| Version | Supported |
|---|---|
| 1.0.x | Yes |
| < 1.0 | No |
If you discover a security vulnerability in Maxim, please report it responsibly:
- Do NOT open a public issue for security vulnerabilities
- Open a private security advisory at https://github.com/dennys246/Maxim/security/advisories/new
- Include: description, reproduction steps, potential impact, and suggested fix if any
- Expected response time: 48 hours for acknowledgment, 7 days for initial assessment
Maxim includes several safety-critical systems:
- FearAgent — pre-execution safety review of all tool calls
- PainDetector — detects aversive patterns and harmful actions
- HarmRegistry — zero-latency prediction of harmful outcomes
- AutonomyController — gates agent actions by autonomy level
- Atomic file writes — all persistence uses fsync + tmp + replace pattern
- Internet access policy — configurable whitelist/blacklist for web access
- Filesystem policy — sandboxed file access with configurable boundaries
- Cloud redaction — PII filtering before cloud LLM dispatch
- Bio-system-aware deidentification — ATL + SEM identity map extracts names/locations deterministically
- Dual-pass pipeline — client-side deidentification + server-side verification
- Model tier gate — contributions declare deidentification model; weak models rejected
- Set appropriate autonomy level (
--autonomy planning|supervised|autonomous) - Use
MAXIM_LLM_REDACTION_POLICY=strictfor cloud providers - Review
maxim doctoroutput before exposing to network - For Mother Maxim: run security stress campaign before going public