Only the latest released version of AimDB receives security fixes.
| Version | Supported |
|---|---|
| 1.x | ✅ |
| < 1.0 | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
Report vulnerabilities privately using GitHub's private vulnerability reporting via the "Report a vulnerability" button on the Security tab of this repository.
Include as much of the following as possible:
- Description of the vulnerability and its potential impact
- Affected component (e.g.,
aimdb-core,aimdb-mqtt-connector,aimdb-mcp) - Steps to reproduce or proof-of-concept
- Suggested fix or mitigation, if you have one
| Milestone | Target |
|---|---|
| Initial acknowledgement | Within 48 h |
| Confirmed / triaged | Within 7 days |
| Fix released (critical severity) | Within 14 days |
| Fix released (other severity) | Within 30 days |
We will keep you informed of progress throughout the process.
We follow coordinated disclosure:
- Reporter submits the vulnerability privately.
- We confirm, triage, and develop a fix.
- A patched release is published.
- A GitHub Security Advisory is published after the fix is available.
- Reporter is credited in the advisory unless they prefer to remain anonymous.
- Memory safety or logic errors in
aimdb-core - Authentication or authorization bypass in any connector (MQTT, KNX, WebSocket)
- Prompt injection or data exfiltration via the MCP server (
aimdb-mcp) - Denial-of-service vulnerabilities in network-facing components
- Dependency vulnerabilities with a direct exploit path in AimDB
- Vulnerabilities in third-party dependencies without a direct exploit path
- Issues requiring physical access to a device running AimDB
- Social engineering or phishing
- Theoretical vulnerabilities without a proof of concept
AimDB is designed for use in trusted environments (MCU → edge → cloud). A few recommendations:
- MQTT: Enable TLS and use strong credentials in production deployments.
- KNX: Restrict network access to trusted KNX/IP segments.
- MCP server: Only expose the Unix socket to trusted local processes.
- WebSocket connector: Always run behind a TLS-terminating reverse proxy in production.
- Keep AimDB and its dependencies up to date. Run
cargo auditregularly to check for known advisories in the dependency tree.