| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
DO NOT open a public GitHub/GitLab issue for security vulnerabilities.
Instead, please report via:
- Email: security@hyperpolymath.net
- Encrypted: Use our PGP key (see
.well-known/security.txt)
| Severity | Acknowledgement | Resolution Target |
|---|---|---|
| Critical | 24 hours | 72 hours |
| High | 48 hours | 1 week |
| Medium | 72 hours | 2 weeks |
| Low | 1 week | 1 month |
Please include the following in your report:
- Description: Clear description of the vulnerability
- Impact: What could an attacker achieve?
- Reproduction: Step-by-step instructions to reproduce
- Affected Components: Which files/functions are affected?
- Suggested Fix: If you have one (optional)
- Acknowledgement: We will confirm receipt within the SLA
- Assessment: We will assess severity and impact
- Communication: We will keep you informed of progress
- Fix: We will develop and test a fix
- Disclosure: We will coordinate disclosure with you
- Credit: We will credit you (unless you prefer anonymity)
Wharf is designed with security as a foundational principle:
- Database Proxy: AST-based SQL filtering prevents injection
- Filesystem Immutability: Read-only root prevents code injection
- Header Airlock: Strips dangerous HTTP headers
- Zero Trust Network: Nebula mesh with certificate-based auth
- Hardware 2FA: FIDO2/WebAuthn for authentication
We assume:
- The live server (Yacht) is hostile territory
- Network is untrusted (including internal networks)
- Attackers may have application-level vulnerabilities
| Component | Trust Level | Access |
|---|---|---|
| Wharf Controller | High | Offline, hardware-secured |
| Yacht Agent | Medium | Limited, enforces policy |
| WordPress/CMS | Low | Sandboxed, read-only |
| Public Network | None | Zero Trust |
Security updates are released as:
- Patch versions for fixes (e.g., 0.1.1)
- Security advisories via GitLab
- Announcements on our blog
Subscribe to security notifications:
- Watch the repository on GitLab
- Follow
@hyperpolymathfor announcements
All contributors must:
- Sign commits with GPG
- Follow secure coding guidelines
- Pass security-focused code review
- Run
just auditbefore submitting
This project adheres to:
- OWASP Security Guidelines
- CIS Benchmarks (where applicable)
- Rhodium Standard Repository (RSR) requirements