Do not open public issues for security vulnerabilities.
Preferred channel:
- GitHub Security Advisories: https://github.com/backbay-labs/clawdstrike/security/advisories/new
Alternative channel:
- Email: security@clawdstrike.io
Please include:
- Affected component(s) and repository path(s)
- Reproduction steps (minimal, deterministic when possible)
- Expected vs actual behavior
- Impact assessment (confidentiality/integrity/availability)
- Environment details (OS, version/commit, config flags)
- Any known workaround or patch idea (optional)
Target timelines:
- Acknowledgement: within 48 hours
- Initial triage/severity: within 7 days
- Fix plan/mitigation path: within 14 days
- Target remediation release window: within 30 days for confirmed issues
These are targets, not guarantees; complex issues may require longer.
- We follow responsible disclosure.
- Please keep details private until a fix or coordinated mitigation is available.
- We will coordinate advisory publication timing with the reporter when possible.
Default policy:
- Use GHSA (GitHub Security Advisory) as the primary disclosure artifact.
CVE policy:
- CVEs are requested when required by downstream consumers/compliance, or where broad ecosystem tracking materially improves remediation.
Security-sensitive scope includes:
crates/libs/clawdstrike(guards, policy, IRM, async runtime)crates/services/hush-cli(hush runproxy + remote extends)crates/services/hushd(daemon policy/runtime controls)crates/libs/hush-core(receipt/signature integrity primitives)
Reference threat context:
THREAT_MODEL.mdNON_GOALS.mddocs/audits/2026-02-10-remediation.mddocs/audits/2026-02-10-wave2-remediation.mddocs/audits/2026-02-10-wave3-remediation.md