We actively support the following versions of LUMOS with security updates:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
We take security seriously and appreciate your efforts to responsibly disclose vulnerabilities. If you discover a security issue in LUMOS, please report it privately.
Email: security@lumos-lang.org (preferred method)
GitHub Security Advisories: Report a vulnerability
Please provide as much information as possible:
- Type of vulnerability (e.g., code injection, buffer overflow, authentication bypass)
- Component affected (core compiler, CLI, VSCode extension, etc.)
- Version affected (run
lumos --version) - Step-by-step reproduction (detailed instructions to reproduce)
- Proof of concept (code, schema, or commands demonstrating the issue)
- Impact assessment (what can an attacker achieve?)
- Suggested fix (if you have one)
- Initial response: Within 48 hours
- Confirmation/triage: Within 5 business days
- Fix timeline: Depends on severity (see below)
- Public disclosure: After fix is released (coordinated disclosure)
| Severity | Response Time | Examples |
|---|---|---|
| Critical | 24-48 hours | Remote code execution, arbitrary file write |
| High | 7 days | Privilege escalation, authentication bypass |
| Medium | 30 days | Information disclosure, DoS |
| Low | 90 days | Minor issues with limited impact |
- Acknowledgment - We'll confirm receipt of your report
- Investigation - We'll verify and assess the vulnerability
- Fix Development - We'll develop and test a patch
- Coordinated Disclosure - We'll work with you on disclosure timing
- Credit - We'll credit you in the security advisory (if you wish)
We currently do not offer a bug bounty program. However, we deeply appreciate security researchers' contributions and will:
- Credit you in the security advisory and changelog
- Acknowledge your contribution publicly (if you wish)
- Fast-track any related feature requests or improvements
When using LUMOS:
- Validate Input - Always validate
.lumosschema files before processing - Sandbox Execution - Run
lumos generatein controlled environments - Review Generated Code - Audit generated Rust/TypeScript before production use
- Keep Updated - Use the latest LUMOS version for security patches
- Dependency Audit - Regularly audit dependencies (
cargo audit)
- Avoid Sensitive Data - Don't include secrets in schema files
- Namespace Collisions - Use unique type names to avoid conflicts
- Generated Code Review - Always review generated code before committing
- Type Safety - Leverage LUMOS type system to prevent runtime errors
- Trust Source - Only generate code from trusted schema files
- Check Permissions - Ensure generated files have appropriate permissions
- Backup Before Generate - Keep backups before running
lumos generate - Verify Output - Inspect generated code for unexpected patterns
LUMOS generates Rust and TypeScript code from .lumos schemas. This process:
- ✅ Does not execute arbitrary code during parsing
- ✅ Validates syntax using battle-tested
synparser - ✅ Sanitizes identifiers to prevent injection
⚠️ Generates code that should be reviewed before production use
The CLI tool:
- Reads
.lumosschema files - Writes generated
.rsand.tsfiles - Does NOT modify system files outside the target directory
- Respects file permissions and ownership
We regularly audit dependencies for security vulnerabilities:
# Check for known vulnerabilities
cargo audit
# Update dependencies
cargo update
# View dependency tree
cargo treeSecurity updates are released via:
- GitHub Security Advisories - View advisories
- Release Notes - Tagged with
[SECURITY]prefix - crates.io - Updated packages (lumos-core, lumos-cli)
- RSS Feed - Subscribe to releases
- Security Email: security@lumos-lang.org
- General Issues: GitHub Issues
- Discussions: GitHub Discussions
We thank the security research community for helping keep LUMOS and its users safe.
Security researchers who have responsibly disclosed vulnerabilities:
(No vulnerabilities reported yet)
Last Updated: 2025-11-21 Policy Version: 1.0