Security Policy
If you believe you’ve found a security issue in crocbot, please report it privately.Reporting
- Use GitHub Security Advisories to report privately.
- What to include: reproduction steps, impact assessment, and (if possible) a minimal PoC.
Operational Guidance
For threat model + hardening guidance (includingcrocbot security audit --deep and --fix), see:
https://aiwithapex.mintlify.app/gateway/security
Web Interface Safety
crocbot’s web interface is intended for local use only. Do not bind it to the public internet; it is not hardened for public exposure.Runtime Requirements
Node.js Version
crocbot requires Node.js 22.12.0 or later (LTS). This version includes important security patches:- CVE-2025-59466: async_hooks DoS vulnerability
- CVE-2026-21636: Permission model bypass vulnerability
Docker Security
When running crocbot in Docker:- The official image runs as a non-root user (
node) for reduced attack surface - Use
--read-onlyflag when possible for additional filesystem protection - Limit container capabilities with
--cap-drop=ALL
Security Scanning
This project usesdetect-secrets for automated secret detection in CI/CD.
See .detect-secrets.cfg for configuration and .secrets.baseline for the baseline.
Run locally:
