This security policy covers the amiable-templates documentation site and its build infrastructure. For security issues in individual template repositories, please report to those repositories directly.
We take security seriously. If you discover a security vulnerability, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please report vulnerabilities via one of these methods:
-
GitHub Security Advisories (Preferred)
- Go to the Security tab
- Click "Report a vulnerability"
- Fill out the private security advisory form
-
Email
- Send details to: security@amiable.dev
Please include:
- Description of the vulnerability
- Steps to reproduce
- Affected components (build scripts, CI/CD, dependencies)
- Potential impact
- Any suggested fixes (optional)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 90 days (depending on severity)
This documentation site aggregates content from multiple repositories. Security measures include:
- Curated Sources Only: Only repositories listed in
templates.yamlare fetched - No Code Execution: Aggregated content is markdown only, no executable code
- CI-Time Fetch: Content is fetched at build time, not runtime
- Dependency Scanning: Automated via Dependabot and Snyk
- All actions pinned to specific SHA versions
- Minimal permissions (least privilege)
- No secrets exposed to fork PRs
- Gitleaks scanning for secret detection
Report to the appropriate upstream repository for:
- LiteLLM vulnerabilities: litellm/litellm
- Langfuse vulnerabilities: langfuse/langfuse
- MkDocs vulnerabilities: mkdocs/mkdocs
- Template-specific issues: See individual template repositories
- Never commit API keys or secrets
- Use
.envfiles (git-ignored) for local development - Review diffs before pushing
Install pre-commit hooks to catch secrets before they're committed:
pip install pre-commit
pre-commit installThis enables:
- Gitleaks: Secret detection
- YAML lint: Configuration validation
We thank the security researchers who have helped improve the security of our projects:
- (Your name could be here!)