- Rust:
Cargo.lockis committed for reproducible builds. Runcargo auditandcargo denylocally; CI runs them inci-rust.yml, with a scheduled pass inci-security.yml. - SBOM: The
ci-sbom.ymlworkflow (Anchore SBOM Action, CycloneDX JSON artifact) runs on pushes tomainand can be triggered manually.
Security fixes are aimed at current main and recent release tags. Older lines may not receive backports; ask maintainers if you depend on a specific tag.
We take security issues seriously.
- Email security@security-envelopes.org (if that address is not yet active for your fork, use the repository’s private security advisory flow on GitHub if available).
- Include:
- Short description and impact
- Steps to reproduce
- Affected component(s) and versions
- Optional patch or mitigation ideas
- Contact for follow-up
- Acknowledge receipt as soon as practical
- Work toward a fix and coordinated disclosure timeline with you
- Credit you in release notes if you want
Exact response times depend on severity and maintainer availability; critical issues are prioritized.
Core behavior is modeled in Lean 4 under Spec/. Proofs and coverage grow over time; treat the formal layer as an evolving guarantee, not a blanket “everything is proven” claim.
- Static analysis: Clippy with warnings denied; CodeQL for Rust (
codeql.yml). - Dependencies:
cargo audit,cargo denyin CI. - SBOM: See supply chain section above.
The engine and specs aim to use standard algorithms (for example Ed25519, SHA-256, AES-GCM) where applicable. Exact algorithms and wire formats are defined in code and specs; verify against your deployment before relying on compliance claims.
Rust code should minimize unsafe and follow review for any new unsafe blocks. Validate untrusted inputs at trust boundaries (policy loading, WASM, network-facing paths).
- Never commit secrets, tokens, or production keys.
- Prefer least privilege in examples and tests.
- Keep dependencies intentional; run audit/deny when changing lockfiles.
- Pin versions and verify artifacts (hashes, signatures) for your environment.
- Apply updates from trusted sources.
- Harden runtime (TLS, keys, access control) for your threat model.
- Triage: Reports are assessed for severity and exploitability.
- Fixes: Land on
mainand are described in release notes; use tagged releases for production tracking. - Disclosure: Prefer coordinated disclosure with the reporter.
This repository is a software project, not a certified compliance program. If you need SOC 2, ISO 27001, GDPR, HIPAA, PCI, or similar assurances, you must map controls to your deployment, processes, and legal obligations. Do not infer certifications from this document alone.
Thanks to everyone who reports issues responsibly. Researchers who disclose in good faith can be credited in release notes or a security acknowledgments section, by agreement.