Productivity: Active
| Version | Supported |
|---|---|
| HARDENED | ✅ |
🔒 Use GitHub's Private Vulnerability Reporting:
- Navigate to the Security Advisories page
- Click "Report a vulnerability"
- Fill out the advisory form with details
- Submit privately - only maintainers will see it
Why use GitHub Security Advisories?
- ✅ Encrypted communication
- ✅ Credit tracking for researchers
- ✅ CVE assignment assistance
- ✅ Coordinated disclosure workflow
- ✅ Security advisory publication when fixed
If you prefer email or cannot access GitHub:
- Email: security@thirstysprojects.com
- PGP Key: [Available on request]
⚠� DO NOT:
- Create public issues for vulnerabilities
- Disclose vulnerabilities on social media
- Share exploit code publicly before a fix
- Test vulnerabilities on production systems
✅ DO:
- Report responsibly via private channels
- Provide clear reproduction steps
- Allow 90 days for coordinated disclosure
- Work with maintainers on fix verification
Response Timeline:
- Initial Response: Within 48 hours
- Triage & Assessment: Within 5 business days
- Fix Development: Depends on severity (Critical: 7-14 days, High: 30 days, Medium: 60 days)
- Disclosure: After fix is released + 7-day adoption period
Project-AI implements multiple layers of security:
- HTTP Gateway - CORS validation, request sanitization
- Intent Validation - Type checking and schema validation
- TARL Enforcement - Hard policy gate at entry
- Triumvirate Voting - Multi-pillar consensus (Galahad, Cerberus, CodexDeus)
- Formal Invariants - Provable mathematical constraints
- Security Guards - Hydra (expansion prevention), Boundary (network protection), Policy (action whitelisting)
- Audit Logging - Immutable cryptographic trail with intent hashing
- Fail-Closed Default - Deny execution unless explicitly allowed
The OctoReflex substrate provides the ultimate containment boundary. Before the Governance Layer evaluates a decision, the Reflexive Bedrock enforces kernel-level invariants.
- Reflexive Containment: O(1) isolation of any diverging logic.
- Deterministic Halts: Hard reflexive termination if the Shadow Plane and Primary Plane diverge.
- Immutable Bedrock: The OctoReflex logic is anchored beyond the reach of the AI persona.
Commit: 9134791530f193bde79d2afddeefd2342e0c5e90
Date: 2026-01-28 21:05:59 UTC
Files Affected:
data/sovereign_messages_ai/identity.jsondata/sovereign_messages_multi_ai/identity.jsondata/sovereign_messages_multi_alice/identity.jsondata/sovereign_messages_multi_bob/identity.jsondata/sovereign_messages_multi_charlie/identity.jsondata/sovereign_messages_user/identity.json
Status: Files removed from HEAD (current working tree is clean) Classification: Example/test RSA private keys only Risk Level: LOW - These are demonstration keys for the sovereign messaging integration example Recommendation: Generate new cryptographic keys for any production deployment
Important: These keys were never used in production and were only included as examples to demonstrate the sovereign messaging feature. If you are deploying Project-AI in a production environment, you must generate your own unique keys using:
from cryptography.hazmat.primitives.asymmetric import rsa
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.backends import default_backend
# Generate new key pair
private_key = rsa.generate_private_key(
public_exponent=65537,
key_size=2048,
backend=default_backend()
)
# Export private key
pem = private_key.private_bytes(
encoding=serialization.Encoding.PEM,
format=serialization.PrivateFormat.PKCS8,
encryption_algorithm=serialization.NoEncryption()
)- Never commit
.envfiles to version control - Use environment variables for all sensitive configuration
- Rotate API keys regularly
- Use different keys for development, staging, and production
- Enable HTTPS/TLS for all API endpoints
- Configure CORS properly for your domain
- Use strong
SECRET_KEYvalues (32+ characters, cryptographically random) - Enable rate limiting on public endpoints
- Review and update
CORS_ORIGINSto only allow trusted domains
- Regularly review
audit.logfor suspicious activity - Enable comprehensive logging (set
LOG_LEVEL=INFOorDEBUG) - Monitor Triumvirate governance decisions for denied requests
- Set up alerts for repeated policy violations
- Regularly update dependencies:
pip install --upgrade -r requirements.txt - Run security scans:
pip-auditandsafety check - Review GitHub Dependabot alerts
- Subscribe to security advisories for critical dependencies
Project-AI implements security controls aligned with:
- ASL-3 (AI Safety Level 3): 30+ security controls
- NIST AI RMF: AI Risk Management Framework
- OWASP LLM Top 10: Protection against AI-specific vulnerabilities
- OWASP Testing Guide v4: Comprehensive security testing
MANDATORY REQUIREMENT FOR ALL PULL REQUESTS:
All PRs that claim "production-ready," "enterprise best practices," "complete forensic capability," "runtime enforcement," or any assertion of operational security MUST include direct runtime validation output for ALL of the following:
- Unsigned Image Admission Denial - Evidence of deployment denial for unsigned images
- Signed Image Admission Success - Evidence of successful deployment for signed images
- Privileged Container Denial - Evidence of deployment denial for privileged containers
- Cross-Namespace/Lateral Communication Denial - Evidence of network policy enforcement
- Log Deletion Prevention - Evidence of log deletion prevention or detection
If ANY of these validations are missing, the PR MUST use safe framing language ONLY:
- "Implementation aligns with enterprise hardening patterns."
- "Validation tests confirm configuration correctness."
- "Full adversarial validation is ongoing."
PRs that claim runtime enforcement without complete evidence will be rejected with no exceptions.
Complete Policy: See .github/SECURITY_VALIDATION_POLICY.md for detailed requirements, evidence format, and enforcement process.
Rationale: This policy ensures that security claims are backed by verifiable runtime evidence, preventing false assertions and maintaining trust in Project-AI's security posture.
The project includes:
- 2,000+ adversarial red team tests
- 315+ OWASP-compliant tests (expanding to 1,500+)
- Automated security scanning via GitHub Actions
- CodeQL analysis
- Container security scanning (Trivy)
- Cloud configuration checks (Checkov)
CodeQL Analysis
- Continuous code scanning for Python and JavaScript
- Security-extended and quality query suites
- Automatic SARIF upload to GitHub Security tab
- Workflow:
.github/workflows/codeql.yml - Schedule: Daily at 6:00 AM UTC
Dependency Scanning
- Dependabot configured for pip, npm, Docker, and GitHub Actions
- Automatic pull requests for security updates
- Dependency review on all PRs via GitHub Actions
- pip-audit scanning for Python vulnerabilities
- Configuration:
.github/dependabot.yml
Secret Scanning
- GitHub secret scanning enabled (repository setting)
- Detects committed secrets (API keys, tokens, credentials)
- Push protection prevents secret commits (recommended)
- Partner pattern detection (AWS, Azure, GCP, etc.)
Security Advisories
- Private vulnerability reporting via GitHub Security Advisories
- CVE assignment and coordination
- Template available:
.github/SECURITY_ADVISORY_TEMPLATE.md
Signed Commits
- Recommended for all contributors
- Required on protected branches (configurable)
- GPG or SSH signing supported
Workflow Security
- All GitHub Actions pinned to full SHA (not tags)
- Minimal permissions per workflow (principle of least privilege)
- Dependabot keeps Actions up to date
SBOM Generation
- Software Bill of Materials generated automatically
- Workflow:
.github/workflows/generate-sbom.yml - SPDX and CycloneDX formats supported
Comprehensive branch protection rules are documented and should be configured in repository settings:
- Required pull request reviews
- Required status checks (CodeQL, dependency review, tests)
- Conversation resolution required
- Force push disabled on protected branches
- Full documentation:
.github/BRANCH_PROTECTION.md
Security Alerts
- Dependabot security alerts enabled
- CodeQL scanning alerts
- Secret scanning alerts
- Email notifications to maintainers
Audit Logging
- Repository audit log tracks security-related changes
- Protected branch modifications logged
- Security settings changes tracked
- Security Validation Claims Policy:
.github/SECURITY_VALIDATION_POLICY.md - Security Automation:
.github/SECURITY_AUTOMATION.md - Security Checklist:
.github/SECURITY_VALIDATION_CHECKLIST.md
To achieve full GitHub security compliance, configure these settings in repository settings:
Security & Analysis
- ✅ Dependency graph: Enabled
- ✅ Dependabot alerts: Enabled
- ✅ Dependabot security updates: Enabled
- ✅ Grouped security updates: Enabled
- ✅ CodeQL analysis: Enabled (via workflow)
- ✅ Secret scanning: Enabled
- ✅ Secret scanning push protection: Enabled (recommended)
Branch Protection Rules
- ✅ Configure for
main,develop, andrelease/**branches - ✅ See
.github/BRANCH_PROTECTION.mdfor detailed rules
Actions Permissions
- ✅ Allow select actions and reusable workflows
- ✅ Require workflow approval for first-time contributors
- ✅ Restrict actions to verified creators
Vulnerability Reporting
- ✅ Private vulnerability reporting: Enabled
- ✅ Security policy published (this file)
For security concerns, please contact the project maintainers through GitHub's security advisory system.
Last Updated: 2026-02-28