Skip to content

Commit 932ba8b

Browse files
committed
chore: merge conflicts
2 parents 4d383c2 + d33edac commit 932ba8b

File tree

3 files changed

+61
-73
lines changed

3 files changed

+61
-73
lines changed

.env.example

-1
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,5 @@ STARKNET_ADDRESS=
9191
STARKNET_PRIVATE_KEY=
9292
STARKNET_RPC_URL=
9393

94-
9594
# Coinbase Commerce
9695
COINBASE_COMMERCE_KEY=

SECURITY.md

+51-46
Original file line numberDiff line numberDiff line change
@@ -17,74 +17,79 @@ We take the security of Eliza seriously. If you believe you have found a securit
1717

1818
1. **DO NOT** create a public GitHub issue for the vulnerability
1919
2. Send an email to security@eliza.builders with:
20-
- A detailed description of the vulnerability
21-
- Steps to reproduce the issue
22-
- Potential impact of the vulnerability
23-
- Any possible mitigations you've identified
20+
- A detailed description of the vulnerability
21+
- Steps to reproduce the issue
22+
- Potential impact of the vulnerability
23+
- Any possible mitigations you've identified
2424

2525
### What to Expect
2626

27-
- **Initial Response**: Within 48 hours, you will receive an acknowledgment of your report
28-
- **Updates**: We will provide updates every 5 business days about the progress
29-
- **Resolution Timeline**: We aim to resolve critical issues within 15 days
30-
- **Disclosure**: We will coordinate with you on the public disclosure timing
27+
- **Initial Response**: Within 48 hours, you will receive an acknowledgment of your report
28+
- **Updates**: We will provide updates every 5 business days about the progress
29+
- **Resolution Timeline**: We aim to resolve critical issues within 15 days
30+
- **Disclosure**: We will coordinate with you on the public disclosure timing
3131

3232
## Security Best Practices
3333

3434
### For Contributors
3535

3636
1. **API Keys and Secrets**
37-
- Never commit API keys, passwords, or other secrets to the repository
38-
- Use environment variables as described in our secrets management guide
39-
- Rotate any accidentally exposed credentials immediately
37+
38+
- Never commit API keys, passwords, or other secrets to the repository
39+
- Use environment variables as described in our secrets management guide
40+
- Rotate any accidentally exposed credentials immediately
4041

4142
2. **Dependencies**
42-
- Keep all dependencies up to date
43-
- Review security advisories for dependencies regularly
44-
- Use `pnpm audit` to check for known vulnerabilities
43+
44+
- Keep all dependencies up to date
45+
- Review security advisories for dependencies regularly
46+
- Use `pnpm audit` to check for known vulnerabilities
4547

4648
3. **Code Review**
47-
- All code changes must go through pull request review
48-
- Security-sensitive changes require additional review
49-
- Enable branch protection on main branches
49+
- All code changes must go through pull request review
50+
- Security-sensitive changes require additional review
51+
- Enable branch protection on main branches
5052

5153
### For Users
5254

5355
1. **Environment Setup**
54-
- Follow our [secrets management guide](docs/guides/secrets-management.md) for secure configuration
55-
- Use separate API keys for development and production
56-
- Regularly rotate credentials
56+
57+
- Follow our [secrets management guide](docs/guides/secrets-management.md) for secure configuration
58+
- Use separate API keys for development and production
59+
- Regularly rotate credentials
5760

5861
2. **Model Provider Security**
59-
- Use appropriate rate limiting for API calls
60-
- Monitor usage patterns for unusual activity
61-
- Implement proper authentication for exposed endpoints
62+
63+
- Use appropriate rate limiting for API calls
64+
- Monitor usage patterns for unusual activity
65+
- Implement proper authentication for exposed endpoints
6266

6367
3. **Platform Integration**
64-
- Use separate bot tokens for different environments
65-
- Implement proper permission scoping for platform APIs
66-
- Regular audit of platform access and permissions
68+
- Use separate bot tokens for different environments
69+
- Implement proper permission scoping for platform APIs
70+
- Regular audit of platform access and permissions
6771

6872
## Security Features
6973

7074
### Current Implementation
7175

72-
- Environment variable based secrets management
73-
- Type-safe API implementations
74-
- Automated dependency updates via Renovate
75-
- Continuous Integration security checks
76+
- Environment variable based secrets management
77+
- Type-safe API implementations
78+
- Automated dependency updates via Renovate
79+
- Continuous Integration security checks
7680

7781
### Planned Improvements
7882

7983
1. **Q4 2024**
80-
- Automated security scanning in CI pipeline
81-
- Enhanced rate limiting implementation
82-
- Improved audit logging
84+
85+
- Automated security scanning in CI pipeline
86+
- Enhanced rate limiting implementation
87+
- Improved audit logging
8388

8489
2. **Q1 2025**
85-
- Security-focused documentation improvements
86-
- Enhanced platform permission management
87-
- Automated vulnerability scanning
90+
- Security-focused documentation improvements
91+
- Enhanced platform permission management
92+
- Automated vulnerability scanning
8893

8994
## Vulnerability Disclosure Policy
9095

@@ -100,21 +105,21 @@ We follow a coordinated disclosure process:
100105

101106
We believe in recognizing security researchers who help improve our security. Contributors who report valid security issues will be:
102107

103-
- Credited in our security acknowledgments (unless they wish to remain anonymous)
104-
- Added to our security hall of fame
105-
- Considered for our bug bounty program (coming soon)
108+
- Credited in our security acknowledgments (unless they wish to remain anonymous)
109+
- Added to our security hall of fame
110+
- Considered for our bug bounty program (coming soon)
106111

107112
## License Considerations
108113

109114
As an MIT licensed project, users should understand:
110115

111-
- The software is provided "as is"
112-
- No warranty is provided
113-
- Users are responsible for their own security implementations
114-
- Contributors grant perpetual license to their contributions
116+
- The software is provided "as is"
117+
- No warranty is provided
118+
- Users are responsible for their own security implementations
119+
- Contributors grant perpetual license to their contributions
115120

116121
## Contact
117122

118-
- Security Issues: security@eliza.builders
119-
- General Questions: Join our [Discord](https://discord.gg/ai16z)
120-
- Updates: Follow our [security advisory page](https://github.com/ai16z/eliza/security/advisories)
123+
- Security Issues: security@eliza.builders
124+
- General Questions: Join our [Discord](https://discord.gg/ai16z)
125+
- Updates: Follow our [security advisory page](https://github.com/ai16z/eliza/security/advisories)

pnpm-lock.yaml

+10-26
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)