Skip to content

Security: mackeh/AegisClaw

Security

SECURITY.md

Security Policy

Supported Versions

Version Supported
0.3.x
0.2.x
< 0.2

Reporting a Vulnerability

Do not open public GitHub issues for security vulnerabilities.

If you discover a security vulnerability in AegisClaw, please report it privately.

  1. Email: security@aegisclaw.dev (Replace with actual email)
  2. Encryption: Please use our PGP Key (coming soon) to encrypt sensitive reports.
  3. Response Timeline: We aim to acknowledge reports within 24 hours and provide an initial assessment within 72 hours.

Threat Model

AegisClaw is designed to protect against:

  • Malicious Skills: Containment via Docker/gVisor and strict capability dropping.
  • Secrets Leakage: Active Secret Redaction automatically scrubs secrets from logs and console output.
  • Runaway Agents: Emergency Lockdown ("Panic Button") instantly kills all containers and blocks execution.
  • Over-permissioning: Granular OPA-based scope enforcement.

We currently do not protect against:

  • Physical access to the host machine.
  • Compromised host OS user account (if rootless docker is not used).

Security Audits

No third-party audits have been performed yet. Use at your own risk in production environments.

There aren’t any published security advisories