Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 15 additions & 1 deletion .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -203,4 +203,18 @@ cython_debug/
mise.local.toml

# Supervisor output
/output
/output

# Secrets and credentials
*.key
*.p12
*.jks
credentials.*
secrets.*
*kubeconfig*

# IDE
.vscode/

# Ruff cache
.ruff_cache/
16 changes: 16 additions & 0 deletions CODEOWNERS
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
# Default owners for everything
* @kagenti/maintainers

# CI and platform tooling
.github/ @kagenti/platform
Makefile @kagenti/platform

# A2A agents
a2a/ @kagenti/agents

# MCP tools
mcp/ @kagenti/agents

# Documentation
docs/ @kagenti/maintainers
*.md @kagenti/maintainers
38 changes: 38 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
# Security Policy

## Reporting a Vulnerability

We take security vulnerabilities seriously. If you discover a security issue,
please report it responsibly.

### How to Report

1. **Do NOT create public GitHub issues** for security vulnerabilities
2. **Email**: Report vulnerabilities privately via GitHub Security Advisories
- Go to the [Security tab](../../security/advisories/new) and create a new advisory
3. **Include**: A clear description of the vulnerability, steps to reproduce,
and potential impact

### What to Expect

- We will acknowledge receipt within 48 hours
- We aim to provide an initial assessment within 7 days
- We will keep you informed of our progress
- We will credit you in the security advisory (if desired)

## Supported Versions

| Version | Supported |
|---------|--------------------|
| main | :white_check_mark: |

## Security Measures

This project implements several security controls:

- **CI/CD Security**: All workflows use explicit least-privilege permissions
- **Dependency Scanning**: Automated vulnerability scanning via Trivy and Dependabot
- **Secret Detection**: Pre-commit hooks with Gitleaks for secret scanning
- **Code Analysis**: CodeQL for static analysis
- **Container Security**: Hadolint for Dockerfile best practices
- **Supply Chain**: OpenSSF Scorecard monitoring and SHA-pinned GitHub Actions