At Enosis Labs, Inc., security is a top priority. We take the security of Rainy Aether and our users seriously. This document outlines our security practices, how to report vulnerabilities, and what you can expect from us.
We actively maintain and provide security updates for the following versions:
| Version | Supported | Status |
|---|---|---|
| 0.1.x | β | Active development, security patches |
| < 0.1.0 | β | No longer supported |
Note: Once v1.0 is released, we will provide security updates for the latest stable version and the previous major version for 6 months after a new major release.
If you discover a security vulnerability in Rainy Aether, please do not open a public issue. We request that you report it privately so we can address it before public disclosure.
π§ Email: security@enosislabs.com
Please provide as much information as possible to help us understand and reproduce the issue:
- Type of vulnerability (e.g., code injection, privilege escalation, information disclosure)
- Affected component (e.g., terminal manager, file system API, Git integration)
- Affected versions (e.g., v0.1.0, commit hash if from main branch)
- Steps to reproduce the vulnerability
- Proof of concept or exploit code (if available)
- Potential impact of the vulnerability
- Any suggested fixes or mitigations
-
Acknowledgment: We will acknowledge receipt of your report within 48 hours.
-
Initial Assessment: We will provide an initial assessment within 5 business days, including:
- Confirmation of the vulnerability
- Severity classification (Critical, High, Medium, Low)
- Estimated timeline for a fix
-
Resolution: Depending on severity:
- Critical: Patch within 7 days
- High: Patch within 14 days
- Medium: Patch within 30 days
- Low: Addressed in next regular release
-
Disclosure: Once a fix is available:
- We will notify you before public disclosure
- We will credit you in the security advisory (unless you prefer to remain anonymous)
- We will publish a security advisory on GitHub
At this time, we do not have a formal bug bounty program. However, we deeply appreciate security researchers' efforts and will:
- Publicly acknowledge your contribution (if desired)
- Provide swag or small tokens of appreciation for significant findings
- Consider formal bug bounty program as the project matures
-
Download from Official Sources
- Only download Rainy Aether from:
- Official GitHub releases: https://github.com/enosislabs/rainy-aether/releases
- Official website: https://enosislabs.com/rainy-aether (coming soon)
- Verify release signatures (available for v0.2.0+)
- Only download Rainy Aether from:
-
Keep Updated
- Enable automatic update checks (default)
- Review release notes for security fixes
- Update to the latest version promptly
-
API Keys and Secrets
- Never commit API keys to version control
- Use
.envfiles (excluded from Git by default) - Rainy Aether stores API keys encrypted in OS keychain
-
Extension Security
- Only install extensions from trusted sources
- Review extension permissions before installation
- Report suspicious extensions to security@enosislabs.com
-
Workspace Trust (coming soon)
- Review workspace settings before opening untrusted projects
- Be cautious with workspace-level scripts and automation
Rainy Aether uses Tauri 2.0, which provides security advantages over Electron:
- β Smaller Attack Surface: Uses system WebView instead of bundling Chromium
- β Privilege Separation: Rust backend isolated from frontend
- β Explicit IPC: All frontend-backend communication explicitly defined
- β Sandboxing: Commands execute with limited privileges
We follow the principle of least privilege:
- File system access is restricted to user-selected directories
- Terminal commands run in sandboxed environment (planned for v0.3.0)
- Network access is limited to necessary APIs
- See
src-tauri/capabilities/default.jsonfor full permission list
The following features are still being hardened:
β οΈ Extension System (v0.3.0): Not yet available, security model in designβ οΈ AI Provider Integration (v0.4.0): API key encryption in progressβ οΈ Remote Development (future): Not yet implemented
- β Encrypted Storage: API keys stored using OS keychain (Tauri store plugin)
- β Input Validation: All Rust commands validate inputs before file operations
- β Path Sanitization: Prevents directory traversal attacks
- β
Git Integration: Uses native
git2crate (no shell command injection) - β No Telemetry by Default: Opt-in only, full transparency
- π Sandboxed Command Execution (v0.3.0): Isolate terminal commands
- π Extension Permissions (v0.3.0): Granular permission system
- π Code Signing (v0.2.0): Signed releases for verification
- π Automatic Updates (v0.2.0): Secure update mechanism
- π Workspace Trust (v0.4.0): Protect against malicious workspaces
- π Content Security Policy (v0.3.0): Harden WebView
We practice coordinated disclosure:
- Private Notification: Reporter notifies us privately
- Fix Development: We develop and test a fix
- Pre-Disclosure: We notify reporter before public release
- Public Disclosure: We publish advisory with credit to reporter
- Release: Patched version released
- Critical vulnerabilities: 7-14 days from report to public disclosure
- High vulnerabilities: 14-30 days
- Medium/Low vulnerabilities: 30-90 days
We may request additional time for complex issues. Conversely, if a vulnerability is being actively exploited, we may accelerate the timeline.
π§ Security Team: security@enosislabs.com
If you cannot reach the security team or need to escalate:
π§ Executive Contact: cto@enosislabs.com
For sensitive reports, you may encrypt your message with our PGP key (coming soon).
Published security advisories can be found at:
- GitHub Security Advisories: https://github.com/enosislabs/rainy-aether/security/advisories
- Official Website: https://enosislabs.com/rainy-aether/security (coming soon)
We welcome security audits from the community:
- Source code is fully open for review
- Report findings via security@enosislabs.com
- We will credit audit contributors publicly
As the project matures, we plan to:
- Conduct formal third-party security audits (v1.0+)
- Publish audit reports publicly
- Address findings transparently
We take dependency security seriously:
- Frontend:
pnpm auditrun regularly, vulnerabilities addressed promptly - Backend:
cargo auditrun regularly, Rust dependencies kept up-to-date - Automated Scanning: Dependabot enabled for automated security updates
- All dependencies reviewed before inclusion
- Prefer well-maintained, widely-used libraries
- Monitor dependency health and maintenance status
- Plan to implement lock file verification (v0.3.0+)
We aim to align with industry security standards:
- OWASP Top 10: Mitigate common web application vulnerabilities
- CWE Top 25: Address most dangerous software weaknesses
- NIST Cybersecurity Framework: Follow best practices (future)
- SOC 2 (future): For enterprise customers
The following are within scope for security reports:
- β Rainy Aether application (frontend and backend)
- β Official extensions and plugins
- β Build and release processes
- β Official documentation and website (when launched)
The following are generally out of scope:
- β Vulnerabilities in third-party dependencies (report to upstream)
- β Social engineering attacks
- β Denial of service attacks against local application
- β Issues requiring physical access to user's machine
- β User error or misconfiguration (unless design flaw)
However, if you're unsure, please report itβwe'd rather hear about it!
We believe in recognizing security researchers who help keep Rainy Aether secure:
Security contributors will be recognized in our Security Hall of Fame (coming soon):
- Name/username (or anonymous if preferred)
- Brief description of vulnerability found
- Month/year of discovery
- Security advisories will credit the reporter (unless anonymous)
- Major findings may be recognized in release notes
- We may provide swag or other small tokens of appreciation
If you have questions about this security policy, please contact:
Thank you for helping keep Rainy Aether and our users safe! πβ¨
Maintained by Enosis Labs, Inc.
Version: 1.0 Last Updated: November 3, 2025