| Version | Supported |
|---|---|
| 0.9.x | ✅ |
| 0.8.x | ✅ |
| < 0.8 | ❌ |
We take the security of Subcog seriously. If you discover a security vulnerability, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please use one of the following methods:
-
GitHub Security Advisories (Preferred): Report via GitHub Security Advisories
-
Email: Send details to the repository maintainers (see GitHub profile)
Please provide as much information as possible:
- Description of the vulnerability
- Steps to reproduce
- Affected versions
- Potential impact
- Any suggested fixes (optional)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 30 days for critical issues
- Acknowledgment: We'll confirm receipt of your report
- Assessment: We'll evaluate the severity and impact
- Updates: We'll keep you informed of our progress
- Credit: With your permission, we'll credit you in the release notes
Subcog implements several security measures:
- No unsafe code:
#![forbid(unsafe_code)]enforced - Dependency auditing: Regular
cargo-auditandcargo-denychecks - Secret detection: Built-in PII/secret detection prevents accidental capture
- Vulnerability scanning: Trivy scanning in CI/CD pipeline
- Pinned dependencies: All CI actions use SHA-pinned versions
The following are in scope for security reports:
- Memory injection vulnerabilities
- Secret/PII leakage
- Authentication/authorization bypass (for MCP server)
- Dependency vulnerabilities
- Cryptographic weaknesses
The following are out of scope:
- Denial of service via resource exhaustion (single-user tool)
- Issues requiring physical access
- Social engineering attacks