| Version | Supported |
|---|---|
| 0.0.x | Yes |
Do not open a public GitHub issue for a security vulnerability.
Use GitHub private vulnerability reporting and include:
- A clear description of the issue.
- Reproduction steps.
- Expected impact.
- Any suggested mitigation.
The following are in scope:
- Abigail desktop application and daemons
- Vault unlock and sealed local storage
- Hive identity signing and constitutional verification
- Portable archive and recovery export handling
- Signed skill allowlist enforcement
- Updater signing, release-signing, or
latest.jsongeneration issues - Skill sandbox escape or trust-policy bypass
- Local-only HTTP boundary issues, including SSRF validation regressions
- Abigail enforces a fail-closed trust chain: stable KEK -> Hive master key -> Hive signature over
external_pubkey.bin-> constitutional document signatures. - Local vault storage uses AES-256-GCM with atomic writes.
- Passphrase fallback uses Argon2id with per-install metadata for new vaults.
- Portable archive v2 uses X25519 + HKDF-SHA256 + AES-256-GCM with authenticated headers.
- Signed skill allowlist entries are verified against
trusted_skill_signersand fail closed on malformed or untrusted input. - Official release workflows require updater signing inputs, Windows code signing inputs, and macOS signing/notarization inputs.