Security is a primary concern for Biolink-AI. Since this platform utilizes advanced Third-Party APIs (Google Gemini) and interacts directly with users as a virtual persona, protecting API tokens and user data is critical.
Security updates are only applied to the latest main branch deployed version.
| Version | Supported |
|---|---|
| v1.0.x | β |
| < v1.0 | β |
If you discover any security vulnerabilities, please do not create a public issue. Instead, report it immediately by sending a private email to the project maintainers or by utilizing the GitHub 'Report a Vulnerability' feature located under the "Security" tab of this repository.
Please provide:
- A clear description of the vulnerability.
- Steps required to reproduce.
- (Optional) Suggested mitigation.
We strive to acknowledge all reports within 48 hours and resolve critical issues within 5 business days.
The most critical asset in this application is the VITE_GEMINI_API_KEY.
- NEVER commit your
.envor.env.localfiles to version control. These have been added to the.gitignoreglobally, but it remains the developer's responsibility to verify. - If an API key is ever accidentally leaked or committed, rotate (revoke and regenerate) the key immediately from your Google Cloud Console.
Biolink-AI actively implements a strict 5-question daily limit logic.
- To prevent abuse without requiring user authentication, session state, chat history, and timestamp limitations are managed locally via IndexedDB.
- Because this relies on client-side constraints, it is inherently susceptible to local tampering. However, since the API requests are securely proxied/limited on the client, it satisfies our primary objective: casual abuse reduction without a heavyweight backend database (like PostgreSQL/Supabase).
Always ensure security patches align with the strict coding structures outlined in CONTRIBUTING.md.