| Version | Supported |
|---|---|
| 0.1.x | ✅ |
DO NOT open public issues for security vulnerabilities.
- Email: Send security reports to security@universal-connector.org (if available) or create a private security advisory on GitHub
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Response Time: We aim to respond within 48 hours
- Disclosure: Coordinated disclosure after patch is available (typically 90 days)
In Scope:
- LSP server vulnerabilities (command injection, memory safety)
- HTTP API vulnerabilities (authentication bypass, injection attacks)
- WebSocket vulnerabilities (message injection, DoS)
- Dependency vulnerabilities
- Build process security issues
Out of Scope:
- Editor client vulnerabilities (responsibility of editor maintainers)
- Denial of service requiring unrealistic resources
- Social engineering attacks
-
Memory Safety: Rust's ownership system prevents:
- Buffer overflows
- Use-after-free
- Data races
- Null pointer dereferences
-
Input Validation:
- All HTTP inputs validated
- LSP messages validated against protocol
- Document size limits enforced
- Format validation for conversions
-
Dependency Management:
- Regular
cargo auditruns - Minimal dependency surface
- Pinned versions in Cargo.lock
- Regular
-
Build Security:
- Reproducible builds via Cargo
- No unsafe code blocks
- Strict compiler warnings
-
No Authentication: Server currently has no authentication mechanism
- Mitigation: Deploy behind reverse proxy with auth
- Status: Planned for v0.2.0
-
No Rate Limiting: APIs not rate-limited
- Mitigation: Use reverse proxy rate limiting
- Status: Planned for v0.2.0
-
No TLS: Server doesn't implement TLS
- Mitigation: Use reverse proxy (nginx, Apache)
- Status: Recommended deployment pattern
-
Document Storage: In-memory only, no persistence
- Impact: DoS via memory exhaustion possible
- Mitigation: Resource limits at OS/container level
- Status: Acceptable for current use case
# Run as non-root user
useradd -r -s /bin/false connector
sudo -u connector ./universal-connector-server
# Use firewall rules
ufw allow from trusted_ip to any port 8080
ufw deny 8080
# Container security
docker run --read-only --cap-drop=ALL --security-opt=no-new-privileges \
--memory=100m --cpus=1.0 universal-connector# Disable unused features
export ENABLE_LSP=true
export ENABLE_HTTP=false # If not needed
export ENABLE_WS=false # If not needed
# Bind to localhost only
export HTTP_ADDR=127.0.0.1:8080
export WS_ADDR=127.0.0.1:8081- v0.2.0: Add JWT-based authentication
- v0.2.0: Implement rate limiting
- v0.3.0: Add TLS support
- v0.3.0: Implement document size limits
- v0.4.0: Add audit logging
- v0.4.0: Implement RBAC (Role-Based Access Control)
No vulnerabilities have been reported or discovered as of 2025-11-22.
- Security Email: security@universal-connector.org
- PGP Key: [To be added]
- GitHub Security Advisories: [Repository Security Tab]
We appreciate responsible disclosure and will acknowledge security researchers who report vulnerabilities.
Last Updated: 2025-11-22 Version: 1.0