| Version | Supported |
|---|---|
| 0.4.x | ✅ Yes |
| 0.3.x | |
| < 0.3 | ❌ No |
If you discover a security vulnerability in HumaneProxy, please do not open a public issue.
Instead, report it through one of these channels:
-
GitHub Private Vulnerability Reporting: Navigate to the Security tab of this repository and click "Report a vulnerability".
-
Email: Send details to mishra@vishisht.tech with the subject line
[SECURITY] HumaneProxy vulnerability report.
- A description of the vulnerability and its potential impact.
- Steps to reproduce (proof of concept if possible).
- The affected version(s).
- Any suggested fix or mitigation.
- Acknowledgement within 48 hours.
- A fix timeline communicated within 7 days.
- Credit in the release notes (unless you prefer to remain anonymous).
The following are in-scope for security reports:
- Bypasses of the safety pipeline (e.g., a message that should be flagged as
self_harmbut is classified assafe). - Injection attacks via webhook payloads, admin API, or MCP server.
- Denial-of-service vectors (e.g., ReDoS in keyword matching).
- Information disclosure through the admin API or escalation logs.
- Social engineering of LLM providers (OpenAI, Groq) — these are upstream services.
- Vulnerabilities in dependencies that do not directly affect HumaneProxy's behaviour.
- Theoretical attacks that require physical access to the host machine.
We follow coordinated disclosure. Please allow us a reasonable window (typically 30 days) to address the vulnerability before public disclosure. We will work with you on a timeline.