Vulnerability Reporting
We take security seriously. If you discover a security vulnerability in Nexgent, please report it responsibly.
Do not open public GitHub issues for security vulnerabilities. This could put users at risk before a fix is available.
Reporting Process
1. Identify the Vulnerability
Before reporting, please confirm:
- The issue is a security vulnerability (not a bug or feature request)
- The issue affects Nexgent (not a third-party dependency)
- You can reproduce the issue
- You have not publicly disclosed the issue
2. Gather Information
Include as much detail as possible:
- Type of vulnerability (e.g., authentication bypass, SQL injection, XSS)
- Affected component (e.g., API endpoint, frontend, database)
- Steps to reproduce
- Proof of concept (code, screenshots, or video)
- Potential impact (what could an attacker do?)
- Suggested fix (if you have one)
3. Submit Report
Email: contact@nexgent.ai
Subject format: [SECURITY] Brief description
Example:
To: contact@nexgent.ai
Subject: [SECURITY] JWT token not properly validated on /api/v1/agents
Description:
The /api/v1/agents endpoint does not validate the JWT token signature,
allowing forged tokens to access protected resources.
Steps to Reproduce:
1. Create a JWT with arbitrary payload and invalid signature
2. Send request to /api/v1/agents with forged token
3. Server returns data without verifying signature
Impact:
Any attacker can access any user's agents by forging JWT tokens.
Suggested Fix:
Add signature verification to the authenticate middleware.
Proof of Concept:
[Attach code or screenshot]What to Expect
Response Timeline
| Stage | Timeline |
|---|---|
| Initial acknowledgment | Within 48 hours |
| Triage and assessment | Within 1 week |
| Fix development | Varies by severity |
| Patch release | As soon as fix is ready |
| Public disclosure | After patch is released |
Severity Assessment
| Severity | Description | Example |
|---|---|---|
| Critical | Remote code execution, full database access | SQL injection, RCE |
| High | Authentication bypass, sensitive data exposure | JWT bypass, key leakage |
| Medium | Limited data access, denial of service | IDOR, access bypass |
| Low | Information disclosure, minor issues | Version disclosure, verbose errors |
Scope
In Scope
- Nexgent backend (
nexgent-open-source-trading-engine/backend) - Nexgent frontend (
nexgent-open-source-trading-engine/frontend) - Nexgent shared package (
nexgent-open-source-trading-engine/shared) - Documentation site (if it processes user data)
- Official Docker images
- Official deployment templates
Out of Scope
- Third-party dependencies (report to the dependency maintainer)
- Self-hosted instances with modified code
- Social engineering attacks
- Physical attacks
- Denial of service attacks
- Issues already reported
- Issues in non-latest versions
Safe Harbor
We follow responsible disclosure practices:
-
No legal action against researchers who:
- Report in good faith
- Do not access or modify user data
- Do not disrupt services
- Wait for our response before disclosure
-
Credit will be given to reporters who:
- Provide valid, reproducible vulnerabilities
- Allow reasonable time for fixes
- Do not publicly disclose before patch
-
We will not:
- Take legal action against good-faith researchers
- Report researchers to law enforcement
- Penalize for accidental data access during research
Recognition
We maintain a security hall of fame for responsible disclosures:
How to be Credited
- Report a valid vulnerability
- Provide your name/handle (optional)
- Wait for fix and coordinated disclosure
- Your name will be added to our security acknowledgments
What We Don't Offer
- Monetary bounties (we're an open-source project)
- Swag or merchandise
- Employment offers
Common Vulnerabilities
If you're looking for issues, here are areas to focus on:
Authentication
- JWT token validation
- Refresh token rotation
- API key verification
- Session management
Authorization
- User ID scoping (IDOR)
- API key scope enforcement
- Resource ownership checks
Input Validation
- SQL injection (via Prisma)
- XSS in frontend
- Command injection
- Path traversal
Cryptography
- Password hashing
- Token generation
- Secret management
Configuration
- Default credentials
- Exposed debug endpoints
- Verbose error messages
- Missing security headers
After Disclosure
Patch Process
- Vulnerability confirmed
- Fix developed in private branch
- Security advisory drafted
- Patch released
- Advisory published
- Users notified
Public Advisory
After the patch is released, we will:
- Publish a security advisory on GitHub
- Credit the reporter (if desired)
- Describe the vulnerability and fix
- Recommend upgrade steps
Contact
Primary: contact@nexgent.ai
Backup: Open a private security advisory on GitHub
PGP Key: Available on request for encrypted communication
Resources
- Security Overview - Security architecture
- GitHub Security Advisories (opens in a new tab)