File tree Expand file tree Collapse file tree 1 file changed +4
-3
lines changed
Expand file tree Collapse file tree 1 file changed +4
-3
lines changed Original file line number Diff line number Diff line change @@ -52,7 +52,7 @@ This playbook describes how maintainers respond to confirmed or suspected securi
5252### Supply-chain compromise
5353
54541 . Freeze releases and investigate blast radius.
55- 2 . Rotate credentials in order: Docker Hub -> GitHub tokens -> LLM provider keys -> DB credentials -> Flask ` SECRET_KEY ` and ` INTERNAL_KEY ` .
55+ 2 . Rotate credentials in order: Docker Hub -> GitHub tokens -> LLM provider keys -> DB credentials -> ` JWT_SECRET_KEY ` -> ` ENCRYPTION_SECRET_KEY ` -> ` INTERNAL_KEY ` .
56563 . Replace compromised artifacts/tags with clean releases and revoke/remove bad tags where possible.
57574 . Publish advisory with exact affected versions and required user actions.
5858
@@ -85,8 +85,9 @@ Treat confirmed AI-specific abuse as security incidents:
8585| GitHub tokens/PATs | Revoke/replace in GitHub; update automation secrets |
8686| LLM provider API keys | Rotate in provider console; update runtime/deploy secrets |
8787| Database credentials | Rotate in DB platform; redeploy with new secrets |
88- | Flask ` SECRET_KEY ` | Rotate and redeploy (invalidates active sessions) |
89- | Flask ` INTERNAL_KEY ` | Rotate and redeploy (invalidates active sessions) |
88+ | ` JWT_SECRET_KEY ` | Rotate and redeploy (invalidates all active user sessions/tokens) |
89+ | ` ENCRYPTION_SECRET_KEY ` | Rotate and redeploy (re-encrypt stored data if possible; existing encrypted data may become inaccessible) |
90+ | ` INTERNAL_KEY ` | Rotate and redeploy (invalidates worker-to-backend authentication) |
9091
9192## Maintenance
9293
You can’t perform that action at this time.
0 commit comments