Skip to content

Security: CoReason-AI/coreason

Security

SECURITY.md

Security Policy

The CoReason.AI unified monorepo takes a zero-trust, mathematically grounded approach to security. This document outlines our security support policies, vulnerability reporting procedures, and the specific threat models in scope for our pure-Rust engine and React sensory UI.

Supported Versions

Currently, we provide security updates for the following versions:

Version Supported Notes
main Active development branch
v1.x Latest stable release
< v1.0 Deprecated polyrepo architectures

Reporting a Vulnerability

We deeply appreciate the security research community's efforts in keeping our platform secure. If you discover a vulnerability, please do not report it by creating a public GitHub issue.

Instead, report all security vulnerabilities directly to our security team via email: 📧 security@coreason.ai

What to Include in Your Report

To help us quickly triage and remediate the issue, please include:

  1. Description: A clear description of the vulnerability and its potential impact.
  2. Component: The specific crate (core, engine, trust, codegen, server) or frontend package (sensory-core) affected.
  3. Reproduction: Step-by-step instructions or a Proof of Concept (PoC) to reproduce the vulnerability.
  4. Environment: Information about the environment where the vulnerability was observed (e.g., Rust version, OS, browser).

You should receive an initial acknowledgment from our team within 48 hours. We will keep you updated as we investigate and remediate the issue.


Threat Model & In-Scope Components

Because this monorepo consolidates previously distributed services, the security boundary is heavily dependent on internal crate encapsulation. We are particularly interested in reports concerning the following vectors:

1. crates/engine (WASM Sandboxing & Deterministic Compute)

This crate executes untrusted or dynamically generated logic.

  • In Scope: WASM sandbox escapes, memory leaks across execution boundaries, or violations of computational determinism.
  • In Scope: Capability allocator bypasses resulting in unauthorized resource consumption.

2. crates/trust (Cryptographic & Epistemic Authority)

This crate handles all identity management, token verification, and state persistence.

  • In Scope: URN forgery, JWT/SPIFFE claim manipulation, or HashiCorp Vault transit bypasses.
  • In Scope: Tampering with thermodynamic cost trackers or epistemic ledger states.

3. crates/server (I/O Perimeter)

This crate serves as the Axum-based API gateway.

  • In Scope: Authentication bypasses, malformed request crashes (DDoS vectors), or failure to correctly inject crates/trust validations into crates/engine workers.

4. crates/codegen (Meta-Engineering)

This crate compiles schemas and generates cross-language bindings.

  • In Scope: Arbitrary code execution during the build process, malicious SDK type-generation, or topological validation bypasses.

AI Agent Security Protocols

This repository is designed to be highly compatible with autonomous AI coding agents. To prevent supply chain attacks or prompt-injection vulnerabilities via automated scaffolding:

  • All agent-generated code must pass through strict compilation and type-checking guillotines before being merged.
  • Vulnerabilities caused by AI-agent hallucinations that bypass crates/trust authorization checks are considered highly critical.

There aren't any published security advisories