| Version | Supported |
|---|---|
| 0.14.x | ✅ |
| 0.12.x | ✅ |
| < 0.12 | ❌ |
We take security seriously. If you discover a security vulnerability, please follow these steps:
- Open a public GitHub issue
- Disclose the vulnerability publicly before it's fixed
- Email us directly at:
security@supernovae.studio - Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 24-72 hours
- High: 7 days
- Medium: 30 days
- Low: Next release
SuperNovae CLI implements several security measures:
- OS Keychain Integration: Secrets stored in macOS Keychain, Windows Credential Manager, or Linux Secret Service
- Memory Protection:
mlock()prevents secrets from being swapped to disk - Core Dump Protection:
MADV_DONTDUMPexcludes secrets from core dumps - Automatic Zeroization:
Zeroizing<T>clears secrets on drop - Socket Permissions: Daemon socket is
0600(owner-only) - Peer Verification:
SO_PEERCRED/LOCAL_PEERCREDfor IPC authentication
In scope:
- Secret/credential handling
- Daemon IPC security
- Path traversal vulnerabilities
- Code injection vulnerabilities
- Authentication/authorization issues
Out of scope:
- Denial of service (unless severe)
- Issues requiring physical access
- Social engineering attacks
We thank all security researchers who responsibly disclose vulnerabilities. With your permission, we'll acknowledge you in our release notes.