Skip to content

Security: dark-builders/darq

Security

SECURITY.md

Security policy

darq spawns ACP coding agents that can read and write within their workspace, shell out to git and gh, and merge PRs to GitHub. Treat any host running darq daemon as a system that can modify your repos.

Reporting a vulnerability

Email doga@oztuzun.co with details. Please do not file public GitHub issues for security-impacting reports.

We aim to acknowledge within 72 hours and to ship a fix or mitigation within 14 days for high-severity findings.

Scope

In scope:

  • Daemon socket protocol (~/.darq/daemon.sock) — auth, message validation, sandboxing
  • ACP agent interaction — permission handling, file access boundaries, command injection
  • Workflow engine — workspace path traversal, artifact write paths
  • Learning store — vector-DB poisoning that biases future agent behaviour

Out of scope:

  • Vulnerabilities in third-party agent binaries (opencode, claude-code, etc.) — please report upstream.
  • LLM jailbreaks or prompt-injection of the agent itself — these are inherent to the medium and tracked as design constraints, not security bugs.

There aren't any published security advisories