ptuf is a security-sensitive guardrail. If you discover a vulnerability —
whether a bypass of the built-in policy packs, a panic that turns into a
deny-of-service, a YAML / TOML / JSON parser issue exploitable through
plugin or hook input, or anything that affects audit-log integrity —
please report it privately.
Preferred channel: GitHub's private vulnerability reporting on
watany-dev/ptuf. Use the Security tab → Report a vulnerability.
If you are unable to use GitHub Security Advisories, open an empty issue
titled Security contact request and we will arrange a private channel.
Please do not file a public issue, send the details to a public mailing list, or include a working exploit in a public PR.
- We acknowledge the report within 3 business days.
- We confirm reproducibility and assign a severity within 10 business days.
- We aim to ship a patched release within 90 days of confirmation. For high-severity issues we coordinate a faster disclosure.
- We credit the reporter in the release notes unless they prefer anonymity.
In scope:
- The
ptufbinary on supported platforms (Linux x86_64/aarch64, macOS x86_64/aarch64, Windows MSVC x86_64). - The
ptuflibrary (pubAPI exposed fromsrc/lib.rs). - Built-in policy packs and hook adapters (Claude Code, Codex).
- Default plugin / config schema and YAML parsing.
- Audit JSONL emission (
schemaVersion: 1).
Out of scope (treat as feature requests, not vulnerabilities):
- Pre-release versions before the first stable release.
- Issues in user-authored plugins or third-party agent integrations.
- Misuse of the CLI in environments where the user already has equivalent shell access.
Until a 1.0.0 release, only the latest published version receives
security fixes.