Skip to content

Security: PlumoAI/plumoai

Security

SECURITY.md

πŸ” Security Policy

Security is a critical priority for the PlumoAI platform.

PlumoAI is designed to run AI Employees inside company infrastructure, which means protecting systems, data, and integrations is essential.

This document explains how to report security vulnerabilities and how the PlumoAI team handles security issues.


πŸ›‘ Supported Versions

Security updates are provided for the latest stable release of PlumoAI.

Version Supported
Latest Release βœ… Supported
Older Versions ⚠ Limited Support
Deprecated Versions ❌ Not Supported

Users are encouraged to always run the latest version of the platform.


🚨 Reporting a Security Vulnerability

If you discover a security vulnerability in PlumoAI, please do not create a public GitHub issue.

Instead, report the issue directly to the security team.

πŸ“§ Email: support@plumoai.com

Please include the following information:

β€’ Description of the vulnerability β€’ Steps to reproduce the issue β€’ Potential impact β€’ Suggested mitigation if available β€’ Screenshots or logs if relevant

Responsible disclosure helps protect the entire community.


⏱ Response Timeline

Once a vulnerability report is received, the PlumoAI team will follow this process.

1️⃣ Confirm receipt of the report 2️⃣ Investigate and validate the vulnerability 3️⃣ Develop and test a fix 4️⃣ Release a security update 5️⃣ Notify affected users

We aim to respond to vulnerability reports within 72 hours.


πŸ”’ Security Best Practices

Organizations running PlumoAI should follow security best practices.

Recommended practices include:

βœ” Deploy PlumoAI in a secure infrastructure environment βœ” Restrict access to administrative interfaces βœ” Use secure API keys for integrations βœ” Monitor logs and system activity βœ” Keep Docker images updated

These practices help maintain a secure deployment.


πŸ” Infrastructure Security

PlumoAI deployments typically involve:

Docker containers External integrations through App AI Agents Authorization systems controlling employee actions

Organizations should ensure proper access controls and infrastructure security policies are applied.


🧠 AI Employee Security Considerations

AI Employees interact with business systems and external tools.

To maintain safe operations:

βœ” Use proper authorization controls βœ” Limit access to sensitive systems βœ” Monitor actions performed by AI Employees βœ” Apply least privilege access principles

This ensures AI Employees operate safely within company environments.


🀝 Responsible Disclosure

We appreciate security researchers and community members who help improve the security of PlumoAI.

Responsible disclosure helps ensure vulnerabilities are resolved quickly while protecting users.

Please allow the PlumoAI team time to investigate and fix issues before publicly disclosing vulnerabilities.


πŸ“© Contact

For security concerns or vulnerability reports:

πŸ“§ support@plumoai.com


PlumoAI is committed to building secure infrastructure for Autonomous AI Employees.

There aren’t any published security advisories