| Version or branch | Supported |
|---|---|
| Active release branches | Yes |
Current main |
Yes |
| Older pre-1.0 tags | No, unless a maintainer explicitly backports a fix |
Wesley takes security seriously because it compiles schema-authored contracts, loads trusted extension modules, and emits artifacts and evidence that other systems may rely on.
Please report security vulnerabilities to: security@flyingrobots.dev
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Fix Timeline: Based on severity
- Critical: Within 72 hours
- High: Within 1 week
- Medium: Within 2 weeks
- Low: Next release
Wesley is a domain-empty compiler and assurance toolchain. Target semantics enter through modules, and modules are trusted code.
- Load modules only from reviewed paths and packages.
- Use
WESLEY_MODULE_ALLOWLISTin CI when module imports must be restricted. - Use
WESLEY_DISABLE_MODULES=1for no-module diagnostic runs. - Treat failed, missing, duplicate, or disabled module entries as release evidence, not as harmless noise.
- Keep product/runtime/database policy in the owning module or sibling repo, not in generic Wesley.
Wesley may emit code, descriptors, manifests, bindings, evidence, or other artifacts through generic emitters and external modules.
- Review generated artifacts before applying them to production systems.
- Verify the module that emitted each artifact and the input SDL it consumed.
- Treat database-specific output such as SQL, migrations, RLS, Supabase policy, or PostgreSQL execution plans as external-module responsibility.
- Do not assume Wesley core has validated target-specific security semantics unless the responsible module emits explicit evidence for that claim.
- Evidence should be content-addressed or hash-linked when it is used as a release gate.
- Bundle files should include version and source identity where applicable.
- Generated artifact review should preserve the input SDL, module identity, command, and validation output needed to reproduce the claim.
- Keep dependency updates reviewable and run repository preflight before release.
- Prefer deterministic inputs, injected clocks, and explicit host permissions for portable capability work.
- Do not grant portable modules ambient filesystem, network, process, or clock access without an explicit host-function design.
- Review the SDL, loaded modules, and emitted artifacts together.
- Run
pnpm run preflightbefore release. - Use module allowlists in CI for trusted module surfaces.
- Keep database, runtime, and product-specific security decisions in the owning module or repo.
- Preserve evidence needed to reproduce any security-relevant release claim.
- Module disable and allowlist controls for diagnostic and CI runs
- Domain-empty compiler boundary that keeps target security policy out of core
- Hash-linked evidence and artifact review surfaces
- Dependency and documentation preflight checks
- Explicit external-module responsibility for database, runtime, and product security behavior