habeas-protocol

Security Policy

Reporting a vulnerability

If you discover a security issue in Habeas Protocol — anything from a data leak in the API, an injection vector in the dashboard, a Catala evaluation that bypasses a certified rule’s intended semantics, an issue in the migration scripts, a credential accidentally committed to history, or a supply-chain concern in the clients — please report it privately.

Email: thehamzaq@gmail.com

Subject line suggestion: [Habeas Security] <short description>.

Please do not open a public GitHub issue for security matters until a fix is available.

What to include

A useful report typically contains:

What to expect

This project is currently maintained by a small team (initially solo). Response targets are best-effort:

Scope

In scope:

Out of scope:

Hardening notes for self-hosters

If you run your own instance:

Acknowledgements

A list of reporters credited for past disclosures will be maintained here once the project has its first acknowledged report.