| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in Ajen, please report it responsibly.
Do not open a public GitHub issue for security vulnerabilities.
Instead, please email: security@ajen.dev
Include the following in your report:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix and disclosure: Coordinated with the reporter
Security concerns relevant to this project include:
- API key exposure — Leaking LLM provider credentials
- Prompt injection — Malicious input that manipulates AI employee behavior
- File system access — Tools reading/writing outside intended directories
- WebSocket hijacking — Unauthorized access to company event streams
- Dependency vulnerabilities — Known CVEs in Rust or npm dependencies
- Never commit API keys, secrets, or credentials
- Validate and sanitize all user inputs
- Use the
.envfile for sensitive configuration (never hardcode) - Run
cargo auditperiodically to check for dependency vulnerabilities