Currently 0.1.x is the only supported line. Older pre-releases
are not maintained; please upgrade before reporting.
If you find a way to:
- Make
falsify guardpass on a contradicting claim. - Make two semantically different specs produce the same SHA-256 canonical hash (a collision breaks pre-registration).
- Execute arbitrary code through a crafted
spec.yamlorexperiment.commandbeyond what the user explicitly authored.
Please do not open a public issue. Email the maintainer directly
at hello@studio-11.co. A fix typically lands within 14 days; we'll
coordinate a disclosure window with you.
Any break of the determinism contract counts:
- Exit codes — getting a
0when the criterion was violated, or10when it held. - Canonical hash — two distinct specs hashing the same, or the same spec hashing differently across machines.
- Guard semantics — commit-msg guard passing text that affirmatively references a FAIL / INCONCLUSIVE verdict.
- Leakage — anything that exposes secrets from
spec.yaml, run output, or the verdict store to unauthorized readers.
Cosmetic bugs, typos, or missing features don't qualify — use a bug report or feature request instead.
Disclosed issues are credited in CHANGELOG.md under the release
that fixes them, unless the reporter requests otherwise.
For the complete enumeration of attacks falsify defends against,
attacks it explicitly does NOT defend against, and the mitigations
for each, see
docs/ADVERSARIAL.md.