| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in Isartor, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please email security@isartor.ai with:
- A description of the vulnerability
- Steps to reproduce or a proof-of-concept
- The version(s) affected
We will acknowledge your report within 48 hours and aim to provide a fix or mitigation within 7 days for critical issues.
The following are in scope:
- The
isartorbinary and its HTTP gateway - The CONNECT proxy (TLS MITM) functionality
- Configuration file parsing and secret handling
- Docker images published to
ghcr.io/isartor-ai/isartor
- Never commit API keys or secrets to the repository
- Use
isartor set-keyor*_FILEenvironment variables for secret management - Run Isartor behind a reverse proxy in production
- Keep your installation up to date