Skip to content

Security: Ciprian-LocalPulse/sentinel-prime

Security

SECURITY.md

Security Policy

Sentinel Prime is maintained as a public-facing premium cybersecurity dashboard and security-operations interface repository. This policy defines how security concerns should be reported, what is in scope for public review, and which implementation details must remain private.

Public Edition Security Scope

This repository represents the Public Edition of Sentinel Prime. Public materials may include product positioning, static interface previews, high-level dashboard concepts, governance files, non-operational examples, and safe evaluation materials.

This repository must not disclose or request disclosure of:

  • production SOC workflows, detection rules, triage logic, or incident-response playbooks
  • threat-intelligence feeds, enrichment pipelines, telemetry schemas, or customer event data
  • authentication logic, access-control rules, tokens, API keys, secrets, credentials, or environment variables
  • client environments, internal network diagrams, infrastructure names, security alerts, or incident records
  • private dashboard logic, commercial implementation details, buyer requirements, or deployment methods
  • private prompts, internal runbooks, analyst playbooks, or restricted research
  • exploit instructions, evasion guidance, persistence techniques, or offensive security workflows

Supported Scope

Security reports are welcome for issues affecting public repository materials, including:

  • accidental exposure of secrets or sensitive data
  • unsafe public documentation that could enable misuse
  • vulnerable public demo code, if present
  • dependency, supply-chain, or build configuration concerns, if such files are later added
  • misleading security, SOC, detection, or dashboard claims that could create buyer or user risk
  • repository configuration issues that affect integrity, trust, or disclosure handling

Out of Scope

The following are generally out of scope unless they expose sensitive data or create direct user risk:

  • generic best-practice requests without a specific security impact
  • social engineering, phishing, or physical security testing
  • denial-of-service testing or traffic flooding
  • scanning infrastructure not owned or explicitly authorized by the maintainer
  • automated reports with no exploitability explanation
  • third-party platform issues outside this repository owner's control
  • requests for private dashboard logic, detection rules, telemetry pipelines, customer environments, or deployment details
  • speculative product or compliance claims without a concrete repository risk

Reporting Process

Please report security issues privately and with minimal sensitive detail.

Preferred process:

  1. Use GitHub private vulnerability reporting if it is enabled for this repository.
  2. If private vulnerability reporting is unavailable, contact the maintainer through the public GitHub profile or the commercial contact path listed in SUPPORT.md.
  3. Do not open a public issue containing secrets, exploit details, private infrastructure references, detection logic, telemetry details, customer information, or implementation-sensitive information.
  4. Include a concise description, affected file or area, reproduction notes where safe, and recommended remediation.

Response Timeline

The maintainer will make a reasonable effort to follow this timeline:

  • Acknowledgement: within 5 business days
  • Initial triage: within 10 business days
  • Remediation decision: based on severity, exploitability, and public safety impact
  • Public disclosure: only after remediation or explicit maintainer approval

This repository is maintained as a public product and governance surface. Response times may vary for non-critical documentation findings.

Safe Harbor

Good-faith research is welcome when it is defensive, limited, and respectful of the boundaries above. The maintainer will not pursue action against researchers who:

  • act in good faith and avoid privacy violations
  • do not access, modify, delete, or exfiltrate data
  • do not disrupt services or third-party systems
  • avoid public disclosure before coordination
  • stop testing and report promptly after identifying a potential issue

Safe harbor does not apply to unauthorized access, credential misuse, data theft, extortion, evasion, persistence, offensive testing against third-party systems, or attempts to obtain Private Enterprise Edition materials.

Public Disclosure

Public disclosure should be coordinated with the maintainer. Reports may be acknowledged in release notes or changelog entries when doing so does not reveal sensitive security information.

Responsible Use

Sentinel Prime is intended for lawful cybersecurity visualization, security-operations interface review, dashboard evaluation, and enterprise product discussion. Reports, issues, pull requests, or discussions that enable unauthorized activity, offensive operations, credential misuse, data misuse, or unsafe implementation detail may be closed or removed.

There aren’t any published security advisories