If you discover a security vulnerability in L0, please report it by emailing:
Please include:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 7 days
- Resolution target: Within 30 days for critical issues
This security policy covers:
- The L0 runtime library
- All code in this repository
- Vulnerabilities in dependencies (report to the respective maintainers)
- Vulnerabilities in LLM providers (OpenAI, Anthropic, etc.)
- Issues that require physical access to a user's machine
We follow coordinated disclosure. Please allow us reasonable time to address the issue before public disclosure.
When using L0 in production:
- Keep dependencies updated - Run
npm auditregularly - Use guardrails - Enable
recommendedGuardrailsorstrictGuardrailsto catch malformed output - Validate structured output - Always use Zod schemas with
structured()for type-safe parsing - Handle errors gracefully - Use the built-in error handlers to catch and log failures appropriately
- Set timeouts - Configure
initialTokenandinterTokenTimeoutto prevent hanging requests