| Version | Supported |
|---|---|
| 2.0.x | ✅ |
| < 2.0 | ❌ |
Please do NOT open a public GitHub issue for security vulnerabilities.
We take the security of WAIaaS seriously. If you discover a security vulnerability, we appreciate your help in disclosing it to us responsibly.
Send an email to security@waiaas.dev with the following information:
- Description: A clear description of the vulnerability
- Reproduction Steps: Step-by-step instructions to reproduce the issue
- Impact Assessment: What an attacker could achieve by exploiting this vulnerability
- Affected Versions: Which versions of WAIaaS are affected
- Proof of Concept: If possible, include a minimal proof of concept (code, screenshots, or logs)
We follow a Responsible Disclosure policy. We kindly ask that you:
- Do not publicly disclose the vulnerability before we have had a chance to address it
- Do not exploit the vulnerability beyond what is necessary to demonstrate it
- Do not access, modify, or delete data belonging to others
- Act in good faith to avoid privacy violations, data destruction, and service disruption
We are committed to responding promptly to security reports:
| Milestone | Target |
|---|---|
| Acknowledgment | 48 hours |
| Initial assessment | 7 days |
| Fix release (critical) | 90 days |
We will keep you informed of our progress throughout the process.
- Once a fix has been released, we will publish a security advisory on GitHub
- Reporters will be credited in the advisory (unless they prefer to remain anonymous)
- We will coordinate disclosure timing with the reporter
- CVE IDs will be requested for qualifying vulnerabilities
The following components are covered by this security policy:
- @waiaas/daemon -- Self-hosted daemon (HTTP API, SQLite, Keystore)
- @waiaas/sdk -- TypeScript SDK
- waiaas-sdk -- Python SDK
- @waiaas/mcp -- MCP server
- @waiaas/admin -- Admin Web UI
- @waiaas/cli -- CLI tool
- @waiaas/core -- Core library (schemas, domain models)
- @waiaas/adapter-solana -- Solana chain adapter
- @waiaas/adapter-evm -- EVM chain adapter
- Docker images and deployment configurations
- Vulnerabilities in third-party dependencies (please report these to the respective projects)
- Social engineering attacks against project maintainers or users
- Denial of service attacks against hosted instances
- Issues in forks or unofficial distributions
- Vulnerabilities requiring physical access to the host machine
When self-hosting WAIaaS, we recommend:
- Run the daemon behind a reverse proxy with TLS termination
- Use strong master passwords (Argon2id is used internally)
- Keep WAIaaS and its dependencies up to date
- Restrict network access to the daemon's HTTP port
- Review and configure policies before connecting to mainnet
- Security issues: security@waiaas.dev
- General questions: Open a GitHub issue