboxed execution |
| No Remote Access | Local-only operation | Zero external exposure |
| Read-Only Resources | Resources loaded with read-only access | Immutable knowledge base |
Threat Mitigation: Remote code execution, network-based attacks, unauthorized access
| Component | Validation | Protection |
|---|---|---|
| Query Sanitization | All fuzzy match queries validated | Injection attack prevention |
| URI Validation | Static/dynamic URIs checked against patterns | Path traversal prevention |
| Parameter Validation | Workflow parameters sanitized pre-substitution | Command injection prevention |
| Token Budget Limits | Maximum token limits enforced | Resource exhaustion prevention |
Threat Mitigation: Code injection, path traversal, denial of service
| Practice | Tool | Frequency |
|---|---|---|
| Vulnerability Scanning | npm audit | Every PR + Daily |
| Dependency Updates | Dependabot | Daily |
| License Compliance | license-checker | Every PR |
| SBOM Generation | npm sbom | Every release |
| Pinned Versions | package-lock.json | Always |
Threat Mitigation: Supply chain attacks, vulnerable dependencies, license violations
| Practice | Implementation | Protection |
|---|---|---|
| Pinned GitHub Actions | All actions at commit SHAs | Immutable CI/CD pipeline |
| Secret Scanning | Gitleaks + TruffleHog | Credential leak prevention |
| Code Review | Required for all PRs | Malicious code detection |
| Signed Commits | Optional GPG signing | Author verification |
| Immutable Releases | GitHub releases + checksums | Tamper detection |
Threat Mitigation: Supply chain compromise, malicious code injection, unauthorized releases
| Feature | Tool | Purpose |
|---|---|---|
| Structured Logging | Winston | Forensic analysis |
| Error Tracking | Stack traces + context | Incident investigation |
| Cache Statistics | LRU metrics | Performance monitoring |
| Performance Metrics | Timing instrumentation | Anomaly detection |
Threat Mitigation: Undetected breaches, performance degradation, resource exhaustion
We take security seriously. Responsible disclosure helps us protect all users.
- β Open public GitHub issues for security vulnerabilities
- β Discuss vulnerabilities publicly before a fix is available
- β Exploit vulnerabilities beyond proof-of-concept
- β Report privately via approved channels (below)
- β Provide detailed reproduction steps
- β Allow time for coordinated disclosure
- β Follow responsible disclosure principles
Choose one of these private reporting methods:
Email: security@orchestr8.builders
Subject: [SECURITY] Brief description
PGP Key: Download public key (optional but recommended)
Use GitHub's private vulnerability reporting:
A great security report includes:
1. Summary
- Brief description of the vulnerability
- Type of vulnerability (e.g., XSS, RCE, path traversal)
2. Impact
- What an attacker can achieve
- Affected systems/components
- Severity assessment (Critical/High/Medium/Low)
3. Reproduction Steps
- Detailed, numbered steps to reproduce
- Environment details (OS, Node.js version, etc.)
- Sample payloads or proof-of-concept code
4. Affected Versions
- Which versions are vulnerable
- When the vulnerability was introduced (if known)
5. Suggested Fix (Optional)
- Your recommendations for remediation
- Patches or code samples (if available)
Example Template:
## Vulnerability: [Brief Description]
**Type**: Command Injection
**Severity**: High
**Affected Versions**: 8.0.0-rc1
### Impact
An attacker can execute arbitrary commands by crafting a malicious query...
### Steps to Reproduce
1. Install orchestr8 v8.0.0-rc1
2. Execute workflow with payload: `'; rm -rf / #`
3. Observe command execution...
### Suggested Fix
Sanitize all user input with...We are committed to rapid response:
| Stage | Timeline | Description |
|---|---|---|
| Acknowledgment | 24 hours | We confirm receipt of your report |
| Triage | 48 hours | We assess severity and impact |
| Investigation | 72 hours | We validate and reproduce the issue |
| Fix Development | Varies | Based on severity (see below) |
| Disclosure | After fix | Coordinated public disclosure |
| Severity | Timeline | Examples |
|---|---|---|
| Critical (CVSS 9.0-10.0) | 7 days | RCE, auth bypass, data breach |
| High (CVSS 7.0-8.9) | 14 days | XSS, CSRF, privilege escalation |
| Medium (CVSS 4.0-6.9) | 30 days | Information disclosure, DoS |
| Low (CVSS 0.1-3.9) | 60 days | Minor info leaks, config issues |
Note: Timelines may be extended for complex vulnerabilities requiring extensive testing.
We value security researchers and offer:
- β Public acknowledgment (with your permission)
- β CVE credit for valid vulnerabilities
- β Hall of Fame listing on our security page
- β Swag for significant findings (orchestr8 t-shirts, stickers)
# β
Verify source
git clone https://github.com/seth-schultz/orchestr8.git
cd orchestr8
# β
Check integrity (if downloading release)
sha256sum -c CHECKSUMS.txt
# β
Review code before production use
cat plugins/orchestr8/src/index.ts
# β
Use latest version
npm install # Installs latest stable# β
Never commit secrets
echo ".env" >> .gitignore
echo ".env.local" >> .gitignore
# β
Use environment variables
export ORCHESTR8_API_KEY="secret"
# β
Set proper file permissions
chmod 600 .env
chmod 700 plugins/orchestr8/config/
# β
Use production log level
export LOG_LEVEL="warn" # Not "debug"// β
Configure token limits
const config = {
maxTokens: 3000, // Prevent resource exhaustion
cacheSize: 200, // Limit memory usage
cacheTTL: 14400 // 4 hours
};
// β
Monitor logs
tail -f logs/orchestr8.log | grep ERROR
// β
Keep dependencies updated
npm audit
npm update# β
Run security checks locally
npm run lint
npm run type-check
npm audit
# β
Use pre-commit hooks
./scripts/install-git-hooks.sh
# β
Never commit sensitive data
git diff --cached # Review before commit
# β
Sign commits (optional)
git config --global commit.gpgsign true- Input validation on all user-provided data
- Output encoding to prevent XSS
- Parameterized queries to prevent injection
- Proper error handling (no stack traces to users)
- Authentication/authorization checks
- Rate limiting where applicable
- Secrets not hard-coded
- Dependencies up-to-date
We run continuous security scanning to catch issues early:
Tool: npm audit
Frequency: Every PR + Daily scheduled run
Threshold: Fail on HIGH/CRITICAL vulnerabilities
Action: Auto-create PR with fixes (Dependabot)Tool: CodeQL
Frequency: Every push to main + Weekly scheduled scan
Languages: TypeScript, JavaScript
Queries: security-extended, security-and-quality
Action: Create GitHub Security AlertTools: Gitleaks, TruffleHog
Frequency: Every commit (pre-commit hook) + Every PR
Patterns: API keys, passwords, tokens, private keys
Action: Fail build, prevent mergeTool: OpenSSF Scorecard
Frequency: Weekly
Checks: 24 security practices
Threshold: Maintain score β₯ 7.0/10
Action: Automated improvement PRsTool: license-checker
Frequency: Every PR
Allowed: MIT, Apache-2.0, BSD-3-Clause
Prohibited: GPL, AGPL, proprietary
Action: Fail build on non-compliant licensesWe maintain full transparency on security issues:
- Fix Developed - Vulnerability patched in private repository
- Release Prepared - New version created with fix
- Advisory Published - GitHub Security Advisory created
- CVE Assigned - CVE ID obtained from GitHub/MITRE
- Public Release - Fix published, advisory made public
- User Notification - Email to security mailing list
- Blog Post - Detailed post-mortem published
Active Advisories: View on GitHub
CVE Database: Search NIST NVD
All security fixes are documented in CHANGELOG.md with:
- π [SECURITY] tag
- CVE ID (if assigned)
- Severity level
- Affected versions
- Mitigation steps
| Role | Contact | Responsibilities |
|---|---|---|
| Security Lead | @seth-schultz | Vulnerability triage, disclosure coordination |
| Security Email | security@orchestr8.builders | Primary contact for vulnerability reports |
We welcome external security audits. If you're interested:
- Contact: security@orchestr8.builders with your proposal
- Access: We'll provide test environments and documentation
- Disclosure: Coordinated disclosure of findings
- Recognition: Public acknowledgment (with your permission)
- Security Scanning Results - View latest scans
- OpenSSF Scorecard - Supply chain security score
- Dependency Graph - View all dependencies
- Security Policy - This document
- Code of Conduct - Community standards
Questions about security?
π§ Email: security@orchestr8.builders π GitHub Security Advisories: Report Privately π Documentation: plugins/orchestr8/docs/
Last Updated: November 11, 2025 Version: 1.0.0