| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
DO NOT OPEN A PUBLIC ISSUE for security vulnerabilities.
The CSMP project takes security seriously. We appreciate responsible disclosure of security vulnerabilities.
- Email: Send details to security@csmp.org
- Encryption: Use our PGP key
- Fingerprint:
9A3B 5C7D 8E1F 2A4B 6C8D 0E1F 2A3B 4C5D
- Fingerprint:
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
| Timeline | Action |
|---|---|
| Within 48 hours | Acknowledgment of receipt |
| Within 7 days | Initial assessment and severity rating |
| Within 30 days | Patch development (or extended timeline with explanation) |
| Within 90 days | Public disclosure (coordinated with reporter) |
| Rating | Description | Example |
|---|---|---|
| Critical | Remote code execution, complete compromise of confidentiality/integrity | Signature bypass allowing message forgery |
| High | Significant security impact with limited scope | Metadata leak in DHT queries |
| Medium | Limited impact, requires specific conditions | DoS on Parking Node with rate limiting |
| Low | Minor issues, best practices violations | Missing input validation on non-critical fields |
The security policy covers:
- CSMP protocol specification
- Reference implementation libraries
- Official tooling (validators, test suites)
The security policy does NOT cover:
- Third-party implementations (please contact their maintainers)
- Example code in documentation
- Deprecated versions
We gratefully acknowledge security researchers who have helped improve CSMP:
| Name | Contribution | Date |
|---|---|---|
| — | — | — |
(Reporters may choose to remain anonymous. Let us know if you'd like to be credited.)
CSMP is built with the following security assumptions:
- Zero Trust in Network: All traffic is encrypted end-to-end.
- Minimal Metadata Leakage: Routing information is minimized.
- Perfect Forward Secrecy: Message keys are ephemeral.
- Content Authenticity: All containers are signed.
If you believe any of these principles are violated in the design, please report it following the process above.
-----BEGIN PGP PUBLIC KEY BLOCK-----
mQINBGabcdef... (truncated for brevity) -----END PGP PUBLIC KEY BLOCK-----
Full key available at: https://keys.openpgp.org/search?q=security%40csmp.org