Lasso RPC is currently in initial release. We support the latest version with security updates.
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Please do not open public GitHub issues for security vulnerabilities.
To report a security vulnerability, please email: jaxernst@gmail.com
What to include in your report:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
When deploying Lasso RPC in production, follow these security best practices:
- Never commit API keys to version control
- Use proper secrets management (HashiCorp Vault, AWS Secrets Manager, etc.)
- Rotate API keys regularly
- Use
.envfiles for local development only (never in production)
- Deploy behind a reverse proxy (nginx, Caddy, Traefik)
- Enable TLS/SSL for all external traffic
- Use firewalls to restrict access to sensitive endpoints
- Consider network isolation for internal services
- The dashboard is currently read-only and does not require authentication
- If you add admin API endpoints, you must implement authentication
- Recommended auth methods:
- OAuth2 via reverse proxy (Cloudflare Access, Auth0, etc.)
- mTLS for machine-to-machine communication
- API key validation middleware
- Network-level isolation (VPN, internal-only access)
- Vet upstream RPC providers before adding them
- Use API keys for provider authentication when available
- Monitor provider responses for unexpected behavior
- Implement rate limiting at the proxy level
- Run containers as non-root user
- Keep base images updated
- Scan images for vulnerabilities
- Use read-only filesystems where possible
- Enable structured logging
- Monitor for unusual traffic patterns
- Set up alerts for circuit breaker trips
- Track rate limit violations
- Configure appropriate
default_rps_limitanddefault_burst_limitin profiles - Consider per-IP rate limiting at the reverse proxy level
- Monitor for abuse patterns
Lasso RPC does not include built-in authentication. The dashboard is designed for internal use or trusted environments. If you expose Lasso publicly, you must:
- Implement authentication at the reverse proxy level, OR
- Use network-level isolation (VPN, internal network only), OR
- Accept that dashboard metrics are publicly visible (read-only)
When a security issue is reported and confirmed:
- We will develop a fix and test it internally
- We will coordinate with the reporter on disclosure timing
- We will release a patch and publish a security advisory
- We will credit the reporter (unless they prefer anonymity)
Subscribe to security advisories:
- Watch this repository's security advisories on GitHub
- Follow releases for security patch notes
For security concerns: jaxernst@gmail.com For general questions: Open a GitHub issue