| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Fabric Atelier uses multiple security tools to ensure code quality and safety:
Checks for known security vulnerabilities in dependencies.
cargo auditValidates licenses, checks for banned dependencies, and ensures all dependencies come from trusted sources.
cargo deny checkConfiguration: deny.toml
Lints for common mistakes, performance issues, and security concerns.
cargo clippy --all-targets --all-features -- -D warningsAutomated fuzzing to find edge cases and potential crashes.
# Fuzz MCP protocol parsing
cargo fuzz run mcp_protocol
# Fuzz pattern search
cargo fuzz run pattern_searchRun all security checks at once:
./scripts/security-check.sh- paste (RUSTSEC-2024-0436): Unmaintained crate, transitive dependency through datafusion.
- Status: Monitoring for alternatives
- Impact: Low - used only at compile time for macros
- Mitigation: Will be replaced when datafusion updates
If you discover a security vulnerability, please:
- DO NOT open a public issue
- Email: don@codetestcode.io
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 1-7 days
- High: 7-14 days
- Medium: 14-30 days
- Low: Next release cycle
- Always use the latest version - Security fixes are released promptly
- Verify Docker images - Use official images from Docker Hub
- Secure API keys - Never commit API keys to version control
- Use environment variables - For sensitive configuration
- Review permissions - MCP servers have access to your filesystem
- Run security checks before submitting PRs
- Never commit secrets - Use
.envfiles (gitignored) - Validate input - All user input should be validated
- Use safe Rust - Avoid
unsafeblocks unless absolutely necessary - Document security implications - In code comments and PRs
- MIT
- Apache-2.0
- BSD-2-Clause / BSD-3-Clause
- ISC
- Unicode-DFS-2016
- Unicode-3.0
- Zlib
- 0BSD
- CC0-1.0
- GPL-2.0 / GPL-3.0
- AGPL-3.0
All dependencies must come from:
- crates.io (official Rust package registry)
- Approved git repositories (case-by-case basis)
- Non-root Docker user - Containers run as non-privileged user
- Minimal dependencies - Reduced attack surface
- Input validation - All MCP requests are validated
- Type safety - Rust's type system prevents many common vulnerabilities
- Memory safety - No buffer overflows or use-after-free bugs
- No outbound connections (except to configured LLM providers)
- Stdio transport - No network ports exposed by default
- Sandboxed execution - Docker isolation
| Date | Version | Change |
|---|---|---|
| 2025-10-11 | 0.1.0 | Initial security policy and tooling setup |