DO NOT open a public issue for security vulnerabilities.
Email: security@mindburn.org
You will receive acknowledgment within 48 hours and a detailed response within 7 days.
HELM is a fail-closed execution kernel. The security model assumes:
- The model is untrusted. Models propose; the kernel disposes.
- Tool inputs are untrusted. Every tool call is schema-validated, canonicalized (JCS/RFC 8785), and hash-bound before execution.
- Tool outputs are untrusted. Connector outputs are validated against pinned schemas. Contract drift is a hard error.
- Untrusted code is sandboxed. WASI execution has deny-by-default capabilities (no FS, no network) with gas, time, and memory budgets.
- History is immutable. Every execution produces a signed receipt linked in a ProofGraph DAG with Lamport clocks.
| Attack | Defense |
|---|---|
| Prompt injection → unauthorized tool call | Guardian policy engine blocks undeclared tools |
| Argument tampering | JCS canonicalization + SHA-256 hash binding |
| Output spoofing by malicious connector | Pinned output schema validation (fail-closed) |
| Resource exhaustion via WASM | Gas/time/memory budgets with deterministic traps |
| Receipt forgery | Ed25519 signatures on canonical payloads |
| Replay attacks | Lamport clock monotonicity + causal PrevHash chain |
| Approval bypass | Timelock + deliberate confirmation hash + domain separation |
- Prompt injection that stays within the text/conversation domain (HELM governs execution, not generation)
- Vulnerabilities in upstream LLM providers
- Side-channel attacks on the host OS
- Social engineering of human approvers
The kernel TCB is 8 packages. See docs/TCB_POLICY.md.
Security fixes are backported to the current release and the immediately preceding minor.
| Version | Supported | Notes |
|---|---|---|
| 0.4.x | ✅ | Current |
| 0.3.x | ✅ | Previous minor; fixes backported through 2026-10 |
| 0.2.x | ❌ | End of life |
| 0.1.x | ❌ | End of life |
Every released binary is:
- Signed with Sigstore cosign using GitHub Actions OIDC identity (no long-lived keys).
- Attested with SLSA Level 3 provenance on the Sigstore Rekor public transparency log.
- Inventoried with a CycloneDX 1.5 SBOM attached as a release asset.
- Reproducible via hermetic builds with pinned dependencies.
Verify a release binary:
# Verify cosign signature
cosign verify-blob \
--certificate-identity-regexp="^https://github.com/Mindburn-Labs/helm-oss" \
--certificate-oidc-issuer="https://token.actions.githubusercontent.com" \
--signature helm-linux-amd64.tar.gz.sig \
helm-linux-amd64.tar.gz
# Verify SLSA provenance
slsa-verifier verify-artifact \
--provenance-path helm.intoto.jsonl \
--source-uri github.com/Mindburn-Labs/helm-oss \
helm-linux-amd64.tar.gz- OpenSSF Scorecard weekly via
.github/workflows/scorecard.yml. - Dependabot enabled across all ecosystems (Go modules, pip, npm, cargo, Maven).
- Fuzz harness nightly (
.github/workflows/fuzz.yml) — 18 targets across canonicalization, crypto, kernel, guardian, contracts, threat scanner, compliance, saga, a2a. - Chaos drill weekly (
.github/workflows/chaos-drill.yml) — 6 fail-closed invariant scenarios co-located incore/pkg/*/chaos_test.go. - Apalache TLA+ model-check nightly (
.github/workflows/apalache.yml) — 6 specifications.
- In-scope: this repository, its published SDK packages (
pip,npm,crates.io, Maven Central), release binaries on GitHub Releases andghcr.io/mindburn-labs/helm-oss, and thetry.mindburn.orgdashboard. - Out-of-scope: the commercial
helm/repository and hosted services, customer deployments, third-party integrations. - Safe-harbor: good-faith researchers following this policy will not be pursued under DMCA, CFAA, or equivalent laws. No authorization for destructive testing of production infrastructure.
- Hall of fame: with researcher consent, findings are credited at
trust.mindburn.org/hall-of-fame. - Bug bounty: $50–$10,000 per finding by severity, hosted on HackerOne (in-scope only).
We follow coordinated disclosure with a 90-day window. CVEs are assigned via GitHub Security Advisories, published after the fix ships plus a 14-day embargo for coordinated patching.
- Email:
security@mindburn.org - PGP key: published at
https://mindburn.org/.well-known/security.asc - Ack SLA: 48 hours
- Response SLA: 7 business days for severity classification; 30 days for patch or mitigation
security.txt: served athttps://try.mindburn.org/.well-known/security.txtper RFC 9116