| Version | Supported |
|---|---|
| main | ✅ |
If you discover a security vulnerability, please report it by:
- DO NOT open a public issue
- Email the maintainers directly or use GitHub's private vulnerability reporting
- Include detailed steps to reproduce the issue
NEVER commit secrets to the repository:
GOOGLE_API_KEY- Gemini API accessGOOGLE_CLOUD_PROJECT- GCP project IDLANGCHAIN_API_KEY- LangSmith (optional)
Use these methods instead:
# Local development
cp .env.example .env
# Edit .env with your keys
# GitHub Actions
# Add secrets in Settings > Secrets and variables > ActionsWhen deploying MCP servers:
- Always use HTTPS in production
- Implement authentication (API keys, OAuth)
- Validate all tool inputs
- Rate limit tool invocations
- Sanitize tool outputs
Agent-to-agent communication should:
- Use HTTPS/TLS for all connections
- Validate Agent Cards before trusting
- Implement proper authorization (JWT, API keys)
- Log all inter-agent communications
- Never expose internal agent state
- Use least-privilege IAM roles
- Enable Cloud Audit Logs
- Store secrets in Secret Manager
- Use Workload Identity for authentication
- Enable VPC Service Controls for sensitive workloads
The following paths require extra scrutiny:
.github/workflows/- CI/CD configurationtools/- Release automation**/agents/bridge.py- Critical interop code**/mcp/server.py- External exposure
This project uses:
- Dependabot for dependency updates
- Bandit for Python security linting
- Safety for known vulnerabilities
- Pre-commit hooks for secret detection