Skip to content

Security: namastexlabs/pgserve

Security

SECURITY.md

Security Policy

pgserve is maintained by Automagik. We take the security of this package seriously and appreciate responsible disclosure from the community.


Reporting a Vulnerability

Please do not open public issues for security reports.

Send private reports to one of the following channels:

Channel Address Best for
Security email privacidade@namastex.ai Anything security-related, including coordinated disclosure
DPO (privacy + security officer) dpo@khal.ai Privacy, LGPD, data protection concerns
Private GitHub advisory Report via GitHub Preferred for CVE assignment and coordinated release

PGP available on request.

Response SLA

  • Acknowledgement: within 2 business hours (UTC-3).
  • Initial triage and severity assessment: within 24 hours.
  • Fix or mitigation plan: within 7 days for critical/high severity.
  • Public disclosure: coordinated with reporter, typically within 30 days of fix.

We will credit reporters publicly (with their permission) in the released advisory.


Supported Versions

Version line Status
1.1.10 and later clean releases ✅ Supported — current
1.1.111.1.14 COMPROMISED — do not use
1.1.01.1.9 ⚠️ Legacy — security patches only
1.0.x and earlier ❌ End of life

Always install from the current stable line. Pin explicit versions in your package.json and avoid latest for supply-chain sensitive packages.


Past Incidents

2026-04 — CanisterWorm supply-chain compromise

Between 2026-04-21 (~22:14 UTC) and 2026-04-22 (~14:00 UTC), versions 1.1.11, 1.1.12, 1.1.13, and 1.1.14 were published to npm by a threat actor after a developer GitHub OAuth token was exfiltrated. The malicious versions contained a TeamPCP payload in scripts/check-env.js that executed via postinstall to harvest local credentials.

  • Exposure window: ~16 hours
  • Detection-to-containment: under 20 hours
  • Current status: malicious versions npm unpublish-ed and no longer installable

If you installed versions 1.1.111.1.14 between April 21–22, 2026, assume your machine is compromised. Follow the remediation guide linked below.

Resources:

A full public post-mortem will be published within 30 days of containment.


Acknowledgments

We thank the researchers and organizations that identified and tracked this incident:

We also thank the Automagik team that ran the end-to-end response during the incident window, and the broader open-source community whose scrutiny, tools, and unfiltered feedback keep this ecosystem healthy. We will keep earning it.


Our Commitments

Effective 2026-04-23, all pgserve releases are governed by:

  • Provenance attestation — every publication is signed with npm --provenance and verifiable via Sigstore.
  • OIDC trusted publishing — migrating to GitHub Actions OIDC publish, eliminating long-lived npm tokens. (in progress)
  • Mandatory 2FA on every maintainer account with publish rights.
  • Environment protection — production publishes require manual approval from a second maintainer.
  • Quarterly token audit — scope and permission review.
  • External pentest — scheduled ahead of the original roadmap.

Hardening Recommendations for Consumers

  • Pin explicit versions, not latest: "pgserve": "1.1.10".
  • Use npm ci in CI. It enforces lockfile-based installs by default.
  • Evaluate --ignore-scripts per-package for untrusted dependencies. The current pgserve release does not require any lifecycle script to function.
  • Verify package provenance: npm view pgserve --json | jq '.dist.attestations'.
  • Monitor advisories: subscribe to GitHub security alerts for this repository.

Contact

  • Security & incidents: privacidade@namastex.ai
  • Data Protection Officer (DPO): Cezar Vasconcelos — dpo@khal.ai
  • Security disclosure page: automagik.dev/security

Namastex Labs Serviços em Tecnologia Ltda · CNPJ 46.156.854/0001-62

Last updated: 2026-04-23 · v1.0

There aren’t any published security advisories