If you discover a security vulnerability in Lux, please report it privately so we can fix it before it's exploited. Please do not open a public GitHub issue for security vulnerabilities, as this exposes the issue to everyone before a fix is available.
Email hello@pompeiilabs.com with:
- A description of the vulnerability
- Steps to reproduce
- Affected versions (if known)
- Any potential impact assessment
We aim to acknowledge reports within a few business days and prioritize fixes based on severity. Lux is maintained by a small team, so timelines vary, but we treat security issues as our highest priority when they come in.
- Authentication or authorization bypasses
- Data loss or corruption vulnerabilities
- Denial of service attacks against the server process
- Memory safety issues
- Information disclosure (credentials, customer data)
- Injection attacks (command injection, Lua sandbox escapes)
- Vulnerabilities in dependencies that don't affect Lux in practice
- Issues that require physical access to the host machine
- Social engineering attacks
- Denial of service via expected behavior (e.g., KEYS on large datasets)
- Non-security bugs (crashes, incorrect results) -- please open a regular GitHub issue for these
We will coordinate disclosure with the reporter. Once a fix is available, we will:
- Release a patched version
- Publish a GitHub Security Advisory
- Credit the reporter (unless they prefer to remain anonymous)
We ask that you give us reasonable time to address the issue before public disclosure.
This policy covers:
- The Lux database engine (github.com/lux-db/lux)
- Lux Cloud (luxdb.dev)
- The luxctl CLI
- The @luxdb/sdk npm package
Pompeii Labs, Inc. hello@pompeiilabs.com