We support the latest minor version on each 0.x line, and the latest two
minor versions once 1.x ships. Older versions receive critical-severity
fixes only on a best-effort basis.
The current canonical version is the contents of the VERSION
file at the repo root. See VERSIONING.md
for the eco-wide versioning scheme.
Do not open a public GitHub issue for security vulnerabilities. Instead:
- Open a private GitHub Security Advisory, or
- Email
security@graycode.aiwith the details below.
Include in your report:
- A description of the vulnerability and the affected component.
- Steps to reproduce, ideally with a minimal proof-of-concept.
- The version (
VERSIONfile or git SHA) you tested against. - The potential impact and any suggested mitigation.
Response targets:
- Initial acknowledgement: within 48 hours.
- Triage and severity assessment: within 5 business days.
- Coordinated fix and disclosure: within 30 days for high/critical, 90 days for medium/low (per industry-standard responsible disclosure).
We follow coordinated vulnerability disclosure:
- Reporters receive credit in the advisory and CHANGELOG (unless they opt out).
- We request that reporters refrain from public disclosure until a fix has been released or the disclosure deadline above has elapsed.
- We will not pursue legal action against good-faith researchers acting within this policy.
- Dependency monitoring: automated via Dependabot (see
.github/dependabot.yml). - Static analysis:
golangci-lint/ruff/mypyenforced in CI. - Vulnerability scanning:
govulncheck(Go) /pip-audit(Python) run on every CI build. - Lockfiles:
go.sum/pnpm-lock.yaml/pyproject.tomlare pinned and committed. - Reproducible builds: release artefacts ship with SHA-256 checksums via goreleaser.
- No secrets in source: API keys are configuration, not constants. Pre- commit hooks block accidental secret commits.
This policy covers the code in this repository and the release artefacts published from it. It does not cover:
- Third-party dependencies (report to upstream).
- LLM provider services that trace integrates with (report to the provider).
- Local filesystem misuse where an attacker already has shell access (out of threat model).
For trace-specific threat-model notes, see the README and any docs in this repo.