We actively support the following versions of Ason with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ Yes |
| < 1.0 | ❌ No |
For critical security vulnerabilities that could compromise user data or systems, please DO NOT create a public GitHub issue.
Instead, please report them privately by emailing: security@madstone.io
- Remote code execution
- Arbitrary file write/read outside intended directories
- Authentication/authorization bypasses
- Injection vulnerabilities (command injection, path traversal, etc.)
- Exposure of sensitive data
- Denial of service with minimal effort
For security improvements, hardening suggestions, or minor security concerns that don't pose immediate risk, you can:
- Create a public issue using the "Security Report" template
- Email security@madstone.io if you're unsure
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Initial Assessment: We'll provide an initial assessment within 5 business days
- Investigation: We'll investigate and develop a fix
- Coordination: We'll coordinate disclosure timeline with you
- Release: We'll release a security update and advisory
- Credit: We'll provide appropriate credit if desired
- Acknowledgment: Within 48 hours
- Initial response: Within 5 business days
- Fix development: Depends on severity and complexity
- Security release: As soon as possible after fix is ready
- Input validation: All user inputs are validated
- Path sanitization: File paths are sanitized to prevent traversal attacks
- Dependency scanning: Dependencies are regularly scanned for vulnerabilities
- Code review: All code changes undergo security-conscious review
- Automated testing: Security-focused tests are included in our test suite
See our security roadmap for upcoming security enhancements:
- Enhanced path traversal protection
- Improved input validation
- Security-focused refactoring
When creating or using templates:
- Validate template sources: Only use templates from trusted sources
- Review template content: Check templates for suspicious patterns
- Limit template variables: Don't pass sensitive data as template variables
- Sandbox execution: Run Ason in isolated environments when processing untrusted templates
- Verify checksums: Always verify binary checksums when downloading releases
- Use package managers: Prefer official package managers when available
- Keep updated: Regularly update to the latest version
- Monitor advisories: Subscribe to security advisories
- File permissions: Set appropriate permissions on configuration files
- Secrets management: Don't store secrets in configuration files
- Access control: Limit access to Ason data directories
- Network isolation: Use network restrictions in sensitive environments
- Untrusted templates: Processing untrusted templates may pose security risks
- File permissions: Generated files inherit template file permissions
- Path handling: Template paths are validated but defense in depth is recommended
- Resource usage: Large templates may consume significant system resources
- Use Ason in containerized or sandboxed environments for untrusted content
- Regularly audit generated output for unexpected files or permissions
- Implement resource limits in production environments
- Monitor file system access when processing templates
- Email: security@madstone.io
- PGP Key: Available on request
- Response Time: We aim to respond to security reports within 48 hours
Security updates are distributed through:
- GitHub Releases: All security updates are clearly marked
- Security Advisories: Published on GitHub Security Advisories
- Changelog: Security fixes are documented in CHANGELOG.md
- Email notifications: For critical vulnerabilities (if contact provided)
We follow responsible disclosure principles:
- Coordination: We coordinate with reporters on disclosure timelines
- Credit: We provide appropriate credit to security researchers
- Transparency: We publish security advisories after fixes are available
- Timeline: We aim for disclosure within 90 days of initial report
Currently, we don't have a formal bug bounty program, but we:
- Recognize and credit security researchers
- Prioritize security fixes
- Welcome responsible disclosure
- Consider small tokens of appreciation for significant findings
We support security research conducted in good faith and will not pursue legal action against researchers who:
- Follow responsible disclosure practices
- Don't access or modify user data without permission
- Don't perform attacks that could harm our users or systems
- Report findings privately to security@madstone.io
Thank you for helping keep Ason and our users safe!