Currently only the latest version is supported.
If you discover a security vulnerability, please report it privately.
Send email to: security@ cathedralfabric.dev (placeholder)
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if known)
- Initial response: Within 48 hours
- Detailed response: Within 7 days
- Fix timeline: Depends on severity
- We will acknowledge receipt of your report
- We will investigate the vulnerability
- We will work on a fix
- We will coordinate disclosure with you
- We will credit you (if desired)
- Keep updated - Run latest version
- Restrict network access - Use firewalls
- Enable authentication - In cluster mode
- Review policies - Regularly audit
- Monitor logs - For suspicious activity
- Encrypt in transit - Use TLS
- Encrypt at rest - For sensitive data
- Principle of least privilege - Minimal capabilities
- No unsafe without audit - All
unsafereviewed - Fuzz critical code - Parsers, encoders
- Property tests - For invariants
- Security reviews - For major changes
- Dependency audits - Regular updates
- SECURITY.md - Full security model
- FAILURE_MODES.md - Failure handling
- CAPABILITIES.md - Capability system
- POLICY.md - Policy language
Security advisories will be:
- Published as GitHub Security Advisories
- Included in release notes
- Added to CHANGELOG.md
Credits for vulnerability reporters included (with permission).
Professional security audits will be:
- Announced in advance
- Conducted by reputable firms
- Findings addressed promptly
- Reports published (with sensitive details redacted)