Skip to content

Security: dativo-io/talon

SECURITY.md

Security Policy

Supported Versions

Version Supported
1.x
<1.0

Reporting a Vulnerability

DO NOT open a public issue for security vulnerabilities.

Email: security@dativo.io

What to include: Description, reproduction steps, impact assessment, affected version.

Our commitment:

  • Acknowledge within 48 hours
  • Confirm and assess within 5 business days
  • Fix critical issues within 30 days
  • Credit reporters (unless anonymity preferred)

Scope

In scope: Talon binary, evidence integrity (HMAC), secrets vault (AES-256-GCM), policy engine (OPA), LLM gateway proxy, MCP proxy, API authentication.

Out of scope: LLM provider security, upstream API vulnerabilities, issues in third-party dependencies (report upstream).

Security Boundaries (Threat Model Snapshot)

Talon helps enforce and evidence policy decisions in the request path. It does not replace endpoint hardening, IAM design, or vendor-side controls.

  • Prevents/supports: pre-call policy denial, tool allow/deny, evidence integrity verification.
  • Does not prevent: compromised upstream provider, stolen operator keys, or host-level compromise outside Talon.
  • Operator responsibility: secure deployment, rotate keys, protect evidence/signing secrets, and monitor incidents.

Security Architecture

  • Secrets: AES-256-GCM encrypted at rest, per-agent/tenant ACL, every access logged
  • Evidence: HMAC-SHA256 signed at creation, verification via talon audit verify
  • API auth: Timing-safe key comparison (crypto/subtle.ConstantTimeCompare)
  • PII: Regex-based detection, configurable action (block/redact/warn/allow)
  • Injection: 3-layer attachment scanning (extract, sandbox, detect)

There aren’t any published security advisories