Status (2026-05-12): Agent Network is at v0.8.2 stable (Apache 2.0, shipped 2026-05-12 via npm
latesttag; project open-sourced 2026-05-11). The full open-source security audit is atdocs/open-source-security-risk-report.md. All P0 items from that report were addressed in v0.8.0 / v0.8.1. Remaining roadmap items (Argon2id, signed releases, etc.) are tracked in the Hardening Roadmap below.
If you discover a security vulnerability, please do not open a public issue.
Instead, use GitHub Private Security Advisories to report privately.
Please include:
- A clear description of the vulnerability
- Steps to reproduce (PoC welcome)
- Affected version(s)
- Suggested remediation, if any
We aim to:
- Acknowledge within 48 hours
- Fix critical issues within 7 days
- Credit you in the release notes (unless you ask us not to)
Only the latest minor version receives security updates.
| Package | Versions |
|---|---|
@sleep2agi/agent-network |
latest 2.x |
@sleep2agi/commhub-server |
latest 0.x |
@sleep2agi/agent-node |
latest 2.x |
@sleep2agi/agent-network-dashboard |
latest 0.x |
If you self-host on the public internet, read /en/deploy/production
before opening firewall ports. The headline items:
- Default credentials
admin / anethub— fine for local quick-start; change immediately for any--host 0.0.0.0/ public deployment viaanet passwd(password strength ≥ 8 + weak-password dictionary enforced) COMMHUB_AUTH_TOKENis soft-deprecated (v0.8 RFC-001 Phase 2) — only/api/*reads work + deprecation warning. Hub bootstraps an adminutok_automatically on firstanet hub start. Master token path will be fully removed in v1.0.- tmux control plane — Hub default bind is
127.0.0.1; bind0.0.0.0only behind TLS + firewall - Multi-tenant scope is partially enforced — utok_ / ntok_ network binding is in; viewer-role write-block on MCP and project-level network config are tracked for v0.9+
- Agent nodes run with
dangerouslySkipPermissions: trueby default — agents can call any tool without confirmation. Treat agents as untrusted code, run them in disposable working directories - Plain HTTP is the default — production deployments must front the Hub with a TLS reverse proxy (Caddy / Nginx)
- Password hashing is SHA-256 — Argon2id migration planned for v0.9+. Production must pair strong passwords + TLS + firewall + regular backups.
The full 20-item audit and remediation matrix lives at
docs/open-source-security-risk-report.md.
- An attacker who already has filesystem access to
~/.commhub/commhub.dbor~/.anet/— there is no further at-rest encryption - Issues in upstream dependencies — please report upstream first; we'll update once a fix is published
- DoS via resource exhaustion on a self-hosted Hub — run behind a rate limiter / WAF / reverse proxy
- Prompt injection of agent input — agents are explicitly untrusted; isolate their working directory
We follow coordinated disclosure: once a fix is released, we publish an advisory referencing the CVE (if assigned) and credit the reporter.
Shipped (v0.6.1 → v0.8.1):
- ✅ Default
requireAuth/ default127.0.0.1bind / defaultadmin / anethubbootstrap with strength prompt (v0.7 ~ v0.8) - ✅ MCP / SSE network scope enforcement via
network_id:aliasrouting (v0.7) - ✅
COMMHUB_AUTH_TOKENmaster token soft-deprecation + adminutok_bootstrap → RFC-001 Phase 2 (v0.8.0) - ✅ Password strength ≥ 8 + weak-password dictionary;
anet passwd/anet hub admin reset-user(v0.8.0) - ✅
chmod 600on~/.anet/server/admin-utok.json(v0.8.0 bootstrap) - ✅
anet doctor --fixprobes and reissues expiredntok_; agent-node SSE 401 auto-reload (v0.8.1)
Planned (v0.9+) — tracking issues come and go; the open issues list is the source of truth. If you don't see an item below, feel free to open a tracking issue.
- ⏳ Argon2id password hashing (SHA-256 today)
- ⏳ Token TTL + revoke-all
- ⏳ RFC-001 Phase 3 — fully remove
COMMHUB_AUTH_TOKENlegacy code path (v1.0) - ⏳ Signed releases + SLSA provenance
- ⏳ Optional E2EE for inter-agent messages
- ⏳ Pinned + checksummed install scripts