| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in Tach, please report it responsibly:
- Do NOT open a public GitHub issue
- Email security concerns to the maintainers (see repository owner contact)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Tach implements multiple security layers:
- Landlock: Filesystem access control (Linux 5.13+)
- Seccomp: System call filtering
- See CLAUDE.md for details
- Sensitive environment variables are blocked by default
- See
LD_PRELOAD,LD_LIBRARY_PATH,PYTHONPATHdenylist
- Tests run in isolated Linux namespaces
- Network isolation prevents cross-test interference
We aim to respond to security reports within 48 hours and provide a fix timeline within 7 days for confirmed vulnerabilities.