Do NOT open public issues for security vulnerabilities.
- Email: security@scqcs.dev
- Encrypt your report if possible (PGP key available at https://scqcs.dev/.well-known/pgp-key.txt)
- Include:
- Description of the vulnerability
- Steps to reproduce (minimal proof of concept preferred)
- Potential impact assessment
- Suggested fix (if any)
- Your name/handle for attribution (optional)
- Response SLA: Initial acknowledgment within 48 hours, triage within 5 business days
- Disclosure timeline: We follow a 90-day coordinated disclosure window
- Bypass of independence enforcement checks
- Path traversal or symlink-following vulnerabilities
- Secret leakage through error messages or reports
- Denial of service via crafted bundles (e.g., zip bombs, regex catastrophic backtracking)
- Any violation of the security model described below
- Bugs in external tools (slsa-verifier, in-toto, cosign) -- report to those projects
- Feature requests or usability issues -- use GitHub Issues
- Findings in example/demo files that are clearly marked as non-production
| Version | Supported |
|---|---|
| 0.1.x | Current release |
| < 0.1 | Not supported |
VBW's guarantee is structural:
- No access required -- we cannot leak what we never see
- Cryptographic verification only -- checks operate on signed evidence
- Transparent operation -- verification is reproducible from the bundle
- Open source -- code is auditable by anyone
- Defensive input handling -- strict file size limits, no symlink following, secret redaction in error output
- VBW does not trust bundle contents (all inputs treated as adversarial)
- VBW does not access networks, secrets, or credentials
- VBW does not execute code from bundles
- VBW delegates cryptographic verification to established tools (slsa-verifier, in-toto, cosign)
If VBW ever requests credentials, private keys, or internal network access: that is a bug.
- All CI/CD GitHub Actions are pinned to SHA (not mutable tags)
- Dependencies are audited via
cargo-auditandcargo-denyon every PR and daily - Only crates from crates.io are permitted (no git dependencies)
- Only OSI-approved permissive licenses are allowed (see
deny.toml) - Release binaries include SHA256 checksums and SBOM