JAEGIS AI Web OS takes security seriously. This document outlines our security practices, how to report vulnerabilities, and what to expect from our security response process.
We provide security updates for the following versions:
| Version | Supported |
|---|---|
| 1.0.x | β Yes |
| < 1.0 | β No |
- Go to: GitHub Security Advisories
- Click: "Report a vulnerability"
- Provide: Detailed information about the vulnerability
- Include: Steps to reproduce, impact assessment, and suggested fixes
If you prefer email or cannot use GitHub Security Advisories:
- Email: security@usemanusai.com
- Subject:
[SECURITY] JAEGIS AI Web OS - [Brief Description] - Encryption: Use our PGP key (available on request)
Please provide as much information as possible:
- Description: Clear description of the vulnerability
- Impact: Potential impact and attack scenarios
- Reproduction: Step-by-step instructions to reproduce
- Environment: Affected versions, operating systems, configurations
- Evidence: Screenshots, logs, or proof-of-concept code
- Suggested Fix: If you have ideas for remediation
We are committed to responding quickly to security reports:
- Initial Response: Within 24 hours
- Triage and Assessment: Within 72 hours
- Status Updates: Every 7 days until resolution
- Fix Development: Varies by severity (see below)
- Public Disclosure: After fix is available and deployed
- Response Time: Immediate (within 24 hours)
- Fix Timeline: 1-3 days
- Examples: Remote code execution, authentication bypass
- Response Time: Within 48 hours
- Fix Timeline: 3-7 days
- Examples: Privilege escalation, data exposure
- Response Time: Within 72 hours
- Fix Timeline: 1-2 weeks
- Examples: Information disclosure, denial of service
- Response Time: Within 1 week
- Fix Timeline: Next minor release
- Examples: Minor information leaks, low-impact issues
- Document Processing: All uploaded documents are validated and sanitized
- API Inputs: Comprehensive validation of all user inputs
- File Paths: Path traversal protection and sandboxing
- Command Injection: Protection against command injection attacks
- API Keys: Secure handling and storage of AI provider API keys
- Environment Variables: Secure environment variable management
- Access Control: Principle of least privilege for file system access
- Encryption: Sensitive data encrypted at rest and in transit
- Temporary Files: Secure cleanup of temporary files and caches
- Memory Management: Secure memory handling to prevent data leaks
- Logging: No sensitive data in logs
- Automated Scanning: Daily dependency vulnerability scans
- Regular Updates: Automated security updates for dependencies
- License Compliance: Verification of dependency licenses
- Supply Chain: Protection against supply chain attacks
# Always verify package integrity
npm audit
pip-audit
# Use official sources only
npm install jaegis-ai-web-os
pip install jaegis-ai-web-os# Use environment variables for API keys
export OPENAI_API_KEY="your-key"
export ANTHROPIC_API_KEY="your-key"
# Never commit API keys to version control
echo "*.env" >> .gitignore
echo "api_keys.json" >> .gitignore# Enable sandbox mode for untrusted documents
jaegis-ai-web-os build --base untrusted.docx --sandbox
# Validate document sources
jaegis-ai-web-os analyze --security-check document.pdf# Use HTTPS for all API communications
export MCP_USE_HTTPS="true"
# Configure proxy if needed
export HTTPS_PROXY="https://proxy.company.com:8080"- GitHub Actions: Automated security scanning on every commit
- Dependency Scanning: Daily vulnerability checks with Safety and Bandit
- Code Analysis: Static analysis with Semgrep and CodeQL
- Secret Scanning: Automatic detection of committed secrets
- Code Reviews: All changes reviewed for security implications
- Penetration Testing: Regular security assessments
- Dependency Audits: Manual review of new dependencies
- Architecture Reviews: Security review of major changes
- Vulnerability Alerts: Automated alerts for new vulnerabilities
- Security Metrics: Tracking of security-related metrics
- Incident Response: Documented incident response procedures
- Threat Intelligence: Monitoring of relevant security threats
- No hardcoded secrets or API keys
- Input validation for all user inputs
- Proper error handling without information disclosure
- Secure file handling and path validation
- No use of dangerous functions (eval, exec, etc.)
- Dependencies are up-to-date and secure
- Security tests included for new features
- Run security linters (bandit, semgrep)
- Test with malicious inputs
- Verify access controls
- Check for information disclosure
- Test error handling
- Validate file upload security
- β Using
eval()orexec()with user input - β Hardcoding secrets in source code
- β Insufficient input validation
- β Exposing sensitive information in error messages
- β Using deprecated or vulnerable dependencies
- β Default passwords or API keys
- β Overly permissive file permissions
- β Unencrypted storage of sensitive data
- β Logging sensitive information
- β Insecure temporary file handling
We appreciate security researchers who help improve our security:
- Security researchers who responsibly disclose vulnerabilities will be acknowledged
- Public recognition (with permission) in our security advisories
- Contribution to the security of the open-source community
We follow responsible disclosure practices:
- Coordination: Work with reporters to understand and fix issues
- Attribution: Credit researchers who follow responsible disclosure
- Transparency: Public disclosure after fixes are available
- Learning: Use reports to improve our security practices
- Primary: security@usemanusai.com
- GitHub: Security Advisories
- Response Time: 24 hours for initial response
- Languages: English (primary), Spanish, French
- OWASP Top 10
- NIST Cybersecurity Framework
- GitHub Security Best Practices
- Python Security Guidelines
- Node.js Security Best Practices
Last Updated: August 6, 2025
Version: 1.0
Next Review: February 6, 2026