Currently, we are in active development (v0.x). Security updates will be applied to the latest version.
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please report security issues privately:
- Email: Send details to the project maintainers (update with actual contact)
- GitHub Security Advisories: Use the GitHub Security Advisory feature
Please provide the following information:
- Description: Clear description of the vulnerability
- Impact: What an attacker could achieve
- Steps to Reproduce: Detailed steps to reproduce the issue
- Affected Versions: Which versions are affected
- Suggested Fix: If you have ideas on how to fix it (optional)
- Proof of Concept: Code or commands demonstrating the issue (if applicable)
- Initial Response: Within 48 hours
- Assessment: Within 1 week
- Fix Timeline: Depends on severity
- Critical: Within 7 days
- High: Within 14 days
- Medium: Within 30 days
- Low: Next release cycle
We appreciate security researchers who help keep ADS safe:
- We will acknowledge your contribution in the release notes (unless you prefer to remain anonymous)
- We may add you to a security contributors list
- NEVER commit
.envor.env.*files to version control - Store sensitive credentials securely (use password managers or secret management tools)
- Rotate API keys and tokens regularly
- Use
.env.exampleas a template, not production config
- Set proper permissions on sensitive files:
chmod 600 .env
- Ensure the Telegram bot script validates file permissions before starting
- Whitelist Users: Always set
TELEGRAM_ALLOWED_USER_IDto a specific user ID (legacy:TELEGRAM_ALLOWED_USERS) - Limit Directories: Use
ALLOWED_DIRS(全端共享)限制可访问路径 - Sandbox Mode: Use
read-onlyorworkspace-writemode unless absolutely necessaryread-only: Bot can only read filesworkspace-write: Bot can write within allowed directoriesdanger-full-access:⚠️ Use with extreme caution
- Token Security: Keep your
TELEGRAM_BOT_TOKENprivate- If leaked, immediately revoke via @BotFather
- Generate a new token
- Use separate API keys for development and production
- Implement rate limiting to prevent abuse
- Monitor API usage for anomalies
- Use environment-specific
.envfiles (.env.development,.env.production)
- Review code for potential security issues
- Look for hardcoded credentials
- Check for SQL injection, command injection, path traversal vulnerabilities
- Validate user inputs
- Keep dependencies up to date
- Run
npm auditregularly - Address high and critical vulnerabilities promptly
Before committing:
# Check for potential secrets
git diff --cached
# Use git-secrets or similar tools to prevent commits with secretsIf you accidentally commit a secret:
- Immediately revoke/rotate the credential
- Remove it from Git history using
git filter-repoorgit filter-branch - Force push (if not yet public) or notify maintainers
-
Telegram Bot Access: The bot has extensive access to configured directories. Ensure proper configuration of
ALLOWED_DIRSandTELEGRAM_SANDBOX_MODE. -
SQLite Database: Workspace databases live under the centralized ADS state dir (default
.ads/workspaces/<workspaceId>/ads.db, plus.ads/state.dbfor shared state) and may contain sensitive information. Ensure they are not committed to version control (covered by.gitignore). -
Environment Files:
.envand any overrides contain secrets. Ensure all.env*files stay out of Git..envis shared by web and Telegram; keep any overrides (e.g.,.env.local) out of version control.
- Follow the security best practices above
- Regularly review access logs
- Keep the software updated
- Report any security concerns
Security updates will be announced via:
- GitHub Security Advisories
- Release notes
- CHANGELOG.md
Subscribe to repository notifications to stay informed.
For general security questions (not vulnerabilities), feel free to:
- Open a discussion on GitHub
- Refer to our documentation in
docs/
Thank you for helping keep ADS and its users safe!