| Version | Supported |
|---|---|
| Latest | ✅ |
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
- DO NOT create a public GitHub issue
- Email security details to the maintainers
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
When using Vex:
-
API Keys: Never hardcode API keys. Use environment variables or secure secret management.
-
Input Validation: Vex does not validate input text content. Ensure you sanitise user inputs before embedding.
-
Network Security: Embedding API calls are made over HTTPS. Ensure your network configuration doesn't downgrade connections.
-
Rate Limiting: Use
WithRateLimitto prevent accidental API abuse and unexpected costs. -
Error Handling: API errors may contain sensitive information. Avoid logging full error messages in production.
Vex is designed with security in mind:
- No credential storage (API keys passed at runtime)
- HTTPS-only API communication
- Context-aware request cancellation
- Circuit breaker protection against cascading failures
- No file system operations beyond normal Go imports
We appreciate responsible disclosure of security vulnerabilities.