We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take the security of ArchiGram.ai seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Open a public GitHub issue for security vulnerabilities
- Disclose the vulnerability publicly before we've had a chance to fix it
- Use the vulnerability to access data that doesn't belong to you
- Email us directly at security@archigram.ai (or isatimur.work@gmail.com)
- Include as much information as possible:
- Type of issue (e.g., XSS, CSRF, injection, etc.)
- Full paths of source file(s) related to the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours.
- Communication: We will keep you informed of the progress towards a fix and full announcement.
- Timeline: We aim to resolve critical vulnerabilities within 7 days of disclosure.
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous).
When contributing to ArchiGram.ai, please follow these security guidelines:
- Never commit secrets, API keys, or credentials to the repository
- Use environment variables for all sensitive configuration
- Validate and sanitize all user inputs
- Use parameterized queries for database operations
- Follow the principle of least privilege
- Keep dependencies up to date
- Review security advisories for dependencies
- Use
bun auditto check for known vulnerabilities - Prefer well-maintained packages with active security practices
- Implement rate limiting for AI API calls
- Sanitize user prompts before sending to AI services
- Validate AI-generated output before rendering
- Be aware of prompt injection risks
ArchiGram.ai implements the following security measures:
- HTTPS Only: All production traffic is served over HTTPS
- Content Security Policy: Strict CSP headers to prevent XSS
- Input Validation: User inputs are validated on both client and server
- Rate Limiting: API endpoints are rate-limited to prevent abuse
- Dependency Scanning: Automated security scanning via Dependabot and CodeQL
- Privacy-First Analytics: Using Plausible Analytics (no cookies, GDPR compliant)
We believe in responsible disclosure and will work with security researchers to understand and address vulnerabilities. We appreciate your efforts to responsibly disclose your findings and will make every effort to acknowledge your contributions.
While we don't currently have a formal bug bounty program, we greatly appreciate security researchers who help improve our security. Significant findings may be rewarded at our discretion.
Thank you for helping keep ArchiGram.ai and our users safe!