| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0.0 | ❌ |
This is an educational and research project. If you discover a security issue:
- Do not open a public issue.
- Email the maintainer at the address listed in the repository profile.
- Include a clear description, reproduction steps, and expected impact.
- Allow up to 7 days for an initial response.
We consider vulnerabilities in the following areas:
- Cryptographic correctness (wrong curve math, scalar overflow, off-by-one)
- File-system race conditions (checkpoint corruption, cache poisoning)
- Memory safety (panics, undefined behavior in unsafe blocks — none present)
- Dependency vulnerabilities (tracked via
cargo auditin CI)
Out of scope:
- Social engineering, phishing, or physical attacks
- Attacks requiring local privileged access to the research machine
- Day 0 — Report received
- Day 7 — Initial triage and acknowledgment
- Day 30 — Fix developed and tested
- Day 45 — Public disclosure via GitHub Security Advisory (if applicable)