| Version | Supported |
|---|---|
| 2.0.x | ✅ |
| 1.x | ❌ |
We take the security of HyperCode very seriously. If you discover a security vulnerability, please follow these steps:
- Do NOT open a public issue on GitHub.
- Send an email to
security@hypercode.ai(or your designated security contact). - Include a description of the vulnerability, steps to reproduce, and any relevant logs.
We will acknowledge your report within 48 hours and provide a timeline for a fix.
- We use TruffleHog in our CI/CD pipeline to scan for committed secrets.
.envfiles are strictly gitignored.- Production secrets should be injected via environment variables or a secrets manager (e.g., Vault, AWS Secrets Manager).
- API endpoints are protected via JWT (JSON Web Tokens).
- Internal services communicate via a private Docker network (
backend-net).
- The
docs/archive/legacyfolder contains historical code that may reference placeholder API keys or insecure patterns. Do not use this code in production.
This project is licensed under AGPL v3. If you modify the source code and run it as a network service, you must disclose your source code, including any security patches applied.