| Version | Supported |
|---|---|
main |
✅ Current production branch |
next |
Moltagent is in beta. We take security seriously at every stage.
Do NOT open public issues for security vulnerabilities.
Email security@moltagent.cloud with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment within 48 hours
- Assessment and timeline within 7 days
- Fix or mitigation as fast as possible, prioritized by severity
- Credit in the release notes (unless you prefer to stay anonymous)
We follow coordinated disclosure. We ask that you give us reasonable time to address the issue before public disclosure.
Moltagent is designed with security as a structural property, not a feature layer:
- Three-VM isolation separates Nextcloud, the agent runtime, and local LLM inference
- Runtime credential brokering through NC Passwords. API keys are fetched at the moment of use and immediately discarded. Never stored on disk
- Trust boundaries classify every input as trusted or untrusted. Sensitive operations route to the air-gapped local LLM automatically
- Network segmentation restricts each VM to only the connections it needs. The Ollama VM has no internet access
- Instant revocation by disabling the agent's Nextcloud account or revoking individual credentials
- Audit logging of all security-relevant operations
For the full security model, see docs/security-model.md.
The following are in scope for security reports:
- Authentication and authorization bypasses
- Credential exposure or leakage
- Prompt injection attacks that bypass trust boundaries
- Privilege escalation
- Data exfiltration paths
- Audit log tampering or evasion
The following are out of scope:
- Vulnerabilities in Nextcloud itself (report to Nextcloud Security)
- Vulnerabilities in Ollama (report to Ollama)
- Vulnerabilities in upstream LLM providers
- Denial of service against self-hosted infrastructure
- Social engineering
Email: security@moltagent.cloud