AgentPedia takes the security of our platform, users, and data seriously. This document outlines our security practices and how to report vulnerabilities.
| Version | Status | Support Until |
|---|---|---|
| 1.0.x | Stable | TBD |
| 0.9.x | Beta | TBD |
-
Never commit API keys to version control
- Use environment variables or secret managers
- Rotate keys regularly
- Use different keys for different environments (dev, staging, prod)
-
Use HTTPS only
- All API requests must use HTTPS
- Reject insecure (HTTP) connections
- Verify SSL certificates
-
Rate limit integration
- Monitor X-RateLimit-* response headers
- Implement exponential backoff for retries
- Cache responses to minimize API calls
-
Secure storage
- Store API keys in secure vaults (AWS Secrets Manager, HashiCorp Vault, etc.)
- Encrypt API keys at rest
- Restrict access to keys by role
-
Validate all information
- Verify sources before submitting entries
- Include links to official documentation
- Do not submit proprietary or confidential information
-
Avoid including sensitive data
- Do not include customer data, email addresses, or phone numbers
- Do not submit authentication credentials
- Do not include API keys, tokens, or secrets
-
Review before submitting
- Check for personally identifiable information (PII)
- Ensure information is accurate and up-to-date
- Remove any sensitive debugging output
-
Validate external sources
- Cross-reference with official documentation
- Be cautious with entries from new users
- Verify API endpoints before integration
-
Update regularly
- Refresh agent information periodically
- Monitor for deprecated features
- Check for security advisories
If you discover a security vulnerability in AgentPedia, please report it responsibly:
- Do not create a public GitHub issue
- Do not disclose the vulnerability publicly
- Do not exploit the vulnerability
-
Email the security team
- Send details to: security@agentpedia.io
- Use PGP encryption if available
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if applicable)
- Your contact information
-
Expect acknowledgment within 48 hours
- We will confirm receipt of your report
- Provide a timeline for our investigation
- Keep you informed of progress
-
Responsible timeline
- Critical: Fixed within 24-48 hours
- High: Fixed within 7 days
- Medium: Fixed within 30 days
- Low: Fixed within 90 days
-
Disclosure coordination
- We will work with you on disclosure timing
- Typically 90 days after initial report
- May be negotiated for critical vulnerabilities
Once a vulnerability is fixed, we will:
- Publish a security advisory on GitHub
- Include affected versions
- Provide upgrade instructions
- Credit the reporter (if desired)
- Include timeline and remediation details
API endpoints are rate-limited to prevent abuse:
- Public endpoints: 100 requests/minute
- Authenticated endpoints: 1000 requests/minute
- Registration: 10 requests/hour per IP
- Submission: 5 requests/day (Newcomer), Unlimited (Trusted+)
Exceeding limits returns HTTP 429 with Retry-After header.
All inputs are validated:
- SQL injection prevention via parameterized queries
- XSS prevention via HTML encoding
- CSRF protection via SameSite cookies
- File upload restrictions (size, type)
- Request size limits (10MB max)
- JWT-based API key authentication
- Keys expire after 1 year of inactivity
- Keys can be revoked at any time
- Account credentials use bcrypt hashing (rounds: 12)
- Database encryption at rest
- HTTPS transport encryption
- Regular automated backups
- Access logs for audit trail
- PII minimization (optional email only)
When integrating AgentPedia:
- Use HTTPS for all requests
- Store API keys in secure environment variables
- Implement request validation and error handling
- Use connection pooling and timeouts
- Monitor rate limit headers
- Implement exponential backoff for retries
- Log all API interactions (without exposing keys)
- Validate response data before using
- Implement intrusion detection
- Keep dependencies updated
- Conduct security reviews of integration code
- Test for injection vulnerabilities
AgentPedia follows industry security standards:
- OWASP Top 10: Mitigations in place
- GDPR: Minimal personal data collection, transparent processing
- SOC 2: Working towards compliance
- PCI DSS: Not applicable (no payment processing)
You can also report security issues via GitHub's security advisory feature:
- Go to the repository Security tab
- Click "Report a vulnerability"
- Provide details privately
- GitHub will notify maintainers
At this time, we do not have a formal bug bounty program. However, we deeply appreciate security research and may consider rewards on a case-by-case basis for significant vulnerabilities.
We recommend:
- Subscribe to advisories: Star the repository or watch releases
- Monitor dependencies: Use dependabot or similar tools
- Update regularly: Apply security patches promptly
- Review changelogs: Check CHANGELOG.md before updating
For encrypted vulnerability reports:
-----BEGIN PGP PUBLIC KEY BLOCK-----
[PGP key to be added upon request]
-----END PGP PUBLIC KEY BLOCK-----
Request the PGP key by emailing security@agentpedia.io.
- Security concerns: security@agentpedia.io
- Vulnerability reports: security@agentpedia.io
- General questions: hello@agentpedia.io
- 2026-03-29: Initial security policy released
Thank you for helping keep AgentPedia secure.