| Version | Supported |
|---|---|
| 0.x.x | ✅ |
If you discover a security vulnerability in GEPA-ADK, please report it responsibly:
- Do not open a public GitHub issue for security vulnerabilities
- Email the maintainers directly or use GitHub's private vulnerability reporting feature
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
We aim to respond to security reports within 48 hours and will work with you to understand and address the issue.
This project uses automated security scanning to detect vulnerabilities:
GitHub CodeQL performs semantic code analysis on every pull request and push to main/develop branches:
- Trigger: PRs, pushes to main/develop, weekly scheduled scan (Mondays 6am UTC)
- Coverage: OWASP Top 10, CWE Top 25, Python-specific vulnerabilities
- Query Suite:
security-extendedfor comprehensive coverage - Results: Available in the Security tab and as PR check annotations
- Navigate to the repository's Security tab
- Click Code scanning alerts to see all findings
- Filter by severity, rule, or status
- Each finding includes remediation guidance
- CodeQL analysis runs automatically on all PRs
- High-severity findings may block merging (if branch protection is enabled)
- Review inline annotations on changed files for security feedback
- Address or dismiss findings before requesting review
We regularly audit dependencies for known vulnerabilities:
- Dependabot: Automatically monitors dependencies and creates PRs for security updates
- Local checks: Use
pip-auditto scan for known vulnerabilities:
# Install pip-audit and scan dependencies
uvx pip-auditWhen contributing, follow these security guidelines:
- Validate and sanitize all external inputs
- Use parameterized queries for any database operations
- Avoid hardcoding secrets; use environment variables
- Follow the principle of least privilege
- Keep dependencies up to date