| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
- DO NOT create a public GitHub issue for security vulnerabilities
- Email security concerns to: security@helix.dev (or contact the maintainer directly)
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours of your report
- Initial Assessment: Within 1 week
- Resolution Timeline: Depends on severity
- Critical: 24-72 hours
- High: 1 week
- Medium: 2-4 weeks
- Low: Next release cycle
- We follow coordinated disclosure
- Credit will be given to reporters (unless anonymity is requested)
- Public disclosure occurs after a fix is available
- Static Analysis: Gosec, CodeQL, golangci-lint
- Dependency Scanning: Snyk, Trivy, Dependabot
- Container Security: Trivy, Hadolint
- Secrets Detection: TruffleHog
- SBOM Generation: Syft (CycloneDX, SPDX formats)
- Authentication: JWT with RS256/HS256, API key validation
- Authorization: Role-based access control (RBAC)
- Rate Limiting: Token bucket and sliding window algorithms
- Input Validation: Strict validation on all API inputs
- Output Sanitization: XSS prevention, content filtering
- TLS: Enforced for all production traffic
- Prompt Injection Protection: Input sanitization and guardrails
- PII Detection: Automatic detection and redaction
- Content Filtering: Configurable guardrails for harmful content
- System Prompt Protection: Isolation and validation
- Red Team Framework: Built-in security testing tools
- Container Isolation: All services run in isolated containers
- Network Segmentation: Internal services not exposed externally
- Secrets Management: Environment-based, no hardcoded credentials
- Circuit Breakers: Fault tolerance for external dependencies
- Health Monitoring: Continuous health checks on all services
# Run all security scans
make security-scan
# Individual scanners
make security-scan-gosec # Go security checker
make security-scan-snyk # Dependency vulnerabilities
make security-scan-trivy # Container/filesystem scanning
make security-scan-sonarqube # Code quality and security# Security test suites
make test-security # All security tests
make test-type-security # Security tests with infrastructure
# Challenge-based validation
./challenges/scripts/security_scanning_challenge.sh
./challenges/scripts/jwt_security_challenge.sh
./challenges/scripts/sql_injection_challenge.sh
./challenges/scripts/xss_prevention_challenge.sh
./challenges/scripts/csrf_protection_challenge.shmake sbom # Generate Software Bill of MaterialsLocated at .gosec.yml:
- Configures rule exclusions for documented false positives
- Excludes test fixtures and development-only code
- Full justification for each exclusion
Located at .snyk:
- Dependency analysis policy
- Vulnerability severity thresholds
- Auto-fix preferences
Located at sonar-project.properties:
- Code quality gates
- Security hotspot detection
- Coverage requirements
- Never commit secrets - Use environment variables
- Validate all inputs - Trust no external data
- Use parameterized queries - Prevent SQL injection
- Sanitize outputs - Prevent XSS
- Keep dependencies updated - Run
go mod tidyregularly - Run security scans locally - Before submitting PRs
# Install pre-commit hooks
make install-hooks
# Manual security check before commit
make ci-pre-commit- Triage: Assess severity and impact
- Containment: Implement temporary mitigations if needed
- Fix Development: Create and test the fix
- Review: Security review of the fix
- Deployment: Roll out fix to all environments
- Communication: Notify affected parties
- Post-Mortem: Document lessons learned
All dependencies are:
- Scanned weekly via Dependabot and Snyk
- Reviewed for known vulnerabilities
- Updated promptly for security fixes
Third-party submodules (cli_agents/, MCP/) are:
- Read-only - no changes pushed
- Regularly updated to latest versions
- Excluded from certain security scans (as external code)
For security-related inquiries:
- Create a private security advisory on GitHub
- Contact the maintainer directly
Thank you for helping keep HelixAgent secure.