The following versions of Symbiont are currently supported with security updates:
| Version | Supported |
|---|---|
| 1.4.x | ✅ |
| 1.1.x | ✅ |
| 1.0.x | ❌ |
| < 1.0 | ❌ |
Last updated: 2026-02-15
We take security vulnerabilities seriously. If you discover a security vulnerability in Symbiont, please report it to us privately.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please:
- Email: Send details to security@thirdkey.ai
- Subject: Include "SECURITY" in the subject line
- Content: Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Any suggested fixes (if you have them)
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Assessment: We will assess the vulnerability and provide an initial response within 5 business days
- Updates: We will keep you informed of our progress throughout the process
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- We follow responsible disclosure practices
- We will work with you to understand and resolve the issue before any public disclosure
- We will credit you for the discovery (unless you prefer to remain anonymous)
- We will coordinate with you on the timing of public disclosure
When using Symbiont in production:
- Keep Updated: Always use the latest supported version
- Secrets Management: Use the built-in encrypted secrets store with a strong KDF password; prefer OS keychain or Vault key providers over environment variables
- Sandboxing: Use Docker, gVisor, or Firecracker for untrusted code; never use the native sandbox in production
- Tool Verification: Run in strict enforcement mode to ensure only verified MCP tools are executed
- API Keys: Enable per-agent API key authentication for all HTTP endpoints; rotate keys regularly
- Rate Limiting: Keep rate limiting enabled to prevent abuse and resource exhaustion
- Audit Logging: Enable audit logging in strict mode and monitor for suspicious activity
- Network Security: Run Symbiont in a properly secured network environment with TLS
- Policy Rules: Define explicit allow/deny policies for agent capabilities and tool access
Symbiont includes several security features:
- Sandboxed Execution: Tiered isolation (Docker, gVisor, Firecracker, E2B) with resource limits via rlimit and process-group kill on timeout
- Native Sandbox Hardening: Process-group isolation (
setpgid/killpg), CPU/memory/file-size limits, empty-by-default allowed executables, shell warnings - Secrets Management: AES-256-GCM encrypted file store with Argon2 KDF, file locking (fd-lock), mtime-based decryption cache, env/keychain/file/Vault key providers
- Per-Agent API Key Authentication: Argon2-hashed API keys with file-backed key store
- Per-IP Rate Limiting: Governor-based rate limiting middleware (configurable, default 100 req/min)
- Tool Verification (SchemaPin): Cryptographic schema verification for MCP tool invocations with configurable enforcement policies (strict/permissive/development/disabled)
- Agent Identity (AgentPin): Domain-anchored ES256 cryptographic identity verification for AI agents
- Webhook Signature Verification: HMAC-SHA256 and JWT verification with provider presets (GitHub, Stripe, Slack) and constant-time comparison
- AgentSkills Security: Verified skill loading with SchemaPin signatures, content scanning with ClawHavoc defense rules
- Sensitive Argument Redaction: Schema-driven masking of sensitive tool parameters in logs
- Audit Logging: Comprehensive logging of security-relevant events with strict/permissive failure modes
- Policy Engine: Fine-grained access control and security policies with DSL-defined rules
- Model I/O Logging: Encrypted interaction logs with configurable retention
- Symbiont executes arbitrary code as defined in agent configurations
- The native sandbox provides resource limits but not full isolation — use Docker/gVisor/Firecracker/E2B for untrusted code
- Native sandbox is blocked in production (
SYMBIONT_ENV=production) - Ensure proper network isolation and access controls
- Regularly review and audit agent configurations and policy rules
- Monitor system resources and API usage
- Use encryption for data at rest and in transit
- Rotate API keys and secrets periodically
We maintain an internal vulnerability management process:
- Triage: Initial assessment and severity classification
- Investigation: Technical analysis and impact assessment
- Remediation: Development and testing of fixes
- Release: Security patches and coordinated disclosure
- Post-mortem: Review process improvements
- Critical: Remote code execution, privilege escalation
- High: Information disclosure, authentication bypass
- Medium: Denial of service, local privilege escalation
- Low: Information leakage, minor security issues
We monitor our dependencies for known vulnerabilities:
- cargo-deny: License and vulnerability auditing via
deny.toml - Regular dependency updates with Cargo lockfile pinning
- Automated vulnerability scanning in CI
- Review of dependency security advisories
- Prompt patching of vulnerable dependencies
For security-related questions or concerns:
- Security Email: security@thirdkey.ai
- General Contact: oss@symbiont.dev
- Website: https://symbiont.dev
This security policy is subject to change. Check this document regularly for updates.