Skip to content

Security: Qitor/owl

Security

docs/SECURITY.md

OWL Security and Safety Constraints

1. Scope

OWL processes public-source research documents, but its outputs may influence high-stakes risk interpretation. Security and safety constraints therefore cover both platform operation and information quality.

2. Basic platform constraints

  • Prefer least-privilege credentials for source access and infrastructure access.
  • Keep mutating operations behind explicit service boundaries.
  • Audit all review and publish actions.
  • Preserve source provenance for every published signal.

3. Model and workflow constraints

  • Do not allow model output to publish directly without human review.
  • Treat all model-produced structured outputs as untrusted until schema-validated.
  • Apply guardrails around mutating tools and publication boundaries.
  • Log model, prompt version, and schema version used for machine-produced artifacts.

4. Data handling

  • Preserve original source content and normalized derivatives separately.
  • Record when a risk interpretation is an author claim versus system inference.
  • Avoid silently overwriting published signals; use revision history.

5. Operational safety

  • Recovery tools should be auditable.
  • Dead-letter retries should preserve prior failure context.
  • Manual overrides should record operator identity and rationale.

There aren’t any published security advisories