| Version | Supported |
|---|---|
| 3.x.x | ✅ |
| 2.x.x | ✅ (security fixes only) |
| 1.x.x | ❌ |
| < 1.0 | ❌ |
We take security seriously. If you discover a security vulnerability, please report it responsibly.
- DO NOT open a public GitHub issue for security vulnerabilities
- Email security concerns to: aethermoregames@pm.me
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes
| Severity | Initial Response | Resolution Target |
|---|---|---|
| Critical | 24 hours | 7 days |
| High | 48 hours | 14 days |
| Medium | 7 days | 30 days |
| Low | 14 days | 90 days |
- Acknowledgment of your report within the response time
- Regular updates on our progress
- Credit in the security advisory (unless you prefer anonymity)
- Notification when the vulnerability is fixed
-
Never hardcode API keys - Use environment variables
export SCBE_API_KEY=$(openssl rand -hex 32)
-
Use TLS 1.3 - Configure your reverse proxy appropriately
-
Enable audit logging - All decisions are logged by default
-
Rotate keys regularly - Recommended: 90 days
-
Monitor for anomalies - Export logs to your SIEM
- No secrets in code - Use environment variables or secret managers
- Pin dependencies - Use lockfiles with hashes
- Run security scans - Bandit for Python, npm audit for Node
- Review PRs - All changes require review
| Purpose | Algorithm | Standard |
|---|---|---|
| Symmetric Encryption | AES-256-GCM | NIST FIPS 197 |
| Key Encapsulation | ML-KEM-768 | NIST FIPS 203 |
| Digital Signatures | ML-DSA-65 | NIST FIPS 204 |
| Hashing | SHA-3-256 | NIST FIPS 202 |
| Key Derivation | HKDF | RFC 5869 |
- Every request requires authentication
- No implicit trust between components
- All decisions are logged and auditable
- Fail-secure: defaults to DENY
All governance decisions include:
- Timestamp (ISO 8601)
- Agent identity
- Action attempted
- Decision (ALLOW/DENY/QUARANTINE)
- Score and explanation
- Correlation ID
- In-memory storage - Production deployments should use persistent storage
- Single-node - High availability requires external load balancing
- PQC fallback - Full NIST PQC requires
liboqsorkyber-py/dilithium-py(pure Python fallback available) - Timestamp race condition -
test_121_large_medical_image_transferhas a known timing-dependent assertion under heavy load; tracked and non-exploitable
Active anti-extraction defense using information-theoretic nullification:
| Posture | Signal Retention | Trigger |
|---|---|---|
| TRANSPARENT | ~100% | Normal operation |
| GUARDED | 50-95% | Mild anomaly detected |
| OPAQUE | 10-50% | Active probing or budget pressure |
| SILENT | <10% | Budget exhausted or confirmed extraction |
The nullification function N(x) = σ · f(x) + (1 - σ) · U ensures surrogate models trained on probing pairs converge to the uniform distribution — they learn noise, not behavior.
- TypeScript:
packages/kernel/src/entropySurface.ts - Python:
src/symphonic_cipher/scbe_aethermoore/entropy_surface.py
For security-related inquiries:
- GitHub Security Advisories: enabled on this repository
- Email: aethermoregames@pm.me (Issac Daniel Davis, Founder)
- Patent: USPTO #63/961,403 (provisional)
- ORCID: 0009-0002-3936-9369
We thank the following for responsible disclosure:
- (None yet — be the first!)