Thank you for helping keep the SIM-ONE Framework and its users safe. This policy explains how to report vulnerabilities, what is in scope, and how we coordinate disclosure.
We provide security fixes for:
- The latest release on the main branch
- The most recent minor release when there is an active LTS tag in this repository
Older releases may receive fixes case by case if impact is critical and the patch is low risk.
Please email [email protected] with the subject [SECURITY] Vulnerability Report.
Include:
- A clear description of the issue and impact
- A minimal proof of concept or reproduction steps
- Affected version or commit hash and environment details
- Any logs, stack traces, screenshots that help reproduce
- Contact information for coordinated follow up
Do not open public GitHub issues for suspected vulnerabilities.
If the issue involves a third-party dependency, report it to us and the upstream project when possible.
- Acknowledgment within 3 business days
- Triage and severity rating (CVSS 3.1 guidance) within 7 business days
- Fix plan provided after triage with an estimated timeline
- Advisory will be published when a fix or mitigation is available
We will keep you informed during triage and remediation and invite you to validate the fix where appropriate.
Default embargo period: 90 days from acknowledgment. We may shorten or extend this period depending on exploitability, user impact, or availability of mitigations.
We credit reporters in release notes and advisories unless you request anonymity.
In scope:
- Vulnerabilities in SIM-ONE Framework source code and official packages
- Security defects in default configuration and documented deployment paths
- Supply chain risks that affect how the framework is built or distributed
Out of scope:
- Social engineering, phishing, and physical attacks
- Denial of service through excessive traffic without a specific bug
- Self-XSS that requires the victim to paste code into their own console
- Vulnerabilities in third-party services or dependencies that are not exploitable through our usage
- Issues on non-production demo sites that do not affect the software itself
If you are unsure about scope, send the report anyway. We will triage it.
We will not pursue or support legal action against researchers who:
- Act in good faith and comply with this policy
- Avoid privacy violations and avoid destruction of data
- Do not disrupt production systems
- Do not attempt to access data that does not belong to you
- Give us a reasonable time to remediate before public disclosure
Security fixes are announced in:
- GitHub Releases
- Repository CHANGELOG
- GitHub Security Advisories (GHSA) when applicable
For critical fixes we will provide upgrade guidance and mitigations.
We monitor vulnerabilities in direct dependencies and build tooling. If you discover a vulnerability in our build or release process, report it through the email above.
For commercial customers with support contracts, use your support channel in addition to the email above.
The backend emits structured JSON logs for security‑relevant events.
- Audit destination:
security_events.log
(daily rotation, 14 backups) - App logs:
code/mcp_server/mcp_server.log
(daily rotation, 7 backups) - Format: JSON with common fields (
timestamp
,level
,logger
,module
,funcName
,lineNo
) plus event payload. - Event types (non‑exhaustive):
recovery_decision
: protocol recovery action chosen (action
,retry_count
,reason
).governance_incoherence_detected
: incoherence found; may trigger a retry.governance_abort
: workflow aborted due to incoherence after retry.execute_completed
: summary of/execute
includinguser_id
,session_id
, andgovernance_summary
.
Personally identifiable or sensitive content is not logged; summaries include aggregate governance scores and booleans only.
Environment flags can strengthen or tune runtime protections. Update code/mcp_server/.env
accordingly.
-
Governance
GOV_ENABLE
(default:true
): Toggle governance evaluation.GOV_MIN_QUALITY
(default:0.6
): Minimum acceptable quality score per protocol; below threshold is flagged.GOV_REQUIRE_COHERENCE
(default:false
): Iftrue
, incoherence triggers a single retry then aborts the workflow on persistent failure.
-
Rate Limiting (per endpoint)
RATE_LIMIT_EXECUTE
(default:20/minute
)RATE_LIMIT_PROTOCOLS
(default:60/minute
)RATE_LIMIT_TEMPLATES
(default:60/minute
)RATE_LIMIT_SESSION
(default:30/minute
)RATE_LIMIT_METRICS
(default:10/minute
)
-
CORS & External Services
ALLOWED_ORIGINS
: Comma‑separated list of allowed origins (no wildcards in production).OPENAI_API_KEY
,SERPER_API_KEY
: External API credentials (omit in development if using mock engines).
Changes to these flags should be reviewed for security impact prior to production rollout. In particular, enabling GOV_REQUIRE_COHERENCE
can cause workflows to abort early by design; ensure clients handle non‑200 results and the error
field in responses.