SIM-ONE

Security Policy

Overview

Thank you for helping keep the SIM-ONE Framework and its users safe. This policy explains how to report vulnerabilities, what is in scope, and how we coordinate disclosure.

Supported Versions

We provide security fixes for:

Older releases may receive fixes case by case if impact is critical and the patch is low risk.

Reporting a Vulnerability

Please email security@gorombo.com with the subject [SECURITY] Vulnerability Report.

Include:

Do not open public GitHub issues for suspected vulnerabilities.

If the issue involves a third-party dependency, report it to us and the upstream project when possible.

Our Response Process

We will keep you informed during triage and remediation and invite you to validate the fix where appropriate.

Coordinated Disclosure

Default embargo period: 90 days from acknowledgment. We may shorten or extend this period depending on exploitability, user impact, or availability of mitigations.

We credit reporters in release notes and advisories unless you request anonymity.

Scope

In scope:

Out of scope:

If you are unsure about scope, send the report anyway. We will triage it.

Safe Harbor

We will not pursue or support legal action against researchers who:

Security Updates and Advisories

Security fixes are announced in:

For critical fixes we will provide upgrade guidance and mitigations.

Dependencies and Supply Chain

We monitor vulnerabilities in direct dependencies and build tooling. If you discover a vulnerability in our build or release process, report it through the email above.

Contact

security@gorombo.com

For commercial customers with support contracts, use your support channel in addition to the email above.

Audit Logging

The backend emits structured JSON logs for security‑relevant events.

Personally identifiable or sensitive content is not logged; summaries include aggregate governance scores and booleans only.

Security Configuration Flags

Environment flags can strengthen or tune runtime protections. Update code/mcp_server/.env accordingly.

Changes to these flags should be reviewed for security impact prior to production rollout. In particular, enabling GOV_REQUIRE_COHERENCE can cause workflows to abort early by design; ensure clients handle non‑200 results and the error field in responses.