| Version | Supported |
|---|---|
| latest | Yes |
| < 1.6 | No |
If you discover a security vulnerability in Photon, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
- Email: Send details to security@portel.dev
- Subject:
[SECURITY] Brief description of the vulnerability - Include:
- Description of the vulnerability
- Steps to reproduce
- Affected versions
- Potential impact
- Suggested fix (if any)
- Acknowledgement: Within 48 hours of your report
- Assessment: We'll evaluate severity and impact within 5 business days
- Fix timeline: Critical vulnerabilities are patched within 7 days; high-severity within 14 days
- Disclosure: We'll coordinate disclosure with you after the fix is released
The following are in scope:
- Photon CLI (
@portel/photon) - Photon Core (
@portel/photon-core) - Beam UI (the web interface)
- Daemon (background process)
- Official marketplace photons (
portel-dev/photons)
The following are out of scope:
- Third-party or community photons
- Issues in dependencies (report these upstream)
- Denial of service via expected resource consumption
Photon implements the following security controls:
- Path traversal protection on all file-serving endpoints
- Local-only binding for Beam UI (127.0.0.1 by default)
- Request authentication ensuring only local processes can invoke tools
- Input validation on package names, URLs, and template expressions
- Body size limits to prevent memory exhaustion
- Rate limiting on public-facing endpoints
- Security headers (X-Content-Type-Options, X-Frame-Options, Referrer-Policy)
- HTTPS enforcement for marketplace fetches
- Command injection prevention using
execFileoverexec
We appreciate security researchers who help keep Photon safe. Contributors will be acknowledged here (with permission).