ShadowWall AI is committed to maintaining the highest standards of security and ethical conduct. As a cybersecurity platform, we take security vulnerabilities seriously and appreciate the security research community's efforts to help us maintain a secure and trustworthy project.
We actively support security updates for the following versions:
| Version | Supported | Security Updates | End of Life |
|---|---|---|---|
| 3.x.x | β Full Support | Active | TBD |
| 2.x.x | Critical Only | 2025-12-31 | |
| 1.x.x | β No Support | None | 2025-06-30 |
| < 1.0 | β No Support | None | Deprecated |
We encourage responsible disclosure of security vulnerabilities. Please follow these steps:
- Email: yashabalam707@gmail.com
- Subject:
[SECURITY] Vulnerability Report - ShadowWall AI - PGP Key: Available on request for sensitive communications
Please include:
- Vulnerability Type: Classification (e.g., Authentication Bypass, SQL Injection, XSS)
- Affected Components: Specific modules, versions, or configurations
- Impact Assessment: Potential security impact and attack scenarios
- Proof of Concept: Steps to reproduce (without causing harm)
- Suggested Mitigation: Recommended fixes or workarounds
- Discoverer Information: Your name/organization for credit (if desired)
- 24 Hours: Acknowledgment of your report
- 72 Hours: Initial triage and severity assessment
- 1 Week: Detailed analysis and impact assessment
- 2-4 Weeks: Development and testing of fixes
- Coordinated Disclosure: Public disclosure timing agreement
We believe in recognizing security researchers who help improve our security:
Security researchers who responsibly disclose vulnerabilities will be:
- Listed in our Security Hall of Fame (with permission)
- Credited in release notes and security advisories
- Acknowledged on our website and social media
- Invited to participate in future security discussions
We are developing a bug bounty program with:
- Critical: $500 - $2,000
- High: $200 - $500
- Medium: $50 - $200
- Low: $25 - $50
- Informational: Recognition and credit
The following are considered in scope for security reporting:
- Authentication and authorization bypasses
- Remote code execution vulnerabilities
- SQL injection and database security issues
- Cross-site scripting (XSS) and CSRF vulnerabilities
- Privilege escalation vulnerabilities
- Information disclosure vulnerabilities
- API authentication and authorization flaws
- Rate limiting bypass
- Input validation vulnerabilities
- Data exposure through APIs
- Container and deployment security issues
- Configuration vulnerabilities
- Dependency vulnerabilities with exploitable impact
- Model poisoning or adversarial attacks
- Training data manipulation
- AI-specific security vulnerabilities
The following are generally NOT considered security vulnerabilities:
- Social Engineering: Attacks requiring social engineering
- Physical Access: Issues requiring physical access to hardware
- DoS Attacks: Simple denial of service without authentication bypass
- Self-XSS: Self-inflicted cross-site scripting
- Rate Limiting: Rate limiting on non-authentication endpoints
- Version Disclosure: Software version disclosure without exploitable vulnerability
- Missing Security Headers: Without demonstrable security impact
- Logout CSRF: CSRF on logout functionality
- Always download from official sources
- Verify checksums and signatures
- Use the latest supported version
- Follow security configuration guides
- Change default passwords and API keys
- Enable HTTPS/TLS encryption
- Configure proper access controls
- Regular security updates
- Monitor logs for suspicious activity
- Regular security assessments
- Backup and disaster recovery planning
- Security awareness training
- Follow secure coding practices
- Regular dependency updates
- Security testing integration
- Code review requirements
- Secure container configurations
- Network segmentation
- Secrets management
- Monitoring and alerting
- Regular SAST (Static Application Security Testing)
- Dependency vulnerability scanning
- Code quality and security linting
- Security-focused code reviews
- DAST (Dynamic Application Security Testing)
- Penetration testing
- Security regression testing
- Runtime security monitoring
- Regular security audits
- Penetration testing by security firms
- Bug bounty programs
- Community security reviews
We track and improve our security posture through:
- Mean time to detection (MTTD)
- Mean time to response (MTTR)
- Vulnerability remediation times
- Security test coverage metrics
For active security incidents:
- Critical Issues: Email with subject
[URGENT SECURITY] - Response Time: Within 2 hours during business hours
- Escalation: 24/7 on-call for critical security issues
- Detection: Automated monitoring and manual reporting
- Assessment: Impact and severity evaluation
- Containment: Immediate threat mitigation
- Investigation: Root cause analysis
- Remediation: Permanent fix implementation
- Recovery: Service restoration and validation
- Lessons Learned: Process improvement and documentation
- Security awareness for contributors
- Secure coding guidelines
- Threat modeling workshops
- Security testing methodologies
- Security-focused Discord channels
- Regular security AMAs (Ask Me Anything)
- Security research collaboration
- Conference presentations and workshops
- Security Announcements: GitHub Security Advisories
- Community Discussion: GitHub Discussions (Security category)
- Direct Contact: yashabalam707@gmail.com
- Social Media: @_zehrasec
- Compliance with applicable laws and regulations
- GDPR and privacy protection
- Responsible disclosure agreements
- Terms of service and acceptable use policies
- Ethical hacking principles
- Responsible AI and ML practices
- Privacy-by-design implementation
- Transparency in security practices
- Lead Security Contact: Yashab Alam (yashabalam707@gmail.com)
- Organization: ZehraSec
- Website: https://www.zehrasec.com
- Emergency Contact: Use [URGENT SECURITY] in email subject
PGP public key available on request for sensitive communications.
π‘οΈ Security is Everyone's Responsibility π‘οΈ
Together, we build a more secure digital world
Last Updated: August 3, 2025
Next Review: November 3, 2025