| Version | Supported |
|---|---|
| 0.1.x | Yes |
If you discover a security vulnerability in BrowseAI Dev, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please email security concerns or report via GitHub Security Advisories.
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Assessment: Within 1 week
- Fix: Critical issues patched within 2 weeks
- No secrets in code: All API keys are loaded from environment variables. Never commit
.envfiles. - Encryption: User API keys stored with AES-256-GCM encryption.
- Input validation: All API inputs validated with Zod schemas.
- Rate limiting: 5 requests/hour per IP for unauthenticated demo usage.
- SSRF protection: URL allowlist prevents requests to localhost and private IPs.
- RLS policies: Supabase Row Level Security ensures users can only access their own data.
All API access requires a BrowseAI Dev API key (bai_xxx prefix). Your BAI key:
- Should be kept secret and never committed to source control
- Is stored encrypted with AES-256-GCM if saved server-side
- Can be rotated at any time from the dashboard at browseai.dev/dashboard
- Should be set via the
BROWSE_API_KEYenvironment variable for MCP and SDK usage