Email security@xrai.dev with:
Do NOT open a public issue for security vulnerabilities. We acknowledge receipt within 72 hours and aim to ship a fix within 14 days for critical issues, 30 days for medium, 90 days for low.
runtimes/threejs/) — XSS, prototype pollution, DoS on malformed inputmcp-server/) — injection, privilege escalation, unauthorized tool invocationOnly the current major version of the XRAI spec receives security updates. v1.X: supported. v2.X when released: supported. v0.X drafts: unsupported.
After a fix ships, we publish a brief post-mortem as a GitHub Discussion or blog post. The reporter gets credited unless they request anonymity. We do not run a bug bounty program.
XRAI documents are data, not code — a conforming runtime MUST NOT execute arbitrary code embedded in an XRAI document. Specifically:
eval() / new Function() on any fieldobject.glb.model_url assets, but the XRAI parser itself is code-free)XRAI_generators rules (v1.1+) must be evaluated via deterministic generator libraries, never arbitrary codeIf you spot a way to bypass this model — especially via parser bugs, deserialization attacks, or schema-injection — that is exactly the kind of report we want.
security@xrai.dev