Thank you for helping keep the SIM-ONE Framework and its users safe. This policy explains how to report vulnerabilities, what is in scope, and how we coordinate disclosure.
We provide security fixes for:
Older releases may receive fixes case by case if impact is critical and the patch is low risk.
Please email security@gorombo.com with the subject [SECURITY] Vulnerability Report.
Include:
Do not open public GitHub issues for suspected vulnerabilities.
If the issue involves a third-party dependency, report it to us and the upstream project when possible.
We will keep you informed during triage and remediation and invite you to validate the fix where appropriate.
Default embargo period: 90 days from acknowledgment. We may shorten or extend this period depending on exploitability, user impact, or availability of mitigations.
We credit reporters in release notes and advisories unless you request anonymity.
In scope:
Out of scope:
If you are unsure about scope, send the report anyway. We will triage it.
We will not pursue or support legal action against researchers who:
Security fixes are announced in:
For critical fixes we will provide upgrade guidance and mitigations.
We monitor vulnerabilities in direct dependencies and build tooling. If you discover a vulnerability in our build or release process, report it through the email above.
security@gorombo.com
For commercial customers with support contracts, use your support channel in addition to the email above.
The backend emits structured JSON logs for security‑relevant events.
security_events.log
(daily rotation, 14 backups)code/mcp_server/mcp_server.log
(daily rotation, 7 backups)timestamp
, level
, logger
, module
, funcName
, lineNo
) plus event payload.recovery_decision
: protocol recovery action chosen (action
, retry_count
, reason
).governance_incoherence_detected
: incoherence found; may trigger a retry.governance_abort
: workflow aborted due to incoherence after retry.execute_completed
: summary of /execute
including user_id
, session_id
, and governance_summary
.Personally identifiable or sensitive content is not logged; summaries include aggregate governance scores and booleans only.
Environment flags can strengthen or tune runtime protections. Update code/mcp_server/.env
accordingly.
GOV_ENABLE
(default: true
): Toggle governance evaluation.GOV_MIN_QUALITY
(default: 0.6
): Minimum acceptable quality score per protocol; below threshold is flagged.GOV_REQUIRE_COHERENCE
(default: false
): If true
, incoherence triggers a single retry then aborts the workflow on persistent failure.RATE_LIMIT_EXECUTE
(default: 20/minute
)RATE_LIMIT_PROTOCOLS
(default: 60/minute
)RATE_LIMIT_TEMPLATES
(default: 60/minute
)RATE_LIMIT_SESSION
(default: 30/minute
)RATE_LIMIT_METRICS
(default: 10/minute
)ALLOWED_ORIGINS
: Comma‑separated list of allowed origins (no wildcards in production).OPENAI_API_KEY
, SERPER_API_KEY
: External API credentials (omit in development if using mock engines).Changes to these flags should be reviewed for security impact prior to production rollout. In particular, enabling GOV_REQUIRE_COHERENCE
can cause workflows to abort early by design; ensure clients handle non‑200 results and the error
field in responses.