| Version | Supported |
|---|---|
| 0.x.x | Yes |
As aix is currently in pre-1.0 development, security updates are provided for the latest release only. Once we reach 1.0, we will maintain security support for the current major version and the previous major version.
We take security vulnerabilities seriously. Please report them responsibly.
- Go to the Security Advisories page
- Click "Report a vulnerability"
- Fill out the form with as much detail as possible
This method allows for private discussion and coordinated disclosure.
If you cannot use GitHub Security Advisories, email your report to:
Use the subject line: [SECURITY] aix vulnerability report
Please provide as much of the following as possible:
- Description: Clear explanation of the vulnerability
- Impact: What an attacker could achieve
- Affected versions: Which versions are vulnerable
- Reproduction steps: Detailed steps to reproduce the issue
- Proof of concept: Code or commands that demonstrate the vulnerability
- Suggested fix: If you have recommendations for remediation
| Stage | Timeframe |
|---|---|
| Acknowledgment | Within 48 hours |
| Initial assessment | Within 7 days |
| Target fix for critical issues | Within 30 days |
| Target fix for other issues | Within 90 days |
Timelines may vary based on complexity. We will keep you informed of progress.
We follow coordinated disclosure:
- Private report: You report the vulnerability privately
- Acknowledgment: We confirm receipt and begin investigation
- Fix development: We develop and test a fix
- Release: We release the fix with a security advisory
- Public disclosure: Details are made public after users have had reasonable time to update (typically 30 days post-fix)
We request that you:
- Allow us reasonable time to address the issue before public disclosure
- Avoid exploiting the vulnerability beyond what's necessary for demonstration
- Do not access or modify other users' data
We will:
- Credit you in the security advisory (unless you prefer anonymity)
- Keep you informed throughout the process
- Not take legal action against researchers acting in good faith
aix and the AI assistants it manages store sensitive information (API keys, MCP tokens) in configuration files.
- Restrict File Permissions: Ensure configuration files like
~/.config/aix/config.yamland~/.claude.jsonhave restricted permissions. Runchmod 600 <file>to ensure only your user can read/write them. - Environment Variables: Prefer referencing environment variables (e.g.,
"${GITHUB_TOKEN}") in your MCP configurations instead of hardcoding tokens. - Never Commit Secrets: Be careful not to commit your global or project-level AI configuration files to public repositories.
When using aix repo add, you are downloading and caching instructions and configurations from remote sources.
- Trust but Verify: Only add repositories from sources you trust.
- Audit Skills: Before installing a skill from a community repository, review its
SKILL.mdto ensure it doesn't contain malicious instructions or request excessive tool permissions. - Private Repositories: Use SSH URLs for private repositories to leverage your existing git authentication.
This project uses automated security scanning:
- CodeQL: Static analysis for security vulnerabilities in Go code, runs on every pull request and push to main
- Dependabot: Automated dependency updates to address known vulnerabilities in dependencies
Security scan results are reviewed by maintainers. Critical findings block merges until resolved.
For general security questions (not vulnerability reports), open a GitHub issue.