The Morpho SDK packages are used to build transactions that can move real funds on the Morpho protocol. We take security reports seriously.
Do not open a public GitHub issue for security reports.
Email security@morpho.org with:
- A description of the issue and its impact.
- Steps to reproduce, ideally with a minimal proof of concept.
- The affected package and version.
- Any suggested mitigation.
You will receive an acknowledgement within 72 hours. We aim to provide an initial assessment and triage within 7 days.
- Give us reasonable time to investigate and patch before public disclosure.
- We will keep you informed of progress and credit you in release notes unless you prefer to remain anonymous.
- For issues affecting funds at rest or in flight, we may coordinate an out-of-cycle release and brief known downstream integrators before publishing details.
Only the latest published versions of maintained @morpho-org/* SDK packages receive security fixes. The legacy @morpho-org/consumer-sdk package is deprecated; security fixes are published only to maintained packages in this monorepo.
In scope:
- Transaction-building bugs that could cause loss of funds, such as bad calldata, wrong
value, or missing slippage protection. - Signature request bugs, such as wrong typed data or domain separators.
- Supply-chain issues in this repository or its published npm packages.
- Issues in CI/CD that could compromise published artifacts.
Out of scope:
- Issues in
viem,wagmi, or other third-party dependencies; report these upstream. - Social-engineering, DoS on npm or GitHub, and physical attacks.
Runtime dependencies in package manifests, including @morpho-org/* packages, may use caret ranges. This lets coordinated patch and minor releases reach SDK consumers without requiring a release for every upstream patch.
Consumers still resolve dependencies through their own lockfile, so caret ranges float only on fresh installs or explicit updates. We recommend:
- Commit your lockfile and install with
npm ciorpnpm install --frozen-lockfilein CI. - Run
npm audit signaturesafter installs to verify provenance. - If you require stricter isolation, pin
@morpho-org/*to exact versions in your own manifest, or useoverridesorresolutionsto pin transitive versions.
Releases published by official CI use npm provenance through Sigstore where package publishing supports it. Consumers can verify provenance with:
npm audit signatures