Skip to content

Security: aidevelopertraining/gowlin

Security

SECURITY.md

Security Policy

Reporting Security Vulnerabilities

Please do not report security vulnerabilities through public GitHub issues.

Instead, please report them via email to: security@aidevelopertraining.com

You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message.

What to Include

Please include the following information in your security report:

  • Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
  • Full paths of source file(s) related to the issue
  • Location of affected source code (tag/branch/commit or direct URL)
  • Step-by-step instructions to reproduce the issue
  • Proof-of-concept or exploit code (if possible)
  • Impact assessment of the issue
  • Suggested fix (if you have one)

Supported Versions

We release patches for security vulnerabilities in the following versions:

Version Supported
0.1.x
< 0.1

Security Measures

Gowlin implements multiple layers of security to protect against various threats:

1. Sandboxing

  • Firecracker microVMs provide hardware-level isolation for user code execution
  • Resource limits prevent resource exhaustion attacks (CPU, memory, disk, network)
  • Namespace isolation ensures processes cannot escape their containers
  • Seccomp filtering blocks dangerous system calls

2. Input Validation

  • Strict validation of all user inputs using Pydantic models
  • Sanitization of file paths and command arguments
  • Size limits on uploaded files and request payloads
  • Content type validation for file uploads

3. Network Security

  • Restricted egress to only approved external endpoints
  • No inbound connections from sandbox environments
  • TLS encryption for all external communications
  • Certificate pinning for critical API endpoints

4. Authentication & Authorization

  • API key authentication with proper rotation policies
  • Rate limiting to prevent abuse
  • Audit logging of all authentication attempts
  • Principle of least privilege for all operations

5. Code Security

  • Static analysis with Bandit for security vulnerabilities
  • Dependency scanning to identify vulnerable packages
  • Secrets detection to prevent credential leaks
  • Regular security audits of the codebase

6. Operational Security

  • Encrypted storage of sensitive configuration data
  • Secure key management using environment variables
  • Regular security updates for all dependencies
  • Incident response procedures for security events

Security Testing

We employ various security testing methods:

  • Static Application Security Testing (SAST) with Bandit
  • Dependency vulnerability scanning with pip-audit
  • Container security scanning with Trivy
  • Penetration testing of the sandbox environment
  • Fuzzing of input validation routines

Security Metrics

We track the following security metrics:

  • Time to patch critical vulnerabilities (target: <24 hours)
  • Number of security issues found in code review
  • Percentage of dependencies with known vulnerabilities
  • Sandbox escape attempts detected
  • Rate limiting effectiveness

Incident Response

In case of a security incident:

  1. Immediate containment of the affected systems
  2. Assessment of the scope and impact
  3. Notification of affected users within 24 hours
  4. Remediation and patch deployment
  5. Post-incident review and process improvements

Security Resources

Security Hall of Fame

We maintain a hall of fame for security researchers who have responsibly disclosed vulnerabilities:

Coming soon...

Contact Information


Thank you for helping keep Gowlin and our community safe.

There aren’t any published security advisories