If you discover a security vulnerability in Hivemind, please report it responsibly. Do not open a public GitHub issue.
Please report vulnerabilities via GitHub Security Advisories. Include:
- A description of the vulnerability
- Steps to reproduce the issue
- The potential impact
- Any suggested fixes (optional)
We will acknowledge your report within 48 hours and provide a detailed response within 7 days.
| Version | Supported |
|---|---|
| Latest release | Yes |
| Previous minor | Security fixes only |
| Older versions | No |
Hivemind implements the following security controls:
- Device Authentication — Zero-password auth with cryptographically secure one-time codes (
secretsmodule, notrandom) - Project Isolation — Agents are sandboxed to their project directory with multi-layer enforcement
- Rate Limiting — API endpoints are rate-limited to prevent brute force attacks
- Content Security Policy — Strict CSP headers on all dashboard responses
- Input Validation — All user inputs are validated and sanitized
- No Secrets in Code — All sensitive configuration is loaded from environment variables
- Never commit API keys to version control
- Use environment variables for all sensitive configuration
- Rotate your Claude API key if you suspect it has been compromised
- Regularly review approved devices in Settings
- Revoke access for devices you no longer use
- Use the access code rotation feature periodically
- Run Hivemind behind a reverse proxy (nginx/caddy) in production
- Use HTTPS when exposing the dashboard to the internet
- Restrict dashboard access to trusted networks when possible
- Enable sandbox mode (
SANDBOX_ENABLED=true) to restrict file access - Set
CLAUDE_PROJECTS_DIRto limit which directories agents can access - Review agent-generated code before deploying to production
The following are in scope for security reports:
- Authentication bypass
- Unauthorized access to projects or data
- Remote code execution vulnerabilities
- Path traversal attacks
- WebSocket security issues
- API key exposure
The following are out of scope:
- Vulnerabilities in third-party dependencies (report to the upstream project)
- Issues that require physical access to the machine
- Social engineering attacks
- Denial of service attacks against local installations