We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 0.1.x | β |
To report a security issue, please email: [email protected]
When reporting a vulnerability, please provide:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Affected versions (if known)
- Suggested fix (if you have one)
- Your contact information for follow-up
We take security seriously and will respond promptly:
- Acknowledgment within 48 hours
- Initial assessment within 1 week
- Regular updates on our progress
- Public disclosure coordinated with you
- Credit in the security advisory (unless you prefer anonymity)
When using Hopx SDKs, follow these guidelines:
- Never commit API keys to version control
- Use environment variables (
HOPX_API_KEY) - Rotate keys regularly
- Use separate keys for development/production
- Set appropriate timeout limits to prevent runaway processes
- Disable internet access when not needed
- Monitor resource usage (CPU, memory, disk)
- Use templates instead of running arbitrary code when possible
- Validate user input before execution
- Sanitize file paths and commands
- Limit execution time with timeouts
- Log all code executions for audit trails
- Use HTTPS for all API communications (enforced)
- Validate SSL certificates
- Don't expose sandbox internal IPs
- Keep SDK up to date with latest versions
- Regularly check for security advisories
- Use
pip install --upgrade hopx-aiornpm update @hopx-ai/sdk
- Sandboxes are VM-isolated but share infrastructure
- Not suitable for highly sensitive cryptographic operations
- Network isolation can be configured per sandbox
- Code and files are temporary and deleted after timeout
- Logs are retained for 30 days for debugging
- API keys are never logged
- Rate limits prevent abuse and DDoS
- Contact support for custom limits if needed
Security updates are released as:
- Patch versions (e.g., 0.1.19 β 0.1.20) for minor fixes
- Minor versions (e.g., 0.1.x β 0.2.0) for significant changes
Subscribe to our security mailing list: [email protected]
We currently don't have a formal bug bounty program, but we:
- Appreciate responsible disclosure
- Acknowledge contributors in security advisories
- May provide swag or credits for significant findings
- Security Issues: [email protected]
- General Support: [email protected]
- PGP Key: Available upon request
Hopx follows industry best practices:
- SOC 2 Type II (in progress)
- GDPR compliant data handling
- ISO 27001 aligned security controls
Thank you for helping keep Hopx secure! π