| Version | Supported |
|---|---|
| 2.0.x | ✅ |
| 1.8.x | |
| < 1.8 | ❌ |
We recommend running the latest release. Security fixes are backported only to the latest minor version of the current major version.
Please do not open a public issue for security reports.
Report vulnerabilities through one of these channels:
-
GitHub Security Advisories (preferred): https://github.com/vaur94/oma/security/advisories/new
-
Email: Send details to the maintainers listed in
package.json.
Include as much detail as possible to help us reproduce and verify the issue:
- Description of the vulnerability
- Steps to reproduce
- Affected version(s)
- Any known mitigations
| Severity | Initial Response | Fix Timeline |
|---|---|---|
| Critical | 24 hours | 7 days |
| High | 48 hours | 14 days |
| Medium | 5 business days | 30 days |
| Low | 10 business days | Next release |
OMA runs with the same permissions as the user who invokes it. Key boundaries:
- File access: Controlled by the embedded permission engine. File read/write is scoped to the workspace unless explicitly authorized.
- Shell execution:
run_commandtool executes on the host system. Restrict viacommandSurfaceconfig. - Network: OMA makes outbound HTTPS requests to LLM providers only. No inbound listeners are opened.
- Environment variables: API keys must be provided via environment — never hardcode credentials.
- Config loading: Config files are read locally; never load config from untrusted paths.
- Keep
allowDangerousCommandsdisabled in production. - Use
.oma/oma.jsoncfor project-local config instead of global config when working with untrusted repositories. - Rotate API keys regularly.
Run npm audit or bun audit periodically to check for known vulnerabilities in dependencies.
We follow a coordinated disclosure process. Credit will be given to reporters unless they request anonymity.
{ "commandSurface": { "allowDangerousCommands": false, "restrictedCommands": ["rm -rf"], }, }