| Version | Supported |
|---|---|
| Latest | ✅ |
Do not open a public issue for security vulnerabilities.
Email security@ability.ai with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and work with you on a fix.
Trinity is designed with security-first principles:
- Isolated containers — Each agent runs in its own Docker container with resource limits
- Zero-trust architecture — All agent actions are verified and logged
- Complete audit trails — Every action logged via Vector log aggregation
- Self-hosted — Data never leaves your infrastructure
- Credential isolation — Redis-backed secrets with hot-reload capability
- Role-based access — Authentication required for all operations
- Ephemeral SSH — Time-limited terminal access, no permanent exposure
- Network isolation — Agents communicate through controlled MCP channels
When deploying Trinity:
- Use strong secrets — Generate
SECRET_KEYwithopenssl rand -hex 32 - Secure credentials — Store API keys in Redis, never in code or logs
- Limit network access — Use firewall rules to restrict access to Trinity services
- Enable HTTPS — Use a reverse proxy (nginx, Caddy) with TLS in production
- Regular updates — Keep Docker images and dependencies updated
- Audit logs — Monitor Vector logs for unusual agent activity