| Version | Supported |
|---|---|
| latest | ✅ |
If you discover a security vulnerability in Oxide, please report it responsibly.
Email: nikhil@polkassembly.io
Please include:
- A description of the vulnerability and its potential impact
- Steps to reproduce the issue
- Any relevant logs, screenshots, or proof-of-concept code
- The version or commit hash you tested against
We will acknowledge receipt within 48 hours and aim to provide an initial assessment within 5 business days.
The following areas are in scope for security reports:
- WASM sandbox escapes — Guest modules bypassing capability-based restrictions
- Host API abuse — Exploiting granted capabilities beyond their intended scope
- Memory safety issues — Bugs in the
wasmtimeintegration, fuel metering, or memory limits - Network security — Issues with
.wasmbinary fetching, URL handling, or origin validation - Clipboard / file-picker misuse — Unintended data exfiltration through host peripherals
- Denial-of-service via excessive fuel consumption (this is mitigated by design)
- Bugs in upstream dependencies (report those to the respective projects)
- Issues requiring physical access to the user's machine
- We follow coordinated disclosure. Please do not publicly disclose a vulnerability until we have released a fix or 90 days have passed since acknowledgment, whichever comes first.
- Credit will be given to reporters in release notes unless anonymity is requested.
Oxide's security model is built on several layers:
- WebAssembly sandboxing — Guest modules execute in an isolated WASM runtime with no implicit access to the host.
- Capability-based permissions — Host APIs (network, clipboard, etc.) are only available when explicitly granted.
- Fuel metering — Execution is bounded to prevent runaway computation.
- Memory limits — Guest memory is capped to prevent resource exhaustion.
- No filesystem or environment access — Guest modules cannot read or write the host filesystem or environment variables.