| Version | Status | Support |
|---|---|---|
| v1.0.0-governed | current | ✅ security fixes |
| v0.3.x alpha | superseded | ❌ upgrade recommended |
| < v0.3 | legacy | ❌ not supported |
Please report suspected vulnerabilities privately via GitHub Security Advisories:
https://github.com/GareBear99/ARC-Neuron-LLMBuilder/security/advisories/new
Do not open a public issue for security matters.
- Unsafe command execution — any path through an adapter that executes user-supplied content as shell, python, or other code.
- Adapter secret leakage — API keys, tokens, or local credentials surfaced in receipts, logs, Arc-RAR bundles, or Omnibinary events.
- Path traversal — in bundle extraction, capsule handling, attachment tooling, or any I/O path that takes a user-controlled path component.
- Malformed input breaks validation — inputs that cause the scorer, promotion gate, or benchmark task loader to skip validation or silently accept invalid data.
- Omnibinary integrity violations — ways to write to the ledger that bypass the SHA-256 verification path or leave the index in an inconsistent state that
verify()does not catch. - Gate v2 bypass — any way to make
promote_candidate.pyaccept a candidate that should have been rejected by the hard-reject floor, the floor model, or a regression ceiling. - Non-promotable adapter bypass — any way for the
heuristicorechoadapter to become an incumbent. - Receipt forgery — any way to produce a promotion receipt that references a state that did not actually exist.
- Gate v2 correctly rejecting your candidate. If the decision is accurate given the scores, that is the gate working as designed. File a "⚖️ Gate behavior report" issue (public) instead.
- Low scores from a small model on complex benchmarks. This is expected behavior at the Tiny/Small tier.
- Requests for new adapters, new benchmarks, or new capability lanes. File a feature request.
- We acknowledge within 72 hours.
- We triage and assign a severity (Critical / High / Medium / Low).
- We develop and test a fix in a private branch.
- We publish a coordinated advisory with credit (unless you prefer anonymity) and a patched release.
- We backport fixes to supported versions only.
Vulnerabilities that cross ARC ecosystem repos (ARC-Core, Cleanroom Runtime, Cognition Core, Language Module, OmniBinary, Arc-RAR) should be reported against the home repo of the primary responsibility:
- Receipt signing / event authority → ARC-Core
- Deterministic execution boundaries → arc-lucifer-cleanroom-runtime
- Binary ledger / runtime-event substrate → omnibinary-runtime
- Archive bundle format → Arc-RAR
- Language module governance → arc-language-module
- Cognition build/promote flow → arc-cognition-core
- Canonical pipeline / gate / local governance → this repo
If in doubt, file in this repo and we will route.
.github/FUNDING.ymlis the only intentional identity surface. It contains no secrets.scripts/ops/bootstrap_keys.pyis the single source of truth for generating runtime secrets..gitignoreexcludes*.key,*.pem,*.p12,**/data/keys/*, SQLite runtime DBs, and large binary artifacts.- Demo keys in release zips are placeholders and should be rotated with
bootstrap_keys.py --forceon first clone.
The runtime core depends on: PyYAML, jsonschema, requests, and (for training) torch + numpy. Vulnerabilities in upstream packages are tracked via GitHub's Dependabot alerts on this repo.