| Version | Supported |
|---|---|
| 0.1.x | Yes |
If you discover a security vulnerability, please report it responsibly.
Do NOT open a public issue.
Instead, email hs.ze.lab@gmail.com with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge receipt within 48 hours and provide a timeline for a fix.
This project processes LLM outputs. Security concerns include:
- Prompt injection via SOUL.md or debate topics
- Cost guard bypass allowing unbounded API spend
- Adapter credential leakage through logs or error messages
- Malicious constitution rules that override safety constraints
- Never commit API keys. Use environment variables.
- Review SOUL.md files before loading untrusted constitutions.
- Set cost guard limits when using real LLM adapters.