We actively support the following versions of Vortex Programming with security updates:
Version | Supported |
---|---|
1.0.x | ✅ |
< 1.0 | ❌ |
The Vortex Programming team takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
Please DO NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing: security@vortexprogramming.com
Include the following information in your report:
- Type of issue (buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
After submitting a report, you can expect:
- Acknowledgment: We'll acknowledge receipt of your vulnerability report within 2 business days
- Investigation: We'll investigate and validate the vulnerability within 5 business days
- Resolution Timeline: We'll provide an estimated timeline for resolution
- Updates: We'll keep you informed of our progress throughout the process
- Credit: If you'd like, we'll publicly credit you for the responsible disclosure
- Patch Development: We develop and test a fix for the vulnerability
- Release Planning: We coordinate the release of the security patch
- Notification: We notify users through:
- GitHub Security Advisories
- Release notes
- Email notifications (for critical vulnerabilities)
- Public Disclosure: After users have had time to update, we may publish details about the vulnerability
When using Vortex Programming in production:
- Always validate
TenantId
values before processing - Use proper tenant isolation in your data layer
- Implement tenant-specific access controls
- Regularly audit tenant separation
- Validate all input data before processing
- Use secure serialization practices for DSL processes
- Implement proper error handling to avoid information disclosure
- Monitor process execution for anomalies
- Protect context properties that contain sensitive information
- Use secure channels for distributed execution
- Implement proper authentication for process chains
- Regularly rotate any credentials used in contexts
- Sanitize event data before logging
- Implement access controls for event subscriptions
- Use secure transport for event streaming
- Monitor for unusual event patterns
We follow a coordinated disclosure timeline:
- Day 0: Vulnerability reported
- Day 2: Acknowledgment sent to reporter
- Day 7: Initial assessment completed
- Day 30: Target date for patch development
- Day 37: Security advisory published (if applicable)
- Day 90: Full public disclosure (if patch is available)
For security-related questions or concerns:
- Email: security@vortexprogramming.com
- PGP Key: Available at https://vortexprogramming.com/.well-known/pgp-key.asc
- Response Time: Within 2 business days
We thank the following security researchers for their responsible disclosure:
No vulnerabilities reported yet - be the first to help make Vortex Programming more secure!
Note: This security policy applies to the Vortex Programming Framework and associated documentation. For security issues in applications built with Vortex Programming, please contact the respective application maintainers.