Supported Versions
We release security updates for the following versions:| Version | Supported |
|---|---|
| 0.x.x | ✅ |
Hive is currently in active development (0.x versions). We take security seriously and encourage responsible disclosure of any vulnerabilities.
Reporting a Vulnerability
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.How to Report
Instead, please send an email to [email protected] with:-
A description of the vulnerability
- Include the type of vulnerability (e.g., injection, authentication bypass, data exposure)
- Specify which component is affected (core, tools, specific agent, etc.)
-
Steps to reproduce the issue
- Provide a clear, step-by-step guide to reproduce the vulnerability
- Include any relevant code snippets, configurations, or payloads
- Specify the environment (OS, Python version, Hive version)
-
Potential impact of the vulnerability
- Explain what an attacker could achieve
- Assess severity (critical, high, medium, low)
- Identify any data or systems at risk
-
Any possible mitigations you’ve identified
- Suggest temporary workarounds if available
- Propose potential fixes if you have ideas
What to Expect
Safe Harbor
We consider security research conducted in accordance with this policy to be:- Authorized concerning any applicable anti-hacking laws
- Authorized concerning any relevant anti-circumvention laws
- Exempt from restrictions in our Terms of Service that would interfere with conducting security research
Security Best Practices for Users
1. Keep Updated
Always run the latest version of Hive to benefit from security patches and improvements.2. Secure Configuration
Review~/.hive/configuration.json settings, especially in production:
3. Environment Variables
Never commit sensitive files:4. Credential Store Security
Hive includes an encrypted credential store at~/.hive/credentials:
- Encrypted at rest using cryptography library
- Automatic encryption for all stored credentials
- TTL-based caching (default 5 minutes)
- Thread-safe operations
Credential Storage Backends
Hive supports multiple storage backends:EncryptedFileStorage
Default: Encrypted local storage at
~/.hive/credentials- Best for: Local development
- Security: Encrypted with local key
EnvVarStorage
Environment variable mapping
- Best for: CI/CD pipelines
- Security: Depends on environment security
HashiCorp Vault
Enterprise secrets management
- Best for: Production deployments
- Security: Enterprise-grade
InMemoryStorage
In-memory only (testing)
- Best for: Unit tests
- Security: Not persistent
5. Network Security
- Production
- Development
- ✅ Use HTTPS for all external communications
- ✅ Configure firewalls to restrict access
- ✅ Use VPCs or private networks
- ✅ Enable webhook secrets for authentication
- ✅ Implement rate limiting
6. Database Security
If using database integrations (Postgres, BigQuery, etc.):- Use strong passwords (16+ characters, mixed case, numbers, symbols)
- Limit network access to specific IPs or VPCs
- Use read-only credentials when possible
- Enable audit logging for sensitive operations
- Regularly rotate credentials
7. Agent-Specific Security
Input Validation
Rate Limiting & Cost Controls
Human-in-the-Loop (HITL) for Sensitive Operations
Security Features
Hive includes built-in security features:Environment-Based Configuration
Environment-Based Configuration
No hardcoded secrets in code. All sensitive values loaded from:
- Environment variables
- Encrypted credential store
- HashiCorp Vault (enterprise)
Input Validation
Input Validation
- Pydantic-based validation on all inputs
- Schema enforcement for API endpoints
- Type checking at runtime
Secure Session Handling
Secure Session Handling
- Session isolation prevents data bleed
- Thread-safe state management
- Automatic session cleanup
CORS Configuration
CORS Configuration
- Configurable CORS for webhook server
- Origin validation
- Method restrictions
Rate Limiting
Rate Limiting
- Configurable rate limits
- Automatic retry with backoff
- Tool-level rate limiting (many tools handle this automatically)
OAuth2 Security
OAuth2 Security
- Secure token storage
- Automatic token refresh
- Revocation support
Known Security Considerations
Security Roadmap
Upcoming security features:- ⏳ Audit logging - Compliance and tracking
- ⏳ AWS Secrets Manager integration
- ⏳ Azure Key Vault integration
- ⏳ Per-environment configuration support
- ⏳ Enhanced guardrails SDK - Deterministic safety rules
- ⏳ Token usage tracking - Cost and quota monitoring
Security Resources
OWASP LLM Top 10
Security risks for LLM applications
MCP Security
Model Context Protocol security best practices
Python Security
Python security considerations
Docker Security
Docker security best practices
Questions?
For security-related questions that don’t involve active vulnerabilities:- Discord: Join our community
- Email: [email protected]
For active vulnerabilities, please email [email protected] directly. Do not post in public channels.