AQML is a file format specification. It does not execute code. However, security considerations exist in:
- Parsers and validators — Implementations consuming
.aqmlfiles should guard against YAML deserialization attacks (e.g., always useyaml.safe_load()in Python, neveryaml.load()). - Strategy content — AQML files may contain proprietary trading logic. Handle with appropriate access controls.
If you discover a security issue in the AQML specification, reference implementation, or tooling:
- Do not open a public GitHub issue
- Email paris@aurumq.ai with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- You will receive acknowledgment within 48 hours
- We aim to address confirmed issues within 7 days
| Version | Supported |
|---|---|
| 1.0-draft | ✅ |
- Always use safe YAML parsing (
safe_load, notload) - Validate against JSON Schema before processing
- Sanitize numeric inputs (reject NaN, Infinity)
- Limit file size to prevent resource exhaustion
- Do not evaluate arbitrary expressions within field values