We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| main | ✅ |
| contract-guardian | ✅ |
| < 1.0 | ❌ |
We take the security of Cerno Docs seriously. If you discover a security vulnerability, please follow these steps:
DO NOT open a public issue for security vulnerabilities.
Instead, please report security issues by:
- Email: Send details to the repository owner (check GitHub profile)
- GitHub Security: Use GitHub's private vulnerability reporting feature
Please provide:
- Type of vulnerability
- Full path to the source file(s) related to the vulnerability
- Location of the affected code (tag/branch/commit/direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if available)
- Impact of the vulnerability
- Suggested fix (if you have one)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Varies by severity
- Critical: Within 7 days
- High: Within 30 days
- Medium: Within 90 days
- Low: Next release
We appreciate responsible disclosure. If you'd like:
- We can credit you in the release notes (with your permission)
- We'll acknowledge your contribution in SECURITY.md
- Never commit
.envfiles with real API keys - Use environment variables or secret management services
- Rotate keys regularly
- Use separate keys for development and production
- Always use HTTPS in production
- Keep dependencies updated:
pip install -r requirements.txt --upgrade - Use firewall rules to restrict access
- Monitor logs for suspicious activity
- Don't run containers as root (use non-root user)
- Scan images for vulnerabilities:
docker scan cerno-docs - Use specific image versions, not
latest - Keep Docker and base images updated
- This system processes documents locally by default
- Be aware that LLM API calls send data to external services (Google Gemini)
- For sensitive documents, consider:
- Self-hosted LLM alternatives
- On-premises deployment
- Data anonymization before processing
- User queries and document chunks are sent to Google Gemini API
- Responses may be logged by the LLM provider
- Consider data residency and compliance requirements
- File size limits enforced (configurable)
- File type validation implemented
- Malicious file scanning recommended for production
- Regular updates recommended
- Run
pip auditto check for known vulnerabilities - Monitor GitHub Security Advisories
Security patches will be:
- Released as soon as possible after confirmation
- Documented in release notes
- Announced in repository README
- Tagged with
securitylabel
For general security questions (not vulnerabilities), please open a regular GitHub issue with the question label.
Thank you for helping keep Cerno Docs secure! 🔐