| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| 0.1.x | ❌ |
We take security seriously. If you discover a security vulnerability in Quorum, please report it responsibly.
- Do NOT open a public issue for security vulnerabilities
- Email the maintainers directly or use GitHub's private vulnerability reporting feature
- Include as much information as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Assessment: We will assess the vulnerability and determine its severity
- Updates: We will keep you informed of our progress
- Fix: We will work on a fix and coordinate disclosure with you
- Credit: With your permission, we will credit you in the release notes
Security issues we're interested in:
- Authentication/authorization bypasses
- Code injection vulnerabilities
- Sensitive data exposure
- Dependency vulnerabilities with actual impact
- API key exposure (users are responsible for their own keys)
- Issues requiring physical access
- Social engineering attacks
- Denial of service attacks that require significant resources
- Protect your API keys: Never commit
.envfiles or share API keys - Use environment variables: Store sensitive data in environment variables
- Keep dependencies updated: Run
pip install -Uregularly - Review file context: Be cautious when using
/filecommand with sensitive files
We regularly monitor and update dependencies for security patches. If you notice an outdated dependency with known vulnerabilities, please open an issue.