| Version | Supported |
|---|---|
| 1.0.x | β |
We take security seriously. If you discover a security vulnerability, please report it responsibly.
- DO NOT create a public GitHub issue for security vulnerabilities
- Email the maintainers directly or use GitHub's private vulnerability reporting
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution Timeline: Depends on severity
- Critical: 24-72 hours
- High: 1-2 weeks
- Medium: 2-4 weeks
- Low: Next release
PersonaForge includes several built-in security measures:
- 40+ attack pattern detection (EN/RU)
- Input sanitization
- Role marker escaping
- Strike system with temporary blocks
- Owner-only access via
OWNER_ID - Telegram WebApp HMAC-SHA256 validation
- No public API endpoints
- Adaptive rate limiting based on violation history
- Per-user request throttling
- LLM queue management
- Local SQLite database
- No external data transmission (except Telegram API)
- Ollama runs locally
When deploying PersonaForge:
-
Keep secrets secure
- Never commit
.envto version control - Use strong, unique
TELOXIDE_TOKEN - Restrict
OWNER_IDto trusted users
- Never commit
-
Network security
- Run Ollama on localhost only
- Use HTTPS for Mini App (required by Telegram)
- Consider firewall rules for production
-
Updates
- Keep Rust and dependencies updated
- Monitor
cargo auditfor vulnerabilities - Subscribe to security advisories
-
Monitoring
- Review logs for suspicious activity
- Monitor
/security_statuscommand - Check blocked users periodically
-
.envfile is in.gitignore -
OWNER_IDis set correctly - Ollama is not exposed to public network
- Mini App uses HTTPS
- Dependencies are up to date
- Security audit passes (
cargo audit)