AletheiaDB is currently in pre-1.0 development. We provide security updates for the latest released version.
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We take the security of AletheiaDB seriously. If you discover a security vulnerability, please follow responsible disclosure practices.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please report security issues privately:
- Email: Send details to [security contact - TBD]
- GitHub Security Advisory: Use GitHub's private vulnerability reporting
Please include as much of the following information as possible:
- Type of vulnerability (e.g., buffer overflow, SQL injection, XSS)
- Affected version(s)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if available)
- Potential impact of the vulnerability
- Suggested fix (if you have one)
- Initial Response: Within 48 hours
- Triage: Within 5 business days
- Status Updates: Every 7 days until resolved
- Public Disclosure: Coordinated with reporter (typically 90 days after fix)
- We will confirm receipt of your vulnerability report
- We will investigate and validate the vulnerability
- We will develop a fix and prepare a security patch
- We will coordinate public disclosure timing with you
- We will release the security update and credit you (unless you prefer to remain anonymous)
- Keep Updated: Always run the latest version with security patches
- Access Control: Implement proper authentication and authorization
- Network Security: Use encrypted connections for remote access
- Backup: Maintain regular backups of your data
- Monitoring: Monitor logs for suspicious activity
- Dependency Audits: Run
cargo auditregularly (automated via Dependabot) - Code Review: All code changes undergo review before merge
- Static Analysis: Use
cargo clippywith strict lints - Testing: Comprehensive test coverage including edge cases
- Fuzzing: Property-based testing for critical paths
AletheiaDB is under active development. Be aware of these limitations:
- No Encryption at Rest: Data is not encrypted on disk (planned for 1.0)
- Limited Access Control: Basic authentication only (enhanced ACLs planned)
- No Audit Logging: User actions are not logged (planned for 1.0)
- Development Focus: Security hardening ongoing, not production-ready
- Dependency Scanning: Automated with Dependabot and cargo-audit
- Memory Safety: Rust's memory safety guarantees
- Input Validation: Comprehensive validation of all inputs
- Error Handling: No panic-based DoS vulnerabilities
- CI Security Checks: Automated security audits on every PR
- Encryption at rest
- TLS/SSL for network connections
- Role-based access control (RBAC)
- Audit logging
- Rate limiting
- Security hardening guide
We do not currently have a bug bounty program. Security researchers who report valid vulnerabilities will be credited in our security advisories and release notes (unless they prefer anonymity).
We recognize and thank security researchers who help keep AletheiaDB secure:
No security reports received yet.
For security concerns: [TBD - set up security@aletheiadb.io or similar]
For general questions: Create a public GitHub issue
Last updated: 2026-01-03