If you discover a security vulnerability in any of the workspace examples in this repository, please report it privately so we can address it before public disclosure.
Please do not open a public GitHub issue for security reports.
You can report privately in either of two ways:
- GitHub private vulnerability reporting (preferred) — open an advisory at github.com/friday-platform/friday-studio-examples/security/advisories/new. The report stays private until we publish it.
- Email — send the details to security@hellofriday.ai.
Either way, please include:
- A description of the issue and the example(s) affected
- Steps to reproduce, or a proof of concept
- The impact you believe it has (data exposure, credential leakage, code execution, etc.)
- Any suggested remediation
You can expect an initial acknowledgement within 3 business days. We will keep you updated as we investigate and prepare a fix, and will credit you in the release notes once the fix ships, unless you prefer to remain anonymous.
This repository contains example Friday workspaces — workspace.yml files, prompts, and supporting docs. In-scope reports cover issues in the contents of this repo, such as:
- Hardcoded credentials, secrets, or personal data committed to any example
- Example
workspace.ymlfiles that reference untrusted or attacker-controllable resources
Out of scope: the Friday desktop app, upstream MCP servers, and third-party services that examples connect to. Report those to their respective maintainers.
These workspaces are starting points, not hardened production templates. When importing an example:
- Review the
workspace.ymland any prompts before granting credentials - Use scoped tokens (read-only where possible) rather than account-wide credentials
- Run examples that touch destructive actions (delete, send, post) in a test account first