Thanks for helping keep Coherence Studio and its users safe.
Preferred: GitHub's private vulnerability disclosure. Go to Security → Report a vulnerability and open a private advisory. This loops in only the maintainers — the report stays non-public until a fix ships.
Email fallback: security@getcoherence.io. Use this if you can't use
GitHub PVD, or for reports that touch multiple Coherence products.
Please include:
- A clear description of the issue and its impact
- Steps to reproduce (or a proof-of-concept)
- The affected version(s) of Coherence Studio
- Your name/handle for credit (or tell us you'd prefer to stay anonymous)
Please don't open a public issue or PR for security problems — it exposes users before we can ship a fix.
- Acknowledgement within 48 hours (usually faster).
- Initial triage within 5 business days — severity assessment + rough timeline for a fix.
- Fix + release for Critical/High: target 7 days. Medium/Low: rolled into the next scheduled release.
- You'll be kept in the loop throughout. If we can't reproduce or disagree on severity, we'll explain why.
Only the latest stable release (releases page) receives security updates. Beta-channel builds receive the same fixes but may lag stable by a few days.
- The Coherence Studio desktop app (Electron main + renderer)
- The Windows/macOS/Linux installers and update manifests published to GitHub Releases
- The auto-updater (electron-updater) — signature verification, update pinning, downgrade protection
- IPC surface between main and renderer (
electron/ipc/) - The signing pipeline in
.github/workflows/build.ymlandsigning/sign.cjs
- Development server vulnerabilities (
npm run dev) that don't affect the shipped installer. Vite + esbuild dev-server CVEs fall here. The production build is static HTML+JS — no dev server runs inside the installed app. - Third-party AI provider APIs (OpenAI, Anthropic, MiniMax, ElevenLabs, etc.) — report those to the providers directly.
- Theoretical issues without a practical exploit (e.g. "using
anytypes is unsafe"). We're happy to discuss but won't issue an advisory. - Bundled Electron/Chromium vulnerabilities — tracked upstream; we ship Electron security updates on their cadence.
- Social engineering against maintainers or contributors.
These are documented so you don't need to report them:
- Vite path traversal in
.maphandling (GHSA-jqfw-vq24-v9c3) and esbuild dev-server CORS (GHSA-67mh-4wv8-2f99). Both are dev-server only and don't affect shipped installers. Scheduled for resolution during a Vite 5→8 migration.
All installers are code-signed:
- Windows: Azure Trusted Signing, issued to "Brightyard, Inc",
chained to Microsoft Identity Verification Root CA 2020. Verify with
signtool verify /pa "Coherence Studio Setup X.Y.Z.exe". - macOS: Apple Developer ID Application + notarization (when
enabled). Verify with
codesign -dv --verbose=4 "Coherence Studio.app"andspctl -a -vvv. - Linux: AppImages are unsigned (conventional for this format).
Verify via the SHA-256 checksum published in
latest-linux.yml.
If signtool verify / codesign reports an invalid signature on a
release downloaded from the GitHub Releases page, don't install it
and report immediately — that's evidence of either a supply-chain attack
or an infrastructure misconfiguration on our side.
Security researchers who responsibly disclose valid issues will be credited in the release notes (unless you prefer anonymity). We don't currently run a paid bug bounty.