Vulnerability Remediation SLA

Our Commitment to Security

At Specmatic.io, we take security seriously. Ensuring the security and integrity of our software, users, and the broader development ecosystem is a top priority. We proactively monitor, assess, and respond to potential vulnerabilities — both in Specmatic itself and across its software supply chain.

We follow modern security practices, regularly audit our codebase and dependencies, and release updates frequently to address bugs, improve performance, and enhance security. Specmatic is typically released every few weeks, and many of these releases include dependency upgrades and other security improvements.

We strongly encourage all users to keep their Specmatic installations up to date to benefit from the latest security patches and enhancements.


Scope of This SLA

This SLA outlines our triage and remediation timelines for:

  1. Vulnerabilities in Specmatic Core – issues in the Specmatic source code, logic, or configurations.
  2. Vulnerabilities in the Software Supply Chain – issues in third-party libraries and tools used within Specmatic.

1. Vulnerabilities in Specmatic Itself

Severity Level Description SLA for Triage SLA for Remediation Mitigation Notes
Critical Actively exploited or easily exploitable with severe impact (e.g., RCE, data leakage) Within 1 day Within 7 days Immediate patch or workaround if possible
High Easily exploitable, high-impact, but not actively exploited Within 2 days Within 14 days  
Medium Exploitable under certain conditions or limited scope Within 5 days Within 30 days  
Low Informational or minor impact (e.g., missing headers, verbose error messages) Within 10 days Within 90 days May be scheduled with regular release cycle

2. Vulnerabilities in Software Supply Chain (Dependencies)

Severity Level Description SLA for Triage SLA for Remediation Mitigation Notes
Critical Vulnerability in a direct or transitive dependency with active exploitation or major CVE score Within 2 days Within 14 days Update or replace affected component
High Known vulnerability with a CVSS score ≥ 7.0 but no known active exploitation Within 3 days Within 21 days  
Medium CVSS score 4.0–6.9, limited exposure or mitigated by usage context Within 7 days Within 45 days May be deferred until routine updates
Low CVSS score < 4.0, negligible impact or internal-only components Within 10 days Within 90 days May be deferred until routine updates

Note: Specmatic will remediate supply chain vulnerabilities only if a fix is available (e.g., a patched version of the dependency has been released). If no fix is available, we will apply compensating controls or monitor until an update becomes possible.


Remediation Process

  1. Detection – Vulnerabilities are identified via automated scanners (e.g., Snyk, OWASP Dependency-Check), community reports, or internal testing.
  2. Triage – The issue is categorized based on severity and impact.
  3. Remediation – Our team develops, tests, and integrates the fix. For third-party dependencies, we will upgrade to a patched version if one is available.
  4. Release – The fix is included in the next scheduled release, or in an expedited patch if severity demands it.
  5. Communication – Critical vulnerabilities are communicated via appropriate channels in accordance with our disclosure policy.

User Recommendations

To ensure the highest level of security:

  • Always use the latest available version of Specmatic.
  • Subscribe to release announcements or monitor our release notes to stay informed about security updates.
  • Report any suspected vulnerabilities to us responsibly through our security contact or disclosure process.