We take security issues seriously. If you discover a security vulnerability in agent-security, please report it privately.
Email: security@empoweredhumanity.ai
Include in your report:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if you have one)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Critical issues within 30 days, others within 90 days
- Please allow us reasonable time to fix the issue before public disclosure
- We will credit you in the security advisory (unless you prefer to remain anonymous)
- We will notify you when the fix is released
- We validate the report
- We develop and test a fix
- We release a patched version
- We publish a security advisory (GitHub Security Advisories)
- We credit the reporter (if desired)
| Version | Supported |
|---|---|
| 1.x.x | ✅ Yes |
| < 1.0 | ❌ No |
When using agent-security in your projects:
- Keep Updated: Use the latest version to get security fixes
- Dependency Scanning: Regularly update dependencies
- Secure Configuration: Follow the security guidelines in the documentation
- False Positives: Report pattern false positives to help improve detection
- Defense in Depth: Use this scanner as part of a multi-layer security strategy
- This scanner detects patterns, not intent. Manual review is required for final security assessment.
- Some attack vectors may not be detected if they use novel techniques not in the pattern library.
- The scanner does not analyze runtime behavior, only static code and content.
- Pattern-based detection: 190 security patterns with 4 intelligence layers
- OWASP ASI coverage: All 10 OWASP Agentic Security Issues
- No network calls: All scanning happens locally
- No data collection: Your code never leaves your machine
- Open source: All patterns are transparent and auditable
Examples of what we consider reportable:
- Pattern bypasses that allow known attacks to evade detection
- False negatives on critical security patterns
- Code execution vulnerabilities in the scanner itself
- Dependency vulnerabilities with active exploits
Examples of what we do NOT consider reportable:
- Feature requests for new patterns (submit as GitHub issues)
- False positives (submit as GitHub issues)
- Missing detection for novel, unpublished attack vectors (submit pattern suggestions)
- Performance issues (submit as GitHub issues)
Subscribe to security updates:
- GitHub: Watch this repository for security advisories
- npm:
npm auditwill show vulnerabilities - Email: security@empoweredhumanity.ai (for critical advisories)
We currently do not offer a bug bounty program. However, we deeply appreciate security researchers who responsibly disclose vulnerabilities and will publicly acknowledge your contribution.
For non-security questions, please use GitHub Issues. For security concerns, email security@empoweredhumanity.ai.