We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 0.x.x | ✅ |
We take the security of Forge seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Open a public GitHub issue for security vulnerabilities
- Discuss the vulnerability publicly until it has been addressed
- Report via GitHub Security Advisories: Use the Security tab in the GitHub repository
- Or email us: If you prefer email, contact the maintainers via GitHub
- Provide details: Include as much information as possible:
- Type of vulnerability
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
- Assessment: We will send an assessment of the vulnerability within 7 days
- Fix Timeline: We will work on a fix and keep you updated on progress
- Disclosure: We will coordinate with you on the disclosure timeline
- Credit: We will credit you in the release notes (unless you prefer to remain anonymous)
When using Forge in your applications:
- API Keys: Never commit API keys or sensitive credentials to version control
- Input Validation: Always validate user input before passing to agents
- Rate Limiting: Implement rate limiting when exposing agent functionality via APIs
- Tool Execution: Be cautious when allowing custom tool execution, especially in production
- Dependencies: Keep dependencies up to date and monitor for security advisories
- Environment Variables: Use environment variables for configuration, not hardcoded values
- Prompt Injection: Agents may be vulnerable to prompt injection attacks. Sanitize user inputs
- Data Exposure: Be careful about what data is included in prompts sent to LLM providers
- Tool Abuse: Custom tools should be carefully reviewed for security implications
- Cost Control: Implement cost controls to prevent abuse of LLM API calls
- Tool Execution: Tools execute in the same process - ensure custom tools are trustworthy
- Memory Management: Conversation history may contain sensitive information
- Error Messages: Error messages may leak information about your system
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find similar problems
- Prepare fixes for all supported versions
- Release patches as soon as possible
We appreciate your efforts to responsibly disclose your findings and will make every effort to acknowledge your contributions.