| Version | Supported |
|---|---|
| 1.0.x | Yes |
| < 1.0 | No |
If you discover a security vulnerability within PocolVM, please send an email to the maintainers.
- Type of vulnerability
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Impact of the issue
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution: Within 30 days
JIT requires executable memory allocation which may be restricted by security policies.
- VM uses manual memory management
- No bounds checking on array accesses
- Validate all inputs
System calls provide direct access to host file system.
- Only execute programs from trusted sources
- Use instruction limits for long-running programs
- Use debugger for development
- Keep VM updated
Last updated: February 2026