| Version | Supported |
|---|---|
| 0.x.x | ✅ |
We take security seriously. If you discover a security vulnerability, please report it responsibly.
- Do NOT create a public GitHub issue for security vulnerabilities
- Email security concerns to the maintainers (see MAINTAINERS.md)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Any suggested fixes (if applicable)
- Acknowledgment within 48 hours
- Status update within 7 days
- Coordinated disclosure timeline discussion
Security concerns include but are not limited to:
- Authentication/authorization bypasses
- Data exposure or leakage
- Injection vulnerabilities (SQL, command, etc.)
- Cryptographic weaknesses
- Supply chain vulnerabilities
- Container escape vectors
This project uses the following cryptographic primitives:
| Purpose | Algorithm | Notes |
|---|---|---|
| Hashing | BLAKE3 | Primary hash function |
| XOF | SHAKE3-512 | Extendable output |
| Signatures | Ed448 | Classical signatures |
| Post-Quantum Sig | Dilithium | NIST PQC standard |
| KEM | Kyber-1024 | Post-quantum key exchange |
| Primes | Flat distribution | Proven strong primes |
Deployed instances should implement:
Content-Security-PolicyStrict-Transport-SecurityX-Content-Type-OptionsX-Frame-OptionsReferrer-PolicyPermissions-Policy
All DNS zones should be signed with:
- DNSSEC (full chain validation)
- ZONEMD (zone integrity)
Security advisories will be published via GitHub Security Advisories.