Skip to content

Security: ScopeBlind/sb-runtime

Security

SECURITY.md

Security Policy

Supported versions

Only the latest tagged release on main receives security fixes during the v0.1-alpha cycle. Once v1.0 ships, we'll support the latest two minor lines.

Reporting a vulnerability

Please report security issues privately rather than via a public GitHub issue:

We aim to acknowledge within 24 hours and ship a fix + coordinated disclosure within 14 days for high-severity issues, longer for issues requiring upstream Cedar / Landlock / seccomp changes.

Scope

In scope:

  • Anything in crates/sb-* — the Rust code.
  • Anything in examples/ — if an example would leak a key, mis-apply a policy, or otherwise teach a wrong pattern.
  • Any documented CLI flag behaviour.

Out of scope:

Defence-in-depth assumptions we rely on

A sandbox built from Landlock + seccomp is best-effort, not a complete jail. We assume:

  • The kernel is patched against public CVEs.
  • The binary is not setuid. Callers drop privileges before invoking sb.
  • A determined attacker with a kernel 0-day can escape. For higher-assurance workloads, layer sb inside a VM, a container, or a hardware sandbox — sb is complementary to those, not a replacement.

Credit

Researchers who privately report valid issues are credited in release notes unless they request anonymity.

There aren’t any published security advisories