Skip to main content

Vulnerability Remediation SLA

Our Commitment to Security

At Specmatic.io, we take security seriously. Ensuring the security and integrity of our software, users, and the broader development ecosystem is a top priority. We proactively monitor, assess, and respond to potential vulnerabilities — both in Specmatic itself and across its software supply chain.

We follow modern security practices, regularly audit our codebase and dependencies, and release updates frequently to address bugs, improve performance, and enhance security. Specmatic is typically released every few weeks, and many of these releases include dependency upgrades and other security improvements.

We strongly encourage all users to keep their Specmatic installations up to date to benefit from the latest security patches and enhancements.

Scope of This SLA

This SLA outlines our triage and remediation timelines for:

  1. Vulnerabilities in Specmatic Core – issues in the Specmatic source code, logic, or configurations.
  2. Vulnerabilities in the Software Supply Chain – issues in third-party libraries and tools used within Specmatic.

1. Vulnerabilities in Specmatic Itself

Severity LevelDescriptionSLA for TriageSLA for RemediationMitigation Notes
CriticalActively exploited or easily exploitable with severe impact (e.g., RCE, data leakage)Within 1 dayWithin 7 daysImmediate patch or workaround if possible
HighEasily exploitable, high-impact, but not actively exploitedWithin 2 daysWithin 14 days
MediumExploitable under certain conditions or limited scopeWithin 5 daysWithin 30 days
LowInformational or minor impact (e.g., missing headers, verbose error messages)Within 10 daysWithin 90 daysMay be scheduled with regular release cycle

2. Vulnerabilities in Software Supply Chain (Dependencies)

Severity LevelDescriptionSLA for TriageSLA for RemediationMitigation Notes
CriticalVulnerability in a direct or transitive dependency with active exploitation or major CVE scoreWithin 2 daysWithin 14 daysUpdate or replace affected component
HighKnown vulnerability with a CVSS score ≥ 7.0 but no known active exploitationWithin 3 daysWithin 21 days
MediumCVSS score 4.0–6.9, limited exposure or mitigated by usage contextWithin 7 daysWithin 45 daysMay be deferred until routine updates
LowCVSS score < 4.0, negligible impact or internal-only componentsWithin 10 daysWithin 90 daysMay be deferred until routine updates

Note: Specmatic will remediate supply chain vulnerabilities only if a fix is available (e.g., a patched version of the dependency has been released). If no fix is available, we will apply compensating controls or monitor until an update becomes possible.


Remediation Process

  1. Detection – Vulnerabilities are identified via automated scanners (e.g., Snyk, OWASP Dependency-Check), community reports, or internal testing.
  2. Triage – The issue is categorized based on severity and impact.
  3. Remediation – Our team develops, tests, and integrates the fix. For third-party dependencies, we will upgrade to a patched version if one is available.
  4. Release – The fix is included in the next scheduled release, or in an expedited patch if severity demands it.
  5. Communication – Critical vulnerabilities are communicated via appropriate channels in accordance with our disclosure policy.

User Recommendations

To ensure the highest level of security:

  • Always use the latest available version of Specmatic.
  • Subscribe to release announcements or monitor our release notes to stay informed about security updates.
  • Report any suspected vulnerabilities to us responsibly through our security contact or disclosure process.