Skip to content

# Contributing to the OpenSoul Threat Model

Thanks for helping make OpenSoul more secure. This threat model is a living document and we welcome contributions from anyone - you don't need to be a security expert.

# Ways to Contribute

# Add a Threat

Spotted an attack vector or risk we haven't covered? Open an issue on opensoul/trust and describe it in your own words. You don't need to know any frameworks or fill in every field - just describe the scenario.

Helpful to include (but not required):

  • The attack scenario and how it could be exploited
  • Which parts of OpenSoul are affected (CLI, gateway, channels, ClawHub, MCP servers, etc.)
  • How severe you think it is (low / medium / high / critical)
  • Any links to related research, CVEs, or real-world examples

We'll handle the ATLAS mapping, threat IDs, and risk assessment during review. If you want to include those details, great - but it's not expected.

This is for adding to the threat model, not reporting live vulnerabilities. If you've found an exploitable vulnerability, see our Trust page for responsible disclosure instructions.

# Suggest a Mitigation

Have an idea for how to address an existing threat? Open an issue or PR referencing the threat. Useful mitigations are specific and actionable - for example, "per-sender rate limiting of 10 messages/minute at the gateway" is better than "implement rate limiting."

# Propose an Attack Chain

Attack chains show how multiple threats combine into a realistic attack scenario. If you see a dangerous combination, describe the steps and how an attacker would chain them together. A short narrative of how the attack unfolds in practice is more valuable than a formal template.

# Fix or Improve Existing Content

Typos, clarifications, outdated info, better examples - PRs welcome, no issue needed.

# What We Use

# MITRE ATLAS

This threat model is built on MITRE ATLAS (Adversarial Threat Landscape for AI Systems), a framework designed specifically for AI/ML threats like prompt injection, tool misuse, and agent exploitation. You don't need to know ATLAS to contribute - we map submissions to the framework during review.

# Threat IDs

Each threat gets an ID like T-EXEC-003. The categories are:

CodeCategory
RECONReconnaissance - information gathering
ACCESSInitial access - gaining entry
EXECExecution - running malicious actions
PERSISTPersistence - maintaining access
EVADEDefense evasion - avoiding detection
DISCDiscovery - learning about the environment
EXFILExfiltration - stealing data
IMPACTImpact - damage or disruption

IDs are assigned by maintainers during review. You don't need to pick one.

# Risk Levels

LevelMeaning
CriticalFull system compromise, or high likelihood + critical impact
HighSignificant damage likely, or medium likelihood + critical impact
MediumModerate risk, or low likelihood + high impact
LowUnlikely and limited impact

If you're unsure about the risk level, just describe the impact and we'll assess it.

# Review Process

  1. Triage - We review new submissions within 48 hours
  2. Assessment - We verify feasibility, assign ATLAS mapping and threat ID, validate risk level
  3. Documentation - We ensure everything is formatted and complete
  4. Merge - Added to the threat model and visualization

# Resources

# Contact

  • Security vulnerabilities: See our Trust page for reporting instructions
  • Threat model questions: Open an issue on opensoul/trust
  • General chat: Discord #security channel

# Recognition

Contributors to the threat model are recognized in the threat model acknowledgments, release notes, and the OpenSoul security hall of fame for significant contributions.

Released under the MIT License.