Microsoft takes the security of our software products and services seriously, which includes all source code repositories in our GitHub organizations.
Please do not report security vulnerabilities through public GitHub issues.
For security reporting information, locations, contact information, and policies, please review the latest guidance for Microsoft repositories at https://aka.ms/SECURITY.md.
To report a vulnerability, email secure@microsoft.com. You will receive acknowledgement within 24 hours and a detailed response within 72 hours indicating next steps.
| Version | Supported |
|---|---|
| 2.1.x | ✅ |
| 2.0.x | ✅ |
| < 2.0 | ❌ |
We follow a 90-day coordinated disclosure timeline. After a vulnerability is reported and confirmed, we will:
- Acknowledge receipt within 24 hours.
- Provide a fix or mitigation within 90 days.
- Coordinate public disclosure with the reporter after the fix is released.
If a fix requires more than 90 days, we will negotiate an extended timeline with the reporter before any public disclosure.
Severity: High Affected versions: < 2.1.0 Fixed in: v2.1.0 (PR #272)
A crafted input using IEEE 754 special values (NaN, Infinity, negative numbers) to CostGuard budget parameters could bypass the organization-level kill switch, allowing agents to continue operating after the budget threshold was exceeded.
Fix: Input validation now rejects NaN/Inf/negative values. The _org_killed flag
persists kill state permanently — once the organization budget threshold is crossed,
all agents are blocked including newly created ones.
Recommendation: Upgrade to v2.1.0 or later. No workaround exists for earlier versions.
Severity: Medium Affected versions: < 2.1.0 Fixed in: v2.1.0
Four independent thread safety issues were fixed in security-critical paths:
- CostGuard breach history: unbounded growth + missing lock (#253)
- VectorClock: race condition under concurrent access (#243)
- ErrorBudget._events: unbounded deque without size limit (#172)
- .NET SDK: thread safety, caching, disposal sweep (#252)
Recommendation: Upgrade to v2.1.0 or later if running under concurrent agent load.