| Version | Supported |
|---|---|
| 1.x.x | Yes |
The Aerospike team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to [email protected].
You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message.
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, authentication bypass, authorization flaw, information disclosure, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Potential severity assessment (if applicable)
This information will help us triage your report more quickly.
Security vulnerabilities in the following areas are within scope for reporting:
- Application code vulnerabilities (injection flaws, authentication/authorization issues, cryptographic weaknesses, etc.)
- API security vulnerabilities (improper access controls, rate limiting issues, input validation flaws, etc.)
- Configuration vulnerabilities (exposed sensitive information, insecure defaults, etc.)
- Cloud infrastructure security issues (misconfigurations, exposed resources, etc.)
- Dependency vulnerabilities in actively maintained components
- Data protection and encryption issues
- Denial of service vulnerabilities that significantly impact service availability
The following are not considered security vulnerabilities for the purposes of responsible disclosure:
- Physical security issues
- Social engineering attacks
- Denial of service attacks that require significant resources or are not exploitable through standard usage
- Issues requiring physical access to infrastructure
- Issues in third-party services that are outside of Aerospike's direct control
- Issues that require unlikely user interaction or configuration
Upon receiving a security vulnerability report, our security team will:
- Acknowledge receipt within 72 hours
- Initial triage within 5 business days to assess severity and validity
- Investigation to confirm and understand the issue
- Remediation development and testing
- Coordination with reporter on disclosure timeline
- Security advisory publication when appropriate
Critical vulnerabilities will receive expedited handling. We will provide regular updates to the reporter throughout the process.
All code contributions are subject to security review. Contributors should:
- Follow secure coding practices and avoid common vulnerabilities (OWASP Top 10, CWE Top 25)
- Avoid hardcoding sensitive information such as credentials, API keys, or tokens
- Implement proper input validation and output encoding
- Use parameterized queries and prepared statements to prevent injection attacks
- Follow the principle of least privilege for access controls
- Implement proper error handling that does not leak sensitive information
We actively monitor and update dependencies to address security vulnerabilities:
- Dependencies are regularly scanned for known vulnerabilities
- Security updates are prioritized and applied in a timely manner
- All dependency updates are tested before deployment
- Authentication and authorization mechanisms are enforced at all API endpoints
- Rate limiting is implemented to prevent abuse
- Input validation is performed on all API inputs
- API responses do not expose sensitive information
Security updates will be released as part of our standard release process. Critical security vulnerabilities may result in out-of-cycle security releases. Security advisories will be published detailing the nature of the vulnerability and the remediation steps taken.
We prefer all communications to be in English.
Aerospike follows the principle of Responsible Disclosure. We ask that security researchers:
- Act in good faith to avoid privacy violations, data destruction, and service interruption
- Keep vulnerability details confidential until we have resolved the issue and agreed upon disclosure timing
- Do not access or modify data that does not belong to you
- Provide us with a reasonable amount of time to address the issue before public disclosure
We will acknowledge researchers who responsibly disclose vulnerabilities, if they so desire, in our security advisories.