Skip to content

Commit 6d3d287

Browse files
author
Symbiont OSS Sync
committed
Update SECURITY.md for v1.1.x
1 parent aed57b0 commit 6d3d287

File tree

1 file changed

+33
-16
lines changed

1 file changed

+33
-16
lines changed

SECURITY.md

Lines changed: 33 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,11 @@ The following versions of Symbiont are currently supported with security updates
66

77
| Version | Supported |
88
| ------- | ------------------ |
9-
| 0.1.x | :white_check_mark: |
9+
| 1.1.x | :white_check_mark: |
10+
| 1.0.x | :white_check_mark: |
11+
| < 1.0 | :x: |
12+
13+
*Last updated: 2026-02-13*
1014

1115
## Reporting a Vulnerability
1216

@@ -18,7 +22,7 @@ We take security vulnerabilities seriously. If you discover a security vulnerabi
1822

1923
Instead, please:
2024

21-
1. **Email**: Send details to security@symbiont.dev
25+
1. **Email**: Send details to security@thirdkey.ai
2226
2. **Subject**: Include "SECURITY" in the subject line
2327
3. **Content**: Include the following information:
2428
- Description of the vulnerability
@@ -45,29 +49,41 @@ Instead, please:
4549
When using Symbiont in production:
4650

4751
1. **Keep Updated**: Always use the latest supported version
48-
2. **Secrets Management**: Use the built-in secrets management system properly
49-
3. **Sandboxing**: Enable and configure appropriate sandboxing levels
50-
4. **Access Control**: Implement proper authentication and authorization
51-
5. **Monitoring**: Enable audit logging and monitor for suspicious activity
52-
6. **Network Security**: Run Symbiont in a properly secured network environment
52+
2. **Secrets Management**: Use the built-in encrypted secrets store with a strong KDF password; prefer OS keychain or Vault key providers over environment variables
53+
3. **Sandboxing**: Use Docker, gVisor, or Firecracker for untrusted code; never use the native sandbox in production
54+
4. **Tool Verification**: Run in strict enforcement mode to ensure only verified MCP tools are executed
55+
5. **API Keys**: Enable per-agent API key authentication for all HTTP endpoints; rotate keys regularly
56+
6. **Rate Limiting**: Keep rate limiting enabled to prevent abuse and resource exhaustion
57+
7. **Audit Logging**: Enable audit logging in strict mode and monitor for suspicious activity
58+
8. **Network Security**: Run Symbiont in a properly secured network environment with TLS
59+
9. **Policy Rules**: Define explicit allow/deny policies for agent capabilities and tool access
5360

5461
### Security Features
5562

5663
Symbiont includes several security features:
5764

58-
- **Sandboxed Execution**: Isolated execution environments for agents
59-
- **Secrets Management**: Encrypted storage and secure access to sensitive data
60-
- **Audit Logging**: Comprehensive logging of security-relevant events
61-
- **Policy Engine**: Fine-grained access control and security policies
62-
- **Signed Container Images**: Docker images are signed with cosign
65+
- **Sandboxed Execution**: Tiered isolation (Docker, gVisor, Firecracker, E2B) with resource limits via rlimit and process-group kill on timeout
66+
- **Native Sandbox Hardening**: Process-group isolation (`setpgid`/`killpg`), CPU/memory/file-size limits, empty-by-default allowed executables, shell warnings
67+
- **Secrets Management**: AES-256-GCM encrypted file store with Argon2 KDF, file locking (fd-lock), mtime-based decryption cache, env/keychain/file/Vault key providers
68+
- **Per-Agent API Key Authentication**: Argon2-hashed API keys with file-backed key store
69+
- **Per-IP Rate Limiting**: Governor-based rate limiting middleware (configurable, default 100 req/min)
70+
- **Tool Verification (SchemaPin)**: Cryptographic schema verification for MCP tool invocations with configurable enforcement policies (strict/permissive/development/disabled)
71+
- **Agent Identity (AgentPin)**: Domain-anchored ES256 cryptographic identity verification for AI agents
72+
- **Sensitive Argument Redaction**: Schema-driven masking of sensitive tool parameters in logs
73+
- **Audit Logging**: Comprehensive logging of security-relevant events with strict/permissive failure modes
74+
- **Policy Engine**: Fine-grained access control and security policies with DSL-defined rules
75+
- **Model I/O Logging**: Encrypted interaction logs with configurable retention
6376

6477
### Security Considerations
6578

6679
- Symbiont executes arbitrary code as defined in agent configurations
80+
- The native sandbox provides resource limits but **not** full isolation — use Docker/gVisor/Firecracker/E2B for untrusted code
81+
- Native sandbox is blocked in production (`SYMBIONT_ENV=production`)
6782
- Ensure proper network isolation and access controls
68-
- Regularly review and audit agent configurations
83+
- Regularly review and audit agent configurations and policy rules
6984
- Monitor system resources and API usage
7085
- Use encryption for data at rest and in transit
86+
- Rotate API keys and secrets periodically
7187

7288
## Vulnerability Management
7389

@@ -90,16 +106,17 @@ We maintain an internal vulnerability management process:
90106

91107
We monitor our dependencies for known vulnerabilities:
92108

93-
- Regular dependency updates
94-
- Automated vulnerability scanning
109+
- **cargo-deny**: License and vulnerability auditing via `deny.toml`
110+
- Regular dependency updates with Cargo lockfile pinning
111+
- Automated vulnerability scanning in CI
95112
- Review of dependency security advisories
96113
- Prompt patching of vulnerable dependencies
97114

98115
## Contact
99116

100117
For security-related questions or concerns:
101118

102-
- Security Email: security@symbiont.dev
119+
- Security Email: security@thirdkey.ai
103120
- General Contact: oss@symbiont.dev
104121
- Website: https://symbiont.dev
105122

0 commit comments

Comments
 (0)