| Version | Supported |
|---|---|
| 2.0.x | ✅ |
| < 2.0 | ❌ |
If you discover a security vulnerability in Papilon, please report it by sending an email to security@vector1.ai.
Please do NOT:
- Open a public GitHub issue for security vulnerabilities
- Disclose the vulnerability publicly before it has been addressed
Please DO include:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (optional)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 30 days for critical issues
When using Papilon:
-
API Keys: Never commit API keys to version control
# Use environment variables export ANTHROPIC_API_KEY="sk-..."
-
Data Handling: Ensure PII is properly anonymized before processing
-
Access Control: Implement appropriate access controls for production deployments
-
Updates: Keep Papilon and its dependencies updated
-
Audit Logging: Enable audit logging for compliance requirements
We follow a responsible disclosure policy. After a fix has been deployed, we will:
- Credit the reporter (unless they wish to remain anonymous)
- Publish a security advisory
- Update the changelog
Thank you for helping keep Papilon secure!