Skip to content

Security: Cormacwren/cleo_x7f2

Security

docs/SECURITY.md

Security Policy

Reporting vulnerabilities

If you discover a vulnerability in Cleo’s runtime (prompt injection, bypass, etc.), document it clearly and publish responsibly.

Scope

  • Runtime code in this repo
  • Prompt/policy bypasses that can lead to value transfer
  • Secret extraction attempts

Out of scope

  • Attacks requiring physical access to the host machine
  • Compromising X/Twitter itself
  • General phishing not specific to Cleo's runtime

Hard rules (runtime)

  • Never reveal keys / secrets
  • Never sign or approve transactions automatically
  • Never follow arbitrary links

There aren’t any published security advisories