If you discover a security vulnerability in Aignostics Python SDK, please report it here.
We take all security reports seriously. Upon receiving a security report, we will:
- Confirm receipt of the vulnerability report
- Investigate the issue
- Work on a fix
- Release a security update
We currently provide security updates for the latest minor version.
Aignostics Python SDK employs several automated tools to continuously monitor and improve security:
a. GitHub Dependabot: Monitors dependencies for vulnerabilities pre and post release on GitHub. Dependendabot alerts published.
b. Renovate: Monitors dependencies for vulnerabilities pre and post release on GitHub. Dependency Dashboard published.
c. pip-audit: Pre commit to GitHub scans Python dependencies for known vulnerabilities using data from the Python Advisory Database. vulnerabilities.json
published per release.
d. trivy: Pre commit to GitHub scans Python dependencies for known vulnerabilities using data from GitHub Advisory Database and OSV.dev. sbom.spdx
published per release.
a. pip-licenses: Inspects and matches the licenses of all dependencies with allow list to ensure compliance with licensing requirements and avoid using components with problematic licenses. licenses.csv
, licenses.json
and licenses_grouped.json
published per release.
a. cyclonedx-py: Generates Software Bill of Materials (SBOM) in CycloneDX format, listing all components and dependencies used in the project. sbom.json
published per release.
d. trivy: Generates Software Bill of Materials (SBOM) in SPDX format, listing all components and dependencies used in the project. sbom.spdx
published per release.
a. GitHub CodeQL: Analyzes code for common vulnerabilities and coding errors using GitHub's semantic code analysis engine. Code scanning results published. b. SonarQube: Performs comprehensive static code analysis to detect code quality issues, security vulnerabilities, and bugs. Security hotspots published.
a. GitHub Secret scanning: Automatically scans for secrets in the codebase and alerts if any are found. Secret scanning alerts published. b. Yelp/detect-secrets: Pre-commit hook and automated scanning to prevent accidental inclusion of secrets or sensitive information in commits. Pre-Commit hook published.
We follow these security best practices:
- Regular dependency updates
- Comprehensive test coverage
- Code review process for changes by external contributors
- Automated CI/CD pipelines including security checks
- Adherence to Python security best practices
We promote security awareness among contributors and users:
- We indicate security as a priority in our code style guide, to be followed by human and agentic contributors as mandatory
- We publish our security posture in SECURITY.md (this document), encouraring users to report vulnerabilities.
For questions about security compliance or for more details about our security practices, please contact helmut@aignostics.com.