We release security updates for the following versions:
| Version | Supported |
|---|---|
| 0.4.x | ✅ |
| < 0.4 | ❌ |
We take the security of HED-BOT seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
-
GitHub Security Advisories (Preferred)
- Go to the repository's Security tab
- Click "Report a vulnerability"
- Fill out the form with details
-
Email (Alternative)
- Send an email to the repository maintainers
- Include "SECURITY" in the subject line
- Provide detailed information about the vulnerability
Please include the following information in your report:
- Type of vulnerability (e.g., XSS, SQL injection, authentication bypass)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Initial Response: Within 48 hours of report submission
- Vulnerability Confirmation: Within 7 days of report
- Fix Timeline: Depends on severity
- Critical: Within 7 days
- High: Within 14 days
- Medium: Within 30 days
- Low: Next scheduled release
- Security issues will be publicly disclosed only after a fix has been released
- We will credit reporters who responsibly disclose vulnerabilities (unless they prefer to remain anonymous)
- We follow coordinated vulnerability disclosure principles
HED-BOT implements the following security measures:
- API key authentication for all protected endpoints
- Multiple API key support for key rotation
- Optional authentication bypass for development
- Complete request/response audit trail
- IP address logging
- API key usage tracking
- 90-day log retention
- Strict origin validation
- Whitelist-based origin control
- Support for development environments
Strict-Transport-Security(HSTS)X-Content-Type-Options: nosniffX-Frame-Options: DENYX-XSS-Protection: 1; mode=block
- Pydantic model validation for all inputs
- Schema-based validation
- Request size limits
- Per-IP rate limiting (configurable)
- Burst protection
- 429 status code for rate limit exceeded
- Environment variable-based configuration
- No secrets in Git repository
- .env files in .gitignore
- Secrets scanning enabled
- Dependabot automated updates
- CodeQL security scanning
- Regular dependency audits
When deploying HED-BOT:
- Always use HTTPS in production
- Enable API key authentication (
REQUIRE_API_AUTH=true) - Enable audit logging (
ENABLE_AUDIT_LOG=true) - Restrict CORS origins to only your frontend domain
- Set file permissions on .env files (
chmod 600 .env) - Rotate API keys quarterly or after any suspected compromise
- Monitor audit logs for suspicious activity
- Keep dependencies updated (Dependabot will help)
- Use rate limiting to prevent abuse
- Review security headers in Nginx/reverse proxy
See deploy/SECURITY.md for complete security documentation.
- OpenRouter API keys are stored as environment variables
- Keys are passed to OpenRouter API via HTTPS
- Keys are not logged in audit logs
- Rotate keys if compromised
- Worker authenticates to backend with API key
- API key stored as Cloudflare Worker secret
- Not visible in frontend JavaScript
- Recommended for production deployments
- Ollama runs locally (no API key needed)
- No external API calls for LLM inference
- Complete privacy for offline operation
- Ensure GPU drivers are up to date
This repository uses:
- Dependabot: Automated dependency updates
- CodeQL: Static code analysis for security issues
- Secret Scanning: Detects accidentally committed secrets
- Dependency Review: Reviews dependency changes in PRs
HED-BOT is designed to comply with:
- OWASP Top 10 (2021): See
deploy/SECURITY.mdfor compliance mapping - Security Audit Requirements: Complete audit logging and access controls
- API Security Best Practices: Authentication, rate limiting, CORS
For security-related questions or concerns:
- Security Issues: Use GitHub Security Advisories
- General Questions: Open a GitHub issue with
securitylabel - Private Concerns: Contact repository maintainers directly
Last Updated: December 2, 2025