Skip to content

Security: dansasser/SIM-ONE

Security

SECURITY.md

Security Policy

Overview

Thank you for helping keep the SIM-ONE Framework and its users safe. This policy explains how to report vulnerabilities, what is in scope, and how we coordinate disclosure.

Supported Versions

We provide security fixes for:

  • The latest release on the main branch
  • The most recent minor release when there is an active LTS tag in this repository

Older releases may receive fixes case by case if impact is critical and the patch is low risk.

Reporting a Vulnerability

Please email [email protected] with the subject [SECURITY] Vulnerability Report.

Include:

  • A clear description of the issue and impact
  • A minimal proof of concept or reproduction steps
  • Affected version or commit hash and environment details
  • Any logs, stack traces, screenshots that help reproduce
  • Contact information for coordinated follow up

Do not open public GitHub issues for suspected vulnerabilities.

If the issue involves a third-party dependency, report it to us and the upstream project when possible.

Our Response Process

  • Acknowledgment within 3 business days
  • Triage and severity rating (CVSS 3.1 guidance) within 7 business days
  • Fix plan provided after triage with an estimated timeline
  • Advisory will be published when a fix or mitigation is available

We will keep you informed during triage and remediation and invite you to validate the fix where appropriate.

Coordinated Disclosure

Default embargo period: 90 days from acknowledgment. We may shorten or extend this period depending on exploitability, user impact, or availability of mitigations.

We credit reporters in release notes and advisories unless you request anonymity.

Scope

In scope:

  • Vulnerabilities in SIM-ONE Framework source code and official packages
  • Security defects in default configuration and documented deployment paths
  • Supply chain risks that affect how the framework is built or distributed

Out of scope:

  • Social engineering, phishing, and physical attacks
  • Denial of service through excessive traffic without a specific bug
  • Self-XSS that requires the victim to paste code into their own console
  • Vulnerabilities in third-party services or dependencies that are not exploitable through our usage
  • Issues on non-production demo sites that do not affect the software itself

If you are unsure about scope, send the report anyway. We will triage it.

Safe Harbor

We will not pursue or support legal action against researchers who:

  • Act in good faith and comply with this policy
  • Avoid privacy violations and avoid destruction of data
  • Do not disrupt production systems
  • Do not attempt to access data that does not belong to you
  • Give us a reasonable time to remediate before public disclosure

Security Updates and Advisories

Security fixes are announced in:

  • GitHub Releases
  • Repository CHANGELOG
  • GitHub Security Advisories (GHSA) when applicable

For critical fixes we will provide upgrade guidance and mitigations.

Dependencies and Supply Chain

We monitor vulnerabilities in direct dependencies and build tooling. If you discover a vulnerability in our build or release process, report it through the email above.

Contact

[email protected]

For commercial customers with support contracts, use your support channel in addition to the email above.

Audit Logging

The backend emits structured JSON logs for security‑relevant events.

  • Audit destination: security_events.log (daily rotation, 14 backups)
  • App logs: code/mcp_server/mcp_server.log (daily rotation, 7 backups)
  • Format: JSON with common fields (timestamp, level, logger, module, funcName, lineNo) plus event payload.
  • Event types (non‑exhaustive):
    • recovery_decision: protocol recovery action chosen (action, retry_count, reason).
    • governance_incoherence_detected: incoherence found; may trigger a retry.
    • governance_abort: workflow aborted due to incoherence after retry.
    • execute_completed: summary of /execute including user_id, session_id, and governance_summary.

Personally identifiable or sensitive content is not logged; summaries include aggregate governance scores and booleans only.

Security Configuration Flags

Environment flags can strengthen or tune runtime protections. Update code/mcp_server/.env accordingly.

  • Governance

    • GOV_ENABLE (default: true): Toggle governance evaluation.
    • GOV_MIN_QUALITY (default: 0.6): Minimum acceptable quality score per protocol; below threshold is flagged.
    • GOV_REQUIRE_COHERENCE (default: false): If true, incoherence triggers a single retry then aborts the workflow on persistent failure.
  • Rate Limiting (per endpoint)

    • RATE_LIMIT_EXECUTE (default: 20/minute)
    • RATE_LIMIT_PROTOCOLS (default: 60/minute)
    • RATE_LIMIT_TEMPLATES (default: 60/minute)
    • RATE_LIMIT_SESSION (default: 30/minute)
    • RATE_LIMIT_METRICS (default: 10/minute)
  • CORS & External Services

    • ALLOWED_ORIGINS: Comma‑separated list of allowed origins (no wildcards in production).
    • OPENAI_API_KEY, SERPER_API_KEY: External API credentials (omit in development if using mock engines).

Changes to these flags should be reviewed for security impact prior to production rollout. In particular, enabling GOV_REQUIRE_COHERENCE can cause workflows to abort early by design; ensure clients handle non‑200 results and the error field in responses.

There aren’t any published security advisories