You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: SECURITY.md
+33-16Lines changed: 33 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,11 @@ The following versions of Symbiont are currently supported with security updates
6
6
7
7
| Version | Supported |
8
8
| ------- | ------------------ |
9
-
| 0.1.x |:white_check_mark:|
9
+
| 1.1.x |:white_check_mark:|
10
+
| 1.0.x |:white_check_mark:|
11
+
| < 1.0 |:x:|
12
+
13
+
*Last updated: 2026-02-13*
10
14
11
15
## Reporting a Vulnerability
12
16
@@ -18,7 +22,7 @@ We take security vulnerabilities seriously. If you discover a security vulnerabi
18
22
19
23
Instead, please:
20
24
21
-
1.**Email**: Send details to security@symbiont.dev
25
+
1.**Email**: Send details to security@thirdkey.ai
22
26
2.**Subject**: Include "SECURITY" in the subject line
23
27
3.**Content**: Include the following information:
24
28
- Description of the vulnerability
@@ -45,29 +49,41 @@ Instead, please:
45
49
When using Symbiont in production:
46
50
47
51
1.**Keep Updated**: Always use the latest supported version
48
-
2.**Secrets Management**: Use the built-in secrets management system properly
49
-
3.**Sandboxing**: Enable and configure appropriate sandboxing levels
50
-
4.**Access Control**: Implement proper authentication and authorization
51
-
5.**Monitoring**: Enable audit logging and monitor for suspicious activity
52
-
6.**Network Security**: Run Symbiont in a properly secured network environment
52
+
2.**Secrets Management**: Use the built-in encrypted secrets store with a strong KDF password; prefer OS keychain or Vault key providers over environment variables
53
+
3.**Sandboxing**: Use Docker, gVisor, or Firecracker for untrusted code; never use the native sandbox in production
54
+
4.**Tool Verification**: Run in strict enforcement mode to ensure only verified MCP tools are executed
55
+
5.**API Keys**: Enable per-agent API key authentication for all HTTP endpoints; rotate keys regularly
56
+
6.**Rate Limiting**: Keep rate limiting enabled to prevent abuse and resource exhaustion
57
+
7.**Audit Logging**: Enable audit logging in strict mode and monitor for suspicious activity
58
+
8.**Network Security**: Run Symbiont in a properly secured network environment with TLS
59
+
9.**Policy Rules**: Define explicit allow/deny policies for agent capabilities and tool access
53
60
54
61
### Security Features
55
62
56
63
Symbiont includes several security features:
57
64
58
-
-**Sandboxed Execution**: Isolated execution environments for agents
59
-
-**Secrets Management**: Encrypted storage and secure access to sensitive data
60
-
-**Audit Logging**: Comprehensive logging of security-relevant events
61
-
-**Policy Engine**: Fine-grained access control and security policies
62
-
-**Signed Container Images**: Docker images are signed with cosign
65
+
-**Sandboxed Execution**: Tiered isolation (Docker, gVisor, Firecracker, E2B) with resource limits via rlimit and process-group kill on timeout
0 commit comments