Ori Runtime controls physical systems. Security issues can have real-world consequences.
| Version | Supported |
|---|---|
0.9.x (beta) |
Yes |
<0.9.0 |
No |
Use GitHub's private vulnerability reporting for this repository:
- Go to the repository
Securitytab. - Click
Report a vulnerability. - Submit details privately.
If private reporting is unavailable, contact the repository owner directly via GitHub.
Do not open public issues for undisclosed vulnerabilities.
Please include:
- Affected component and file paths
- Reproduction steps (minimal PoC)
- Impact (confidentiality/integrity/availability/safety)
- Whether physical actuation can be triggered or bypassed
- Suggested remediation (if available)
For valid reports:
- Initial acknowledgment: within 72 hours
- Triage and severity decision: within 7 days
- Patch target:
- Critical/high: as soon as possible, usually within 14 days
- Medium/low: scheduled in normal release cadence
- Coordinate disclosure until a fix is available.
- Public disclosure is expected only after fix release or explicit maintainer approval.
- Security advisories and release notes will describe impact and mitigation.
Highest-priority findings include:
- Tier C/Tier D enforcement bypasses
- Skill sandbox escape or unsafe hook execution
- Unsafe rule-expression execution or AST guard bypass
- Unauthorized action execution via webhook/approval paths
- Secrets exposure in repo, config handling, or logs
- Supply-chain integrity issues in dependency/update paths
Good-faith security research is welcome. We will not pursue action for:
- Testing within this repository and your own infrastructure
- Non-destructive proof-of-concept demonstrations
- Responsible private disclosure under this policy
Do not access or modify data/systems that you do not own or have permission to test.
If you discover an issue that can cause immediate physical harm, mark the report as urgent and clearly state:
- Trigger conditions
- Potential hazard
- Suggested temporary mitigation