| Version | Supported |
|---|---|
| 0.3.x | ✅ |
| 0.2.x | ✅ |
| < 0.2 | ❌ |
Do not open public GitHub issues for security vulnerabilities.
If you discover a security vulnerability in AegisClaw, please report it privately.
- Email: security@aegisclaw.dev (Replace with actual email)
- Encryption: Please use our PGP Key (coming soon) to encrypt sensitive reports.
- Response Timeline: We aim to acknowledge reports within 24 hours and provide an initial assessment within 72 hours.
AegisClaw is designed to protect against:
- Malicious Skills: Containment via Docker/gVisor and strict capability dropping.
- Secrets Leakage: Active Secret Redaction automatically scrubs secrets from logs and console output.
- Runaway Agents: Emergency Lockdown ("Panic Button") instantly kills all containers and blocks execution.
- Over-permissioning: Granular OPA-based scope enforcement.
We currently do not protect against:
- Physical access to the host machine.
- Compromised host OS user account (if
rootlessdocker is not used).
No third-party audits have been performed yet. Use at your own risk in production environments.