| Version | Supported |
|---|---|
| 1.0.x | Yes |
Please do not report security vulnerabilities through public GitHub issues.
Instead, email us at security@conductor.dev with:
- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge receipt within 24 hours and provide a detailed response within 72 hours.
- Keep Conductor updated — always run the latest version
- Use strong API keys — rotate credentials regularly
- Enable plugin approval — don't run with
full-automode in production - Review tool calls — audit what tools the AI is calling
- Use the encrypted keychain — never store credentials in plaintext config files
- Validate all inputs — use Zod schemas, never trust AI-generated arguments
- Use
execFilenotexec— never pass user input through a shell - Principle of least privilege — request only the permissions you need
- No
eval()ornew Function()— use safe parsers likemathjs - Rate limit your endpoints — protect against abuse
- Encrypted keychain — AES-256-GCM with machine-bound key derivation
- Zod validation — every tool input is validated before execution
- Safe shell — whitelist-based command filtering, no shell interpretation
- Plugin sandboxing — plugins run with minimal permissions
- Approval workflow — dangerous operations require explicit user approval
- Rate limiting — all endpoints protected against abuse