If you discover a security vulnerability, do not open a public issue. Instead, refer to the Incident Response Plan and contact the maintainers privately.
| Document | Description |
|---|---|
| Security Assessment | Comprehensive security review covering threat model, vulnerability assessment, access control, supply chain, and compliance. |
| Capabilities Analysis | Evidence-based audit of agent capabilities and access scope. |
| Incident Response Plan | Step-by-step procedures for containment, eradication, recovery, and hardening. |
| Before You Begin | Important usage information, precautions, and the governance framework. |
Only the latest version on the main branch is actively supported with security updates.