跳转到内容

Contributing to the CoderClaw Threat Model

此内容尚不支持你的语言。

Contributing to the CoderClaw Threat Model

Section titled “Contributing to the CoderClaw Threat Model”

Thanks for helping make CoderClaw more secure. This threat model is a living document and we welcome contributions from anyone - you don’t need to be a security expert.

Spotted an attack vector or risk we haven’t covered? Open an issue on SeanHogg/coderClaw-trust and describe it in your own words. You don’t need to know any frameworks or fill in every field - just describe the scenario.

Helpful to include (but not required):

  • The attack scenario and how it could be exploited
  • Which parts of CoderClaw are affected (CLI, gateway, channels, ClawHub, MCP servers, etc.)
  • How severe you think it is (low / medium / high / critical)
  • Any links to related research, CVEs, or real-world examples

We’ll handle the ATLAS mapping, threat IDs, and risk assessment during review. If you want to include those details, great - but it’s not expected.

This is for adding to the threat model, not reporting live vulnerabilities. If you’ve found an exploitable vulnerability, see our Trust page for responsible disclosure instructions.

Have an idea for how to address an existing threat? Open an issue or PR referencing the threat. Useful mitigations are specific and actionable - for example, “per-sender rate limiting of 10 messages/minute at the gateway” is better than “implement rate limiting.”

Attack chains show how multiple threats combine into a realistic attack scenario. If you see a dangerous combination, describe the steps and how an attacker would chain them together. A short narrative of how the attack unfolds in practice is more valuable than a formal template.

Typos, clarifications, outdated info, better examples - PRs welcome, no issue needed.

This threat model is built on MITRE ATLAS (Adversarial Threat Landscape for AI Systems), a framework designed specifically for AI/ML threats like prompt injection, tool misuse, and agent exploitation. You don’t need to know ATLAS to contribute - we map submissions to the framework during review.

Each threat gets an ID like T-EXEC-003. The categories are:

CodeCategory
RECONReconnaissance - information gathering
ACCESSInitial access - gaining entry
EXECExecution - running malicious actions
PERSISTPersistence - maintaining access
EVADEDefense evasion - avoiding detection
DISCDiscovery - learning about the environment
EXFILExfiltration - stealing data
IMPACTImpact - damage or disruption

IDs are assigned by maintainers during review. You don’t need to pick one.

LevelMeaning
CriticalFull system compromise, or high likelihood + critical impact
HighSignificant damage likely, or medium likelihood + critical impact
MediumModerate risk, or low likelihood + high impact
LowUnlikely and limited impact

If you’re unsure about the risk level, just describe the impact and we’ll assess it.

  1. Triage - We review new submissions within 48 hours
  2. Assessment - We verify feasibility, assign ATLAS mapping and threat ID, validate risk level
  3. Documentation - We ensure everything is formatted and complete
  4. Merge - Added to the threat model and visualization
  • Security vulnerabilities: See our Trust page for reporting instructions
  • Threat model questions: Open an issue on SeanHogg/coderClaw-trust
  • General chat: Discord #security channel

Contributors to the threat model are recognized in the threat model acknowledgments, release notes, and the CoderClaw security hall of fame for significant contributions.