The AxonFlow team takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
Please DO NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message.
Please include the following information in your report:
- Type of vulnerability (e.g., SQL injection, XSS, authentication bypass)
- Full paths of source file(s) related to the manifestation of the vulnerability
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the vulnerability
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
This information will help us triage your report more quickly.
- Initial Response: Within 48 hours of report
- Triage: Within 5 business days, we will confirm the vulnerability and determine severity
- Fix Development: Depends on severity (Critical: 7 days, High: 14 days, Medium: 30 days)
- Public Disclosure: After fix is deployed and users have time to update (typically 30-90 days)
We use the following severity levels:
- Critical: Vulnerabilities that allow remote code execution, complete system compromise, or unauthorized data access at scale
- High: Vulnerabilities that allow significant unauthorized access to data or system functionality
- Medium: Vulnerabilities that allow limited unauthorized access or minor information disclosure
- Low: Vulnerabilities with minimal security impact
We follow responsible disclosure practices:
- We will acknowledge your email within 48 hours
- We will confirm the vulnerability and determine its severity
- We will work on a fix and keep you updated on progress
- Once a fix is ready, we will coordinate the release timeline with you
- We will publicly acknowledge your contribution (unless you prefer to remain anonymous)
We currently do not have a formal bug bounty program. However, we deeply appreciate security researchers' efforts and will:
- Publicly acknowledge security researchers who report valid vulnerabilities (with permission)
- Consider offering rewards for critical vulnerabilities on a case-by-case basis
- Provide AxonFlow swag and extended trial licenses to researchers who help improve our security
The following are in scope for security reports:
- AxonFlow Agent (API gateway component)
- AxonFlow Orchestrator (routing and policy enforcement)
- AxonFlow SDKs (TypeScript, Go)
- Customer Portal (backend and frontend)
- MCP Connectors (PostgreSQL, Redis, Salesforce, Snowflake, Amadeus, etc.)
- AWS Marketplace CloudFormation templates
- Docker images and deployment configurations
The following are out of scope:
- Denial of Service (DoS) attacks
- Social engineering attacks
- Physical attacks against AxonFlow infrastructure
- Issues in third-party dependencies (report these to the upstream project)
- Issues requiring physical access to user devices
AxonFlow implements a prevention-first security architecture with sub-10ms inline governance. Unlike passive monitoring tools that detect issues after damage is done, AxonFlow provides active prevention through real-time intervention.
For detailed information, see:
- Defense in Depth: Multiple layers of security controls
- Least Privilege: Minimal permissions by default
- Zero Trust: Verify every request, never assume trust
- Encryption Everywhere: Data protected at rest and in transit
- Audit Everything: Immutable logs for compliance
- Fail Secure: System defaults to secure state on errors
- External → Agent: Public internet to API gateway (TLS 1.3)
- Agent → Orchestrator: Internal network (mutual TLS optional)
- Orchestrator → Database: Encrypted connections (SSL required)
- Orchestrator → LLM Providers: HTTPS with API key rotation
AxonFlow includes comprehensive security features by default:
- License Key Authentication: HMAC-SHA256 signed keys with expiration
- Service Identity System: Granular permissions for MCP connector access
- RBAC/ABAC Enforcement: Role and attribute-based access control
- API Key Rotation: Automated key rotation with zero downtime
- Row-Level Security (RLS): Database-level multi-tenant isolation
- PII Detection & Redaction: Real-time content filtering to prevent data leakage
- Encryption at Rest: AES-256 encryption for all stored data
- Encryption in Transit: TLS 1.3 for all network communication
- Multi-Tenant Isolation: Complete logical separation between tenants
- Static Policies (Agent): Sub-10ms enforcement at the edge
- Dynamic Policies (Orchestrator): Context-aware policy evaluation
- Content Filtering: SQL injection, XSS, and malicious prompt prevention
- Rate Limiting: Redis-backed distributed rate limiting per tenant
- Immutable Audit Logs: Append-only logs with cryptographic verification
- Compliance Mode: Synchronous audit logging for regulated industries
- Retention Policies: Configurable log retention (7-365 days)
- GDPR Compliance: Data residency, right to deletion, data portability
- VPC Isolation: Private subnets for all internal components
- Security Groups: Least-privilege firewall rules
- Network ACLs: Additional network-level protection
- VPC Endpoints: Private connectivity to AWS services (no internet exposure)
- WAF Integration: Web Application Firewall for edge protection (optional)
- Secrets Management: AWS Secrets Manager for all credentials
- Parameter Store: Encrypted configuration with versioning
- IAM Roles: Instance roles instead of long-lived credentials
- CloudTrail Logging: All API calls logged for audit
- GuardDuty: Threat detection and continuous monitoring
- Database: AES-256 encryption via AWS RDS encryption
- S3 Storage: AES-256 server-side encryption (SSE-S3 or SSE-KMS)
- Secrets: AES-256 encryption via AWS Secrets Manager
- EBS Volumes: AES-256 encryption for all attached volumes
- External APIs: TLS 1.3 with strong cipher suites only
- Internal Communication: TLS 1.2+ (configurable to mutual TLS)
- Database Connections: SSL/TLS required for PostgreSQL
- Redis: TLS encryption for cache connections
- License Keys: HMAC-SHA256 with Ed25519 signatures
- Secrets Rotation: Automated rotation via AWS Secrets Manager
- KMS Integration: AWS KMS for envelope encryption
- HSM Support: CloudHSM for regulated industries (optional)
- GDPR Ready: Data residency controls, right to deletion, data portability
- EU AI Act Ready: Risk classification, transparency, audit trails
- SOC 2 Type II: In progress (target: Q2 2025)
- HIPAA: Architecture supports HIPAA compliance (BAA available)
- ISO 27001: In progress (target: Q3 2025)
- Data Residency: Deploy in EU (Frankfurt) or US regions
- Audit Trails: Immutable logs with cryptographic verification
- Access Controls: RBAC with separation of duties
- Retention Policies: Configurable retention for compliance requirements
- Compliance Reporting: Automated reports for auditors
- Code Review: All changes require peer review before merge
- Static Analysis: Automated linting (golangci-lint, gosec)
- Dependency Scanning: Automated vulnerability scanning (Trivy, Dependabot)
- Secret Scanning: Pre-commit hooks to prevent credential leaks
- Security Testing: Dedicated security test suites
- Automated Testing: All tests must pass before merge
- Security Scanning: Trivy scans on every build
- Code Coverage: Minimum 70% coverage enforced
- Signed Commits: GPG signing for releases (recommended)
- Immutable Builds: Docker images tagged with git commit SHA
- Minimal Dependencies: Reduce attack surface with fewer dependencies
- Pinned Versions: Exact version pinning in go.mod
- Vulnerability Scanning: Automated CVE detection via Dependabot
- Update Policy: Security updates applied within 7 days of disclosure
- License Compliance: Automated license checking (go-licenses)
- Least Privilege IAM: Minimal permissions for each component
- Encrypted Storage: All RDS, EBS, S3 encrypted by default
- Private Subnets: All compute resources in private subnets
- Security Groups: Whitelist-only ingress rules
- Secrets Management: No hardcoded secrets in templates
- Minimal Base Images: Alpine Linux for reduced attack surface
- Non-Root User: Containers run as non-root by default
- Image Scanning: Trivy scanning on all Docker images
- Signed Images: Docker Content Trust for production images
- Immutable Tags: Images tagged with git SHA, never
latest
- RDS Multi-AZ: Automatic failover for database
- ECS Multi-AZ: Services deployed across multiple availability zones
- Load Balancer: Application Load Balancer with health checks
- Auto-Healing: Automatic replacement of unhealthy containers
If you're deploying AxonFlow:
-
Use Strong Secrets
- Generate cryptographically secure JWT secrets (minimum 32 bytes)
- Use AWS Secrets Manager random password generation
- Never commit secrets to version control
-
Enable HTTPS
- Always use TLS/SSL in production (CloudFormation templates enforce this)
- Use AWS Certificate Manager for free SSL certificates
- Enable HTTP to HTTPS redirect
-
Rotate Credentials
- Rotate license keys at least annually
- Enable AWS Secrets Manager automatic rotation
- Rotate database passwords every 90 days
-
Monitor Audit Logs
- Review audit logs regularly for suspicious activity
- Set up CloudWatch alarms for anomalies
- Export logs to SIEM for long-term analysis
-
Update Regularly
- Keep AxonFlow updated to the latest stable version
- Subscribe to security advisories
- Test updates in staging before production
-
Restrict Network Access
- Use VPC configurations to limit access to internal networks only
- Use security groups to whitelist specific IP ranges
- Enable VPC endpoints to avoid internet exposure
-
Enable Compliance Mode
- Use synchronous audit logging for regulated industries
- Configure appropriate log retention periods
- Enable PII redaction for sensitive data
- All resources deployed in private subnets
- Security groups configured with least privilege
- VPC endpoints enabled for AWS services
- Load balancer scheme set to
internalfor same-VPC deployments - CloudTrail enabled for API audit logging
- VPC Flow Logs enabled for network monitoring
Security updates will be released as follows:
- Critical vulnerabilities: Immediate patch release
- High severity vulnerabilities: Patch within 14 days
- Medium/Low severity vulnerabilities: Included in next regular release
Security advisories will be published at:
- GitHub Security Advisories: https://github.com/axonflow/axonflow/security/advisories
- Email notifications to registered users
- Blog post at https://getaxonflow.com/blog
- Automated Monitoring: CloudWatch alarms for anomalies
- Audit Log Analysis: Continuous scanning for suspicious patterns
- Health Checks: Automated health monitoring every 30 seconds
- GuardDuty: AWS threat detection service
In the event of a security incident:
-
Immediate Containment
- Isolate affected systems
- Disable compromised credentials
- Enable additional logging
-
Investigation
- Preserve evidence (logs, snapshots)
- Determine scope and impact
- Identify root cause
-
Remediation
- Apply security patches
- Rotate all potentially compromised credentials
- Update security controls
-
Recovery
- Restore services from known-good backups
- Verify system integrity
- Resume normal operations
-
Post-Incident Review
- Document lessons learned
- Update security controls
- Notify affected parties (if required)
If you operate AxonFlow:
- Monitor CloudWatch logs and alarms
- Review audit logs regularly
- Maintain incident response plan
- Keep emergency contact list updated
- Test backup and recovery procedures
For security-related questions or concerns:
- Email: [email protected]
- Public inquiries: GitHub Discussions (for non-sensitive security topics)
We would like to thank the following security researchers for responsibly disclosing vulnerabilities:
(List will be updated as researchers report issues)
- Contributing Guide - How to contribute securely
- Changelog - Security updates and fixes
- AxonFlow Security Architecture
- Deployment Security Guide
- Enterprise Security Configuration - HMAC secrets, self-hosted mode
- RLS Architecture
- Audit Logging Architecture
- Service Identity Architecture
Last Updated: December 5, 2025 Version: 2.1