We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
The NXTG-Forge team takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to:
[email protected] or [email protected]
Include the following information in your report:
- Type of vulnerability (e.g., SQL injection, XSS, authentication bypass)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability, including how an attacker might exploit it
After you submit a report, you should expect:
-
Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours.
-
Initial Assessment: We will send an initial assessment within 5 business days, including:
- Confirmation of the vulnerability
- Severity assessment (Critical, High, Medium, Low)
- Estimated timeline for a fix
-
Progress Updates: We will keep you informed about our progress at least every 7 days.
-
Resolution: Once the vulnerability is fixed:
- We will notify you before the public disclosure
- We will credit you in the security advisory (unless you prefer to remain anonymous)
- We will publish a security advisory on GitHub
- Coordinated Disclosure: We follow coordinated disclosure practices
- Embargo Period: Typically 90 days from initial report to public disclosure
- Early Disclosure: If the vulnerability is being actively exploited, we may disclose earlier
When using NXTG-Forge, follow these security best practices:
Never commit sensitive information to version control:
# .env - Never commit this file!
DATABASE_URL=postgresql://user:password@localhost:5432/dbname
SECRET_KEY=your-secret-key-here
JWT_SECRET=your-jwt-secret
STRIPE_API_KEY=sk_live_...Ensure .env is in your .gitignore:
# Environment variables
.env
.env.local
.env.*.localKeep dependencies up to date:
# Check for security vulnerabilities
pip-audit
npm audit
# Update dependencies
pip install --upgrade -r requirements.txt
npm updateWhen deploying with Docker:
# Don't run as root
USER appuser
# Use specific versions, not 'latest'
FROM python:3.11-slim
# Scan images for vulnerabilities
# docker scan nxtg-forge:latestWhen building APIs with NXTG-Forge:
- Authentication: Always implement proper authentication
- Rate Limiting: Prevent abuse with rate limiting
- Input Validation: Validate and sanitize all user inputs
- CORS: Configure CORS appropriately for your use case
- HTTPS: Always use HTTPS in production
- Parameterized Queries: Prevent SQL injection
- Least Privilege: Use database users with minimal required permissions
- Encryption: Encrypt sensitive data at rest
- Backups: Maintain secure, encrypted backups
Do not hardcode secrets in your code:
# ❌ BAD - Hardcoded secret
API_KEY = "sk_live_1234567890"
# ✅ GOOD - Load from environment
import os
API_KEY = os.getenv("API_KEY")
if not API_KEY:
raise ValueError("API_KEY environment variable not set")The MCP auto-detection feature scans project files to identify required services. Be aware:
- It reads configuration files (package.json, requirements.txt, etc.)
- It does not execute code or send data externally
- Review detected MCP servers before enabling them
Code templates may include placeholder secrets. Always:
- Review generated code before committing
- Replace all placeholder values with real secrets via environment variables
- Never commit files containing real credentials
The agent orchestration system:
- Does not store or transmit sensitive data
- Operates locally on your machine
- Uses Claude API only for AI assistance (standard Claude terms apply)
Subscribe to security updates:
- Watch this repository for security advisories
- Enable GitHub security alerts for your fork
- Follow @nxtg_ai on Twitter
We currently do not have a bug bounty program. However, we deeply appreciate security researchers who report vulnerabilities responsibly and will:
- Acknowledge your contribution publicly (with your permission)
- List you in our Hall of Fame
- Consider future bug bounty programs as the project grows
We thank the following security researchers for responsibly disclosing vulnerabilities:
No vulnerabilities reported yet - be the first!
For security-related questions or concerns:
- Email: [email protected]
- Alternative: [email protected]
- PGP Key: Available upon request
For general questions, use GitHub Discussions.
Thank you for helping keep NXTG-Forge and our community safe!