We release patches for the current major specification version. Security-related clarifications are documented in the spec and changelog.
6b67a4cffcf7cc30e01f8845ccca823dedef6025 | Version | Supported | | ------- | ------------------ | | 0.02.x | ✅ | | < 0.02 | ❌ |
<<<<<<< HEAD Please do NOT report security vulnerabilities through public GitHub issues.
If you believe you have found a security vulnerability in AAP protocol or its implementations, please report it to us privately:
Email: [email protected] (or use GitHub's private vulnerability reporting if enabled)
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Your contact information
- Initial response: Within 48 hours
- Assessment: Within 7 days
- Fix development: Depends on severity
- Public disclosure: Coordinated with reporter
- Validate
fromaddresses to prevent spoofing - Use HTTPS for all endpoints
- Implement rate limiting to prevent abuse
- Secure API key storage and rotation
- Consider E2EE for private messages using recipient's
public_key - Validate message integrity (signatures if implemented)
- Sanitize message content to prevent injection attacks
- Prevent address squatting with appropriate registration policies
- Implement address verification mechanisms
- Monitor for malicious addresses
- Regularly audit your AAP implementation
- Keep dependencies updated
- Implement logging and monitoring
- Have a security incident response plan
- Verify resolved addresses before sending messages
- Implement retry logic with exponential backoff
- Validate message responses
- Keep your implementation updated
If you believe you have found a security issue in the protocol specification or in documentation that could lead to misuse (e.g., spoofing, privacy leaks), please report it responsibly:
- Do not open a public GitHub issue for security-sensitive findings.
- Open a private security advisory: GitHub Security Advisories.
- Or email the maintainers if you prefer (see repository profile).
We will acknowledge your report and work on a fix or clarification. For protocol-level issues we may publish an errata or patch version and credit you (unless you prefer to remain anonymous).
Thank you for helping keep AAP and its implementations safe.
6b67a4cffcf7cc30e01f8845ccca823dedef6025