10 Open Issues Need Help Last updated: Jul 23, 2025

Open Issues Need Help

View All on GitHub
Community Notification about 1 month ago

AI Summary: The task involves announcing the revised NLIP security guidelines and best practices document to the relevant communities (GitHub, AI Alliance, mailing lists, Discord). The announcement should clearly distinguish between normative and advisory sections of the document.

Complexity: 2/5
help wanted
Publish to Canonical Repo about 1 month ago

AI Summary: The task involves merging a finalized markdown document containing NLIP security guidelines and best practices into the canonical repository's `/specs/security.md` file and then publishing the updated document via the nlip-project.org website.

Complexity: 3/5
help wanted

AI Summary: The task requires scheduling and conducting a final review of the NLIP Security Guidelines document. This involves coordinating a 'Last Call' for the working group to review the revised draft, potentially using GitHub, Zoom, or an asynchronous voting system for consensus and sign-off. The goal is to finalize the document before official release.

Complexity: 4/5
help wanted
GitHub Issue Triage about 1 month ago

AI Summary: The task involves reviewing and closing or deferring all open GitHub issues tagged with "security-guidelines", and resolving any outstanding TODOs within the provided NLIP security guidelines document. This includes verifying the completeness of the document's compliance mappings and addressing any remaining action items.

Complexity: 4/5
help wanted
Inter-Spec Linkage about 1 month ago

AI Summary: This task requires a thorough cross-reference check between the provided NLIP Security Guidelines document and the NLIP Core specification. The goal is to ensure that authentication, transport, and agent messaging procedures described in the security guidelines are consistent with and fully support the functionalities defined in the core specification. Any inconsistencies or gaps in alignment need to be identified and documented.

Complexity: 4/5
help wanted
3rd-Party Review about 1 month ago

AI Summary: The task requires engaging external security and cryptography experts to review the NLIP security guidelines document. This review should focus on validating the security assumptions, architectural design, and the effectiveness of the proposed controls outlined in the document, particularly concerning OAuth 2.1, PKCE, DPoP, and post-quantum cryptography. The goal is to ensure the guidelines are robust and aligned with best practices before release.

Complexity: 4/5
help wanted
Peer Security Review about 1 month ago

AI Summary: Conduct a peer security review of the provided NLIP security guidelines document. This involves identifying any missing threat classes, edge cases, or conflicting requirements within the document's security recommendations, focusing on areas such as identity management, transport security, runtime behavior, data storage, observability, governance, and incident response. The review should consider the practicality and completeness of the proposed controls and their alignment with relevant standards and regulations.

Complexity: 4/5
help wanted

AI Summary: The task requires a thorough cross-reference check of the NLIP security guidelines against related protocols like MCP, OAuth 2.1 BCP, and GNAP to ensure compatibility and avoid conflicts or gaps in security coverage. This involves comparing the security controls, authentication methods, and data handling procedures defined in the NLIP document with those of the other protocols to identify any inconsistencies or areas needing further alignment or clarification.

Complexity: 4/5
help wanted
Threat Mapping Validation about 1 month ago

AI Summary: The task requires a thorough review of the provided NLIP security guidelines document to verify that each listed threat mitigation strategy directly addresses the corresponding threat. This involves tracing the logic connecting each threat to its mitigation, referencing relevant frameworks like MITRE ATLAS and NIST CSF to ensure accuracy and completeness. The goal is to confirm a clear and traceable mapping between threats and mitigations, ensuring the document's effectiveness.

Complexity: 4/5
help wanted
Technical Coverage Audit about 1 month ago

AI Summary: This task requires a thorough review of the provided NLIP security guidelines document to verify that all major threats identified (prompt injection, token misuse, supply chain attacks, multi-tenancy vulnerabilities, etc.) are adequately addressed. The review should assess the accuracy and completeness of the risk scores assigned to each threat, and the effectiveness of the proposed mitigation strategies. Particular attention should be paid to ensuring comprehensive coverage for multi-cloud deployments. The output should be a report documenting any gaps or inconsistencies found.

Complexity: 4/5
help wanted