This project is research-grade. No FIPS 140-3 / Common Criteria / ISO 27001 certification has been performed. See DISCLAIMER.md for the full scope, security caveats, export-control notes, and warranty terms.
The Perspectra Fold project takes security seriously. If you discover a security vulnerability, please report it responsibly.
Do not open a public GitHub issue for security vulnerabilities.
Instead, please email the maintainers directly or use GitHub's private vulnerability reporting feature:
- Go to the repository's Security tab
- Click "Report a vulnerability"
- Provide detailed information about the vulnerability
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Resolution Timeline: Communicated after assessment
| Version | Supported |
|---|---|
| main | ✅ |
| < 1.0 | ❌ |
This project implements cryptographic primitives. Users should:
- Use only stable, reviewed releases in production
- Follow the deployment guidelines in the documentation
- Keep dependencies updated
- Conduct independent security audits for production deployments
- Never commit key material, secrets, or credentials
- Use environment variables or secure secret management
- Follow the zero-trust principles outlined in the architecture documentation
We monitor dependencies for known vulnerabilities using:
- GitHub Dependabot
cargo auditfor Rustpip-auditfor Pythongovulncheckfor Go
We follow a coordinated disclosure process:
- Reporter submits vulnerability privately
- We acknowledge and assess the report
- We develop and test a fix
- We release the fix and publish an advisory
- We credit the reporter (unless anonymity is requested)
When deploying Perspectra Fold components:
- Network Security: Use TLS for all communications
- Access Control: Implement proper authentication and authorization
- Monitoring: Enable logging and anomaly detection
- Updates: Keep all components and dependencies current
- Isolation: Run services with minimal privileges
See Zero Trust Environment for detailed security architecture guidance.