Harper takes security seriously. We appreciate your help in keeping Harper and its users safe by following this security policy.
- Supported Versions
- Reporting Security Vulnerabilities
- Security Assessment
- Security Best Practices
- Incident Response
- Contact
We actively maintain security updates for the following versions:
| Version | Supported | Security Updates | Bug Fixes |
|---|---|---|---|
| 0.1.6 | Active | Yes | Yes |
| 0.1.5 | Limited | Critical only | Yes |
| 0.1.4 | Limited | Critical only | Yes |
| < 0.1.4 | End of Life | No | No |
Legend:
- Active: Full security support and updates
- Limited: Critical security fixes only
- End of Life: No security updates provided
🚨 Do not report security vulnerabilities through public GitHub issues.
Please report security vulnerabilities by emailing:
- Email: harpertoken@icloud.com
- Subject:
[SECURITY] Harper Vulnerability Report
When reporting a security vulnerability, please provide:
- Issue Type: Buffer overflow, injection, authentication bypass, etc.
- Severity: Critical, High, Medium, Low (with justification)
- Affected Versions: Which versions are impacted
- File Paths: Specific files and code locations affected
- Reproduction Steps: Clear, step-by-step instructions
- Proof of Concept: Code or detailed description demonstrating the issue
- Potential Impact: What an attacker could achieve
- Mitigation: Any suggested fixes or workarounds
- Acknowledgment: We'll acknowledge receipt within 24 hours
- Investigation: We'll investigate and validate the report within 48 hours
- Updates: We'll provide regular updates on our progress
- Fix Development: We'll develop and test a fix
- Disclosure: We'll coordinate disclosure with you
- Resolution: We'll release the fix and security advisory
We follow responsible disclosure principles:
- We will not publicly disclose the vulnerability until a fix is available
- We will credit you (if desired) in our security advisory
- We will keep you informed throughout the process
- We will not pursue legal action for security research conducted in good faith
Harper uses multiple automated security tools:
- Cargo Audit: Rust dependency vulnerability scanning
- Cargo Deny: License and dependency policy checking
- Clippy: Linting with security-focused rules
- Input Validation: All user inputs are validated and sanitized
- SQL Injection Protection: Parameterized queries prevent SQL injection
- XSS Prevention: Output encoding prevents cross-site scripting
- CSRF Protection: State-changing operations require proper validation
- Secure Defaults: Conservative defaults that prioritize security
- AES-GCM-256: Strong encryption for sensitive data storage
- Local Storage: All data remains on the user's device
- API Key Protection: Keys are stored securely and never transmitted unnecessarily
- Memory Safety: Rust's memory safety prevents common vulnerabilities
- Keep Updated: Use the latest version of Harper
- Secure API Keys: Store API keys securely and rotate regularly
- Network Security: Use Harper on trusted networks
- Regular Backups: Backup your conversation data regularly
- Monitor Activity: Review your chat sessions periodically
- Code Review: All changes undergo security review
- Testing: Comprehensive security testing for new features
- Dependency Updates: Regular updates of all dependencies
- Secure Coding: Follow OWASP and Rust security guidelines
- Audit Logging: Security-relevant events are logged appropriately
- Stop Using: Immediately stop using the affected functionality
- Report: Follow the reporting process above
- Monitor: Watch for official updates and advisories
- Update: Apply security patches as soon as available
Security advisories will be published at:
- GitHub Security Advisories
- Harper Changelog
- Official communication channels
For security-related questions or concerns:
- Security Issues: harpertoken@icloud.com
- General Support: GitHub Issues
- Discussions: GitHub Discussions
We appreciate the security research community for helping keep Harper secure. Security researchers who report valid vulnerabilities will be acknowledged in our security advisories (unless they request anonymity).
Last Updated: November 2025 Version: 1.0