Skip to content

Security: sin-experimental/BIOMETRICS

Security

SECURITY.md

πŸ”’ Security Policy

Last Updated: February 2026
Version: 1.0.0
Status: Active


πŸ“‹ Table of Contents


βœ… Supported Versions

We provide security updates for the following versions:

Version Supported End of Support
1.0.x βœ… Current
0.9.x ❌ 2026-03-01
0.8.x ❌ 2026-02-01
< 0.8 ❌ Unsupported

Recommendation: Always use the latest stable version for security updates.


🚨 Reporting a Vulnerability

We take all security vulnerabilities seriously. If you discover a security issue, please follow this process:

DO NOT Create a Public GitHub Issue

Important: Security vulnerabilities should NOT be reported through public GitHub issues to prevent potential exploitation before a fix is available.

Preferred Method: Security Advisory Form

  1. Go to the Security Tab on GitHub
  2. Click "Report a vulnerability"
  3. Provide detailed information about the vulnerability

Alternative: Email

Send an encrypted email to: security@biometrics.dev

PGP Key Fingerprint: TODO: Add PGP Key

What to Include

When reporting a vulnerability, please provide:

  • Description: Clear description of the vulnerability
  • Impact: Potential impact if exploited
  • Reproduction Steps: Detailed steps to reproduce the issue
  • Affected Versions: Which versions are affected
  • Suggested Fix: If you have a suggestion for fixing it
  • Contact Info: Your contact information for follow-up questions

What to Expect

  • Acknowledgment: Within 24 hours
  • Initial Assessment: Within 7 days
  • Regular Updates: Every 7 days during investigation
  • Resolution Timeline: Depends on severity (see below)

⏱️ Security Response Timeline

We follow a structured response timeline based on vulnerability severity:

Critical Severity (CVSS 9.0-10.0)

  • Acknowledgment: Within 24 hours
  • Initial Assessment: Within 48 hours
  • Fix Development: 7 days
  • Patch Release: 14 days
  • Public Disclosure: 30 days after patch

High Severity (CVSS 7.0-8.9)

  • Acknowledgment: Within 24 hours
  • Initial Assessment: Within 5 days
  • Fix Development: 14 days
  • Patch Release: 21 days
  • Public Disclosure: 45 days after patch

Medium Severity (CVSS 4.0-6.9)

  • Acknowledgment: Within 48 hours
  • Initial Assessment: Within 7 days
  • Fix Development: 30 days
  • Patch Release: 45 days
  • Public Disclosure: 60 days after patch

Low Severity (CVSS 0.1-3.9)

  • Acknowledgment: Within 7 days
  • Initial Assessment: Within 14 days
  • Fix Development: 60 days
  • Patch Release: 90 days
  • Public Disclosure: 120 days after patch

πŸ“’ Disclosure Policy

Coordinated Disclosure

We follow a coordinated disclosure approach:

  1. Private Report: Vulnerability reported privately
  2. Investigation: We investigate and develop a fix
  3. Patch Release: Security update is released
  4. Public Advisory: After 30 days, public advisory is published
  5. CVE Assignment: If applicable, CVE is assigned and published

Embargo Policy

  • Security vulnerabilities are kept under embargo until patch is released
  • Researchers are asked to respect the embargo period (typically 30 days)
  • Early disclosure may be granted to critical infrastructure providers if needed

Credit and Recognition

We believe in recognizing security researchers:

  • Hall of Fame: Contributors are listed in our Security Hall of Fame
  • Acknowledgment: Public acknowledgment in release notes (unless anonymous requested)
  • CVE Credit: Your name/handle in CVE description (if applicable)

Request Anonymity: If you prefer to remain anonymous, please let us know.


πŸ›‘οΈ Security Best Practices

For Users

  1. Keep Updated: Always use the latest stable version
  2. Monitor Advisories: Watch the Security Advisories page
  3. Secure Configuration: Follow our security configuration guide
  4. Secrets Management: Never commit secrets to version control
  5. Access Control: Implement proper authentication and authorization
  6. Network Security: Use firewalls and network segmentation
  7. Regular Audits: Conduct regular security audits
  8. Incident Response: Have an incident response plan ready

For Contributors

  1. Security-First Mindset: Consider security implications of all code changes
  2. Input Validation: Always validate and sanitize user input
  3. Authentication: Use secure authentication mechanisms
  4. Encryption: Encrypt sensitive data at rest and in transit
  5. Error Handling: Don't expose sensitive information in error messages
  6. Dependencies: Keep dependencies up to date
  7. Code Review: All code changes require security review
  8. Testing: Include security tests in your test suite

Development Guidelines

  • OWASP Top 10: Follow OWASP Top 10 security guidelines
  • Secure Coding: Adhere to secure coding standards
  • Dependency Scanning: Automated vulnerability scanning on every PR
  • Static Analysis: SAST tools run on all code changes
  • Secret Scanning: Automated secret detection in all commits

πŸ” Security Measures

Automated Scanning

BIOMETRICS employs multiple automated security scanning tools:

Tool Purpose Frequency
govulncheck Go dependency vulnerabilities Every PR + Daily
Gitleaks Secret detection Every PR
TruffleHog Secret detection (secondary) Every PR
Semgrep Static Application Security Testing (SAST) Every PR
CodeQL Code security analysis Every PR
Dependabot Dependency updates Weekly
License Check License compliance Every PR

Security Workflows

All security scans run automatically:

  • On Push: To main and develop branches
  • On Pull Request: All PRs are scanned
  • Scheduled: Daily comprehensive scan at 3:00 AM UTC
  • Manual: Can be triggered on-demand

Access Control

  • Least Privilege: Minimal permissions for all services
  • Role-Based Access: RBAC implemented throughout
  • Audit Logging: All access is logged and auditable
  • Session Management: Secure session handling with JWT

Data Protection

  • Encryption at Rest: All sensitive data encrypted
  • Encryption in Transit: TLS 1.3 for all communications
  • Data Minimization: Only collect necessary data
  • Retention Policies: Automatic data purging

πŸ“ž Contact Information

Security Team

Emergency Contact

For critical security issues requiring immediate attention:

General Inquiries

For non-security related questions:


πŸ“œ Legal

Safe Harbor

We maintain a safe harbor policy for security researchers:

  • Good Faith: Research conducted in good faith will not result in legal action
  • No Unauthorized Access: Do not access data you don't own
  • No Disruption: Do not disrupt production services
  • Confidentiality: Respect data privacy and confidentiality

Terms and Conditions

By reporting a vulnerability, you agree to:

  • Keep the vulnerability confidential until public disclosure
  • Allow us time to investigate and remediate
  • Not exploit the vulnerability for malicious purposes
  • Comply with all applicable laws and regulations

πŸ”— Additional Resources

Internal Documentation

External Resources

Tools and Services


πŸ† Security Hall of Fame

We recognize security researchers who have helped improve BIOMETRICS security:

Researcher Vulnerability Date Severity
Your name here! - - -

Want to be listed? Report a valid security vulnerability and help us improve!


πŸ“ Changelog

Version 1.0.0 (February 2026)

  • Initial security policy publication
  • Implemented automated security scanning
  • Established vulnerability disclosure process
  • Created security response team

Last Reviewed: February 2026
Next Review: May 2026 (Quarterly)
Policy Owner: Security Team

There aren't any published security advisories