We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
| Version | Supported |
|---|---|
| Latest | ✅ Yes |
| Previous major | ✅ Yes |
| < Previous major | ❌ No |
The MultiGPT team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings, and will make every effort to acknowledge your contributions.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to:
📧 Email: prasoonkumar008@gmail.com
Subject Line: [SECURITY] Brief description of vulnerability
Please include the following information along with your report:
- Type of issue (e.g., data exposure, credential theft, code injection, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
This information will help us triage your report more quickly.
- Initial Response: We aim to respond to security reports within 48 hours
- Updates: We will send you regular updates about our progress at least every 7 days
- Resolution: We target resolving critical vulnerabilities within 30 days
- Disclosure: Once fixed, we will work with you on coordinated disclosure
We support safe harbor for security researchers who:
- Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our services
- Only interact with accounts you own or with explicit permission of the account holder
- Do not access a system beyond what is necessary to demonstrate a vulnerability
- Report vulnerabilities as soon as you discover them
- Do not violate any other applicable laws or regulations
- Keep the app updated: Always use the latest version from Google Play Store
- Protect your API keys: Never share your AI provider API keys with others
- Review permissions: The app only requests necessary permissions
- Use secure networks: Avoid using public WiFi for sensitive conversations
- Local data only: Your conversations are stored locally and never transmitted to our servers
- API Key Security: Use EncryptedSharedPreferences for storing API keys
- Input Validation: Always validate and sanitize user inputs
- Network Security: Use HTTPS for all AI provider communications
- Secure Coding: Follow OWASP Mobile Security guidelines
- Code Review: All code changes require security review before merging
- Local Storage: All conversations are stored locally on your device
- No Data Collection: We don't collect, store, or transmit your personal data
- API Key Encryption: API keys are encrypted using Android Keystore
- Direct API Communication: Your data goes directly to AI providers, not through our servers
- Minimal Permissions: Only requests permissions necessary for functionality
- Secure API Calls: All API communications use HTTPS/TLS encryption
- Rate Limiting: Built-in rate limiting to prevent API abuse
- Error Handling: Secure error handling that doesn't expose sensitive information
- Token Management: Secure handling of authentication tokens and API keys
- Code Obfuscation: Release builds use ProGuard/R8 obfuscation
- Certificate Pinning: SSL certificate pinning for critical API endpoints
- Runtime Checks: Application integrity verification
- Secure Storage: Sensitive data stored using Android security best practices
Security updates will be released as patch versions and announced through:
- GitHub Releases with security advisories
- Google Play Store app updates
- Project README updates
- Security mailing list (for critical issues)
- Report received: We acknowledge receipt within 48 hours
- Initial assessment: We perform initial validation (1-7 days)
- Investigation: We investigate and develop a fix (7-30 days)
- Fix deployment: We deploy the fix and notify you
- Public disclosure: We coordinate public disclosure with you
- Store API keys securely using EncryptedSharedPreferences
- Never log API keys in debug output
- Allow users to easily revoke and rotate keys
- Validate API key format before making requests
// Example secure API client configuration
val httpClient = HttpClient(OkHttp) {
install(HttpTimeout) {
requestTimeoutMillis = 30_000
}
engine {
config {
sslSocketFactory(createSecureSSLSocketFactory())
certificatePinner(createCertificatePinner())
}
}
}- Minimize data retention (automatic conversation cleanup)
- Encrypt sensitive data at rest
- Use secure random number generation for IDs/tokens
- Validate all responses from AI providers
- Never commit API keys, passwords, or sensitive data
- Use parameterized queries for database operations
- Validate all user inputs before processing
- Implement proper error handling without information disclosure
- Use secure random number generation
Before submitting code, ensure:
- No hardcoded secrets or API keys
- Input validation implemented
- Error handling doesn't expose sensitive information
- Network calls use HTTPS
- Sensitive data uses secure storage
- No debug information in release builds
We recognize security researchers who help improve MultiGPT's security:
Thank you for helping keep MultiGPT and our users safe! 🔒
For security-related questions or concerns:
- Email: prasoonkumar008@gmail.com
- Subject:
[SECURITY] Your question here
For general questions, please use GitHub Issues or regular support channels.
Last Updated: December 2024