We take the security of abyssbook seriously. If you believe you have found a security vulnerability, please report it to us through coordinated disclosure.
Please do not report security vulnerabilities through public GitHub issues, discussions, or pull requests.
Instead, please send an email to security@aldrin.com with the following information:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Remote code execution vulnerabilities
- Authentication bypass
- Privilege escalation
- Data corruption or loss
- Financial/orderbook manipulation
- Cross-site scripting (XSS)
- SQL injection
- Unauthorized data access
- CLI injection vulnerabilities
- Blockchain transaction manipulation
- Information disclosure
- Denial of service
- CSRF vulnerabilities
- Input validation errors
- Configuration issues
- Minor information leaks
- Non-exploitable bugs
As of the latest audit, abyssbook uses zero external third-party dependencies, relying exclusively on Zig's standard library. This significantly reduces our attack surface.
-
Before Adding Dependencies:
- Security review required for all new dependencies
- Check CVE databases and security advisories
- Evaluate dependency maintenance status
- Document security rationale in PR description
-
Ongoing Monitoring:
- Automated vulnerability scanning in CI pipeline
- Regular dependency audits (monthly)
- Subscribe to security advisories for all dependencies
- Immediate response to critical vulnerabilities
-
Update Process:
- Security updates prioritized over feature updates
- Test all updates in isolated environment
- Verify no regressions in security-critical components
- Document all security-related changes
- All code changes require security-focused review
- Special attention to input validation and sanitization
- Review CLI argument parsing for injection vulnerabilities
- Validate blockchain transaction handling
- Security tests for all public interfaces
- Fuzz testing for input parsing
- Integration tests for blockchain operations
- CLI security validation tests
- Reproducible builds when possible
- Secure CI/CD pipeline configuration
- Regular security scanning in automated builds
- No secrets in source code or build artifacts
We provide security updates for the following versions:
| Version | Supported |
|---|---|
| main branch | ✅ |
| Latest release | ✅ |
| Previous release | ✅ |
| Older versions | ❌ |
- Input Validation: All CLI inputs validated and sanitized
- Memory Safety: Zig's memory safety features enabled
- Logging: Security events logged for monitoring
- Error Handling: Secure error handling prevents information leaks
- Transaction Validation: All blockchain transactions validated
- API Security: HTTPS required for blockchain API calls
- Key Management: Secure key handling practices
- Rate Limiting: Protection against API abuse
- Dependency vulnerability scanning
- Static code analysis
- Security test automation
- Performance monitoring for DoS detection
- Quarterly security audits
- Code review for security implications
- Third-party security assessments (when needed)
- Penetration testing (planned)
- Security Lead: Primary contact for security issues
- Development Team: Code fixes and patches
- Operations Team: Deployment and monitoring
- Communication Team: User notifications and advisories
- Detection: Vulnerability identified or reported
- Assessment: Severity evaluation and impact analysis
- Containment: Immediate measures to limit exposure
- Remediation: Develop and test fixes
- Deployment: Release security updates
- Communication: Notify users and document changes
- Post-Incident: Review and improve processes
zig fmtfor consistent code formattingzig testfor comprehensive testing- Static analysis tools for Zig
- Custom fuzzing for input validation
- Security Email: security@aldrin.com
- General Contact: team@aldrin.com
- Public Discussion: GitHub Discussions (for non-sensitive topics)
Last Updated: 2025-06-17
Next Review: 2025-09-17