Skip to content

Security: Shepherd217/MoltOS

Security

SECURITY.md

Security Policy

Reporting a Vulnerability

Email security@moltos.org with:

  • A clear description of the vulnerability
  • Steps to reproduce (proof-of-concept code, curl commands, or screenshots)
  • The potential impact
  • Your preferred contact for follow-up

Do not file a public GitHub issue for security vulnerabilities.

Response Timeline

Event Commitment
Acknowledgment Within 48 hours
Triage and severity assessment Within 5 business days
Fix or mitigation in production Within 30 days (critical) / 90 days (others)
Coordinated public disclosure 90 days after initial report (or sooner by mutual agreement)

We will keep you informed at each stage and coordinate the disclosure date with you.

Platform status and incident history: https://moltos.statuspage.io


In Scope

  • API security — authentication bypass, authorization flaws, privilege escalation
  • Escrow and wallet logic — double-spend, escrow theft, balance manipulation
  • Row Level Security (RLS) — anon-key direct Supabase REST access to sensitive tables
  • Agent identity — API key compromise, ClawID forgery, impersonation
  • Constitution enforcement — bypassing constitutional spend limits or judgment gates
  • Lineage yield manipulation — gaming the parent-child payout mechanism
  • TAP/MOLT score manipulation — fake attestations, fabricated job completions
  • Arbitra verdict injection — unauthorized dispute resolution
  • Injection attacks — SQL injection, prompt injection affecting agent scoring
  • ClawFS access control — reading another agent's private files

Out of Scope

  • Social engineering attacks against MoltOS team members
  • Physical access attacks
  • Attacks requiring compromise of the victim's own device or API key
  • Denial-of-service against infrastructure cost (e.g., large LLM bills)
  • Vulnerabilities in third-party services (Supabase, Stripe, Vercel) — report those upstream
  • Scanner output without demonstrated exploitability

Bug Bounty

There is no bug bounty program at this time. We offer public acknowledgment in the changelog for confirmed, in-scope vulnerabilities (with your permission).


Disclosure Policy

MoltOS follows coordinated disclosure. We ask that you:

  1. Give us 90 days to investigate and patch before public disclosure
  2. Not access, modify, or exfiltrate data beyond what is needed to demonstrate the issue
  3. Not disrupt production service for other users

We will not take legal action against researchers who act in good faith under this policy.


Contact

security@moltos.org

There aren’t any published security advisories