Please report suspected vulnerabilities privately via GitHub Security Advisories:
https://github.com/GareBear99/ARC-Core/security/advisories/new
Do not open a public issue for security matters.
ARC-Core is the authority layer for the ARC ecosystem. Security issues include:
- Receipt forgery — any way to produce a receipt that references state that did not actually exist, or any bypass of the SHA-256 identity check on the audit-log chain.
- Authority bypass — any way to execute a privileged action without the role / session / token check firing.
- Case or proposal tampering — any way to modify a case or proposal without producing a corresponding event + receipt.
- Audit-log corruption — any way to write to the audit log that escapes the verify endpoint.
- Connector / ingest injection — any way a filesystem JSONL source (or future connector) could inject unintended events or mutate state without a receipt.
- Geospatial path traversal — blueprint, evidence-pack, or track-import endpoints that accept user-controlled paths.
- Session handling — session fixation, token replay, or auth flow weaknesses.
- Known dependency CVEs that affect ARC-Core's actual attack surface.
- The receipt chain correctly rejecting your tampering attempt — that's the system working as designed.
- Feature requests dressed as security issues.
- Findings that only apply inside a local demo SQLite with no real authority boundary configured.
- Acknowledge within 72 hours.
- Triage severity.
- Develop and test a fix privately.
- Publish a coordinated advisory with credit (unless anonymous preferred).
Vulnerabilities that cross into sibling repos should be reported against the sibling's home:
- Deterministic execution / kernel → Cleanroom Runtime
- Cognition / model doctrine → Cognition Core
- Governed build loop / Gate v2 → LLMBuilder
- Language / lexical truth → Language Module
- Binary mirror → OmniBinary
- Archive bundles → Arc-RAR
If in doubt, file here and we'll route.
ARC-Core depends on FastAPI, Starlette, SQLite (stdlib), and the Python stdlib. Vulnerabilities in upstream packages are tracked via Dependabot security updates.