| Version | Supported |
|---|---|
| 1.x | ✅ |
| < 1.x | ❌ |
Thank you for helping keep OpenAuditLabs/Web secure. If you discover a security vulnerability, please handle responsibly by following the steps below:
- Do NOT create a public issue to avoid disclosure to the general public.
- Please report vulnerabilities privately by emailing the security team at:
security@openauditlabs.org
Include the following information in your report:
- Description of the vulnerability and its impact.
- Step-by-step instructions to reproduce the issue.
- Any relevant proof-of-concept code or screenshots.
- Your contact information for follow-up (email or other).
We commit to acknowledging your report within 48 hours and providing regular updates throughout the resolution process.
The following are considered in-scope for security reports on this repository:
- Application vulnerabilities, including but not limited to:
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Server-Side Request Forgery (SSRF)
- Authentication and Authorization flaws
- Data leakage or improper data exposure
- Injection vulnerabilities (SQL, NoSQL, etc.)
- Dependency vulnerabilities, including insecure or outdated third-party packages.
- Configuration issues, such as misconfigured CORS, CSP, or HTTP headers.
- Vulnerabilities in third-party dependencies should be reported upstream to their maintainers.
- General web security issues unrelated to OpenAuditLabs/Web’s codebase.
- Social engineering, phishing, or physical attacks.
OpenAuditLabs/Web follows best practices for web and Next.js application security, including:
- Content Security Policy (CSP): Strict CSP headers to prevent XSS.
- Secure HTTP Headers: HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy.
- Authentication & Authorization: Strong session management and role-based access control.
- Data Protection: Sensitive information is never logged; data in transit is encrypted with HTTPS.
- Dependency Management: Automated dependency audits via pnpm and CI pipelines.
- Error Handling: Safe error messages that don’t leak sensitive info.
- Secure Coding Practices: Use of TypeScript for type safety and minimized runtime errors.
Upon receiving a valid report:
- We will acknowledge receipt within 48 hours.
- Assign a security lead to verify and triage the issue.
- Provide an estimated timeline for remediation.
- Communicate updates regularly until resolution.
- Coordinate with the reporter on the disclosure timeline (responsible disclosure).
- Release patches or updates as needed.
- Publicly acknowledge the reporter (optional, based on consent).
OpenAuditLabs encourages responsible security research and will not take legal action against researchers acting in good faith according to this policy.
We thank the security research community for their contributions to making OpenAuditLabs Agent more secure. Responsible disclosure helps protect our users and the broader smart contract ecosystem.
Contributors who have responsibly disclosed vulnerabilities will be listed here with their permission.
Note: This security policy is reviewed and updated regularly. Please check back for the latest version. Last updated: July 2025.
This document is licensed under the same terms as the OpenAuditLabs/agent repository.