The following versions of NEXUS are currently receiving security updates:
| Version | Supported |
|---|---|
| 0.2.x | Yes |
| < 0.2.0 | No |
If you discover a security vulnerability in NEXUS, please report it privately to maintain the safety of the project and its users.
Please do not open a public issue.
Instead, send a report to security@nexus-runtime.dev with the following:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact — what an attacker could do
- Affected versions — which versions are impacted
- Suggested fix (optional) — any ideas for remediation
We will acknowledge receipt within 48 hours and aim to provide a resolution timeline within 72 hours. Security fixes will be prioritized and shipped as patch releases.
NEXUS implements a layered security architecture designed for autonomous robotics systems operating in safety-critical environments:
-
Hardware Safety Layer — Watchdog timers, hardware interlocks, and heartbeat monitoring at the firmware level. The system can safely halt all actuators independent of software state.
-
Firmware Safety State Machine — A deterministic state machine in C that enforces safety invariants at the lowest software level. Transitions between safety states (e.g., IDLE, RUNNING, FAULT, E-STOP) follow strict validation rules.
-
Trust Engine — A Python-based trust scoring system that gates autonomy levels based on accumulated evidence. Nodes must earn trust before being granted higher autonomy. Trust can be revoked at any time.
-
Policy Engine — High-level safety automation policies that define per-domain constraints, audit trails, and bytecode-gated operation boundaries.
NEXUS uses a trust-gated autonomy model where:
- All nodes start at the lowest autonomy level
- Autonomy is earned through demonstrated safe behavior
- Trust increments are recorded and auditable
- Safety state machine transitions are always respected regardless of trust level
- Emergency stops bypass all trust mechanisms for immediate safety
- All serial communication uses COBS framing with CRC-16 integrity checks
- Message dispatch validates opcode ranges and payload boundaries
- No authentication bypass is possible at the wire protocol level
We follow coordinated disclosure practices. Once a vulnerability is confirmed:
- We develop and test a fix
- We release a security advisory and patched version
- We credit the reporter (with their permission)
Thank you for helping keep NEXUS safe.