Only the latest published minor version receives security fixes. Older pre-release versions are not backported.
| Version | Supported |
|---|---|
| 0.1.x (latest) | ✅ |
| < 0.1 | ❌ |
Once the specification reaches stable v1.0 (targeted December 2026), this table will be updated to reflect the long-term support policy across major versions.
OpenEAGO is a FINOS-hosted project. Security vulnerabilities should not be reported as public GitHub issues.
Use GitHub's built-in private security advisory feature:
- Navigate to the Security tab of the repository.
- Click "Report a vulnerability".
- Fill in the advisory form with as much detail as possible (see below).
This channel is monitored by the project maintainers and TSC Security Working Group, and keeps disclosure private until a fix is ready.
For vulnerabilities that may affect multiple FINOS projects, or if you prefer to contact FINOS staff directly, email: security@finos.org
To help maintainers triage and reproduce the issue efficiently, please provide:
- A clear description of the vulnerability and its potential impact.
- The affected component(s): specification language, schema definitions, reference implementation (
examples/agent-registry), or documentation. - Steps to reproduce or a proof-of-concept if applicable.
- The version(s) or commit(s) where the issue was observed.
- Any suggested mitigations or relevant references (CVEs, RFCs, prior art).
| Event | Target |
|---|---|
| Initial acknowledgement | Within 3 business days |
| Triage and severity assessment | Within 7 calendar days |
| Status update to reporter | Every 14 calendar days until resolved |
| Security advisory publication | Coordinated with reporter after fix is merged |
Reporters are kept informed throughout the process. If a report is assessed as not a security vulnerability, the maintainers will explain the rationale and, where appropriate, open a public tracking issue.
OpenEAGO follows coordinated vulnerability disclosure. Maintainers ask reporters to allow a reasonable remediation window — typically 90 days from confirmation — before public disclosure. Expedited timelines can be negotiated for high-severity issues under active exploitation.
A public security advisory will be published via GitHub Security Advisories once a fix is available, crediting the reporter unless anonymity is requested.
- Normative specification language that could enable authentication bypass, privilege escalation, or data exposure in compliant implementations.
- JSON schema definitions under
spec/that fail to enforce stated security invariants. - The reference agent registry implementation under
examples/agent-registry(Rust/actix-web), including TLS configuration, mTLS certificate handling, SPIFFE/SPIRE integration, and authentication logic. - Documented security guidance (under
docs/overview/security.md) that is materially incorrect or misleading.
- Vulnerabilities in third-party dependencies (please report those upstream; use
cargo auditor similar to surface them). - Issues that require physical access to infrastructure or involve already-compromised systems.
- Denial-of-service issues unless they affect availability guarantees stated in the specification.
- General implementation bugs with no security impact.
OpenEAGO is designed for enterprise environments with strong security requirements. Implementers are expected to follow the guidance in docs/overview/security.md, including:
- Mutual TLS (mTLS) for all inter-agent communication using SPIFFE/SPIRE-issued SVIDs.
- OAuth 2.0 / SAML for external authentication at the contract boundary.
- RBAC/ABAC for authorization enforcement aligned to enterprise policy.
- Encryption in transit and at rest for all agent-handled data.
- Audit logging of contract lifecycle events, agent enrollment, and policy decisions.
Deviation from these requirements may introduce vulnerabilities that are outside the project's direct control but could be reported as specification ambiguity (which is in scope).
The TSC Security Working Group coordinates security-relevant specification work. To participate, open a discussion in the repository or reach out through the FINOS project channels referenced in GOVERNANCE.md.