Skip to content

Security: hyperpolymath/project-wharf

SECURITY.md

Security Policy

Supported Versions

Version Supported
0.1.x
< 0.1

Reporting a Vulnerability

We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.

Reporting Channel

DO NOT open a public GitHub/GitLab issue for security vulnerabilities.

Instead, please report via:

Response SLA

Severity Acknowledgement Resolution Target
Critical 24 hours 72 hours
High 48 hours 1 week
Medium 72 hours 2 weeks
Low 1 week 1 month

What to Include

Please include the following in your report:

  1. Description: Clear description of the vulnerability
  2. Impact: What could an attacker achieve?
  3. Reproduction: Step-by-step instructions to reproduce
  4. Affected Components: Which files/functions are affected?
  5. Suggested Fix: If you have one (optional)

What to Expect

  1. Acknowledgement: We will confirm receipt within the SLA
  2. Assessment: We will assess severity and impact
  3. Communication: We will keep you informed of progress
  4. Fix: We will develop and test a fix
  5. Disclosure: We will coordinate disclosure with you
  6. Credit: We will credit you (unless you prefer anonymity)

Security Architecture

Wharf is designed with security as a foundational principle:

Defense in Depth

  1. Database Proxy: AST-based SQL filtering prevents injection
  2. Filesystem Immutability: Read-only root prevents code injection
  3. Header Airlock: Strips dangerous HTTP headers
  4. Zero Trust Network: Nebula mesh with certificate-based auth
  5. Hardware 2FA: FIDO2/WebAuthn for authentication

Threat Model

We assume:

  • The live server (Yacht) is hostile territory
  • Network is untrusted (including internal networks)
  • Attackers may have application-level vulnerabilities

Security Boundaries

Component Trust Level Access
Wharf Controller High Offline, hardware-secured
Yacht Agent Medium Limited, enforces policy
WordPress/CMS Low Sandboxed, read-only
Public Network None Zero Trust

Security Updates

Security updates are released as:

  • Patch versions for fixes (e.g., 0.1.1)
  • Security advisories via GitLab
  • Announcements on our blog

Subscribe to security notifications:

  • Watch the repository on GitLab
  • Follow @hyperpolymath for announcements

Secure Development

All contributors must:

  • Sign commits with GPG
  • Follow secure coding guidelines
  • Pass security-focused code review
  • Run just audit before submitting

Compliance

This project adheres to:

  • OWASP Security Guidelines
  • CIS Benchmarks (where applicable)
  • Rhodium Standard Repository (RSR) requirements

There aren’t any published security advisories