Skip to content

Security: craigm26/OpenCastor

Security

SECURITY.md

Security Policy

Supported Versions

Version Status Supported Until
v2026.3.x (current) βœ… Active Until v2026.6 released
v2026.2.x πŸ”Ά Security fixes only 2026-09-01
Earlier ❌ End of life β€”

Reporting a Vulnerability

Do not file a public GitHub issue for security vulnerabilities.

Report privately:

Include: version affected, description, reproduction steps, impact assessment, and proposed fix if you have one.

Response Timeline

Stage Commitment
Acknowledgement Within 48 hours
Triage Within 7 days
Updates Every 14 days
Critical/High patch Within 30 days
Medium patch Within 90 days
CVE coordination On request

Scope

In scope:

  • Prompt injection bypasses β€” natural language inputs that cause OpenCastor to execute unsafe motor commands
  • Safety invariant bypasses β€” any path that allows remote commands to override on-device safety checks
  • RCAN RBAC bypass β€” ways to issue commands beyond a principal's declared role
  • Authentication weaknesses β€” token forgery, session fixation, credential exposure
  • Audit log tampering β€” attacks against the commitment chain or HMAC integrity
  • Β§16 AI accountability bypass β€” ways to issue AI commands without model identity being recorded
  • HiTL gate bypass β€” paths that execute PENDING_AUTH commands without authorization
  • Dependency vulnerabilities with direct exploitability (not just theoretical)

Physical safety vulnerabilities are treated as Critical regardless of exploitability complexity. Any finding that could cause a robot to move unsafely is immediately escalated.

Out of scope:

  • Theoretical vulnerabilities without a realistic attack path
  • Hardware-level attacks requiring physical access (out of software scope)
  • Social engineering
  • Denial of service that does not affect physical safety

Dependency Vulnerabilities

OpenCastor uses Dependabot for automated dependency scanning. If you discover a vulnerability in a dependency before Dependabot flags it, please report it privately β€” we'll coordinate with the upstream maintainer.

SBOM

A Software Bill of Materials (CycloneDX 1.6 JSON) is attached to each release. Verify the SBOM hash matches the release artifact before use in production environments.

Physical Safety Disclosure Policy

Vulnerabilities that could cause physical harm (uncontrolled robot motion, safety system bypass) follow a shorter embargo: we commit to a patch within 14 days and will coordinate disclosure with the reporter, relevant hardware vendors, and CISA if warranted.

CVE Process

Critical and High findings: we request a CVE via GitHub's CVE numbering authority partnership and coordinate a 90-day maximum embargo with the reporter.

RCAN Integration

OpenCastor is the reference runtime for the RCAN protocol. The following RCAN-specific security surfaces apply:

Commitment Chain

Every robot action is recorded as an HMAC-chained entry in the commitment log (~/.local/share/opencastor/commitments.jsonl by default, XDG-compliant). Chain integrity can be verified with:

rcan-validate audit ~/.local/share/opencastor/commitments.jsonl

The HMAC secret defaults to an environment variable (OPENCASTOR_COMMITMENT_SECRET) and falls back to a built-in default for development. Production deployments must override this secret.

Confidence Gates

agent.confidence_gates in the RCAN config are a configurable safety surface β€” actions below the configured threshold are automatically blocked. Misconfigured or absent gates may allow low-confidence AI actions to execute unvetted.

HiTL Gates

agent.hitl_gates require human approval before executing flagged action classes. Bypassing the approval channel (e.g., by setting auto_approve: true in a low-security environment) removes a critical safety layer.

Thought Log

The AI thought log (ThoughtLog) records full reasoning traces as JSONL. These files may contain sensitive operational context. Restrict read access appropriately (chmod 600).

Compliance Reports

castor compliance generates audit reports against RCAN Β§16 (AI Accountability). Reports are informational β€” they do not replace a security audit.


Responsible Disclosure Hall of Fame

(None yet β€” be the first.)


Policy aligned with ISO/IEC 29147 (vulnerability disclosure), ISO/IEC 30111 (vulnerability handling), and CISA coordinated vulnerability disclosure guidelines.

There aren’t any published security advisories