ProcessAce is currently in early development. Until a first stable release (e.g. v1.0.0) is tagged, security support is best effort on the main branch.
Once stable releases are available, this section will list which versions receive security fixes.
If you believe you have found a security vulnerability in ProcessAce, please do not open a public issue.
Instead, email:
- Security contact: security@processace.com
- Subject:
ProcessAce Security Report
Please include, when possible:
- A description of the issue and its potential impact.
- Steps to reproduce the vulnerability.
- Any relevant logs, configuration details, or environment information.
- Whether the issue is already known or exploitable in the wild (if you know).
We aim to:
- Acknowledge receipt of your report as quickly as reasonably possible.
- Investigate and validate the issue.
- Work on a fix and a coordinated disclosure plan.
We kindly ask that you:
- Give us a reasonable amount of time to investigate and fix the issue before public disclosure.
- Avoid testing against production instances you do not own or control.
- Do not access, modify, or destroy data that does not belong to you.
We will:
- Treat your report seriously and in good faith.
- Strive to credit you (if you wish) in release notes or advisories once the issue is resolved.
Because ProcessAce is a self-hosted and BYO-LLM tool, you are responsible for securing your own deployments. We strongly recommend:
- Running ProcessAce behind proper authentication and HTTPS.
- Using the bundled TLS overlay (
docker-compose.tls.yml) or an equivalent reverse proxy so only80/443are publicly exposed. - Limiting network exposure (e.g. via firewalls, VPN, reverse proxies).
- Restricting access to admin interfaces and configuration.
- Assigning the first bootstrap account carefully, since it becomes the initial
superadmin. - Using
superadminonly for privileged controls such as role delegation and full-instance reset. - Setting strong deployment secrets for
JWT_SECRET,ENCRYPTION_KEY,SQLITE_ENCRYPTION_KEY, andREDIS_PASSWORD. - Restricting browser access with an explicit
CORS_ALLOWED_ORIGINSvalue. - Ensuring Docker bind mounts such as
data/anduploads/are writable by the unprivileged container user. - Planning a one-time SQLCipher migration before upgrading any existing plaintext production database file.
- Rebuilding the Docker image after encrypted-database dependency changes so the native module is compiled for the container runtime.
- Installing the native Node.js build prerequisites first when deploying without Docker if your platform does not have a prebuilt binary for the encrypted SQLite module.
- Keeping dependencies and the base OS up to date.
- Treating LLM credentials and other API keys as secrets.
- Reviewing the checked-in compliance procedures under
docs/compliance/and adapting them to your organization before handling regulated data. - Communicating to users that self-service account deactivation preserves organizational workspaces and that full-instance deletion is a superadmin-only operation.
Additional hardening guides and configuration examples will be added to the documentation as the project matures.