We actively provide security updates for the following versions of VIKI:
| Version | Supported |
|---|---|
| 7.3.x | ✅ |
| 7.2.x | ✅ |
| < 7.2.0 | ❌ |
As a sovereign digital intelligence, security is at the core of VIKI's architecture. If you discover a security vulnerability, we would appreciate it if you could report it to us privately.
Please do not open a public GitHub issue for security vulnerabilities.
To report a vulnerability:
- Send an email to the Orythix001 security team (or open a private security advisory on GitHub if enabled).
- Include a detailed description of the vulnerability.
- Provide steps to reproduce the issue.
- Include any relevant logs or screenshots.
We will acknowledge your report within 48 hours and provide a timeline for a fix.
VIKI is designed with a Defense-in-Depth approach:
- Local-First Execution: Most operations occur on-device to minimize external attack surfaces.
- Action Validation: Every skill execution is checked by
safety.validate_action(skill_name, params)before running; prohibited patterns and admin-file access are blocked. - Path Sandboxing: File operations (filesystem_skill, dev_tools, whisper, PDF, data_analysis) are restricted to allowed roots (workspace_dir, data_dir from settings). Filesystem_skill uses these roots when available.
- Capability Gating: High-risk skills (filesystem, shell) require explicit permission and are logged in
logs/viki.log. - API Authentication: All REST endpoints are protected by
VIKI_API_KEY. - Secret Redaction: Model output and logs redact API keys and tokens; user input and skill params are logged via
safe_for_log(). - Prompt Injection Mitigation: Incoming prompts are sanitized against a blocklist of jailbreak-style phrases.
- Shell Safety: Commands containing
;,&&,||, or|require confirmation (treated as destructive). Optional LLM security scan can be enabled viasystem.security_scan_requests. - Sandbox Principles: Shell and system commands are executed within restricted environments where possible.
- Secrets Management: Never commit your
.envfile or high-level secrets (likeVIKI_API_KEYorVIKI_ADMIN_SECRET) to version control. - Model Origin: Only use trusted models from official sources (Ollama/HuggingFace) to prevent "prompt injection" or malicious weight attacks.
- Logs: Periodically review
logs/viki.logfor any unauthorized capability check attempts.
VIKI: Virtual Intelligence, Real Evolution. Designed by Orythix001. 2026.