| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please follow our responsible disclosure process.
- ❌ Open a public GitHub issue for security vulnerabilities
- ❌ Disclose the vulnerability publicly before it's fixed
- ❌ Exploit the vulnerability beyond what's necessary to demonstrate it
- ✅ Report privately using the process below
- ✅ Provide sufficient detail to reproduce the issue
- ✅ Allow reasonable time for us to respond and fix
This policy applies to:
- AgentMesh core libraries (
agentmesh-platform) - AgentMesh MCP Server (
agentos-mcp-server) - AgentMesh API (
agentmesh-api) - AgentMesh Benchmark API
- Official documentation and examples
- Third-party dependencies (report to upstream)
- Social engineering attacks
- Denial of service attacks
- Issues in forks or unofficial distributions
Email: security@agentmesh.dev (or imran.siddique@microsoft.com)
GitHub Security Advisories: Report a vulnerability
- Description: Clear explanation of the vulnerability
- Impact: What an attacker could achieve
- Steps to Reproduce: Detailed reproduction steps
- Affected Versions: Which versions are impacted
- Suggested Fix: (Optional) If you have a proposed solution
- Your Contact: Email for follow-up questions
Subject: [SECURITY] Policy bypass via Unicode normalization
Description:
The policy engine's string matching can be bypassed using Unicode
homoglyphs. An attacker can execute "ᵣᵤₙ_ₛₕₑₗₗ" which visually
resembles "run_shell" but bypasses the blocklist.
Impact:
Attackers can execute blocked tools by using Unicode variants.
Steps to Reproduce:
1. Create policy blocking "run_shell" tool
2. Request tool "ᵣᵤₙ_ₛₕₑₗₗ" (Unicode subscript letters)
3. Policy check passes, tool executes
Affected Versions: 1.0.0 - 1.2.3
Suggested Fix:
Apply Unicode normalization (NFKC) before policy matching.
| Phase | Target Time |
|---|---|
| Initial acknowledgment | 24 hours |
| Severity assessment | 72 hours |
| Fix development | 7-30 days (severity dependent) |
| Public disclosure | After fix is released |
| Level | Description | Target Fix Time |
|---|---|---|
| Critical | Remote code execution, auth bypass | 7 days |
| High | Policy bypass, data exposure | 14 days |
| Medium | Limited impact vulnerabilities | 30 days |
| Low | Minor issues, hardening | 90 days |
We follow coordinated disclosure practices:
- Private Report: You report to us privately
- Acknowledgment: We confirm receipt within 24 hours
- Investigation: We assess severity and develop fix
- Notification: We notify you when fix is ready
- Release: We release the fix
- Disclosure: We publish a security advisory (crediting you)
- Embargo Lift: You may publish your findings
- Default embargo: 90 days from report
- May be extended for complex issues
- May be shortened if actively exploited
Published advisories are available at:
We currently do not operate a paid bug bounty program. However, we recognize security researchers in:
- Security advisory credits
- Hall of Fame in CONTRIBUTORS.md
- Social media acknowledgment (with permission)
When using AgentMesh:
- Use allowlists over blocklists when possible
- Enable strict mode in production
- Regularly audit policy files
- Run with minimal privileges
- Use network isolation where possible
- Enable audit logging
- Rotate API keys regularly
- Monitor audit logs for anomalies
- Set up alerts for policy violations
- Use
verify_integrity()to detect log tampering
AgentMesh includes several security features:
| Feature | Description | Status |
|---|---|---|
| Cryptographic Identity | Ed25519/X.509 agent credentials | ✅ Stable |
| Capability Scoping | Fine-grained permission control | ✅ Stable |
| Policy Engine | Tool-level access control | ✅ Stable |
| Merkle Audit | Immutable Merkle-chained logs | ✅ Stable |
| Tamper Detection | Hash chain verification | ✅ Stable |
| Shadow Mode | Test policies before enforcement | ✅ Stable |
| Zero-Trust | Verify every interaction | ✅ Stable |
| Rate Limiting | Prevent resource exhaustion | 🚧 Planned |
| mTLS | Mutual TLS for MCP | 🚧 Planned |
AgentMesh supports compliance with:
| Standard | Coverage |
|---|---|
| SOC 2 Type II | Audit logging, access controls |
| HIPAA | PHI protection policies |
| GDPR | Data minimization, consent tracking |
| PCI DSS | Cardholder data policies |
| EU AI Act | Human oversight, transparency |
Note: AgentMesh is a tool to help achieve compliance, not a compliance certification.
We are committed to the OpenSSF Best Practices:
- ✅ HTTPS for all project sites
- ✅ Version control (Git)
- ✅ Automated testing (CI/CD)
- ✅ Static analysis (linting)
- ✅ Documented security policy
- ✅ Vulnerability reporting process
- Security Reports: security@agentmesh.dev / imran.siddique@microsoft.com
- General Questions: hello@agentmesh.dev
- GitHub: @imran-siddique
This security policy follows the disclose.io safe harbor guidelines.
Last updated: February 2026