| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability in Hive, please report it responsibly:
- Do not open a public issue
- Email the maintainer directly at [security vulnerability reporting email]
- Include:
- Description of the vulnerability
- Steps to reproduce (if applicable)
- Potential impact
- Suggested fix (if any)
You can expect:
- Acknowledgment within 48 hours
- Regular updates on the progress
- Credit in the release notes (if desired) after the fix is released
When using Hive in production:
- Checkpoint data may contain sensitive information
- Use encrypted storage for checkpoint persistence
- Implement appropriate access controls for checkpoint stores
- Review and validate all tool definitions before exposing to LLMs
- Implement rate limiting for LLM API calls
- Monitor token usage and associated costs
- Validate all inputs to graph nodes
- Sanitize data before storing in channels
- Be cautious with dynamic content in LLM prompts
- Least Privilege: Run Hive with minimal necessary permissions
- Audit Logging: Enable logging for security-relevant events
- Resource Limits: Set appropriate
maxStepslimits to prevent infinite loops - Error Handling: Don't expose internal error details to end users