We take security seriously. This page documents how to report vulnerabilities, what's in scope, our response commitment, and the security posture of the products we ship.

Reporting a vulnerability

Email [email protected] with details. Please include:

We respond within 72 hours on business days (Athens, Greece time). For high-severity issues we'll engage immediately on receipt.

Safe-harbour commitment

We will not pursue legal action against good-faith security research that:

In scope

Out of scope

Hall of thanks

We acknowledge security researchers who report responsibly. Once we have a name to credit, it goes here. Send us how you'd like to be credited (full name, handle, or anonymous).

No reports yet — be the first.

Security posture

The CLI runs locally

The roam-code open-source CLI runs entirely on your machine. It writes a SQLite file in your repo's .roam/ directory. No network calls. No telemetry. No phone-home. Audit the source on GitHub.

Supply-chain integrity

Audit-trail evidence

Roam itself emits in-toto v1 attestations and a SHA-256-chained audit-trail JSONL on every analysis. Run roam cga verify on a statement to verify its signature with cosign.

Hosted services posture

Disclosure timing

We aim to remediate high-severity issues within 30 days, medium within 90 days, low at our next scheduled release. We'll coordinate any public disclosure with the reporter. Default public-disclosure window is 90 days from initial report; we may extend on request when more time is genuinely needed.

PGP / encrypted reports

We're standing up a PGP key for [email protected]. Until it's published here, send unencrypted; or use the security.txt for the most current contact info.

Compliance posture