Security fixes are prioritized for:
- The latest release on
main - The current development branch (
dev) when a fix is not yet released
Older tags may not receive patches.
Please report vulnerabilities privately.
Preferred contact:
- Open a private security advisory in GitHub
- Or email the maintainer:
avram.liviu@gmail.com - Or join our discord server:
https://discord.gg/NJECm4fY
Include:
- Affected version or commit
- Deployment mode (host or container)
- Reproduction steps
- Expected vs actual behavior
- Impact assessment
- Relevant policy snippets with secrets removed
Do not open public issues for exploitable vulnerabilities before triage.
- Acknowledgement target: within 3 business days
- Initial triage target: within 7 business days
- Remediation timeline depends on severity and exploitability
- Coordinated disclosure is preferred after a fix is available
ai-runtime-guard enforces policy on MCP-routed tool calls.
In scope:
- Policy bypasses for blocked or gated actions
- Approval workflow bypasses
- Workspace boundary bypasses
- Runtime-state tampering bypasses for approvals, logs, and backups
- Backup or restore security flaws that violate policy guarantees
Out of scope by design:
- Direct shell or file tooling outside MCP routing
- Attacks that bypass AIRG by using client-native tools not controlled by AIRG
High severity examples:
- Executing blocked destructive commands through AIRG
- Self-approval or approval token bypass for confirmation-gated commands
- Reading or modifying protected runtime files through guarded tools
- Cross-workspace access that violates policy boundaries
Medium severity examples:
- Incorrect enforcement order leading to unexpected allow outcomes
- Reported events missing critical attribution fields in a way that hides abuse
Low severity examples:
- Cosmetic logging inconsistencies without policy impact
- Non-exploitable doc mismatches
- Keep runtime state paths outside the agent workspace
- Keep approval actions out-of-band and operator-controlled
- Restrict or disable native agent shell/file tools that can bypass MCP controls
- Keep blocked command and sensitive path policies strict for destructive operations
- Update to latest release and review release notes for security changes
Good-faith security research and responsible disclosure are welcome. Do not exfiltrate real secrets, do not disrupt production systems, and do not perform destructive testing outside controlled environments.