| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
Do not open public issues for security vulnerabilities.
To report a security vulnerability, email: security@kaaffilm.com
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 7 days
- Resolution target: Within 30 days for critical issues
- MTB generation and verification
- Hash computation and integrity
- Evidence recording
- Policy enforcement
- CLI security
- Third-party dependencies (report to upstream)
- Documentation errors
- Non-security bugs
MK10-PRO operates under these security invariants:
- Determinism: Same input → same MTB hash, always
- Integrity: MTB tampering is detectable
- Evidence chain: All operations are recorded
- Policy enforcement: Rules cannot be bypassed
Breaking any of these invariants constitutes a critical vulnerability.