|
1 | 1 | # Security Policy |
2 | 2 |
|
| 3 | +## About Agent OS |
| 4 | + |
| 5 | +**Agent OS** is part of the [Agent Governance Ecosystem](https://github.com/imran-siddique) — a suite of open-source projects for building, orchestrating, and governing autonomous AI agents in enterprise environments. |
| 6 | + |
3 | 7 | ## Supported Versions |
4 | 8 |
|
5 | 9 | | Version | Supported | |
6 | 10 | | ------- | ------------------ | |
7 | | -| 0.x.x | :white_check_mark: | |
| 11 | +| Latest | :white_check_mark: | |
| 12 | +| < Latest | :x: | |
8 | 13 |
|
9 | | -Once Agent OS reaches 1.0, we will maintain security updates for the latest minor version. |
| 14 | +Only the latest release of Agent OS receives security updates. Users are strongly encouraged to stay up to date. |
10 | 15 |
|
11 | 16 | ## Reporting a Vulnerability |
12 | 17 |
|
13 | | -**Please do not report security vulnerabilities through public GitHub issues.** |
14 | | - |
15 | | -If you discover a security vulnerability in Agent OS, please report it responsibly: |
16 | | - |
17 | | -### 1. Email (Preferred) |
18 | | - |
19 | | -Send an email to: **security@agent-os.dev** |
20 | | - |
21 | | -Include: |
22 | | -- Description of the vulnerability |
23 | | -- Steps to reproduce |
24 | | -- Potential impact |
25 | | -- Any suggested fixes (optional) |
26 | | - |
27 | | -### 2. GitHub Security Advisories |
28 | | - |
29 | | -You can also report via [GitHub Security Advisories](https://github.com/imran-siddique/agent-os/security/advisories/new). |
30 | | - |
31 | | -### 3. Encrypted Communication |
32 | | - |
33 | | -For sensitive reports, you may encrypt your message using our PGP key: |
34 | | - |
35 | | -``` |
36 | | ------BEGIN PGP PUBLIC KEY BLOCK----- |
37 | | -[PGP key to be added] |
38 | | ------END PGP PUBLIC KEY BLOCK----- |
39 | | -``` |
40 | | - |
41 | | -Key fingerprint: `[To be added]` |
42 | | - |
43 | | -## Response Timeline |
44 | | - |
45 | | -| Stage | Timeline | |
46 | | -|-------|----------| |
47 | | -| Initial acknowledgment | Within 48 hours | |
48 | | -| Initial assessment | Within 1 week | |
49 | | -| Fix development | Varies by severity | |
50 | | -| Public disclosure | Coordinated with reporter | |
51 | | - |
52 | | -## Severity Classification |
53 | | - |
54 | | -We use the following severity levels: |
55 | | - |
56 | | -| Severity | Description | Response Time | |
57 | | -|----------|-------------|---------------| |
58 | | -| **Critical** | Remote code execution, complete bypass of safety policies | 24-48 hours | |
59 | | -| **High** | Partial bypass of safety policies, data exposure | 1 week | |
60 | | -| **Medium** | Denial of service, information leakage | 2 weeks | |
61 | | -| **Low** | Minor issues, hardening opportunities | Next release | |
62 | | - |
63 | | -## Security Model |
64 | | - |
65 | | -### What Agent OS Protects Against |
66 | | - |
67 | | -Agent OS provides **application-level policy enforcement**: |
68 | | - |
69 | | -- ✅ Deterministic policy checks on agent actions |
70 | | -- ✅ SQL injection prevention (via policy rules) |
71 | | -- ✅ File system access restrictions (configurable paths) |
72 | | -- ✅ Rate limiting and resource controls |
73 | | -- ✅ Action logging and audit trails (Flight Recorder) |
74 | | - |
75 | | -### What Agent OS Does NOT Protect Against |
| 18 | +If you discover a security vulnerability in Agent OS, please report it responsibly. |
76 | 19 |
|
77 | | -Agent OS is middleware, not a security sandbox: |
| 20 | +**Email:** [security@imransiddique.com](mailto:security@imransiddique.com) |
78 | 21 |
|
79 | | -- ❌ Memory corruption or process isolation (use containers) |
80 | | -- ❌ Compromised LLM providers |
81 | | -- ❌ Network-level attacks |
82 | | -- ❌ Supply chain attacks on dependencies |
| 22 | +**Please include:** |
83 | 23 |
|
84 | | -**For production deployments, we recommend:** |
85 | | -- Running agents in isolated containers |
86 | | -- Using network policies to restrict agent communication |
87 | | -- Monitoring the Flight Recorder for anomalies |
88 | | -- Regular dependency audits |
| 24 | +- A description of the vulnerability |
| 25 | +- Steps to reproduce the issue |
| 26 | +- Affected version(s) |
| 27 | +- Any potential impact assessment |
89 | 28 |
|
90 | | -## Security Best Practices |
| 29 | +> **Do not open a public GitHub issue for security vulnerabilities.** |
91 | 30 |
|
92 | | -### For Users |
| 31 | +## What to Expect |
93 | 32 |
|
94 | | -1. **Keep Agent OS updated** - Always run the latest version |
95 | | -2. **Use restrictive policies** - Start with minimal permissions, expand as needed |
96 | | -3. **Enable Flight Recorder** - Log all agent actions for audit |
97 | | -4. **Review policies regularly** - Ensure policies match current requirements |
98 | | -5. **Run in containers** - Isolate agents for defense in depth |
| 33 | +| Step | Timeline | |
| 34 | +| --------------------------- | ------------ | |
| 35 | +| Acknowledgment of report | Within 48 hours | |
| 36 | +| Initial assessment | Within 5 business days | |
| 37 | +| Fix development and testing | Within 30 days (critical), 90 days (non-critical) | |
| 38 | +| CVE assignment | If applicable, coordinated with the reporter | |
| 39 | +| Public disclosure | After fix is released, per responsible disclosure timeline | |
99 | 40 |
|
100 | | -### For Contributors |
| 41 | +We will keep you informed throughout the process and credit reporters (unless anonymity is requested). |
101 | 42 |
|
102 | | -1. **Sign commits** - Use `git commit -s` (DCO) and GPG signing |
103 | | -2. **Review dependencies** - Check for known vulnerabilities before adding |
104 | | -3. **Write secure code** - Follow OWASP guidelines |
105 | | -4. **Add tests** - Include security-relevant test cases |
106 | | -5. **Document security implications** - Note any security considerations in PRs |
| 43 | +## Responsible Disclosure Timeline |
107 | 44 |
|
108 | | -## Dependency Management |
| 45 | +We follow a **90-day responsible disclosure policy**: |
109 | 46 |
|
110 | | -We monitor dependencies for known vulnerabilities using: |
111 | | -- GitHub Dependabot |
112 | | -- Regular security audits |
| 47 | +1. Reporter submits vulnerability via the email above. |
| 48 | +2. We acknowledge receipt within **48 hours**. |
| 49 | +3. We work to develop and release a fix within **90 days**. |
| 50 | +4. Once the fix is released, the vulnerability may be publicly disclosed. |
| 51 | +5. If we are unable to fix the issue within 90 days, we will coordinate with the reporter on an appropriate disclosure timeline. |
113 | 52 |
|
114 | | -## Disclosure Policy |
| 53 | +## Scope |
115 | 54 |
|
116 | | -We follow coordinated disclosure: |
| 55 | +### In Scope |
117 | 56 |
|
118 | | -1. Reporter notifies us privately |
119 | | -2. We confirm and assess the vulnerability |
120 | | -3. We develop and test a fix |
121 | | -4. We coordinate disclosure timing with the reporter |
122 | | -5. Fix is released with security advisory |
123 | | -6. Credit is given to the reporter (unless they prefer anonymity) |
| 57 | +- Source code of Agent OS |
| 58 | +- Third-party dependencies used by Agent OS |
| 59 | +- Configuration files and deployment templates |
| 60 | +- CI/CD pipeline configurations |
| 61 | +- Documentation that could lead to insecure usage |
124 | 62 |
|
125 | | -## Security Advisories |
| 63 | +### Out of Scope |
126 | 64 |
|
127 | | -Published security advisories are available at: |
128 | | -[github.com/imran-siddique/agent-os/security/advisories](https://github.com/imran-siddique/agent-os/security/advisories) |
| 65 | +- Social engineering attacks against maintainers or users |
| 66 | +- Denial of Service (DoS/DDoS) attacks |
| 67 | +- Attacks requiring physical access |
| 68 | +- Issues in third-party services not controlled by this project |
| 69 | +- Vulnerabilities already reported and being addressed |
129 | 70 |
|
130 | | -## Hall of Fame |
| 71 | +## Security Best Practices for Users |
131 | 72 |
|
132 | | -We recognize security researchers who responsibly disclose vulnerabilities: |
| 73 | +- **Keep dependencies updated:** Regularly run dependency audits and update to the latest versions. |
| 74 | +- **Use environment variables for secrets:** Never hardcode credentials, API keys, or tokens in configuration files. |
| 75 | +- **Enable access controls:** Follow the principle of least privilege when configuring agent permissions. |
| 76 | +- **Review configurations:** Audit your deployment configurations against the provided security guidelines. |
| 77 | +- **Monitor for advisories:** Watch this repository for security advisories and release notes. |
| 78 | +- **Use signed commits:** Enable GPG or SSH commit signing to ensure code integrity. |
| 79 | +- **Run in isolated environments:** Use containers or sandboxed environments for agent workloads. |
133 | 80 |
|
134 | | -*No submissions yet - be the first!* |
| 81 | +## Agent Governance Ecosystem |
135 | 82 |
|
136 | | -## Contact |
| 83 | +Agent OS is part of the broader **Agent Governance Ecosystem**, which provides a unified framework for secure, observable, and compliant AI agent operations. Security policies are coordinated across all ecosystem projects to ensure consistent protection. |
137 | 84 |
|
138 | | -- Security issues: security@agent-os.dev |
139 | | -- General questions: [GitHub Discussions](https://github.com/imran-siddique/agent-os/discussions) |
| 85 | +For ecosystem-wide security concerns, please contact [security@imransiddique.com](mailto:security@imransiddique.com). |
140 | 86 |
|
141 | 87 | --- |
142 | 88 |
|
143 | | -*Last updated: February 2026* |
| 89 | +Thank you for helping keep Agent OS and the Agent Governance Ecosystem safe for everyone. |
0 commit comments