Currently, the Open Memory Protocol is in Draft status. We will formally support specific versions once Section 1.0 is finalized.
| Version | Supported |
|---|---|
| 2.0.x | ✅ |
| 1.0.x | ❌ |
If you discover a security vulnerability in the Open Memory Protocol standard, reference implementations, SDKs, or connectors, please report it to us confidentially.
DO NOT log an issue on GitHub, this alerts the public to the vulnerability before it can be patched.
Please email your findings to security@openmemoryprotocol.com.
- Description: Describe the vulnerability in detail.
- Impact: Identify what could happen if exploited.
- Reproduction Steps: Step-by-step instructions on how to reproduce the vulnerability (including PoC scripts or HTTP requests if applicable).
- Environment: Which component does this affect? (e.g.
omp-pythonSDK,reference-server, the specification itself)
- We will acknowledge receipt of your vulnerability report within 48 hours.
- The OMP Working Group will review the vulnerability and confirm it.
- We will collaborate with you to create a patch / spec update.
- Once resolved, we will publish a security advisory and credit you for the discovery (unless you request anonymity).
Thank you for helping keep OMP secure.