We actively maintain security updates for the following versions:
| Version | Supported |
|---|---|
| 2.x | ✅ Supported |
| 1.x | |
| < 1.0 | ❌ Not supported |
We take security seriously. If you discover a security vulnerability, please follow these steps:
- DO NOT create a public GitHub issue for security vulnerabilities
- Email us directly at: security@vdkit.com
- Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes or mitigations
Subject: [SECURITY] Vulnerability Report for VDK Blueprints
**Vulnerability Type**: [e.g., Code Injection, Information Disclosure]
**Severity**: [Critical/High/Medium/Low]
**Component**: [e.g., Rule Parser, Platform Integration]
**Description**:
[Detailed description of the vulnerability]
**Steps to Reproduce**:
1. [Step 1]
2. [Step 2]
3. [Step 3]
**Impact**:
[What could an attacker accomplish?]
**Suggested Fix**:
[If you have suggestions for remediation]
**Reporter**: [Your name/handle (optional)]
**Contact**: [Your email for follow-up]
- Initial Response: Within 24 hours
- Vulnerability Assessment: Within 72 hours
- Fix Timeline: Based on severity
- Critical: 1-7 days
- High: 7-14 days
- Medium: 14-30 days
- Low: Next release cycle
When contributing blueprints, ensure:
- No Sensitive Data: Never include API keys, passwords, or personal information
- Safe Code Examples: All code examples should follow security best practices
- Input Validation: Blueprint patterns should include proper input validation
- Secure Defaults: Recommend secure configuration options
- Dependency Safety: Only reference well-maintained, secure dependencies
- Memory Isolation: Blueprints should not access or modify sensitive system areas
- Tool Restrictions: Specify appropriate tool permissions for each platform
- Data Privacy: Blueprints should not encourage logging sensitive information
- Sandbox Compliance: Ensure compatibility with AI assistant security models
Blueprints must not contain:
- Executable code that could harm systems
- Instructions for bypassing security measures
- Patterns that encourage insecure practices
- Links to malicious resources
- Social engineering techniques
- Schema Validation: All blueprints are validated against security schemas
- Content Filtering: Automated scanning for potentially harmful content
- Platform Sandboxing: AI assistants run blueprints in controlled environments
- Access Controls: Blueprint permissions are explicitly defined
- Dependency Scanning: Regular audits of all project dependencies
- Code Review: All contributions undergo security-focused code review
- Automated Testing: Security tests run on every contribution
- Version Control: All changes are tracked and can be audited
- Immediate Action: Issue will be triaged within 24 hours
- Containment: Affected components will be isolated if necessary
- Investigation: Full investigation to determine scope and impact
- Resolution: Fix developed, tested, and deployed
- Communication: Users notified through appropriate channels
- Post-Mortem: Analysis to prevent similar issues
Security updates are communicated through:
- GitHub Security Advisories: For repository watchers
- Release Notes: For all users
- Discord Channel: Real-time notifications
- Email: For critical vulnerabilities (if subscribed)
- Keep Updated: Use the latest version of blueprints
- Review Content: Examine blueprints before using in production
- Environment Isolation: Test new blueprints in safe environments
- Access Control: Limit blueprint access to trusted team members
- Monitor Usage: Track which blueprints are active in your projects
- Enable memory restrictions for large blueprint sets
- Review tool permissions before activation
- Use workspace isolation for sensitive projects
- Configure file access patterns appropriately
- Review auto-completion suggestions in security-sensitive code
- Use project-specific rule sets
- Enable memory optimization to prevent information leakage
- Configure workspace boundaries
- Review collaborative features for sensitive projects
- Configure suggestion filtering for sensitive repositories
- Review integration permissions
- Use enterprise features for additional security controls
We recognize security researchers who help improve our security:
- Public Recognition: Listed in our security acknowledgments (with permission)
- Direct Communication: Coordination on disclosure timeline
- Collaboration: Opportunity to review fixes before public release
- Coordinated Disclosure: We work with researchers on responsible disclosure
- No Retaliation: We will not take legal action against good-faith security research
- Scope: This policy covers the VDK Blueprints repository and related infrastructure
- Primary Contact: security@vdkit.com
- GPG Key: Available upon request for encrypted communications
- Response Time: 24 hours for initial response
For critical security issues requiring immediate attention:
- Email: urgent-security@vdkit.com
- Subject:
[URGENT SECURITY] Brief description
Security is a shared responsibility. Thank you for helping keep VDK Blueprints secure!
Report a Vulnerability • Security Updates • Best Practices Guide