| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability, please do not open a public GitHub issue.
Instead, please report it via GitHub''s private vulnerability reporting feature: Report a Vulnerability
You can expect an initial response within 72 hours and a resolution timeline within 14 days for critical issues.
This section defines the governance policy for AI coding agents (e.g., GitHub Copilot Coding Agent) operating in this repository.
These rules apply to all automated agents that read, generate, or modify files in this repository, including but not limited to GitHub Copilot, Dependabot, and any custom workflow bots.
- Reading source files, templates, and test fixtures to implement or refactor library code.
- Creating or updating files in
src/,tests/,scripts/,adapters/, andorchestrator/as part of the defined development workflow. - Opening pull requests that include only bug fixes, feature additions with tests, or dependency updates.
- Running approved scripts listed in
scripts/with inputs validated against canon schemas fromuiao-core.
- Committing secrets, credentials, API keys, or PII directly into any file.
- Modifying the package version in
pyproject.tomlorsrc/uiao_impl/__init__.pywithout a human-reviewed pull request. - Disabling or bypassing branch protection rules, required status checks, or secret-scanning alerts.
- Exfiltrating repository contents to unapproved external endpoints.
- Self-modifying workflow files (
.github/workflows/) without explicit human approval. - Declaring or defining canonical governance artifacts (YAMLs, schemas, rules) — those live in
uiao-coreand must not be duplicated here.
Secret scanning is enforced on all branches via GitHub''s native secret-scanning. Any detected secret triggers an automatic alert and blocks the affected pull request until the secret is rotated and the alert is resolved.
Every action taken by an AI agent must be traceable via:
- A commit message following the
[UIAO-IMPL] <verb>: <short description>convention. - A linked pull request or workflow run in GitHub Actions.
- Retention of security audit artifacts for a minimum of 90 days.
The following changes always require a human reviewer to approve before merging:
- Changes to
pyproject.toml(dependency pins, package metadata, entry points). - Changes to
src/uiao_impl/__init__.py(version declaration). - Changes to
.github/workflows/(CI/CD pipeline configuration). - Changes to
SECURITY.mdorCLAUDE.md. - Any change that modifies GitHub Actions permissions or secrets.
- Any change that alters the canon-path contract (
--canon-pathCLI flag semantics).
This governance policy aligns with:
- NIST SP 800-53 Rev 5 — SI-7 (Software, Firmware, and Information Integrity), AU-2 (Event Logging)
- NIST SP 800-218 — Secure Software Development Framework (SSDF)
- CISA Secure-by-Design Principles