We release patches for security vulnerabilities for the following versions:
| Version | Supported | Status |
|---|---|---|
| 3.x.x | ✅ | Active (v3.0.0 released Feb 2026) |
| 2.x.x | ✅ | Maintenance (Security patches only) |
| < 2.0 | ❌ | End of Life |
As an AI-driven orchestration platform, we recognize unique security challenges:
- Dynamic System Prompts: We use non-deterministic boundary markers to prevent prompt leakage.
- Output Sanitization: All AI-generated code is scanned by our Quality Assessment System before execution.
- Indirect Injection: We monitor external data sources (GitHub, web search) for malicious instructions embedded in documents.
- Context Poisoning: Mitigation strategies against long-range context poisoning are implemented in the
ContextCompactor. - Resource Exhaustion: The
ContextTrackerprevents context-stuffing attacks that aim to spike execution costs.
- Observation Mode: Skills run in restricted environments with real-time observation.
- Permission Scoping: Skills only have access to specific APIs (e.g.,
github_api) requested in their metadata. - Resource Limits: CPU/Memory/Time limits are enforced to prevent crypto-jacking or DoS.
We take the security of Phantom Neural Cortex seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Open a public GitHub issue for security vulnerabilities
- Discuss the vulnerability publicly before it has been addressed
Report security bugs privately via GitHub Security Advisories:
- Go to https://github.com/LEEI1337/phantom-neural-cortex/security/advisories/new
- Click "Report a vulnerability"
- Fill in the details
OR Email us directly:
- Create a new GitHub issue with title: "SECURITY: [Brief Description]"
- Mark it as confidential
- We will respond within 48 hours
Please include the following information in your report:
- Type of vulnerability (e.g., RCE, XSS, SQL injection, exposed secrets)
- Full paths of source file(s) related to the manifestation of the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- We will acknowledge your email within 48 hours
- We will provide a detailed response within 7 days
- We will keep you informed about our progress
- We will credit you in the security advisory (unless you prefer to remain anonymous)
CRITICAL: Never commit API keys or secrets to the repository
- Always use
.envfiles (already in.gitignore) - Use environment variables for all sensitive data
- Rotate API keys regularly
- Use separate keys for development and production
- Only install MCP servers from trusted sources
- Review server code before installation
- Keep MCP servers updated
- Monitor server logs for suspicious activity
- Keep Docker Desktop updated
- Review Rover container configurations
- Limit container permissions
- Use official base images only
- Don't share your Claude API keys
- Review AI-generated code before execution
- Use separate accounts for testing
- Enable 2FA on all AI service accounts
This project orchestrates multiple AI systems and MCP servers. Key security considerations:
-
API Key Management: Multiple API keys are required (Claude, Gemini, GitHub, Brave Search, Perplexity)
- ✅ All stored in
.env(gitignored) - ✅ Loaded via environment variables
⚠️ Users must manage key rotation
- ✅ All stored in
-
MCP Server Trust: 18 MCP servers with varying levels of access
- ✅ Official @modelcontextprotocol servers are audited
⚠️ Community servers require manual review- ✅ All servers run in isolated processes
-
Rover Isolation: Git worktrees and Docker containers
- ✅ Each task runs in isolated environment
- ✅ No shared state between tasks
⚠️ Host file system access required
-
Lazy Bird Automation
⚠️ Will execute AI-generated code automatically⚠️ Requires robust test validation⚠️ Needs careful permission management
We will announce security updates via:
- GitHub Security Advisories
- GitHub Releases with
[SECURITY]tag - README.md security notice (for critical issues)
Subscribe to repository notifications to stay informed.
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find similar problems
- Prepare fixes for all supported versions
- Release patches as soon as possible
- Publish a security advisory
We thank the following researchers for responsibly disclosing security issues:
- (None yet - be the first!)
- OWASP Top 10
- GitHub Security Best Practices
- Docker Security Best Practices
- Anthropic Security Practices
Last Updated: 2026-02-08
Thank you for helping keep Phantom Neural Cortex and its users safe!