Skip to content

Security: OpenWyrd/mop

Security

SECURITY.md

Security policy

Reporting a vulnerability

Email security@openwyrd.org with details. We are pre-launch and do not yet publish a maintainer PGP key; treat the channel accordingly. For findings sensitive enough that plaintext-on-a-forwarder is unacceptable, request the key in your initial mail and we will arrange out-of-band exchange.

A maintainer PGP key will be published here once it exists. The key fingerprint will be cross-publishable at https://keys.openpgp.org and https://openwyrd.org/.well-known/maintainer.asc.

Disclosure window

90 days from initial report. We will:

  • Acknowledge receipt within 72 hours.
  • Confirm or refute the issue within 14 days.
  • Coordinate a fix and a public disclosure date.
  • Credit the reporter in the disclosure unless they request otherwise.

If we cannot ship a fix within 90 days, we will say so publicly and explain why. Indefinite embargoes are not on the table.

Scope

This policy covers:

  • The MOP spec (logical flaws, ambiguity that admits insecure implementations).
  • The conformance suite (vectors that mask bugs rather than catch them).
  • Reference implementations under github.com/openwyrd/* (the codebase, not deployments).

Operational issues with hosted deployments (e.g., a specific sendwyrd.com outage) belong to that host's operator, not the protocol.

What is not in scope

  • Vulnerabilities in dependencies — file with the dependency; we'll respond to advisories that affect us.
  • Self-inflicted attacks (a recipient leaks their own URL; the protocol does not promise to save them from themselves).
  • Plaintext content the user themselves placed in a wyrd.

No bug bounty

Not yet. We will not waste your time pretending to run a bounty program before we have an audited codebase and the resources to honor payouts. If that changes, this section will say so.

There aren’t any published security advisories