| Version | Supported |
|---|---|
| 3.3.x | ✅ |
| 3.2.x | ✅ |
| < 3.0 | ❌ |
If you discover a security vulnerability in Project Ontos, please report it responsibly:
- Do not open a public issue
- Email the maintainers directly or use GitHub's private vulnerability reporting
- Include details about the vulnerability and steps to reproduce
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 7 days
- Resolution: Depends on severity and complexity
Project Ontos processes local markdown files via the ontos Python package. Key security considerations:
- The
ontosCLI reads/writes within the project root and configured doc directories - No network requests are made by any command
- File paths are validated against the project root — path traversal outside the repo is rejected
- Uses PyYAML's
safe_load()exclusively to prevent code execution - Malformed YAML is handled gracefully with structured error reporting
- Don't run ontos on untrusted repositories — Only use Ontos on your own projects
- Review generated files — Always review
Ontos_Context_Map.mdandAGENTS.mdbefore committing - Keep dependencies updated — Run
pip install --upgrade ontos - Scan for secrets before releases — Run
gitleaks detectandtrufflehog git file://. --no-update
This security policy applies to:
- The
ontosPython package (ontos/directory)ontos/io/yaml.py— YAML parsing surfaceontos/io/scan.py— File system scanning and discoveryontos/cli.py— CLI entry point and argument handling
- The
ontosCLI entry point (ontos <command>) - Generated files:
Ontos_Context_Map.md,AGENTS.md,.cursorrules
Third-party dependencies (PyYAML) have their own security policies.